0.000 Creating connection with server4:443 with v1 0.081 Setting up connection for downloading https://server4:443/vollivinjz at 38:31.368 on ClientConnection[41a96f678fb2678f/8dfe60f7dbcf94ea(V1) with server4/193.167.100.100:443] 0.082 Original destination connection id: 41a96f678fb2678f (scid: 8dfe60f7dbcf94ea) >- CryptoStream[I|ClientHello] 0.231 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.432/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.226 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.433 loss detection timeout handler running Sending probe 0, because no ack since 0.226. Current RTT: 100/25. 0.434 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.437 (Probe is an initial retransmit) 0.442 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.842/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.441 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.559 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 0.578 probe count not reset on ack because handshake not yet confirmed 0.586 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.986/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 0.619 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 2.614/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 0.619 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 0.559 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 0.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 2.659/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 0.664 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.674 Starting downloading https://server4:443/vollivinjz at 38:31.977 on ClientConnection[41a96f678fb2678f/8dfe60f7dbcf94ea(V1) with server4/193.167.100.100:443] 0.680 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 0.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 996 millis, based on 1.682/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 0.687 Discarding pn space Initial because first Handshake message is being sent 0.706 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 996 millis, based on 1.704/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 0.706 -> Packet A|0|S0|2466b293c06e1c86|47|1 StreamFrame[0(CIB),0,17,fin] 1.327 <- (2) Packet H|2|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.328 <- (3) Packet H|3|L|744|1 CryptoFrame[0,698] 1.332 -> Packet H|2|L|48|1 AckFrame[2,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.333 -> Packet H|3|L|48|1 AckFrame[3-2,0|Δ0] 1.703 loss detection timeout handler running Sending probe 0, because no ack since 0.664. Current RTT: 333/166. 1.703 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.704 (Probe is a handshake retransmit) 1.705 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 3.699/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 1.705 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 1.743 <- (4) Packet A|0|S0|8dfe60f7dbcf94ea|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|02b43f06318b3e37|6284eaa8c33ba548416f3ccb8213a8b1] CryptoFrame[0,42] 1.748 State is set to Confirmed reschedule loss detection timer for PTO over 1001 millis, based on 2.750/App, because ackElicitingInFlight | RTT:333/166 reschedule loss detection timer for PTO over -20 millis, based on 1.728/App, because ackElicitingInFlight | RTT:333/166 1.749 Discarding pn space Handshake because HandshakeDone is received 1.749 loss detection timeout handler running Sending probe 0, because no ack since 0.706. Current RTT: 333/166. 1.749 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 2043 millis, based on 3.794/App, because ackElicitingInFlight | RTT:333/166 1.750 -> Packet PA|1|S0|2466b293c06e1c86|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 1.770 -> Packet A|2|S0|2466b293c06e1c86|32|1 AckFrame[0|Δ19] 2.102 <- (5) Packet A|2|S0|8dfe60f7dbcf94ea|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 2.106 Finished downloading https://server4:443/vollivinjz at 38:33.409 on ClientConnection[41a96f678fb2678f/8dfe60f7dbcf94ea(V1) with server4/193.167.100.100:443] 2.107 Closing ClientConnection[41a96f678fb2678f/8dfe60f7dbcf94ea(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.109 Creating connection with server4:443 with v1 2.110 Setting up connection for downloading https://server4:443/ytovpqdazr at 38:33.413 on ClientConnection[8006637777223c91/815d6bb1d1668e27(V1) with server4/193.167.100.100:443] 2.111 Original destination connection id: 8006637777223c91 (scid: 815d6bb1d1668e27) 2.109 -> Packet A|3|S0|2466b293c06e1c86|38|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ4] >- CryptoStream[I|ClientHello] 2.114 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.314/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.114 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.146 <- (6) Packet A|3|S0|8dfe60f7dbcf94ea|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 2.313 loss detection timeout handler running Sending probe 0, because no ack since 2.114. Current RTT: 100/25. 2.314 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.314 (Probe is an initial retransmit) 2.315 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.715/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.315 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.562 Discarding packet (744 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 2.714 loss detection timeout handler running Sending probe 1, because no ack since 2.315. Current RTT: 100/25. 2.715 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.715 (Probe is an initial retransmit) 2.716 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.516/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.715 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.717 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.517/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.716 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.751 <- (2) Packet I|2|L|1201|2 Token=[] AckFrame[3,0|Δ0] Padding(1151) 2.752 probe count not reset on ack because handshake not yet confirmed 2.755 Cwnd(-): 6000; inflight: 1200 2.827 loss detection timeout handler running 2.828 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 3.236/Initial, because peerAwaitingAddressValidation | RTT:34/17 3.161 <- (3) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 3.165 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 3.267/Handshake, because peerAwaitingAddressValidation | RTT:34/17 3.166 Discarding pn space Initial because first Handshake message is being sent 3.166 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 3.268/Handshake, because peerAwaitingAddressValidation | RTT:34/17 3.166 -> Packet I|4|L|1201|2 Token=[] AckFrame[4,2|Δ0] Padding(1151) 3.267 loss detection timeout handler running 3.267 Sending probe 0. Current RTT: 34/17. 3.268 Sending probe because peer awaiting address validation 3.268 (Probe is a handshake ping) 3.269 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 3.473/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.269 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 3.301 <- (4) Packet H|3|L|46|1 AckFrame[0|Δ0] 3.302 probe count not reset on ack because handshake not yet confirmed 3.302 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.302 <- (5) Packet H|4|L|744|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 171 millis, based on 3.478/Handshake, because ackElicitingInFlight | RTT:34/13 3.306 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.307 Starting downloading https://server4:443/ytovpqdazr at 38:34.610 on ClientConnection[8006637777223c91/815d6bb1d1668e27(V1) with server4/193.167.100.100:443] 3.307 -> Packet H|2|L|46|1 AckFrame[4-3|Δ0] 3.308 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 169 millis, based on 3.478/Handshake, because ackElicitingInFlight | RTT:34/13 3.308 -> Packet A|0|S0|35a4243f494470e4|47|1 StreamFrame[0(CIB),0,17,fin] 3.342 <- (6) Packet A|1|S0|815d6bb1d1668e27|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] reschedule loss detection timer for PTO over 48 millis, based on 3.392/Handshake, because ackElicitingInFlight | RTT:34/13 3.344 Finished downloading https://server4:443/ytovpqdazr at 38:34.647 on ClientConnection[8006637777223c91/815d6bb1d1668e27(V1) with server4/193.167.100.100:443] 3.344 Closing ClientConnection[8006637777223c91/815d6bb1d1668e27(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.344 -> Packet A|1|S0|35a4243f494470e4|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 3.345 Creating connection with server4:443 with v1 3.345 Setting up connection for downloading https://server4:443/zkiuwmiwvm at 38:34.648 on ClientConnection[d153d17bdc726fb2/a8eca4a203bfb312(V1) with server4/193.167.100.100:443] 3.345 Original destination connection id: d153d17bdc726fb2 (scid: a8eca4a203bfb312) >- CryptoStream[I|ClientHello] 3.348 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.548/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.347 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.547 loss detection timeout handler running Sending probe 0, because no ack since 3.347. Current RTT: 100/25. 3.547 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.547 (Probe is an initial retransmit) 3.548 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.948/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.548 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.590 <- (1) Packet I|0|L|454|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(279) 3.591 probe count not reset on ack because handshake not yet confirmed 3.592 Retransmitting CryptoFrame[0,257] on level Initial 3.592 Cwnd(-): 6000; inflight: 0 3.592 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.993/Initial, because peerAwaitingAddressValidation | RTT:100/25 3.593 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 251 millis, based on 3.845/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:42/21 3.593 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 3.590 <- (1) Packet H|0|L|746|1 CryptoFrame[0,700] 3.597 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 251 millis, based on 3.849/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:42/21 3.597 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 3.601 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 251 millis, based on 3.853/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:42/21 3.601 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.603 Starting downloading https://server4:443/zkiuwmiwvm at 38:34.906 on ClientConnection[d153d17bdc726fb2/a8eca4a203bfb312(V1) with server4/193.167.100.100:443] 3.603 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 3.603 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 125 millis, based on 3.729/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:42/21 3.603 Discarding pn space Initial because first Handshake message is being sent 3.603 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 125 millis, based on 3.729/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:42/21 3.603 -> Packet A|0|S0|680b6923ef8bc5be|47|1 StreamFrame[0(CIB),0,17,fin] 3.634 <- (2) Packet A|0|S0|a8eca4a203bfb312|29|2 HandshakeDoneFrame[] Padding(2) 3.635 State is set to Confirmed reschedule loss detection timer for PTO over 91 millis, based on 3.727/Handshake, because ackElicitingInFlight | RTT:42/21 reschedule loss detection timer for PTO over 118 millis, based on 3.754/App, because ackElicitingInFlight | RTT:42/21 3.636 Discarding pn space Handshake because HandshakeDone is received 3.655 -> Packet A|1|S0|680b6923ef8bc5be|32|1 AckFrame[0|Δ19] 3.754 loss detection timeout handler running Sending probe 0, because no ack since 3.603. Current RTT: 42/21. 3.754 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 301 millis, based on 4.057/App, because ackElicitingInFlight | RTT:42/21 3.755 -> Packet PA|2|S0|680b6923ef8bc5be|47|1 StreamFrame[0(CIB),0,17,fin] 3.775 <- (3) Packet A|2|S0|a8eca4a203bfb312|99|2 NewConnectionIdFrame[1,<0|e253cd2c14c8dff9|0eb1f873f85dc963eaf4e127c025b183] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 3.788 <- (4) Packet A|3|S0|a8eca4a203bfb312|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 3.789 Finished downloading https://server4:443/zkiuwmiwvm at 38:35.092 on ClientConnection[d153d17bdc726fb2/a8eca4a203bfb312(V1) with server4/193.167.100.100:443] 3.790 Closing ClientConnection[d153d17bdc726fb2/a8eca4a203bfb312(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.790 -> Packet A|3|S0|680b6923ef8bc5be|36|2 AckFrame[3-2|Δ13] ConnectionCloseFrame[0|0|] 3.791 Creating connection with server4:443 with v1 3.791 Setting up connection for downloading https://server4:443/ejljrqaeaj at 38:35.095 on ClientConnection[edea592187bc5557/c9688cf1d243f779(V1) with server4/193.167.100.100:443] 3.792 Original destination connection id: edea592187bc5557 (scid: c9688cf1d243f779) >- CryptoStream[I|ClientHello] 3.794 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.994/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.794 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.823 <- (5) Packet A|4|S0|a8eca4a203bfb312|99|2 NewConnectionIdFrame[1,<0|e253cd2c14c8dff9|0eb1f873f85dc963eaf4e127c025b183] CryptoFrame[0,42] 3.824 <- (6) Packet A|5|S0|a8eca4a203bfb312|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 3.825 -> Packet A|4|S0|680b6923ef8bc5be|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 3.993 loss detection timeout handler running Sending probe 0, because no ack since 3.794. Current RTT: 100/25. 3.994 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.994 (Probe is an initial retransmit) 3.995 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.395/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.994 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.394 loss detection timeout handler running Sending probe 1, because no ack since 3.994. Current RTT: 100/25. 4.394 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.395 (Probe is an initial retransmit) 4.395 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.195/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.395 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.396 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.196/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.396 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.437 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] Padding(280) 4.438 probe count not reset on ack because handshake not yet confirmed 4.438 Retransmitting CryptoFrame[0,257] on level Initial 4.438 Cwnd(-): 6000; inflight: 1200 4.438 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.238/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.439 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 483 millis, based on 4.923/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 4.438 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 4.437 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 4.443 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 483 millis, based on 4.927/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 4.442 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 4.446 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 483 millis, based on 4.930/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 4.445 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.446 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 4.567/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 4.447 Discarding pn space Initial because first Handshake message is being sent 4.447 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.447 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 4.447 Starting downloading https://server4:443/ejljrqaeaj at 38:35.751 on ClientConnection[edea592187bc5557/c9688cf1d243f779(V1) with server4/193.167.100.100:443] 4.448 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 4.569/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 4.448 -> Packet A|0|S0|0a2e2abe7fe66530|47|1 StreamFrame[0(CIB),0,17,fin] 4.481 <- (3) Packet A|2|S0|c9688cf1d243f779|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 4.483 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.483 Finished downloading https://server4:443/ejljrqaeaj at 38:35.786 on ClientConnection[edea592187bc5557/c9688cf1d243f779(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 120 millis, based on 4.604/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 4.483 Closing ClientConnection[edea592187bc5557/c9688cf1d243f779(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.484 Creating connection with server4:443 with v1 4.484 -> Packet A|1|S0|0a2e2abe7fe66530|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 4.485 Setting up connection for downloading https://server4:443/nwgsroymxt at 38:35.788 on ClientConnection[4befa6124814cbbd/13ca3d8c17e90b5a(V1) with server4/193.167.100.100:443] 4.485 Original destination connection id: 4befa6124814cbbd (scid: 13ca3d8c17e90b5a) >- CryptoStream[I|ClientHello] 4.486 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.687/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.486 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.528 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 4.529 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.729/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.528 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 4.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 4.654/Handshake, because peerAwaitingAddressValidation | RTT:41/20 4.533 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 4.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 4.658/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 4.537 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.538 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 4.659/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 4.538 Discarding pn space Initial because first Handshake message is being sent 4.538 Starting downloading https://server4:443/nwgsroymxt at 38:35.841 on ClientConnection[4befa6124814cbbd/13ca3d8c17e90b5a(V1) with server4/193.167.100.100:443] 4.538 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 4.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 4.660/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 4.539 -> Packet A|0|S0|f68ce3b486956255|47|1 StreamFrame[0(CIB),0,17,fin] 4.569 <- (2) Packet A|0|S0|13ca3d8c17e90b5a|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b2ead2a80864dd8e|ea11b27946368bb1b711059831bf0e8a] CryptoFrame[0,42] 4.570 State is set to Confirmed reschedule loss detection timer for PTO over 87 millis, based on 4.658/Handshake, because ackElicitingInFlight | RTT:41/20 reschedule loss detection timer for PTO over 114 millis, based on 4.685/App, because ackElicitingInFlight | RTT:41/20 4.570 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 4.590 -> Packet A|1|S0|f68ce3b486956255|32|1 AckFrame[0|Δ19] 4.684 loss detection timeout handler running Sending probe 0, because no ack since 4.539. Current RTT: 41/20. 4.685 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 291 millis, based on 4.977/App, because ackElicitingInFlight | RTT:41/20 4.685 -> Packet PA|2|S0|f68ce3b486956255|47|1 StreamFrame[0(CIB),0,17,fin] 4.736 <- (3) Packet A|3|S0|13ca3d8c17e90b5a|32|1 AckFrame[2-0|Δ19] 4.737 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.986 <- (4) Packet A|5|S0|13ca3d8c17e90b5a|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 4.987 Finished downloading https://server4:443/nwgsroymxt at 38:36.290 on ClientConnection[4befa6124814cbbd/13ca3d8c17e90b5a(V1) with server4/193.167.100.100:443] 4.987 Closing ClientConnection[4befa6124814cbbd/13ca3d8c17e90b5a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.987 -> Packet A|3|S0|f68ce3b486956255|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3|Δ0] 4.988 Creating connection with server4:443 with v1 4.988 Setting up connection for downloading https://server4:443/uamcmbezno at 38:36.291 on ClientConnection[7a55181f25ef661f/1250343e57978015(V1) with server4/193.167.100.100:443] 4.988 Original destination connection id: 7a55181f25ef661f (scid: 1250343e57978015) >- CryptoStream[I|ClientHello] 4.990 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.190/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.990 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.020 <- (5) Packet A|6|S0|13ca3d8c17e90b5a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 5.190 loss detection timeout handler running Sending probe 0, because no ack since 4.990. Current RTT: 100/25. 5.190 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.190 (Probe is an initial retransmit) 5.191 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.591/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.190 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.590 loss detection timeout handler running Sending probe 1, because no ack since 5.190. Current RTT: 100/25. 5.590 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.590 (Probe is an initial retransmit) 5.591 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.391/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.591 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.592 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.392/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.592 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.633 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] Padding(280) 5.634 probe count not reset on ack because handshake not yet confirmed 5.635 Retransmitting CryptoFrame[0,257] on level Initial 5.635 Cwnd(-): 6000; inflight: 1200 5.635 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.435/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.635 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 503 millis, based on 6.139/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:42/21 5.635 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 5.633 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 5.638 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 503 millis, based on 6.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:42/21 5.638 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 5.641 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 503 millis, based on 6.145/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:42/21 5.641 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.642 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 125 millis, based on 5.768/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:42/21 5.642 Discarding pn space Initial because first Handshake message is being sent 5.642 Starting downloading https://server4:443/uamcmbezno at 38:36.945 on ClientConnection[7a55181f25ef661f/1250343e57978015(V1) with server4/193.167.100.100:443] 5.642 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.642 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 5.643 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 125 millis, based on 5.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:42/21 5.643 -> Packet A|0|S0|dd598fa0624e0d5a|47|1 StreamFrame[0(CIB),0,17,fin] 5.768 loss detection timeout handler running Sending probe 0, because no ack since 5.641. Current RTT: 42/21. 5.768 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.769 (Probe is a handshake retransmit) 5.769 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 251 millis, based on 6.021/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:42/21 5.769 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 5.809 <- (3) Packet A|2|S0|1250343e57978015|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|469e1ad3dc9d0d7d|ebb3fc35fd1c7c4ecd84d1d0af9fe54f] CryptoFrame[0,42] 5.810 State is set to Confirmed reschedule loss detection timer for PTO over 135 millis, based on 5.945/App, because ackElicitingInFlight | RTT:42/21 reschedule loss detection timer for PTO over -16 millis, based on 5.794/App, because ackElicitingInFlight | RTT:42/21 5.810 loss detection timeout handler running 5.810 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 5.643. Current RTT: 42/21. 5.810 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 301 millis, based on 6.113/App, because ackElicitingInFlight | RTT:42/21 5.811 -> Packet PA|1|S0|dd598fa0624e0d5a|47|1 StreamFrame[0(CIB),0,17,fin] 5.830 -> Packet A|2|S0|dd598fa0624e0d5a|32|1 AckFrame[2|Δ19] 5.868 <- (4) Packet A|3|S0|1250343e57978015|1137|6 HandshakeDoneFrame[] AckFrame[0|Δ0] NewConnectionIdFrame[1,<0|469e1ad3dc9d0d7d|ebb3fc35fd1c7c4ecd84d1d0af9fe54f] CryptoFrame[0,42] StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] reschedule loss detection timer for PTO over 92 millis, based on 5.962/App, because ackElicitingInFlight | RTT:42/21 -< CryptoStream[A|NewSessionTicket] 5.869 Finished downloading https://server4:443/uamcmbezno at 38:37.173 on ClientConnection[7a55181f25ef661f/1250343e57978015(V1) with server4/193.167.100.100:443] 5.869 Closing ClientConnection[7a55181f25ef661f/1250343e57978015(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.870 Creating connection with server4:443 with v1 5.870 -> Packet A|3|S0|dd598fa0624e0d5a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 5.871 Setting up connection for downloading https://server4:443/yqqufztlma at 38:37.174 on ClientConnection[d33f32da2d89931f/9873065cd7c94947(V1) with server4/193.167.100.100:443] 5.871 Original destination connection id: d33f32da2d89931f (scid: 9873065cd7c94947) >- CryptoStream[I|ClientHello] 5.873 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.073/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.873 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.913 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 5.914 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.114/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.913 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 5.918 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 6.038/Handshake, because peerAwaitingAddressValidation | RTT:40/20 5.918 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 5.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 6.042/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 5.922 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.923 Starting downloading https://server4:443/yqqufztlma at 38:37.226 on ClientConnection[d33f32da2d89931f/9873065cd7c94947(V1) with server4/193.167.100.100:443] 5.923 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 5.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 6.044/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 5.924 Discarding pn space Initial because first Handshake message is being sent 5.924 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 6.044/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 5.924 -> Packet A|0|S0|43f37035a3a81107|47|1 StreamFrame[0(CIB),0,17,fin] 5.954 <- (2) Packet A|0|S0|9873065cd7c94947|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2e896bdf983642dd|f72cd24a2e09b80b97e6d7f34109bbf3] CryptoFrame[0,42] 5.955 State is set to Confirmed reschedule loss detection timer for PTO over 86 millis, based on 6.042/Handshake, because ackElicitingInFlight | RTT:40/20 reschedule loss detection timer for PTO over 113 millis, based on 6.069/App, because ackElicitingInFlight | RTT:40/20 5.955 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 5.957 <- (3) Packet A|1|S0|9873065cd7c94947|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 5.957 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.958 Finished downloading https://server4:443/yqqufztlma at 38:37.261 on ClientConnection[d33f32da2d89931f/9873065cd7c94947(V1) with server4/193.167.100.100:443] 5.961 Closing ClientConnection[d33f32da2d89931f/9873065cd7c94947(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.958 -> Packet A|1|S0|43f37035a3a81107|32|1 AckFrame[1-0|Δ1] 5.962 Creating connection with server4:443 with v1 5.962 -> Packet A|2|S0|43f37035a3a81107|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 5.962 Setting up connection for downloading https://server4:443/iizmxulncs at 38:37.265 on ClientConnection[1ec169fac5a551ba/32a9a841189ed9f0(V1) with server4/193.167.100.100:443] 5.962 Original destination connection id: 1ec169fac5a551ba (scid: 32a9a841189ed9f0) >- CryptoStream[I|ClientHello] 5.964 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.164/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.964 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.994 <- (4) Packet A|2|S0|9873065cd7c94947|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 6.164 loss detection timeout handler running Sending probe 0, because no ack since 5.964. Current RTT: 100/25. 6.164 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.164 (Probe is an initial retransmit) 6.165 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.565/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.164 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.204 <- (1) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 6.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.408/Handshake, because peerAwaitingAddressValidation | RTT:100/25 6.208 Discarding pn space Initial because first Handshake message is being sent 6.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.408/Handshake, because peerAwaitingAddressValidation | RTT:100/25 6.208 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 6.242 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.263 <- (5) Packet A|5|S0|1250343e57978015|1132|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|469e1ad3dc9d0d7d|ebb3fc35fd1c7c4ecd84d1d0af9fe54f] CryptoFrame[0,42] StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 6.264 -> Packet A|4|S0|dd598fa0624e0d5a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 6.310 <- (3) Packet H|1|L|745|1 CryptoFrame[0,699] >- CryptoStream[H|Finished] 6.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.514/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.314 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.315 Starting downloading https://server4:443/iizmxulncs at 38:37.618 on ClientConnection[1ec169fac5a551ba/32a9a841189ed9f0(V1) with server4/193.167.100.100:443] 6.315 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 6.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.516/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.315 -> Packet A|0|S0|cade64af2bb46676|47|1 StreamFrame[0(CIB),0,17,fin] 6.459 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.460 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.515 loss detection timeout handler running Sending probe 0, because no ack since 6.314. Current RTT: 100/25. 6.515 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.515 (Probe is a handshake retransmit) 6.516 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.515 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 6.548 <- (6) Packet A|0|S0|32a9a841189ed9f0|29|2 HandshakeDoneFrame[] Padding(2) 6.549 State is set to Confirmed reschedule loss detection timer for PTO over 216 millis, based on 6.765/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -8 millis, based on 6.540/App, because ackElicitingInFlight | RTT:100/25 6.549 Discarding pn space Handshake because HandshakeDone is received 6.549 loss detection timeout handler running Sending probe 0, because no ack since 6.315. Current RTT: 100/25. 6.550 (Probe is retransmit on level App) 6.548 <- (7) Packet A|1|S0|32a9a841189ed9f0|99|2 NewConnectionIdFrame[1,<0|eae7d81f4144a12e|0eb39aeab02f687af6e8af4d46723536] CryptoFrame[0,42] reschedule loss detection timer for PTO over 449 millis, based on 7.000/App, because ackElicitingInFlight | RTT:100/25 -< CryptoStream[A|NewSessionTicket] 6.550 -> Packet PA|1|S0|cade64af2bb46676|47|1 StreamFrame[0(CIB),0,17,fin] 6.550 -> Packet A|2|S0|cade64af2bb46676|31|1 AckFrame[1-0|Δ0] 6.681 <- (8) Packet A|2|S0|32a9a841189ed9f0|29|2 HandshakeDoneFrame[] Padding(2) 6.701 -> Packet A|3|S0|cade64af2bb46676|32|1 AckFrame[2-0|Δ19] 6.999 loss detection timeout handler running Sending probe 1, because no ack since 6.550. Current RTT: 100/25. 6.999 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 7.900/App, because ackElicitingInFlight | RTT:100/25 7.000 -> Packet PA|4|S0|cade64af2bb46676|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 7.901/App, because ackElicitingInFlight | RTT:100/25 7.001 -> Packet PA|5|S0|cade64af2bb46676|47|1 StreamFrame[0(CIB),0,17,fin] 7.032 <- (9) Packet A|3|S0|32a9a841189ed9f0|31|1 AckFrame[5-3|Δ0] 7.033 Cwnd(-): 6000; inflight: 0 7.034 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.034 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 115 millis, based on 7.150/App, because ackElicitingInFlight | RTT:31/15 7.034 -> Packet A|6|S0|cade64af2bb46676|47|1 StreamFrame[0(CIB),0,17,fin] 7.149 loss detection timeout handler running Sending probe 0, because no ack since 7.034. Current RTT: 31/15. 7.149 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 7.382/App, because ackElicitingInFlight | RTT:31/15 7.150 -> Packet PA|7|S0|cade64af2bb46676|47|1 StreamFrame[0(CIB),0,17,fin] 7.164 <- (10) Packet A|6|S0|32a9a841189ed9f0|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 7.165 Finished downloading https://server4:443/iizmxulncs at 38:38.468 on ClientConnection[1ec169fac5a551ba/32a9a841189ed9f0(V1) with server4/193.167.100.100:443] 7.165 Closing ClientConnection[1ec169fac5a551ba/32a9a841189ed9f0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.166 -> Packet A|8|S0|cade64af2bb46676|38|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ1] 7.166 Creating connection with server4:443 with v1 7.167 Setting up connection for downloading https://server4:443/uggksjsvff at 38:38.470 on ClientConnection[e6cf28c718baae7c/25051d15608a0101(V1) with server4/193.167.100.100:443] 7.167 Original destination connection id: e6cf28c718baae7c (scid: 25051d15608a0101) >- CryptoStream[I|ClientHello] 7.168 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.369/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.168 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.198 <- (11) Packet A|7|S0|32a9a841189ed9f0|36|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ16] 7.368 loss detection timeout handler running Sending probe 0, because no ack since 7.168. Current RTT: 100/25. 7.368 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.368 (Probe is an initial retransmit) 7.369 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.769/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.368 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.407 <- (1) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 7.410 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.610/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.411 Discarding pn space Initial because first Handshake message is being sent 7.411 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.611/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.411 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 7.607 <- (2) Packet H|1|L|744|1 CryptoFrame[0,698] 7.610 loss detection timeout handler running 7.610 Sending probe 0. Current RTT: 100/25. 7.610 Sending probe because peer awaiting address validation 7.610 (Probe is a handshake ping) >- CryptoStream[H|Finished] 7.611 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.011/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.611 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.612 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.012/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.608 <- (3) Packet H|2|L|744|1 CryptoFrame[0,698] 7.612 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.612 -> Packet H|2|L|46|1 AckFrame[1|Δ0] 7.612 Starting downloading https://server4:443/uggksjsvff at 38:38.916 on ClientConnection[e6cf28c718baae7c/25051d15608a0101(V1) with server4/193.167.100.100:443] 7.612 -> Packet H|3|L|46|1 AckFrame[2-1|Δ0] 7.613 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.013/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.613 -> Packet A|0|S0|63ff65060f1e5484|47|1 StreamFrame[0(CIB),0,17,fin] 7.645 <- (4) Packet A|0|S0|25051d15608a0101|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|88d8945c19f26ff5|a0783af6c74d6e6c811500c20fb47764] CryptoFrame[0,42] 7.646 State is set to Confirmed reschedule loss detection timer for PTO over 366 millis, based on 8.012/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 192 millis, based on 7.838/App, because ackElicitingInFlight | RTT:100/25 7.646 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 7.665 -> Packet A|1|S0|63ff65060f1e5484|32|1 AckFrame[0|Δ19] 7.838 loss detection timeout handler running Sending probe 0, because no ack since 7.613. Current RTT: 100/25. 7.838 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 8.289/App, because ackElicitingInFlight | RTT:100/25 7.839 -> Packet PA|2|S0|63ff65060f1e5484|47|1 StreamFrame[0(CIB),0,17,fin] 7.870 <- (5) Packet A|1|S0|25051d15608a0101|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|88d8945c19f26ff5|a0783af6c74d6e6c811500c20fb47764] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 7.890 -> Packet A|3|S0|63ff65060f1e5484|32|1 AckFrame[1-0|Δ19] 8.288 loss detection timeout handler running Sending probe 1, because no ack since 7.839. Current RTT: 100/25. 8.288 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 9.189/App, because ackElicitingInFlight | RTT:100/25 8.289 -> Packet PA|4|S0|63ff65060f1e5484|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 9.190/App, because ackElicitingInFlight | RTT:100/25 8.290 -> Packet PA|5|S0|63ff65060f1e5484|47|1 StreamFrame[0(CIB),0,17,fin] 8.321 <- (6) Packet A|2|S0|25051d15608a0101|31|1 AckFrame[5-3|Δ0] 8.322 Cwnd(-): 6000; inflight: 0 8.322 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 8.322 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 8.438/App, because ackElicitingInFlight | RTT:31/15 8.322 -> Packet A|6|S0|63ff65060f1e5484|47|1 StreamFrame[0(CIB),0,17,fin] 8.322 <- (7) Packet A|3|S0|25051d15608a0101|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[5-3|Δ0] MaxStreamsFrame[B,101] reschedule loss detection timer for PTO over 115 millis, based on 8.438/App, because ackElicitingInFlight | RTT:31/15 8.323 Finished downloading https://server4:443/uggksjsvff at 38:39.626 on ClientConnection[e6cf28c718baae7c/25051d15608a0101(V1) with server4/193.167.100.100:443] 8.323 Closing ClientConnection[e6cf28c718baae7c/25051d15608a0101(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.324 Creating connection with server4:443 with v1 8.324 -> Packet A|7|S0|63ff65060f1e5484|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 8.324 Setting up connection for downloading https://server4:443/ezinvejcqn at 38:39.627 on ClientConnection[106a465d82fb6df5/06225ef704629504(V1) with server4/193.167.100.100:443] 8.324 Original destination connection id: 106a465d82fb6df5 (scid: 06225ef704629504) >- CryptoStream[I|ClientHello] 8.326 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.526/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.326 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.365 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 8.366 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.566/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.365 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 8.369 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 8.484/Handshake, because peerAwaitingAddressValidation | RTT:39/19 8.368 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 8.371 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 8.486/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 8.371 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.372 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.372 Starting downloading https://server4:443/ezinvejcqn at 38:39.675 on ClientConnection[106a465d82fb6df5/06225ef704629504(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 114 millis, based on 8.487/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 8.372 Discarding pn space Initial because first Handshake message is being sent 8.372 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 8.373 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 8.488/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 8.372 -> Packet A|0|S0|77df7ec20e00f902|47|1 StreamFrame[0(CIB),0,17,fin] 8.487 loss detection timeout handler running Sending probe 0, because no ack since 8.371. Current RTT: 39/19. 8.487 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.487 (Probe is a handshake retransmit) 8.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 229 millis, based on 8.718/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 8.487 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 8.660 <- (2) Packet A|1|S0|06225ef704629504|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|37dd78405ee18b3e|2d5d314afd36c652cca8e337d57e2e1d] CryptoFrame[0,42] 8.660 State is set to Confirmed 8.661 loss detection timeout handler running reschedule loss detection timer for PTO over -8 millis, based on 8.652/App, because ackElicitingInFlight | RTT:39/19 Sending probe 1, because no ack since 8.372. Current RTT: 39/19. 8.661 (Probe is retransmit on level App) reschedule loss detection timer for PTO over -148 millis, based on 8.512/App, because ackElicitingInFlight | RTT:39/19 8.661 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 139 millis, based on 8.801/App, because ackElicitingInFlight | RTT:39/19 8.661 -> Packet PA|1|S0|77df7ec20e00f902|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 139 millis, based on 8.802/App, because ackElicitingInFlight | RTT:39/19 8.662 -> Packet PA|2|S0|77df7ec20e00f902|47|1 StreamFrame[0(CIB),0,17,fin] 8.681 -> Packet A|3|S0|77df7ec20e00f902|32|1 AckFrame[1|Δ19] 8.712 <- (3) Packet A|3|S0|06225ef704629504|105|4 HandshakeDoneFrame[] AckFrame[2-1|Δ0] NewConnectionIdFrame[1,<0|37dd78405ee18b3e|2d5d314afd36c652cca8e337d57e2e1d] CryptoFrame[0,42] 8.713 Cwnd(-): 6000; inflight: 0 8.713 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 8.713 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 132 millis, based on 8.846/App, because ackElicitingInFlight | RTT:40/17 8.713 -> Packet A|4|S0|77df7ec20e00f902|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 8.733 -> Packet A|5|S0|77df7ec20e00f902|34|1 AckFrame[3,1|Δ19] 8.846 loss detection timeout handler running Sending probe 0, because no ack since 8.713. Current RTT: 40/17. 8.846 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 265 millis, based on 9.112/App, because ackElicitingInFlight | RTT:40/17 8.846 -> Packet PA|6|S0|77df7ec20e00f902|47|1 StreamFrame[0(CIB),0,17,fin] 9.112 loss detection timeout handler running Sending probe 1, because no ack since 8.846. Current RTT: 40/17. 9.112 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 531 millis, based on 9.644/App, because ackElicitingInFlight | RTT:40/17 9.112 -> Packet PA|7|S0|77df7ec20e00f902|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 531 millis, based on 9.645/App, because ackElicitingInFlight | RTT:40/17 9.113 -> Packet PA|8|S0|77df7ec20e00f902|47|1 StreamFrame[0(CIB),0,17,fin] 9.146 <- (4) Packet A|6|S0|06225ef704629504|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 9.147 Finished downloading https://server4:443/ezinvejcqn at 38:40.450 on ClientConnection[106a465d82fb6df5/06225ef704629504(V1) with server4/193.167.100.100:443] 9.147 Closing ClientConnection[106a465d82fb6df5/06225ef704629504(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.147 <- (5) Packet A|7|S0|06225ef704629504|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 9.148 Creating connection with server4:443 with v1 9.148 -> Packet A|9|S0|77df7ec20e00f902|43|3 ConnectionCloseFrame[0|0|] AckFrame[6,3,1|Δ0] ConnectionCloseFrame[0|0|] 9.148 Setting up connection for downloading https://server4:443/rxjxxaxtkr at 38:40.451 on ClientConnection[bb8b01fd4c57d17a/c01e57156a474a46(V1) with server4/193.167.100.100:443] 9.148 Original destination connection id: bb8b01fd4c57d17a (scid: c01e57156a474a46) >- CryptoStream[I|ClientHello] 9.150 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.350/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.150 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.164 <- (6) Packet A|8|S0|06225ef704629504|36|1 AckFrame[7,5,3|Δ19] 9.164 -> Packet A|10|S0|77df7ec20e00f902|39|2 ConnectionCloseFrame[0|0|] AckFrame[6,3,1|Δ0] 9.179 <- (7) Packet A|9|S0|06225ef704629504|39|2 ConnectionCloseFrame[0|0|] AckFrame[7,5,3|Δ0] 9.350 loss detection timeout handler running Sending probe 0, because no ack since 9.150. Current RTT: 100/25. 9.350 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.350 (Probe is an initial retransmit) 9.350 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.751/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.350 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.390 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(281) 9.390 probe count not reset on ack because handshake not yet confirmed 9.391 Retransmitting CryptoFrame[0,257] on level Initial 9.391 Cwnd(-): 6000; inflight: 0 9.391 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.791/Initial, because peerAwaitingAddressValidation | RTT:100/25 9.391 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 229 millis, based on 9.621/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 9.391 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 9.390 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 9.394 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 229 millis, based on 9.624/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 9.394 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 9.398 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.398 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 9.513/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 9.398 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 229 millis, based on 9.628/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 9.398 Starting downloading https://server4:443/rxjxxaxtkr at 38:40.701 on ClientConnection[bb8b01fd4c57d17a/c01e57156a474a46(V1) with server4/193.167.100.100:443] 9.397 -> Packet H|0|L|80|1 CryptoFrame[0,36] 9.398 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 9.399 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 9.514/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 9.399 -> Packet A|0|S0|77fcddac9890bfa4|47|1 StreamFrame[0(CIB),0,17,fin] 9.433 <- (2) Packet A|2|S0|c01e57156a474a46|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 9.434 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 9.549/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 9.434 Finished downloading https://server4:443/rxjxxaxtkr at 38:40.737 on ClientConnection[bb8b01fd4c57d17a/c01e57156a474a46(V1) with server4/193.167.100.100:443] 9.434 Closing ClientConnection[bb8b01fd4c57d17a/c01e57156a474a46(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.434 -> Packet A|1|S0|77fcddac9890bfa4|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 9.435 Creating connection with server4:443 with v1 9.435 Setting up connection for downloading https://server4:443/oolzboxdrm at 38:40.738 on ClientConnection[002709643254d4c2/96b9290df86121d2(V1) with server4/193.167.100.100:443] 9.435 Original destination connection id: 002709643254d4c2 (scid: 96b9290df86121d2) >- CryptoStream[I|ClientHello] 9.437 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.637/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.437 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.466 <- (3) Packet A|3|S0|c01e57156a474a46|35|2 ConnectionCloseFrame[0|0|] AckFrame[0|Δ0] 9.477 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 9.478 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.678/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.477 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 9.481 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 9.596/Handshake, because peerAwaitingAddressValidation | RTT:39/19 9.481 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 9.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 9.599/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 9.484 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.485 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 9.600/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 9.485 Discarding pn space Initial because first Handshake message is being sent 9.485 Starting downloading https://server4:443/oolzboxdrm at 38:40.788 on ClientConnection[002709643254d4c2/96b9290df86121d2(V1) with server4/193.167.100.100:443] 9.485 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 9.486 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 9.601/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 9.485 -> Packet A|0|S0|25d5cb278cfc87b4|47|1 StreamFrame[0(CIB),0,17,fin] 9.600 loss detection timeout handler running Sending probe 0, because no ack since 9.484. Current RTT: 39/19. 9.600 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.600 (Probe is a handshake retransmit) 9.601 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 229 millis, based on 9.831/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 9.600 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 9.633 <- (2) Packet H|1|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.633 <- (3) Packet A|1|S0|96b9290df86121d2|99|2 NewConnectionIdFrame[1,<0|f301b65a7c2f16fd|37f6e38b0990e7bf3bee56753a5daf75] CryptoFrame[0,42] 9.634 -> Packet H|3|L|46|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 9.653 -> Packet A|1|S0|25d5cb278cfc87b4|32|1 AckFrame[1|Δ19] 9.685 <- (4) Packet A|2|S0|96b9290df86121d2|29|2 HandshakeDoneFrame[] Padding(2) 9.685 State is set to Confirmed reschedule loss detection timer for PTO over 80 millis, based on 9.765/App, because ackElicitingInFlight | RTT:39/19 reschedule loss detection timer for PTO over -60 millis, based on 9.625/App, because ackElicitingInFlight | RTT:39/19 9.686 Discarding pn space Handshake because HandshakeDone is received 9.686 loss detection timeout handler running Sending probe 0, because no ack since 9.485. Current RTT: 39/19. 9.686 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 279 millis, based on 9.966/App, because ackElicitingInFlight | RTT:39/19 9.686 -> Packet PA|2|S0|25d5cb278cfc87b4|47|1 StreamFrame[0(CIB),0,17,fin] 9.705 -> Packet A|3|S0|25d5cb278cfc87b4|32|1 AckFrame[2-1|Δ19] 9.817 <- (5) Packet A|3|S0|96b9290df86121d2|29|2 HandshakeDoneFrame[] Padding(2) 9.837 -> Packet A|4|S0|25d5cb278cfc87b4|32|1 AckFrame[3-1|Δ19] 9.965 loss detection timeout handler running Sending probe 1, because no ack since 9.686. Current RTT: 39/19. 9.965 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 559 millis, based on 10.526/App, because ackElicitingInFlight | RTT:39/19 9.966 -> Packet PA|5|S0|25d5cb278cfc87b4|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 559 millis, based on 10.527/App, because ackElicitingInFlight | RTT:39/19 9.967 -> Packet PA|6|S0|25d5cb278cfc87b4|47|1 StreamFrame[0(CIB),0,17,fin] 9.998 <- (6) Packet A|4|S0|96b9290df86121d2|33|1 AckFrame[6-5,1|Δ0] 9.999 Cwnd(-): 6000; inflight: 0 9.999 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.999 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 9.999 <- (7) Packet A|5|S0|96b9290df86121d2|1065|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[6-5,1|Δ0] MaxStreamsFrame[B,101] reschedule loss detection timer for PTO over 126 millis, based on 10.126/App, because ackElicitingInFlight | RTT:38/16 9.999 -> Packet A|7|S0|25d5cb278cfc87b4|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-2|Δ0] reschedule loss detection timer for PTO over 126 millis, based on 10.126/App, because ackElicitingInFlight | RTT:38/16 10.000 Finished downloading https://server4:443/oolzboxdrm at 38:41.303 on ClientConnection[002709643254d4c2/96b9290df86121d2(V1) with server4/193.167.100.100:443] 10.000 Closing ClientConnection[002709643254d4c2/96b9290df86121d2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.000 -> Packet A|8|S0|25d5cb278cfc87b4|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 10.001 Creating connection with server4:443 with v1 10.001 Setting up connection for downloading https://server4:443/otwidrmpmg at 38:41.304 on ClientConnection[0c86c380d0d21196/0a185b2dc4bff2ab(V1) with server4/193.167.100.100:443] 10.001 Original destination connection id: 0c86c380d0d21196 (scid: 0a185b2dc4bff2ab) >- CryptoStream[I|ClientHello] 10.003 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.203/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.003 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.032 <- (8) Packet A|6|S0|96b9290df86121d2|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,1|Δ0] 10.042 <- (1) Packet I|0|L|454|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(279) 10.043 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.243/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.042 <- (1) Packet H|0|L|746|1 CryptoFrame[0,700] 10.045 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 10.160/Handshake, because peerAwaitingAddressValidation | RTT:39/19 10.045 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 10.048 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 10.163/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 10.048 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.048 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 10.163/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 10.048 Discarding pn space Initial because first Handshake message is being sent 10.049 Starting downloading https://server4:443/otwidrmpmg at 38:41.352 on ClientConnection[0c86c380d0d21196/0a185b2dc4bff2ab(V1) with server4/193.167.100.100:443] 10.048 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 10.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 10.165/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 10.049 -> Packet A|0|S0|8b8eb7936db85475|47|1 StreamFrame[0(CIB),0,17,fin] 10.164 loss detection timeout handler running Sending probe 0, because no ack since 10.048. Current RTT: 39/19. 10.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.164 (Probe is a handshake retransmit) 10.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 229 millis, based on 10.394/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 10.164 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.394 loss detection timeout handler running Sending probe 1, because no ack since 10.049. Current RTT: 39/19. 10.394 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.394 (Probe is a handshake retransmit) 10.394 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 459 millis, based on 10.854/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 10.394 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 10.395 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 459 millis, based on 10.855/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 10.395 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 10.427 <- (2) Packet A|0|S0|0a185b2dc4bff2ab|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c5042f75b8a2e2a9|55b0d48e41cc19bd59497166e22c08a3] CryptoFrame[0,42] 10.428 State is set to Confirmed reschedule loss detection timer for PTO over 181 millis, based on 10.609/App, because ackElicitingInFlight | RTT:39/19 reschedule loss detection timer for PTO over -238 millis, based on 10.189/App, because ackElicitingInFlight | RTT:39/19 10.428 Discarding pn space Handshake because HandshakeDone is received 10.428 loss detection timeout handler running Sending probe 0, because no ack since 10.049. Current RTT: 39/19. 10.428 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 279 millis, based on 10.708/App, because ackElicitingInFlight | RTT:39/19 10.428 -> Packet PA|1|S0|8b8eb7936db85475|47|1 StreamFrame[0(CIB),0,17,fin] 10.448 -> Packet A|2|S0|8b8eb7936db85475|32|1 AckFrame[0|Δ19] 10.461 <- (3) Packet A|1|S0|0a185b2dc4bff2ab|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 10.462 Cwnd(-): 6000; inflight: 0 10.462 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 10.462 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.462 Finished downloading https://server4:443/otwidrmpmg at 38:41.765 on ClientConnection[0c86c380d0d21196/0a185b2dc4bff2ab(V1) with server4/193.167.100.100:443] 10.462 Closing ClientConnection[0c86c380d0d21196/0a185b2dc4bff2ab(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.462 -> Packet A|3|S0|8b8eb7936db85475|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 10.463 -> Packet A|4|S0|8b8eb7936db85475|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 10.463 Creating connection with server4:443 with v1 10.464 Setting up connection for downloading https://server4:443/qmjqxsmady at 38:41.767 on ClientConnection[e28cce1719722167/f5bfbbe93c2ae2ae(V1) with server4/193.167.100.100:443] 10.464 Original destination connection id: e28cce1719722167 (scid: f5bfbbe93c2ae2ae) >- CryptoStream[I|ClientHello] 10.465 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.666/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.465 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.579 <- (4) Packet A|2|S0|0a185b2dc4bff2ab|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 10.579 -> Packet A|5|S0|8b8eb7936db85475|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 10.612 <- (5) Packet A|3|S0|0a185b2dc4bff2ab|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 10.665 loss detection timeout handler running Sending probe 0, because no ack since 10.465. Current RTT: 100/25. 10.665 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.665 (Probe is an initial retransmit) 10.666 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.066/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.665 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.699 <- (1) Packet I|1|L|1201|2 Token=[] AckFrame[1-0|Δ0] Padding(1153) 10.700 probe count not reset on ack because handshake not yet confirmed 10.700 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.101/Initial, because peerAwaitingAddressValidation | RTT:100/25 11.100 loss detection timeout handler running Sending probe 1, because no ack since 10.665. Current RTT: 33/16. 11.100 Sending probe because peer awaiting address validation 11.100 (Probe is Initial ping, because there is no Initial data to retransmit) 11.101 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 11.489/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.101 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 11.488 loss detection timeout handler running Sending probe 2, because no ack since 11.101. Current RTT: 33/16. 11.488 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.488 (Probe is Initial ping, because there is no Initial data to retransmit) 11.489 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 12.265/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.489 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 11.490 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 12.266/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.490 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 11.505 <- (2) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 11.509 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.606/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.509 Discarding pn space Initial because first Handshake message is being sent 11.509 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.606/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.509 -> Packet I|5|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1151) 11.523 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 11.523 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 11.543 <- (5) Packet H|3|L|745|1 CryptoFrame[0,699] >- CryptoStream[H|Finished] 11.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.643/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.546 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.547 Starting downloading https://server4:443/qmjqxsmady at 38:42.850 on ClientConnection[e28cce1719722167/f5bfbbe93c2ae2ae(V1) with server4/193.167.100.100:443] 11.547 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 11.547 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.644/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.547 -> Packet A|0|S0|8b1ea0625c591094|47|1 StreamFrame[0(CIB),0,17,fin] 11.579 <- (6) Packet A|0|S0|f5bfbbe93c2ae2ae|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|9e7347c3ebfc651a|bcc5b969ca7ca8d372c91d3143c8fe06] CryptoFrame[0,42] 11.579 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 11.643/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 89 millis, based on 11.669/App, because ackElicitingInFlight | RTT:33/16 11.580 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 11.599 -> Packet A|1|S0|8b1ea0625c591094|32|1 AckFrame[0|Δ19] 11.669 loss detection timeout handler running Sending probe 0, because no ack since 11.547. Current RTT: 33/16. 11.669 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 11.913/App, because ackElicitingInFlight | RTT:33/16 11.669 -> Packet PA|2|S0|8b1ea0625c591094|47|1 StreamFrame[0(CIB),0,17,fin] 11.913 loss detection timeout handler running Sending probe 1, because no ack since 11.669. Current RTT: 33/16. 11.913 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 12.401/App, because ackElicitingInFlight | RTT:33/16 11.913 -> Packet PA|3|S0|8b1ea0625c591094|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 12.402/App, because ackElicitingInFlight | RTT:33/16 11.914 -> Packet PA|4|S0|8b1ea0625c591094|47|1 StreamFrame[0(CIB),0,17,fin] 11.945 <- (7) Packet A|2|S0|f5bfbbe93c2ae2ae|31|1 AckFrame[4-3|Δ0] 11.946 Cwnd(-): 6000; inflight: 0 11.946 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 11.946 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 12.056/App, because ackElicitingInFlight | RTT:33/13 11.946 -> Packet A|5|S0|8b1ea0625c591094|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 11.947 <- (8) Packet A|3|S0|f5bfbbe93c2ae2ae|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[4-3|Δ0] MaxStreamsFrame[B,101] reschedule loss detection timer for PTO over 109 millis, based on 12.056/App, because ackElicitingInFlight | RTT:33/13 11.947 Finished downloading https://server4:443/qmjqxsmady at 38:43.251 on ClientConnection[e28cce1719722167/f5bfbbe93c2ae2ae(V1) with server4/193.167.100.100:443] 11.947 Closing ClientConnection[e28cce1719722167/f5bfbbe93c2ae2ae(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.948 Creating connection with server4:443 with v1 11.948 -> Packet A|6|S0|8b1ea0625c591094|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 11.949 Setting up connection for downloading https://server4:443/mcievvwnfa at 38:43.252 on ClientConnection[074a2f61345d3285/81a015fb2521aec5(V1) with server4/193.167.100.100:443] 11.949 Original destination connection id: 074a2f61345d3285 (scid: 81a015fb2521aec5) >- CryptoStream[I|ClientHello] 11.951 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.151/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.950 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.989 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 11.990 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.190/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.989 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 11.992 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.106/Handshake, because peerAwaitingAddressValidation | RTT:38/19 11.992 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 11.995 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.109/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 11.994 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.995 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.995 Starting downloading https://server4:443/mcievvwnfa at 38:43.298 on ClientConnection[074a2f61345d3285/81a015fb2521aec5(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 113 millis, based on 12.109/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 11.995 Discarding pn space Initial because first Handshake message is being sent 11.995 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 11.995 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.109/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 11.995 -> Packet A|0|S0|878be87fd486e8ae|47|1 StreamFrame[0(CIB),0,17,fin] 12.026 <- (2) Packet A|0|S0|81a015fb2521aec5|55|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|fe6d7fc5ec1224a9|a67769a1b3b390fbc5e76ea528c38b83] 12.027 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 12.108/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 106 millis, based on 12.134/App, because ackElicitingInFlight | RTT:38/19 12.027 Discarding pn space Handshake because HandshakeDone is received 12.027 <- (3) Packet A|1|S0|81a015fb2521aec5|71|1 CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 12.028 -> Packet A|1|S0|878be87fd486e8ae|31|1 AckFrame[1-0|Δ0] 12.134 loss detection timeout handler running Sending probe 0, because no ack since 11.995. Current RTT: 38/19. 12.134 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 12.412/App, because ackElicitingInFlight | RTT:38/19 12.134 -> Packet PA|2|S0|878be87fd486e8ae|47|1 StreamFrame[0(CIB),0,17,fin] 12.185 <- (4) Packet A|4|S0|81a015fb2521aec5|32|1 AckFrame[2-0|Δ19] 12.185 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.403 <- (5) Packet A|5|S0|81a015fb2521aec5|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 12.404 Finished downloading https://server4:443/mcievvwnfa at 38:43.707 on ClientConnection[074a2f61345d3285/81a015fb2521aec5(V1) with server4/193.167.100.100:443] 12.404 Closing ClientConnection[074a2f61345d3285/81a015fb2521aec5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.404 <- (6) Packet A|6|S0|81a015fb2521aec5|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 12.405 Receiving frame for non-existent stream 0 12.405 -> Packet A|3|S0|878be87fd486e8ae|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 12.405 Creating connection with server4:443 with v1 12.405 Setting up connection for downloading https://server4:443/lxsozbdnlj at 38:43.709 on ClientConnection[8d5e262317adde1c/c0babe775e2c6f45(V1) with server4/193.167.100.100:443] 12.405 Original destination connection id: 8d5e262317adde1c (scid: c0babe775e2c6f45) >- CryptoStream[I|ClientHello] 12.407 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.607/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.407 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.445 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 12.446 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.646/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.445 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 12.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.564/Handshake, because peerAwaitingAddressValidation | RTT:38/19 12.450 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 12.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.566/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.452 -> Packet H|0|L|80|1 CryptoFrame[0,36] 12.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.452 Starting downloading https://server4:443/lxsozbdnlj at 38:43.756 on ClientConnection[8d5e262317adde1c/c0babe775e2c6f45(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 113 millis, based on 12.566/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 12.452 Discarding pn space Initial because first Handshake message is being sent 12.452 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.453 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.567/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 12.453 -> Packet A|0|S0|798ca39522588bb8|47|1 StreamFrame[0(CIB),0,17,fin] 12.484 <- (2) Packet A|0|S0|c0babe775e2c6f45|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0208a0cd6cbd1fdc|7567157e8c6a90fd64358b0a3788c902] CryptoFrame[0,42] 12.485 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 12.566/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 106 millis, based on 12.592/App, because ackElicitingInFlight | RTT:38/19 12.485 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 12.486 <- (3) Packet A|1|S0|c0babe775e2c6f45|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 12.487 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.487 Finished downloading https://server4:443/lxsozbdnlj at 38:43.790 on ClientConnection[8d5e262317adde1c/c0babe775e2c6f45(V1) with server4/193.167.100.100:443] 12.487 Closing ClientConnection[8d5e262317adde1c/c0babe775e2c6f45(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.487 -> Packet A|1|S0|798ca39522588bb8|32|1 AckFrame[1-0|Δ1] 12.487 -> Packet A|2|S0|798ca39522588bb8|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 12.487 Creating connection with server4:443 with v1 12.488 Setting up connection for downloading https://server4:443/mnmrmqoxqq at 38:43.791 on ClientConnection[9f826451dd1a6760/5ba0db673cf949ca(V1) with server4/193.167.100.100:443] 12.488 Original destination connection id: 9f826451dd1a6760 (scid: 5ba0db673cf949ca) >- CryptoStream[I|ClientHello] 12.489 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.689/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.489 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.529 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 12.530 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.730/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.529 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 12.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 12.648/Handshake, because peerAwaitingAddressValidation | RTT:39/19 12.532 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 12.535 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 12.650/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 12.535 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.535 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 12.650/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 12.535 Discarding pn space Initial because first Handshake message is being sent 12.535 Starting downloading https://server4:443/mnmrmqoxqq at 38:43.838 on ClientConnection[9f826451dd1a6760/5ba0db673cf949ca(V1) with server4/193.167.100.100:443] 12.536 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 12.651/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 12.536 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|e1843df7dafacbdd|47|1 StreamFrame[0(CIB),0,17,fin]] 12.650 loss detection timeout handler running Sending probe 0, because no ack since 12.535. Current RTT: 39/19. 12.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.650 (Probe is a handshake retransmit) 12.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 229 millis, based on 12.881/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 12.651 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 12.699 <- (2) Packet A|1|S0|5ba0db673cf949ca|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|76ecf894142e9e95|1a47b314f37463d7379c0187ae9fedfc] CryptoFrame[0,42] 12.700 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 12.816/App, because ackElicitingInFlight | RTT:39/19 reschedule loss detection timer for PTO over -24 millis, based on 12.676/App, because ackElicitingInFlight | RTT:39/19 12.700 Discarding pn space Handshake because HandshakeDone is received 12.700 loss detection timeout handler running Sending probe 0, because no ack since 12.536. Current RTT: 39/19. 12.700 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 279 millis, based on 12.980/App, because ackElicitingInFlight | RTT:39/19 12.700 -> Packet PA|1|S0|e1843df7dafacbdd|47|1 StreamFrame[0(CIB),0,17,fin] 12.720 -> Packet A|2|S0|e1843df7dafacbdd|32|1 AckFrame[1|Δ19] 12.966 <- (3) Packet A|3|S0|5ba0db673cf949ca|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|76ecf894142e9e95|1a47b314f37463d7379c0187ae9fedfc] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 12.980 loss detection timeout handler running Sending probe 1, because no ack since 12.700. Current RTT: 39/19. 12.980 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 559 millis, based on 13.540/App, because ackElicitingInFlight | RTT:39/19 12.980 -> Packet PA|3|S0|e1843df7dafacbdd|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 559 millis, based on 13.541/App, because ackElicitingInFlight | RTT:39/19 12.981 -> Packet PA|4|S0|e1843df7dafacbdd|47|1 StreamFrame[0(CIB),0,17,fin] 12.986 -> Packet A|5|S0|e1843df7dafacbdd|34|1 AckFrame[3,1|Δ19] 13.013 <- (4) Packet A|5|S0|5ba0db673cf949ca|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[4-3|Δ0] MaxStreamsFrame[B,101] 13.014 Cwnd(-): 6000; inflight: 0 13.014 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.014 Finished downloading https://server4:443/mnmrmqoxqq at 38:44.317 on ClientConnection[9f826451dd1a6760/5ba0db673cf949ca(V1) with server4/193.167.100.100:443] 13.014 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.014 Closing ClientConnection[9f826451dd1a6760/5ba0db673cf949ca(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.014 -> Packet A|6|S0|e1843df7dafacbdd|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3,1|Δ0] 13.015 -> Packet A|7|S0|e1843df7dafacbdd|39|2 ConnectionCloseFrame[0|0|] AckFrame[5,3,1|Δ0] 13.015 Creating connection with server4:443 with v1 13.015 Setting up connection for downloading https://server4:443/woxebuvvcc at 38:44.319 on ClientConnection[8cd7feb0f16ac2d1/929f871f2129aeaf(V1) with server4/193.167.100.100:443] 13.016 Original destination connection id: 8cd7feb0f16ac2d1 (scid: 929f871f2129aeaf) >- CryptoStream[I|ClientHello] 13.017 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.217/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.017 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.046 <- (5) Packet A|6|S0|5ba0db673cf949ca|105|4 HandshakeDoneFrame[] AckFrame[4-3|Δ0] NewConnectionIdFrame[1,<0|76ecf894142e9e95|1a47b314f37463d7379c0187ae9fedfc] CryptoFrame[0,42] 13.047 -> Packet A|8|S0|e1843df7dafacbdd|39|2 ConnectionCloseFrame[0|0|] AckFrame[5,3,1|Δ0] 13.056 <- (1) Packet I|0|L|454|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(279) 13.057 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.257/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.056 <- (1) Packet H|0|L|746|1 CryptoFrame[0,700] 13.059 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 13.174/Handshake, because peerAwaitingAddressValidation | RTT:39/19 13.059 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 13.063 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 13.178/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.062 -> Packet H|0|L|80|1 CryptoFrame[0,36] 13.063 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 13.178/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 13.063 Discarding pn space Initial because first Handshake message is being sent 13.063 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 13.063 Starting downloading https://server4:443/woxebuvvcc at 38:44.366 on ClientConnection[8cd7feb0f16ac2d1/929f871f2129aeaf(V1) with server4/193.167.100.100:443] 13.064 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 13.179/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 13.064 -> Packet A|0|S0|7565391c7b3d6f4d|47|1 StreamFrame[0(CIB),0,17,fin] 13.178 loss detection timeout handler running Sending probe 0, because no ack since 13.062. Current RTT: 39/19. 13.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.178 (Probe is a handshake retransmit) 13.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 229 millis, based on 13.409/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 13.178 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 13.408 loss detection timeout handler running Sending probe 1, because no ack since 13.064. Current RTT: 39/19. 13.408 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.408 (Probe is a handshake retransmit) 13.408 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 459 millis, based on 13.868/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 13.408 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 13.409 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 459 millis, based on 13.869/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 13.409 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 13.440 <- (2) Packet H|1|L|746|1 CryptoFrame[0,700] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.441 <- (3) Packet A|0|S0|929f871f2129aeaf|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b8be7fcbad7a12eb|baab958d6e88447f472c325b4e2d03b2] CryptoFrame[0,42] 13.442 State is set to Confirmed 13.441 -> Packet H|5|L|46|1 AckFrame[1-0|Δ0] reschedule loss detection timer for PTO over 181 millis, based on 13.624/App, because ackElicitingInFlight | RTT:39/19 reschedule loss detection timer for PTO over -238 millis, based on 13.204/App, because ackElicitingInFlight | RTT:39/19 13.442 Discarding pn space Handshake because HandshakeDone is received 13.442 loss detection timeout handler running Sending probe 0, because no ack since 13.064. Current RTT: 39/19. 13.442 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 279 millis, based on 13.722/App, because ackElicitingInFlight | RTT:39/19 13.442 -> Packet PA|1|S0|7565391c7b3d6f4d|47|1 StreamFrame[0(CIB),0,17,fin] 13.462 -> Packet A|2|S0|7565391c7b3d6f4d|32|1 AckFrame[0|Δ19] 13.475 <- (4) Packet A|1|S0|929f871f2129aeaf|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 13.476 Cwnd(-): 6000; inflight: 0 13.476 Finished downloading https://server4:443/woxebuvvcc at 38:44.779 on ClientConnection[8cd7feb0f16ac2d1/929f871f2129aeaf(V1) with server4/193.167.100.100:443] 13.476 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.476 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.476 Closing ClientConnection[8cd7feb0f16ac2d1/929f871f2129aeaf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.476 -> Packet A|3|S0|7565391c7b3d6f4d|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 13.477 -> Packet A|4|S0|7565391c7b3d6f4d|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 13.477 Creating connection with server4:443 with v1 13.478 Setting up connection for downloading https://server4:443/lmvlofnojx at 38:44.781 on ClientConnection[a68403164bfacb10/1f4b9e5bbc4764d1(V1) with server4/193.167.100.100:443] 13.478 Original destination connection id: a68403164bfacb10 (scid: 1f4b9e5bbc4764d1) >- CryptoStream[I|ClientHello] 13.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.680/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.479 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.509 <- (5) Packet A|2|S0|929f871f2129aeaf|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 13.679 loss detection timeout handler running Sending probe 0, because no ack since 13.479. Current RTT: 100/25. 13.679 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.679 (Probe is an initial retransmit) 13.680 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.080/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.679 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.079 loss detection timeout handler running Sending probe 1, because no ack since 13.679. Current RTT: 100/25. 14.079 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.079 (Probe is an initial retransmit) 14.080 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.880/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.079 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.080 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.880/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.080 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.113 <- (1) Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 14.114 probe count not reset on ack because handshake not yet confirmed 14.114 Retransmitting CryptoFrame[0,257] on level Initial 14.114 Cwnd(-): 6000; inflight: 1200 14.114 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.914/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.115 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 14.503/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.114 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.118 Discarding packet (746 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 14.119 Discarding packet (746 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 14.148 <- (4) Packet I|3|L|1201|2 Token=[] AckFrame[4,2-1|Δ0] Padding(1151) 14.148 probe count not reset on ack because handshake not yet confirmed 14.149 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 14.537/Initial, because peerAwaitingAddressValidation | RTT:33/16 14.536 loss detection timeout handler running Sending probe 2, because no ack since 14.114. Current RTT: 33/12. 14.536 Sending probe because peer awaiting address validation 14.536 (Probe is Initial ping, because there is no Initial data to retransmit) 14.536 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 15.184/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 14.536 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 14.719 <- (5) Packet I|5|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 14.722 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 14.803/Handshake, because peerAwaitingAddressValidation | RTT:33/12 14.722 Discarding pn space Initial because first Handshake message is being sent 14.722 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.722 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) reschedule loss detection timer for PTO over 80 millis, based on 14.803/Handshake, because peerAwaitingAddressValidation | RTT:33/12 14.722 -> Packet I|6|L|1201|2 Token=[] AckFrame[5,3-2|Δ0] Padding(1151) 14.756 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 14.802 loss detection timeout handler running 14.802 Sending probe 0. Current RTT: 33/12. 14.802 Sending probe because peer awaiting address validation 14.802 (Probe is a handshake ping) 14.803 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 161 millis, based on 14.965/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 14.803 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 14.835 <- (8) Packet H|4|L|46|1 AckFrame[0|Δ0] 14.835 probe count not reset on ack because handshake not yet confirmed 14.835 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.079 <- (9) Packet H|6|L|746|1 CryptoFrame[0,700] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 145 millis, based on 15.229/Handshake, because ackElicitingInFlight | RTT:33/10 15.083 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.083 Starting downloading https://server4:443/lmvlofnojx at 38:46.386 on ClientConnection[a68403164bfacb10/1f4b9e5bbc4764d1(V1) with server4/193.167.100.100:443] 15.083 -> Packet H|2|L|48|1 AckFrame[6,4|Δ0] 15.084 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 144 millis, based on 15.229/Handshake, because ackElicitingInFlight | RTT:33/10 15.084 -> Packet A|0|S0|4115fa8fc9924444|47|1 StreamFrame[0(CIB),0,17,fin] 15.117 <- (10) Packet A|1|S0|1f4b9e5bbc4764d1|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] reschedule loss detection timer for PTO over 38 millis, based on 15.156/Handshake, because ackElicitingInFlight | RTT:33/10 15.118 Finished downloading https://server4:443/lmvlofnojx at 38:46.421 on ClientConnection[a68403164bfacb10/1f4b9e5bbc4764d1(V1) with server4/193.167.100.100:443] 15.118 Closing ClientConnection[a68403164bfacb10/1f4b9e5bbc4764d1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.118 -> Packet A|1|S0|4115fa8fc9924444|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 15.119 Creating connection with server4:443 with v1 15.119 Setting up connection for downloading https://server4:443/edoohixxqi at 38:46.422 on ClientConnection[b3cfaba194ed888d/0cadbe184fc43b85(V1) with server4/193.167.100.100:443] 15.119 Original destination connection id: b3cfaba194ed888d (scid: 0cadbe184fc43b85) >- CryptoStream[I|ClientHello] 15.121 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.321/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.121 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.150 <- (11) Packet A|2|S0|1f4b9e5bbc4764d1|35|2 ConnectionCloseFrame[0|0|] AckFrame[0|Δ0] 15.159 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 15.160 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.360/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.159 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 15.162 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.276/Handshake, because peerAwaitingAddressValidation | RTT:38/19 15.162 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 15.165 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.279/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.165 -> Packet H|0|L|80|1 CryptoFrame[0,36] 15.165 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.279/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.165 Starting downloading https://server4:443/edoohixxqi at 38:46.468 on ClientConnection[b3cfaba194ed888d/0cadbe184fc43b85(V1) with server4/193.167.100.100:443] 15.165 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 15.165 Discarding pn space Initial because first Handshake message is being sent 15.166 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.280/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.166 -> Packet A|0|S0|ecc4dc9852adb124|47|1 StreamFrame[0(CIB),0,17,fin] 15.197 <- (2) Packet A|0|S0|0cadbe184fc43b85|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|45c1e91bae0bf4bb|0a0802abe6ad46db17cc445f349a33c6] CryptoFrame[0,42] 15.197 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 15.279/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 107 millis, based on 15.305/App, because ackElicitingInFlight | RTT:38/19 15.197 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 15.198 <- (3) Packet A|1|S0|0cadbe184fc43b85|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 15.199 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.199 Finished downloading https://server4:443/edoohixxqi at 38:46.502 on ClientConnection[b3cfaba194ed888d/0cadbe184fc43b85(V1) with server4/193.167.100.100:443] 15.199 Closing ClientConnection[b3cfaba194ed888d/0cadbe184fc43b85(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.199 -> Packet A|1|S0|ecc4dc9852adb124|32|1 AckFrame[1-0|Δ1] 15.199 -> Packet A|2|S0|ecc4dc9852adb124|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 15.200 Creating connection with server4:443 with v1 15.200 Setting up connection for downloading https://server4:443/wiifmjubuu at 38:46.503 on ClientConnection[19c4e3fed21439f3/6fe061d8063c5717(V1) with server4/193.167.100.100:443] 15.200 Original destination connection id: 19c4e3fed21439f3 (scid: 6fe061d8063c5717) >- CryptoStream[I|ClientHello] 15.202 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.402/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.202 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.231 <- (4) Packet A|2|S0|0cadbe184fc43b85|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 15.239 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 15.240 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.440/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.239 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 15.243 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 15.352/Handshake, because peerAwaitingAddressValidation | RTT:37/18 15.243 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 15.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 15.355/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.246 -> Packet H|0|L|80|1 CryptoFrame[0,36] 15.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 15.355/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 15.246 Starting downloading https://server4:443/wiifmjubuu at 38:46.549 on ClientConnection[19c4e3fed21439f3/6fe061d8063c5717(V1) with server4/193.167.100.100:443] 15.246 Discarding pn space Initial because first Handshake message is being sent 15.246 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 15.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 15.355/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 15.246 -> Packet A|0|S0|c735eb59ec196e7d|47|1 StreamFrame[0(CIB),0,17,fin] 15.277 <- (2) Packet A|0|S0|6fe061d8063c5717|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|9d8139516f0a8bf2|41717cca5954bce756ad478ab80de3a9] CryptoFrame[0,42] 15.278 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 15.355/Handshake, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 101 millis, based on 15.380/App, because ackElicitingInFlight | RTT:37/18 15.278 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 15.298 -> Packet A|1|S0|c735eb59ec196e7d|32|1 AckFrame[0|Δ19] 15.379 loss detection timeout handler running Sending probe 0, because no ack since 15.246. Current RTT: 37/18. 15.380 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 267 millis, based on 15.648/App, because ackElicitingInFlight | RTT:37/18 15.380 -> Packet PA|2|S0|c735eb59ec196e7d|47|1 StreamFrame[0(CIB),0,17,fin] 15.413 <- (3) Packet A|1|S0|6fe061d8063c5717|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 15.414 Cwnd(-): 6000; inflight: 0 15.414 Finished downloading https://server4:443/wiifmjubuu at 38:46.717 on ClientConnection[19c4e3fed21439f3/6fe061d8063c5717(V1) with server4/193.167.100.100:443] 15.414 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.414 Closing ClientConnection[19c4e3fed21439f3/6fe061d8063c5717(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.414 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.414 -> Packet A|3|S0|c735eb59ec196e7d|47|1 StreamFrame[0(CIB),0,17,fin] 15.414 -> Packet A|4|S0|c735eb59ec196e7d|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 15.414 Creating connection with server4:443 with v1 15.415 Setting up connection for downloading https://server4:443/mxdksmrgyw at 38:46.718 on ClientConnection[5dfd5340f9e33ae8/dd1751fd603872e2(V1) with server4/193.167.100.100:443] 15.415 Original destination connection id: 5dfd5340f9e33ae8 (scid: dd1751fd603872e2) >- CryptoStream[I|ClientHello] 15.416 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.616/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.416 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.455 <- (1) Packet I|0|L|454|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(279) 15.456 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.656/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.573/Handshake, because peerAwaitingAddressValidation | RTT:38/19 15.459 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 15.455 <- (1) Packet H|0|L|746|1 CryptoFrame[0,700] >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.576/Handshake, because peerAwaitingAddressValidation | RTT:38/19 15.462 Discarding pn space Initial because first Handshake message is being sent 15.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.462 Starting downloading https://server4:443/mxdksmrgyw at 38:46.765 on ClientConnection[5dfd5340f9e33ae8/dd1751fd603872e2(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 113 millis, based on 15.576/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.462 -> Packet H|0|L|80|1 CryptoFrame[0,36] 15.463 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 15.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.577/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.463 -> Packet A|0|S0|07033e9f9d235a46|47|1 StreamFrame[0(CIB),0,17,fin] 15.494 <- (2) Packet A|0|S0|dd1751fd603872e2|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|3b678ac07f05e8bf|8797247539913a7d148b03488a5efb81] CryptoFrame[0,42] 15.494 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 15.576/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 107 millis, based on 15.602/App, because ackElicitingInFlight | RTT:38/19 15.494 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 15.514 -> Packet A|1|S0|07033e9f9d235a46|32|1 AckFrame[0|Δ19] 15.601 loss detection timeout handler running Sending probe 0, because no ack since 15.463. Current RTT: 38/19. 15.601 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 15.880/App, because ackElicitingInFlight | RTT:38/19 15.602 -> Packet PA|2|S0|07033e9f9d235a46|47|1 StreamFrame[0(CIB),0,17,fin] 15.629 <- (3) Packet A|2|S0|dd1751fd603872e2|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 15.630 Finished downloading https://server4:443/mxdksmrgyw at 38:46.933 on ClientConnection[5dfd5340f9e33ae8/dd1751fd603872e2(V1) with server4/193.167.100.100:443] 15.630 Closing ClientConnection[5dfd5340f9e33ae8/dd1751fd603872e2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.630 -> Packet A|3|S0|07033e9f9d235a46|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 15.630 Creating connection with server4:443 with v1 15.631 Setting up connection for downloading https://server4:443/ejuvunicdy at 38:46.934 on ClientConnection[67cb17ae10609c11/6de1c7b0e3608984(V1) with server4/193.167.100.100:443] 15.631 Original destination connection id: 67cb17ae10609c11 (scid: 6de1c7b0e3608984) >- CryptoStream[I|ClientHello] 15.632 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.832/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.632 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.652 <- (4) Packet A|3|S0|dd1751fd603872e2|32|1 AckFrame[2-0|Δ19] 15.653 -> Packet A|4|S0|07033e9f9d235a46|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 15.662 <- (5) Packet A|4|S0|dd1751fd603872e2|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 15.671 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 15.672 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.872/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.671 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 15.674 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.788/Handshake, because peerAwaitingAddressValidation | RTT:38/19 15.674 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 15.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.791/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.677 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.677 Starting downloading https://server4:443/ejuvunicdy at 38:46.981 on ClientConnection[67cb17ae10609c11/6de1c7b0e3608984(V1) with server4/193.167.100.100:443] 15.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.792/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.678 Discarding pn space Initial because first Handshake message is being sent 15.678 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 15.678 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.792/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.678 -> Packet A|0|S0|24413a98035803cf|47|1 StreamFrame[0(CIB),0,17,fin] 15.791 loss detection timeout handler running Sending probe 0, because no ack since 15.677. Current RTT: 38/19. 15.791 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.791 (Probe is a handshake retransmit) 15.792 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 16.020/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.792 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 15.823 <- (2) Packet A|0|S0|6de1c7b0e3608984|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c9a8e20437525bf4|57de9cf5af584803a07f5bc31ee19764] CryptoFrame[0,42] 15.824 State is set to Confirmed reschedule loss detection timer for PTO over 132 millis, based on 15.956/App, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over -6 millis, based on 15.817/App, because ackElicitingInFlight | RTT:38/19 15.824 Discarding pn space Handshake because HandshakeDone is received 15.824 loss detection timeout handler running Sending probe 0, because no ack since 15.678. Current RTT: 38/19. 15.824 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 277 millis, based on 16.102/App, because ackElicitingInFlight | RTT:38/19 15.824 -> Packet PA|1|S0|24413a98035803cf|47|1 StreamFrame[0(CIB),0,17,fin] 15.844 -> Packet A|2|S0|24413a98035803cf|32|1 AckFrame[0|Δ19] 15.857 <- (3) Packet A|1|S0|6de1c7b0e3608984|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 15.858 Cwnd(-): 6000; inflight: 0 15.858 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.858 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.858 Finished downloading https://server4:443/ejuvunicdy at 38:47.161 on ClientConnection[67cb17ae10609c11/6de1c7b0e3608984(V1) with server4/193.167.100.100:443] 15.858 Closing ClientConnection[67cb17ae10609c11/6de1c7b0e3608984(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.858 -> Packet A|3|S0|24413a98035803cf|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 15.859 -> Packet A|4|S0|24413a98035803cf|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 15.859 Creating connection with server4:443 with v1 15.859 Setting up connection for downloading https://server4:443/mhsqjcaihw at 38:47.163 on ClientConnection[bcdae68c85ed7ea0/8cd76d351681de66(V1) with server4/193.167.100.100:443] 15.859 Original destination connection id: bcdae68c85ed7ea0 (scid: 8cd76d351681de66) >- CryptoStream[I|ClientHello] 15.861 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.061/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.861 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.060 loss detection timeout handler running Sending probe 0, because no ack since 15.861. Current RTT: 100/25. 16.060 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.060 (Probe is an initial retransmit) 16.060 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.461/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.060 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.099 <- (1) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 16.101 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.301/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.101 Discarding pn space Initial because first Handshake message is being sent 16.101 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.302/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.101 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 16.299 <- (2) Packet H|1|L|745|1 CryptoFrame[0,699] 16.301 loss detection timeout handler running 16.301 Sending probe 0. Current RTT: 100/25. 16.301 Sending probe because peer awaiting address validation 16.301 (Probe is a handshake ping) 16.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 16.701/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.301 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) >- CryptoStream[H|Finished] 16.302 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 16.702/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.302 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.303 Starting downloading https://server4:443/mhsqjcaihw at 38:47.606 on ClientConnection[bcdae68c85ed7ea0/8cd76d351681de66(V1) with server4/193.167.100.100:443] 16.300 <- (3) Packet H|2|L|745|1 CryptoFrame[0,699] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.303 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 16.703/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.303 -> [Packet H|2|L|46|1 AckFrame[2-1|Δ0], Packet A|0|S0|e207a7a31a31ba42|47|1 StreamFrame[0(CIB),0,17,fin]] 16.334 <- (4) Packet A|0|S0|8cd76d351681de66|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5733581ba06be894|77abb308044e2bc83f7c2ec465e1d8ba] CryptoFrame[0,42] 16.335 State is set to Confirmed reschedule loss detection timer for PTO over 367 millis, based on 16.702/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 16.528/App, because ackElicitingInFlight | RTT:100/25 16.335 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 16.354 -> Packet A|1|S0|e207a7a31a31ba42|32|1 AckFrame[0|Δ19] 16.528 loss detection timeout handler running Sending probe 0, because no ack since 16.303. Current RTT: 100/25. 16.528 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 16.979/App, because ackElicitingInFlight | RTT:100/25 16.529 -> Packet PA|2|S0|e207a7a31a31ba42|47|1 StreamFrame[0(CIB),0,17,fin] 16.559 <- (5) Packet A|1|S0|8cd76d351681de66|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5733581ba06be894|77abb308044e2bc83f7c2ec465e1d8ba] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 16.579 -> Packet A|3|S0|e207a7a31a31ba42|32|1 AckFrame[1-0|Δ19] 16.978 loss detection timeout handler running Sending probe 1, because no ack since 16.529. Current RTT: 100/25. 16.978 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 17.878/App, because ackElicitingInFlight | RTT:100/25 16.978 -> Packet PA|4|S0|e207a7a31a31ba42|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 17.879/App, because ackElicitingInFlight | RTT:100/25 16.979 -> Packet PA|5|S0|e207a7a31a31ba42|47|1 StreamFrame[0(CIB),0,17,fin] 17.008 <- (6) Packet A|2|S0|8cd76d351681de66|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5733581ba06be894|77abb308044e2bc83f7c2ec465e1d8ba] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 17.009 <- (7) Packet A|3|S0|8cd76d351681de66|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5733581ba06be894|77abb308044e2bc83f7c2ec465e1d8ba] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 17.010 -> Packet A|6|S0|e207a7a31a31ba42|31|1 AckFrame[3-0|Δ0] 17.011 <- (8) Packet A|4|S0|8cd76d351681de66|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[4|Δ0] MaxStreamsFrame[B,101] 17.012 Cwnd(-): 6000; inflight: 47 17.012 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 192 millis, based on 17.204/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 121 millis, based on 17.134/App, because ackElicitingInFlight | RTT:33/16 17.012 Finished downloading https://server4:443/mhsqjcaihw at 38:48.315 on ClientConnection[bcdae68c85ed7ea0/8cd76d351681de66(V1) with server4/193.167.100.100:443] 17.012 Closing ClientConnection[bcdae68c85ed7ea0/8cd76d351681de66(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.012 -> Packet A|7|S0|e207a7a31a31ba42|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-0|Δ0] 17.013 Creating connection with server4:443 with v1 17.013 -> Packet A|8|S0|e207a7a31a31ba42|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-0|Δ0] 17.013 Setting up connection for downloading https://server4:443/njvutwiysk at 38:48.317 on ClientConnection[a4ad6b495e549183/f1546ac9e3b37a53(V1) with server4/193.167.100.100:443] 17.013 Original destination connection id: a4ad6b495e549183 (scid: f1546ac9e3b37a53) >- CryptoStream[I|ClientHello] 17.015 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.215/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.015 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.045 <- (9) Packet A|5|S0|8cd76d351681de66|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 17.052 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 17.053 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.253/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.052 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 17.056 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.165/Handshake, because peerAwaitingAddressValidation | RTT:37/18 17.056 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 17.059 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.168/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.058 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.059 Starting downloading https://server4:443/njvutwiysk at 38:48.362 on ClientConnection[a4ad6b495e549183/f1546ac9e3b37a53(V1) with server4/193.167.100.100:443] 17.059 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.168/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.059 Discarding pn space Initial because first Handshake message is being sent 17.059 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 17.059 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.168/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.059 -> Packet A|0|S0|cf58912e2c175440|47|1 StreamFrame[0(CIB),0,17,fin] 17.167 loss detection timeout handler running Sending probe 0, because no ack since 17.058. Current RTT: 37/18. 17.168 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.168 (Probe is a handshake retransmit) 17.168 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 17.386/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.168 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 17.385 loss detection timeout handler running Sending probe 1, because no ack since 17.059. Current RTT: 37/18. 17.385 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.385 (Probe is a handshake retransmit) 17.386 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 435 millis, based on 17.822/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.385 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 17.387 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 435 millis, based on 17.823/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.386 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 17.424 <- (2) Packet A|1|S0|f1546ac9e3b37a53|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2b2ed921b271f205|5a1980fd319095a12d5c942f8653aab9] CryptoFrame[0,42] 17.425 State is set to Confirmed reschedule loss detection timer for PTO over 170 millis, based on 17.595/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -231 millis, based on 17.193/App, because ackElicitingInFlight | RTT:37/18 17.425 Discarding pn space Handshake because HandshakeDone is received 17.425 loss detection timeout handler running Sending probe 0, because no ack since 17.059. Current RTT: 37/18. 17.425 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 267 millis, based on 17.693/App, because ackElicitingInFlight | RTT:37/18 17.425 -> Packet PA|1|S0|cf58912e2c175440|47|1 StreamFrame[0(CIB),0,17,fin] 17.445 -> Packet A|2|S0|cf58912e2c175440|32|1 AckFrame[1|Δ19] 17.692 loss detection timeout handler running Sending probe 1, because no ack since 17.425. Current RTT: 37/18. 17.693 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 18.229/App, because ackElicitingInFlight | RTT:37/18 17.693 -> Packet PA|3|S0|cf58912e2c175440|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 18.230/App, because ackElicitingInFlight | RTT:37/18 17.694 -> Packet PA|4|S0|cf58912e2c175440|47|1 StreamFrame[0(CIB),0,17,fin] 17.725 <- (3) Packet A|3|S0|f1546ac9e3b37a53|33|1 AckFrame[4-3,1|Δ0] 17.725 Cwnd(-): 6000; inflight: 0 17.725 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.725 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 120 millis, based on 17.847/App, because ackElicitingInFlight | RTT:36/15 17.726 -> Packet A|5|S0|cf58912e2c175440|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 17.757 <- (4) Packet A|4|S0|f1546ac9e3b37a53|107|4 HandshakeDoneFrame[] AckFrame[4-3,1|Δ0] NewConnectionIdFrame[1,<0|2b2ed921b271f205|5a1980fd319095a12d5c942f8653aab9] CryptoFrame[0,42] reschedule loss detection timer for PTO over 88 millis, based on 17.847/App, because ackElicitingInFlight | RTT:36/15 -< CryptoStream[A|NewSessionTicket] 17.758 <- (5) Packet A|5|S0|f1546ac9e3b37a53|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 17.759 -> Packet A|6|S0|cf58912e2c175440|33|1 AckFrame[5-3,1|Δ0] 17.759 Finished downloading https://server4:443/njvutwiysk at 38:49.062 on ClientConnection[a4ad6b495e549183/f1546ac9e3b37a53(V1) with server4/193.167.100.100:443] 17.759 Closing ClientConnection[a4ad6b495e549183/f1546ac9e3b37a53(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.759 -> Packet A|7|S0|cf58912e2c175440|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1|Δ0] 17.759 Creating connection with server4:443 with v1 17.760 Setting up connection for downloading https://server4:443/wgkibweetn at 38:49.063 on ClientConnection[625b5e54e060188c/f162ca149ed3fcc3(V1) with server4/193.167.100.100:443] 17.760 Original destination connection id: 625b5e54e060188c (scid: f162ca149ed3fcc3) >- CryptoStream[I|ClientHello] 17.761 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.961/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.761 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.777 <- (6) Packet A|6|S0|f1546ac9e3b37a53|34|1 AckFrame[5-3,1|Δ19] 17.777 -> Packet A|8|S0|cf58912e2c175440|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1|Δ0] 17.791 <- (7) Packet A|7|S0|f1546ac9e3b37a53|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[5|Δ0] MaxStreamsFrame[B,101] 17.791 <- (8) Packet A|8|S0|f1546ac9e3b37a53|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 17.791 -> Packet A|9|S0|cf58912e2c175440|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1|Δ0] 17.799 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 17.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.999/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.799 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 17.802 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.911/Handshake, because peerAwaitingAddressValidation | RTT:37/18 17.802 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.804 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.913/Handshake, because peerAwaitingAddressValidation | RTT:37/18 17.804 Discarding pn space Initial because first Handshake message is being sent 17.804 Starting downloading https://server4:443/wgkibweetn at 38:49.107 on ClientConnection[625b5e54e060188c/f162ca149ed3fcc3(V1) with server4/193.167.100.100:443] 17.805 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.914/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.805 -> Packet H|0|L|80|1 CryptoFrame[0,36] 17.805 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.914/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.805 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|ae7bee9d151f9f62|47|1 StreamFrame[0(CIB),0,17,fin]] 17.836 <- (2) Packet A|0|S0|f162ca149ed3fcc3|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e708e8a46214673f|c4ebaca2b63b8b0ce1a3aa56cd5b782d] CryptoFrame[0,42] 17.837 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 17.914/Handshake, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 102 millis, based on 17.939/App, because ackElicitingInFlight | RTT:37/18 17.837 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 17.856 -> Packet A|1|S0|ae7bee9d151f9f62|32|1 AckFrame[0|Δ19] 17.939 loss detection timeout handler running Sending probe 0, because no ack since 17.805. Current RTT: 37/18. 17.939 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 267 millis, based on 18.207/App, because ackElicitingInFlight | RTT:37/18 17.939 -> Packet PA|2|S0|ae7bee9d151f9f62|47|1 StreamFrame[0(CIB),0,17,fin] 18.207 loss detection timeout handler running Sending probe 1, because no ack since 17.939. Current RTT: 37/18. 18.207 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 18.743/App, because ackElicitingInFlight | RTT:37/18 18.207 -> Packet PA|3|S0|ae7bee9d151f9f62|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 18.744/App, because ackElicitingInFlight | RTT:37/18 18.208 -> Packet PA|4|S0|ae7bee9d151f9f62|47|1 StreamFrame[0(CIB),0,17,fin] 18.239 <- (3) Packet A|1|S0|f162ca149ed3fcc3|33|1 AckFrame[4-3,1|Δ0] 18.240 Cwnd(-): 6000; inflight: 0 18.240 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.240 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 120 millis, based on 18.361/App, because ackElicitingInFlight | RTT:36/15 18.240 -> Packet A|5|S0|ae7bee9d151f9f62|47|1 StreamFrame[0(CIB),0,17,fin] 18.290 <- (4) Packet A|3|S0|f162ca149ed3fcc3|34|1 AckFrame[5-3,1|Δ19] 18.291 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.630 <- (5) Packet A|5|S0|f162ca149ed3fcc3|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 18.631 Finished downloading https://server4:443/wgkibweetn at 38:49.934 on ClientConnection[625b5e54e060188c/f162ca149ed3fcc3(V1) with server4/193.167.100.100:443] 18.631 Closing ClientConnection[625b5e54e060188c/f162ca149ed3fcc3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.632 Creating connection with server4:443 with v1 18.631 -> Packet A|6|S0|ae7bee9d151f9f62|39|2 ConnectionCloseFrame[0|0|] AckFrame[5,3,1|Δ0] 18.632 Setting up connection for downloading https://server4:443/eeprymdkrd at 38:49.935 on ClientConnection[375d17e274633dbb/cc92f0571b868839(V1) with server4/193.167.100.100:443] 18.632 Original destination connection id: 375d17e274633dbb (scid: cc92f0571b868839) >- CryptoStream[I|ClientHello] 18.633 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.833/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.633 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.833 loss detection timeout handler running Sending probe 0, because no ack since 18.633. Current RTT: 100/25. 18.833 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.833 (Probe is an initial retransmit) 18.833 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.233/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.833 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.871 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(280) 18.872 probe count not reset on ack because handshake not yet confirmed 18.872 Retransmitting CryptoFrame[0,257] on level Initial 18.872 Cwnd(-): 6000; inflight: 0 18.872 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.272/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.872 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 227 millis, based on 19.100/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 18.872 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 18.871 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 18.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 19.103/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 18.875 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 18.878 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 19.106/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 18.878 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.878 Starting downloading https://server4:443/eeprymdkrd at 38:50.181 on ClientConnection[375d17e274633dbb/cc92f0571b868839(V1) with server4/193.167.100.100:443] 18.878 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 18.992/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 18.878 Discarding pn space Initial because first Handshake message is being sent 18.878 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 18.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 18.993/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 18.878 -> Packet A|0|S0|6367e09fc683544a|47|1 StreamFrame[0(CIB),0,17,fin] 18.909 <- (2) Packet A|0|S0|cc92f0571b868839|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2e6a696d13aff6e2|b3aa6b21aab53d539570d7a8e3e18fc9] CryptoFrame[0,42] 18.910 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 18.992/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 107 millis, based on 19.017/App, because ackElicitingInFlight | RTT:38/19 18.910 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 18.930 -> Packet A|1|S0|6367e09fc683544a|32|1 AckFrame[0|Δ19] 19.017 loss detection timeout handler running Sending probe 0, because no ack since 18.878. Current RTT: 38/19. 19.017 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 19.296/App, because ackElicitingInFlight | RTT:38/19 19.018 -> Packet PA|2|S0|6367e09fc683544a|47|1 StreamFrame[0(CIB),0,17,fin] 19.051 <- (3) Packet A|1|S0|cc92f0571b868839|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 19.052 Cwnd(-): 3000; inflight: 0 19.052 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.052 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.052 Finished downloading https://server4:443/eeprymdkrd at 38:50.355 on ClientConnection[375d17e274633dbb/cc92f0571b868839(V1) with server4/193.167.100.100:443] 19.052 Closing ClientConnection[375d17e274633dbb/cc92f0571b868839(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.052 -> Packet A|3|S0|6367e09fc683544a|47|1 StreamFrame[0(CIB),0,17,fin] 19.052 -> Packet A|4|S0|6367e09fc683544a|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 19.052 Creating connection with server4:443 with v1 19.053 Setting up connection for downloading https://server4:443/icqaozmnjm at 38:50.356 on ClientConnection[0e2a9a722faeaffa/1f905fe0150833f3(V1) with server4/193.167.100.100:443] 19.053 Original destination connection id: 0e2a9a722faeaffa (scid: 1f905fe0150833f3) >- CryptoStream[I|ClientHello] 19.054 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.254/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.054 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.084 <- (4) Packet A|2|S0|cc92f0571b868839|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 19.093 <- (1) Packet I|0|L|454|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(279) 19.093 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.293/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.093 <- (1) Packet H|0|L|746|1 CryptoFrame[0,700] 19.096 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 19.210/Handshake, because peerAwaitingAddressValidation | RTT:38/19 19.096 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 19.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 19.212/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 19.098 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.098 Starting downloading https://server4:443/icqaozmnjm at 38:50.401 on ClientConnection[0e2a9a722faeaffa/1f905fe0150833f3(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 113 millis, based on 19.212/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 19.098 Discarding pn space Initial because first Handshake message is being sent 19.098 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 19.099 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 19.213/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 19.099 -> Packet A|0|S0|7befc561d1cd218b|47|1 StreamFrame[0(CIB),0,17,fin] 19.129 <- (2) Packet A|0|S0|1f905fe0150833f3|29|2 HandshakeDoneFrame[] Padding(2) 19.130 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 19.212/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 107 millis, based on 19.238/App, because ackElicitingInFlight | RTT:38/19 19.130 Discarding pn space Handshake because HandshakeDone is received 19.130 <- (3) Packet A|1|S0|1f905fe0150833f3|99|2 NewConnectionIdFrame[1,<0|979614e522f793c2|7d07c4591314e8a4055ccde73fa318bd] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 19.131 -> Packet A|1|S0|7befc561d1cd218b|31|1 AckFrame[1-0|Δ0] 19.132 <- (4) Packet A|2|S0|1f905fe0150833f3|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 19.132 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.132 Finished downloading https://server4:443/icqaozmnjm at 38:50.436 on ClientConnection[0e2a9a722faeaffa/1f905fe0150833f3(V1) with server4/193.167.100.100:443] 19.132 Closing ClientConnection[0e2a9a722faeaffa/1f905fe0150833f3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.133 -> Packet A|2|S0|7befc561d1cd218b|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 19.133 Creating connection with server4:443 with v1 19.134 Setting up connection for downloading https://server4:443/nsamxfdark at 38:50.437 on ClientConnection[2e33a0f55df4af68/f9cc7cc56b321737(V1) with server4/193.167.100.100:443] 19.134 Original destination connection id: 2e33a0f55df4af68 (scid: f9cc7cc56b321737) >- CryptoStream[I|ClientHello] 19.135 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.335/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.135 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.164 <- (5) Packet A|3|S0|1f905fe0150833f3|35|2 ConnectionCloseFrame[0|0|] AckFrame[0|Δ0] 19.334 loss detection timeout handler running Sending probe 0, because no ack since 19.135. Current RTT: 100/25. 19.334 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.334 (Probe is an initial retransmit) 19.335 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.735/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.335 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.369 <- (1) Packet I|1|L|1201|2 Token=[] AckFrame[1-0|Δ0] Padding(1153) 19.370 probe count not reset on ack because handshake not yet confirmed 19.370 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.770/Initial, because peerAwaitingAddressValidation | RTT:100/25 19.372 <- (2) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 19.375 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.477/Handshake, because peerAwaitingAddressValidation | RTT:34/17 19.375 Discarding pn space Initial because first Handshake message is being sent 19.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.478/Handshake, because peerAwaitingAddressValidation | RTT:34/17 19.375 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 19.477 loss detection timeout handler running 19.477 Sending probe 0. Current RTT: 34/17. 19.477 Sending probe because peer awaiting address validation 19.477 (Probe is a handshake ping) 19.477 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 19.681/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.477 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 19.509 <- (3) Packet H|1|L|750|2 AckFrame[0|Δ0] CryptoFrame[0,699] 19.510 probe count not reset on ack because handshake not yet confirmed 19.510 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 171 millis, based on 19.684/Handshake, because ackElicitingInFlight | RTT:34/13 19.512 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.513 Starting downloading https://server4:443/nsamxfdark at 38:50.816 on ClientConnection[2e33a0f55df4af68/f9cc7cc56b321737(V1) with server4/193.167.100.100:443] 19.513 -> Packet H|2|L|46|1 AckFrame[1|Δ0] 19.513 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 171 millis, based on 19.684/Handshake, because ackElicitingInFlight | RTT:34/13 19.513 -> Packet A|0|S0|b8cf60580a5ab577|47|1 StreamFrame[0(CIB),0,17,fin] 19.544 <- (4) Packet A|0|S0|f9cc7cc56b321737|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|9360115c41f9fa41|35f09198773799707658034fdc78797c] CryptoFrame[0,42] 19.545 State is set to Confirmed reschedule loss detection timer for PTO over 139 millis, based on 19.684/Handshake, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over 79 millis, based on 19.624/App, because ackElicitingInFlight | RTT:34/13 19.545 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 19.546 <- (5) Packet A|1|S0|f9cc7cc56b321737|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 19.547 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.547 Finished downloading https://server4:443/nsamxfdark at 38:50.850 on ClientConnection[2e33a0f55df4af68/f9cc7cc56b321737(V1) with server4/193.167.100.100:443] 19.547 Closing ClientConnection[2e33a0f55df4af68/f9cc7cc56b321737(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.547 -> Packet A|1|S0|b8cf60580a5ab577|32|1 AckFrame[1-0|Δ1] 19.547 -> Packet A|2|S0|b8cf60580a5ab577|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 19.547 Creating connection with server4:443 with v1 19.548 Setting up connection for downloading https://server4:443/uahwltqsuz at 38:50.851 on ClientConnection[3aa257d159b87a64/1df52a1566ef9cda(V1) with server4/193.167.100.100:443] 19.548 Original destination connection id: 3aa257d159b87a64 (scid: 1df52a1566ef9cda) >- CryptoStream[I|ClientHello] 19.549 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.749/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.549 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.587 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 19.587 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.787/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.587 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 19.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 19.699/Handshake, because peerAwaitingAddressValidation | RTT:37/18 19.590 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 19.592 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 19.701/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 19.592 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.593 Starting downloading https://server4:443/uahwltqsuz at 38:50.896 on ClientConnection[3aa257d159b87a64/1df52a1566ef9cda(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 108 millis, based on 19.702/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 19.593 Discarding pn space Initial because first Handshake message is being sent 19.593 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 19.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 19.702/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 19.593 -> Packet A|0|S0|985b34c27978a71c|47|1 StreamFrame[0(CIB),0,17,fin] 19.701 loss detection timeout handler running Sending probe 0, because no ack since 19.592. Current RTT: 37/18. 19.701 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.701 (Probe is a handshake retransmit) 19.702 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 19.920/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 19.702 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 19.733 <- (2) Packet A|0|S0|1df52a1566ef9cda|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|01314fc679268cbc|53f5c6c7b2698d9df9c8ff592cc4cefd] CryptoFrame[0,42] 19.734 State is set to Confirmed reschedule loss detection timer for PTO over 126 millis, based on 19.861/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -7 millis, based on 19.727/App, because ackElicitingInFlight | RTT:37/18 19.734 Discarding pn space Handshake because HandshakeDone is received 19.734 loss detection timeout handler running Sending probe 0, because no ack since 19.593. Current RTT: 37/18. 19.734 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 267 millis, based on 20.003/App, because ackElicitingInFlight | RTT:37/18 19.735 -> Packet PA|1|S0|985b34c27978a71c|47|1 StreamFrame[0(CIB),0,17,fin] 19.754 -> Packet A|2|S0|985b34c27978a71c|32|1 AckFrame[0|Δ19] 19.768 <- (3) Packet A|1|S0|1df52a1566ef9cda|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 19.769 Cwnd(-): 6000; inflight: 0 19.769 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.769 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.769 Finished downloading https://server4:443/uahwltqsuz at 38:51.072 on ClientConnection[3aa257d159b87a64/1df52a1566ef9cda(V1) with server4/193.167.100.100:443] 19.769 Closing ClientConnection[3aa257d159b87a64/1df52a1566ef9cda(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.769 -> Packet A|3|S0|985b34c27978a71c|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 19.769 -> Packet A|4|S0|985b34c27978a71c|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 19.770 Creating connection with server4:443 with v1 19.770 Setting up connection for downloading https://server4:443/knzejauuim at 38:51.074 on ClientConnection[bb080a89d6d58135/9ee7c40b0558443d(V1) with server4/193.167.100.100:443] 19.770 Original destination connection id: bb080a89d6d58135 (scid: 9ee7c40b0558443d) >- CryptoStream[I|ClientHello] 19.772 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.972/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.772 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.802 <- (4) Packet A|2|S0|1df52a1566ef9cda|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 19.810 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 19.811 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.011/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.810 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 19.813 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 19.922/Handshake, because peerAwaitingAddressValidation | RTT:37/18 19.813 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 19.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 19.925/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 19.816 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 19.925/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 19.816 Discarding pn space Initial because first Handshake message is being sent 19.816 Starting downloading https://server4:443/knzejauuim at 38:51.119 on ClientConnection[bb080a89d6d58135/9ee7c40b0558443d(V1) with server4/193.167.100.100:443] 19.816 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 19.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 19.926/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 19.817 -> Packet A|0|S0|934cffb3e1e607b7|47|1 StreamFrame[0(CIB),0,17,fin] 19.925 loss detection timeout handler running Sending probe 0, because no ack since 19.816. Current RTT: 37/18. 19.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.925 (Probe is a handshake retransmit) 19.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 20.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 19.925 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 19.957 <- (2) Packet A|0|S0|9ee7c40b0558443d|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|08526d840317bcce|93e5a99b0a968263f05906954c3726d5] CryptoFrame[0,42] 19.957 State is set to Confirmed reschedule loss detection timer for PTO over 127 millis, based on 20.085/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -6 millis, based on 19.951/App, because ackElicitingInFlight | RTT:37/18 19.958 loss detection timeout handler running 19.958 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 19.817. Current RTT: 37/18. 19.958 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 267 millis, based on 20.226/App, because ackElicitingInFlight | RTT:37/18 19.958 -> Packet PA|1|S0|934cffb3e1e607b7|47|1 StreamFrame[0(CIB),0,17,fin] 19.977 -> Packet A|2|S0|934cffb3e1e607b7|32|1 AckFrame[0|Δ19] 19.991 <- (3) Packet A|1|S0|9ee7c40b0558443d|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 19.991 Cwnd(-): 6000; inflight: 0 19.992 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.992 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.992 Finished downloading https://server4:443/knzejauuim at 38:51.295 on ClientConnection[bb080a89d6d58135/9ee7c40b0558443d(V1) with server4/193.167.100.100:443] 19.992 Closing ClientConnection[bb080a89d6d58135/9ee7c40b0558443d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.992 -> Packet A|3|S0|934cffb3e1e607b7|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 19.992 -> Packet A|4|S0|934cffb3e1e607b7|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 19.992 Creating connection with server4:443 with v1 19.993 Setting up connection for downloading https://server4:443/lokemaivmr at 38:51.296 on ClientConnection[a552dc82bb89987f/bb740cdd16c02ea0(V1) with server4/193.167.100.100:443] 19.993 Original destination connection id: a552dc82bb89987f (scid: bb740cdd16c02ea0) >- CryptoStream[I|ClientHello] 19.994 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.194/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.994 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.023 <- (4) Packet A|2|S0|9ee7c40b0558443d|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 20.032 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 20.032 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.232/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.032 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 20.035 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 20.144/Handshake, because peerAwaitingAddressValidation | RTT:37/18 20.035 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 20.038 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 20.147/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.037 -> Packet H|0|L|80|1 CryptoFrame[0,36] 20.038 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 20.147/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 20.038 Starting downloading https://server4:443/lokemaivmr at 38:51.341 on ClientConnection[a552dc82bb89987f/bb740cdd16c02ea0(V1) with server4/193.167.100.100:443] 20.038 Discarding pn space Initial because first Handshake message is being sent 20.038 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 20.038 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 20.147/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 20.038 -> Packet A|0|S0|216e15acdb0cdfdb|47|1 StreamFrame[0(CIB),0,17,fin] 20.070 <- (2) Packet A|0|S0|bb740cdd16c02ea0|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b044918411308fb0|1dc419f6806e8fd8d15dac8e786cb2d8] CryptoFrame[0,42] 20.070 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 20.146/Handshake, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 101 millis, based on 20.172/App, because ackElicitingInFlight | RTT:37/18 20.070 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 20.090 -> Packet A|1|S0|216e15acdb0cdfdb|32|1 AckFrame[0|Δ19] 20.172 loss detection timeout handler running Sending probe 0, because no ack since 20.038. Current RTT: 37/18. 20.172 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 267 millis, based on 20.440/App, because ackElicitingInFlight | RTT:37/18 20.172 -> Packet PA|2|S0|216e15acdb0cdfdb|47|1 StreamFrame[0(CIB),0,17,fin] 20.198 <- (3) Packet A|2|S0|bb740cdd16c02ea0|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b044918411308fb0|1dc419f6806e8fd8d15dac8e786cb2d8] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 20.218 -> Packet A|3|S0|216e15acdb0cdfdb|34|1 AckFrame[2,0|Δ19] 20.439 loss detection timeout handler running Sending probe 1, because no ack since 20.172. Current RTT: 37/18. 20.439 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 20.975/App, because ackElicitingInFlight | RTT:37/18 20.439 -> Packet PA|4|S0|216e15acdb0cdfdb|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 20.977/App, because ackElicitingInFlight | RTT:37/18 20.441 -> Packet PA|5|S0|216e15acdb0cdfdb|47|1 StreamFrame[0(CIB),0,17,fin] 20.639 <- (4) Packet A|6|S0|bb740cdd16c02ea0|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 20.640 Finished downloading https://server4:443/lokemaivmr at 38:51.943 on ClientConnection[a552dc82bb89987f/bb740cdd16c02ea0(V1) with server4/193.167.100.100:443] 20.640 Closing ClientConnection[a552dc82bb89987f/bb740cdd16c02ea0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.640 <- (5) Packet A|7|S0|bb740cdd16c02ea0|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 20.640 Receiving frame for non-existent stream 0 20.640 -> Packet A|6|S0|216e15acdb0cdfdb|39|2 AckFrame[7-6,2,0|Δ0] ConnectionCloseFrame[0|0|] 20.641 Creating connection with server4:443 with v1 20.641 Setting up connection for downloading https://server4:443/yydjbsixnr at 38:51.945 on ClientConnection[3838bec877e7276e/1316b0e3b2edeaa7(V1) with server4/193.167.100.100:443] 20.641 Original destination connection id: 3838bec877e7276e (scid: 1316b0e3b2edeaa7) >- CryptoStream[I|ClientHello] 20.643 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.843/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.643 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.673 <- (6) Packet A|8|S0|bb740cdd16c02ea0|1067|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[5,3,0|Δ0] MaxStreamsFrame[B,101] 20.673 -> Packet A|7|S0|216e15acdb0cdfdb|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,2,0|Δ0] 20.680 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 20.680 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.880/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.680 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 20.683 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 20.792/Handshake, because peerAwaitingAddressValidation | RTT:37/18 20.682 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 20.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 20.794/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 20.685 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.685 Starting downloading https://server4:443/yydjbsixnr at 38:51.988 on ClientConnection[3838bec877e7276e/1316b0e3b2edeaa7(V1) with server4/193.167.100.100:443] 20.685 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 108 millis, based on 20.794/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 20.685 Discarding pn space Initial because first Handshake message is being sent 20.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 20.794/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 20.685 -> Packet A|0|S0|654740fd1ef6e063|47|1 StreamFrame[0(CIB),0,17,fin] 20.794 loss detection timeout handler running Sending probe 0, because no ack since 20.685. Current RTT: 37/18. 20.794 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.794 (Probe is a handshake retransmit) 20.794 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 21.012/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 20.794 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 21.011 loss detection timeout handler running Sending probe 1, because no ack since 20.685. Current RTT: 37/18. 21.011 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.011 (Probe is a handshake retransmit) 21.012 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 435 millis, based on 21.448/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 21.011 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 21.013 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 435 millis, based on 21.449/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 21.012 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 21.043 <- (2) Packet A|0|S0|1316b0e3b2edeaa7|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|d97826766a3e781e|e57c87616812b7a92ab2cffec0005c21] CryptoFrame[0,42] 21.044 State is set to Confirmed reschedule loss detection timer for PTO over 177 millis, based on 21.221/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -224 millis, based on 20.819/App, because ackElicitingInFlight | RTT:37/18 21.044 Discarding pn space Handshake because HandshakeDone is received 21.044 loss detection timeout handler running Sending probe 0, because no ack since 20.685. Current RTT: 37/18. 21.044 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 267 millis, based on 21.312/App, because ackElicitingInFlight | RTT:37/18 21.044 -> Packet PA|1|S0|654740fd1ef6e063|47|1 StreamFrame[0(CIB),0,17,fin] 21.064 -> Packet A|2|S0|654740fd1ef6e063|32|1 AckFrame[0|Δ19] 21.078 <- (3) Packet A|1|S0|1316b0e3b2edeaa7|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 21.078 Cwnd(-): 6000; inflight: 0 21.078 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 21.078 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.078 Finished downloading https://server4:443/yydjbsixnr at 38:52.382 on ClientConnection[3838bec877e7276e/1316b0e3b2edeaa7(V1) with server4/193.167.100.100:443] 21.078 Closing ClientConnection[3838bec877e7276e/1316b0e3b2edeaa7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 121 millis, based on 21.200/App, because ackElicitingInFlight | RTT:37/15 21.078 -> Packet A|3|S0|654740fd1ef6e063|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 21.079 -> Packet A|4|S0|654740fd1ef6e063|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 21.079 Creating connection with server4:443 with v1 21.080 Setting up connection for downloading https://server4:443/unsjrvdfxx at 38:52.383 on ClientConnection[43217f42bdecdd01/3dd51b8a3e3b627b(V1) with server4/193.167.100.100:443] 21.080 Original destination connection id: 43217f42bdecdd01 (scid: 3dd51b8a3e3b627b) >- CryptoStream[I|ClientHello] 21.081 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.281/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.081 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.280 loss detection timeout handler running Sending probe 0, because no ack since 21.081. Current RTT: 100/25. 21.280 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.280 (Probe is an initial retransmit) 21.281 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.681/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.281 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.320 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 21.323 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.523/Handshake, because peerAwaitingAddressValidation | RTT:100/25 21.323 Discarding pn space Initial because first Handshake message is being sent 21.323 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.523/Handshake, because peerAwaitingAddressValidation | RTT:100/25 21.323 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 21.357 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.357 <- (3) Packet H|1|L|746|1 CryptoFrame[0,700] >- CryptoStream[H|Finished] 21.360 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.360 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.361 Starting downloading https://server4:443/unsjrvdfxx at 38:52.664 on ClientConnection[43217f42bdecdd01/3dd51b8a3e3b627b(V1) with server4/193.167.100.100:443] 21.361 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 21.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.561/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.361 -> Packet A|0|S0|10f187e8aa9f7735|47|1 StreamFrame[0(CIB),0,17,fin] 21.393 <- (4) Packet H|2|L|746|1 CryptoFrame[0,700] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.394 -> Packet H|2|L|46|1 AckFrame[2-1|Δ0] 21.560 loss detection timeout handler running Sending probe 0, because no ack since 21.360. Current RTT: 100/25. 21.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.560 (Probe is a handshake retransmit) 21.561 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.961/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.561 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 21.593 <- (5) Packet A|0|S0|3dd51b8a3e3b627b|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0c3cc5ea41b02714|54fbab623c0af894e470a834fc253d30] CryptoFrame[0,42] 21.593 State is set to Confirmed reschedule loss detection timer for PTO over 217 millis, based on 21.811/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -7 millis, based on 21.586/App, because ackElicitingInFlight | RTT:100/25 21.594 Discarding pn space Handshake because HandshakeDone is received 21.594 loss detection timeout handler running Sending probe 0, because no ack since 21.361. Current RTT: 100/25. 21.594 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 449 millis, based on 22.044/App, because ackElicitingInFlight | RTT:100/25 21.594 -> Packet PA|1|S0|10f187e8aa9f7735|47|1 StreamFrame[0(CIB),0,17,fin] 21.613 -> Packet A|2|S0|10f187e8aa9f7735|32|1 AckFrame[0|Δ19] 22.043 loss detection timeout handler running Sending probe 1, because no ack since 21.594. Current RTT: 100/25. 22.043 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 22.943/App, because ackElicitingInFlight | RTT:100/25 22.043 -> Packet PA|3|S0|10f187e8aa9f7735|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 22.945/App, because ackElicitingInFlight | RTT:100/25 22.045 -> Packet PA|4|S0|10f187e8aa9f7735|47|1 StreamFrame[0(CIB),0,17,fin] 22.076 <- (6) Packet A|1|S0|3dd51b8a3e3b627b|31|1 AckFrame[4-2|Δ0] 22.076 Cwnd(-): 6000; inflight: 0 22.076 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 22.077 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 22.193/App, because ackElicitingInFlight | RTT:31/15 22.077 -> Packet A|5|S0|10f187e8aa9f7735|47|1 StreamFrame[0(CIB),0,17,fin] 22.128 <- (7) Packet A|3|S0|3dd51b8a3e3b627b|32|1 AckFrame[5-2|Δ19] 22.128 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.172 <- (8) Packet A|4|S0|3dd51b8a3e3b627b|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 22.173 Finished downloading https://server4:443/unsjrvdfxx at 38:53.476 on ClientConnection[43217f42bdecdd01/3dd51b8a3e3b627b(V1) with server4/193.167.100.100:443] 22.173 Closing ClientConnection[43217f42bdecdd01/3dd51b8a3e3b627b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.173 -> Packet A|6|S0|10f187e8aa9f7735|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1|Δ0] 22.174 Creating connection with server4:443 with v1 22.174 Setting up connection for downloading https://server4:443/gpdobmbatr at 38:53.478 on ClientConnection[7c212fdbef361237/999c1d40948f78ab(V1) with server4/193.167.100.100:443] 22.174 Original destination connection id: 7c212fdbef361237 (scid: 999c1d40948f78ab) >- CryptoStream[I|ClientHello] 22.176 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.376/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.176 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.375 loss detection timeout handler running Sending probe 0, because no ack since 22.176. Current RTT: 100/25. 22.375 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.375 (Probe is an initial retransmit) 22.376 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.776/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.375 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.614 Discarding packet (745 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 22.614 Discarding packet (44 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 22.775 loss detection timeout handler running Sending probe 1, because no ack since 22.375. Current RTT: 100/25. 22.775 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.775 (Probe is an initial retransmit) 22.775 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.575/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.775 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.776 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.576/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.776 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.809 <- (3) Packet I|2|L|1201|2 Token=[] AckFrame[2,0|Δ0] Padding(1151) 22.809 probe count not reset on ack because handshake not yet confirmed 22.810 Cwnd(-): 6000; inflight: 1200 22.810 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.610/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.213 <- (4) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 23.216 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.313/Handshake, because peerAwaitingAddressValidation | RTT:33/16 23.216 Discarding pn space Initial because first Handshake message is being sent 23.216 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 23.216 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.313/Handshake, because peerAwaitingAddressValidation | RTT:33/16 23.216 -> Packet I|4|L|1201|2 Token=[] AckFrame[4,2|Δ0] Padding(1151) 23.312 loss detection timeout handler running 23.312 Sending probe 0. Current RTT: 33/16. 23.312 Sending probe because peer awaiting address validation 23.312 (Probe is a handshake ping) 23.313 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.507/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.313 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 23.357 <- (6) Packet H|5|L|745|1 CryptoFrame[0,699] >- CryptoStream[H|Finished] 23.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.555/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.361 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.361 Starting downloading https://server4:443/gpdobmbatr at 38:54.664 on ClientConnection[7c212fdbef361237/999c1d40948f78ab(V1) with server4/193.167.100.100:443] 23.361 -> Packet H|2|L|46|1 AckFrame[5|Δ0] 23.362 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.556/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.362 -> Packet A|0|S0|4ba58547cf66d9de|47|1 StreamFrame[0(CIB),0,17,fin] 23.395 <- (7) Packet A|1|S0|999c1d40948f78ab|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 23.396 probe count not reset on ack because handshake not yet confirmed 23.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.590/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.396 Finished downloading https://server4:443/gpdobmbatr at 38:54.699 on ClientConnection[7c212fdbef361237/999c1d40948f78ab(V1) with server4/193.167.100.100:443] 23.396 Closing ClientConnection[7c212fdbef361237/999c1d40948f78ab(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.396 -> Packet A|1|S0|4ba58547cf66d9de|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 23.397 Creating connection with server4:443 with v1 23.397 Setting up connection for downloading https://server4:443/hvcebiyjen at 38:54.700 on ClientConnection[e5f5a0d27409068d/8bb2329d6e13281c(V1) with server4/193.167.100.100:443] 23.397 Original destination connection id: e5f5a0d27409068d (scid: 8bb2329d6e13281c) >- CryptoStream[I|ClientHello] 23.398 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.598/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.398 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.428 <- (8) Packet A|2|S0|999c1d40948f78ab|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 23.597 loss detection timeout handler running Sending probe 0, because no ack since 23.398. Current RTT: 100/25. 23.598 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.598 (Probe is an initial retransmit) 23.598 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.998/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.598 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.636 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(281) 23.637 probe count not reset on ack because handshake not yet confirmed 23.637 Retransmitting CryptoFrame[0,257] on level Initial 23.637 Cwnd(-): 6000; inflight: 0 23.637 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.037/Initial, because peerAwaitingAddressValidation | RTT:100/25 23.637 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 227 millis, based on 23.865/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.637 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 23.636 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 23.639 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 23.867/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.639 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 23.641 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 23.869/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.641 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.642 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 23.756/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.642 Starting downloading https://server4:443/hvcebiyjen at 38:54.945 on ClientConnection[e5f5a0d27409068d/8bb2329d6e13281c(V1) with server4/193.167.100.100:443] 23.642 Discarding pn space Initial because first Handshake message is being sent 23.642 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 23.642 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 23.756/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.642 -> Packet A|0|S0|1126aee95000cba8|47|1 StreamFrame[0(CIB),0,17,fin] 23.673 <- (2) Packet A|0|S0|8bb2329d6e13281c|29|2 HandshakeDoneFrame[] Padding(2) 23.674 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 23.755/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 107 millis, based on 23.781/App, because ackElicitingInFlight | RTT:38/19 23.674 Discarding pn space Handshake because HandshakeDone is received 23.673 <- (3) Packet A|1|S0|8bb2329d6e13281c|99|2 NewConnectionIdFrame[1,<0|b2959865426fd03e|988b097df840109d4de08bed0461662a] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 23.674 -> Packet A|1|S0|1126aee95000cba8|31|1 AckFrame[1-0|Δ0] 23.781 loss detection timeout handler running Sending probe 0, because no ack since 23.642. Current RTT: 38/19. 23.781 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 24.059/App, because ackElicitingInFlight | RTT:38/19 23.781 -> Packet PA|2|S0|1126aee95000cba8|47|1 StreamFrame[0(CIB),0,17,fin] 24.059 loss detection timeout handler running Sending probe 1, because no ack since 23.781. Current RTT: 38/19. 24.059 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 555 millis, based on 24.615/App, because ackElicitingInFlight | RTT:38/19 24.059 -> Packet PA|3|S0|1126aee95000cba8|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 555 millis, based on 24.616/App, because ackElicitingInFlight | RTT:38/19 24.060 -> Packet PA|4|S0|1126aee95000cba8|47|1 StreamFrame[0(CIB),0,17,fin] 24.110 <- (4) Packet A|5|S0|8bb2329d6e13281c|32|1 AckFrame[3-0|Δ19] reschedule loss detection timer for PTO over 88 millis, based on 24.199/App, because ackElicitingInFlight | RTT:38/19 24.132 <- (5) Packet A|6|S0|8bb2329d6e13281c|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 24.132 Finished downloading https://server4:443/hvcebiyjen at 38:55.436 on ClientConnection[e5f5a0d27409068d/8bb2329d6e13281c(V1) with server4/193.167.100.100:443] 24.132 <- (6) Packet A|7|S0|8bb2329d6e13281c|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 24.133 Closing ClientConnection[e5f5a0d27409068d/8bb2329d6e13281c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.133 Receiving frame for non-existent stream 0 24.133 -> Packet A|5|S0|1126aee95000cba8|35|2 AckFrame[7-5|Δ0] ConnectionCloseFrame[0|0|] 24.133 Creating connection with server4:443 with v1 24.134 Setting up connection for downloading https://server4:443/mkbmqfsqdd at 38:55.437 on ClientConnection[25a30000aa7218ff/33422d856e36206d(V1) with server4/193.167.100.100:443] 24.134 Original destination connection id: 25a30000aa7218ff (scid: 33422d856e36206d) >- CryptoStream[I|ClientHello] 24.135 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.335/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.135 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.334 loss detection timeout handler running Sending probe 0, because no ack since 24.135. Current RTT: 100/25. 24.335 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.335 (Probe is an initial retransmit) 24.335 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.735/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.335 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.369 <- (1) Packet I|1|L|1201|2 Token=[] AckFrame[1-0|Δ0] Padding(1153) 24.370 probe count not reset on ack because handshake not yet confirmed 24.370 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.770/Initial, because peerAwaitingAddressValidation | RTT:100/25 24.573 Discarding packet (746 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 24.574 Discarding packet (746 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 24.769 loss detection timeout handler running Sending probe 1, because no ack since 24.335. Current RTT: 33/16. 24.769 Sending probe because peer awaiting address validation 24.769 (Probe is Initial ping, because there is no Initial data to retransmit) 24.769 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 25.157/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.769 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 25.157 loss detection timeout handler running Sending probe 2, because no ack since 24.769. Current RTT: 33/16. 25.157 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.157 (Probe is Initial ping, because there is no Initial data to retransmit) 25.157 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 25.933/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.157 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 25.158 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 25.934/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.158 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 25.933 loss detection timeout handler running Sending probe 3, because no ack since 25.158. Current RTT: 33/16. 25.933 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.933 (Probe is Initial ping, because there is no Initial data to retransmit) 25.934 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1551 millis, based on 27.486/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.934 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 25.935 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1551 millis, based on 27.487/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.935 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 25.967 <- (4) Packet I|5|L|1201|2 Token=[] AckFrame[5-4,1-0|Δ0] Padding(1151) 25.967 probe count not reset on ack because handshake not yet confirmed 25.968 Cwnd(-): 6000; inflight: 1201 25.968 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1551 millis, based on 27.520/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.968 <- (5) Packet I|6|L|1201|2 Token=[] AckFrame[6-4,1-0|Δ0] Padding(1151) 25.968 probe count not reset on ack because handshake not yet confirmed 25.968 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1295 millis, based on 27.264/Initial, because peerAwaitingAddressValidation | RTT:33/12 26.174 Discarding packet (746 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 27.263 loss detection timeout handler running Sending probe 4, because no ack since 25.935. Current RTT: 33/9. 27.264 Sending probe because peer awaiting address validation 27.264 (Probe is Initial ping, because there is no Initial data to retransmit) 27.264 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2207 millis, based on 29.472/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/9 27.264 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 27.297 <- (7) Packet I|7|L|1201|2 Token=[] AckFrame[7-4,1-0|Δ0] Padding(1151) 27.298 probe count not reset on ack because handshake not yet confirmed 27.298 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2207 millis, based on 29.506/Initial, because peerAwaitingAddressValidation | RTT:33/9 28.391 <- (8) Packet I|8|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 28.394 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 60 millis, based on 28.455/Handshake, because peerAwaitingAddressValidation | RTT:33/7 28.394 Discarding pn space Initial because first Handshake message is being sent 28.394 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 60 millis, based on 28.455/Handshake, because peerAwaitingAddressValidation | RTT:33/7 28.394 -> Packet I|8|L|1201|2 Token=[] AckFrame[8-5,1|Δ0] Padding(1151) 28.454 loss detection timeout handler running 28.454 Sending probe 0. Current RTT: 33/7. 28.454 Sending probe because peer awaiting address validation 28.454 (Probe is a handshake ping) 28.455 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 121 millis, based on 28.577/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 28.455 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 28.486 <- (9) Packet H|6|L|46|1 AckFrame[0|Δ0] 28.487 probe count not reset on ack because handshake not yet confirmed 28.487 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.535 <- (10) Packet H|7|L|746|1 CryptoFrame[0,700] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 113 millis, based on 28.652/Handshake, because ackElicitingInFlight | RTT:33/6 28.538 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.539 Starting downloading https://server4:443/mkbmqfsqdd at 38:59.842 on ClientConnection[25a30000aa7218ff/33422d856e36206d(V1) with server4/193.167.100.100:443] 28.539 -> Packet H|2|L|46|1 AckFrame[7-6|Δ0] 28.539 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 113 millis, based on 28.652/Handshake, because ackElicitingInFlight | RTT:33/6 28.539 -> Packet A|0|S0|84407605d7627120|47|1 StreamFrame[0(CIB),0,17,fin] 28.570 <- (11) Packet A|0|S0|33422d856e36206d|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|aac8f10084a4420f|ba2c5ad2827205598169ecf6773988ef] CryptoFrame[0,42] 28.571 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 28.652/Handshake, because ackElicitingInFlight | RTT:33/6 reschedule loss detection timer for PTO over 50 millis, based on 28.621/App, because ackElicitingInFlight | RTT:33/6 28.571 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 28.590 -> Packet A|1|S0|84407605d7627120|32|1 AckFrame[0|Δ19] 28.621 loss detection timeout handler running Sending probe 0, because no ack since 28.539. Current RTT: 33/6. 28.621 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 163 millis, based on 28.785/App, because ackElicitingInFlight | RTT:33/6 28.621 -> Packet PA|2|S0|84407605d7627120|47|1 StreamFrame[0(CIB),0,17,fin] 28.654 <- (12) Packet A|1|S0|33422d856e36206d|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 28.655 Cwnd(-): 3000; inflight: 0 28.655 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 28.655 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.655 Finished downloading https://server4:443/mkbmqfsqdd at 38:59.958 on ClientConnection[25a30000aa7218ff/33422d856e36206d(V1) with server4/193.167.100.100:443] 28.655 Closing ClientConnection[25a30000aa7218ff/33422d856e36206d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.655 -> Packet A|3|S0|84407605d7627120|47|1 StreamFrame[0(CIB),0,17,fin] 28.655 -> Packet A|4|S0|84407605d7627120|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 28.656 Creating connection with server4:443 with v1 28.656 Setting up connection for downloading https://server4:443/igcbkawnvy at 38:59.959 on ClientConnection[8dadacd91cf0593e/7984f29a8409290d(V1) with server4/193.167.100.100:443] 28.656 Original destination connection id: 8dadacd91cf0593e (scid: 7984f29a8409290d) >- CryptoStream[I|ClientHello] 28.658 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.858/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.657 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.687 <- (13) Packet A|2|S0|33422d856e36206d|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 28.695 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 28.696 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.896/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 28.695 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 28.698 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 28.807/Handshake, because peerAwaitingAddressValidation | RTT:37/18 28.698 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 28.700 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 28.809/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 28.700 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.701 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 28.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 28.701 Discarding pn space Initial because first Handshake message is being sent 28.701 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 28.701 Starting downloading https://server4:443/igcbkawnvy at 39:00.004 on ClientConnection[8dadacd91cf0593e/7984f29a8409290d(V1) with server4/193.167.100.100:443] 28.701 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 28.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 28.701 -> Packet A|0|S0|a495c8376efd7fd8|47|1 StreamFrame[0(CIB),0,17,fin] 28.809 loss detection timeout handler running Sending probe 0, because no ack since 28.700. Current RTT: 37/18. 28.809 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.810 (Probe is a handshake retransmit) 28.810 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 29.028/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 28.810 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 28.842 <- (2) Packet H|1|L|745|1 CryptoFrame[0,699] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.843 -> Packet H|3|L|46|1 AckFrame[1-0|Δ0] 28.842 <- (3) Packet A|0|S0|7984f29a8409290d|29|2 HandshakeDoneFrame[] Padding(2) 28.843 State is set to Confirmed reschedule loss detection timer for PTO over 126 millis, based on 28.969/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -7 millis, based on 28.835/App, because ackElicitingInFlight | RTT:37/18 28.843 Discarding pn space Handshake because HandshakeDone is received 28.843 loss detection timeout handler running Sending probe 0, because no ack since 28.701. Current RTT: 37/18. 28.843 (Probe is retransmit on level App) 28.842 <- (4) Packet A|1|S0|7984f29a8409290d|99|2 NewConnectionIdFrame[1,<0|080b4d46896c4979|294f698d9ee9ff246bc6a8d3d14e462d] CryptoFrame[0,42] reschedule loss detection timer for PTO over 267 millis, based on 29.111/App, because ackElicitingInFlight | RTT:37/18 28.843 -> Packet PA|1|S0|a495c8376efd7fd8|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 28.843 -> Packet A|2|S0|a495c8376efd7fd8|31|1 AckFrame[1-0|Δ0] 29.110 loss detection timeout handler running Sending probe 1, because no ack since 28.843. Current RTT: 37/18. 29.111 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 29.647/App, because ackElicitingInFlight | RTT:37/18 29.111 -> Packet PA|3|S0|a495c8376efd7fd8|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 29.648/App, because ackElicitingInFlight | RTT:37/18 29.112 -> Packet PA|4|S0|a495c8376efd7fd8|47|1 StreamFrame[0(CIB),0,17,fin] 29.258 <- (5) Packet A|5|S0|7984f29a8409290d|29|2 HandshakeDoneFrame[] Padding(2) 29.259 <- (6) Packet A|6|S0|7984f29a8409290d|29|2 HandshakeDoneFrame[] Padding(2) 29.260 -> Packet A|5|S0|a495c8376efd7fd8|33|1 AckFrame[6-5,1-0|Δ0] 29.647 loss detection timeout handler running Sending probe 2, because no ack since 29.112. Current RTT: 37/18. 29.647 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1071 millis, based on 30.719/App, because ackElicitingInFlight | RTT:37/18 29.647 -> Packet PA|6|S0|a495c8376efd7fd8|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1071 millis, based on 30.720/App, because ackElicitingInFlight | RTT:37/18 29.648 -> Packet PA|7|S0|a495c8376efd7fd8|47|1 StreamFrame[0(CIB),0,17,fin] 29.771 <- (7) Packet A|8|S0|7984f29a8409290d|29|2 HandshakeDoneFrame[] Padding(2) 29.791 -> Packet A|8|S0|a495c8376efd7fd8|36|1 AckFrame[8,6-5,1-0|Δ19] 30.720 loss detection timeout handler running Sending probe 3, because no ack since 29.648. Current RTT: 37/18. 30.720 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 2143 millis, based on 32.864/App, because ackElicitingInFlight | RTT:37/18 30.720 -> Packet PA|9|S0|a495c8376efd7fd8|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 2143 millis, based on 32.865/App, because ackElicitingInFlight | RTT:37/18 30.721 -> Packet PA|10|S0|a495c8376efd7fd8|47|1 StreamFrame[0(CIB),0,17,fin] 30.770 <- (8) Packet A|10|S0|7984f29a8409290d|38|1 AckFrame[9,7-6,4-3,1|Δ19] 30.771 Cwnd(-): 6000; inflight: 47 30.771 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 83 millis, based on 30.855/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 131 millis, based on 30.903/App, because ackElicitingInFlight | RTT:39/17 30.771 -> Packet A|11|S0|a495c8376efd7fd8|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8,6-5,1-0|Δ0] 30.795 <- (9) Packet A|11|S0|7984f29a8409290d|29|2 HandshakeDoneFrame[] Padding(2) 30.796 <- (10) Packet A|12|S0|7984f29a8409290d|29|2 HandshakeDoneFrame[] Padding(2) 30.796 -> Packet A|12|S0|a495c8376efd7fd8|37|1 AckFrame[12-10,8,6-5,1-0|Δ0] 30.803 <- (11) Packet A|13|S0|7984f29a8409290d|1069|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[9,7-6,4-3,1|Δ0] MaxStreamsFrame[B,101] reschedule loss detection timer for PTO over 99 millis, based on 30.903/App, because ackElicitingInFlight | RTT:39/17 30.804 Finished downloading https://server4:443/igcbkawnvy at 39:02.107 on ClientConnection[8dadacd91cf0593e/7984f29a8409290d(V1) with server4/193.167.100.100:443] 30.804 Closing ClientConnection[8dadacd91cf0593e/7984f29a8409290d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.805 -> Packet A|13|S0|a495c8376efd7fd8|41|2 ConnectionCloseFrame[0|0|] AckFrame[13-10,8,6-5,1-0|Δ0] 30.805 Creating connection with server4:443 with v1 30.805 Setting up connection for downloading https://server4:443/tgecxjnilr at 39:02.109 on ClientConnection[a12b12cff809d01e/0b2a0b0f8a5a221b(V1) with server4/193.167.100.100:443] 30.806 Original destination connection id: a12b12cff809d01e (scid: 0b2a0b0f8a5a221b) >- CryptoStream[I|ClientHello] 30.807 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.007/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.807 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.822 <- (12) Packet A|14|S0|7984f29a8409290d|40|1 AckFrame[11,9,7-6,4-3,1|Δ19] 30.822 -> Packet A|14|S0|a495c8376efd7fd8|41|2 ConnectionCloseFrame[0|0|] AckFrame[13-10,8,6-5,1-0|Δ0] 30.836 <- (13) Packet A|15|S0|7984f29a8409290d|35|2 ConnectionCloseFrame[0|0|] AckFrame[13-11|Δ0] 30.844 <- (1) Packet I|0|L|454|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(279) 30.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.045/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 30.844 <- (1) Packet H|0|L|746|1 CryptoFrame[0,700] 30.847 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 30.956/Handshake, because peerAwaitingAddressValidation | RTT:37/18 30.847 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 30.849 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 30.958/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.849 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.850 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.850 Starting downloading https://server4:443/tgecxjnilr at 39:02.153 on ClientConnection[a12b12cff809d01e/0b2a0b0f8a5a221b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 108 millis, based on 30.959/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.850 Discarding pn space Initial because first Handshake message is being sent 30.850 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 30.850 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 30.959/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.850 -> Packet A|0|S0|76ed1bf7534235ff|47|1 StreamFrame[0(CIB),0,17,fin] 30.958 loss detection timeout handler running Sending probe 0, because no ack since 30.849. Current RTT: 37/18. 30.958 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.958 (Probe is a handshake retransmit) 30.959 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 31.177/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.958 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 30.990 <- (2) Packet A|0|S0|0b2a0b0f8a5a221b|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c030abfc03f68064|e2f5d2d6ac1dd0b67ea6c11bdacd82b8] CryptoFrame[0,42] 30.991 State is set to Confirmed reschedule loss detection timer for PTO over 126 millis, based on 31.118/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -7 millis, based on 30.984/App, because ackElicitingInFlight | RTT:37/18 30.991 Discarding pn space Handshake because HandshakeDone is received 30.991 loss detection timeout handler running Sending probe 0, because no ack since 30.850. Current RTT: 37/18. 30.991 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 267 millis, based on 31.259/App, because ackElicitingInFlight | RTT:37/18 30.991 -> Packet PA|1|S0|76ed1bf7534235ff|47|1 StreamFrame[0(CIB),0,17,fin] 31.011 -> Packet A|2|S0|76ed1bf7534235ff|32|1 AckFrame[0|Δ19] 31.024 <- (3) Packet A|1|S0|0b2a0b0f8a5a221b|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 31.025 Cwnd(-): 6000; inflight: 0 31.025 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.025 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 31.025 Finished downloading https://server4:443/tgecxjnilr at 39:02.328 on ClientConnection[a12b12cff809d01e/0b2a0b0f8a5a221b(V1) with server4/193.167.100.100:443] 31.025 Closing ClientConnection[a12b12cff809d01e/0b2a0b0f8a5a221b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.025 -> Packet A|3|S0|76ed1bf7534235ff|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 31.025 -> Packet A|4|S0|76ed1bf7534235ff|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 31.026 Creating connection with server4:443 with v1 31.026 Setting up connection for downloading https://server4:443/htmfuhfmux at 39:02.329 on ClientConnection[99fdf527cfde1dab/7cca93288673573b(V1) with server4/193.167.100.100:443] 31.026 Original destination connection id: 99fdf527cfde1dab (scid: 7cca93288673573b) >- CryptoStream[I|ClientHello] 31.028 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.228/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.028 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.057 <- (4) Packet A|2|S0|0b2a0b0f8a5a221b|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 31.066 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 31.067 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.267/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 31.066 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 31.069 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 31.183/Handshake, because peerAwaitingAddressValidation | RTT:38/19 31.069 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 31.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 31.185/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 31.071 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 31.185/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 31.071 Discarding pn space Initial because first Handshake message is being sent 31.071 Starting downloading https://server4:443/htmfuhfmux at 39:02.374 on ClientConnection[99fdf527cfde1dab/7cca93288673573b(V1) with server4/193.167.100.100:443] 31.071 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 31.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 31.186/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 31.072 -> Packet A|0|S0|368698e7edf84159|47|1 StreamFrame[0(CIB),0,17,fin] 31.185 loss detection timeout handler running Sending probe 0, because no ack since 31.071. Current RTT: 38/19. 31.185 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.185 (Probe is a handshake retransmit) 31.185 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 31.413/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 31.185 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 31.217 <- (2) Packet A|0|S0|7cca93288673573b|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5ab5f116987bc9d7|6e1adb9169b43d90613e952e188c49aa] CryptoFrame[0,42] 31.218 State is set to Confirmed reschedule loss detection timer for PTO over 132 millis, based on 31.350/App, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over -7 millis, based on 31.211/App, because ackElicitingInFlight | RTT:38/19 31.218 loss detection timeout handler running Sending probe 0, because no ack since 31.072. Current RTT: 38/19. 31.218 Discarding pn space Handshake because HandshakeDone is received 31.218 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 31.496/App, because ackElicitingInFlight | RTT:38/19 -< CryptoStream[A|NewSessionTicket] 31.218 -> Packet PA|1|S0|368698e7edf84159|47|1 StreamFrame[0(CIB),0,17,fin] 31.237 -> Packet A|2|S0|368698e7edf84159|32|1 AckFrame[0|Δ19] 31.495 loss detection timeout handler running Sending probe 1, because no ack since 31.218. Current RTT: 38/19. 31.495 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 555 millis, based on 32.052/App, because ackElicitingInFlight | RTT:38/19 31.496 -> Packet PA|3|S0|368698e7edf84159|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 555 millis, based on 32.053/App, because ackElicitingInFlight | RTT:38/19 31.497 -> Packet PA|4|S0|368698e7edf84159|47|1 StreamFrame[0(CIB),0,17,fin] 31.529 <- (3) Packet A|1|S0|7cca93288673573b|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[3-2|Δ0] MaxStreamsFrame[B,101] 31.529 Cwnd(-): 6000; inflight: 47 31.529 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 31.529 Finished downloading https://server4:443/htmfuhfmux at 39:02.833 on ClientConnection[99fdf527cfde1dab/7cca93288673573b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 106 millis, based on 31.636/App, because ackElicitingInFlight | RTT:38/19 31.529 Closing ClientConnection[99fdf527cfde1dab/7cca93288673573b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.529 -> Packet A|5|S0|368698e7edf84159|47|1 StreamFrame[0(CIB),0,17,fin] 31.530 -> Packet A|6|S0|368698e7edf84159|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 31.530 Creating connection with server4:443 with v1 31.531 Setting up connection for downloading https://server4:443/aiyclzkeff at 39:02.834 on ClientConnection[28596b8671d0d49d/324ae2b551335475(V1) with server4/193.167.100.100:443] 31.531 Original destination connection id: 28596b8671d0d49d (scid: 324ae2b551335475) >- CryptoStream[I|ClientHello] 31.532 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.732/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.532 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.562 <- (4) Packet A|2|S0|7cca93288673573b|35|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 31.731 loss detection timeout handler running Sending probe 0, because no ack since 31.532. Current RTT: 100/25. 31.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 31.731 (Probe is an initial retransmit) 31.732 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.132/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.732 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.765 <- (1) Packet I|1|L|1201|2 Token=[] AckFrame[1-0|Δ0] Padding(1153) 31.766 probe count not reset on ack because handshake not yet confirmed 31.766 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.166/Initial, because peerAwaitingAddressValidation | RTT:100/25 31.769 <- (2) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 31.772 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.869/Handshake, because peerAwaitingAddressValidation | RTT:33/16 31.772 Discarding pn space Initial because first Handshake message is being sent 31.772 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.869/Handshake, because peerAwaitingAddressValidation | RTT:33/16 31.772 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 31.805 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 31.806 <- (4) Packet H|1|L|745|1 CryptoFrame[0,699] >- CryptoStream[H|Finished] 31.809 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.906/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 31.809 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.809 Starting downloading https://server4:443/aiyclzkeff at 39:03.112 on ClientConnection[28596b8671d0d49d/324ae2b551335475(V1) with server4/193.167.100.100:443] 31.809 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 31.809 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.907/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 31.809 -> Packet A|0|S0|b5f3d2b14eb05f5c|47|1 StreamFrame[0(CIB),0,17,fin] 31.840 <- (5) Packet A|0|S0|324ae2b551335475|29|2 HandshakeDoneFrame[] Padding(2) 31.841 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 31.906/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 31.931/App, because ackElicitingInFlight | RTT:33/16 31.841 Discarding pn space Handshake because HandshakeDone is received 31.842 <- (6) Packet A|2|S0|324ae2b551335475|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 31.843 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.843 Finished downloading https://server4:443/aiyclzkeff at 39:03.146 on ClientConnection[28596b8671d0d49d/324ae2b551335475(V1) with server4/193.167.100.100:443] 31.843 Closing ClientConnection[28596b8671d0d49d/324ae2b551335475(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.843 -> Packet A|1|S0|b5f3d2b14eb05f5c|34|1 AckFrame[2,0|Δ2] 31.843 -> Packet A|2|S0|b5f3d2b14eb05f5c|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 31.844 Creating connection with server4:443 with v1 31.844 Setting up connection for downloading https://server4:443/yasziapsbr at 39:03.148 on ClientConnection[626c75f09fd7c93b/c257cefd951fda5e(V1) with server4/193.167.100.100:443] 31.845 Original destination connection id: 626c75f09fd7c93b (scid: c257cefd951fda5e) >- CryptoStream[I|ClientHello] 31.846 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.046/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.846 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.875 <- (7) Packet A|3|S0|324ae2b551335475|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 32.045 loss detection timeout handler running Sending probe 0, because no ack since 31.846. Current RTT: 100/25. 32.045 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.045 (Probe is an initial retransmit) 32.046 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.446/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.045 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.084 <- (1) Packet I|0|L|454|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(279) 32.084 probe count not reset on ack because handshake not yet confirmed 32.084 Retransmitting CryptoFrame[0,257] on level Initial 32.085 Cwnd(-): 6000; inflight: 0 32.085 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.485/Initial, because peerAwaitingAddressValidation | RTT:100/25 32.085 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 227 millis, based on 32.313/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 32.085 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 32.087 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 32.315/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 32.087 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 32.084 <- (1) Packet H|0|L|746|1 CryptoFrame[0,700] >- CryptoStream[H|Finished] 32.090 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 32.318/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 32.089 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.090 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 32.204/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 32.090 Starting downloading https://server4:443/yasziapsbr at 39:03.393 on ClientConnection[626c75f09fd7c93b/c257cefd951fda5e(V1) with server4/193.167.100.100:443] 32.090 Discarding pn space Initial because first Handshake message is being sent 32.090 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 32.090 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 32.204/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 32.090 -> Packet A|0|S0|62929e5b238a1a79|47|1 StreamFrame[0(CIB),0,17,fin] 32.118 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 32.203 loss detection timeout handler running Sending probe 0, because no ack since 32.089. Current RTT: 38/19. 32.203 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.204 (Probe is a handshake retransmit) 32.204 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 32.432/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 32.204 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 32.236 <- (3) Packet A|1|S0|c257cefd951fda5e|99|2 NewConnectionIdFrame[1,<0|df285e70c87b8ecb|725cf73f688189e997387930819b3f8b] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 32.255 -> Packet A|1|S0|62929e5b238a1a79|32|1 AckFrame[1|Δ19] 32.287 <- (4) Packet A|2|S0|c257cefd951fda5e|29|2 HandshakeDoneFrame[] Padding(2) 32.287 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 32.368/App, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over -57 millis, based on 32.229/App, because ackElicitingInFlight | RTT:38/19 32.287 Discarding pn space Handshake because HandshakeDone is received 32.287 loss detection timeout handler running Sending probe 0, because no ack since 32.090. Current RTT: 38/19. 32.287 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 32.565/App, because ackElicitingInFlight | RTT:38/19 32.287 -> Packet PA|2|S0|62929e5b238a1a79|47|1 StreamFrame[0(CIB),0,17,fin] 32.307 -> Packet A|3|S0|62929e5b238a1a79|32|1 AckFrame[2-1|Δ19] 32.565 loss detection timeout handler running Sending probe 1, because no ack since 32.287. Current RTT: 38/19. 32.565 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 555 millis, based on 33.121/App, because ackElicitingInFlight | RTT:38/19 32.565 -> Packet PA|4|S0|62929e5b238a1a79|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 555 millis, based on 33.122/App, because ackElicitingInFlight | RTT:38/19 32.566 -> Packet PA|5|S0|62929e5b238a1a79|47|1 StreamFrame[0(CIB),0,17,fin] 32.616 <- (5) Packet A|5|S0|c257cefd951fda5e|32|1 AckFrame[4-1|Δ19] 32.616 Cwnd(-): 3000; inflight: 47 32.616 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 88 millis, based on 32.705/App, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 132 millis, based on 32.749/App, because ackElicitingInFlight | RTT:40/17 32.616 -> Packet A|6|S0|62929e5b238a1a79|47|1 StreamFrame[0(CIB),0,17,fin] 32.710 <- (6) Packet A|7|S0|c257cefd951fda5e|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 32.711 Finished downloading https://server4:443/yasziapsbr at 39:04.014 on ClientConnection[626c75f09fd7c93b/c257cefd951fda5e(V1) with server4/193.167.100.100:443] 32.711 Closing ClientConnection[626c75f09fd7c93b/c257cefd951fda5e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.711 -> Packet A|7|S0|62929e5b238a1a79|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,5|Δ0] 32.712 Creating connection with server4:443 with v1 32.712 Setting up connection for downloading https://server4:443/auxmimwhrk at 39:04.015 on ClientConnection[294b4abc3b190e8a/1df15f818e0e06f9(V1) with server4/193.167.100.100:443] 32.712 Original destination connection id: 294b4abc3b190e8a (scid: 1df15f818e0e06f9) >- CryptoStream[I|ClientHello] 32.713 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.913/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.713 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.743 <- (7) Packet A|8|S0|c257cefd951fda5e|35|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 32.751 <- (1) Packet I|0|L|454|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(279) 32.752 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.952/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 32.751 <- (1) Packet H|0|L|746|1 CryptoFrame[0,700] 32.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 32.866/Handshake, because peerAwaitingAddressValidation | RTT:37/18 32.756 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 32.758 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 32.867/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 32.758 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.759 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 32.868/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 32.759 Discarding pn space Initial because first Handshake message is being sent 32.759 Starting downloading https://server4:443/auxmimwhrk at 39:04.062 on ClientConnection[294b4abc3b190e8a/1df15f818e0e06f9(V1) with server4/193.167.100.100:443] 32.759 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 32.759 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 32.868/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 32.759 -> Packet A|0|S0|1c07348da94517f9|47|1 StreamFrame[0(CIB),0,17,fin] 32.867 loss detection timeout handler running Sending probe 0, because no ack since 32.758. Current RTT: 37/18. 32.867 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.867 (Probe is a handshake retransmit) 32.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 33.086/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 32.868 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 32.924 <- (2) Packet A|1|S0|1df15f818e0e06f9|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2ea9b658e7b2113d|72169b55694eea61a22ec14f09369944] CryptoFrame[0,42] 32.924 State is set to Confirmed reschedule loss detection timer for PTO over 103 millis, based on 33.027/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -31 millis, based on 32.893/App, because ackElicitingInFlight | RTT:37/18 32.924 Discarding pn space Handshake because HandshakeDone is received 32.924 loss detection timeout handler running Sending probe 0, because no ack since 32.759. Current RTT: 37/18. 32.924 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 267 millis, based on 33.192/App, because ackElicitingInFlight | RTT:37/18 32.924 -> Packet PA|1|S0|1c07348da94517f9|47|1 StreamFrame[0(CIB),0,17,fin] 32.944 -> Packet A|2|S0|1c07348da94517f9|32|1 AckFrame[1|Δ19] 33.107 <- (3) Packet A|3|S0|1df15f818e0e06f9|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2ea9b658e7b2113d|72169b55694eea61a22ec14f09369944] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 33.126 -> Packet A|3|S0|1c07348da94517f9|34|1 AckFrame[3,1|Δ19] 33.192 loss detection timeout handler running Sending probe 1, because no ack since 32.924. Current RTT: 37/18. 33.192 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 33.728/App, because ackElicitingInFlight | RTT:37/18 33.192 -> Packet PA|4|S0|1c07348da94517f9|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 33.729/App, because ackElicitingInFlight | RTT:37/18 33.193 -> Packet PA|5|S0|1c07348da94517f9|47|1 StreamFrame[0(CIB),0,17,fin] 33.225 <- (4) Packet A|5|S0|1df15f818e0e06f9|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[4-2|Δ0] MaxStreamsFrame[B,101] 33.226 Cwnd(-): 6000; inflight: 47 33.226 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 100 millis, based on 33.327/App, because ackElicitingInFlight | RTT:37/18 33.226 Finished downloading https://server4:443/auxmimwhrk at 39:04.529 on ClientConnection[294b4abc3b190e8a/1df15f818e0e06f9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 121 millis, based on 33.348/App, because ackElicitingInFlight | RTT:37/15 33.226 Closing ClientConnection[294b4abc3b190e8a/1df15f818e0e06f9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.226 -> Packet A|6|S0|1c07348da94517f9|47|1 StreamFrame[0(CIB),0,17,fin] 33.227 -> Packet A|7|S0|1c07348da94517f9|35|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 33.227 Creating connection with server4:443 with v1 33.227 Setting up connection for downloading https://server4:443/uzkyvapphc at 39:04.531 on ClientConnection[2b181b516f41b6d8/ea1a8f698a906958(V1) with server4/193.167.100.100:443] 33.227 Original destination connection id: 2b181b516f41b6d8 (scid: ea1a8f698a906958) >- CryptoStream[I|ClientHello] 33.229 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.429/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.229 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.258 <- (5) Packet A|6|S0|1df15f818e0e06f9|35|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 33.266 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 33.266 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.466/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 33.266 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 33.269 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.378/Handshake, because peerAwaitingAddressValidation | RTT:37/18 33.269 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 33.271 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.271 -> Packet H|0|L|80|1 CryptoFrame[0,36] 33.271 Starting downloading https://server4:443/uzkyvapphc at 39:04.574 on ClientConnection[2b181b516f41b6d8/ea1a8f698a906958(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.271 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.271 Discarding pn space Initial because first Handshake message is being sent 33.272 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.381/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.271 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|1614b7e65b969ec0|47|1 StreamFrame[0(CIB),0,17,fin]] 33.303 <- (2) Packet A|0|S0|ea1a8f698a906958|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|3839b7d478f52c5b|624fb203fe066bd6375f92ea2930ce73] CryptoFrame[0,42] 33.303 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 33.380/Handshake, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 102 millis, based on 33.405/App, because ackElicitingInFlight | RTT:37/18 33.303 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 33.323 -> Packet A|1|S0|1614b7e65b969ec0|32|1 AckFrame[0|Δ19] 33.405 loss detection timeout handler running Sending probe 0, because no ack since 33.271. Current RTT: 37/18. 33.405 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 267 millis, based on 33.674/App, because ackElicitingInFlight | RTT:37/18 33.406 -> Packet PA|2|S0|1614b7e65b969ec0|47|1 StreamFrame[0(CIB),0,17,fin] 33.673 loss detection timeout handler running Sending probe 1, because no ack since 33.406. Current RTT: 37/18. 33.673 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 34.209/App, because ackElicitingInFlight | RTT:37/18 33.673 -> Packet PA|3|S0|1614b7e65b969ec0|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 34.210/App, because ackElicitingInFlight | RTT:37/18 33.674 -> Packet PA|4|S0|1614b7e65b969ec0|47|1 StreamFrame[0(CIB),0,17,fin] 33.828 <- (3) Packet A|4|S0|ea1a8f698a906958|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 33.829 Finished downloading https://server4:443/uzkyvapphc at 39:05.132 on ClientConnection[2b181b516f41b6d8/ea1a8f698a906958(V1) with server4/193.167.100.100:443] 33.829 Closing ClientConnection[2b181b516f41b6d8/ea1a8f698a906958(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.829 <- (4) Packet A|5|S0|ea1a8f698a906958|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 33.829 Creating connection with server4:443 with v1 33.829 -> Packet A|5|S0|1614b7e65b969ec0|37|2 ConnectionCloseFrame[0|0|] AckFrame[4,0|Δ0] 33.829 -> Packet A|6|S0|1614b7e65b969ec0|37|2 ConnectionCloseFrame[0|0|] AckFrame[4,0|Δ0] 33.830 Setting up connection for downloading https://server4:443/wlshulsmss at 39:05.133 on ClientConnection[fe3ad4d3bd03ac96/eec3cbafadc4772a(V1) with server4/193.167.100.100:443] 33.830 Original destination connection id: fe3ad4d3bd03ac96 (scid: eec3cbafadc4772a) >- CryptoStream[I|ClientHello] 33.831 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 34.031/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.831 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.861 <- (5) Packet A|6|S0|ea1a8f698a906958|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2-1|Δ0] 33.868 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 33.869 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 34.069/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 33.868 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 33.872 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.981/Handshake, because peerAwaitingAddressValidation | RTT:37/18 33.872 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 33.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.984/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.875 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.984/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.875 Starting downloading https://server4:443/wlshulsmss at 39:05.179 on ClientConnection[fe3ad4d3bd03ac96/eec3cbafadc4772a(V1) with server4/193.167.100.100:443] 33.875 Discarding pn space Initial because first Handshake message is being sent 33.876 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 33.876 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.876 -> Packet A|0|S0|68264f43c45ad620|47|1 StreamFrame[0(CIB),0,17,fin] 33.984 loss detection timeout handler running Sending probe 0, because no ack since 33.875. Current RTT: 37/18. 33.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.984 (Probe is a handshake retransmit) 33.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 34.203/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.984 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 34.133 <- (2) Packet A|1|S0|eec3cbafadc4772a|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|55d68c594e01e4c3|588a783862965e234003ead9aece189a] CryptoFrame[0,42] 34.133 State is set to Confirmed reschedule loss detection timer for PTO over 10 millis, based on 34.144/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -123 millis, based on 34.010/App, because ackElicitingInFlight | RTT:37/18 34.134 Discarding pn space Handshake because HandshakeDone is received 34.134 loss detection timeout handler running Sending probe 0, because no ack since 33.876. Current RTT: 37/18. 34.134 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 267 millis, based on 34.402/App, because ackElicitingInFlight | RTT:37/18 34.134 -> Packet PA|1|S0|68264f43c45ad620|47|1 StreamFrame[0(CIB),0,17,fin] 34.153 -> Packet A|2|S0|68264f43c45ad620|32|1 AckFrame[1|Δ19] 34.184 <- (3) Packet A|3|S0|eec3cbafadc4772a|105|4 HandshakeDoneFrame[] AckFrame[1|Δ0] NewConnectionIdFrame[1,<0|55d68c594e01e4c3|588a783862965e234003ead9aece189a] CryptoFrame[0,42] 34.185 Cwnd(-): 6000; inflight: 0 34.185 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 34.185 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 131 millis, based on 34.317/App, because ackElicitingInFlight | RTT:39/17 34.185 -> Packet A|3|S0|68264f43c45ad620|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket] 34.204 -> Packet A|4|S0|68264f43c45ad620|34|1 AckFrame[3,1|Δ19] 34.304 <- (4) Packet A|4|S0|eec3cbafadc4772a|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 34.304 Finished downloading https://server4:443/wlshulsmss at 39:05.608 on ClientConnection[fe3ad4d3bd03ac96/eec3cbafadc4772a(V1) with server4/193.167.100.100:443] 34.304 Closing ClientConnection[fe3ad4d3bd03ac96/eec3cbafadc4772a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 34.305 Creating connection with server4:443 with v1 34.305 -> Packet A|5|S0|68264f43c45ad620|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1|Δ0] 34.305 Setting up connection for downloading https://server4:443/jfouxudnmd at 39:05.609 on ClientConnection[44f3a2c51e1dbbdb/27f72f13f908a232(V1) with server4/193.167.100.100:443] 34.305 Original destination connection id: 44f3a2c51e1dbbdb (scid: 27f72f13f908a232) >- CryptoStream[I|ClientHello] 34.306 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 34.507/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.306 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.506 loss detection timeout handler running Sending probe 0, because no ack since 34.306. Current RTT: 100/25. 34.506 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 34.506 (Probe is an initial retransmit) 34.506 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 34.906/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.506 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.542 <- (5) Packet A|6|S0|eec3cbafadc4772a|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 34.542 -> Packet A|6|S0|68264f43c45ad620|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1|Δ0] 34.544 <- (1) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 34.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 34.746/Handshake, because peerAwaitingAddressValidation | RTT:100/25 34.546 Discarding pn space Initial because first Handshake message is being sent 34.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 34.746/Handshake, because peerAwaitingAddressValidation | RTT:100/25 34.546 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 34.579 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 34.745 loss detection timeout handler running 34.745 Sending probe 0. Current RTT: 100/25. 34.745 Sending probe because peer awaiting address validation 34.745 (Probe is a handshake ping) 34.746 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 35.146/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.746 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 35.060 <- (3) Packet H|2|L|746|1 CryptoFrame[0,700] >- CryptoStream[H|Finished] 35.063 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 35.463/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.063 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.063 Starting downloading https://server4:443/jfouxudnmd at 39:06.366 on ClientConnection[44f3a2c51e1dbbdb/27f72f13f908a232(V1) with server4/193.167.100.100:443] 35.060 <- (4) Packet H|3|L|746|1 CryptoFrame[0,700] 35.063 -> Packet H|2|L|46|1 AckFrame[2|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.064 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 35.464/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.064 -> [Packet H|3|L|46|1 AckFrame[3-2|Δ0], Packet A|0|S0|2d0fed0d0fadbab1|47|1 StreamFrame[0(CIB),0,17,fin]] 35.095 <- (5) Packet A|0|S0|27f72f13f908a232|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|dda9502036c0bed0|10b9348665c86e34b10aa04320481311] CryptoFrame[0,42] 35.096 State is set to Confirmed reschedule loss detection timer for PTO over 367 millis, based on 35.463/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 192 millis, based on 35.289/App, because ackElicitingInFlight | RTT:100/25 35.096 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 35.115 -> Packet A|1|S0|2d0fed0d0fadbab1|32|1 AckFrame[0|Δ19] 35.288 loss detection timeout handler running Sending probe 0, because no ack since 35.064. Current RTT: 100/25. 35.288 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 35.738/App, because ackElicitingInFlight | RTT:100/25 35.288 -> Packet PA|2|S0|2d0fed0d0fadbab1|47|1 StreamFrame[0(CIB),0,17,fin] 35.738 loss detection timeout handler running Sending probe 1, because no ack since 35.288. Current RTT: 100/25. 35.738 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 36.638/App, because ackElicitingInFlight | RTT:100/25 35.738 -> Packet PA|3|S0|2d0fed0d0fadbab1|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 36.639/App, because ackElicitingInFlight | RTT:100/25 35.739 -> Packet PA|4|S0|2d0fed0d0fadbab1|47|1 StreamFrame[0(CIB),0,17,fin] 35.770 <- (6) Packet A|1|S0|27f72f13f908a232|33|1 AckFrame[4-3,1|Δ0] 35.771 Cwnd(-): 6000; inflight: 0 35.771 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 35.771 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 35.887/App, because ackElicitingInFlight | RTT:31/15 35.771 -> Packet A|5|S0|2d0fed0d0fadbab1|47|1 StreamFrame[0(CIB),0,17,fin] 35.771 <- (7) Packet A|2|S0|27f72f13f908a232|1065|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[4-3,1|Δ0] MaxStreamsFrame[B,101] reschedule loss detection timer for PTO over 115 millis, based on 35.887/App, because ackElicitingInFlight | RTT:31/15 35.772 Finished downloading https://server4:443/jfouxudnmd at 39:07.075 on ClientConnection[44f3a2c51e1dbbdb/27f72f13f908a232(V1) with server4/193.167.100.100:443] 35.772 Closing ClientConnection[44f3a2c51e1dbbdb/27f72f13f908a232(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 35.772 -> Packet A|6|S0|2d0fed0d0fadbab1|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 35.772 Creating connection with server4:443 with v1 35.773 Setting up connection for downloading https://server4:443/uzgdpghtbc at 39:07.076 on ClientConnection[22dbc15199b4537a/49fc9bc38fa4aa11(V1) with server4/193.167.100.100:443] 35.773 Original destination connection id: 22dbc15199b4537a (scid: 49fc9bc38fa4aa11) >- CryptoStream[I|ClientHello] 35.774 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.974/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.774 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.803 <- (8) Packet A|3|S0|27f72f13f908a232|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ1] 35.811 <- (1) Packet I|0|L|454|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(279) 35.811 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.011/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 35.811 <- (1) Packet H|0|L|746|1 CryptoFrame[0,700] 35.813 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 35.923/Handshake, because peerAwaitingAddressValidation | RTT:37/18 35.813 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 35.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 35.925/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 35.816 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 35.816 Starting downloading https://server4:443/uzgdpghtbc at 39:07.119 on ClientConnection[22dbc15199b4537a/49fc9bc38fa4aa11(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 108 millis, based on 35.925/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 35.816 Discarding pn space Initial because first Handshake message is being sent 35.816 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 35.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 35.925/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 35.816 -> Packet A|0|S0|aa8eed6cf47cded5|47|1 StreamFrame[0(CIB),0,17,fin] 35.848 <- (2) Packet A|0|S0|49fc9bc38fa4aa11|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|62e2172e3c877a71|cb5ba1d17eb5c8f11019db79efe0a8a5] CryptoFrame[0,42] 35.848 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 35.925/Handshake, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 101 millis, based on 35.950/App, because ackElicitingInFlight | RTT:37/18 35.848 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 35.849 <- (3) Packet A|1|S0|49fc9bc38fa4aa11|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 35.850 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 35.850 Finished downloading https://server4:443/uzgdpghtbc at 39:07.153 on ClientConnection[22dbc15199b4537a/49fc9bc38fa4aa11(V1) with server4/193.167.100.100:443] 35.850 Closing ClientConnection[22dbc15199b4537a/49fc9bc38fa4aa11(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 35.850 -> Packet A|1|S0|aa8eed6cf47cded5|32|1 AckFrame[1-0|Δ1] 35.851 -> Packet A|2|S0|aa8eed6cf47cded5|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 35.851 Creating connection with server4:443 with v1 35.851 Setting up connection for downloading https://server4:443/ptkkowzkmr at 39:07.155 on ClientConnection[e1d245500707dc41/cc30593d5d4d9add(V1) with server4/193.167.100.100:443] 35.851 Original destination connection id: e1d245500707dc41 (scid: cc30593d5d4d9add) >- CryptoStream[I|ClientHello] 35.853 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.053/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.853 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.882 <- (4) Packet A|2|S0|49fc9bc38fa4aa11|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 36.052 loss detection timeout handler running Sending probe 0, because no ack since 35.853. Current RTT: 100/25. 36.052 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 36.052 (Probe is an initial retransmit) 36.052 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 36.452/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.052 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.091 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(281) 36.091 probe count not reset on ack because handshake not yet confirmed 36.092 Retransmitting CryptoFrame[0,257] on level Initial 36.092 Cwnd(-): 6000; inflight: 0 36.092 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 36.492/Initial, because peerAwaitingAddressValidation | RTT:100/25 36.092 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 227 millis, based on 36.320/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 36.092 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 36.091 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 36.094 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 36.322/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 36.094 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 36.096 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 36.324/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 36.096 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 36.096 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 36.210/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 36.096 Starting downloading https://server4:443/ptkkowzkmr at 39:07.399 on ClientConnection[e1d245500707dc41/cc30593d5d4d9add(V1) with server4/193.167.100.100:443] 36.096 Discarding pn space Initial because first Handshake message is being sent 36.096 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 36.096 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 36.211/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 36.096 -> Packet A|0|S0|c6519b9682343084|47|1 StreamFrame[0(CIB),0,17,fin] 36.125 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 36.210 loss detection timeout handler running Sending probe 0, because no ack since 36.096. Current RTT: 38/19. 36.210 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 36.210 (Probe is a handshake retransmit) 36.210 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 36.438/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 36.210 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 36.437 loss detection timeout handler running Sending probe 1, because no ack since 36.096. Current RTT: 38/19. 36.437 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 36.437 (Probe is a handshake retransmit) 36.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 36.894/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 36.438 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 36.439 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 36.895/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 36.439 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 36.802 <- (3) Packet A|3|S0|cc30593d5d4d9add|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|92bfe038a04dbfe2|733bdc01265c9b5b3746299fec168060] CryptoFrame[0,42] 36.803 State is set to Confirmed reschedule loss detection timer for PTO over -150 millis, based on 36.652/App, because ackElicitingInFlight | RTT:38/19 36.803 loss detection timeout handler running Sending probe 2, because no ack since 36.096. Current RTT: 38/19. reschedule loss detection timer for PTO over -567 millis, based on 36.235/App, because ackElicitingInFlight | RTT:38/19 36.803 Discarding pn space Handshake because HandshakeDone is received 36.803 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 277 millis, based on 37.081/App, because ackElicitingInFlight | RTT:38/19 36.803 -> Packet PA|1|S0|c6519b9682343084|47|1 StreamFrame[0(CIB),0,17,fin] 36.822 -> Packet A|2|S0|c6519b9682343084|32|1 AckFrame[3|Δ19] 36.854 <- (4) Packet A|5|S0|cc30593d5d4d9add|105|4 HandshakeDoneFrame[] AckFrame[1|Δ0] NewConnectionIdFrame[1,<0|92bfe038a04dbfe2|733bdc01265c9b5b3746299fec168060] CryptoFrame[0,42] 36.854 Cwnd(-): 3000; inflight: 0 36.854 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 36.854 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 132 millis, based on 36.987/App, because ackElicitingInFlight | RTT:40/17 36.854 -> Packet A|3|S0|c6519b9682343084|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 36.874 -> Packet A|4|S0|c6519b9682343084|34|1 AckFrame[5,3|Δ19] 36.905 <- (5) Packet A|6|S0|cc30593d5d4d9add|32|1 AckFrame[3-1|Δ19] 36.906 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 37.029 <- (6) Packet A|7|S0|cc30593d5d4d9add|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 37.030 Finished downloading https://server4:443/ptkkowzkmr at 39:08.333 on ClientConnection[e1d245500707dc41/cc30593d5d4d9add(V1) with server4/193.167.100.100:443] 37.030 Closing ClientConnection[e1d245500707dc41/cc30593d5d4d9add(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 37.030 -> Packet A|5|S0|c6519b9682343084|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 37.031 Creating connection with server4:443 with v1 37.031 Setting up connection for downloading https://server4:443/nkygnolbwk at 39:08.334 on ClientConnection[9fbbadb756251001/76978acf0ffce168(V1) with server4/193.167.100.100:443] 37.031 Original destination connection id: 9fbbadb756251001 (scid: 76978acf0ffce168) >- CryptoStream[I|ClientHello] 37.032 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 37.232/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.032 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.069 <- (1) Packet I|0|L|454|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(279) 37.070 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 37.270/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 37.069 <- (1) Packet H|0|L|746|1 CryptoFrame[0,700] 37.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 37.181/Handshake, because peerAwaitingAddressValidation | RTT:37/18 37.072 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 37.074 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 37.183/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 37.074 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 37.075 Starting downloading https://server4:443/nkygnolbwk at 39:08.378 on ClientConnection[9fbbadb756251001/76978acf0ffce168(V1) with server4/193.167.100.100:443] 37.075 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 37.184/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 37.075 Discarding pn space Initial because first Handshake message is being sent 37.075 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 37.075 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 37.184/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 37.075 -> Packet A|0|S0|08bf726379674274|47|1 StreamFrame[0(CIB),0,17,fin] 37.106 <- (2) Packet A|1|S0|76978acf0ffce168|99|2 NewConnectionIdFrame[1,<0|eb5579be95b947c6|0322955f63fbd5be58a75df9fa8f179f] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 37.108 <- (3) Packet A|2|S0|76978acf0ffce168|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 37.108 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 37.217/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 37.108 Finished downloading https://server4:443/nkygnolbwk at 39:08.412 on ClientConnection[9fbbadb756251001/76978acf0ffce168(V1) with server4/193.167.100.100:443] 37.108 Closing ClientConnection[9fbbadb756251001/76978acf0ffce168(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 37.109 -> Packet A|1|S0|08bf726379674274|32|1 AckFrame[2-1|Δ1] 37.109 -> Packet A|2|S0|08bf726379674274|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 37.109 Creating connection with server4:443 with v1 37.110 Setting up connection for downloading https://server4:443/lidmkwsudh at 39:08.413 on ClientConnection[0beb4f3fc02f68d4/8151f014bbf08a42(V1) with server4/193.167.100.100:443] 37.110 Original destination connection id: 0beb4f3fc02f68d4 (scid: 8151f014bbf08a42) >- CryptoStream[I|ClientHello] 37.111 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 37.311/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.111 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.141 <- (4) Packet A|3|S0|76978acf0ffce168|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 37.310 loss detection timeout handler running Sending probe 0, because no ack since 37.111. Current RTT: 100/25. 37.310 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 37.310 (Probe is an initial retransmit) 37.310 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 37.710/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.310 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.349 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(280) 37.349 probe count not reset on ack because handshake not yet confirmed 37.349 Retransmitting CryptoFrame[0,257] on level Initial 37.350 Cwnd(-): 6000; inflight: 0 37.350 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 37.750/Initial, because peerAwaitingAddressValidation | RTT:100/25 37.350 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 227 millis, based on 37.578/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 37.350 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 37.349 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 37.353 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 37.581/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 37.353 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 37.355 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 37.583/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 37.355 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 37.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 37.356 Starting downloading https://server4:443/lidmkwsudh at 39:08.659 on ClientConnection[0beb4f3fc02f68d4/8151f014bbf08a42(V1) with server4/193.167.100.100:443] 37.356 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 113 millis, based on 37.470/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 37.356 Discarding pn space Initial because first Handshake message is being sent 37.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 37.470/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 37.356 -> Packet A|0|S0|8249a0e7b5fc3ac3|47|1 StreamFrame[0(CIB),0,17,fin] 37.387 <- (2) Packet A|0|S0|8151f014bbf08a42|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2eb9fd3799eedb4b|2535c56aa202d93642e4ce1004c0362e] CryptoFrame[0,42] 37.388 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 37.469/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 107 millis, based on 37.495/App, because ackElicitingInFlight | RTT:38/19 37.388 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 37.407 -> Packet A|1|S0|8249a0e7b5fc3ac3|32|1 AckFrame[0|Δ19] 37.495 loss detection timeout handler running Sending probe 0, because no ack since 37.356. Current RTT: 38/19. 37.495 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 37.773/App, because ackElicitingInFlight | RTT:38/19 37.495 -> Packet PA|2|S0|8249a0e7b5fc3ac3|47|1 StreamFrame[0(CIB),0,17,fin] 37.658 <- (3) Packet A|2|S0|8151f014bbf08a42|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 37.659 Finished downloading https://server4:443/lidmkwsudh at 39:08.962 on ClientConnection[0beb4f3fc02f68d4/8151f014bbf08a42(V1) with server4/193.167.100.100:443] 37.659 Closing ClientConnection[0beb4f3fc02f68d4/8151f014bbf08a42(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 37.660 -> Packet A|3|S0|8249a0e7b5fc3ac3|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0]