0.000 Creating connection with server4:443 with v1 0.082 Setting up connection for downloading https://server4:443/culmevscum at 37:17.090 on ClientConnection[ce7ff7ff88ee4e1b/fd50ee061a9e2c9f(V1) with server4/193.167.100.100:443] 0.083 Original destination connection id: ce7ff7ff88ee4e1b (scid: fd50ee061a9e2c9f) >- CryptoStream[I|ClientHello] 0.262 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.463/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.258 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.464 loss detection timeout handler running Sending probe 0, because no ack since 0.258. Current RTT: 100/25. 0.465 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.469 (Probe is an initial retransmit) 0.474 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.874/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.474 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.598 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 0.617 probe count not reset on ack because handshake not yet confirmed 0.626 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.027/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 0.654 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2029 millis, based on 2.684/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:339/169 0.652 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 0.598 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] >- CryptoStream[H|Finished] 0.704 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2029 millis, based on 2.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:339/169 0.704 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.710 Starting downloading https://server4:443/culmevscum at 37:17.734 on ClientConnection[ce7ff7ff88ee4e1b/fd50ee061a9e2c9f(V1) with server4/193.167.100.100:443] 0.711 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 0.714 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1014 millis, based on 1.729/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:339/169 0.715 Discarding pn space Initial because first Handshake message is being sent 0.716 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 0.764 <- (3) Packet A|0|S0|fd50ee061a9e2c9f|29|2 HandshakeDoneFrame[] Padding(2) 0.778 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1014 millis, based on 1.793/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:339/169 0.780 State is set to Confirmed reschedule loss detection timer for PTO over 938 millis, based on 1.719/Handshake, because ackElicitingInFlight | RTT:339/169 reschedule loss detection timer for PTO over 1037 millis, based on 1.818/App, because ackElicitingInFlight | RTT:339/169 0.780 Discarding pn space Handshake because HandshakeDone is received 0.778 -> Packet A|0|S0|1817886850a46aff|47|1 StreamFrame[0(CIB),0,17,fin] 0.782 <- (4) Packet A|1|S0|fd50ee061a9e2c9f|99|2 NewConnectionIdFrame[1,<0|aa208b29e0f94fa6|ef72be36ebbbd31109310239f399e6b7] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 0.792 -> Packet A|1|S0|1817886850a46aff|32|1 AckFrame[1-0|Δ11] 0.820 <- (5) Packet A|2|S0|fd50ee061a9e2c9f|1064|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ1] MaxStreamsFrame[B,101] 0.825 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 0.827 Finished downloading https://server4:443/culmevscum at 37:17.851 on ClientConnection[ce7ff7ff88ee4e1b/fd50ee061a9e2c9f(V1) with server4/193.167.100.100:443] 0.828 Closing ClientConnection[ce7ff7ff88ee4e1b/fd50ee061a9e2c9f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.831 Creating connection with server4:443 with v1 0.832 Setting up connection for downloading https://server4:443/fxhagjigkn at 37:17.856 on ClientConnection[f7097ef5c3c6db40/2a4272d8a9bba1b0(V1) with server4/193.167.100.100:443] 0.832 Original destination connection id: f7097ef5c3c6db40 (scid: 2a4272d8a9bba1b0) >- CryptoStream[I|ClientHello] 0.836 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.036/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.836 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.831 -> Packet A|2|S0|1817886850a46aff|36|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ5] 0.871 <- (6) Packet A|3|S0|fd50ee061a9e2c9f|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 0.884 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 0.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.086/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.884 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 0.892 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 143 millis, based on 1.036/Handshake, because peerAwaitingAddressValidation | RTT:48/24 0.892 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 143 millis, based on 1.042/Handshake, because peerAwaitingAddressValidation | RTT:48/24 0.898 Discarding pn space Initial because first Handshake message is being sent 0.898 Starting downloading https://server4:443/fxhagjigkn at 37:17.923 on ClientConnection[f7097ef5c3c6db40/2a4272d8a9bba1b0(V1) with server4/193.167.100.100:443] 0.899 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 143 millis, based on 1.043/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:48/24 0.898 -> Packet H|0|L|80|1 CryptoFrame[0,36] 0.899 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 0.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 143 millis, based on 1.044/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:48/24 0.900 -> Packet A|0|S0|f0f1c2e7fd398dc4|47|1 StreamFrame[0(CIB),0,17,fin] 1.043 loss detection timeout handler running Sending probe 0, because no ack since 0.898. Current RTT: 48/24. 1.044 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.044 (Probe is a handshake retransmit) 1.045 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 287 millis, based on 1.333/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:48/24 1.045 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 1.079 <- (2) Packet A|1|S0|2a4272d8a9bba1b0|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|8d930ca6f831cdf4|7edffe7f32289cfe196ce3a3829fb403] CryptoFrame[0,42] 1.080 State is set to Confirmed reschedule loss detection timer for PTO over 157 millis, based on 1.238/App, because ackElicitingInFlight | RTT:48/24 reschedule loss detection timer for PTO over -11 millis, based on 1.069/App, because ackElicitingInFlight | RTT:48/24 1.081 loss detection timeout handler running 1.081 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 0.900. Current RTT: 48/24. 1.081 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 337 millis, based on 1.420/App, because ackElicitingInFlight | RTT:48/24 1.082 -> Packet PA|1|S0|f0f1c2e7fd398dc4|47|1 StreamFrame[0(CIB),0,17,fin] 1.101 -> Packet A|2|S0|f0f1c2e7fd398dc4|32|1 AckFrame[1|Δ19] 1.115 <- (3) Packet A|2|S0|2a4272d8a9bba1b0|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 1.116 Finished downloading https://server4:443/fxhagjigkn at 37:18.141 on ClientConnection[f7097ef5c3c6db40/2a4272d8a9bba1b0(V1) with server4/193.167.100.100:443] 1.117 Closing ClientConnection[f7097ef5c3c6db40/2a4272d8a9bba1b0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.118 Creating connection with server4:443 with v1 1.118 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 1.118 Setting up connection for downloading https://server4:443/vaewsnznxj at 37:18.143 on ClientConnection[487349d65617bd7e/85520f422c4f9833(V1) with server4/193.167.100.100:443] 1.119 Original destination connection id: 487349d65617bd7e (scid: 85520f422c4f9833) 1.118 -> Packet A|3|S0|f0f1c2e7fd398dc4|56|3 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] StreamFrame[0(CIB),0,17,fin] 1.119 Cwnd(-): 6000; inflight: 0 1.119 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[I|ClientHello] 1.122 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.322/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.121 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.139 -> Packet A|4|S0|f0f1c2e7fd398dc4|32|1 AckFrame[2-1|Δ19] 1.170 <- (4) Packet A|4|S0|2a4272d8a9bba1b0|34|1 AckFrame[3,1|Δ19] 1.172 -> Packet A|5|S0|f0f1c2e7fd398dc4|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 1.321 loss detection timeout handler running Sending probe 0, because no ack since 1.121. Current RTT: 100/25. 1.321 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.322 (Probe is an initial retransmit) 1.322 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.723/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.322 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.357 <- (1) Packet I|1|L|1201|2 Token=[] AckFrame[1-0|Δ0] Padding(1153) 1.358 probe count not reset on ack because handshake not yet confirmed 1.358 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.758/Initial, because peerAwaitingAddressValidation | RTT:100/25 1.364 <- (2) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 1.368 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.471/Handshake, because peerAwaitingAddressValidation | RTT:34/17 1.369 Discarding pn space Initial because first Handshake message is being sent 1.369 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.471/Handshake, because peerAwaitingAddressValidation | RTT:34/17 1.369 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 1.405 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.470 loss detection timeout handler running 1.470 Sending probe 0. Current RTT: 34/17. 1.470 Sending probe because peer awaiting address validation 1.470 (Probe is a handshake ping) 1.471 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 1.676/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.471 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 1.623 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.624 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.675 loss detection timeout handler running Sending probe 1, because no ack since 1.471. Current RTT: 34/17. 1.675 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.675 (Probe is a handshake ping) 1.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 2.084/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.676 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 1.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 2.085/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.677 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 1.709 <- (6) Packet H|3|L|743|1 CryptoFrame[0,697] >- CryptoStream[H|Finished] 1.713 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 2.121/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.713 -> Packet H|3|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.714 Starting downloading https://server4:443/vaewsnznxj at 37:18.739 on ClientConnection[487349d65617bd7e/85520f422c4f9833(V1) with server4/193.167.100.100:443] 1.714 -> Packet H|4|L|46|1 AckFrame[3|Δ0] 1.715 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 2.123/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.715 -> Packet A|0|S0|8753e060a171acdb|47|1 StreamFrame[0(CIB),0,17,fin] 1.748 <- (7) Packet A|1|S0|85520f422c4f9833|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 1.749 probe count not reset on ack because handshake not yet confirmed 1.749 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 2.157/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.749 Finished downloading https://server4:443/vaewsnznxj at 37:18.774 on ClientConnection[487349d65617bd7e/85520f422c4f9833(V1) with server4/193.167.100.100:443] 1.749 Closing ClientConnection[487349d65617bd7e/85520f422c4f9833(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.750 -> Packet A|1|S0|8753e060a171acdb|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 1.750 Creating connection with server4:443 with v1 1.751 Setting up connection for downloading https://server4:443/rauowbjwhg at 37:18.775 on ClientConnection[e394dbff9f23dcd6/95c258c739037501(V1) with server4/193.167.100.100:443] 1.751 Original destination connection id: e394dbff9f23dcd6 (scid: 95c258c739037501) >- CryptoStream[I|ClientHello] 1.753 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.953/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.753 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.782 <- (8) Packet A|2|S0|85520f422c4f9833|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 1.952 loss detection timeout handler running Sending probe 0, because no ack since 1.753. Current RTT: 100/25. 1.952 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.953 (Probe is an initial retransmit) 1.953 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.353/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.953 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.193 Discarding packet (744 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 2.193 Discarding packet (44 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 2.352 loss detection timeout handler running Sending probe 1, because no ack since 1.953. Current RTT: 100/25. 2.353 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.353 (Probe is an initial retransmit) 2.354 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.154/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.354 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.355 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.155/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.354 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.389 <- (3) Packet I|2|L|1201|2 Token=[] AckFrame[3,0|Δ0] Padding(1151) 2.390 probe count not reset on ack because handshake not yet confirmed 2.390 Cwnd(-): 6000; inflight: 1200 2.465 loss detection timeout handler running 2.466 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 2.874/Initial, because peerAwaitingAddressValidation | RTT:34/17 2.794 <- (4) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 2.798 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.900/Handshake, because peerAwaitingAddressValidation | RTT:34/17 2.798 Discarding pn space Initial because first Handshake message is being sent 2.798 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.799 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.901/Handshake, because peerAwaitingAddressValidation | RTT:34/17 2.798 -> Packet I|4|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1153) 2.833 <- (6) Packet H|3|L|744|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 2.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.939/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.837 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.838 Starting downloading https://server4:443/rauowbjwhg at 37:19.862 on ClientConnection[e394dbff9f23dcd6/95c258c739037501(V1) with server4/193.167.100.100:443] 2.838 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 2.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.940/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.838 -> Packet A|0|S0|ad281b62e526369f|47|1 StreamFrame[0(CIB),0,17,fin] 2.940 loss detection timeout handler running Sending probe 0, because no ack since 2.837. Current RTT: 34/17. 2.940 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.940 (Probe is a handshake retransmit) 2.940 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 3.144/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.940 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 2.963 <- (7) Packet H|5|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.964 -> Packet H|3|L|48|1 AckFrame[5,3|Δ0] 3.144 loss detection timeout handler running Sending probe 1, because no ack since 2.838. Current RTT: 34/17. 3.144 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.144 (Probe is a handshake retransmit) 3.144 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 3.552/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.144 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 3.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 3.553/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.145 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 3.149 <- (8) Packet H|6|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.150 <- (9) Packet H|7|L|744|1 CryptoFrame[0,698] 3.150 -> Packet H|6|L|48|1 AckFrame[6-5,3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.150 -> Packet H|7|L|48|1 AckFrame[7-5,3|Δ0] 3.177 <- (10) Packet A|0|S0|95c258c739037501|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|167eb4b0aa750ff5|5a7be08f19d45a3eeaec1285d70370a1] CryptoFrame[0,42] 3.177 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 3.346/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -212 millis, based on 2.965/App, because ackElicitingInFlight | RTT:34/17 3.178 loss detection timeout handler running 3.178 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 2.838. Current RTT: 34/17. 3.178 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 253 millis, based on 3.432/App, because ackElicitingInFlight | RTT:34/17 3.178 -> Packet PA|1|S0|ad281b62e526369f|47|1 StreamFrame[0(CIB),0,17,fin] 3.198 -> Packet A|2|S0|ad281b62e526369f|32|1 AckFrame[0|Δ19] 3.211 <- (11) Packet A|1|S0|95c258c739037501|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 3.212 Cwnd(-): 3000; inflight: 0 3.212 Finished downloading https://server4:443/rauowbjwhg at 37:20.237 on ClientConnection[e394dbff9f23dcd6/95c258c739037501(V1) with server4/193.167.100.100:443] 3.212 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.212 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 3.212 Closing ClientConnection[e394dbff9f23dcd6/95c258c739037501(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.213 -> Packet A|3|S0|ad281b62e526369f|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 3.213 Creating connection with server4:443 with v1 3.213 -> Packet A|4|S0|ad281b62e526369f|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 3.214 Setting up connection for downloading https://server4:443/pssnytncok at 37:20.238 on ClientConnection[22f6d63a7141bf91/3b1c6eff0ff07f76(V1) with server4/193.167.100.100:443] 3.214 Original destination connection id: 22f6d63a7141bf91 (scid: 3b1c6eff0ff07f76) >- CryptoStream[I|ClientHello] 3.216 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.416/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.216 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.245 <- (12) Packet A|2|S0|95c258c739037501|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,1|Δ0] 3.258 <- (1) Packet I|0|L|457|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(282) 3.258 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.459/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.258 <- (1) Packet H|0|L|743|1 CryptoFrame[0,697] 3.262 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 3.383/Handshake, because peerAwaitingAddressValidation | RTT:41/20 3.261 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 3.265 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 3.386/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 3.265 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.266 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 3.387/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 3.266 Discarding pn space Initial because first Handshake message is being sent 3.266 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 3.266 Starting downloading https://server4:443/pssnytncok at 37:20.290 on ClientConnection[22f6d63a7141bf91/3b1c6eff0ff07f76(V1) with server4/193.167.100.100:443] 3.267 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 3.388/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 3.267 -> Packet A|0|S0|4ba820f87eb1e9b6|47|1 StreamFrame[0(CIB),0,17,fin] 3.300 <- (2) Packet A|1|S0|3b1c6eff0ff07f76|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 3.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 3.422/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 3.301 Finished downloading https://server4:443/pssnytncok at 37:20.325 on ClientConnection[22f6d63a7141bf91/3b1c6eff0ff07f76(V1) with server4/193.167.100.100:443] 3.301 Closing ClientConnection[22f6d63a7141bf91/3b1c6eff0ff07f76(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.302 Creating connection with server4:443 with v1 3.302 -> Packet A|1|S0|4ba820f87eb1e9b6|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 3.303 Setting up connection for downloading https://server4:443/dwuxqshavz at 37:20.327 on ClientConnection[1cdaa73ed099910b/c0d25ea468a66fc3(V1) with server4/193.167.100.100:443] 3.303 Original destination connection id: 1cdaa73ed099910b (scid: c0d25ea468a66fc3) >- CryptoStream[I|ClientHello] 3.305 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.505/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.305 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.334 <- (3) Packet A|2|S0|3b1c6eff0ff07f76|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 3.504 loss detection timeout handler running Sending probe 0, because no ack since 3.305. Current RTT: 100/25. 3.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.505 (Probe is an initial retransmit) 3.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.905/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.505 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.746 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 3.751 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.951/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.751 Discarding pn space Initial because first Handshake message is being sent 3.751 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.951/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.751 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 3.785 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.950 loss detection timeout handler running 3.951 Sending probe 0. Current RTT: 100/25. 3.951 Sending probe because peer awaiting address validation 3.951 (Probe is a handshake ping) 3.951 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.351/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.951 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 3.983 <- (3) Packet H|2|L|748|2 AckFrame[0|Δ0] CryptoFrame[0,697] 3.984 probe count not reset on ack because handshake not yet confirmed 3.984 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 191 millis, based on 4.180/Handshake, because ackElicitingInFlight | RTT:32/16 3.988 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.989 Starting downloading https://server4:443/dwuxqshavz at 37:21.013 on ClientConnection[1cdaa73ed099910b/c0d25ea468a66fc3(V1) with server4/193.167.100.100:443] 3.989 -> Packet H|2|L|46|1 AckFrame[2|Δ0] 3.989 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 190 millis, based on 4.180/Handshake, because ackElicitingInFlight | RTT:32/16 3.989 -> Packet A|0|S0|7e5d8faa6521133e|47|1 StreamFrame[0(CIB),0,17,fin] 4.020 <- (4) Packet A|0|S0|c0d25ea468a66fc3|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|85874a8a5410f484|ff07b0db44157226016526acb332d2d1] CryptoFrame[0,42] 4.020 State is set to Confirmed reschedule loss detection timer for PTO over 159 millis, based on 4.180/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 4.110/App, because ackElicitingInFlight | RTT:32/16 4.021 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 4.040 -> Packet A|1|S0|7e5d8faa6521133e|32|1 AckFrame[0|Δ19] 4.110 loss detection timeout handler running Sending probe 0, because no ack since 3.989. Current RTT: 32/16. 4.110 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 4.352/App, because ackElicitingInFlight | RTT:32/16 4.110 -> Packet PA|2|S0|7e5d8faa6521133e|47|1 StreamFrame[0(CIB),0,17,fin] 4.352 loss detection timeout handler running Sending probe 1, because no ack since 4.110. Current RTT: 32/16. 4.352 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 4.836/App, because ackElicitingInFlight | RTT:32/16 4.352 -> Packet PA|3|S0|7e5d8faa6521133e|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 4.837/App, because ackElicitingInFlight | RTT:32/16 4.353 -> Packet PA|4|S0|7e5d8faa6521133e|47|1 StreamFrame[0(CIB),0,17,fin] 4.385 <- (5) Packet A|2|S0|c0d25ea468a66fc3|31|1 AckFrame[4-3|Δ0] 4.385 Cwnd(-): 6000; inflight: 0 4.385 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 4.385 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 104 millis, based on 4.490/App, because ackElicitingInFlight | RTT:32/12 4.385 -> Packet A|5|S0|7e5d8faa6521133e|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 4.436 <- (6) Packet A|4|S0|c0d25ea468a66fc3|32|1 AckFrame[5-3|Δ19] 4.438 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.524 <- (7) Packet A|5|S0|c0d25ea468a66fc3|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|85874a8a5410f484|ff07b0db44157226016526acb332d2d1] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 4.545 -> Packet A|6|S0|7e5d8faa6521133e|34|1 AckFrame[5-4,2|Δ19] 4.835 <- (8) Packet A|6|S0|c0d25ea468a66fc3|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[6|Δ0] MaxStreamsFrame[B,101] 4.836 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.836 Finished downloading https://server4:443/dwuxqshavz at 37:21.861 on ClientConnection[1cdaa73ed099910b/c0d25ea468a66fc3(V1) with server4/193.167.100.100:443] 4.836 Closing ClientConnection[1cdaa73ed099910b/c0d25ea468a66fc3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.837 -> Packet A|7|S0|7e5d8faa6521133e|35|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 4.837 Creating connection with server4:443 with v1 4.838 Setting up connection for downloading https://server4:443/zmfuoiskrp at 37:21.862 on ClientConnection[4ea4c0b071adef78/2b8e2f099d86ecf0(V1) with server4/193.167.100.100:443] 4.838 Original destination connection id: 4ea4c0b071adef78 (scid: 2b8e2f099d86ecf0) >- CryptoStream[I|ClientHello] 4.839 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.039/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.839 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.869 <- (9) Packet A|7|S0|c0d25ea468a66fc3|35|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 4.879 <- (1) Packet I|0|L|457|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(282) 4.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.080/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.884 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.879 <- (1) Packet H|0|L|743|1 CryptoFrame[0,697] reschedule loss detection timer for PTO over 119 millis, based on 5.004/Handshake, because peerAwaitingAddressValidation | RTT:40/20 4.884 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 4.887 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 5.007/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 4.887 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.887 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.887 Starting downloading https://server4:443/zmfuoiskrp at 37:21.912 on ClientConnection[4ea4c0b071adef78/2b8e2f099d86ecf0(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 119 millis, based on 5.007/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 4.887 Discarding pn space Initial because first Handshake message is being sent 4.887 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 4.888 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 5.008/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 4.888 -> Packet A|0|S0|ae979596095c9d22|47|1 StreamFrame[0(CIB),0,17,fin] 4.922 <- (2) Packet A|0|S0|2b8e2f099d86ecf0|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0ebff5ce09e4982f|49a09b1a7a25996644510906dfe6a68d] CryptoFrame[0,42] 4.923 State is set to Confirmed reschedule loss detection timer for PTO over 84 millis, based on 5.007/Handshake, because ackElicitingInFlight | RTT:40/20 reschedule loss detection timer for PTO over 110 millis, based on 5.033/App, because ackElicitingInFlight | RTT:40/20 4.923 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 4.946 -> Packet A|1|S0|ae979596095c9d22|32|1 AckFrame[0|Δ19] 5.033 loss detection timeout handler running Sending probe 0, because no ack since 4.888. Current RTT: 40/20. 5.033 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 289 millis, based on 5.324/App, because ackElicitingInFlight | RTT:40/20 5.034 -> Packet PA|2|S0|ae979596095c9d22|47|1 StreamFrame[0(CIB),0,17,fin] 5.067 <- (3) Packet A|1|S0|2b8e2f099d86ecf0|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 5.068 Cwnd(-): 6000; inflight: 0 5.068 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 5.068 Finished downloading https://server4:443/zmfuoiskrp at 37:22.092 on ClientConnection[4ea4c0b071adef78/2b8e2f099d86ecf0(V1) with server4/193.167.100.100:443] 5.068 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.068 Closing ClientConnection[4ea4c0b071adef78/2b8e2f099d86ecf0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 131 millis, based on 5.200/App, because ackElicitingInFlight | RTT:39/17 5.068 -> Packet A|3|S0|ae979596095c9d22|47|1 StreamFrame[0(CIB),0,17,fin] 5.068 -> Packet A|4|S0|ae979596095c9d22|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 5.069 Creating connection with server4:443 with v1 5.070 Setting up connection for downloading https://server4:443/cytuqwbgrk at 37:22.094 on ClientConnection[03c5231112880e3d/092b613a46ce9093(V1) with server4/193.167.100.100:443] 5.070 Original destination connection id: 03c5231112880e3d (scid: 092b613a46ce9093) >- CryptoStream[I|ClientHello] 5.072 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.272/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.071 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.100 <- (4) Packet A|2|S0|2b8e2f099d86ecf0|36|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ1] 5.271 loss detection timeout handler running Sending probe 0, because no ack since 5.071. Current RTT: 100/25. 5.271 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.271 (Probe is an initial retransmit) 5.272 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.672/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.271 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.312 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(281) 5.313 probe count not reset on ack because handshake not yet confirmed 5.313 Retransmitting CryptoFrame[0,257] on level Initial 5.314 Cwnd(-): 6000; inflight: 0 5.314 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.714/Initial, because peerAwaitingAddressValidation | RTT:100/25 5.314 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 239 millis, based on 5.554/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 5.314 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 5.312 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 5.317 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 239 millis, based on 5.557/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 5.317 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 5.320 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 239 millis, based on 5.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 5.320 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.321 Starting downloading https://server4:443/cytuqwbgrk at 37:22.345 on ClientConnection[03c5231112880e3d/092b613a46ce9093(V1) with server4/193.167.100.100:443] 5.321 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 5.321 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 5.441/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 5.321 Discarding pn space Initial because first Handshake message is being sent 5.321 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 5.441/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 5.321 -> Packet A|0|S0|7df5ed5a28a1a346|47|1 StreamFrame[0(CIB),0,17,fin] 5.440 loss detection timeout handler running Sending probe 0, because no ack since 5.320. Current RTT: 40/20. 5.441 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.441 (Probe is a handshake retransmit) 5.441 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 239 millis, based on 5.681/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 5.441 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 5.681 loss detection timeout handler running Sending probe 1, because no ack since 5.321. Current RTT: 40/20. 5.681 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.681 (Probe is a handshake retransmit) 5.682 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 479 millis, based on 6.162/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 5.681 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 5.682 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 479 millis, based on 6.162/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 5.682 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 5.715 <- (2) Packet A|1|S0|092b613a46ce9093|99|2 NewConnectionIdFrame[1,<0|d24f107af293fc10|9bcbd14685a4d3d0f47428bce81ff4a8] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 5.735 -> Packet A|1|S0|7df5ed5a28a1a346|32|1 AckFrame[1|Δ19] 5.767 <- (3) Packet A|2|S0|092b613a46ce9093|29|2 HandshakeDoneFrame[] Padding(2) 5.768 State is set to Confirmed reschedule loss detection timer for PTO over 133 millis, based on 5.901/App, because ackElicitingInFlight | RTT:40/20 reschedule loss detection timer for PTO over -301 millis, based on 5.466/App, because ackElicitingInFlight | RTT:40/20 5.768 Discarding pn space Handshake because HandshakeDone is received 5.768 loss detection timeout handler running Sending probe 0, because no ack since 5.321. Current RTT: 40/20. 5.768 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 289 millis, based on 6.059/App, because ackElicitingInFlight | RTT:40/20 5.769 -> Packet PA|2|S0|7df5ed5a28a1a346|47|1 StreamFrame[0(CIB),0,17,fin] 5.788 -> Packet A|3|S0|7df5ed5a28a1a346|32|1 AckFrame[2-1|Δ19] 5.802 <- (4) Packet A|3|S0|092b613a46ce9093|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 5.803 Cwnd(-): 3000; inflight: 0 5.803 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.803 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 5.803 Finished downloading https://server4:443/cytuqwbgrk at 37:22.827 on ClientConnection[03c5231112880e3d/092b613a46ce9093(V1) with server4/193.167.100.100:443] 5.803 Closing ClientConnection[03c5231112880e3d/092b613a46ce9093(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.803 -> Packet A|4|S0|7df5ed5a28a1a346|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 5.804 Creating connection with server4:443 with v1 5.804 -> Packet A|5|S0|7df5ed5a28a1a346|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 5.804 Setting up connection for downloading https://server4:443/upkpackirj at 37:22.829 on ClientConnection[ee6e867b6e63dd5c/adaff4f4a4ea87e9(V1) with server4/193.167.100.100:443] 5.805 Original destination connection id: ee6e867b6e63dd5c (scid: adaff4f4a4ea87e9) >- CryptoStream[I|ClientHello] 5.806 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.006/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.806 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.844 <- (1) Packet I|0|L|457|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(282) 5.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.046/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.849 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.844 <- (1) Packet H|0|L|743|1 CryptoFrame[0,697] reschedule loss detection timer for PTO over 113 millis, based on 5.963/Handshake, because peerAwaitingAddressValidation | RTT:38/19 5.849 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 5.852 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 5.966/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 5.852 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.853 Starting downloading https://server4:443/upkpackirj at 37:22.877 on ClientConnection[ee6e867b6e63dd5c/adaff4f4a4ea87e9(V1) with server4/193.167.100.100:443] 5.853 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 5.967/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 5.853 Discarding pn space Initial because first Handshake message is being sent 5.854 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 5.968/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 5.854 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|ca11a6cf5981c711|47|1 StreamFrame[0(CIB),0,17,fin]] 5.884 <- (2) Packet A|0|S0|adaff4f4a4ea87e9|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|fe736d9239610753|f357d25af0bbcb3236b4dc8a1dc327b0] CryptoFrame[0,42] 5.885 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 5.966/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 107 millis, based on 5.993/App, because ackElicitingInFlight | RTT:38/19 5.885 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 5.905 -> Packet A|1|S0|ca11a6cf5981c711|32|1 AckFrame[0|Δ19] 5.940 <- (5) Packet A|4|S0|092b613a46ce9093|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 5.940 -> Packet A|6|S0|7df5ed5a28a1a346|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 5.972 <- (6) Packet A|5|S0|092b613a46ce9093|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 5.992 loss detection timeout handler running Sending probe 0, because no ack since 5.854. Current RTT: 38/19. 5.992 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 6.270/App, because ackElicitingInFlight | RTT:38/19 5.992 -> Packet PA|2|S0|ca11a6cf5981c711|47|1 StreamFrame[0(CIB),0,17,fin] 6.270 loss detection timeout handler running Sending probe 1, because no ack since 5.992. Current RTT: 38/19. 6.270 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 555 millis, based on 6.826/App, because ackElicitingInFlight | RTT:38/19 6.270 -> Packet PA|3|S0|ca11a6cf5981c711|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 555 millis, based on 6.827/App, because ackElicitingInFlight | RTT:38/19 6.271 -> Packet PA|4|S0|ca11a6cf5981c711|47|1 StreamFrame[0(CIB),0,17,fin] 6.292 <- (3) Packet A|3|S0|adaff4f4a4ea87e9|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|fe736d9239610753|f357d25af0bbcb3236b4dc8a1dc327b0] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 6.312 -> Packet A|5|S0|ca11a6cf5981c711|34|1 AckFrame[3,0|Δ19] 6.345 <- (4) Packet A|5|S0|adaff4f4a4ea87e9|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[2|Δ0] MaxStreamsFrame[B,101] 6.346 Cwnd(-): 6000; inflight: 94 6.346 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.346 Finished downloading https://server4:443/upkpackirj at 37:23.370 on ClientConnection[ee6e867b6e63dd5c/adaff4f4a4ea87e9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 64 millis, based on 6.410/App, because ackElicitingInFlight | RTT:38/19 6.346 Closing ClientConnection[ee6e867b6e63dd5c/adaff4f4a4ea87e9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.346 -> Packet A|6|S0|ca11a6cf5981c711|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3,0|Δ0] 6.346 -> Packet A|7|S0|ca11a6cf5981c711|39|2 ConnectionCloseFrame[0|0|] AckFrame[5,3,0|Δ0] 6.347 Creating connection with server4:443 with v1 6.347 Setting up connection for downloading https://server4:443/mxcbofglkf at 37:23.372 on ClientConnection[8768bb6d3eb66cf7/4251500e0de6e3eb(V1) with server4/193.167.100.100:443] 6.347 Original destination connection id: 8768bb6d3eb66cf7 (scid: 4251500e0de6e3eb) >- CryptoStream[I|ClientHello] 6.349 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.549/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.349 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.548 loss detection timeout handler running Sending probe 0, because no ack since 6.349. Current RTT: 100/25. 6.549 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.549 (Probe is an initial retransmit) 6.549 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.949/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.549 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.589 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(281) 6.590 probe count not reset on ack because handshake not yet confirmed 6.590 Retransmitting CryptoFrame[0,257] on level Initial 6.590 Cwnd(-): 6000; inflight: 0 6.590 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.990/Initial, because peerAwaitingAddressValidation | RTT:100/25 6.590 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 239 millis, based on 6.830/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 6.590 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 6.589 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 6.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 239 millis, based on 6.833/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 6.593 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 6.596 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 239 millis, based on 6.836/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 6.596 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.597 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.597 Starting downloading https://server4:443/mxcbofglkf at 37:23.621 on ClientConnection[8768bb6d3eb66cf7/4251500e0de6e3eb(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 119 millis, based on 6.717/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 6.597 Discarding pn space Initial because first Handshake message is being sent 6.597 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 6.597 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 6.718/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 6.597 -> Packet A|0|S0|33b1d9d075244d08|47|1 StreamFrame[0(CIB),0,17,fin] 6.717 loss detection timeout handler running Sending probe 0, because no ack since 6.596. Current RTT: 40/20. 6.717 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.717 (Probe is a handshake retransmit) 6.718 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 239 millis, based on 6.958/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 6.717 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 6.741 <- (5) Packet A|8|S0|adaff4f4a4ea87e9|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|fe736d9239610753|f357d25af0bbcb3236b4dc8a1dc327b0] CryptoFrame[0,42] 6.741 -> Packet A|8|S0|ca11a6cf5981c711|39|2 ConnectionCloseFrame[0|0|] AckFrame[5,3,0|Δ0] 6.773 <- (6) Packet A|9|S0|adaff4f4a4ea87e9|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 6.957 loss detection timeout handler running Sending probe 1, because no ack since 6.597. Current RTT: 40/20. 6.957 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.957 (Probe is a handshake retransmit) 6.957 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 479 millis, based on 7.437/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 6.957 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 6.958 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 479 millis, based on 7.438/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 6.958 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 7.106 <- (2) Packet A|1|S0|4251500e0de6e3eb|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|fe9eb74be0200f92|22b779d22108f900ba6f7c88dc8b28ad] CryptoFrame[0,42] 7.107 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 7.177/App, because ackElicitingInFlight | RTT:40/20 reschedule loss detection timer for PTO over -365 millis, based on 6.742/App, because ackElicitingInFlight | RTT:40/20 7.107 loss detection timeout handler running 7.108 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 6.597. Current RTT: 40/20. 7.108 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 289 millis, based on 7.398/App, because ackElicitingInFlight | RTT:40/20 7.108 -> Packet PA|1|S0|33b1d9d075244d08|47|1 StreamFrame[0(CIB),0,17,fin] 7.127 -> Packet A|2|S0|33b1d9d075244d08|32|1 AckFrame[1|Δ19] 7.159 <- (3) Packet A|3|S0|4251500e0de6e3eb|105|4 HandshakeDoneFrame[] AckFrame[1|Δ0] NewConnectionIdFrame[1,<0|fe9eb74be0200f92|22b779d22108f900ba6f7c88dc8b28ad] CryptoFrame[0,42] 7.160 Cwnd(-): 3000; inflight: 0 7.160 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.160 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 137 millis, based on 7.298/App, because ackElicitingInFlight | RTT:41/18 7.160 -> Packet A|3|S0|33b1d9d075244d08|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 7.179 -> Packet A|4|S0|33b1d9d075244d08|34|1 AckFrame[3,1|Δ19] 7.211 <- (4) Packet A|4|S0|4251500e0de6e3eb|32|1 AckFrame[3-2|Δ19] 7.211 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.575 <- (5) Packet A|7|S0|4251500e0de6e3eb|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 7.575 <- (6) Packet A|8|S0|4251500e0de6e3eb|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 7.576 Finished downloading https://server4:443/mxcbofglkf at 37:24.600 on ClientConnection[8768bb6d3eb66cf7/4251500e0de6e3eb(V1) with server4/193.167.100.100:443] 7.576 Closing ClientConnection[8768bb6d3eb66cf7/4251500e0de6e3eb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.576 -> Packet A|5|S0|33b1d9d075244d08|33|1 AckFrame[8-7,4-3|Δ0] 7.576 -> Packet A|6|S0|33b1d9d075244d08|37|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,4-3|Δ0] 7.577 Creating connection with server4:443 with v1 7.577 Setting up connection for downloading https://server4:443/hqgzpiynwp at 37:24.602 on ClientConnection[32c2b3c9ce43a1e8/c61fa704c7cd90c4(V1) with server4/193.167.100.100:443] 7.577 Original destination connection id: 32c2b3c9ce43a1e8 (scid: c61fa704c7cd90c4) >- CryptoStream[I|ClientHello] 7.579 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.779/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.579 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.778 loss detection timeout handler running Sending probe 0, because no ack since 7.579. Current RTT: 100/25. 7.778 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.778 (Probe is an initial retransmit) 7.779 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.179/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.779 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.019 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 8.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 8.222/Handshake, because peerAwaitingAddressValidation | RTT:100/25 8.022 Discarding pn space Initial because first Handshake message is being sent 8.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 8.222/Handshake, because peerAwaitingAddressValidation | RTT:100/25 8.022 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 8.056 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.221 loss detection timeout handler running 8.222 Sending probe 0. Current RTT: 100/25. 8.222 Sending probe because peer awaiting address validation 8.222 (Probe is a handshake ping) 8.222 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.622/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.222 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 8.254 <- (3) Packet H|2|L|748|2 AckFrame[0|Δ0] CryptoFrame[0,697] 8.256 probe count not reset on ack because handshake not yet confirmed 8.256 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 191 millis, based on 8.450/Handshake, because ackElicitingInFlight | RTT:32/16 8.258 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.259 Starting downloading https://server4:443/hqgzpiynwp at 37:25.284 on ClientConnection[32c2b3c9ce43a1e8/c61fa704c7cd90c4(V1) with server4/193.167.100.100:443] 8.259 -> Packet H|2|L|46|1 AckFrame[2|Δ0] 8.260 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 190 millis, based on 8.450/Handshake, because ackElicitingInFlight | RTT:32/16 8.260 -> Packet A|0|S0|68d965eb69afe621|47|1 StreamFrame[0(CIB),0,17,fin] 8.293 <- (4) Packet A|1|S0|c61fa704c7cd90c4|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] reschedule loss detection timer for PTO over 60 millis, based on 8.354/Handshake, because ackElicitingInFlight | RTT:32/16 8.294 Finished downloading https://server4:443/hqgzpiynwp at 37:25.318 on ClientConnection[32c2b3c9ce43a1e8/c61fa704c7cd90c4(V1) with server4/193.167.100.100:443] 8.294 Closing ClientConnection[32c2b3c9ce43a1e8/c61fa704c7cd90c4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.295 -> Packet A|1|S0|68d965eb69afe621|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 8.295 Creating connection with server4:443 with v1 8.295 Setting up connection for downloading https://server4:443/chqyahvfvh at 37:25.320 on ClientConnection[3b917d4a0063af31/7ab0c993ebcafcd1(V1) with server4/193.167.100.100:443] 8.296 Original destination connection id: 3b917d4a0063af31 (scid: 7ab0c993ebcafcd1) >- CryptoStream[I|ClientHello] 8.297 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.497/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.297 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.326 <- (5) Packet A|2|S0|c61fa704c7cd90c4|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 8.496 loss detection timeout handler running Sending probe 0, because no ack since 8.297. Current RTT: 100/25. 8.497 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.497 (Probe is an initial retransmit) 8.497 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.897/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.497 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.897 loss detection timeout handler running Sending probe 1, because no ack since 8.497. Current RTT: 100/25. 8.897 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.897 (Probe is an initial retransmit) 8.898 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.698/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.897 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.898 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.698/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.898 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.937 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] Padding(280) 8.938 probe count not reset on ack because handshake not yet confirmed 8.938 Retransmitting CryptoFrame[0,257] on level Initial 8.938 Cwnd(-): 6000; inflight: 1200 8.938 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.738/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.938 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 459 millis, based on 9.398/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 8.938 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 8.937 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 8.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 459 millis, based on 9.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 8.941 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 8.944 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 459 millis, based on 9.404/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 8.944 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.944 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.944 Starting downloading https://server4:443/chqyahvfvh at 37:25.969 on ClientConnection[3b917d4a0063af31/7ab0c993ebcafcd1(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 114 millis, based on 9.059/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 8.944 Discarding pn space Initial because first Handshake message is being sent 8.945 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.944 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 8.945 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 9.060/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 8.945 -> Packet A|0|S0|dd1565faffc7878b|47|1 StreamFrame[0(CIB),0,17,fin] 8.971 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.976 <- (4) Packet A|0|S0|7ab0c993ebcafcd1|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|bb510db7756861ed|cb7a04bd4f4e3c6b2fc3341b0882a981] CryptoFrame[0,42] 8.976 State is set to Confirmed reschedule loss detection timer for PTO over 82 millis, based on 9.059/Handshake, because ackElicitingInFlight | RTT:39/19 reschedule loss detection timer for PTO over 108 millis, based on 9.085/App, because ackElicitingInFlight | RTT:39/19 8.977 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 8.978 <- (5) Packet A|1|S0|7ab0c993ebcafcd1|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 8.978 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.978 Finished downloading https://server4:443/chqyahvfvh at 37:26.002 on ClientConnection[3b917d4a0063af31/7ab0c993ebcafcd1(V1) with server4/193.167.100.100:443] 8.978 Closing ClientConnection[3b917d4a0063af31/7ab0c993ebcafcd1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.978 -> Packet A|1|S0|dd1565faffc7878b|32|1 AckFrame[1-0|Δ1] 8.979 -> Packet A|2|S0|dd1565faffc7878b|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 8.979 Creating connection with server4:443 with v1 8.980 Setting up connection for downloading https://server4:443/pmggnelzym at 37:26.004 on ClientConnection[89db9d40deb83577/0959fccdec4cd85f(V1) with server4/193.167.100.100:443] 8.980 Original destination connection id: 89db9d40deb83577 (scid: 0959fccdec4cd85f) >- CryptoStream[I|ClientHello] 8.981 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.181/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.981 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.010 <- (6) Packet A|2|S0|7ab0c993ebcafcd1|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 9.181 loss detection timeout handler running Sending probe 0, because no ack since 8.981. Current RTT: 100/25. 9.181 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.181 (Probe is an initial retransmit) 9.181 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.581/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.181 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.222 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(280) 9.223 probe count not reset on ack because handshake not yet confirmed 9.223 Retransmitting CryptoFrame[0,257] on level Initial 9.223 Cwnd(-): 6000; inflight: 0 9.223 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.623/Initial, because peerAwaitingAddressValidation | RTT:100/25 9.223 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 239 millis, based on 9.463/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 9.223 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 9.222 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 9.226 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 239 millis, based on 9.466/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 9.226 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 9.229 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 239 millis, based on 9.469/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 9.228 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.229 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.229 Starting downloading https://server4:443/pmggnelzym at 37:26.253 on ClientConnection[89db9d40deb83577/0959fccdec4cd85f(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 119 millis, based on 9.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 9.229 Discarding pn space Initial because first Handshake message is being sent 9.229 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 9.230 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 9.350/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 9.230 -> Packet A|0|S0|95634c7194147e3c|47|1 StreamFrame[0(CIB),0,17,fin] 9.263 <- (2) Packet A|1|S0|0959fccdec4cd85f|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 9.264 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 9.384/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 9.264 Finished downloading https://server4:443/pmggnelzym at 37:26.288 on ClientConnection[89db9d40deb83577/0959fccdec4cd85f(V1) with server4/193.167.100.100:443] 9.264 Closing ClientConnection[89db9d40deb83577/0959fccdec4cd85f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.264 Creating connection with server4:443 with v1 9.265 -> Packet A|1|S0|95634c7194147e3c|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 9.265 Setting up connection for downloading https://server4:443/irhodizkej at 37:26.290 on ClientConnection[b1eacd6db192180d/5aa04a2a83bd3470(V1) with server4/193.167.100.100:443] 9.265 Original destination connection id: b1eacd6db192180d (scid: 5aa04a2a83bd3470) >- CryptoStream[I|ClientHello] 9.267 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.467/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.267 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.296 <- (3) Packet A|2|S0|0959fccdec4cd85f|35|2 ConnectionCloseFrame[0|0|] AckFrame[0|Δ0] 9.466 loss detection timeout handler running Sending probe 0, because no ack since 9.267. Current RTT: 100/25. 9.466 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.466 (Probe is an initial retransmit) 9.467 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.867/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.467 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.866 loss detection timeout handler running Sending probe 1, because no ack since 9.467. Current RTT: 100/25. 9.866 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.866 (Probe is an initial retransmit) 9.867 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.667/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.867 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.868 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.668/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.868 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.907 <- (1) Packet I|1|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1153) 9.908 probe count not reset on ack because handshake not yet confirmed 9.908 Retransmitting CryptoFrame[0,257] on level Initial 9.908 Cwnd(-): 6000; inflight: 0 9.908 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.708/Initial, because peerAwaitingAddressValidation | RTT:100/25 9.908 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 459 millis, based on 10.368/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 9.908 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.106 <- (2) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 10.110 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 10.225/Handshake, because peerAwaitingAddressValidation | RTT:39/19 10.110 Discarding pn space Initial because first Handshake message is being sent 10.110 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 10.225/Handshake, because peerAwaitingAddressValidation | RTT:39/19 10.110 -> Packet I|5|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1151) 10.144 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.144 <- (4) Packet H|1|L|744|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 10.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 10.263/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 10.147 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.148 Starting downloading https://server4:443/irhodizkej at 37:27.172 on ClientConnection[b1eacd6db192180d/5aa04a2a83bd3470(V1) with server4/193.167.100.100:443] 10.148 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 10.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 10.264/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 10.148 -> Packet A|0|S0|254d86564c2f9481|47|1 StreamFrame[0(CIB),0,17,fin] 10.180 <- (5) Packet A|0|S0|5aa04a2a83bd3470|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|867c14054ba4ef48|91aaae56bd979d7793f09dcb79270771] CryptoFrame[0,42] 10.180 State is set to Confirmed reschedule loss detection timer for PTO over 82 millis, based on 10.262/Handshake, because ackElicitingInFlight | RTT:39/19 reschedule loss detection timer for PTO over 108 millis, based on 10.288/App, because ackElicitingInFlight | RTT:39/19 10.180 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 10.181 <- (6) Packet A|1|S0|5aa04a2a83bd3470|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 10.182 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.182 Finished downloading https://server4:443/irhodizkej at 37:27.206 on ClientConnection[b1eacd6db192180d/5aa04a2a83bd3470(V1) with server4/193.167.100.100:443] 10.182 Closing ClientConnection[b1eacd6db192180d/5aa04a2a83bd3470(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.182 -> Packet A|1|S0|254d86564c2f9481|32|1 AckFrame[1-0|Δ1] 10.183 Creating connection with server4:443 with v1 10.183 -> Packet A|2|S0|254d86564c2f9481|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 10.183 Setting up connection for downloading https://server4:443/wflouvnmhd at 37:27.208 on ClientConnection[be4f6ee2fcc5c0b5/d0c788b9064851a4(V1) with server4/193.167.100.100:443] 10.183 Original destination connection id: be4f6ee2fcc5c0b5 (scid: d0c788b9064851a4) >- CryptoStream[I|ClientHello] 10.185 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.385/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.185 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.223 <- (1) Packet I|0|L|457|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(282) 10.224 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.424/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.223 <- (1) Packet H|0|L|743|1 CryptoFrame[0,697] 10.227 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 10.341/Handshake, because peerAwaitingAddressValidation | RTT:38/19 10.227 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 10.229 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 10.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 10.229 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.230 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 10.344/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 10.230 Starting downloading https://server4:443/wflouvnmhd at 37:27.254 on ClientConnection[be4f6ee2fcc5c0b5/d0c788b9064851a4(V1) with server4/193.167.100.100:443] 10.230 Discarding pn space Initial because first Handshake message is being sent 10.230 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 10.230 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 10.344/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 10.230 -> Packet A|0|S0|a73fdfa0ef923a1b|47|1 StreamFrame[0(CIB),0,17,fin] 10.261 <- (2) Packet A|0|S0|d0c788b9064851a4|29|2 HandshakeDoneFrame[] Padding(2) 10.262 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 10.343/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 107 millis, based on 10.369/App, because ackElicitingInFlight | RTT:38/19 10.262 Discarding pn space Handshake because HandshakeDone is received 10.262 <- (3) Packet A|1|S0|d0c788b9064851a4|99|2 NewConnectionIdFrame[1,<0|ec739e9679bd7d66|5c9ed682af65010f1432fc4cddc42edb] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 10.263 -> Packet A|1|S0|a73fdfa0ef923a1b|31|1 AckFrame[1-0|Δ0] 10.263 <- (4) Packet A|2|S0|d0c788b9064851a4|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 10.264 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.264 Finished downloading https://server4:443/wflouvnmhd at 37:27.288 on ClientConnection[be4f6ee2fcc5c0b5/d0c788b9064851a4(V1) with server4/193.167.100.100:443] 10.264 Closing ClientConnection[be4f6ee2fcc5c0b5/d0c788b9064851a4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.264 Creating connection with server4:443 with v1 10.264 -> Packet A|2|S0|a73fdfa0ef923a1b|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 10.265 Setting up connection for downloading https://server4:443/gfarrejfmq at 37:27.289 on ClientConnection[40283acb08785687/e0e4e903e1f3cb45(V1) with server4/193.167.100.100:443] 10.265 Original destination connection id: 40283acb08785687 (scid: e0e4e903e1f3cb45) >- CryptoStream[I|ClientHello] 10.266 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.466/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.266 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.466 loss detection timeout handler running Sending probe 0, because no ack since 10.266. Current RTT: 100/25. 10.466 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.466 (Probe is an initial retransmit) 10.466 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.866/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.466 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.500 <- (1) Packet I|1|L|1201|2 Token=[] AckFrame[1-0|Δ0] Padding(1153) 10.500 probe count not reset on ack because handshake not yet confirmed 10.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.901/Initial, because peerAwaitingAddressValidation | RTT:100/25 10.704 Discarding packet (744 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 10.900 loss detection timeout handler running Sending probe 1, because no ack since 10.466. Current RTT: 33/16. 10.900 Sending probe because peer awaiting address validation 10.900 (Probe is Initial ping, because there is no Initial data to retransmit) 10.901 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 11.289/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.901 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 10.934 <- (3) Packet I|3|L|1201|2 Token=[] AckFrame[2-0|Δ0] Padding(1153) 10.935 probe count not reset on ack because handshake not yet confirmed 10.935 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 11.323/Initial, because peerAwaitingAddressValidation | RTT:33/16 11.304 <- (4) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 11.307 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 11.388/Handshake, because peerAwaitingAddressValidation | RTT:33/12 11.307 Discarding pn space Initial because first Handshake message is being sent 11.307 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 11.388/Handshake, because peerAwaitingAddressValidation | RTT:33/12 11.307 -> Packet I|3|L|1201|2 Token=[] AckFrame[4-3,1|Δ0] Padding(1151) 11.387 loss detection timeout handler running 11.388 Sending probe 0. Current RTT: 33/12. 11.388 Sending probe because peer awaiting address validation 11.388 (Probe is a handshake ping) 11.388 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 161 millis, based on 11.550/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 11.388 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 11.421 <- (5) Packet H|3|L|749|2 AckFrame[0|Δ0] CryptoFrame[0,698] 11.421 probe count not reset on ack because handshake not yet confirmed 11.421 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 137 millis, based on 11.562/Handshake, because ackElicitingInFlight | RTT:33/9 11.424 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.425 Starting downloading https://server4:443/gfarrejfmq at 37:28.449 on ClientConnection[40283acb08785687/e0e4e903e1f3cb45(V1) with server4/193.167.100.100:443] 11.425 -> Packet H|2|L|46|1 AckFrame[3|Δ0] 11.425 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 136 millis, based on 11.562/Handshake, because ackElicitingInFlight | RTT:33/9 11.425 -> Packet A|0|S0|c40c57aa31386d2d|47|1 StreamFrame[0(CIB),0,17,fin] 11.561 loss detection timeout handler running Sending probe 1, because no ack since 11.424. Current RTT: 33/9. 11.561 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 11.562 (Probe is a handshake retransmit) 11.562 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 275 millis, based on 11.838/Handshake, because ackElicitingInFlight | RTT:33/9 11.562 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 11.563 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 275 millis, based on 11.839/Handshake, because ackElicitingInFlight | RTT:33/9 11.563 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 11.595 <- (6) Packet A|0|S0|e0e4e903e1f3cb45|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4d9d1c81d551d744|b3f25bf30a72bf920b1500e152d93170] CryptoFrame[0,42] 11.595 State is set to Confirmed reschedule loss detection timer for PTO over 205 millis, based on 11.801/App, because ackElicitingInFlight | RTT:33/9 reschedule loss detection timer for PTO over -76 millis, based on 11.519/App, because ackElicitingInFlight | RTT:33/9 11.596 Discarding pn space Handshake because HandshakeDone is received 11.596 loss detection timeout handler running Sending probe 0, because no ack since 11.425. Current RTT: 33/9. 11.596 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 187 millis, based on 11.784/App, because ackElicitingInFlight | RTT:33/9 11.596 -> Packet PA|1|S0|c40c57aa31386d2d|47|1 StreamFrame[0(CIB),0,17,fin] 11.616 -> Packet A|2|S0|c40c57aa31386d2d|32|1 AckFrame[0|Δ19] 11.783 loss detection timeout handler running Sending probe 1, because no ack since 11.596. Current RTT: 33/9. 11.784 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 375 millis, based on 12.160/App, because ackElicitingInFlight | RTT:33/9 11.784 -> Packet PA|3|S0|c40c57aa31386d2d|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 375 millis, based on 12.161/App, because ackElicitingInFlight | RTT:33/9 11.785 -> Packet PA|4|S0|c40c57aa31386d2d|47|1 StreamFrame[0(CIB),0,17,fin] 11.835 <- (7) Packet A|2|S0|e0e4e903e1f3cb45|34|1 AckFrame[3,1|Δ19] 11.836 Cwnd(-): 6000; inflight: 47 11.836 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 42 millis, based on 11.879/App, because ackElicitingInFlight | RTT:33/9 reschedule loss detection timer for PTO over 85 millis, based on 11.922/App, because ackElicitingInFlight | RTT:33/7 11.836 -> Packet A|5|S0|c40c57aa31386d2d|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 11.887 <- (8) Packet A|4|S0|e0e4e903e1f3cb45|36|1 AckFrame[5,3,1|Δ19] 11.888 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.079 <- (9) Packet A|5|S0|e0e4e903e1f3cb45|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 12.080 Finished downloading https://server4:443/gfarrejfmq at 37:29.104 on ClientConnection[40283acb08785687/e0e4e903e1f3cb45(V1) with server4/193.167.100.100:443] 12.080 Closing ClientConnection[40283acb08785687/e0e4e903e1f3cb45(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.080 -> Packet A|6|S0|c40c57aa31386d2d|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 12.081 Creating connection with server4:443 with v1 12.081 Setting up connection for downloading https://server4:443/kblmeoaqkh at 37:29.106 on ClientConnection[6f42c8842bad3d24/703b2171a8b3bc0f(V1) with server4/193.167.100.100:443] 12.081 Original destination connection id: 6f42c8842bad3d24 (scid: 703b2171a8b3bc0f) >- CryptoStream[I|ClientHello] 12.083 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.283/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.083 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.121 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 12.121 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.321/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.121 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 12.124 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 12.233/Handshake, because peerAwaitingAddressValidation | RTT:37/18 12.124 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 12.127 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 12.236/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.127 -> Packet H|0|L|80|1 CryptoFrame[0,36] 12.127 Starting downloading https://server4:443/kblmeoaqkh at 37:29.151 on ClientConnection[6f42c8842bad3d24/703b2171a8b3bc0f(V1) with server4/193.167.100.100:443] 12.127 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 12.236/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 12.127 Discarding pn space Initial because first Handshake message is being sent 12.127 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.128 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 12.237/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 12.128 -> Packet A|0|S0|9efc2e61fa48bb8f|47|1 StreamFrame[0(CIB),0,17,fin] 12.236 loss detection timeout handler running Sending probe 0, because no ack since 12.127. Current RTT: 37/18. 12.236 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.236 (Probe is a handshake retransmit) 12.236 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 12.454/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 12.236 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 12.291 <- (2) Packet A|1|S0|703b2171a8b3bc0f|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|55f7a402d007320d|a47698b40487e2dffea13729e3d32699] CryptoFrame[0,42] 12.292 State is set to Confirmed reschedule loss detection timer for PTO over 103 millis, based on 12.396/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -30 millis, based on 12.262/App, because ackElicitingInFlight | RTT:37/18 12.292 Discarding pn space Handshake because HandshakeDone is received 12.292 loss detection timeout handler running Sending probe 0, because no ack since 12.128. Current RTT: 37/18. 12.292 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 267 millis, based on 12.561/App, because ackElicitingInFlight | RTT:37/18 12.293 -> Packet PA|1|S0|9efc2e61fa48bb8f|47|1 StreamFrame[0(CIB),0,17,fin] 12.312 -> Packet A|2|S0|9efc2e61fa48bb8f|32|1 AckFrame[1|Δ19] 12.326 <- (3) Packet A|2|S0|703b2171a8b3bc0f|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 12.326 Cwnd(-): 6000; inflight: 0 12.326 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.326 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.326 Finished downloading https://server4:443/kblmeoaqkh at 37:29.351 on ClientConnection[6f42c8842bad3d24/703b2171a8b3bc0f(V1) with server4/193.167.100.100:443] 12.326 Closing ClientConnection[6f42c8842bad3d24/703b2171a8b3bc0f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.326 -> Packet A|3|S0|9efc2e61fa48bb8f|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 12.327 -> Packet A|4|S0|9efc2e61fa48bb8f|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 12.327 Creating connection with server4:443 with v1 12.328 Setting up connection for downloading https://server4:443/mhjouontrj at 37:29.352 on ClientConnection[15d460fccf42b685/2034f6a44f9e8328(V1) with server4/193.167.100.100:443] 12.328 Original destination connection id: 15d460fccf42b685 (scid: 2034f6a44f9e8328) >- CryptoStream[I|ClientHello] 12.329 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.529/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.329 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.359 <- (4) Packet A|4|S0|703b2171a8b3bc0f|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,1|Δ0] 12.367 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 12.368 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.568/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.367 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 12.371 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.485/Handshake, because peerAwaitingAddressValidation | RTT:38/19 12.371 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 12.373 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.487/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 12.373 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.373 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.487/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 12.373 Starting downloading https://server4:443/mhjouontrj at 37:29.398 on ClientConnection[15d460fccf42b685/2034f6a44f9e8328(V1) with server4/193.167.100.100:443] 12.373 Discarding pn space Initial because first Handshake message is being sent 12.374 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.374 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.488/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 12.374 -> Packet A|0|S0|6f30ee1b17797ddf|47|1 StreamFrame[0(CIB),0,17,fin] 12.405 <- (2) Packet A|0|S0|2034f6a44f9e8328|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a7814ba68923221c|345c60e54d0224ef1f02d9fb489b39b4] CryptoFrame[0,42] 12.406 State is set to Confirmed reschedule loss detection timer for PTO over 80 millis, based on 12.487/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 106 millis, based on 12.513/App, because ackElicitingInFlight | RTT:38/19 12.406 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 12.426 -> Packet A|1|S0|6f30ee1b17797ddf|32|1 AckFrame[0|Δ19] 12.512 loss detection timeout handler running Sending probe 0, because no ack since 12.374. Current RTT: 38/19. 12.512 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 12.791/App, because ackElicitingInFlight | RTT:38/19 12.513 -> Packet PA|2|S0|6f30ee1b17797ddf|47|1 StreamFrame[0(CIB),0,17,fin] 12.546 <- (3) Packet A|1|S0|2034f6a44f9e8328|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 12.547 Finished downloading https://server4:443/mhjouontrj at 37:29.571 on ClientConnection[15d460fccf42b685/2034f6a44f9e8328(V1) with server4/193.167.100.100:443] 12.547 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.547 Closing ClientConnection[15d460fccf42b685/2034f6a44f9e8328(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.547 Cwnd(-): 6000; inflight: 0 12.547 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.547 -> Packet A|3|S0|6f30ee1b17797ddf|47|1 StreamFrame[0(CIB),0,17,fin] 12.547 -> Packet A|4|S0|6f30ee1b17797ddf|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 12.548 Creating connection with server4:443 with v1 12.548 Setting up connection for downloading https://server4:443/zgnlvcszzt at 37:29.573 on ClientConnection[2f4e23f458f3095c/13b042c3a2bd01e1(V1) with server4/193.167.100.100:443] 12.548 Original destination connection id: 2f4e23f458f3095c (scid: 13b042c3a2bd01e1) >- CryptoStream[I|ClientHello] 12.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.750/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.550 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.589 <- (1) Packet I|0|L|457|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(282) 12.589 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.789/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.589 <- (1) Packet H|0|L|743|1 CryptoFrame[0,697] 12.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.707/Handshake, because peerAwaitingAddressValidation | RTT:38/19 12.592 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 12.596 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.710/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.597 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 12.597 Discarding pn space Initial because first Handshake message is being sent 12.596 -> Packet H|0|L|80|1 CryptoFrame[0,36] 12.597 Starting downloading https://server4:443/zgnlvcszzt at 37:29.621 on ClientConnection[2f4e23f458f3095c/13b042c3a2bd01e1(V1) with server4/193.167.100.100:443] 12.597 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.597 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 12.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 12.597 -> Packet A|0|S0|02af77b8beb64ac6|47|1 StreamFrame[0(CIB),0,17,fin] 12.711 loss detection timeout handler running Sending probe 0, because no ack since 12.596. Current RTT: 38/19. 12.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.711 (Probe is a handshake retransmit) 12.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 12.939/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 12.711 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 12.853 <- (2) Packet A|1|S0|13b042c3a2bd01e1|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f10c87e337f1d67d|5e0b1c95cb453099f5331870c1cfa414] CryptoFrame[0,42] 12.854 State is set to Confirmed reschedule loss detection timer for PTO over 21 millis, based on 12.875/App, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over -118 millis, based on 12.736/App, because ackElicitingInFlight | RTT:38/19 12.854 Discarding pn space Handshake because HandshakeDone is received 12.854 loss detection timeout handler running Sending probe 0, because no ack since 12.597. Current RTT: 38/19. 12.854 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 277 millis, based on 13.133/App, because ackElicitingInFlight | RTT:38/19 12.855 -> Packet PA|1|S0|02af77b8beb64ac6|47|1 StreamFrame[0(CIB),0,17,fin] 12.874 -> Packet A|2|S0|02af77b8beb64ac6|32|1 AckFrame[1|Δ19] 13.132 loss detection timeout handler running Sending probe 1, because no ack since 12.855. Current RTT: 38/19. 13.132 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 555 millis, based on 13.688/App, because ackElicitingInFlight | RTT:38/19 13.132 -> Packet PA|3|S0|02af77b8beb64ac6|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 555 millis, based on 13.689/App, because ackElicitingInFlight | RTT:38/19 13.133 -> Packet PA|4|S0|02af77b8beb64ac6|47|1 StreamFrame[0(CIB),0,17,fin] 13.338 <- (3) Packet A|4|S0|13b042c3a2bd01e1|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f10c87e337f1d67d|5e0b1c95cb453099f5331870c1cfa414] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 13.357 -> Packet A|5|S0|02af77b8beb64ac6|34|1 AckFrame[4,1|Δ19] 13.390 <- (4) Packet A|5|S0|13b042c3a2bd01e1|1137|6 HandshakeDoneFrame[] AckFrame[1|Δ0] NewConnectionIdFrame[1,<0|f10c87e337f1d67d|5e0b1c95cb453099f5331870c1cfa414] CryptoFrame[0,42] StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 13.390 Cwnd(-): 6000; inflight: 94 13.391 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over -118 millis, based on 13.272/App, because ackElicitingInFlight | RTT:38/19 13.391 loss detection timeout handler running Sending probe 0, because no ack since 13.133. Current RTT: 100/139. 13.391 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1361 millis, based on 14.753/App, because ackElicitingInFlight | RTT:100/139 -< CryptoStream[A|NewSessionTicket] 13.391 -> Packet A|6|S0|02af77b8beb64ac6|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4,1|Δ0] 13.391 Finished downloading https://server4:443/zgnlvcszzt at 37:30.415 on ClientConnection[2f4e23f458f3095c/13b042c3a2bd01e1(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 1361 millis, based on 14.753/App, because ackElicitingInFlight | RTT:100/139 13.391 Closing ClientConnection[2f4e23f458f3095c/13b042c3a2bd01e1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.391 -> Packet PA|7|S0|02af77b8beb64ac6|47|1 StreamFrame[0(CIB),0,17,fin] 13.392 -> Packet A|8|S0|02af77b8beb64ac6|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,1|Δ0] 13.392 Creating connection with server4:443 with v1 13.393 Setting up connection for downloading https://server4:443/dofvyilcny at 37:30.417 on ClientConnection[a640feab31e61d8e/0573f9e32c0c3102(V1) with server4/193.167.100.100:443] 13.393 Original destination connection id: a640feab31e61d8e (scid: 0573f9e32c0c3102) >- CryptoStream[I|ClientHello] 13.395 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.595/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.394 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.432 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 13.433 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.633/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.432 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 13.436 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 13.550/Handshake, because peerAwaitingAddressValidation | RTT:38/19 13.436 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 13.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 13.552/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 13.438 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.438 Starting downloading https://server4:443/dofvyilcny at 37:30.463 on ClientConnection[a640feab31e61d8e/0573f9e32c0c3102(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 113 millis, based on 13.552/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 13.438 Discarding pn space Initial because first Handshake message is being sent 13.438 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 13.439 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 13.553/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 13.439 -> Packet A|0|S0|df5739ad7f17d65b|47|1 StreamFrame[0(CIB),0,17,fin] 13.552 loss detection timeout handler running Sending probe 0, because no ack since 13.438. Current RTT: 38/19. 13.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.552 (Probe is a handshake retransmit) 13.553 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 13.781/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 13.552 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 13.584 <- (2) Packet A|0|S0|0573f9e32c0c3102|29|2 HandshakeDoneFrame[] Padding(2) 13.585 State is set to Confirmed reschedule loss detection timer for PTO over 131 millis, based on 13.717/App, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over -7 millis, based on 13.578/App, because ackElicitingInFlight | RTT:38/19 13.585 loss detection timeout handler running 13.585 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 13.439. Current RTT: 38/19. 13.585 (Probe is retransmit on level App) 13.585 <- (3) Packet A|1|S0|0573f9e32c0c3102|99|2 NewConnectionIdFrame[1,<0|2f80feaacb2afff4|5ca17d398dfff40f3ae610c624d61c5e] CryptoFrame[0,42] reschedule loss detection timer for PTO over 277 millis, based on 13.863/App, because ackElicitingInFlight | RTT:38/19 13.585 -> Packet PA|1|S0|df5739ad7f17d65b|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 13.586 -> Packet A|2|S0|df5739ad7f17d65b|31|1 AckFrame[1-0|Δ0] 13.863 loss detection timeout handler running Sending probe 1, because no ack since 13.585. Current RTT: 38/19. 13.863 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 555 millis, based on 14.419/App, because ackElicitingInFlight | RTT:38/19 13.863 -> Packet PA|3|S0|df5739ad7f17d65b|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 555 millis, based on 14.420/App, because ackElicitingInFlight | RTT:38/19 13.864 -> Packet PA|4|S0|df5739ad7f17d65b|47|1 StreamFrame[0(CIB),0,17,fin] 14.017 <- (4) Packet A|4|S0|0573f9e32c0c3102|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 14.018 Finished downloading https://server4:443/dofvyilcny at 37:31.042 on ClientConnection[a640feab31e61d8e/0573f9e32c0c3102(V1) with server4/193.167.100.100:443] 14.018 Closing ClientConnection[a640feab31e61d8e/0573f9e32c0c3102(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.018 Creating connection with server4:443 with v1 14.018 -> Packet A|5|S0|df5739ad7f17d65b|37|2 ConnectionCloseFrame[0|0|] AckFrame[4,1-0|Δ0] 14.019 Setting up connection for downloading https://server4:443/xpjchwwqsq at 37:31.043 on ClientConnection[508f721b86a13358/9ae846139cd1ff6b(V1) with server4/193.167.100.100:443] 14.019 Original destination connection id: 508f721b86a13358 (scid: 9ae846139cd1ff6b) >- CryptoStream[I|ClientHello] 14.021 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.221/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.020 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.050 <- (5) Packet A|5|S0|0573f9e32c0c3102|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 14.059 <- (1) Packet I|0|L|457|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(282) 14.059 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.259/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.059 <- (1) Packet H|0|L|743|1 CryptoFrame[0,697] 14.063 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 14.177/Handshake, because peerAwaitingAddressValidation | RTT:38/19 14.063 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 14.066 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 14.180/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 14.066 -> Packet H|0|L|80|1 CryptoFrame[0,36] >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.067 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 14.181/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 14.067 Discarding pn space Initial because first Handshake message is being sent 14.067 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 14.067 Starting downloading https://server4:443/xpjchwwqsq at 37:31.091 on ClientConnection[508f721b86a13358/9ae846139cd1ff6b(V1) with server4/193.167.100.100:443] 14.067 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 14.181/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 14.067 -> Packet A|0|S0|de4160eaf38a2454|47|1 StreamFrame[0(CIB),0,17,fin] 14.098 <- (2) Packet A|0|S0|9ae846139cd1ff6b|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c703aef266058013|24a07855f87c77c3079db83039007883] CryptoFrame[0,42] 14.098 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 14.180/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 107 millis, based on 14.206/App, because ackElicitingInFlight | RTT:38/19 14.098 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 14.100 <- (3) Packet A|1|S0|9ae846139cd1ff6b|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 14.101 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.101 Finished downloading https://server4:443/xpjchwwqsq at 37:31.125 on ClientConnection[508f721b86a13358/9ae846139cd1ff6b(V1) with server4/193.167.100.100:443] 14.101 Closing ClientConnection[508f721b86a13358/9ae846139cd1ff6b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.101 -> Packet A|1|S0|de4160eaf38a2454|32|1 AckFrame[1-0|Δ1] 14.101 -> Packet A|2|S0|de4160eaf38a2454|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 14.101 Creating connection with server4:443 with v1 14.102 Setting up connection for downloading https://server4:443/ppjqemcpbd at 37:31.126 on ClientConnection[e8f8378e28cbba4d/420712b21913fe95(V1) with server4/193.167.100.100:443] 14.102 Original destination connection id: e8f8378e28cbba4d (scid: 420712b21913fe95) >- CryptoStream[I|ClientHello] 14.103 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.303/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.103 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.142 <- (1) Packet I|0|L|457|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(282) 14.143 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.343/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.142 <- (1) Packet H|0|L|743|1 CryptoFrame[0,697] 14.146 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 14.261/Handshake, because peerAwaitingAddressValidation | RTT:38/19 14.146 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 14.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 14.262/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 14.148 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 14.262/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 14.148 Discarding pn space Initial because first Handshake message is being sent 14.148 Starting downloading https://server4:443/ppjqemcpbd at 37:31.173 on ClientConnection[e8f8378e28cbba4d/420712b21913fe95(V1) with server4/193.167.100.100:443] 14.148 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 14.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 14.263/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 14.149 -> Packet A|0|S0|7b1f71d075cfa961|47|1 StreamFrame[0(CIB),0,17,fin] 14.180 <- (2) Packet A|0|S0|420712b21913fe95|55|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0b1fc8468f46c902|35928600467de0952e85eb3845664011] 14.181 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 14.262/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 107 millis, based on 14.288/App, because ackElicitingInFlight | RTT:38/19 14.181 Discarding pn space Handshake because HandshakeDone is received 14.180 <- (3) Packet A|1|S0|420712b21913fe95|71|1 CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 14.181 -> Packet A|1|S0|7b1f71d075cfa961|31|1 AckFrame[1-0|Δ0] 14.288 loss detection timeout handler running Sending probe 0, because no ack since 14.149. Current RTT: 38/19. 14.288 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 14.566/App, because ackElicitingInFlight | RTT:38/19 14.288 -> Packet PA|2|S0|7b1f71d075cfa961|47|1 StreamFrame[0(CIB),0,17,fin] 14.339 <- (4) Packet A|4|S0|420712b21913fe95|34|1 AckFrame[2,0|Δ19] 14.339 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.583 <- (5) Packet A|5|S0|420712b21913fe95|55|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0b1fc8468f46c902|35928600467de0952e85eb3845664011] 14.603 -> Packet A|3|S0|7b1f71d075cfa961|34|1 AckFrame[5-4,1-0|Δ19] 14.766 <- (6) Packet A|8|S0|420712b21913fe95|55|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0b1fc8468f46c902|35928600467de0952e85eb3845664011] 14.786 -> Packet A|4|S0|7b1f71d075cfa961|36|1 AckFrame[8,5-4,1-0|Δ19] 14.819 <- (7) Packet A|9|S0|420712b21913fe95|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[3|Δ0] MaxStreamsFrame[B,101] 14.819 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.819 Finished downloading https://server4:443/ppjqemcpbd at 37:31.844 on ClientConnection[e8f8378e28cbba4d/420712b21913fe95(V1) with server4/193.167.100.100:443] 14.820 Closing ClientConnection[e8f8378e28cbba4d/420712b21913fe95(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.820 -> Packet A|5|S0|7b1f71d075cfa961|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 14.820 Creating connection with server4:443 with v1 14.821 Setting up connection for downloading https://server4:443/tsmzemtwgq at 37:31.845 on ClientConnection[6721d9a0f5738c80/3f80b3045941cd20(V1) with server4/193.167.100.100:443] 14.821 Original destination connection id: 6721d9a0f5738c80 (scid: 3f80b3045941cd20) >- CryptoStream[I|ClientHello] 14.822 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.022/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.822 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.022 loss detection timeout handler running Sending probe 0, because no ack since 14.822. Current RTT: 100/25. 15.022 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.022 (Probe is an initial retransmit) 15.022 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.422/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.022 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.208 <- (8) Packet A|11|S0|420712b21913fe95|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 15.208 -> Packet A|6|S0|7b1f71d075cfa961|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 15.209 <- (9) Packet A|12|S0|420712b21913fe95|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 15.209 -> Packet A|7|S0|7b1f71d075cfa961|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 15.421 loss detection timeout handler running Sending probe 1, because no ack since 15.022. Current RTT: 100/25. 15.422 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.422 (Probe is an initial retransmit) 15.422 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.222/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.422 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.423 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.223/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.423 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.461 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] Padding(280) 15.461 probe count not reset on ack because handshake not yet confirmed 15.462 Retransmitting CryptoFrame[0,257] on level Initial 15.462 Cwnd(-): 6000; inflight: 1200 15.462 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.262/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.462 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 455 millis, based on 15.918/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.462 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 15.461 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 15.464 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 15.920/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.464 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 15.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 15.922/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.466 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.467 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.467 Starting downloading https://server4:443/tsmzemtwgq at 37:32.491 on ClientConnection[6721d9a0f5738c80/3f80b3045941cd20(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 113 millis, based on 15.581/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.467 Discarding pn space Initial because first Handshake message is being sent 15.467 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 15.468 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 15.582/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.468 -> Packet A|0|S0|46c2a37c751506b9|47|1 StreamFrame[0(CIB),0,17,fin] 15.495 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.582 loss detection timeout handler running Sending probe 0, because no ack since 15.466. Current RTT: 38/19. 15.582 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.582 (Probe is a handshake retransmit) 15.582 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 15.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.582 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 15.809 loss detection timeout handler running Sending probe 1, because no ack since 15.468. Current RTT: 38/19. 15.810 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.810 (Probe is a handshake retransmit) 15.810 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 16.266/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.810 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 15.811 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 16.267/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 15.811 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 15.842 <- (3) Packet A|0|S0|3f80b3045941cd20|29|2 HandshakeDoneFrame[] Padding(2) 15.842 State is set to Confirmed reschedule loss detection timer for PTO over 181 millis, based on 16.024/App, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over -235 millis, based on 15.607/App, because ackElicitingInFlight | RTT:38/19 15.843 Discarding pn space Handshake because HandshakeDone is received 15.843 loss detection timeout handler running Sending probe 0, because no ack since 15.468. Current RTT: 38/19. 15.843 (Probe is retransmit on level App) 15.842 <- (4) Packet A|1|S0|3f80b3045941cd20|99|2 NewConnectionIdFrame[1,<0|652c4bee0d845b87|92a6ab9c31374ecbe699e8e4e4459172] CryptoFrame[0,42] reschedule loss detection timer for PTO over 277 millis, based on 16.121/App, because ackElicitingInFlight | RTT:38/19 -< CryptoStream[A|NewSessionTicket] 15.843 -> Packet PA|1|S0|46c2a37c751506b9|47|1 StreamFrame[0(CIB),0,17,fin] 15.844 -> Packet A|2|S0|46c2a37c751506b9|31|1 AckFrame[1-0|Δ0] 15.876 <- (5) Packet A|2|S0|3f80b3045941cd20|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 15.877 Cwnd(-): 3000; inflight: 0 15.877 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.877 Finished downloading https://server4:443/tsmzemtwgq at 37:32.901 on ClientConnection[6721d9a0f5738c80/3f80b3045941cd20(V1) with server4/193.167.100.100:443] 15.877 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.877 Closing ClientConnection[6721d9a0f5738c80/3f80b3045941cd20(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.877 -> Packet A|3|S0|46c2a37c751506b9|47|1 StreamFrame[0(CIB),0,17,fin] 15.877 -> Packet A|4|S0|46c2a37c751506b9|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 15.878 Creating connection with server4:443 with v1 15.878 Setting up connection for downloading https://server4:443/pdwfvvlgws at 37:32.902 on ClientConnection[2568423e4c0668b9/0d95e5a2fd9b55ed(V1) with server4/193.167.100.100:443] 15.878 Original destination connection id: 2568423e4c0668b9 (scid: 0d95e5a2fd9b55ed) >- CryptoStream[I|ClientHello] 15.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.080/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.880 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.909 <- (6) Packet A|3|S0|3f80b3045941cd20|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 15.917 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 15.917 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.117/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.917 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 15.920 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 16.029/Handshake, because peerAwaitingAddressValidation | RTT:37/18 15.919 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 15.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 16.031/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 15.922 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.922 Starting downloading https://server4:443/pdwfvvlgws at 37:32.946 on ClientConnection[2568423e4c0668b9/0d95e5a2fd9b55ed(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 108 millis, based on 16.031/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 15.922 Discarding pn space Initial because first Handshake message is being sent 15.922 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 15.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 16.032/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 15.923 -> Packet A|0|S0|f8c7d0c60280f8c8|47|1 StreamFrame[0(CIB),0,17,fin] 15.954 <- (2) Packet A|0|S0|0d95e5a2fd9b55ed|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2edb843391a4312d|0e895a4fea85d48dad00b81d1bfa6a82] CryptoFrame[0,42] 15.954 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 16.031/Handshake, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 102 millis, based on 16.057/App, because ackElicitingInFlight | RTT:37/18 15.954 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 15.974 -> Packet A|1|S0|f8c7d0c60280f8c8|32|1 AckFrame[0|Δ19] 16.056 loss detection timeout handler running Sending probe 0, because no ack since 15.923. Current RTT: 37/18. 16.056 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 267 millis, based on 16.325/App, because ackElicitingInFlight | RTT:37/18 16.057 -> Packet PA|2|S0|f8c7d0c60280f8c8|47|1 StreamFrame[0(CIB),0,17,fin] 16.313 <- (3) Packet A|2|S0|0d95e5a2fd9b55ed|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2edb843391a4312d|0e895a4fea85d48dad00b81d1bfa6a82] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 16.324 loss detection timeout handler running Sending probe 1, because no ack since 16.057. Current RTT: 37/18. 16.324 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 16.860/App, because ackElicitingInFlight | RTT:37/18 16.324 -> Packet PA|3|S0|f8c7d0c60280f8c8|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 16.861/App, because ackElicitingInFlight | RTT:37/18 16.325 -> Packet PA|4|S0|f8c7d0c60280f8c8|47|1 StreamFrame[0(CIB),0,17,fin] 16.333 -> Packet A|5|S0|f8c7d0c60280f8c8|34|1 AckFrame[2,0|Δ19] 16.356 <- (4) Packet A|3|S0|0d95e5a2fd9b55ed|31|1 AckFrame[4-2|Δ0] 16.356 Cwnd(-): 6000; inflight: 0 16.356 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.356 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 120 millis, based on 16.478/App, because ackElicitingInFlight | RTT:36/15 16.357 -> Packet A|6|S0|f8c7d0c60280f8c8|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2,0|Δ0] 16.389 <- (5) Packet A|4|S0|0d95e5a2fd9b55ed|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[4-2|Δ0] MaxStreamsFrame[B,101] reschedule loss detection timer for PTO over 88 millis, based on 16.478/App, because ackElicitingInFlight | RTT:36/15 16.390 Finished downloading https://server4:443/pdwfvvlgws at 37:33.414 on ClientConnection[2568423e4c0668b9/0d95e5a2fd9b55ed(V1) with server4/193.167.100.100:443] 16.390 Closing ClientConnection[2568423e4c0668b9/0d95e5a2fd9b55ed(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.390 Creating connection with server4:443 with v1 16.390 -> Packet A|7|S0|f8c7d0c60280f8c8|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-2,0|Δ0] 16.391 Setting up connection for downloading https://server4:443/gpzljapagu at 37:33.415 on ClientConnection[71e22b9be6385224/a92e9bfd418b73de(V1) with server4/193.167.100.100:443] 16.391 Original destination connection id: 71e22b9be6385224 (scid: a92e9bfd418b73de) >- CryptoStream[I|ClientHello] 16.392 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.592/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.392 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.407 <- (6) Packet A|5|S0|0d95e5a2fd9b55ed|34|1 AckFrame[6,4-2|Δ19] 16.408 -> Packet A|8|S0|f8c7d0c60280f8c8|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-2,0|Δ0] 16.592 loss detection timeout handler running Sending probe 0, because no ack since 16.392. Current RTT: 100/25. 16.592 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.592 (Probe is an initial retransmit) 16.592 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.992/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.592 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.630 <- (1) Packet I|0|L|457|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(282) 16.631 probe count not reset on ack because handshake not yet confirmed 16.631 Retransmitting CryptoFrame[0,257] on level Initial 16.631 Cwnd(-): 6000; inflight: 0 16.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.031/Initial, because peerAwaitingAddressValidation | RTT:100/25 16.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 227 millis, based on 16.859/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 16.631 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 16.630 <- (1) Packet H|0|L|743|1 CryptoFrame[0,697] 16.633 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 16.861/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 16.633 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 16.864/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 16.635 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 16.750/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 16.636 Starting downloading https://server4:443/gpzljapagu at 37:33.660 on ClientConnection[71e22b9be6385224/a92e9bfd418b73de(V1) with server4/193.167.100.100:443] 16.636 Discarding pn space Initial because first Handshake message is being sent 16.636 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 16.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 16.750/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 16.636 -> Packet A|0|S0|2c5f60003d50b211|47|1 StreamFrame[0(CIB),0,17,fin] 16.667 <- (2) Packet A|0|S0|a92e9bfd418b73de|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5fceb01b867a2cf2|cafa865d50711ee86abf402eade0c54a] CryptoFrame[0,42] 16.668 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 16.749/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 107 millis, based on 16.775/App, because ackElicitingInFlight | RTT:38/19 16.668 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 16.669 <- (3) Packet A|1|S0|a92e9bfd418b73de|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 16.669 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.670 Finished downloading https://server4:443/gpzljapagu at 37:33.694 on ClientConnection[71e22b9be6385224/a92e9bfd418b73de(V1) with server4/193.167.100.100:443] 16.670 Closing ClientConnection[71e22b9be6385224/a92e9bfd418b73de(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.670 -> Packet A|1|S0|2c5f60003d50b211|32|1 AckFrame[1-0|Δ1] 16.670 -> Packet A|2|S0|2c5f60003d50b211|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 16.670 Creating connection with server4:443 with v1 16.671 Setting up connection for downloading https://server4:443/gletznxein at 37:33.695 on ClientConnection[9fae0e2e54a44019/02a83e9f956a6637(V1) with server4/193.167.100.100:443] 16.671 Original destination connection id: 9fae0e2e54a44019 (scid: 02a83e9f956a6637) >- CryptoStream[I|ClientHello] 16.672 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.872/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.672 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.702 <- (4) Packet A|2|S0|a92e9bfd418b73de|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 16.871 loss detection timeout handler running Sending probe 0, because no ack since 16.672. Current RTT: 100/25. 16.871 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.871 (Probe is an initial retransmit) 16.872 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.272/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.872 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.110 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 17.113 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.313/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.113 Discarding pn space Initial because first Handshake message is being sent 17.113 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.313/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.113 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 17.310 <- (2) Packet H|2|L|44|2 PingFrame[] Padding(2) 17.311 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 17.312 loss detection timeout handler running 17.312 Sending probe 0. Current RTT: 100/25. 17.312 Sending probe because peer awaiting address validation 17.312 (Probe is a handshake ping) 17.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 17.712/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.312 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 17.343 <- (3) Packet H|3|L|46|1 AckFrame[1|Δ0] 17.344 probe count not reset on ack because handshake not yet confirmed 17.344 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.511 <- (4) Packet H|4|L|744|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 181 millis, based on 17.696/Handshake, because ackElicitingInFlight | RTT:31/15 17.514 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[3-2|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.515 Starting downloading https://server4:443/gletznxein at 37:34.539 on ClientConnection[9fae0e2e54a44019/02a83e9f956a6637(V1) with server4/193.167.100.100:443] 17.515 -> Packet H|3|L|46|1 AckFrame[4-2|Δ0] 17.515 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 180 millis, based on 17.696/Handshake, because ackElicitingInFlight | RTT:31/15 17.515 -> Packet A|0|S0|cb20aaa14f237ca6|47|1 StreamFrame[0(CIB),0,17,fin] 17.546 <- (5) Packet A|0|S0|02a83e9f956a6637|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|9c130de292dc81d1|fcee2ac25e85a3f0d130814cadc05d2e] CryptoFrame[0,42] 17.547 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 17.696/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 84 millis, based on 17.631/App, because ackElicitingInFlight | RTT:31/15 17.547 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 17.548 <- (6) Packet A|1|S0|02a83e9f956a6637|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 17.548 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.549 Finished downloading https://server4:443/gletznxein at 37:34.573 on ClientConnection[9fae0e2e54a44019/02a83e9f956a6637(V1) with server4/193.167.100.100:443] 17.549 Closing ClientConnection[9fae0e2e54a44019/02a83e9f956a6637(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.549 -> Packet A|1|S0|cb20aaa14f237ca6|32|1 AckFrame[1-0|Δ1] 17.549 -> Packet A|2|S0|cb20aaa14f237ca6|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 17.549 Creating connection with server4:443 with v1 17.550 Setting up connection for downloading https://server4:443/axqbrnpfmw at 37:34.574 on ClientConnection[0bd95210c24ff233/b15da5ea3dca7ca3(V1) with server4/193.167.100.100:443] 17.550 Original destination connection id: 0bd95210c24ff233 (scid: b15da5ea3dca7ca3) >- CryptoStream[I|ClientHello] 17.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.751/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.551 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.580 <- (7) Packet A|2|S0|02a83e9f956a6637|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 17.588 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 17.589 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.789/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.588 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 17.591 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.700/Handshake, because peerAwaitingAddressValidation | RTT:37/18 17.591 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 17.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.702/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.593 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.594 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.703/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.594 Discarding pn space Initial because first Handshake message is being sent 17.594 Starting downloading https://server4:443/axqbrnpfmw at 37:34.618 on ClientConnection[0bd95210c24ff233/b15da5ea3dca7ca3(V1) with server4/193.167.100.100:443] 17.594 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 17.703/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.594 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|c07c3ee2e653c263|47|1 StreamFrame[0(CIB),0,17,fin]] 17.702 loss detection timeout handler running Sending probe 0, because no ack since 17.593. Current RTT: 37/18. 17.703 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.703 (Probe is a handshake retransmit) 17.703 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 17.921/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 17.703 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 17.752 <- (2) Packet A|1|S0|b15da5ea3dca7ca3|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1fa42c9a667a303c|f12f7aa0e4ac96670adbaf265486b497] CryptoFrame[0,42] 17.753 State is set to Confirmed reschedule loss detection timer for PTO over 109 millis, based on 17.862/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -24 millis, based on 17.728/App, because ackElicitingInFlight | RTT:37/18 17.753 Discarding pn space Handshake because HandshakeDone is received 17.753 loss detection timeout handler running Sending probe 0, because no ack since 17.594. Current RTT: 37/18. 17.753 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 267 millis, based on 18.021/App, because ackElicitingInFlight | RTT:37/18 17.753 -> Packet PA|1|S0|c07c3ee2e653c263|47|1 StreamFrame[0(CIB),0,17,fin] 17.773 -> Packet A|2|S0|c07c3ee2e653c263|32|1 AckFrame[1|Δ19] 18.008 <- (3) Packet A|2|S0|b15da5ea3dca7ca3|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1fa42c9a667a303c|f12f7aa0e4ac96670adbaf265486b497] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 18.009 <- (4) Packet A|3|S0|b15da5ea3dca7ca3|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1fa42c9a667a303c|f12f7aa0e4ac96670adbaf265486b497] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 18.009 -> Packet A|3|S0|c07c3ee2e653c263|31|1 AckFrame[3-1|Δ0] 18.021 loss detection timeout handler running Sending probe 1, because no ack since 17.753. Current RTT: 37/18. 18.021 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 18.557/App, because ackElicitingInFlight | RTT:37/18 18.021 -> Packet PA|4|S0|c07c3ee2e653c263|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 18.558/App, because ackElicitingInFlight | RTT:37/18 18.022 -> Packet PA|5|S0|c07c3ee2e653c263|47|1 StreamFrame[0(CIB),0,17,fin] 18.041 <- (5) Packet A|4|S0|b15da5ea3dca7ca3|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1fa42c9a667a303c|f12f7aa0e4ac96670adbaf265486b497] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 18.060 -> Packet A|6|S0|c07c3ee2e653c263|32|1 AckFrame[4-1|Δ19] 18.557 loss detection timeout handler running Sending probe 2, because no ack since 18.022. Current RTT: 37/18. 18.557 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1071 millis, based on 19.629/App, because ackElicitingInFlight | RTT:37/18 18.557 -> Packet PA|7|S0|c07c3ee2e653c263|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1071 millis, based on 19.630/App, because ackElicitingInFlight | RTT:37/18 18.558 -> Packet PA|8|S0|c07c3ee2e653c263|47|1 StreamFrame[0(CIB),0,17,fin] 18.698 <- (6) Packet A|6|S0|b15da5ea3dca7ca3|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 18.699 Finished downloading https://server4:443/axqbrnpfmw at 37:35.723 on ClientConnection[0bd95210c24ff233/b15da5ea3dca7ca3(V1) with server4/193.167.100.100:443] 18.699 Closing ClientConnection[0bd95210c24ff233/b15da5ea3dca7ca3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.700 Creating connection with server4:443 with v1 18.699 -> Packet A|9|S0|c07c3ee2e653c263|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-1|Δ0] 18.700 Setting up connection for downloading https://server4:443/ugvgqtbhyq at 37:35.725 on ClientConnection[3f2d835716a8523c/22578e5650d42876(V1) with server4/193.167.100.100:443] 18.700 Original destination connection id: 3f2d835716a8523c (scid: 22578e5650d42876) >- CryptoStream[I|ClientHello] 18.702 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.902/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.701 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.731 <- (7) Packet A|7|S0|b15da5ea3dca7ca3|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-6,3|Δ0] 18.901 loss detection timeout handler running Sending probe 0, because no ack since 18.701. Current RTT: 100/25. 18.901 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.901 (Probe is an initial retransmit) 18.901 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.301/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.901 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.139 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 19.142 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.342/Handshake, because peerAwaitingAddressValidation | RTT:100/25 19.142 Discarding pn space Initial because first Handshake message is being sent 19.142 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.342/Handshake, because peerAwaitingAddressValidation | RTT:100/25 19.142 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 19.176 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.176 <- (3) Packet H|1|L|745|1 CryptoFrame[0,699] >- CryptoStream[H|Finished] 19.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.379/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.179 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.179 Starting downloading https://server4:443/ugvgqtbhyq at 37:36.204 on ClientConnection[3f2d835716a8523c/22578e5650d42876(V1) with server4/193.167.100.100:443] 19.179 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 19.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.180 -> Packet A|0|S0|584f68043e0ebeff|47|1 StreamFrame[0(CIB),0,17,fin] 19.211 <- (4) Packet A|0|S0|22578e5650d42876|29|2 HandshakeDoneFrame[] Padding(2) 19.211 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 19.379/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 19.405/App, because ackElicitingInFlight | RTT:100/25 19.211 Discarding pn space Handshake because HandshakeDone is received 19.211 <- (5) Packet A|1|S0|22578e5650d42876|99|2 NewConnectionIdFrame[1,<0|ef752baf47b26729|54d03c3c7983db19958c409214686470] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 19.212 -> Packet A|1|S0|584f68043e0ebeff|31|1 AckFrame[1-0|Δ0] 19.213 <- (6) Packet A|2|S0|22578e5650d42876|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 19.213 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.213 Finished downloading https://server4:443/ugvgqtbhyq at 37:36.237 on ClientConnection[3f2d835716a8523c/22578e5650d42876(V1) with server4/193.167.100.100:443] 19.213 Closing ClientConnection[3f2d835716a8523c/22578e5650d42876(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.213 -> Packet A|2|S0|584f68043e0ebeff|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 19.214 Creating connection with server4:443 with v1 19.214 Setting up connection for downloading https://server4:443/szeheafagp at 37:36.238 on ClientConnection[9b2bd0636293faf1/aeed272505fd2984(V1) with server4/193.167.100.100:443] 19.214 Original destination connection id: 9b2bd0636293faf1 (scid: aeed272505fd2984) >- CryptoStream[I|ClientHello] 19.215 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.415/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.215 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.415 loss detection timeout handler running Sending probe 0, because no ack since 19.215. Current RTT: 100/25. 19.415 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.415 (Probe is an initial retransmit) 19.415 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.815/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.415 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.654 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 19.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.857/Handshake, because peerAwaitingAddressValidation | RTT:100/25 19.657 Discarding pn space Initial because first Handshake message is being sent 19.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.857/Handshake, because peerAwaitingAddressValidation | RTT:100/25 19.657 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 19.691 <- (2) Packet H|1|L|744|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 19.694 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.894/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.694 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.694 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 19.694 Starting downloading https://server4:443/szeheafagp at 37:36.718 on ClientConnection[9b2bd0636293faf1/aeed272505fd2984(V1) with server4/193.167.100.100:443] 19.695 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.895/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.695 -> Packet A|0|S0|14026ef972e36a2f|47|1 StreamFrame[0(CIB),0,17,fin] 19.854 <- (3) Packet A|1|S0|aeed272505fd2984|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|27eb97c28c7956c2|b0ec881baf52aafe67e32304edc8c634] CryptoFrame[0,42] 19.854 State is set to Confirmed reschedule loss detection timer for PTO over 39 millis, based on 19.894/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 64 millis, based on 19.920/App, because ackElicitingInFlight | RTT:100/25 19.855 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 19.874 -> Packet A|1|S0|14026ef972e36a2f|32|1 AckFrame[1|Δ19] 19.919 loss detection timeout handler running Sending probe 0, because no ack since 19.695. Current RTT: 100/25. 19.919 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 20.369/App, because ackElicitingInFlight | RTT:100/25 19.919 -> Packet PA|2|S0|14026ef972e36a2f|47|1 StreamFrame[0(CIB),0,17,fin] 20.081 <- (4) Packet A|4|S0|aeed272505fd2984|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|27eb97c28c7956c2|b0ec881baf52aafe67e32304edc8c634] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 20.101 -> Packet A|3|S0|14026ef972e36a2f|34|1 AckFrame[4,1|Δ19] 20.340 <- (5) Packet A|5|S0|aeed272505fd2984|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|27eb97c28c7956c2|b0ec881baf52aafe67e32304edc8c634] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 20.360 -> Packet A|4|S0|14026ef972e36a2f|34|1 AckFrame[5-4,1|Δ19] 20.368 loss detection timeout handler running Sending probe 1, because no ack since 19.919. Current RTT: 100/25. 20.368 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 21.268/App, because ackElicitingInFlight | RTT:100/25 20.368 -> Packet PA|5|S0|14026ef972e36a2f|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 21.269/App, because ackElicitingInFlight | RTT:100/25 20.369 -> Packet PA|6|S0|14026ef972e36a2f|47|1 StreamFrame[0(CIB),0,17,fin] 20.393 <- (6) Packet A|7|S0|aeed272505fd2984|1137|6 HandshakeDoneFrame[] AckFrame[2-1|Δ0] NewConnectionIdFrame[1,<0|27eb97c28c7956c2|b0ec881baf52aafe67e32304edc8c634] CryptoFrame[0,42] StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 20.393 Cwnd(-): 6000; inflight: 94 reschedule loss detection timer for PTO over 201 millis, based on 20.594/App, because ackElicitingInFlight | RTT:100/25 20.393 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 1441 millis, based on 21.836/App, because ackElicitingInFlight | RTT:473/236 20.394 -> Packet A|7|S0|14026ef972e36a2f|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5-4|Δ0] 20.394 Finished downloading https://server4:443/szeheafagp at 37:37.418 on ClientConnection[9b2bd0636293faf1/aeed272505fd2984(V1) with server4/193.167.100.100:443] 20.394 Closing ClientConnection[9b2bd0636293faf1/aeed272505fd2984(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.395 Creating connection with server4:443 with v1 20.395 -> Packet A|8|S0|14026ef972e36a2f|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 20.395 Setting up connection for downloading https://server4:443/vywsrmctem at 37:37.420 on ClientConnection[bcb5cfdf3cd34083/b02c16f75103f7aa(V1) with server4/193.167.100.100:443] 20.395 Original destination connection id: bcb5cfdf3cd34083 (scid: b02c16f75103f7aa) >- CryptoStream[I|ClientHello] 20.396 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.597/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.396 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.420 <- (7) Packet A|8|S0|aeed272505fd2984|36|1 AckFrame[6,4,2-1|Δ19] 20.420 -> Packet A|9|S0|14026ef972e36a2f|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 20.444 <- (8) Packet A|9|S0|aeed272505fd2984|36|1 AckFrame[7-6,4,2-1|Δ19] 20.444 -> Packet A|10|S0|14026ef972e36a2f|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 20.452 <- (9) Packet A|10|S0|aeed272505fd2984|39|2 ConnectionCloseFrame[0|0|] AckFrame[9,7-6,4|Δ0] 20.596 loss detection timeout handler running Sending probe 0, because no ack since 20.396. Current RTT: 100/25. 20.596 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.596 (Probe is an initial retransmit) 20.596 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.996/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.596 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.634 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(281) 20.635 probe count not reset on ack because handshake not yet confirmed 20.635 Retransmitting CryptoFrame[0,257] on level Initial 20.635 Cwnd(-): 6000; inflight: 0 20.635 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.035/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.635 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 217 millis, based on 20.853/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 20.635 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 20.634 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 20.637 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 20.855/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 20.637 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 20.858/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 108 millis, based on 20.749/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 20.640 Discarding pn space Initial because first Handshake message is being sent 20.640 Starting downloading https://server4:443/vywsrmctem at 37:37.664 on ClientConnection[bcb5cfdf3cd34083/b02c16f75103f7aa(V1) with server4/193.167.100.100:443] 20.639 -> Packet H|0|L|80|1 CryptoFrame[0,36] 20.640 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 20.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 20.749/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 20.640 -> Packet A|0|S0|2aca8586a674d26a|47|1 StreamFrame[0(CIB),0,17,fin] 20.671 <- (2) Packet A|0|S0|b02c16f75103f7aa|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2c9925b5c68004b4|338198d1882e5abb59a25516fe6b7622] CryptoFrame[0,42] 20.672 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 20.748/Handshake, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 102 millis, based on 20.774/App, because ackElicitingInFlight | RTT:37/18 20.672 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 20.673 <- (3) Packet A|1|S0|b02c16f75103f7aa|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 20.674 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.674 Finished downloading https://server4:443/vywsrmctem at 37:37.698 on ClientConnection[bcb5cfdf3cd34083/b02c16f75103f7aa(V1) with server4/193.167.100.100:443] 20.674 Closing ClientConnection[bcb5cfdf3cd34083/b02c16f75103f7aa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.674 -> Packet A|1|S0|2aca8586a674d26a|32|1 AckFrame[1-0|Δ1] 20.674 -> Packet A|2|S0|2aca8586a674d26a|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 20.674 Creating connection with server4:443 with v1 20.675 Setting up connection for downloading https://server4:443/ofgzvgfrrd at 37:37.699 on ClientConnection[474ce0366d03a076/db0e161f2da2d07e(V1) with server4/193.167.100.100:443] 20.675 Original destination connection id: 474ce0366d03a076 (scid: db0e161f2da2d07e) >- CryptoStream[I|ClientHello] 20.676 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.876/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.676 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.800 <- (4) Packet A|2|S0|b02c16f75103f7aa|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2c9925b5c68004b4|338198d1882e5abb59a25516fe6b7622] CryptoFrame[0,42] 20.801 -> Packet A|3|S0|2aca8586a674d26a|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 20.875 loss detection timeout handler running Sending probe 0, because no ack since 20.676. Current RTT: 100/25. 20.875 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.875 (Probe is an initial retransmit) 20.876 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.276/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.875 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.909 <- (1) Packet I|1|L|1201|2 Token=[] AckFrame[1-0|Δ0] Padding(1153) 20.910 probe count not reset on ack because handshake not yet confirmed 20.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.310/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.913 <- (2) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 20.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.013/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.916 Discarding pn space Initial because first Handshake message is being sent 20.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.013/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.916 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 20.949 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.950 <- (4) Packet H|1|L|744|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 20.952 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.049/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.952 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.952 Starting downloading https://server4:443/ofgzvgfrrd at 37:37.977 on ClientConnection[474ce0366d03a076/db0e161f2da2d07e(V1) with server4/193.167.100.100:443] 20.952 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 20.953 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.050/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.953 -> Packet A|0|S0|2f7f30ad544c04d8|47|1 StreamFrame[0(CIB),0,17,fin] 21.049 loss detection timeout handler running Sending probe 0, because no ack since 20.952. Current RTT: 33/16. 21.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.049 (Probe is a handshake retransmit) 21.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.243/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.049 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 21.081 <- (5) Packet H|2|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.081 <- (6) Packet A|0|S0|db0e161f2da2d07e|29|2 HandshakeDoneFrame[] Padding(2) 21.082 -> Packet H|3|L|46|1 AckFrame[2-1|Δ0] 21.082 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 21.197/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 21.075/App, because ackElicitingInFlight | RTT:33/16 21.082 loss detection timeout handler running 21.082 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 20.953. Current RTT: 33/16. 21.082 (Probe is retransmit on level App) 21.081 <- (7) Packet A|1|S0|db0e161f2da2d07e|99|2 NewConnectionIdFrame[1,<0|ebc89aaed61a3af9|b45700ab29e54b34c27830615ecd8849] CryptoFrame[0,42] reschedule loss detection timer for PTO over 243 millis, based on 21.327/App, because ackElicitingInFlight | RTT:33/16 21.083 -> Packet PA|1|S0|2f7f30ad544c04d8|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 21.083 -> Packet A|2|S0|2f7f30ad544c04d8|31|1 AckFrame[1-0|Δ0] 21.115 <- (8) Packet A|2|S0|db0e161f2da2d07e|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 21.116 Cwnd(-): 6000; inflight: 0 21.116 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 21.116 Finished downloading https://server4:443/ofgzvgfrrd at 37:38.141 on ClientConnection[474ce0366d03a076/db0e161f2da2d07e(V1) with server4/193.167.100.100:443] 21.116 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.116 Closing ClientConnection[474ce0366d03a076/db0e161f2da2d07e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.116 -> Packet A|3|S0|2f7f30ad544c04d8|47|1 StreamFrame[0(CIB),0,17,fin] 21.117 -> Packet A|4|S0|2f7f30ad544c04d8|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 21.117 Creating connection with server4:443 with v1 21.117 Setting up connection for downloading https://server4:443/ewopoulmit at 37:38.142 on ClientConnection[1f6e396440dfa5e4/df617acfdc47a7a5(V1) with server4/193.167.100.100:443] 21.118 Original destination connection id: 1f6e396440dfa5e4 (scid: df617acfdc47a7a5) >- CryptoStream[I|ClientHello] 21.119 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.319/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.119 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.156 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 21.157 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.357/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.156 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 21.159 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 21.268/Handshake, because peerAwaitingAddressValidation | RTT:37/18 21.159 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 21.161 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 21.270/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 21.161 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.162 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 21.271/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 21.162 Starting downloading https://server4:443/ewopoulmit at 37:38.186 on ClientConnection[1f6e396440dfa5e4/df617acfdc47a7a5(V1) with server4/193.167.100.100:443] 21.162 Discarding pn space Initial because first Handshake message is being sent 21.162 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 21.163 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 21.272/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 21.162 -> Packet A|0|S0|03a1bebcdfbcab56|47|1 StreamFrame[0(CIB),0,17,fin] 21.167 <- (9) Packet A|3|S0|db0e161f2da2d07e|32|1 AckFrame[3-1|Δ19] 21.167 -> Packet A|5|S0|2f7f30ad544c04d8|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 21.195 <- (2) Packet A|1|S0|df617acfdc47a7a5|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 21.196 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 21.305/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 21.196 Finished downloading https://server4:443/ewopoulmit at 37:38.220 on ClientConnection[1f6e396440dfa5e4/df617acfdc47a7a5(V1) with server4/193.167.100.100:443] 21.196 Closing ClientConnection[1f6e396440dfa5e4/df617acfdc47a7a5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.196 -> Packet A|1|S0|03a1bebcdfbcab56|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 21.197 Creating connection with server4:443 with v1 21.197 Setting up connection for downloading https://server4:443/cqfooahqwm at 37:38.222 on ClientConnection[5ddcb4fa0a530e41/7df1ff0047bce1d0(V1) with server4/193.167.100.100:443] 21.197 Original destination connection id: 5ddcb4fa0a530e41 (scid: 7df1ff0047bce1d0) >- CryptoStream[I|ClientHello] 21.198 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.399/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.198 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.236 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 21.237 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.437/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.236 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 21.239 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 21.348/Handshake, because peerAwaitingAddressValidation | RTT:37/18 21.239 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 21.242 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 21.351/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 21.242 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.242 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 21.352/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 21.243 Starting downloading https://server4:443/cqfooahqwm at 37:38.267 on ClientConnection[5ddcb4fa0a530e41/7df1ff0047bce1d0(V1) with server4/193.167.100.100:443] 21.243 Discarding pn space Initial because first Handshake message is being sent 21.243 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 21.243 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 21.352/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 21.243 -> Packet A|0|S0|48a1cf12cc9b9dc7|47|1 StreamFrame[0(CIB),0,17,fin] 21.351 loss detection timeout handler running Sending probe 0, because no ack since 21.242. Current RTT: 37/18. 21.351 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.351 (Probe is a handshake retransmit) 21.352 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 21.570/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 21.352 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 21.384 <- (2) Packet A|0|S0|7df1ff0047bce1d0|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4b03e703bc33e95c|2d94bdbdfb024b9581f5d416e451d12b] CryptoFrame[0,42] 21.384 State is set to Confirmed reschedule loss detection timer for PTO over 126 millis, based on 21.511/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -7 millis, based on 21.377/App, because ackElicitingInFlight | RTT:37/18 21.384 loss detection timeout handler running 21.384 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 21.243. Current RTT: 37/18. 21.385 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 267 millis, based on 21.653/App, because ackElicitingInFlight | RTT:37/18 21.385 -> Packet PA|1|S0|48a1cf12cc9b9dc7|47|1 StreamFrame[0(CIB),0,17,fin] 21.404 -> Packet A|2|S0|48a1cf12cc9b9dc7|32|1 AckFrame[0|Δ19] 21.533 <- (3) Packet A|2|S0|7df1ff0047bce1d0|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4b03e703bc33e95c|2d94bdbdfb024b9581f5d416e451d12b] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 21.553 -> Packet A|3|S0|48a1cf12cc9b9dc7|34|1 AckFrame[2,0|Δ19] 21.652 loss detection timeout handler running Sending probe 1, because no ack since 21.385. Current RTT: 37/18. 21.652 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 22.188/App, because ackElicitingInFlight | RTT:37/18 21.652 -> Packet PA|4|S0|48a1cf12cc9b9dc7|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 22.189/App, because ackElicitingInFlight | RTT:37/18 21.653 -> Packet PA|5|S0|48a1cf12cc9b9dc7|47|1 StreamFrame[0(CIB),0,17,fin] 21.703 <- (4) Packet A|3|S0|7df1ff0047bce1d0|34|1 AckFrame[4,1|Δ19] 21.704 Cwnd(-): 6000; inflight: 47 21.704 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 83 millis, based on 21.787/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 131 millis, based on 21.836/App, because ackElicitingInFlight | RTT:39/17 21.704 -> Packet A|6|S0|48a1cf12cc9b9dc7|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2,0|Δ0] 21.835 loss detection timeout handler running Sending probe 0, because no ack since 21.704. Current RTT: 39/17. 21.835 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 263 millis, based on 22.099/App, because ackElicitingInFlight | RTT:39/17 21.835 -> Packet PA|7|S0|48a1cf12cc9b9dc7|47|1 StreamFrame[0(CIB),0,17,fin] 22.099 loss detection timeout handler running Sending probe 1, because no ack since 21.835. Current RTT: 39/17. 22.099 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 527 millis, based on 22.627/App, because ackElicitingInFlight | RTT:39/17 22.099 -> Packet PA|8|S0|48a1cf12cc9b9dc7|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 527 millis, based on 22.628/App, because ackElicitingInFlight | RTT:39/17 22.100 -> Packet PA|9|S0|48a1cf12cc9b9dc7|47|1 StreamFrame[0(CIB),0,17,fin] 22.150 <- (5) Packet A|7|S0|7df1ff0047bce1d0|38|1 AckFrame[8,6,4,1|Δ19] 22.150 Cwnd(-): 3000; inflight: 47 reschedule loss detection timer for PTO over 81 millis, based on 22.232/App, because ackElicitingInFlight | RTT:39/17 22.231 loss detection timeout handler running Sending probe 0, because no ack since 22.100. Current RTT: 40/16. 22.231 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 257 millis, based on 22.490/App, because ackElicitingInFlight | RTT:40/16 22.232 -> Packet PA|10|S0|48a1cf12cc9b9dc7|47|1 StreamFrame[0(CIB),0,17,fin] 22.282 <- (6) Packet A|8|S0|7df1ff0047bce1d0|40|1 AckFrame[10,8,6,4,1|Δ19] 22.283 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.605 <- (7) Packet A|9|S0|7df1ff0047bce1d0|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 22.606 Finished downloading https://server4:443/cqfooahqwm at 37:39.630 on ClientConnection[5ddcb4fa0a530e41/7df1ff0047bce1d0(V1) with server4/193.167.100.100:443] 22.606 Closing ClientConnection[5ddcb4fa0a530e41/7df1ff0047bce1d0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.606 -> Packet A|11|S0|48a1cf12cc9b9dc7|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-7,3|Δ0] 22.606 <- (8) Packet A|10|S0|7df1ff0047bce1d0|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 22.607 Creating connection with server4:443 with v1 22.607 -> Packet A|12|S0|48a1cf12cc9b9dc7|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-7,3|Δ0] 22.607 Setting up connection for downloading https://server4:443/oxoyidhpqf at 37:39.632 on ClientConnection[1c61b30c654d0ee9/0138b8bc3b410b84(V1) with server4/193.167.100.100:443] 22.607 Original destination connection id: 1c61b30c654d0ee9 (scid: 0138b8bc3b410b84) >- CryptoStream[I|ClientHello] 22.609 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.809/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.609 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.638 <- (9) Packet A|11|S0|7df1ff0047bce1d0|35|2 ConnectionCloseFrame[0|0|] AckFrame[11|Δ0] 22.646 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 22.646 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.846/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.646 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 22.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 22.758/Handshake, because peerAwaitingAddressValidation | RTT:37/18 22.649 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 22.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 22.760/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.651 -> Packet H|0|L|80|1 CryptoFrame[0,36] 22.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 22.760/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 22.651 Discarding pn space Initial because first Handshake message is being sent 22.651 Starting downloading https://server4:443/oxoyidhpqf at 37:39.676 on ClientConnection[1c61b30c654d0ee9/0138b8bc3b410b84(V1) with server4/193.167.100.100:443] 22.651 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 22.652 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 22.761/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 22.652 -> Packet A|0|S0|04505fde2a38c646|47|1 StreamFrame[0(CIB),0,17,fin] 22.683 <- (2) Packet A|0|S0|0138b8bc3b410b84|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c08f4c048105cfd5|c2538f43fb736272576dfa84f482c613] CryptoFrame[0,42] 22.683 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 22.760/Handshake, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 102 millis, based on 22.786/App, because ackElicitingInFlight | RTT:37/18 22.683 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 22.703 -> Packet A|1|S0|04505fde2a38c646|32|1 AckFrame[0|Δ19] 22.785 loss detection timeout handler running Sending probe 0, because no ack since 22.652. Current RTT: 37/18. 22.786 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 267 millis, based on 23.054/App, because ackElicitingInFlight | RTT:37/18 22.786 -> Packet PA|2|S0|04505fde2a38c646|47|1 StreamFrame[0(CIB),0,17,fin] 22.812 <- (3) Packet A|2|S0|0138b8bc3b410b84|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 22.813 Finished downloading https://server4:443/oxoyidhpqf at 37:39.837 on ClientConnection[1c61b30c654d0ee9/0138b8bc3b410b84(V1) with server4/193.167.100.100:443] 22.813 Closing ClientConnection[1c61b30c654d0ee9/0138b8bc3b410b84(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.814 Creating connection with server4:443 with v1 22.814 -> Packet A|3|S0|04505fde2a38c646|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 22.814 Setting up connection for downloading https://server4:443/gornvjkggo at 37:39.839 on ClientConnection[1a52ad07f777cfaf/fafa082ba18ffaac(V1) with server4/193.167.100.100:443] 22.814 Original destination connection id: 1a52ad07f777cfaf (scid: fafa082ba18ffaac) >- CryptoStream[I|ClientHello] 22.815 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.015/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.815 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.836 <- (4) Packet A|3|S0|0138b8bc3b410b84|32|1 AckFrame[2-0|Δ19] 22.837 -> Packet A|4|S0|04505fde2a38c646|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 23.014 loss detection timeout handler running Sending probe 0, because no ack since 22.815. Current RTT: 100/25. 23.015 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.015 (Probe is an initial retransmit) 23.015 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.415/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.015 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.053 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(281) 23.053 probe count not reset on ack because handshake not yet confirmed 23.054 Retransmitting CryptoFrame[0,257] on level Initial 23.054 Cwnd(-): 6000; inflight: 0 23.054 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.454/Initial, because peerAwaitingAddressValidation | RTT:100/25 23.054 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 227 millis, based on 23.282/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.054 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 23.053 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 23.056 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 23.284/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.056 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 23.058 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 23.286/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.058 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.058 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 23.172/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.058 Discarding pn space Initial because first Handshake message is being sent 23.058 Starting downloading https://server4:443/gornvjkggo at 37:40.083 on ClientConnection[1a52ad07f777cfaf/fafa082ba18ffaac(V1) with server4/193.167.100.100:443] 23.058 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 23.059 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 23.173/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.059 -> Packet A|0|S0|999c58e25da06bed|47|1 StreamFrame[0(CIB),0,17,fin] 23.088 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 23.172 loss detection timeout handler running Sending probe 0, because no ack since 23.058. Current RTT: 38/19. 23.172 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.172 (Probe is a handshake retransmit) 23.173 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 23.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.173 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 23.253 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 23.400 loss detection timeout handler running Sending probe 1, because no ack since 23.059. Current RTT: 38/19. 23.400 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.400 (Probe is a handshake retransmit) 23.400 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 23.856/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.400 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 23.401 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 23.857/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 23.401 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 23.433 <- (4) Packet H|1|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.433 <- (5) Packet A|0|S0|fafa082ba18ffaac|29|2 HandshakeDoneFrame[] Padding(2) 23.434 State is set to Confirmed 23.434 -> Packet H|5|L|46|1 AckFrame[1-0|Δ0] reschedule loss detection timer for PTO over 180 millis, based on 23.615/App, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over -236 millis, based on 23.198/App, because ackElicitingInFlight | RTT:38/19 23.434 Discarding pn space Handshake because HandshakeDone is received 23.434 loss detection timeout handler running Sending probe 0, because no ack since 23.059. Current RTT: 38/19. 23.434 (Probe is retransmit on level App) 23.433 <- (6) Packet A|1|S0|fafa082ba18ffaac|99|2 NewConnectionIdFrame[1,<0|a7dc58ad9ec5a5e2|534e179086390024ae0ec4358e0474d3] CryptoFrame[0,42] reschedule loss detection timer for PTO over 277 millis, based on 23.712/App, because ackElicitingInFlight | RTT:38/19 -< CryptoStream[A|NewSessionTicket] 23.434 -> Packet PA|1|S0|999c58e25da06bed|47|1 StreamFrame[0(CIB),0,17,fin] 23.435 -> Packet A|2|S0|999c58e25da06bed|31|1 AckFrame[1-0|Δ0] 23.467 <- (7) Packet A|2|S0|fafa082ba18ffaac|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 23.467 Cwnd(-): 3000; inflight: 0 23.467 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 23.468 Finished downloading https://server4:443/gornvjkggo at 37:40.492 on ClientConnection[1a52ad07f777cfaf/fafa082ba18ffaac(V1) with server4/193.167.100.100:443] 23.468 Closing ClientConnection[1a52ad07f777cfaf/fafa082ba18ffaac(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.468 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 23.468 -> Packet A|3|S0|999c58e25da06bed|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2-0|Δ0] 23.468 -> Packet A|4|S0|999c58e25da06bed|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 23.468 Creating connection with server4:443 with v1 23.468 Setting up connection for downloading https://server4:443/tkwlniawlm at 37:40.493 on ClientConnection[ed16b2da2158f98f/1d60286043ac584c(V1) with server4/193.167.100.100:443] 23.469 Original destination connection id: ed16b2da2158f98f (scid: 1d60286043ac584c) >- CryptoStream[I|ClientHello] 23.470 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.670/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.470 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.518 <- (8) Packet A|3|S0|fafa082ba18ffaac|32|1 AckFrame[3|Δ19] 23.518 -> Packet A|5|S0|999c58e25da06bed|35|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 23.550 <- (9) Packet A|4|S0|fafa082ba18ffaac|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 23.669 loss detection timeout handler running Sending probe 0, because no ack since 23.470. Current RTT: 100/25. 23.669 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.669 (Probe is an initial retransmit) 23.669 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.069/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.669 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.707 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 23.710 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 23.910/Handshake, because peerAwaitingAddressValidation | RTT:100/25 23.710 Discarding pn space Initial because first Handshake message is being sent 23.710 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 23.910/Handshake, because peerAwaitingAddressValidation | RTT:100/25 23.710 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 23.908 <- (2) Packet H|2|L|44|2 PingFrame[] Padding(2) 23.909 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 23.909 loss detection timeout handler running 23.910 Sending probe 0. Current RTT: 100/25. 23.910 Sending probe because peer awaiting address validation 23.910 (Probe is a handshake ping) 23.910 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 24.310/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.910 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 23.941 <- (3) Packet H|4|L|46|1 AckFrame[1-0|Δ0] 23.941 probe count not reset on ack because handshake not yet confirmed 23.941 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.031 <- (4) Packet H|5|L|744|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 179 millis, based on 24.214/Handshake, because ackElicitingInFlight | RTT:30/15 24.034 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.034 Starting downloading https://server4:443/tkwlniawlm at 37:41.058 on ClientConnection[ed16b2da2158f98f/1d60286043ac584c(V1) with server4/193.167.100.100:443] 24.034 -> Packet H|3|L|46|1 AckFrame[5-4|Δ0] 24.035 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 178 millis, based on 24.214/Handshake, because ackElicitingInFlight | RTT:30/15 24.034 -> Packet A|0|S0|3f6fb2fd5e3fa00d|47|1 StreamFrame[0(CIB),0,17,fin] 24.066 <- (5) Packet H|6|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.066 -> Packet H|4|L|46|1 AckFrame[6-4|Δ0] 24.144 <- (6) Packet H|7|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.145 -> Packet H|5|L|46|1 AckFrame[7-4|Δ0] 24.213 loss detection timeout handler running Sending probe 1, because no ack since 24.034. Current RTT: 30/15. 24.213 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 24.213 (Probe is a handshake retransmit) 24.213 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 359 millis, based on 24.573/Handshake, because ackElicitingInFlight | RTT:30/15 24.213 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 24.214 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 359 millis, based on 24.574/Handshake, because ackElicitingInFlight | RTT:30/15 24.214 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 24.246 <- (7) Packet A|0|S0|1d60286043ac584c|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2a3736907b8a3fb3|fd2ce5a5bc694590c5d0229dbfb33411] CryptoFrame[0,42] 24.246 State is set to Confirmed reschedule loss detection timer for PTO over 248 millis, based on 24.494/App, because ackElicitingInFlight | RTT:30/15 reschedule loss detection timer for PTO over -96 millis, based on 24.149/App, because ackElicitingInFlight | RTT:30/15 24.247 Discarding pn space Handshake because HandshakeDone is received 24.247 loss detection timeout handler running Sending probe 0, because no ack since 24.034. Current RTT: 30/15. 24.247 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 229 millis, based on 24.477/App, because ackElicitingInFlight | RTT:30/15 24.247 -> Packet PA|1|S0|3f6fb2fd5e3fa00d|47|1 StreamFrame[0(CIB),0,17,fin] 24.266 -> Packet A|2|S0|3f6fb2fd5e3fa00d|32|1 AckFrame[0|Δ19] 24.279 <- (8) Packet A|1|S0|1d60286043ac584c|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 24.280 Cwnd(-): 6000; inflight: 0 24.280 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.280 Finished downloading https://server4:443/tkwlniawlm at 37:41.304 on ClientConnection[ed16b2da2158f98f/1d60286043ac584c(V1) with server4/193.167.100.100:443] 24.280 Closing ClientConnection[ed16b2da2158f98f/1d60286043ac584c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.280 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 24.280 -> Packet A|3|S0|3f6fb2fd5e3fa00d|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1-0|Δ0] 24.281 -> Packet A|4|S0|3f6fb2fd5e3fa00d|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 24.281 Creating connection with server4:443 with v1 24.281 Setting up connection for downloading https://server4:443/hxuucaruvb at 37:41.306 on ClientConnection[f316e37cf47962b7/d51a010714b9668e(V1) with server4/193.167.100.100:443] 24.282 Original destination connection id: f316e37cf47962b7 (scid: d51a010714b9668e) >- CryptoStream[I|ClientHello] 24.284 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.484/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.283 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.312 <- (9) Packet A|2|S0|1d60286043ac584c|37|2 ConnectionCloseFrame[0|0|] AckFrame[4,2|Δ0] 24.483 loss detection timeout handler running Sending probe 0, because no ack since 24.283. Current RTT: 100/25. 24.483 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.483 (Probe is an initial retransmit) 24.483 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.883/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.483 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.521 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(281) 24.521 probe count not reset on ack because handshake not yet confirmed 24.522 Retransmitting CryptoFrame[0,257] on level Initial 24.522 Cwnd(-): 6000; inflight: 0 24.522 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.922/Initial, because peerAwaitingAddressValidation | RTT:100/25 24.522 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 217 millis, based on 24.740/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 24.522 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 24.521 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 24.524 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 24.742/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 24.524 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 24.526 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 24.744/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 24.526 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.526 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.527 Starting downloading https://server4:443/hxuucaruvb at 37:41.551 on ClientConnection[f316e37cf47962b7/d51a010714b9668e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 108 millis, based on 24.636/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 24.527 Discarding pn space Initial because first Handshake message is being sent 24.527 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 24.527 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 24.636/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 24.527 -> Packet A|0|S0|01ebc446e7416e74|47|1 StreamFrame[0(CIB),0,17,fin] 24.555 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.560 <- (3) Packet A|1|S0|d51a010714b9668e|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 24.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 24.669/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 24.560 Finished downloading https://server4:443/hxuucaruvb at 37:41.585 on ClientConnection[f316e37cf47962b7/d51a010714b9668e(V1) with server4/193.167.100.100:443] 24.560 Closing ClientConnection[f316e37cf47962b7/d51a010714b9668e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.561 -> Packet A|1|S0|01ebc446e7416e74|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 24.561 Creating connection with server4:443 with v1 24.562 Setting up connection for downloading https://server4:443/iqwsdtlsbg at 37:41.586 on ClientConnection[c2206521cc6b216b/da3c187c36208789(V1) with server4/193.167.100.100:443] 24.562 Original destination connection id: c2206521cc6b216b (scid: da3c187c36208789) >- CryptoStream[I|ClientHello] 24.564 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.764/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.563 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.592 <- (4) Packet A|2|S0|d51a010714b9668e|35|2 ConnectionCloseFrame[0|0|] AckFrame[0|Δ0] 24.601 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 24.601 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.801/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.601 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 24.604 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 24.713/Handshake, because peerAwaitingAddressValidation | RTT:37/18 24.604 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 24.606 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 24.715/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 24.606 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.606 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 24.715/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 24.606 Starting downloading https://server4:443/iqwsdtlsbg at 37:41.630 on ClientConnection[c2206521cc6b216b/da3c187c36208789(V1) with server4/193.167.100.100:443] 24.606 Discarding pn space Initial because first Handshake message is being sent 24.606 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 24.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 24.716/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 24.606 -> Packet A|0|S0|5ef74012203d2b1e|47|1 StreamFrame[0(CIB),0,17,fin] 24.637 <- (2) Packet A|0|S0|da3c187c36208789|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a81f4b86845ab3d3|d2fd7b2e2b8893199c2b418c8c496a2d] CryptoFrame[0,42] 24.638 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 24.715/Handshake, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over 102 millis, based on 24.740/App, because ackElicitingInFlight | RTT:37/18 24.638 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 24.658 -> Packet A|1|S0|5ef74012203d2b1e|32|1 AckFrame[0|Δ19] 24.740 loss detection timeout handler running Sending probe 0, because no ack since 24.606. Current RTT: 37/18. 24.740 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 267 millis, based on 25.008/App, because ackElicitingInFlight | RTT:37/18 24.740 -> Packet PA|2|S0|5ef74012203d2b1e|47|1 StreamFrame[0(CIB),0,17,fin] 24.773 <- (3) Packet A|1|S0|da3c187c36208789|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 24.774 Cwnd(-): 6000; inflight: 0 24.774 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 24.774 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.774 Finished downloading https://server4:443/iqwsdtlsbg at 37:41.798 on ClientConnection[c2206521cc6b216b/da3c187c36208789(V1) with server4/193.167.100.100:443] 24.774 Closing ClientConnection[c2206521cc6b216b/da3c187c36208789(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 120 millis, based on 24.895/App, because ackElicitingInFlight | RTT:36/15 24.774 -> Packet A|3|S0|5ef74012203d2b1e|47|1 StreamFrame[0(CIB),0,17,fin] 24.774 -> Packet A|4|S0|5ef74012203d2b1e|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 24.775 Creating connection with server4:443 with v1 24.775 Setting up connection for downloading https://server4:443/zpneafcaqh at 37:41.800 on ClientConnection[0b2ca8756722bddf/a2e650f8358a7803(V1) with server4/193.167.100.100:443] 24.775 Original destination connection id: 0b2ca8756722bddf (scid: a2e650f8358a7803) >- CryptoStream[I|ClientHello] 24.776 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.976/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.776 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.806 <- (4) Packet A|2|S0|da3c187c36208789|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 24.894 loss detection timeout handler running 24.894 Sending probe 0. Current RTT: 36/15. 24.894 Refraining from sending probe as no ack eliciting in flight and no peer awaiting address validation 24.975 loss detection timeout handler running Sending probe 0, because no ack since 24.776. Current RTT: 100/25. 24.975 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.975 (Probe is an initial retransmit) 24.976 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.376/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.976 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.375 loss detection timeout handler running Sending probe 1, because no ack since 24.976. Current RTT: 100/25. 25.375 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.375 (Probe is an initial retransmit) 25.375 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.175/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.375 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.376 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.176/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.376 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.414 Discarding packet (745 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 25.414 Discarding packet (44 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 26.175 loss detection timeout handler running Sending probe 2, because no ack since 25.376. Current RTT: 100/25. 26.176 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.176 (Probe is an initial retransmit) 26.176 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 27.776/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.176 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.177 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 27.777/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.177 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.209 <- (3) Packet I|2|L|1200|3 Token=[] AckFrame[4,1|Δ0] CryptoFrame[0,123] Padding(1023) 26.210 probe count not reset on ack because handshake not yet confirmed 26.210 Retransmitting CryptoFrame[0,257] on level Initial 26.210 Cwnd(-): 6000; inflight: 1200 26.210 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 27.810/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.210 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 26.986/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.210 -> Packet I|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 26.212 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.309/Handshake, because peerAwaitingAddressValidation | RTT:33/16 26.212 Discarding pn space Initial because first Handshake message is being sent 26.212 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.212 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.309/Handshake, because peerAwaitingAddressValidation | RTT:33/16 26.212 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.212 -> Packet I|7|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 26.243 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.246 <- (7) Packet H|3|L|745|1 CryptoFrame[0,699] >- CryptoStream[H|Finished] 26.248 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.345/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.248 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.248 Starting downloading https://server4:443/zpneafcaqh at 37:43.273 on ClientConnection[0b2ca8756722bddf/a2e650f8358a7803(V1) with server4/193.167.100.100:443] 26.248 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 26.249 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.346/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.249 -> Packet A|0|S0|7150b1f4be23a1b2|47|1 StreamFrame[0(CIB),0,17,fin] 26.345 loss detection timeout handler running Sending probe 0, because no ack since 26.248. Current RTT: 33/16. 26.345 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.345 (Probe is a handshake retransmit) 26.345 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 26.539/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.345 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 26.539 loss detection timeout handler running Sending probe 1, because no ack since 26.249. Current RTT: 33/16. 26.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.539 (Probe is a handshake retransmit) 26.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 26.927/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.539 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 26.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 26.928/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.540 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 26.663 <- (8) Packet A|2|S0|a2e650f8358a7803|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a743b9d15c07db25|88541923bf6ed362af625634b2920dda] CryptoFrame[0,42] 26.663 State is set to Confirmed reschedule loss detection timer for PTO over 73 millis, based on 26.737/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -292 millis, based on 26.371/App, because ackElicitingInFlight | RTT:33/16 26.664 Discarding pn space Handshake because HandshakeDone is received 26.664 loss detection timeout handler running Sending probe 0, because no ack since 26.249. Current RTT: 33/16. 26.664 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 26.908/App, because ackElicitingInFlight | RTT:33/16 26.664 -> Packet PA|1|S0|7150b1f4be23a1b2|47|1 StreamFrame[0(CIB),0,17,fin] 26.683 -> Packet A|2|S0|7150b1f4be23a1b2|32|1 AckFrame[2|Δ19] 26.714 <- (9) Packet A|5|S0|a2e650f8358a7803|105|4 HandshakeDoneFrame[] AckFrame[1|Δ0] NewConnectionIdFrame[1,<0|a743b9d15c07db25|88541923bf6ed362af625634b2920dda] CryptoFrame[0,42] 26.715 Cwnd(-): 3000; inflight: 0 26.715 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 26.715 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 123 millis, based on 26.839/App, because ackElicitingInFlight | RTT:35/16 26.715 -> Packet A|3|S0|7150b1f4be23a1b2|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 26.734 -> Packet A|4|S0|7150b1f4be23a1b2|34|1 AckFrame[5,2|Δ19] 26.838 loss detection timeout handler running Sending probe 0, because no ack since 26.715. Current RTT: 35/16. 26.838 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 247 millis, based on 27.087/App, because ackElicitingInFlight | RTT:35/16 26.839 -> Packet PA|5|S0|7150b1f4be23a1b2|47|1 StreamFrame[0(CIB),0,17,fin] 26.894 <- (10) Packet A|9|S0|a2e650f8358a7803|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 26.894 Finished downloading https://server4:443/zpneafcaqh at 37:43.919 on ClientConnection[0b2ca8756722bddf/a2e650f8358a7803(V1) with server4/193.167.100.100:443] 26.895 Closing ClientConnection[0b2ca8756722bddf/a2e650f8358a7803(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.895 -> Packet A|6|S0|7150b1f4be23a1b2|39|2 ConnectionCloseFrame[0|0|] AckFrame[9,5,2|Δ0] 26.895 Creating connection with server4:443 with v1 26.896 Setting up connection for downloading https://server4:443/afvgxlpjjn at 37:43.920 on ClientConnection[2fdabf0a38179c8c/b0a64bb1aadf625c(V1) with server4/193.167.100.100:443] 26.896 Original destination connection id: 2fdabf0a38179c8c (scid: b0a64bb1aadf625c) >- CryptoStream[I|ClientHello] 26.897 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.097/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.897 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.926 <- (11) Packet A|10|S0|a2e650f8358a7803|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-2|Δ0] 27.096 loss detection timeout handler running Sending probe 0, because no ack since 26.897. Current RTT: 100/25. 27.096 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.096 (Probe is an initial retransmit) 27.097 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.497/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.097 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.496 loss detection timeout handler running Sending probe 1, because no ack since 27.097. Current RTT: 100/25. 27.496 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.496 (Probe is an initial retransmit) 27.496 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.296/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.496 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.497 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.297/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.497 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.533 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] Padding(281) 27.534 probe count not reset on ack because handshake not yet confirmed 27.534 Retransmitting CryptoFrame[0,257] on level Initial 27.534 Cwnd(-): 6000; inflight: 1200 27.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.334/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 435 millis, based on 27.970/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 27.534 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 27.533 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 27.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 435 millis, based on 27.973/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 27.536 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 27.538 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 435 millis, based on 27.974/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 27.538 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 27.648/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 27.539 Discarding pn space Initial because first Handshake message is being sent 27.539 Starting downloading https://server4:443/afvgxlpjjn at 37:44.563 on ClientConnection[2fdabf0a38179c8c/b0a64bb1aadf625c(V1) with server4/193.167.100.100:443] 27.539 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 27.539 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 27.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 27.648/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 27.539 -> Packet A|0|S0|46b3c7f9416e91f4|47|1 StreamFrame[0(CIB),0,17,fin] 27.567 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 27.647 loss detection timeout handler running Sending probe 0, because no ack since 27.538. Current RTT: 37/18. 27.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.647 (Probe is a handshake retransmit) 27.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 27.866/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 27.648 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 27.680 <- (4) Packet A|0|S0|b0a64bb1aadf625c|55|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2a3a43d79e073ef2|b254af065acb7138b1409f686c4d275a] 27.680 State is set to Confirmed reschedule loss detection timer for PTO over 126 millis, based on 27.807/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -7 millis, based on 27.673/App, because ackElicitingInFlight | RTT:37/18 27.680 Discarding pn space Handshake because HandshakeDone is received 27.680 loss detection timeout handler running Sending probe 0, because no ack since 27.539. Current RTT: 37/18. 27.680 (Probe is retransmit on level App) 27.680 <- (5) Packet A|1|S0|b0a64bb1aadf625c|71|1 CryptoFrame[0,42] reschedule loss detection timer for PTO over 267 millis, based on 27.949/App, because ackElicitingInFlight | RTT:37/18 -< CryptoStream[A|NewSessionTicket] 27.681 -> Packet PA|1|S0|46b3c7f9416e91f4|47|1 StreamFrame[0(CIB),0,17,fin] 27.681 -> Packet A|2|S0|46b3c7f9416e91f4|31|1 AckFrame[1-0|Δ0] 27.948 loss detection timeout handler running Sending probe 1, because no ack since 27.681. Current RTT: 37/18. 27.948 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 28.484/App, because ackElicitingInFlight | RTT:37/18 27.948 -> Packet PA|3|S0|46b3c7f9416e91f4|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 28.485/App, because ackElicitingInFlight | RTT:37/18 27.949 -> Packet PA|4|S0|46b3c7f9416e91f4|47|1 StreamFrame[0(CIB),0,17,fin] 28.097 <- (6) Packet A|4|S0|b0a64bb1aadf625c|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 28.097 Finished downloading https://server4:443/afvgxlpjjn at 37:45.122 on ClientConnection[2fdabf0a38179c8c/b0a64bb1aadf625c(V1) with server4/193.167.100.100:443] 28.097 Closing ClientConnection[2fdabf0a38179c8c/b0a64bb1aadf625c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.098 -> Packet A|5|S0|46b3c7f9416e91f4|37|2 ConnectionCloseFrame[0|0|] AckFrame[4,1-0|Δ0] 28.098 Creating connection with server4:443 with v1 28.099 Setting up connection for downloading https://server4:443/vwelqhyyvp at 37:45.123 on ClientConnection[3fa73317bb344367/5e90c107f74b1e17(V1) with server4/193.167.100.100:443] 28.099 Original destination connection id: 3fa73317bb344367 (scid: 5e90c107f74b1e17) >- CryptoStream[I|ClientHello] 28.100 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.300/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.100 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.130 <- (7) Packet A|5|S0|b0a64bb1aadf625c|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 28.299 loss detection timeout handler running Sending probe 0, because no ack since 28.100. Current RTT: 100/25. 28.299 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.299 (Probe is an initial retransmit) 28.299 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.699/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.299 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.536 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 28.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 28.739/Handshake, because peerAwaitingAddressValidation | RTT:100/25 28.539 Discarding pn space Initial because first Handshake message is being sent 28.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 28.739/Handshake, because peerAwaitingAddressValidation | RTT:100/25 28.539 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 28.573 <- (2) Packet H|1|L|743|1 CryptoFrame[0,697] >- CryptoStream[H|Finished] 28.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 28.776/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.576 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.576 Starting downloading https://server4:443/vwelqhyyvp at 37:45.601 on ClientConnection[3fa73317bb344367/5e90c107f74b1e17(V1) with server4/193.167.100.100:443] 28.576 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 28.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 28.777/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.577 -> Packet A|0|S0|d714dcbf57bc4dc1|47|1 StreamFrame[0(CIB),0,17,fin] 28.608 <- (3) Packet H|2|L|743|1 CryptoFrame[0,697] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.609 -> Packet H|2|L|46|1 AckFrame[2-1|Δ0] 28.695 <- (4) Packet H|3|L|743|1 CryptoFrame[0,697] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.695 -> Packet H|3|L|46|1 AckFrame[3-1|Δ0] 28.776 loss detection timeout handler running Sending probe 0, because no ack since 28.576. Current RTT: 100/25. 28.776 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.776 (Probe is a handshake retransmit) 28.776 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 29.176/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.776 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 28.808 <- (5) Packet A|0|S0|5e90c107f74b1e17|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1fdd4d3c4d24a099|967617532ff8a29a4c51e21cefe3b9b9] CryptoFrame[0,42] 28.808 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 29.027/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 28.802/App, because ackElicitingInFlight | RTT:100/25 28.808 Discarding pn space Handshake because HandshakeDone is received 28.808 loss detection timeout handler running Sending probe 0, because no ack since 28.577. Current RTT: 100/25. 28.809 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 449 millis, based on 29.259/App, because ackElicitingInFlight | RTT:100/25 28.809 -> Packet PA|1|S0|d714dcbf57bc4dc1|47|1 StreamFrame[0(CIB),0,17,fin] 28.828 -> Packet A|2|S0|d714dcbf57bc4dc1|32|1 AckFrame[0|Δ19] 29.258 loss detection timeout handler running Sending probe 1, because no ack since 28.809. Current RTT: 100/25. 29.258 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 30.158/App, because ackElicitingInFlight | RTT:100/25 29.258 -> Packet PA|3|S0|d714dcbf57bc4dc1|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 30.159/App, because ackElicitingInFlight | RTT:100/25 29.259 -> Packet PA|4|S0|d714dcbf57bc4dc1|47|1 StreamFrame[0(CIB),0,17,fin] 29.386 <- (6) Packet A|2|S0|5e90c107f74b1e17|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 29.387 Finished downloading https://server4:443/vwelqhyyvp at 37:46.412 on ClientConnection[3fa73317bb344367/5e90c107f74b1e17(V1) with server4/193.167.100.100:443] 29.387 Closing ClientConnection[3fa73317bb344367/5e90c107f74b1e17(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.388 -> Packet A|5|S0|d714dcbf57bc4dc1|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 29.388 Creating connection with server4:443 with v1 29.389 Setting up connection for downloading https://server4:443/jkxasncjjw at 37:46.413 on ClientConnection[d65cfaa1d66aa633/695764b26a2529e9(V1) with server4/193.167.100.100:443] 29.389 Original destination connection id: d65cfaa1d66aa633 (scid: 695764b26a2529e9) >- CryptoStream[I|ClientHello] 29.390 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.590/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.390 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.420 <- (7) Packet A|3|S0|5e90c107f74b1e17|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 29.427 <- (1) Packet I|0|L|457|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(282) 29.427 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.627/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 29.427 <- (1) Packet H|0|L|743|1 CryptoFrame[0,697] 29.429 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 29.537/Handshake, because peerAwaitingAddressValidation | RTT:36/18 29.429 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 29.431 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 29.539/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 29.431 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.433 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 29.541/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 29.434 Discarding pn space Initial because first Handshake message is being sent 29.434 Starting downloading https://server4:443/jkxasncjjw at 37:46.458 on ClientConnection[d65cfaa1d66aa633/695764b26a2529e9(V1) with server4/193.167.100.100:443] 29.434 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 29.434 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 29.542/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 29.434 -> Packet A|0|S0|9e46a185c76b6a3c|47|1 StreamFrame[0(CIB),0,17,fin] 29.463 <- (2) Packet A|0|S0|695764b26a2529e9|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|6451bafe4c9bb3af|ce32b3fbce24fa153a8d49ca04fdba48] CryptoFrame[0,42] 29.463 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 29.539/Handshake, because ackElicitingInFlight | RTT:36/18 reschedule loss detection timer for PTO over 103 millis, based on 29.567/App, because ackElicitingInFlight | RTT:36/18 29.463 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 29.466 <- (3) Packet A|1|S0|695764b26a2529e9|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 29.467 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.467 Finished downloading https://server4:443/jkxasncjjw at 37:46.491 on ClientConnection[d65cfaa1d66aa633/695764b26a2529e9(V1) with server4/193.167.100.100:443] 29.467 Closing ClientConnection[d65cfaa1d66aa633/695764b26a2529e9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.467 -> Packet A|1|S0|9e46a185c76b6a3c|32|1 AckFrame[1-0|Δ3] 29.467 -> Packet A|2|S0|9e46a185c76b6a3c|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 29.468 Creating connection with server4:443 with v1 29.468 Setting up connection for downloading https://server4:443/ihsnqauqgj at 37:46.493 on ClientConnection[f1e5531f5339d7a1/8822ce5ef89ead2d(V1) with server4/193.167.100.100:443] 29.468 Original destination connection id: f1e5531f5339d7a1 (scid: 8822ce5ef89ead2d) >- CryptoStream[I|ClientHello] 29.470 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.670/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.469 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.499 <- (4) Packet A|2|S0|695764b26a2529e9|35|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 29.507 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 29.508 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.708/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 29.507 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 29.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 29.619/Handshake, because peerAwaitingAddressValidation | RTT:37/18 29.510 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 29.513 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 29.622/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 29.513 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.513 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 29.622/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 29.513 Discarding pn space Initial because first Handshake message is being sent 29.513 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 29.513 Starting downloading https://server4:443/ihsnqauqgj at 37:46.538 on ClientConnection[f1e5531f5339d7a1/8822ce5ef89ead2d(V1) with server4/193.167.100.100:443] 29.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 29.623/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 29.514 -> Packet A|0|S0|b9e3d78fe0e67368|47|1 StreamFrame[0(CIB),0,17,fin] 29.622 loss detection timeout handler running Sending probe 0, because no ack since 29.513. Current RTT: 37/18. 29.622 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.622 (Probe is a handshake retransmit) 29.622 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 29.840/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 29.622 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 29.654 <- (2) Packet A|0|S0|8822ce5ef89ead2d|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b08fb24956ce2823|4c4b4676d904a46de77444c9d72b78cb] CryptoFrame[0,42] 29.655 State is set to Confirmed reschedule loss detection timer for PTO over 126 millis, based on 29.782/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -7 millis, based on 29.648/App, because ackElicitingInFlight | RTT:37/18 29.655 loss detection timeout handler running 29.655 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 29.514. Current RTT: 37/18. 29.655 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 267 millis, based on 29.923/App, because ackElicitingInFlight | RTT:37/18 29.655 -> Packet PA|1|S0|b9e3d78fe0e67368|47|1 StreamFrame[0(CIB),0,17,fin] 29.675 -> Packet A|2|S0|b9e3d78fe0e67368|32|1 AckFrame[0|Δ19] 29.923 loss detection timeout handler running Sending probe 1, because no ack since 29.655. Current RTT: 37/18. 29.923 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 30.459/App, because ackElicitingInFlight | RTT:37/18 29.923 -> Packet PA|3|S0|b9e3d78fe0e67368|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 30.460/App, because ackElicitingInFlight | RTT:37/18 29.924 -> Packet PA|4|S0|b9e3d78fe0e67368|47|1 StreamFrame[0(CIB),0,17,fin] 29.955 <- (3) Packet A|1|S0|8822ce5ef89ead2d|31|1 AckFrame[4-2|Δ0] 29.956 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 29.956 Cwnd(-): 6000; inflight: 0 29.956 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 120 millis, based on 30.077/App, because ackElicitingInFlight | RTT:36/15 29.956 -> Packet A|5|S0|b9e3d78fe0e67368|47|1 StreamFrame[0(CIB),0,17,fin] 30.076 loss detection timeout handler running Sending probe 0, because no ack since 29.956. Current RTT: 36/15. 30.076 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 30.318/App, because ackElicitingInFlight | RTT:36/15 30.076 -> Packet PA|6|S0|b9e3d78fe0e67368|47|1 StreamFrame[0(CIB),0,17,fin] 30.126 <- (4) Packet A|4|S0|8822ce5ef89ead2d|34|1 AckFrame[6,4-2|Δ19] 30.127 Cwnd(-): 3000; inflight: 0 30.127 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 30.127 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 111 millis, based on 30.239/App, because ackElicitingInFlight | RTT:35/13 30.127 -> Packet A|7|S0|b9e3d78fe0e67368|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 30.238 loss detection timeout handler running Sending probe 0, because no ack since 30.127. Current RTT: 35/13. 30.238 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 223 millis, based on 30.462/App, because ackElicitingInFlight | RTT:35/13 30.238 -> Packet PA|8|S0|b9e3d78fe0e67368|47|1 StreamFrame[0(CIB),0,17,fin] 30.289 <- (5) Packet A|5|S0|8822ce5ef89ead2d|36|1 AckFrame[8,6,4-2|Δ19] 30.289 Cwnd(-): 2400; inflight: 0 30.289 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 30.289 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 103 millis, based on 30.393/App, because ackElicitingInFlight | RTT:35/11 30.289 -> Packet A|9|S0|b9e3d78fe0e67368|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4,1|Δ0] 30.309 <- (6) Packet A|6|S0|8822ce5ef89ead2d|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 30.309 Finished downloading https://server4:443/ihsnqauqgj at 37:47.334 on ClientConnection[f1e5531f5339d7a1/8822ce5ef89ead2d(V1) with server4/193.167.100.100:443] 30.310 Closing ClientConnection[f1e5531f5339d7a1/8822ce5ef89ead2d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.310 -> Packet A|10|S0|b9e3d78fe0e67368|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,1|Δ0] 30.310 Creating connection with server4:443 with v1 30.311 Setting up connection for downloading https://server4:443/rejecfeidv at 37:47.335 on ClientConnection[9b258dd561f4edad/193cfdb08c43f5bb(V1) with server4/193.167.100.100:443] 30.311 Original destination connection id: 9b258dd561f4edad (scid: 193cfdb08c43f5bb) >- CryptoStream[I|ClientHello] 30.312 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.512/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.312 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.340 <- (7) Packet A|9|S0|8822ce5ef89ead2d|32|1 AckFrame[9-8|Δ19] 30.340 -> Packet A|11|S0|b9e3d78fe0e67368|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,1|Δ0] 30.511 loss detection timeout handler running Sending probe 0, because no ack since 30.312. Current RTT: 100/25. 30.511 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.511 (Probe is an initial retransmit) 30.512 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 30.912/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.512 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.549 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] Padding(281) 30.549 probe count not reset on ack because handshake not yet confirmed 30.550 Retransmitting CryptoFrame[0,257] on level Initial 30.550 Cwnd(-): 6000; inflight: 0 30.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 30.950/Initial, because peerAwaitingAddressValidation | RTT:100/25 30.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 217 millis, based on 30.768/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.550 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 30.549 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 30.553 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 30.771/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.553 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 30.555 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 30.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.555 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.555 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 30.664/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.555 Discarding pn space Initial because first Handshake message is being sent 30.555 Starting downloading https://server4:443/rejecfeidv at 37:47.579 on ClientConnection[9b258dd561f4edad/193cfdb08c43f5bb(V1) with server4/193.167.100.100:443] 30.555 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 30.556 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 30.665/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.555 -> Packet A|0|S0|dc8904285f825b6e|47|1 StreamFrame[0(CIB),0,17,fin] 30.583 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.664 loss detection timeout handler running Sending probe 0, because no ack since 30.555. Current RTT: 37/18. 30.664 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.664 (Probe is a handshake retransmit) 30.664 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 30.882/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.664 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 30.749 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.881 loss detection timeout handler running Sending probe 1, because no ack since 30.555. Current RTT: 37/18. 30.881 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.882 (Probe is a handshake retransmit) 30.882 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 435 millis, based on 31.318/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.882 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 30.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 435 millis, based on 31.319/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 30.883 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 30.948 <- (4) Packet H|1|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.949 -> Packet H|5|L|46|1 AckFrame[1-0|Δ0] 30.949 <- (5) Packet H|2|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.950 -> Packet H|6|L|46|1 AckFrame[2-0|Δ0] 31.149 <- (6) Packet H|3|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.150 -> Packet H|7|L|46|1 AckFrame[3-0|Δ0] 31.318 loss detection timeout handler running Sending probe 2, because no ack since 30.555. Current RTT: 37/18. 31.318 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.318 (Probe is a handshake retransmit) 31.318 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 871 millis, based on 32.190/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 31.318 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 31.319 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 871 millis, based on 32.191/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 31.319 -> Packet PH|9|L|80|1 CryptoFrame[0,36] 32.190 loss detection timeout handler running Sending probe 3, because no ack since 30.555. Current RTT: 37/18. 32.190 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.191 (Probe is a handshake retransmit) 32.191 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1743 millis, based on 33.935/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 32.191 -> Packet PH|10|L|80|1 CryptoFrame[0,36] 32.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1743 millis, based on 33.936/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 32.192 -> Packet PH|11|L|80|1 CryptoFrame[0,36] 32.222 <- (7) Packet A|0|S0|193cfdb08c43f5bb|29|2 HandshakeDoneFrame[] Padding(2) 32.223 State is set to Confirmed reschedule loss detection timer for PTO over 476 millis, based on 32.699/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -1533 millis, based on 30.689/App, because ackElicitingInFlight | RTT:37/18 32.223 Discarding pn space Handshake because HandshakeDone is received 32.223 loss detection timeout handler running Sending probe 0, because no ack since 30.555. Current RTT: 37/18. 32.223 (Probe is retransmit on level App) 32.223 <- (8) Packet A|1|S0|193cfdb08c43f5bb|99|2 NewConnectionIdFrame[1,<0|5c6aadffbd67d7cb|9e203ebbfe35116355b19e010e49f6d2] CryptoFrame[0,42] reschedule loss detection timer for PTO over 267 millis, based on 32.491/App, because ackElicitingInFlight | RTT:37/18 32.223 -> Packet PA|1|S0|dc8904285f825b6e|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 32.223 -> Packet A|2|S0|dc8904285f825b6e|31|1 AckFrame[1-0|Δ0] 32.490 loss detection timeout handler running Sending probe 1, because no ack since 32.223. Current RTT: 37/18. 32.491 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 33.027/App, because ackElicitingInFlight | RTT:37/18 32.491 -> Packet PA|3|S0|dc8904285f825b6e|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 535 millis, based on 33.028/App, because ackElicitingInFlight | RTT:37/18 32.492 -> Packet PA|4|S0|dc8904285f825b6e|47|1 StreamFrame[0(CIB),0,17,fin] 32.524 <- (9) Packet A|3|S0|193cfdb08c43f5bb|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[4-2|Δ0] MaxStreamsFrame[B,101] 32.524 Finished downloading https://server4:443/rejecfeidv at 37:49.549 on ClientConnection[9b258dd561f4edad/193cfdb08c43f5bb(V1) with server4/193.167.100.100:443] 32.524 Cwnd(-): 3000; inflight: 0 32.524 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 32.524 Closing ClientConnection[9b258dd561f4edad/193cfdb08c43f5bb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.524 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 32.525 -> Packet A|5|S0|dc8904285f825b6e|47|1 StreamFrame[0(CIB),0,17,fin] 32.525 -> Packet A|6|S0|dc8904285f825b6e|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 32.525 Creating connection with server4:443 with v1 32.526 Setting up connection for downloading https://server4:443/toepijotjk at 37:49.550 on ClientConnection[06ce308240809b4b/67e1d3381e237088(V1) with server4/193.167.100.100:443] 32.526 Original destination connection id: 06ce308240809b4b (scid: 67e1d3381e237088) >- CryptoStream[I|ClientHello] 32.527 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.727/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.527 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.556 <- (10) Packet A|4|S0|193cfdb08c43f5bb|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 32.726 loss detection timeout handler running Sending probe 0, because no ack since 32.527. Current RTT: 100/25. 32.726 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.726 (Probe is an initial retransmit) 32.726 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 33.127/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.726 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.763 <- (1) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 32.766 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 32.966/Handshake, because peerAwaitingAddressValidation | RTT:100/25 32.766 Discarding pn space Initial because first Handshake message is being sent 32.766 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 32.966/Handshake, because peerAwaitingAddressValidation | RTT:100/25 32.766 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 32.799 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 32.871 <- (3) Packet H|1|L|744|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 32.874 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.074/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.874 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.874 Starting downloading https://server4:443/toepijotjk at 37:49.898 on ClientConnection[06ce308240809b4b/67e1d3381e237088(V1) with server4/193.167.100.100:443] 32.874 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 32.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.075/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.875 -> Packet A|0|S0|4da350741693aded|47|1 StreamFrame[0(CIB),0,17,fin] 32.906 <- (4) Packet H|2|L|744|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.907 -> Packet H|2|L|46|1 AckFrame[2-1|Δ0] 33.074 loss detection timeout handler running Sending probe 0, because no ack since 32.874. Current RTT: 100/25. 33.074 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.074 (Probe is a handshake retransmit) 33.074 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 33.474/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.074 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 33.106 <- (5) Packet A|0|S0|67e1d3381e237088|29|2 HandshakeDoneFrame[] Padding(2) 33.106 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 33.325/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 33.100/App, because ackElicitingInFlight | RTT:100/25 33.106 Discarding pn space Handshake because HandshakeDone is received 33.106 loss detection timeout handler running Sending probe 0, because no ack since 32.875. Current RTT: 100/25. 33.107 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 33.557/App, because ackElicitingInFlight | RTT:100/25 33.107 -> Packet PA|1|S0|4da350741693aded|47|1 StreamFrame[0(CIB),0,17,fin] 33.126 -> Packet A|2|S0|4da350741693aded|32|1 AckFrame[0|Δ19] 33.209 <- (6) Packet A|2|S0|67e1d3381e237088|29|2 HandshakeDoneFrame[] Padding(2) 33.229 -> Packet A|3|S0|4da350741693aded|34|1 AckFrame[2,0|Δ19] 33.260 <- (7) Packet A|3|S0|67e1d3381e237088|99|2 NewConnectionIdFrame[1,<0|5cbe5edea2f8da82|7297c20620910c263f5fe5a41dc9c498] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 33.280 -> Packet A|4|S0|4da350741693aded|34|1 AckFrame[3-2,0|Δ19] 33.556 loss detection timeout handler running Sending probe 1, because no ack since 33.107. Current RTT: 100/25. 33.556 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 34.456/App, because ackElicitingInFlight | RTT:100/25 33.556 -> Packet PA|5|S0|4da350741693aded|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 34.457/App, because ackElicitingInFlight | RTT:100/25 33.557 -> Packet PA|6|S0|4da350741693aded|47|1 StreamFrame[0(CIB),0,17,fin] 33.589 <- (8) Packet A|4|S0|67e1d3381e237088|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[5-3|Δ0] MaxStreamsFrame[B,101] 33.590 Cwnd(-): 6000; inflight: 47 33.590 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 33.590 Finished downloading https://server4:443/toepijotjk at 37:50.614 on ClientConnection[06ce308240809b4b/67e1d3381e237088(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 192 millis, based on 33.782/App, because ackElicitingInFlight | RTT:100/25 33.590 Closing ClientConnection[06ce308240809b4b/67e1d3381e237088(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 121 millis, based on 33.712/App, because ackElicitingInFlight | RTT:33/16 33.590 -> Packet A|7|S0|4da350741693aded|47|1 StreamFrame[0(CIB),0,17,fin] 33.590 -> Packet A|8|S0|4da350741693aded|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 33.591 Creating connection with server4:443 with v1 33.591 Setting up connection for downloading https://server4:443/hjipixymti at 37:50.615 on ClientConnection[6d15aecfff87b362/0c04beccdcfc1305(V1) with server4/193.167.100.100:443] 33.591 Original destination connection id: 6d15aecfff87b362 (scid: 0c04beccdcfc1305) >- CryptoStream[I|ClientHello] 33.592 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.792/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.592 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.630 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 33.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.831/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 33.630 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] 33.633 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.742/Handshake, because peerAwaitingAddressValidation | RTT:37/18 33.632 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 33.634 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.743/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.634 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.744/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.635 Starting downloading https://server4:443/hjipixymti at 37:50.659 on ClientConnection[6d15aecfff87b362/0c04beccdcfc1305(V1) with server4/193.167.100.100:443] 33.635 Discarding pn space Initial because first Handshake message is being sent 33.635 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 33.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 108 millis, based on 33.744/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.635 -> Packet A|0|S0|9ba43c3711fd0cbd|47|1 StreamFrame[0(CIB),0,17,fin] 33.680 <- (9) Packet A|5|S0|67e1d3381e237088|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 33.681 -> Packet A|9|S0|4da350741693aded|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 33.743 loss detection timeout handler running Sending probe 0, because no ack since 33.634. Current RTT: 37/18. 33.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.743 (Probe is a handshake retransmit) 33.744 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 217 millis, based on 33.962/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.743 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 33.961 loss detection timeout handler running Sending probe 1, because no ack since 33.635. Current RTT: 37/18. 33.961 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.961 (Probe is a handshake retransmit) 33.961 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 435 millis, based on 34.397/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.961 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 33.962 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 435 millis, based on 34.398/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:37/18 33.962 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 34.050 <- (2) Packet A|4|S0|0c04beccdcfc1305|29|2 HandshakeDoneFrame[] Padding(2) 34.050 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 34.171/App, because ackElicitingInFlight | RTT:37/18 reschedule loss detection timer for PTO over -281 millis, based on 33.769/App, because ackElicitingInFlight | RTT:37/18 34.050 Discarding pn space Handshake because HandshakeDone is received 34.050 loss detection timeout handler running Sending probe 0, because no ack since 33.635. Current RTT: 37/18. 34.051 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 267 millis, based on 34.319/App, because ackElicitingInFlight | RTT:37/18 34.051 -> Packet PA|1|S0|9ba43c3711fd0cbd|47|1 StreamFrame[0(CIB),0,17,fin] 34.070 -> Packet A|2|S0|9ba43c3711fd0cbd|32|1 AckFrame[4|Δ19] 34.102 <- (3) Packet A|6|S0|0c04beccdcfc1305|1137|6 HandshakeDoneFrame[] AckFrame[0|Δ0] NewConnectionIdFrame[1,<0|b26c2ec38f535bb5|5d52b1bed7da482f816833ccd8a37fe7] CryptoFrame[0,42] StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] reschedule loss detection timer for PTO over 82 millis, based on 34.185/App, because ackElicitingInFlight | RTT:37/18 -< CryptoStream[A|NewSessionTicket] 34.103 Finished downloading https://server4:443/hjipixymti at 37:51.127 on ClientConnection[6d15aecfff87b362/0c04beccdcfc1305(V1) with server4/193.167.100.100:443] 34.103 Closing ClientConnection[6d15aecfff87b362/0c04beccdcfc1305(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 34.104 Creating connection with server4:443 with v1 34.103 -> Packet A|3|S0|9ba43c3711fd0cbd|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,4|Δ0] 34.104 Setting up connection for downloading https://server4:443/ehkrsabovq at 37:51.128 on ClientConnection[7fcdef962026f92b/3351f8fadd41d754(V1) with server4/193.167.100.100:443] 34.104 Original destination connection id: 7fcdef962026f92b (scid: 3351f8fadd41d754) >- CryptoStream[I|ClientHello] 34.105 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 34.305/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.105 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.135 <- (4) Packet A|7|S0|0c04beccdcfc1305|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 34.304 loss detection timeout handler running Sending probe 0, because no ack since 34.105. Current RTT: 100/25. 34.304 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 34.304 (Probe is an initial retransmit) 34.304 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 34.704/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.304 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.338 <- (1) Packet I|1|L|1201|2 Token=[] AckFrame[1-0|Δ0] Padding(1153) 34.338 probe count not reset on ack because handshake not yet confirmed 34.338 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 34.738/Initial, because peerAwaitingAddressValidation | RTT:100/25 34.342 <- (2) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 34.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.441/Handshake, because peerAwaitingAddressValidation | RTT:33/16 34.344 Discarding pn space Initial because first Handshake message is being sent 34.345 Packet not sent because keys are discarded: Packet I|2|L|.|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 34.440 loss detection timeout handler running 34.440 Sending probe 0. Current RTT: 33/16. 34.440 Sending probe because peer awaiting address validation 34.441 (Probe is a handshake ping) 34.441 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 34.635/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.441 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 34.541 <- (3) Packet H|1|L|743|1 CryptoFrame[0,697] >- CryptoStream[H|Finished] 34.544 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 34.738/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.544 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 34.544 Starting downloading https://server4:443/ehkrsabovq at 37:51.568 on ClientConnection[7fcdef962026f92b/3351f8fadd41d754(V1) with server4/193.167.100.100:443] 34.542 <- (4) Packet H|2|L|743|1 CryptoFrame[0,697] 34.544 -> Packet H|2|L|46|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 34.544 -> Packet H|3|L|46|1 AckFrame[2-1|Δ0] 34.545 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 34.739/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.544 -> Packet A|0|S0|213cccc4a60a96fa|47|1 StreamFrame[0(CIB),0,17,fin] 34.576 <- (5) Packet H|3|L|743|1 CryptoFrame[0,697] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 34.577 -> Packet H|4|L|46|1 AckFrame[3-1|Δ0] 34.738 loss detection timeout handler running Sending probe 1, because no ack since 34.544. Current RTT: 33/16. 34.738 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 34.738 (Probe is a handshake retransmit) 34.738 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 35.126/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.738 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 34.739 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 35.127/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.739 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 34.770 <- (6) Packet A|0|S0|3351f8fadd41d754|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|fa3c4c5e0998931b|d7436cfc1a873498b68f1fa149a1cf59] CryptoFrame[0,42] 34.770 State is set to Confirmed reschedule loss detection timer for PTO over 262 millis, based on 35.032/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -104 millis, based on 34.666/App, because ackElicitingInFlight | RTT:33/16 34.771 Discarding pn space Handshake because HandshakeDone is received 34.771 loss detection timeout handler running Sending probe 0, because no ack since 34.544. Current RTT: 33/16. 34.771 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 35.015/App, because ackElicitingInFlight | RTT:33/16 34.771 -> Packet PA|1|S0|213cccc4a60a96fa|47|1 StreamFrame[0(CIB),0,17,fin] 34.790 -> Packet A|2|S0|213cccc4a60a96fa|32|1 AckFrame[0|Δ19] 34.803 <- (7) Packet A|1|S0|3351f8fadd41d754|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[1|Δ0] MaxStreamsFrame[B,101] 34.804 Cwnd(-): 6000; inflight: 0 34.804 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 34.804 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 34.804 Finished downloading https://server4:443/ehkrsabovq at 37:51.828 on ClientConnection[7fcdef962026f92b/3351f8fadd41d754(V1) with server4/193.167.100.100:443] 34.804 Closing ClientConnection[7fcdef962026f92b/3351f8fadd41d754(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 105 millis, based on 34.910/App, because ackElicitingInFlight | RTT:33/12 34.804 -> Packet A|3|S0|213cccc4a60a96fa|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 34.804 -> Packet A|4|S0|213cccc4a60a96fa|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 34.805 Creating connection with server4:443 with v1 34.805 Setting up connection for downloading https://server4:443/bdnipvgipe at 37:51.830 on ClientConnection[92c8709dfd037c64/fdff5bda341cb9b8(V1) with server4/193.167.100.100:443] 34.805 Original destination connection id: 92c8709dfd037c64 (scid: fdff5bda341cb9b8) >- CryptoStream[I|ClientHello] 34.806 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.006/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.806 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.836 <- (8) Packet A|2|S0|3351f8fadd41d754|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 35.005 loss detection timeout handler running Sending probe 0, because no ack since 34.806. Current RTT: 100/25. 35.006 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 35.006 (Probe is an initial retransmit) 35.006 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 35.406/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.006 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.243 Discarding packet (745 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 35.244 Discarding packet (44 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 35.405 loss detection timeout handler running Sending probe 1, because no ack since 35.006. Current RTT: 100/25. 35.405 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 35.405 (Probe is an initial retransmit) 35.406 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 36.206/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.405 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.407 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 36.207/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.406 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.843 <- (3) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 35.846 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.046/Handshake, because peerAwaitingAddressValidation | RTT:100/25 35.846 Discarding pn space Initial because first Handshake message is being sent 35.846 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.046/Handshake, because peerAwaitingAddressValidation | RTT:100/25 35.846 -> Packet I|4|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) 35.880 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 35.880 <- (5) Packet H|3|L|745|1 CryptoFrame[0,699] >- CryptoStream[H|Finished] 35.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.083/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.882 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.883 Starting downloading https://server4:443/bdnipvgipe at 37:52.907 on ClientConnection[92c8709dfd037c64/fdff5bda341cb9b8(V1) with server4/193.167.100.100:443] 35.883 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 35.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.083/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.883 -> Packet A|0|S0|043470bdf93a2718|47|1 StreamFrame[0(CIB),0,17,fin] 35.914 <- (6) Packet A|2|S0|fdff5bda341cb9b8|71|1 CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 35.934 -> Packet A|1|S0|043470bdf93a2718|32|1 AckFrame[2|Δ19] 35.965 <- (7) Packet A|3|S0|fdff5bda341cb9b8|55|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f9b2727946bde576|8adc70503b8499d422120da8c31f6266] 35.965 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 36.082/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 142 millis, based on 36.108/App, because ackElicitingInFlight | RTT:100/25 35.965 Discarding pn space Handshake because HandshakeDone is received 35.985 -> Packet A|2|S0|043470bdf93a2718|32|1 AckFrame[3-2|Δ19] 36.108 loss detection timeout handler running Sending probe 0, because no ack since 35.883. Current RTT: 100/25. 36.108 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 36.558/App, because ackElicitingInFlight | RTT:100/25 36.108 -> Packet PA|3|S0|043470bdf93a2718|47|1 StreamFrame[0(CIB),0,17,fin] 36.268 <- (8) Packet A|5|S0|fdff5bda341cb9b8|1058|2 StreamFrame[0(CIB),0,1024,fin] MaxStreamsFrame[B,101] 36.269 Finished downloading https://server4:443/bdnipvgipe at 37:53.293 on ClientConnection[92c8709dfd037c64/fdff5bda341cb9b8(V1) with server4/193.167.100.100:443] 36.269 Closing ClientConnection[92c8709dfd037c64/fdff5bda341cb9b8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 36.269 -> Packet A|4|S0|043470bdf93a2718|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 36.269 Creating connection with server4:443 with v1 36.270 Setting up connection for downloading https://server4:443/kpfgoqexzm at 37:53.294 on ClientConnection[dbc15a42f0f48dab/2ec81563cefa64c5(V1) with server4/193.167.100.100:443] 36.270 Original destination connection id: dbc15a42f0f48dab (scid: 2ec81563cefa64c5) >- CryptoStream[I|ClientHello] 36.271 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.471/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.271 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.301 <- (9) Packet A|6|S0|fdff5bda341cb9b8|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-1|Δ0] 36.308 <- (1) Packet I|0|L|455|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(280) 36.308 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.508/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 36.308 <- (1) Packet H|0|L|745|1 CryptoFrame[0,699] 36.310 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 36.418/Handshake, because peerAwaitingAddressValidation | RTT:36/18 36.310 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 36.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 36.420/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 36.312 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 36.313 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 36.313 Starting downloading https://server4:443/kpfgoqexzm at 37:53.337 on ClientConnection[dbc15a42f0f48dab/2ec81563cefa64c5(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 107 millis, based on 36.421/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 36.313 Discarding pn space Initial because first Handshake message is being sent 36.313 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 36.313 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 36.421/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 36.313 -> Packet A|0|S0|c82e6962361f50fd|47|1 StreamFrame[0(CIB),0,17,fin] 36.344 <- (2) Packet A|0|S0|2ec81563cefa64c5|100|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e3a13c44ab8568cc|cb593d6912417aa0d203ca6a36a74e75] CryptoFrame[0,42] 36.345 State is set to Confirmed reschedule loss detection timer for PTO over 75 millis, based on 36.420/Handshake, because ackElicitingInFlight | RTT:36/18 reschedule loss detection timer for PTO over 101 millis, based on 36.446/App, because ackElicitingInFlight | RTT:36/18 36.345 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 36.346 <- (3) Packet A|1|S0|2ec81563cefa64c5|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 36.346 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 36.346 Finished downloading https://server4:443/kpfgoqexzm at 37:53.371 on ClientConnection[dbc15a42f0f48dab/2ec81563cefa64c5(V1) with server4/193.167.100.100:443] 36.346 Closing ClientConnection[dbc15a42f0f48dab/2ec81563cefa64c5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 36.346 -> Packet A|1|S0|c82e6962361f50fd|32|1 AckFrame[1-0|Δ1] 36.347 -> Packet A|2|S0|c82e6962361f50fd|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 36.347 Creating connection with server4:443 with v1 36.347 Setting up connection for downloading https://server4:443/rjkzegkfja at 37:53.372 on ClientConnection[6062557cffb7d645/c46fea363ca142f4(V1) with server4/193.167.100.100:443] 36.347 Original destination connection id: 6062557cffb7d645 (scid: c46fea363ca142f4) >- CryptoStream[I|ClientHello] 36.348 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.548/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.348 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.548 loss detection timeout handler running Sending probe 0, because no ack since 36.348. Current RTT: 100/25. 36.548 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 36.548 (Probe is an initial retransmit) 36.548 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 36.948/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.548 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.585 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 36.588 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.788/Handshake, because peerAwaitingAddressValidation | RTT:100/25 36.588 Discarding pn space Initial because first Handshake message is being sent 36.588 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.788/Handshake, because peerAwaitingAddressValidation | RTT:100/25 36.588 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 36.622 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 36.787 loss detection timeout handler running 36.787 Sending probe 0. Current RTT: 100/25. 36.787 Sending probe because peer awaiting address validation 36.787 (Probe is a handshake ping) 36.788 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 37.188/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.787 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 37.025 <- (3) Packet H|3|L|745|1 CryptoFrame[0,699] >- CryptoStream[H|Finished] 37.028 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 37.428/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.028 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 37.028 Starting downloading https://server4:443/rjkzegkfja at 37:54.053 on ClientConnection[6062557cffb7d645/c46fea363ca142f4(V1) with server4/193.167.100.100:443] 37.026 <- (4) Packet H|4|L|745|1 CryptoFrame[0,699] 37.028 -> Packet H|2|L|46|1 AckFrame[3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 37.028 -> Packet H|3|L|46|1 AckFrame[4-3|Δ0] 37.029 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 37.429/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.029 -> Packet A|0|S0|425b215709b71c00|47|1 StreamFrame[0(CIB),0,17,fin] 37.059 <- (5) Packet A|0|S0|c46fea363ca142f4|55|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e9998a8cde23abf9|68f85d1b7d62fc0d01ca7423c5ddf15b] 37.060 State is set to Confirmed reschedule loss detection timer for PTO over 367 millis, based on 37.428/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 37.254/App, because ackElicitingInFlight | RTT:100/25 37.060 Discarding pn space Handshake because HandshakeDone is received 37.061 <- (6) Packet A|2|S0|c46fea363ca142f4|1063|3 StreamFrame[0(CIB),0,1024,fin] AckFrame[0|Δ0] MaxStreamsFrame[B,101] 37.062 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 37.062 Finished downloading https://server4:443/rjkzegkfja at 37:54.086 on ClientConnection[6062557cffb7d645/c46fea363ca142f4(V1) with server4/193.167.100.100:443] 37.062 -> Packet A|1|S0|425b215709b71c00|34|1 AckFrame[2,0|Δ1] 37.062 Closing ClientConnection[6062557cffb7d645/c46fea363ca142f4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 37.062 -> Packet A|2|S0|425b215709b71c00|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0]