1f29c42d444dc7e1: No root crt list specified -- certificate will not be verified. 1f29c42d444dc7e1: Sending ALPN list (1): hq-interop 1f29c42d444dc7e1: Sending transport parameter TLS extension (83 bytes): 1f29c42d444dc7e1: Extension list (83 bytes): 1f29c42d444dc7e1: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 1f29c42d444dc7e1: Extension type: 4 (initial_max_data), length 4, 80100000 1f29c42d444dc7e1: Extension type: 8 (max_streams_bidi), length 2, 4200 1f29c42d444dc7e1: Extension type: 1 (idle_timeout), length 4, 8002bf20 1f29c42d444dc7e1: Extension type: 3 (max_packet_size), length 2, 45a0 1f29c42d444dc7e1: Extension type: 9 (max_streams_uni), length 2, 4200 1f29c42d444dc7e1: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 1f29c42d444dc7e1: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 1f29c42d444dc7e1: Extension type: 14 (active_connection_id_limit), length 1, 08 1f29c42d444dc7e1: Extension type: 11 (max_ack_delay), length 1, 0a 1f29c42d444dc7e1: Extension type: 15 (hcid), length 8, 88b30f2aed538649 1f29c42d444dc7e1: Extension type: 1019 (unknown), length 2, 69c4 1f29c42d444dc7e1: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 1f29c42d444dc7e1: Extension type: 29016 (enable_time_stamp), length 1, 03 1f29c42d444dc7e1: Extension type: 10930 (grease_quic_bit), length 0 1f29c42d444dc7e1: Preparing GET on stream 0 for /vftbndksrl 1f29c42d444dc7e1: Sending packet type: 2 (initial), S0, Q1, Version 1, 1f29c42d444dc7e1: <1f29c42d444dc7e1>, <88b30f2aed538649>, Seq: 109925, pl: 375 1f29c42d444dc7e1: Token length: 0 1f29c42d444dc7e1: Prepared 355 bytes 1f29c42d444dc7e1: ping, 1 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 350: 0100015a030346e1... 1f29c42d444dc7e1: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 1f29c42d444dc7e1: <1f29c42d444dc7e1>, <88b30f2aed538649>, Seq: 0, pl: 826 1f29c42d444dc7e1: Prepared 806 bytes 1f29c42d444dc7e1: stream 0, offset 0, length 17, fin = 1: 474554202f766674... 1f29c42d444dc7e1: padding, 786 bytes 1f29c42d444dc7e1: Sending 1252 bytes to 193.167.100.100:443 at T=0.001933 (2e422296) 1f29c42d444dc7e1: T= 0.252208, Lost packet type 2, number 109925, size 385, DCID <>, reason: timer 1f29c42d444dc7e1: Sending packet type: 2 (initial), S0, Q1, Version 1, 1f29c42d444dc7e1: <1f29c42d444dc7e1>, <88b30f2aed538649>, Seq: 109926, pl: 375 1f29c42d444dc7e1: Token length: 0 1f29c42d444dc7e1: Prepared 355 bytes 1f29c42d444dc7e1: ping, 1 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 350: 0100015a030346e1... 1f29c42d444dc7e1: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 1f29c42d444dc7e1: <1f29c42d444dc7e1>, <88b30f2aed538649>, Seq: 1, pl: 826 1f29c42d444dc7e1: Prepared 806 bytes 1f29c42d444dc7e1: padding, 806 bytes 1f29c42d444dc7e1: Sending 1252 bytes to 193.167.100.100:443 at T=0.252208 (2e45f439) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=0.439909 (2e48d16e) 1f29c42d444dc7e1: T= 0.439909, Keys unavailable, buffered packet type 4. 1f29c42d444dc7e1: T= 2.453815, Lost packet type 2, number 109926, size 385, DCID <>, reason: timer 1f29c42d444dc7e1: Sending packet type: 2 (initial), S0, Q1, Version 1, 1f29c42d444dc7e1: <1f29c42d444dc7e1>, <88b30f2aed538649>, Seq: 109927, pl: 375 1f29c42d444dc7e1: Token length: 0 1f29c42d444dc7e1: Prepared 355 bytes 1f29c42d444dc7e1: ping, 1 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 350: 0100015a030346e1... 1f29c42d444dc7e1: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 1f29c42d444dc7e1: <1f29c42d444dc7e1>, <88b30f2aed538649>, Seq: 2, pl: 826 1f29c42d444dc7e1: Prepared 806 bytes 1f29c42d444dc7e1: padding, 806 bytes 1f29c42d444dc7e1: Sending 1252 bytes to 193.167.100.100:443 at T=2.453815 (2e678c40) 1f29c42d444dc7e1: Receiving 1200 bytes from 193.167.100.100:443 at T=2.488328 (2e681311) 1f29c42d444dc7e1: Receiving packet type: 2 (initial), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 3, pl: 1174 1f29c42d444dc7e1: Token length: 0 1f29c42d444dc7e1: Decrypted 1157 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 123: 020000770303016d... 1f29c42d444dc7e1: padding, 1030 bytes 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=2.488605 (2e681426) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 1, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Received transport parameter TLS extension (86 bytes): 1f29c42d444dc7e1: Extension list (86 bytes): 1f29c42d444dc7e1: Extension type: 0 (ocid), length 8, 1f29c42d444dc7e1 1f29c42d444dc7e1: Extension type: 1 (idle_timeout), length 4, 80007530 1f29c42d444dc7e1: Extension type: 3 (max_packet_size), length 2, 45dc 1f29c42d444dc7e1: Extension type: 4 (initial_max_data), length 4, 80989680 1f29c42d444dc7e1: Extension type: 5 (max_stream_data_bidi_local), length 4, 800f4240 1f29c42d444dc7e1: Extension type: 6 (max_stream_data_bidi_remote), length 4, 800f4240 1f29c42d444dc7e1: Extension type: 7 (max_stream_data_uni), length 4, 800f4240 1f29c42d444dc7e1: Extension type: 8 (max_streams_bidi), length 2, 4064 1f29c42d444dc7e1: Extension type: 9 (max_streams_uni), length 1, 00 1f29c42d444dc7e1: Extension type: 10 (ack_delay_exponent), length 1, 03 1f29c42d444dc7e1: Extension type: 11 (max_ack_delay), length 1, 19 1f29c42d444dc7e1: Extension type: 12 (disable_migration), length 0 1f29c42d444dc7e1: Extension type: 14 (active_connection_id_limit), length 1, 03 1f29c42d444dc7e1: Extension type: 15 (hcid), length 8, ab3b74eff0c45cef 1f29c42d444dc7e1: Extension type: 17 (version_negotiation), length 12, 00000001000000016b3343cf 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 0, pl: 67 1f29c42d444dc7e1: Prepared 47 bytes 1f29c42d444dc7e1: ack (nb=0), 1 1f29c42d444dc7e1: crypto_hs, offset 0, length 36: 14000020c6361118... 1f29c42d444dc7e1: T= 2.488605, Lost packet type 5, number 0, size 835, DCID , reason: repeat 1f29c42d444dc7e1: T= 2.488605, Lost packet type 5, number 1, size 835, DCID , reason: repeat 1f29c42d444dc7e1: T= 2.488605, Lost packet type 5, number 2, size 835, DCID , reason: repeat 1f29c42d444dc7e1: Sending packet type: 6 (1rtt protected), S0, Q1, 1f29c42d444dc7e1: , Seq: 3 (3), Phi: 0, 1f29c42d444dc7e1: Prepared 157 bytes 1f29c42d444dc7e1: new_connection_id[1]: 0xf8ec2774731f401f, f4fc22069524fef1cdd2ac7017736917 1f29c42d444dc7e1: new_connection_id[2]: 0xcb6bb320a56bdce9, 75867a0a0a88cef2369cff9b0ebfca2a 1f29c42d444dc7e1: stream 0, offset 0, length 17, fin = 1: 474554202f766674... 1f29c42d444dc7e1: padding, 81 bytes 1f29c42d444dc7e1: T= 2.488605, cwin: 15360,flight: 275,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 275 bytes to 193.167.100.100:443 at T=2.488605 (2e681426) 1f29c42d444dc7e1: Connection established. Version = 1, I-CID: 1f29c42d444dc7e1, verified: 1 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=2.488956 (2e681585) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 3, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 1, pl: 30 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=1), 3, 1 1f29c42d444dc7e1: padding, 3 bytes 1f29c42d444dc7e1: T= 2.488993, cwin: 15360,flight: 330,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=2.488993 (2e6815aa) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=2.616247 (2e6a06c0) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 6, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 2, pl: 30 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=2), 6, 3, 1 1f29c42d444dc7e1: padding, 1 bytes 1f29c42d444dc7e1: T= 2.616326, cwin: 15360,flight: 385,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=2.616326 (2e6a070f) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=2.727659 (2e6bb9f4) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 8, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 3, pl: 158 1f29c42d444dc7e1: Prepared 138 bytes 1f29c42d444dc7e1: ack (nb=3), 8, 6, 3, 1 1f29c42d444dc7e1: padding, 127 bytes 1f29c42d444dc7e1: T= 2.727736, cwin: 15360,flight: 568,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 183 bytes to 193.167.100.100:443 at T=2.727736 (2e6bba41) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=2.887260 (2e6e2965) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 9, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 4, pl: 158 1f29c42d444dc7e1: Prepared 138 bytes 1f29c42d444dc7e1: ack (nb=3), 8-9, 6, 3, 1 1f29c42d444dc7e1: padding, 127 bytes 1f29c42d444dc7e1: T= 2.887358, cwin: 15360,flight: 751,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 183 bytes to 193.167.100.100:443 at T=2.887358 (2e6e29c7) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=2.888127 (2e6e2cc8) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 10, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 5, pl: 30 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=2), 8-10, 6, 3 1f29c42d444dc7e1: padding, 1 bytes 1f29c42d444dc7e1: T= 2.888167, cwin: 15360,flight: 806,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=2.888167 (2e6e2cf0) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=3.207667 (2e730cfc) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 11, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 6, pl: 30 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=1), 8-11, 6 1f29c42d444dc7e1: padding, 3 bytes 1f29c42d444dc7e1: T= 3.207763, cwin: 15360,flight: 861,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=3.207763 (2e730d5c) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=3.208677 (2e7310ee) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 12, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 7, pl: 30 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=0), 8-12 1f29c42d444dc7e1: padding, 5 bytes 1f29c42d444dc7e1: T= 3.208713, cwin: 15360,flight: 916,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=3.208713 (2e731112) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=3.311533 (2e74a2b6) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 14, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 8, pl: 30 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=1), 14, 8-12 1f29c42d444dc7e1: padding, 3 bytes 1f29c42d444dc7e1: T= 3.311626, cwin: 15360,flight: 971,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=3.311626 (2e74a313) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=3.431051 (2e767594) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 15, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 9, pl: 30 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=1), 14-15, 8-12 1f29c42d444dc7e1: padding, 3 bytes 1f29c42d444dc7e1: T= 3.431142, cwin: 15360,flight: 1026,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=3.431142 (2e7675ef) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=3.431916 (2e7678f5) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 16, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 10, pl: 30 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=1), 14-16, 8-12 1f29c42d444dc7e1: padding, 3 bytes 1f29c42d444dc7e1: T= 3.431956, cwin: 15360,flight: 1081,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=3.431956 (2e76791d) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=3.672492 (2e7a24b5) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 18, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 11, pl: 30 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=2), 18, 14-16, 8-12 1f29c42d444dc7e1: padding, 1 bytes 1f29c42d444dc7e1: T= 3.672611, cwin: 15360,flight: 1136,nb_ret: 5,rtt_min: 439909,rtt: 439909,rtt_var: 219954,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=3.672611 (2e7a252c) 1f29c42d444dc7e1: Receiving 751 bytes from 193.167.100.100:443 at T=3.704557 (2e7aa1f6) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 19, pl: 726 1f29c42d444dc7e1: Decrypted 709 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: ack (nb=1), 6-7, 1-2 1f29c42d444dc7e1: T= 3.704664, Lost packet type 4, number 0, size 76, DCID , reason: repeat 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 12, pl: 158 1f29c42d444dc7e1: Prepared 138 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 36: 14000020c6361118... 1f29c42d444dc7e1: ack (nb=1), 18-19, 14-16 1f29c42d444dc7e1: padding, 92 bytes 1f29c42d444dc7e1: T= 3.704664, cwin: 67570,flight: 1007,nb_ret: 6,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: T= 3.704664, Lost packet type 4, number 3, size 167, DCID , reason: repeat 1f29c42d444dc7e1: T= 3.704664, Lost packet type 4, number 4, size 167, DCID , reason: repeat 1f29c42d444dc7e1: T= 3.704664, Lost packet type 4, number 5, size 39, DCID , reason: repeat 1f29c42d444dc7e1: T= 3.704664, Lost packet type 6, number 3, size 167, DCID , reason: timer 1f29c42d444dc7e1: Sending packet type: 6 (1rtt protected), S0, Q1, 1f29c42d444dc7e1: , Seq: 4 (4), Phi: 0, 1f29c42d444dc7e1: Prepared 157 bytes 1f29c42d444dc7e1: new_connection_id[1]: 0xf8ec2774731f401f, f4fc22069524fef1cdd2ac7017736917 1f29c42d444dc7e1: new_connection_id[2]: 0xcb6bb320a56bdce9, 75867a0a0a88cef2369cff9b0ebfca2a 1f29c42d444dc7e1: stream 0, offset 0, length 17, fin = 1: 474554202f766674... 1f29c42d444dc7e1: padding, 81 bytes 1f29c42d444dc7e1: T= 3.704664, cwin: 67570,flight: 586,nb_ret: 10,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 366 bytes to 193.167.100.100:443 at T=3.704664 (2e7aa261) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=3.872549 (2e7d322e) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 21, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 13, pl: 30 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=2), 21, 18-19, 14-16 1f29c42d444dc7e1: padding, 1 bytes 1f29c42d444dc7e1: T= 3.872648, cwin: 67570,flight: 641,nb_ret: 10,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=3.872648 (2e7d3291) 1f29c42d444dc7e1: Receiving 744 bytes from 193.167.100.100:443 at T=3.873429 (2e7d359e) 1f29c42d444dc7e1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: <88b30f2aed538649>, , Seq: 22, pl: 719 1f29c42d444dc7e1: Decrypted 702 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 698: 0800006d006b0010... 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 14, pl: 30 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=2), 21-22, 18-19, 14-16 1f29c42d444dc7e1: padding, 1 bytes 1f29c42d444dc7e1: T= 3.873466, cwin: 67570,flight: 696,nb_ret: 10,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=3.873466 (2e7d35c3) 1f29c42d444dc7e1: T= 5.581403, Lost packet type 6, number 4, size 167, DCID , reason: timer 1f29c42d444dc7e1: Sending packet type: 6 (1rtt protected), S0, Q1, 1f29c42d444dc7e1: , Seq: 5 (5), Phi: 0, 1f29c42d444dc7e1: Prepared 157 bytes 1f29c42d444dc7e1: new_connection_id[1]: 0xf8ec2774731f401f, f4fc22069524fef1cdd2ac7017736917 1f29c42d444dc7e1: new_connection_id[2]: 0xcb6bb320a56bdce9, 75867a0a0a88cef2369cff9b0ebfca2a 1f29c42d444dc7e1: stream 0, offset 0, length 17, fin = 1: 474554202f766674... 1f29c42d444dc7e1: padding, 81 bytes 1f29c42d444dc7e1: T= 5.581403, cwin: 67570,flight: 696,nb_ret: 11,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 183 bytes to 193.167.100.100:443 at T=5.581403 (2e974564) 1f29c42d444dc7e1: T= 5.748682, Lost packet type 4, number 8, size 39, DCID , reason: timer 1f29c42d444dc7e1: T= 5.748682, Lost packet type 4, number 9, size 39, DCID , reason: timer 1f29c42d444dc7e1: T= 5.748682, Lost packet type 4, number 10, size 39, DCID , reason: timer 1f29c42d444dc7e1: T= 5.748682, Lost packet type 4, number 11, size 39, DCID , reason: timer 1f29c42d444dc7e1: T= 5.748682, Lost packet type 4, number 12, size 167, DCID , reason: timer 1f29c42d444dc7e1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 1f29c42d444dc7e1: , <88b30f2aed538649>, Seq: 15, pl: 158 1f29c42d444dc7e1: Prepared 138 bytes 1f29c42d444dc7e1: crypto_hs, offset 0, length 36: 14000020c6361118... 1f29c42d444dc7e1: ack (nb=1), 21-22, 18-19 1f29c42d444dc7e1: padding, 89 bytes 1f29c42d444dc7e1: T= 5.748682, cwin: 67570,flight: 476,nb_ret: 16,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 13 1f29c42d444dc7e1: Sending 183 bytes to 193.167.100.100:443 at T=5.748682 (2e99d2d3) 1f29c42d444dc7e1: Receiving 212 bytes from 193.167.100.100:443 at T=5.838277 (2e9b30ce) 1f29c42d444dc7e1: Receiving packet type: 6 (1rtt protected), S0, Q1, 1f29c42d444dc7e1: <88b30f2aed538649>, Seq: 1 (1), Phi: 0, 1f29c42d444dc7e1: Decrypted 186 bytes 1f29c42d444dc7e1: handshake_done 1f29c42d444dc7e1: new_connection_id[1]: 0x2574078a821047d7, b94ff3de4d1cbc05a340fae9865839a2 1f29c42d444dc7e1: new_connection_id[2]: 0x36f7c70934ce4214, c543f525e77ae3fd1dd88deccf7f6afc 1f29c42d444dc7e1: new_connection_id[3]: 0xf0a4e6a2e552c9c3, 5f651075f853a5a1c97a27a70b83cef8 1f29c42d444dc7e1: new_connection_id[4]: 0xdb2b3d8279ea62bd, f6b8d818a09b45e914e97e2ff63eb552 1f29c42d444dc7e1: new_connection_id[5]: 0x9d95a3919074bf95, 31cec159e4af180882f1432dd3f3448a 1f29c42d444dc7e1: crypto_hs, offset 0, length 42: 0400002600015180... 1f29c42d444dc7e1: T= 5.838277, cwin: 67570,flight: 183,nb_ret: 16,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 14 1f29c42d444dc7e1: Sending packet type: 6 (1rtt protected), S1, Q1, 1f29c42d444dc7e1: , Seq: 6 (6), Phi: 0, 1f29c42d444dc7e1: Prepared 29 bytes 1f29c42d444dc7e1: ack (nb=0), 1 1f29c42d444dc7e1: padding, 23 bytes 1f29c42d444dc7e1: T= 5.848369, cwin: 67570,flight: 238,nb_ret: 16,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 14 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=5.848369 (2e9b583a) 1f29c42d444dc7e1: Receiving 212 bytes from 193.167.100.100:443 at T=5.879850 (2e9bd333) 1f29c42d444dc7e1: Receiving packet type: 6 (1rtt protected), S0, Q1, 1f29c42d444dc7e1: <88b30f2aed538649>, Seq: 2 (2), Phi: 0, 1f29c42d444dc7e1: Decrypted 186 bytes 1f29c42d444dc7e1: handshake_done 1f29c42d444dc7e1: new_connection_id[1]: 0x2574078a821047d7, b94ff3de4d1cbc05a340fae9865839a2 1f29c42d444dc7e1: new_connection_id[2]: 0x36f7c70934ce4214, c543f525e77ae3fd1dd88deccf7f6afc 1f29c42d444dc7e1: new_connection_id[3]: 0xf0a4e6a2e552c9c3, 5f651075f853a5a1c97a27a70b83cef8 1f29c42d444dc7e1: new_connection_id[4]: 0xdb2b3d8279ea62bd, f6b8d818a09b45e914e97e2ff63eb552 1f29c42d444dc7e1: new_connection_id[5]: 0x9d95a3919074bf95, 31cec159e4af180882f1432dd3f3448a 1f29c42d444dc7e1: crypto_hs, offset 0, length 42: 0400002600015180... 1f29c42d444dc7e1: T= 5.879850, cwin: 67570,flight: 238,nb_ret: 16,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 14 1f29c42d444dc7e1: Sending packet type: 6 (1rtt protected), S1, Q1, 1f29c42d444dc7e1: , Seq: 7 (7), Phi: 0, 1f29c42d444dc7e1: Prepared 29 bytes 1f29c42d444dc7e1: ack (nb=0), 1-2 1f29c42d444dc7e1: padding, 23 bytes 1f29c42d444dc7e1: T= 5.889943, cwin: 67570,flight: 293,nb_ret: 16,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 14 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=5.889943 (2e9bfaa0) 1f29c42d444dc7e1: T= 7.766870, Lost packet type 6, number 5, size 167, DCID , reason: timer 1f29c42d444dc7e1: Sending packet type: 6 (1rtt protected), S1, Q1, 1f29c42d444dc7e1: , Seq: 8 (8), Phi: 0, 1f29c42d444dc7e1: Prepared 157 bytes 1f29c42d444dc7e1: new_connection_id[1]: 0xf8ec2774731f401f, f4fc22069524fef1cdd2ac7017736917 1f29c42d444dc7e1: new_connection_id[2]: 0xcb6bb320a56bdce9, 75867a0a0a88cef2369cff9b0ebfca2a 1f29c42d444dc7e1: ack (nb=0), 1-2 1f29c42d444dc7e1: padding, 93 bytes 1f29c42d444dc7e1: T= 7.766870, cwin: 1545,flight: 293,nb_ret: 17,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 14 1f29c42d444dc7e1: Sending 183 bytes to 193.167.100.100:443 at T=7.766870 (2eb89e5f) 1f29c42d444dc7e1: Sending packet type: 6 (1rtt protected), S1, Q1, 1f29c42d444dc7e1: , Seq: 9 (9), Phi: 0, 1f29c42d444dc7e1: Prepared 29 bytes 1f29c42d444dc7e1: stream 0, offset 0, length 17, fin = 1: 474554202f766674... 1f29c42d444dc7e1: padding, 9 bytes 1f29c42d444dc7e1: T= 7.766870, cwin: 1545,flight: 348,nb_ret: 17,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 14 1f29c42d444dc7e1: Sending 55 bytes to 193.167.100.100:443 at T=7.766870 (2eb89e5f) 1f29c42d444dc7e1: Receiving 1058 bytes from 193.167.100.100:443 at T=7.976999 (2ebbd330) 1f29c42d444dc7e1: Receiving packet type: 6 (1rtt protected), S0, Q1, 1f29c42d444dc7e1: <88b30f2aed538649>, Seq: 6 (6), Phi: 0, 1f29c42d444dc7e1: Decrypted 1032 bytes 1f29c42d444dc7e1: stream 0, offset 0, length 1024, fin = 1: 72c67a79983a90f9... 1f29c42d444dc7e1: max_streams_bidir: max rank 101. 1f29c42d444dc7e1: T= 7.976999, cwin: 1545,flight: 348,nb_ret: 17,rtt_min: 439909,rtt: 446900,rtt_var: 178949,max_ack_delay: 0,state: 14 1f29c42d444dc7e1: All done, Closing the connection. 1f29c42d444dc7e1: Sending packet type: 6 (1rtt protected), S1, Q1, 1f29c42d444dc7e1: , Seq: 10 (10), Phi: 0, 1f29c42d444dc7e1: Prepared 10 bytes 1f29c42d444dc7e1: ack (nb=1), 6, 1-2 1f29c42d444dc7e1: application_close, Error 0x0000, Reason length 0 1f29c42d444dc7e1: Sending 36 bytes to 193.167.100.100:443 at T=7.977209 (2ebbd402) 1f29c42d444dc7e1: Receiving 1065 bytes from 193.167.100.100:443 at T=8.009363 (2ebc519c) 1f29c42d444dc7e1: Receiving packet type: 6 (1rtt protected), S0, Q1, 1f29c42d444dc7e1: <88b30f2aed538649>, Seq: 7 (7), Phi: 0, 1f29c42d444dc7e1: Decrypted 1039 bytes 1f29c42d444dc7e1: stream 0, offset 0, length 1024, fin = 1: 72c67a79983a90f9... 1f29c42d444dc7e1: ack (nb=1), 9, 6-7 1f29c42d444dc7e1: max_streams_bidir: max rank 101. 1f29c42d444dc7e1: Out of 3 zero RTT packets, 0 were acked by the server. 1f29c42d444dc7e1: Received 1024 bytes in 11.006580 seconds, 0.000744 Mbps. 1f29c42d444dc7e1: Sent 17 bytes in 11.006580 seconds, 0.000012 Mbps.