44:36.670 Starting first download at 44:36.659 44:36.698 Creating connection with server4:443 with v1 44:36.755 Original destination connection id: 4342eb16e259ae95 (scid: 86a8c245b91ed0a9) >- CryptoStream[I|ClientHello] 44:36.942 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 44:37.143/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:36.934 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44:37.148 loss detection timeout handler running Sending probe 0, because no ack since 44:36.934. Current RTT: 100/25. 44:37.179 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 44:37.188 (Probe is an initial retransmit) 44:37.198 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 44:37.599/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.198 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44:37.321 <- (1) Packet I|0|L|456|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] Padding(281) 44:37.335 probe count not reset on ack because handshake not yet confirmed 44:37.340 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 44:37.740/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 44:37.384 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2315 millis, based on 44:39.700/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:386/193 44:37.384 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 44:37.321 <- (1) Packet H|0|L|744|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 44:37.434 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2315 millis, based on 44:39.750/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:386/193 44:37.434 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 44:37.444 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 44:37.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1157 millis, based on 44:38.614/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:386/193 44:37.456 Discarding pn space Initial because first Handshake message is being sent 44:37.461 Discarding packet (1201 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 44:37.487 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1157 millis, based on 44:38.646/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:386/193 44:37.493 <- (3) Packet A|0|S0|86a8c245b91ed0a9|29|2 HandshakeDoneFrame[] Padding(2) 44:37.503 State is set to Confirmed reschedule loss detection timer for PTO over 1089 millis, based on 44:38.592/Handshake, because ackElicitingInFlight | RTT:386/193 reschedule loss detection timer for PTO over 1166 millis, based on 44:38.670/App, because ackElicitingInFlight | RTT:386/193 44:37.503 Discarding pn space Handshake because HandshakeDone is received 44:37.487 -> Packet A|0|S0|2be8cbea8b1d06ad|288|1 StreamFrame[0(CIB),0,257,fin] 44:37.503 <- (4) Packet A|1|S0|86a8c245b91ed0a9|99|2 NewConnectionIdFrame[1,<0|83db860a4b5f3f07|5ee62d86af039399c49e02c70b6ba59b] CryptoFrame[0,42] -< CryptoStream[A|NewSessionTicket] 44:37.512 -> Packet A|1|S0|2be8cbea8b1d06ad|32|1 AckFrame[1-0|Δ8] 44:37.532 <- (5) Packet A|2|S0|86a8c245b91ed0a9|71|3 StreamFrame[0(CIB),0,32,fin] AckFrame[0|Δ2] MaxStreamsFrame[B,101] 44:37.537 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 44:37.538 Downloaded https://server4:443/resesfjkeodbkrzpjnpvujwoqjlfslqjlkvikxnkjffwooafdwoznexuelixvxxrckczukpxrhdwmlwepkdylnblnrhipgzvpaadlbibdhdlxnwopvnsltabpkunreksmgjylfrwkeqbmoqkpyiqrgbzkijekiqcvbjszwpxqufnaiqwbkaeoozwdbvnbirnnfngugdjhkobfvdyvxmcdqnoqpojjywujuvisntkfiaethznorxopguqbu finished at 44:37.538 44:37.538 Got 1 new session tickets 44:37.542 Closing ClientConnection[4342eb16e259ae95/86a8c245b91ed0a9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 44:37.544 Connection closed; starting second connection with 0-rtt 44:37.544 Creating connection with server4:443 with v1 44:37.546 Original destination connection id: 9218544471cef830 (scid: 19d58a2b0c9b3bf7) 44:37.544 -> Packet A|2|S0|2be8cbea8b1d06ad|36|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ6] >- CryptoStream[I|ClientHello] 44:37.556 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 198 millis, based on 44:37.756/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.556 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,324] Padding(829) 44:37.558 Sending 257 bytes of early data on Stream 0 44:37.558 Sending 257 bytes of early data on Stream 4 44:37.559 Sending 257 bytes of early data on Stream 8 44:37.559 Sending 257 bytes of early data on Stream 12 44:37.559 Sending 257 bytes of early data on Stream 16 44:37.559 Sending 257 bytes of early data on Stream 20 44:37.559 Sending 257 bytes of early data on Stream 24 44:37.559 Sending 257 bytes of early data on Stream 28 44:37.559 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44:37.759/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.559 Sending 257 bytes of early data on Stream 32 44:37.563 Sending 257 bytes of early data on Stream 36 44:37.563 Sending 257 bytes of early data on Stream 40 44:37.563 Sending 257 bytes of early data on Stream 44 44:37.563 Sending 257 bytes of early data on Stream 48 44:37.563 Sending 257 bytes of early data on Stream 52 44:37.564 Sending 257 bytes of early data on Stream 56 44:37.567 Sending 257 bytes of early data on Stream 60 44:37.567 Sending 257 bytes of early data on Stream 64 44:37.567 Sending 257 bytes of early data on Stream 68 44:37.567 Sending 257 bytes of early data on Stream 72 44:37.567 Sending 257 bytes of early data on Stream 76 44:37.567 Sending 257 bytes of early data on Stream 80 44:37.568 Sending 257 bytes of early data on Stream 84 44:37.569 Sending 257 bytes of early data on Stream 88 44:37.569 Sending 257 bytes of early data on Stream 92 44:37.569 Sending 257 bytes of early data on Stream 96 44:37.569 Sending 257 bytes of early data on Stream 100 44:37.569 Sending 257 bytes of early data on Stream 104 44:37.569 Sending 257 bytes of early data on Stream 108 44:37.570 Sending 257 bytes of early data on Stream 112 44:37.571 Sending 257 bytes of early data on Stream 116 44:37.571 Sending 257 bytes of early data on Stream 120 44:37.571 Sending 257 bytes of early data on Stream 124 44:37.571 Sending 257 bytes of early data on Stream 128 44:37.559 -> Packet Z|0|Z|566|2 StreamFrame[0(CIB),0,257,fin] StreamFrame[4(CIB),0,257,fin] 44:37.578 Sending 257 bytes of early data on Stream 132 44:37.579 Sending 257 bytes of early data on Stream 136 44:37.579 Sending 257 bytes of early data on Stream 140 44:37.579 Sending 257 bytes of early data on Stream 144 44:37.579 Sending 257 bytes of early data on Stream 148 44:37.579 Sending 257 bytes of early data on Stream 152 44:37.582 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44:37.782/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.581 -> Packet Z|1|Z|1252|5 StreamFrame[8(CIB),0,257,fin] StreamFrame[12(CIB),0,257,fin] StreamFrame[16(CIB),0,257,fin] StreamFrame[20(CIB),0,257,fin] StreamFrame[24(CIB),0,157] 44:37.583 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44:37.783/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.583 -> Packet Z|2|Z|1252|5 StreamFrame[28(CIB),0,257,fin] StreamFrame[32(CIB),0,257,fin] StreamFrame[36(CIB),0,257,fin] StreamFrame[40(CIB),0,257,fin] StreamFrame[44(CIB),0,157] 44:37.583 <- (6) Packet A|3|S0|86a8c245b91ed0a9|35|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 44:37.588 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44:37.788/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.588 -> Packet Z|3|Z|1252|5 StreamFrame[48(CIB),0,257,fin] StreamFrame[52(CIB),0,257,fin] StreamFrame[56(CIB),0,257,fin] StreamFrame[60(CIB),0,257,fin] StreamFrame[64(CIB),0,156] 44:37.593 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44:37.793/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.593 -> Packet Z|4|Z|1252|5 StreamFrame[68(CIB),0,257,fin] StreamFrame[72(CIB),0,257,fin] StreamFrame[76(CIB),0,257,fin] StreamFrame[80(CIB),0,257,fin] StreamFrame[84(CIB),0,152] 44:37.596 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44:37.796/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.595 -> Packet Z|5|Z|1252|5 StreamFrame[88(CIB),0,257,fin] StreamFrame[92(CIB),0,257,fin] StreamFrame[96(CIB),0,257,fin] StreamFrame[100(CIB),0,257,fin] StreamFrame[104(CIB),0,152] 44:37.597 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44:37.797/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.597 -> Packet Z|6|Z|1252|5 StreamFrame[108(CIB),0,257,fin] StreamFrame[112(CIB),0,257,fin] StreamFrame[116(CIB),0,257,fin] StreamFrame[120(CIB),0,257,fin] StreamFrame[124(CIB),0,152] 44:37.602 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44:37.802/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.602 -> Packet Z|7|Z|1251|6 StreamFrame[128(CIB),0,257,fin] StreamFrame[24(CIB),157,100,fin] StreamFrame[132(CIB),0,257,fin] StreamFrame[136(CIB),0,257,fin] StreamFrame[140(CIB),0,257,fin] StreamFrame[144(CIB),0,46] 44:37.603 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44:37.803/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.603 -> Packet Z|8|Z|1252|8 StreamFrame[148(CIB),0,257,fin] StreamFrame[152(CIB),0,257,fin] StreamFrame[44(CIB),157,100,fin] StreamFrame[64(CIB),156,101,fin] StreamFrame[84(CIB),152,105,fin] StreamFrame[104(CIB),152,105,fin] StreamFrame[124(CIB),152,105,fin] StreamFrame[144(CIB),46,128] 44:37.604 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44:37.804/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44:37.604 -> Packet Z|9|Z|132|1 StreamFrame[144(CIB),174,83,fin] 44:37.624 <- (1) Packet I|0|L|1001|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,129] Padding(820) 44:37.628 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44:37.828/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 44:37.624 <- (1) Packet H|0|L|199|1 CryptoFrame[0,153] 44:37.644 Server has accepted early data. 44:37.644 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 44:37.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:68/34 44:37.644 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 44:37.651 Processing response for stream Stream 0 44:37.653 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 44:37.857/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:68/34 44:37.652 -> Packet H|0|L|78|1 CryptoFrame[0,34] -< CryptoStream[H|EncryptedExtensions,Finished] 44:37.654 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 44:37.858/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:68/34 44:37.655 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 44:37.655 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 203 millis, based on 44:37.859/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:68/34 44:37.655 -> Packet H|1|L|51|2 AckFrame[0|Δ0] CryptoFrame[34,2] 44:37.684 <- (2) Packet H|1|L|46|1 AckFrame[0|Δ0] 44:37.685 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 173 millis, based on 44:37.859/Handshake, because ackElicitingInFlight | RTT:68/34 44:37.693 <- (3) Packet A|0|S0|19d58a2b0c9b3bf7|1245|36 AckFrame[9-0|Δ57] StreamFrame[0(CIB),0,32,fin] StreamFrame[4(CIB),0,32,fin] StreamFrame[8(CIB),0,32,fin] StreamFrame[12(CIB),0,32,fin] StreamFrame[16(CIB),0,32,fin] StreamFrame[20(CIB),0,32,fin] StreamFrame[24(CIB),0,32,fin] StreamFrame[28(CIB),0,32,fin] StreamFrame[32(CIB),0,32,fin] StreamFrame[36(CIB),0,32,fin] StreamFrame[40(CIB),0,32,fin] StreamFrame[44(CIB),0,32,fin] StreamFrame[48(CIB),0,32,fin] StreamFrame[52(CIB),0,32,fin] StreamFrame[56(CIB),0,32,fin] StreamFrame[60(CIB),0,32,fin] StreamFrame[64(CIB),0,32,fin] StreamFrame[68(CIB),0,32,fin] StreamFrame[72(CIB),0,32,fin] StreamFrame[76(CIB),0,32,fin] StreamFrame[84(CIB),0,32,fin] StreamFrame[80(CIB),0,32,fin] StreamFrame[88(CIB),0,32,fin] StreamFrame[92(CIB),0,32,fin] StreamFrame[96(CIB),0,32,fin] StreamFrame[104(CIB),0,32,fin] StreamFrame[108(CIB),0,32,fin] StreamFrame[100(CIB),0,32,fin] StreamFrame[112(CIB),0,32,fin] StreamFrame[116(CIB),0,32,fin] StreamFrame[120(CIB),0,32,fin] StreamFrame[132(CIB),0,32,fin] StreamFrame[124(CIB),0,32,fin] HandshakeDoneFrame[] CryptoFrame[0,4] reschedule loss detection timer for PTO over 163 millis, based on 44:37.859/Handshake, because ackElicitingInFlight | RTT:64/35 44:37.695 Processing response for stream Stream 4 44:37.696 Processing response for stream Stream 8 44:37.696 Processing response for stream Stream 12 44:37.696 Processing response for stream Stream 16 44:37.696 State is set to Confirmed 44:37.696 Processing response for stream Stream 20 reschedule loss detection timer for PTO over 126 millis, based on 44:37.823/Handshake, because ackElicitingInFlight | RTT:64/26 44:37.696 Processing response for stream Stream 24 44:37.696 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 44:37.696 Discarding pn space Handshake because HandshakeDone is received 44:37.696 Processing response for stream Stream 28 -< CryptoStream[A|] 44:37.697 Processing response for stream Stream 32 44:37.697 Processing response for stream Stream 36 44:37.697 Processing response for stream Stream 40 44:37.697 Processing response for stream Stream 44 44:37.697 Processing response for stream Stream 48 44:37.694 <- (4) Packet A|1|S0|19d58a2b0c9b3bf7|325|10 StreamFrame[136(CIB),0,32,fin] AckFrame[9-0|Δ0] StreamFrame[140(CIB),0,32,fin] StreamFrame[128(CIB),0,32,fin] StreamFrame[144(CIB),0,32,fin] StreamFrame[148(CIB),0,32,fin] StreamFrame[152(CIB),0,32,fin] NewConnectionIdFrame[1,<0|e56227d9da77bd60|d96edcf3fca88a679d14250196ed0fa8] MaxStreamsFrame[B,139] CryptoFrame[4,38] 44:37.698 Processing response for stream Stream 52 44:37.698 Processing response for stream Stream 56 44:37.698 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 44:37.698 Processing response for stream Stream 60 44:37.698 Processing response for stream Stream 64 44:37.698 Processing response for stream Stream 68 -< CryptoStream[A|NewSessionTicket] 44:37.698 Processing response for stream Stream 72 44:37.699 Processing response for stream Stream 76 44:37.699 Processing response for stream Stream 80 44:37.699 Processing response for stream Stream 84 44:37.699 -> Packet A|10|S0|8f24fead04364cb5|32|1 AckFrame[1-0|Δ1] 44:37.699 Processing response for stream Stream 88 44:37.699 Processing response for stream Stream 92 44:37.699 Processing response for stream Stream 96 44:37.700 Processing response for stream Stream 100 44:37.700 Processing response for stream Stream 104 44:37.700 Processing response for stream Stream 108 44:37.700 Processing response for stream Stream 112 44:37.700 Processing response for stream Stream 116 44:37.700 Processing response for stream Stream 120 44:37.700 Processing response for stream Stream 124 44:37.701 Processing response for stream Stream 128 44:37.701 Processing response for stream Stream 132 44:37.701 Processing response for stream Stream 136 44:37.701 Processing response for stream Stream 140 44:37.701 Processing response for stream Stream 144 44:37.701 Processing response for stream Stream 148 44:37.701 Processing response for stream Stream 152 44:37.701 Download finished at 44:37.701