771f476d132eb0ef: No root crt list specified -- certificate will not be verified. 771f476d132eb0ef: Sending ALPN list (1): hq-interop 771f476d132eb0ef: Sending transport parameter TLS extension (83 bytes): 771f476d132eb0ef: Extension list (83 bytes): 771f476d132eb0ef: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 771f476d132eb0ef: Extension type: 4 (initial_max_data), length 4, 80100000 771f476d132eb0ef: Extension type: 8 (max_streams_bidi), length 2, 4200 771f476d132eb0ef: Extension type: 1 (idle_timeout), length 4, 8002bf20 771f476d132eb0ef: Extension type: 3 (max_packet_size), length 2, 45a0 771f476d132eb0ef: Extension type: 9 (max_streams_uni), length 2, 4200 771f476d132eb0ef: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 771f476d132eb0ef: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 771f476d132eb0ef: Extension type: 14 (active_connection_id_limit), length 1, 08 771f476d132eb0ef: Extension type: 11 (max_ack_delay), length 1, 0a 771f476d132eb0ef: Extension type: 15 (hcid), length 8, 46c31839122ea58c 771f476d132eb0ef: Extension type: 3747 (unknown), length 2, 5f47 771f476d132eb0ef: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 771f476d132eb0ef: Extension type: 29016 (enable_time_stamp), length 1, 03 771f476d132eb0ef: Extension type: 10930 (grease_quic_bit), length 0 771f476d132eb0ef: Preparing GET on stream 0 for /lively-tremendous-scarf 771f476d132eb0ef: Sending packet type: 2 (initial), S0, Q1, Version 1, 771f476d132eb0ef: <771f476d132eb0ef>, <46c31839122ea58c>, Seq: 65889, pl: 375 771f476d132eb0ef: Token length: 0 771f476d132eb0ef: Prepared 355 bytes 771f476d132eb0ef: ping, 1 bytes 771f476d132eb0ef: crypto_hs, offset 0, length 350: 0100015a0303dd1f... 771f476d132eb0ef: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 771f476d132eb0ef: <771f476d132eb0ef>, <46c31839122ea58c>, Seq: 0, pl: 826 771f476d132eb0ef: Prepared 806 bytes 771f476d132eb0ef: stream 0, offset 0, length 30, fin = 1: 474554202f6c6976... 771f476d132eb0ef: padding, 773 bytes 771f476d132eb0ef: Sending 1252 bytes to 193.167.100.100:443 at T=0.001878 (2673446b) 771f476d132eb0ef: T= 0.252157, Lost packet type 2, number 65889, size 385, DCID <>, reason: timer 771f476d132eb0ef: Sending packet type: 2 (initial), S0, Q1, Version 1, 771f476d132eb0ef: <771f476d132eb0ef>, <46c31839122ea58c>, Seq: 65890, pl: 375 771f476d132eb0ef: Token length: 0 771f476d132eb0ef: Prepared 355 bytes 771f476d132eb0ef: ping, 1 bytes 771f476d132eb0ef: crypto_hs, offset 0, length 350: 0100015a0303dd1f... 771f476d132eb0ef: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 771f476d132eb0ef: <771f476d132eb0ef>, <46c31839122ea58c>, Seq: 1, pl: 826 771f476d132eb0ef: Prepared 806 bytes 771f476d132eb0ef: padding, 806 bytes 771f476d132eb0ef: Sending 1252 bytes to 193.167.100.100:443 at T=0.252157 (26771612) 771f476d132eb0ef: Receiving 745 bytes from 193.167.100.100:443 at T=0.442205 (2679fc72) 771f476d132eb0ef: T= 0.442205, Keys unavailable, buffered packet type 4. 771f476d132eb0ef: Receiving 745 bytes from 193.167.100.100:443 at T=0.442894 (2679ff23) 771f476d132eb0ef: T= 0.442894, Keys unavailable, buffered packet type 4. 771f476d132eb0ef: Receiving 1200 bytes from 193.167.100.100:443 at T=1.042108 (268323d1) 771f476d132eb0ef: Receiving packet type: 2 (initial), S0, Q1, Version 1, 771f476d132eb0ef: <46c31839122ea58c>, <52c777a1d4d7f560>, Seq: 3, pl: 1174 771f476d132eb0ef: Token length: 0 771f476d132eb0ef: Decrypted 1157 bytes 771f476d132eb0ef: crypto_hs, offset 0, length 123: 020000770303cecc... 771f476d132eb0ef: padding, 1030 bytes 771f476d132eb0ef: Receiving 745 bytes from 193.167.100.100:443 at T=1.042393 (268324ee) 771f476d132eb0ef: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 771f476d132eb0ef: <46c31839122ea58c>, <52c777a1d4d7f560>, Seq: 2, pl: 720 771f476d132eb0ef: Decrypted 703 bytes 771f476d132eb0ef: crypto_hs, offset 0, length 699: 0800006d006b0010... 771f476d132eb0ef: Received transport parameter TLS extension (86 bytes): 771f476d132eb0ef: Extension list (86 bytes): 771f476d132eb0ef: Extension type: 0 (ocid), length 8, 771f476d132eb0ef 771f476d132eb0ef: Extension type: 1 (idle_timeout), length 4, 80007530 771f476d132eb0ef: Extension type: 3 (max_packet_size), length 2, 45dc 771f476d132eb0ef: Extension type: 4 (initial_max_data), length 4, 80989680 771f476d132eb0ef: Extension type: 5 (max_stream_data_bidi_local), length 4, 800f4240 771f476d132eb0ef: Extension type: 6 (max_stream_data_bidi_remote), length 4, 800f4240 771f476d132eb0ef: Extension type: 7 (max_stream_data_uni), length 4, 800f4240 771f476d132eb0ef: Extension type: 8 (max_streams_bidi), length 2, 4064 771f476d132eb0ef: Extension type: 9 (max_streams_uni), length 1, 00 771f476d132eb0ef: Extension type: 10 (ack_delay_exponent), length 1, 03 771f476d132eb0ef: Extension type: 11 (max_ack_delay), length 1, 19 771f476d132eb0ef: Extension type: 12 (disable_migration), length 0 771f476d132eb0ef: Extension type: 14 (active_connection_id_limit), length 1, 03 771f476d132eb0ef: Extension type: 15 (hcid), length 8, 52c777a1d4d7f560 771f476d132eb0ef: Extension type: 17 (version_negotiation), length 12, 00000001000000016b3343cf 771f476d132eb0ef: Receiving 745 bytes from 193.167.100.100:443 at T=1.042393 (268324ee) 771f476d132eb0ef: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 771f476d132eb0ef: <46c31839122ea58c>, <52c777a1d4d7f560>, Seq: 1, pl: 720 771f476d132eb0ef: Decrypted 703 bytes 771f476d132eb0ef: crypto_hs, offset 0, length 699: 0800006d006b0010... 771f476d132eb0ef: Sending packet type: 4 (handshake), S0, Q1, Version 1, 771f476d132eb0ef: <52c777a1d4d7f560>, <46c31839122ea58c>, Seq: 0, pl: 67 771f476d132eb0ef: Prepared 47 bytes 771f476d132eb0ef: ack (nb=0), 1-2 771f476d132eb0ef: crypto_hs, offset 0, length 36: 14000020fb261760... 771f476d132eb0ef: T= 1.042393, Lost packet type 5, number 0, size 835, DCID <52c777a1d4d7f560>, reason: repeat 771f476d132eb0ef: T= 1.042393, Lost packet type 5, number 1, size 835, DCID <52c777a1d4d7f560>, reason: repeat 771f476d132eb0ef: Sending packet type: 6 (1rtt protected), S0, Q1, 771f476d132eb0ef: <52c777a1d4d7f560>, Seq: 2 (2), Phi: 0, 771f476d132eb0ef: Prepared 157 bytes 771f476d132eb0ef: new_connection_id[1]: 0x2fab019d64c58a06, 6832a5e28c0f68853b5bb0dc1a7b70f9 771f476d132eb0ef: new_connection_id[2]: 0x27f6f83ae873421f, 502ff9a6b3c0711fe52027110a0941b2 771f476d132eb0ef: stream 0, offset 0, length 30, fin = 1: 474554202f6c6976... 771f476d132eb0ef: padding, 68 bytes 771f476d132eb0ef: T= 1.042393, cwin: 15360,flight: 275,nb_ret: 3,rtt_min: 442205,rtt: 442205,rtt_var: 221102,max_ack_delay: 0,state: 13 771f476d132eb0ef: Sending 275 bytes to 193.167.100.100:443 at T=1.042393 (268324ee) 771f476d132eb0ef: Connection established. Version = 1, I-CID: 771f476d132eb0ef, verified: 1 771f476d132eb0ef: Receiving 1200 bytes from 193.167.100.100:443 at T=1.043027 (26832768) 771f476d132eb0ef: Receiving packet type: 2 (initial), S0, Q1, Version 1, 771f476d132eb0ef: <46c31839122ea58c>, <52c777a1d4d7f560>, Seq: -1, pl: 1174 771f476d132eb0ef: Token length: 0 771f476d132eb0ef: Header or encryption error: 429. 771f476d132eb0ef: T= 2.919309, Lost packet type 4, number 0, size 76, DCID <52c777a1d4d7f560>, reason: timer 771f476d132eb0ef: Sending packet type: 4 (handshake), S0, Q1, Version 1, 771f476d132eb0ef: <52c777a1d4d7f560>, <46c31839122ea58c>, Seq: 1, pl: 158 771f476d132eb0ef: Prepared 138 bytes 771f476d132eb0ef: crypto_hs, offset 0, length 36: 14000020fb261760... 771f476d132eb0ef: ack (nb=0), 1-2 771f476d132eb0ef: padding, 91 bytes 771f476d132eb0ef: T= 2.919309, cwin: 15360,flight: 366,nb_ret: 4,rtt_min: 442205,rtt: 442205,rtt_var: 221102,max_ack_delay: 0,state: 13 771f476d132eb0ef: T= 2.919309, Lost packet type 6, number 2, size 167, DCID <52c777a1d4d7f560>, reason: timer 771f476d132eb0ef: Sending packet type: 6 (1rtt protected), S0, Q1, 771f476d132eb0ef: <52c777a1d4d7f560>, Seq: 3 (3), Phi: 0, 771f476d132eb0ef: Prepared 157 bytes 771f476d132eb0ef: new_connection_id[1]: 0x2fab019d64c58a06, 6832a5e28c0f68853b5bb0dc1a7b70f9 771f476d132eb0ef: new_connection_id[2]: 0x27f6f83ae873421f, 502ff9a6b3c0711fe52027110a0941b2 771f476d132eb0ef: stream 0, offset 0, length 30, fin = 1: 474554202f6c6976... 771f476d132eb0ef: padding, 68 bytes 771f476d132eb0ef: T= 2.919309, cwin: 15360,flight: 366,nb_ret: 5,rtt_min: 442205,rtt: 442205,rtt_var: 221102,max_ack_delay: 0,state: 13 771f476d132eb0ef: Sending 366 bytes to 193.167.100.100:443 at T=2.919309 (269fc8a2) 771f476d132eb0ef: T= 4.796238, Lost packet type 4, number 1, size 167, DCID <52c777a1d4d7f560>, reason: timer 771f476d132eb0ef: Sending packet type: 4 (handshake), S0, Q1, Version 1, 771f476d132eb0ef: <52c777a1d4d7f560>, <46c31839122ea58c>, Seq: 2, pl: 158 771f476d132eb0ef: Prepared 138 bytes 771f476d132eb0ef: crypto_hs, offset 0, length 36: 14000020fb261760... 771f476d132eb0ef: ack (nb=0), 1-2 771f476d132eb0ef: padding, 91 bytes 771f476d132eb0ef: T= 4.796238, cwin: 15360,flight: 366,nb_ret: 6,rtt_min: 442205,rtt: 442205,rtt_var: 221102,max_ack_delay: 0,state: 13 771f476d132eb0ef: T= 4.796238, Lost packet type 6, number 3, size 167, DCID <52c777a1d4d7f560>, reason: timer 771f476d132eb0ef: Sending packet type: 6 (1rtt protected), S0, Q1, 771f476d132eb0ef: <52c777a1d4d7f560>, Seq: 4 (4), Phi: 0, 771f476d132eb0ef: Prepared 157 bytes 771f476d132eb0ef: new_connection_id[1]: 0x2fab019d64c58a06, 6832a5e28c0f68853b5bb0dc1a7b70f9 771f476d132eb0ef: new_connection_id[2]: 0x27f6f83ae873421f, 502ff9a6b3c0711fe52027110a0941b2 771f476d132eb0ef: stream 0, offset 0, length 30, fin = 1: 474554202f6c6976... 771f476d132eb0ef: padding, 68 bytes 771f476d132eb0ef: T= 4.796238, cwin: 15360,flight: 366,nb_ret: 7,rtt_min: 442205,rtt: 442205,rtt_var: 221102,max_ack_delay: 0,state: 13 771f476d132eb0ef: Sending 366 bytes to 193.167.100.100:443 at T=4.796238 (26bc6c63) 771f476d132eb0ef: Receiving 745 bytes from 193.167.100.100:443 at T=4.828966 (26bcec3b) 771f476d132eb0ef: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 771f476d132eb0ef: <46c31839122ea58c>, <52c777a1d4d7f560>, Seq: 3, pl: 720 771f476d132eb0ef: Decrypted 703 bytes 771f476d132eb0ef: crypto_hs, offset 0, length 699: 0800006d006b0010... 771f476d132eb0ef: Sending packet type: 4 (handshake), S0, Q1, Version 1, 771f476d132eb0ef: <52c777a1d4d7f560>, <46c31839122ea58c>, Seq: 3, pl: 30 771f476d132eb0ef: Prepared 10 bytes 771f476d132eb0ef: ack (nb=0), 1-3 771f476d132eb0ef: padding, 5 bytes 771f476d132eb0ef: T= 4.829037, cwin: 15360,flight: 421,nb_ret: 7,rtt_min: 442205,rtt: 442205,rtt_var: 221102,max_ack_delay: 0,state: 13 771f476d132eb0ef: Sending 55 bytes to 193.167.100.100:443 at T=4.829037 (26bcec82) 771f476d132eb0ef: Receiving 29 bytes from 193.167.100.100:443 at T=4.829247 (26bced54) 771f476d132eb0ef: Receiving packet type: 6 (1rtt protected), S0, Q1, 771f476d132eb0ef: <46c31839122ea58c>, Seq: 0 (0), Phi: 0, 771f476d132eb0ef: Decrypted 3 bytes 771f476d132eb0ef: handshake_done 771f476d132eb0ef: padding, 2 bytes 771f476d132eb0ef: T= 4.829247, cwin: 15360,flight: 183,nb_ret: 7,rtt_min: 442205,rtt: 442205,rtt_var: 221102,max_ack_delay: 0,state: 14 771f476d132eb0ef: Receiving 211 bytes from 193.167.100.100:443 at T=4.829341 (26bcedb2) 771f476d132eb0ef: Receiving packet type: 6 (1rtt protected), S0, Q1, 771f476d132eb0ef: <46c31839122ea58c>, Seq: 1 (1), Phi: 0, 771f476d132eb0ef: Decrypted 185 bytes 771f476d132eb0ef: new_connection_id[1]: 0x520acb1c0a81cfe2, cc4d3708788a76519266beea99181d29 771f476d132eb0ef: new_connection_id[2]: 0xaa44a5c2d02aab2a, 0d4103c978846eb7c49e0c86f90df143 771f476d132eb0ef: new_connection_id[3]: 0x197af9d284694790, 3e065fbf46033d55ce67a0cc8dc37cb4 771f476d132eb0ef: new_connection_id[4]: 0x46fc93f17b98511b, b27f8225a5563547b45b76139f08857c 771f476d132eb0ef: new_connection_id[5]: 0x94a67e63be94fc90, b67aa2588be3d0eecb268d94fd5e7973 771f476d132eb0ef: crypto_hs, offset 0, length 42: 0400002600015180... 771f476d132eb0ef: T= 4.829341, cwin: 15360,flight: 183,nb_ret: 7,rtt_min: 442205,rtt: 442205,rtt_var: 221102,max_ack_delay: 0,state: 14 771f476d132eb0ef: Receiving 1058 bytes from 193.167.100.100:443 at T=4.831095 (26bcf48c) 771f476d132eb0ef: Receiving packet type: 6 (1rtt protected), S0, Q1, 771f476d132eb0ef: <46c31839122ea58c>, Seq: 2 (2), Phi: 0, 771f476d132eb0ef: Decrypted 1032 bytes 771f476d132eb0ef: stream 0, offset 0, length 1024, fin = 1: 6f53b380b3595aa6... 771f476d132eb0ef: max_streams_bidir: max rank 101. 771f476d132eb0ef: T= 4.831095, cwin: 15360,flight: 183,nb_ret: 7,rtt_min: 442205,rtt: 442205,rtt_var: 221102,max_ack_delay: 0,state: 14 771f476d132eb0ef: All done, Closing the connection. 771f476d132eb0ef: Sending packet type: 6 (1rtt protected), S1, Q1, 771f476d132eb0ef: <52c777a1d4d7f560>, Seq: 5 (5), Phi: 0, 771f476d132eb0ef: Prepared 8 bytes 771f476d132eb0ef: ack (nb=0), 0-2 771f476d132eb0ef: application_close, Error 0x0000, Reason length 0 771f476d132eb0ef: Sending 34 bytes to 193.167.100.100:443 at T=4.831247 (26bcf524) 771f476d132eb0ef: Receiving 30 bytes from 193.167.100.100:443 at T=4.862797 (26bd7062) 771f476d132eb0ef: Receiving packet type: 6 (1rtt protected), S0, Q1, 771f476d132eb0ef: <46c31839122ea58c>, Seq: 4 (4), Phi: 0, 771f476d132eb0ef: Decrypted 4 bytes 771f476d132eb0ef: connection_close, Error 0x0000, Reason length 0 771f476d132eb0ef: Out of 2 zero RTT packets, 0 were acked by the server. 771f476d132eb0ef: Received 1024 bytes in 4.862905 seconds, 0.001685 Mbps. 771f476d132eb0ef: Sent 30 bytes in 4.862905 seconds, 0.000049 Mbps.