0.000 Creating connection with server4:443 with v1 0.089 Setting up connection for downloading https://server4:443/uwouqyyfts at 21:17.469 on ClientConnection[0c9db262bc465a8a/27d0d16ba199162d(V1) with server4/193.167.100.100:443] 0.090 Original destination connection id: 0c9db262bc465a8a (scid: 27d0d16ba199162d) >- CryptoStream[I|ClientHello] 0.274 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.474/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.269 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.474 loss detection timeout handler running Sending probe 0, because no ack since 0.269. Current RTT: 100/25. 0.475 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.477 (Probe is an initial retransmit) 0.479 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.879/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.479 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.511 <- (1) Packet I|2|L|48|1 Token=[] AckFrame[1-0|Δ0] 0.524 probe count not reset on ack because handshake not yet confirmed 0.529 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.929/Initial, because peerAwaitingAddressValidation | RTT:100/25 0.609 <- (2) Packet I|3|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 0.627 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 0.819/Handshake, because peerAwaitingAddressValidation | RTT:32/16 0.626 -> Packet I|2|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1153) 0.609 <- (2) Packet H|4|L|1076|2 CryptoFrame[0,711] Padding(319) 0.631 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 0.631 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 0.632 - unsupported transport parameter 0x7158, size 1 (timestamp) 0.632 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 0.656 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 0.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 0.655 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.660 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 0.660 Starting downloading https://server4:443/uwouqyyfts at 21:18.057 on ClientConnection[0c9db262bc465a8a/27d0d16ba199162d(V1) with server4/193.167.100.100:443] 0.664 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 0.760/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 0.664 Discarding pn space Initial because first Handshake message is being sent 0.665 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 0.682 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 0.778/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 0.685 <- (4) Packet H|6|L|1076|2 CryptoFrame[0,711] Padding(319) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.688 <- (5) Packet A|7|S0|27d0d16ba199162d|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] 0.681 -> Packet A|0|S0|197a13fad93b7fdb|47|1 StreamFrame[0(CIB),0,17,fin] 0.692 -> Packet H|2|L|48|1 AckFrame[6,4|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 0.693 State is set to Confirmed reschedule loss detection timer for PTO over 57 millis, based on 0.751/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 108 millis, based on 0.802/App, because ackElicitingInFlight | RTT:32/16 0.694 Discarding pn space Handshake because HandshakeDone is received 0.713 -> Packet A|1|S0|197a13fad93b7fdb|32|1 AckFrame[7|Δ19] 0.713 <- (6) Packet A|10|S0|27d0d16ba199162d|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 0.714 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 0.716 Finished downloading https://server4:443/uwouqyyfts at 21:18.113 on ClientConnection[0c9db262bc465a8a/27d0d16ba199162d(V1) with server4/193.167.100.100:443] 0.717 Closing ClientConnection[0c9db262bc465a8a/27d0d16ba199162d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.719 Creating connection with server4:443 with v1 0.720 Setting up connection for downloading https://server4:443/oayovceocb at 21:18.117 on ClientConnection[a0f5249e6c21b023/22ce9a037b7ecce1(V1) with server4/193.167.100.100:443] 0.720 Original destination connection id: a0f5249e6c21b023 (scid: 22ce9a037b7ecce1) >- CryptoStream[I|ClientHello] 0.719 -> Packet A|2|S0|197a13fad93b7fdb|38|2 ConnectionCloseFrame[0|0|] AckFrame[10,7|Δ4] 0.725 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.925/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.725 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.759 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.760 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.960/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.759 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,709] Padding(321) 0.766 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 0.766 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 0.766 - unsupported transport parameter 0x7158, size 1 (timestamp) 0.766 - unsupported transport parameter 0x1057, size 1 (loss-bits) 0.767 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.864/Handshake, because peerAwaitingAddressValidation | RTT:33/16 0.767 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 0.772 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.869/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.772 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.773 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.870/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.773 Discarding pn space Initial because first Handshake message is being sent 0.774 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 0.774 Starting downloading https://server4:443/oayovceocb at 21:18.171 on ClientConnection[a0f5249e6c21b023/22ce9a037b7ecce1(V1) with server4/193.167.100.100:443] 0.776 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.873/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.775 -> Packet A|0|S0|14fdfa9aca7fa317|47|1 StreamFrame[0(CIB),0,17] 0.777 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.874/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.777 -> Packet A|1|S0|14fdfa9aca7fa317|30|1 StreamFrame[0(CIB),17,0,fin] 0.789 <- (7) Packet A|11|S0|27d0d16ba199162d|33|1 AckFrame[1-0|Δ44] 0.790 <- (8) Packet A|12|S0|27d0d16ba199162d|1054|1 StreamFrame[0(CIB),0,1024,fin] 0.791 -> Packet A|3|S0|197a13fad93b7fdb|37|2 ConnectionCloseFrame[0|0|] AckFrame[10,7|Δ0] 0.791 -> Packet A|4|S0|197a13fad93b7fdb|37|2 ConnectionCloseFrame[0|0|] AckFrame[10,7|Δ0] 0.822 <- (9) Packet A|13|S0|27d0d16ba199162d|98|2 NewConnectionIdFrame[1,<0|114c237a5d8d1278|aed060b1b81a61a8f3d6b06a125f16f9] NewTokenFrame[013005cd69efc994acb883d024a7201075aa6cb5d80cb922eb5a44da04df82293c1206b296efb5619669] 0.822 <- (10) Packet A|14|S0|27d0d16ba199162d|30|1 ConnectionCloseFrame[0|0|] 0.873 loss detection timeout handler running Sending probe 0, because no ack since 0.772. Current RTT: 33/16. 0.873 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.874 (Probe is a handshake retransmit) 0.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.069/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.874 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 1.068 loss detection timeout handler running Sending probe 1, because no ack since 0.777. Current RTT: 33/16. 1.068 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.068 (Probe is a handshake retransmit) 1.069 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 1.457/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.069 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 1.070 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 1.458/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.070 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 1.101 <- (2) Packet A|3|S0|22ce9a037b7ecce1|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.103 State is set to Confirmed reschedule loss detection timer for PTO over 162 millis, based on 1.265/App, because ackElicitingInFlight | RTT:33/16 1.103 loss detection timeout handler running reschedule loss detection timer for PTO over -204 millis, based on 0.899/App, because ackElicitingInFlight | RTT:33/16 Sending probe 0, because no ack since 0.777. Current RTT: 33/16. 1.103 Discarding pn space Handshake because HandshakeDone is received 1.103 Discarding packet (147 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 1.104 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 1.348/App, because ackElicitingInFlight | RTT:33/16 1.104 -> Packet PA|2|S0|14fdfa9aca7fa317|47|1 StreamFrame[0(CIB),0,17] 1.123 -> Packet A|3|S0|14fdfa9aca7fa317|32|1 AckFrame[3|Δ19] 1.147 <- (4) Packet A|6|S0|22ce9a037b7ecce1|32|1 AckFrame[2|Δ12] 1.149 Retransmitted lost stream frame StreamFrame[0(CIB),0,17] 1.150 Retransmitted lost stream frame StreamFrame[0(CIB),17,0,fin] reschedule loss detection timer for PTO over 121 millis, based on 1.272/App, because ackElicitingInFlight | RTT:33/16 1.150 Cwnd(-): 6000; inflight: 0 1.150 -> Packet A|4|S0|14fdfa9aca7fa317|56|3 StreamFrame[0(CIB),0,17] AckFrame[3|Δ0] StreamFrame[0(CIB),17,0,fin] reschedule loss detection timer for PTO over 121 millis, based on 1.272/App, because ackElicitingInFlight | RTT:33/16 1.197 <- (5) Packet A|8|S0|22ce9a037b7ecce1|35|1 AckFrame[4,2|Δ16] 1.199 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.302 <- (6) Packet A|10|S0|22ce9a037b7ecce1|1055|1 StreamFrame[0(CIB),0,1024,fin] 1.303 Finished downloading https://server4:443/oayovceocb at 21:18.700 on ClientConnection[a0f5249e6c21b023/22ce9a037b7ecce1(V1) with server4/193.167.100.100:443] 1.303 Closing ClientConnection[a0f5249e6c21b023/22ce9a037b7ecce1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.303 -> Packet A|5|S0|14fdfa9aca7fa317|39|2 ConnectionCloseFrame[0|0|] AckFrame[10,8,6|Δ0] 1.304 Creating connection with server4:443 with v1 1.305 Setting up connection for downloading https://server4:443/connxvedgs at 21:18.702 on ClientConnection[80b5137ff25507af/1e3eebef8c111344(V1) with server4/193.167.100.100:443] 1.305 Original destination connection id: 80b5137ff25507af (scid: 1e3eebef8c111344) >- CryptoStream[I|ClientHello] 1.307 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.508/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.307 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.502 <- (7) Packet A|11|S0|22ce9a037b7ecce1|37|1 AckFrame[4,2|Δ320] 1.502 <- (8) Packet A|12|S0|22ce9a037b7ecce1|98|2 NewConnectionIdFrame[1,<0|8be2faa320fbda17|7680e08bfc12cfd11fa40fea5e4d86a6] NewTokenFrame[0173ef91a0a822151db18b10c041fbfa665e812c6381ee8c4113fbf893b8f1d9b2b45d2b3a738fccc23c] 1.502 <- (9) Packet A|13|S0|22ce9a037b7ecce1|1055|1 StreamFrame[0(CIB),0,1024,fin] 1.504 -> Packet A|6|S0|14fdfa9aca7fa317|43|3 ConnectionCloseFrame[0|0|] AckFrame[10,8,6|Δ0] ConnectionCloseFrame[0|0|] 1.507 loss detection timeout handler running Sending probe 0, because no ack since 1.307. Current RTT: 100/25. 1.507 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.507 (Probe is an initial retransmit) 1.508 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.908/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.507 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.841 <- (1) Packet I|2|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 1.841 <- (1) Packet H|3|L|1076|2 CryptoFrame[0,711] Padding(319) 1.847 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 2.247/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.847 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 1.847 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 1.847 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 1.847 - unsupported transport parameter 0x7158, size 1 (timestamp) 1.847 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 1.851 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 2.251/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.851 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.852 Starting downloading https://server4:443/connxvedgs at 21:19.249 on ClientConnection[80b5137ff25507af/1e3eebef8c111344(V1) with server4/193.167.100.100:443] 1.853 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 1.852 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.853 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.053/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 199 millis, based on 2.054/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.854 Discarding pn space Initial because first Handshake message is being sent 1.853 -> Packet A|0|S0|3a98b996a256bcea|47|1 StreamFrame[0(CIB),0,17,fin] 1.879 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.884 <- (3) Packet H|5|L|47|1 AckFrame[1|Δ0] 1.962 loss detection timeout handler running 1.963 loss detection timeout handler running 1.963 loss detection timeout handler running 1.963 loss detection timeout handler running 1.963 loss detection timeout handler running 1.963 Retransmitting CryptoFrame[0,36] on level Handshake 1.964 Cwnd(-): 6000; inflight: 47 1.964 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 1.964 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 1.964 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 199 millis, based on 2.164/Handshake, because ackElicitingInFlight | RTT:100/25 1.964 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[5|Δ0] 1.996 <- (4) Packet H|7|L|47|1 AckFrame[2-1|Δ0] 1.996 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 1.996 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 1.996 <- (4) Packet A|8|S0|1e3eebef8c111344|98|2 NewConnectionIdFrame[1,<0|fb2da2cd16031dd1|54beac90462968b8aa0c0936f8bf0269] NewTokenFrame[01318621d456763523c9e5ea94f44e8d38692599b773ed7c517ce9bd7439864a7c04ef07c4e07fd77906] 2.017 -> Packet A|1|S0|3a98b996a256bcea|32|1 AckFrame[8|Δ19] 2.141 <- (5) Packet A|10|S0|1e3eebef8c111344|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.142 State is set to Confirmed reschedule loss detection timer for PTO over -172 millis, based on 1.969/App, because ackElicitingInFlight | RTT:31/15 2.142 loss detection timeout handler running Sending probe 0, because no ack since 1.853. Current RTT: 31/15. reschedule loss detection timer for PTO over -172 millis, based on 1.969/App, because ackElicitingInFlight | RTT:31/15 2.142 Discarding pn space Handshake because HandshakeDone is received 2.142 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 2.374/App, because ackElicitingInFlight | RTT:31/15 2.142 -> Packet PA|2|S0|3a98b996a256bcea|47|1 StreamFrame[0(CIB),0,17,fin] 2.162 -> Packet A|3|S0|3a98b996a256bcea|34|1 AckFrame[10,8|Δ19] 2.223 <- (6) Packet A|12|S0|1e3eebef8c111344|33|1 AckFrame[2-1|Δ49] 2.224 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 2.224 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 126 millis, based on 2.351/App, because ackElicitingInFlight | RTT:34/17 2.224 <- (7) Packet A|13|S0|1e3eebef8c111344|1055|1 StreamFrame[0(CIB),0,1024,fin] 2.224 -> Packet A|4|S0|3a98b996a256bcea|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[10|Δ0] 2.225 Finished downloading https://server4:443/connxvedgs at 21:19.622 on ClientConnection[80b5137ff25507af/1e3eebef8c111344(V1) with server4/193.167.100.100:443] 2.225 Closing ClientConnection[80b5137ff25507af/1e3eebef8c111344(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.226 Creating connection with server4:443 with v1 2.226 -> Packet A|5|S0|3a98b996a256bcea|38|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,10|Δ1] 2.227 Setting up connection for downloading https://server4:443/tlpvmlthrl at 21:19.624 on ClientConnection[f08aafe7c075a6f8/06d0506da9f85729(V1) with server4/193.167.100.100:443] 2.227 Original destination connection id: f08aafe7c075a6f8 (scid: 06d0506da9f85729) >- CryptoStream[I|ClientHello] 2.229 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.429/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.229 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.255 <- (8) Packet A|14|S0|1e3eebef8c111344|34|1 AckFrame[4,2-1|Δ0] 2.256 -> Packet A|6|S0|3a98b996a256bcea|37|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,10|Δ0] 2.262 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.263 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.463/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.262 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 2.266 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.363/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.267 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 2.266 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 2.267 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 2.267 - unsupported transport parameter 0x7158, size 1 (timestamp) 2.267 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 2.270 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.367/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.270 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.271 Starting downloading https://server4:443/tlpvmlthrl at 21:19.668 on ClientConnection[f08aafe7c075a6f8/06d0506da9f85729(V1) with server4/193.167.100.100:443] 2.271 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.368/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.271 Discarding pn space Initial because first Handshake message is being sent 2.272 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.369/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.272 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|7eaf7139484254c1|47|1 StreamFrame[0(CIB),0,17,fin]] 2.298 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.302 <- (3) Packet H|3|L|47|1 AckFrame[1|Δ0] 2.306 loss detection timeout handler running 2.306 loss detection timeout handler running 2.307 loss detection timeout handler running 2.307 loss detection timeout handler running 2.307 loss detection timeout handler running 2.307 loss detection timeout handler running 2.307 Retransmitting CryptoFrame[0,36] on level Handshake 2.307 Cwnd(-): 6000; inflight: 47 2.307 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.307 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 2.307 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 2.404/Handshake, because ackElicitingInFlight | RTT:33/16 2.307 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 2.339 <- (4) Packet A|4|S0|06d0506da9f85729|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.340 State is set to Confirmed reschedule loss detection timer for PTO over 53 millis, based on 2.394/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 53 millis, based on 2.394/App, because ackElicitingInFlight | RTT:33/16 2.340 Discarding pn space Handshake because HandshakeDone is received 2.340 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 2.360 -> Packet A|1|S0|7eaf7139484254c1|32|1 AckFrame[4|Δ19] 2.393 loss detection timeout handler running Sending probe 0, because no ack since 2.272. Current RTT: 33/16. 2.394 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 2.638/App, because ackElicitingInFlight | RTT:33/16 2.394 -> Packet PA|2|S0|7eaf7139484254c1|47|1 StreamFrame[0(CIB),0,17,fin] 2.420 <- (6) Packet A|7|S0|06d0506da9f85729|98|2 NewConnectionIdFrame[1,<0|e2816ec40cb8df40|a87f09fec9526034692991f90eb2f48c] NewTokenFrame[0129181d28e417cf13e4c0267e1ea9a3c954f10cb2413ab0dfb95c89316191a46f7b3b40fffe73c8e259] 2.426 <- (7) Packet A|8|S0|06d0506da9f85729|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 2.427 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.427 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 2.427 Finished downloading https://server4:443/tlpvmlthrl at 21:19.824 on ClientConnection[f08aafe7c075a6f8/06d0506da9f85729(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 109 millis, based on 2.537/App, because ackElicitingInFlight | RTT:33/13 2.427 Closing ClientConnection[f08aafe7c075a6f8/06d0506da9f85729(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.427 -> Packet A|3|S0|7eaf7139484254c1|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7|Δ6] 2.428 Creating connection with server4:443 with v1 2.428 -> Packet A|4|S0|7eaf7139484254c1|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 2.429 Setting up connection for downloading https://server4:443/ckozsmuvuy at 21:19.826 on ClientConnection[1ee50cba3f12fec0/647b7b2da44a16a5(V1) with server4/193.167.100.100:443] 2.429 Original destination connection id: 1ee50cba3f12fec0 (scid: 647b7b2da44a16a5) >- CryptoStream[I|ClientHello] 2.431 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.631/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.431 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.464 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.465 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.665/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.468 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.464 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) reschedule loss detection timer for PTO over 96 millis, based on 2.565/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.468 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 2.468 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 2.469 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 2.469 - unsupported transport parameter 0x7158, size 1 (timestamp) 2.469 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 2.471 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.568/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.471 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.472 Starting downloading https://server4:443/ckozsmuvuy at 21:19.869 on ClientConnection[1ee50cba3f12fec0/647b7b2da44a16a5(V1) with server4/193.167.100.100:443] 2.472 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 2.472 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.570/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.473 Discarding pn space Initial because first Handshake message is being sent 2.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.570/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.473 -> Packet A|0|S0|4be31863ae2cbb15|47|1 StreamFrame[0(CIB),0,17,fin] 2.500 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.503 <- (3) Packet A|3|S0|647b7b2da44a16a5|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.504 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 2.568/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 2.595/App, because ackElicitingInFlight | RTT:33/16 2.504 Discarding pn space Handshake because HandshakeDone is received 2.505 <- (4) Packet A|6|S0|647b7b2da44a16a5|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 2.505 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.505 Finished downloading https://server4:443/ckozsmuvuy at 21:19.902 on ClientConnection[1ee50cba3f12fec0/647b7b2da44a16a5(V1) with server4/193.167.100.100:443] 2.506 Closing ClientConnection[1ee50cba3f12fec0/647b7b2da44a16a5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.505 -> Packet A|1|S0|4be31863ae2cbb15|33|1 AckFrame[6,3|Δ0] 2.506 -> Packet A|2|S0|4be31863ae2cbb15|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 2.506 Creating connection with server4:443 with v1 2.507 Setting up connection for downloading https://server4:443/nmkbmlppvm at 21:19.904 on ClientConnection[9082f55c06926368/6a6390e885a0351e(V1) with server4/193.167.100.100:443] 2.507 Original destination connection id: 9082f55c06926368 (scid: 6a6390e885a0351e) >- CryptoStream[I|ClientHello] 2.509 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.709/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.509 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.536 <- (5) Packet A|7|S0|647b7b2da44a16a5|98|2 NewConnectionIdFrame[1,<0|30613a7f49e7a2a1|80a0bd1de589819bb9a19b11565de1a0] NewTokenFrame[01b9f9789c03ca8beeaea00a4a13a097794d86a40e3a353ae471f4c3827f224224706241af34b376d01f] 2.537 -> Packet A|3|S0|4be31863ae2cbb15|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 2.708 loss detection timeout handler running Sending probe 0, because no ack since 2.509. Current RTT: 100/25. 2.709 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.709 (Probe is an initial retransmit) 2.709 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.109/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.709 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.741 <- (1) Packet I|2|L|48|1 Token=[] AckFrame[1-0|Δ0] 2.742 probe count not reset on ack because handshake not yet confirmed 2.742 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.142/Initial, because peerAwaitingAddressValidation | RTT:100/25 3.141 loss detection timeout handler running Sending probe 1, because no ack since 2.709. Current RTT: 31/15. 3.142 Sending probe because peer awaiting address validation 3.142 (Probe is Initial ping, because there is no Initial data to retransmit) 3.143 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 363 millis, based on 3.507/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 3.143 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 3.143 <- (2) Packet I|5|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 3.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 3.512/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 3.143 <- (2) Packet H|6|L|1077|2 CryptoFrame[0,710] Padding(321) 3.148 -> Packet I|3|L|1201|2 Token=[] AckFrame[5,2|Δ0] Padding(1151) 3.148 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 3.148 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 3.148 - unsupported transport parameter 0x7158, size 1 (timestamp) 3.148 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 3.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 3.516/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 3.152 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.153 Starting downloading https://server4:443/nmkbmlppvm at 21:20.550 on ClientConnection[9082f55c06926368/6a6390e885a0351e(V1) with server4/193.167.100.100:443] 3.153 -> Packet H|1|L|46|1 AckFrame[6|Δ0] 3.154 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.153 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 3.245/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 90 millis, based on 3.245/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 3.154 Discarding pn space Initial because first Handshake message is being sent 3.154 -> Packet A|0|S0|2a0bafa402c49090|47|1 StreamFrame[0(CIB),0,17,fin] 3.184 <- (3) Packet H|9|L|47|1 AckFrame[1|Δ0] 3.186 loss detection timeout handler running 3.186 loss detection timeout handler running 3.186 loss detection timeout handler running 3.186 Retransmitting CryptoFrame[0,36] on level Handshake 3.186 Cwnd(-): 6000; inflight: 47 3.186 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.186 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.186 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 90 millis, based on 3.277/Handshake, because ackElicitingInFlight | RTT:31/15 3.186 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[9|Δ0] 3.218 <- (4) Packet H|11|L|47|1 AckFrame[2-1|Δ0] 3.219 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.219 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.218 <- (4) Packet A|12|S0|6a6390e885a0351e|98|2 NewConnectionIdFrame[1,<0|5f271d51ae543746|46f95fb023de41d345c36984acb1ba91] NewTokenFrame[011967929020a005553bd5dc9664c7d30bfc5c0eb8effb41f5dff0ec69db39d7e1ed92062620b006c3dd] 3.239 -> Packet A|1|S0|2a0bafa402c49090|32|1 AckFrame[12|Δ19] 3.270 <- (5) Packet A|13|S0|6a6390e885a0351e|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.272 State is set to Confirmed reschedule loss detection timer for PTO over -18 millis, based on 3.254/App, because ackElicitingInFlight | RTT:31/11 3.272 loss detection timeout handler running reschedule loss detection timer for PTO over -18 millis, based on 3.254/App, because ackElicitingInFlight | RTT:31/11 Sending probe 0, because no ack since 3.154. Current RTT: 31/11. 3.272 Discarding pn space Handshake because HandshakeDone is received 3.272 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 199 millis, based on 3.472/App, because ackElicitingInFlight | RTT:31/11 3.272 -> Packet PA|2|S0|2a0bafa402c49090|47|1 StreamFrame[0(CIB),0,17,fin] 3.292 -> Packet A|3|S0|2a0bafa402c49090|32|1 AckFrame[13-12|Δ19] 3.304 <- (6) Packet A|14|S0|6a6390e885a0351e|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 3.305 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.305 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 87 millis, based on 3.394/App, because ackElicitingInFlight | RTT:31/8 3.306 -> Packet A|4|S0|2a0bafa402c49090|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[13|Δ0] 3.306 Finished downloading https://server4:443/nmkbmlppvm at 21:20.703 on ClientConnection[9082f55c06926368/6a6390e885a0351e(V1) with server4/193.167.100.100:443] 3.306 Closing ClientConnection[9082f55c06926368/6a6390e885a0351e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.307 Creating connection with server4:443 with v1 3.307 -> Packet A|5|S0|2a0bafa402c49090|36|2 ConnectionCloseFrame[0|0|] AckFrame[14-13|Δ1] 3.308 Setting up connection for downloading https://server4:443/awzshjimnr at 21:20.705 on ClientConnection[0dd5732b915da26c/bb57f4e9da8d3d21(V1) with server4/193.167.100.100:443] 3.308 Original destination connection id: 0dd5732b915da26c (scid: bb57f4e9da8d3d21) >- CryptoStream[I|ClientHello] 3.310 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.510/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.310 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.513 loss detection timeout handler running Sending probe 0, because no ack since 3.310. Current RTT: 100/25. 3.513 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.513 (Probe is an initial retransmit) 3.514 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.914/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.513 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.644 <- (1) Packet I|2|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 3.644 <- (1) Packet H|3|L|1076|2 CryptoFrame[0,711] Padding(319) 3.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.048/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.647 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 3.648 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 3.648 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 3.648 - unsupported transport parameter 0x7158, size 1 (timestamp) 3.648 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 3.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.051/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.650 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.651 Starting downloading https://server4:443/awzshjimnr at 21:21.048 on ClientConnection[0dd5732b915da26c/bb57f4e9da8d3d21(V1) with server4/193.167.100.100:443] 3.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.851/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.651 Discarding pn space Initial because first Handshake message is being sent 3.651 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 3.652 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.852/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.652 -> Packet A|0|S0|74daf6d8c5e49200|47|1 StreamFrame[0(CIB),0,17,fin] 3.682 <- (2) Packet A|5|S0|bb57f4e9da8d3d21|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.683 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 3.850/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 3.877/App, because ackElicitingInFlight | RTT:100/25 3.683 Discarding pn space Handshake because HandshakeDone is received 3.683 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 3.702 -> Packet A|1|S0|74daf6d8c5e49200|32|1 AckFrame[5|Δ19] 3.755 <- (4) Packet A|8|S0|bb57f4e9da8d3d21|98|2 NewConnectionIdFrame[1,<0|c94e8cc4f28e02e3|2cb44dbe077bbe2fd76d124e48ff63b5] NewTokenFrame[01d33a9e76a7a245f0bef86068345462b5f4449a55e025b61f70f5ddda3d7461eb600fdb49bcbbfad9c9] 3.776 -> Packet A|2|S0|74daf6d8c5e49200|34|1 AckFrame[8,5|Δ19] 3.877 loss detection timeout handler running Sending probe 0, because no ack since 3.652. Current RTT: 100/25. 3.877 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 4.328/App, because ackElicitingInFlight | RTT:100/25 3.878 -> Packet PA|3|S0|74daf6d8c5e49200|47|1 StreamFrame[0(CIB),0,17,fin] 3.910 <- (5) Packet A|9|S0|bb57f4e9da8d3d21|1060|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] 3.911 Cwnd(-): 6000; inflight: 0 3.911 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 3.911 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 120 millis, based on 4.032/App, because ackElicitingInFlight | RTT:32/16 3.911 -> Packet A|4|S0|74daf6d8c5e49200|47|1 StreamFrame[0(CIB),0,17,fin] 3.911 Finished downloading https://server4:443/awzshjimnr at 21:21.308 on ClientConnection[0dd5732b915da26c/bb57f4e9da8d3d21(V1) with server4/193.167.100.100:443] 3.911 Closing ClientConnection[0dd5732b915da26c/bb57f4e9da8d3d21(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.912 -> Packet A|5|S0|74daf6d8c5e49200|35|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 3.912 Creating connection with server4:443 with v1 3.913 Setting up connection for downloading https://server4:443/pyobmjpsew at 21:21.310 on ClientConnection[f2f638be010e1c8a/597a0e0960ca2520(V1) with server4/193.167.100.100:443] 3.913 Original destination connection id: f2f638be010e1c8a (scid: 597a0e0960ca2520) >- CryptoStream[I|ClientHello] 3.915 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.115/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.914 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.948 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.948 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.148/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.951 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.948 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,712] Padding(319) reschedule loss detection timer for PTO over 96 millis, based on 4.048/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.951 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 3.951 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 3.951 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 3.951 - unsupported transport parameter 0x7158, size 1 (timestamp) 3.951 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 3.954 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.051/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.954 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.955 Starting downloading https://server4:443/pyobmjpsew at 21:21.352 on ClientConnection[f2f638be010e1c8a/597a0e0960ca2520(V1) with server4/193.167.100.100:443] 3.955 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.052/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.955 Discarding pn space Initial because first Handshake message is being sent 3.955 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.052/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.955 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|6f55556dd0d802e8|47|1 StreamFrame[0(CIB),0,17,fin]] 3.983 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.985 <- (3) Packet A|3|S0|597a0e0960ca2520|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.986 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 4.051/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 4.077/App, because ackElicitingInFlight | RTT:33/16 3.986 Discarding pn space Handshake because HandshakeDone is received 3.987 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 3.987 <- (5) Packet A|6|S0|597a0e0960ca2520|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 3.987 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.988 Finished downloading https://server4:443/pyobmjpsew at 21:21.385 on ClientConnection[f2f638be010e1c8a/597a0e0960ca2520(V1) with server4/193.167.100.100:443] 3.988 Closing ClientConnection[f2f638be010e1c8a/597a0e0960ca2520(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.988 -> Packet A|1|S0|6f55556dd0d802e8|34|1 AckFrame[6,3|Δ1] 3.988 Creating connection with server4:443 with v1 3.988 -> Packet A|2|S0|6f55556dd0d802e8|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 3.989 Setting up connection for downloading https://server4:443/qktoovucwx at 21:21.386 on ClientConnection[2e82e0cb9a71451e/ec62dba0c1cc8e04(V1) with server4/193.167.100.100:443] 3.989 Original destination connection id: 2e82e0cb9a71451e (scid: ec62dba0c1cc8e04) >- CryptoStream[I|ClientHello] 3.991 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.191/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.991 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.058 <- (6) Packet A|8|S0|597a0e0960ca2520|1054|1 StreamFrame[0(CIB),0,1024,fin] 4.059 -> Packet A|3|S0|6f55556dd0d802e8|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 4.090 <- (7) Packet A|9|S0|597a0e0960ca2520|98|2 NewConnectionIdFrame[1,<0|5151e34d0dd17ac6|fc5faddf9b677a99a7768399f6d6a9b1] NewTokenFrame[01d3b80b26752bfc8df0a0d5e61f8a10f05aba283e896acde7dc2b1d79cf8b1eec1cf9fbacdf44b7f539] 4.091 -> Packet A|4|S0|6f55556dd0d802e8|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 4.190 loss detection timeout handler running Sending probe 0, because no ack since 3.991. Current RTT: 100/25. 4.190 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.191 (Probe is an initial retransmit) 4.191 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.591/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.191 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.525 <- (1) Packet I|2|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 4.525 <- (1) Packet H|3|L|1076|2 CryptoFrame[0,710] Padding(320) 4.530 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.530 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) reschedule loss detection timer for PTO over 399 millis, based on 4.930/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.530 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 4.530 - unsupported transport parameter 0x7158, size 1 (timestamp) 4.529 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 4.530 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 4.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.933/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.533 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.533 Starting downloading https://server4:443/qktoovucwx at 21:21.930 on ClientConnection[2e82e0cb9a71451e/ec62dba0c1cc8e04(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 199 millis, based on 4.733/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.533 Discarding pn space Initial because first Handshake message is being sent 4.534 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 4.535 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.735/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.535 -> Packet A|0|S0|e4f60f3975132f85|47|1 StreamFrame[0(CIB),0,17,fin] 4.564 <- (2) Packet A|5|S0|ec62dba0c1cc8e04|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 4.565 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 4.733/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 4.760/App, because ackElicitingInFlight | RTT:100/25 4.565 Discarding pn space Handshake because HandshakeDone is received 4.585 -> Packet A|1|S0|e4f60f3975132f85|32|1 AckFrame[5|Δ19] 4.640 <- (3) Packet A|8|S0|ec62dba0c1cc8e04|98|2 NewConnectionIdFrame[1,<0|af3ce8e52530eb7a|34310d6ff9d6caa80b590bdd322af98a] NewTokenFrame[014ee4fb6d52e9c86c33937ea5dd16d12215de1f4759a4c6ad2d3cc875586cc4ab7f9b92815a12848759] 4.660 -> Packet A|2|S0|e4f60f3975132f85|34|1 AckFrame[8,5|Δ19] 4.759 loss detection timeout handler running Sending probe 0, because no ack since 4.535. Current RTT: 100/25. 4.760 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 5.210/App, because ackElicitingInFlight | RTT:100/25 4.760 -> Packet PA|3|S0|e4f60f3975132f85|47|1 StreamFrame[0(CIB),0,17,fin] 5.209 loss detection timeout handler running Sending probe 1, because no ack since 4.760. Current RTT: 100/25. 5.209 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 6.110/App, because ackElicitingInFlight | RTT:100/25 5.210 -> Packet PA|4|S0|e4f60f3975132f85|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 6.111/App, because ackElicitingInFlight | RTT:100/25 5.211 -> Packet PA|5|S0|e4f60f3975132f85|47|1 StreamFrame[0(CIB),0,17,fin] 5.242 <- (4) Packet A|9|S0|ec62dba0c1cc8e04|1062|2 AckFrame[4,2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 5.243 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 5.243 Cwnd(-): 6000; inflight: 47 reschedule loss detection timer for PTO over 192 millis, based on 5.436/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 120 millis, based on 5.364/App, because ackElicitingInFlight | RTT:32/16 5.243 -> Packet A|6|S0|e4f60f3975132f85|47|1 StreamFrame[0(CIB),0,17,fin] 5.243 Finished downloading https://server4:443/qktoovucwx at 21:22.640 on ClientConnection[2e82e0cb9a71451e/ec62dba0c1cc8e04(V1) with server4/193.167.100.100:443] 5.244 Closing ClientConnection[2e82e0cb9a71451e/ec62dba0c1cc8e04(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.244 -> Packet A|7|S0|e4f60f3975132f85|35|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 5.244 Creating connection with server4:443 with v1 5.245 Setting up connection for downloading https://server4:443/zqgvtaivuc at 21:22.642 on ClientConnection[0310d9092eaa9005/f67de480b7fdd5bb(V1) with server4/193.167.100.100:443] 5.245 Original destination connection id: 0310d9092eaa9005 (scid: f67de480b7fdd5bb) >- CryptoStream[I|ClientHello] 5.246 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.447/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.246 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.274 <- (5) Packet A|10|S0|ec62dba0c1cc8e04|36|1 AckFrame[6,4,2-1|Δ0] 5.274 -> Packet A|8|S0|e4f60f3975132f85|35|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 5.280 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 5.280 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.480/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.283 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.280 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) reschedule loss detection timer for PTO over 96 millis, based on 5.380/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.283 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 5.284 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 5.284 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 5.284 - unsupported transport parameter 0x7158, size 1 (timestamp) 5.284 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 5.287 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.384/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.287 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.287 Starting downloading https://server4:443/zqgvtaivuc at 21:22.684 on ClientConnection[0310d9092eaa9005/f67de480b7fdd5bb(V1) with server4/193.167.100.100:443] 5.287 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.384/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.287 Discarding pn space Initial because first Handshake message is being sent 5.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.385/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.288 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|305bb62d166c547b|47|1 StreamFrame[0(CIB),0,17,fin]] 5.315 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.318 <- (3) Packet A|3|S0|f67de480b7fdd5bb|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 5.320 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 5.384/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 89 millis, based on 5.410/App, because ackElicitingInFlight | RTT:33/16 5.320 Discarding pn space Handshake because HandshakeDone is received 5.320 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 5.320 <- (5) Packet A|6|S0|f67de480b7fdd5bb|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 5.321 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.321 -> Packet A|1|S0|305bb62d166c547b|33|1 AckFrame[6,3|Δ0] 5.321 Finished downloading https://server4:443/zqgvtaivuc at 21:22.718 on ClientConnection[0310d9092eaa9005/f67de480b7fdd5bb(V1) with server4/193.167.100.100:443] 5.321 Closing ClientConnection[0310d9092eaa9005/f67de480b7fdd5bb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.322 -> Packet A|2|S0|305bb62d166c547b|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 5.322 Creating connection with server4:443 with v1 5.323 Setting up connection for downloading https://server4:443/bbgukfejdt at 21:22.720 on ClientConnection[86690633377907ea/bfa8c9d0d71bc7da(V1) with server4/193.167.100.100:443] 5.323 Original destination connection id: 86690633377907ea (scid: bfa8c9d0d71bc7da) >- CryptoStream[I|ClientHello] 5.325 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.525/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.325 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.442 <- (6) Packet A|8|S0|f67de480b7fdd5bb|98|2 NewConnectionIdFrame[1,<0|ab8e2ad2383d593a|b0a7bd9cc192a179bfa8c1af551ba10d] NewTokenFrame[018fd0776fca47c29c241778d3761422248d3ca5f459201fc49129d746a486b2df2821561aac9aead627] 5.442 -> Packet A|3|S0|305bb62d166c547b|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 5.524 loss detection timeout handler running Sending probe 0, because no ack since 5.325. Current RTT: 100/25. 5.524 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.524 (Probe is an initial retransmit) 5.525 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.925/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.524 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.924 loss detection timeout handler running Sending probe 1, because no ack since 5.524. Current RTT: 100/25. 5.924 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.924 (Probe is an initial retransmit) 5.925 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.725/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.924 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.925 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.726/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.925 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.958 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 5.958 probe count not reset on ack because handshake not yet confirmed 5.959 Retransmitting CryptoFrame[0,257] on level Initial 5.959 Cwnd(-): 6000; inflight: 1200 5.959 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.759/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.959 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 6.347/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.959 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 5.958 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 5.961 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.961 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 5.962 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 5.962 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 5.962 - unsupported transport parameter 0x7158, size 1 (timestamp) 5.962 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.964 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.352/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.965 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.964 -> Packet H|0|L|80|1 CryptoFrame[0,36] reschedule loss detection timer for PTO over 96 millis, based on 6.062/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.965 Discarding pn space Initial because first Handshake message is being sent 5.965 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 5.965 Starting downloading https://server4:443/bbgukfejdt at 21:23.362 on ClientConnection[86690633377907ea/bfa8c9d0d71bc7da(V1) with server4/193.167.100.100:443] 5.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.063/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.965 -> Packet A|0|S0|fa0300933bc911e1|47|1 StreamFrame[0(CIB),0,17,fin] 5.993 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.996 <- (3) Packet A|4|S0|bfa8c9d0d71bc7da|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 5.997 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 6.061/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 6.087/App, because ackElicitingInFlight | RTT:33/16 5.997 Discarding pn space Handshake because HandshakeDone is received 5.997 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 6.017 -> Packet A|1|S0|fa0300933bc911e1|32|1 AckFrame[4|Δ19] 6.069 <- (5) Packet A|7|S0|bfa8c9d0d71bc7da|98|2 NewConnectionIdFrame[1,<0|f85bdc3f04d8f288|652e6428bad81aa3a7f680e0782cd781] NewTokenFrame[01bc80dfeac87df4a97fcba554a2a421c4d93f3a3712ea088b9d5c1144af6933811b75e5ae29b86673ef] 6.087 loss detection timeout handler running Sending probe 0, because no ack since 5.965. Current RTT: 33/16. 6.088 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 6.332/App, because ackElicitingInFlight | RTT:33/16 6.088 -> Packet PA|2|S0|fa0300933bc911e1|47|1 StreamFrame[0(CIB),0,17,fin] 6.089 -> Packet A|3|S0|fa0300933bc911e1|34|1 AckFrame[7,4|Δ19] 6.199 <- (6) Packet A|9|S0|bfa8c9d0d71bc7da|33|1 AckFrame[3-1|Δ78] 6.199 Cwnd(-): 3000; inflight: 0 6.199 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.199 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.199 <- (7) Packet A|10|S0|bfa8c9d0d71bc7da|1055|1 StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 121 millis, based on 6.321/App, because ackElicitingInFlight | RTT:33/16 6.199 -> Packet A|4|S0|fa0300933bc911e1|47|1 StreamFrame[0(CIB),0,17,fin] 6.200 Finished downloading https://server4:443/bbgukfejdt at 21:23.597 on ClientConnection[86690633377907ea/bfa8c9d0d71bc7da(V1) with server4/193.167.100.100:443] 6.200 Closing ClientConnection[86690633377907ea/bfa8c9d0d71bc7da(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.201 Creating connection with server4:443 with v1 6.201 -> Packet A|5|S0|fa0300933bc911e1|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9|Δ0] 6.201 Setting up connection for downloading https://server4:443/cbqyyrqzjh at 21:23.598 on ClientConnection[40ea7f29fa99f49a/189e812c130b1219(V1) with server4/193.167.100.100:443] 6.201 Original destination connection id: 40ea7f29fa99f49a (scid: 189e812c130b1219) >- CryptoStream[I|ClientHello] 6.203 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.404/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.203 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.237 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.237 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.437/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.237 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) 6.240 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.337/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.239 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 6.240 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 6.240 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 6.240 - unsupported transport parameter 0x7158, size 1 (timestamp) 6.240 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 6.242 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.339/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.242 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.243 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.340/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.243 Discarding pn space Initial because first Handshake message is being sent 6.243 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 6.243 Starting downloading https://server4:443/cbqyyrqzjh at 21:23.640 on ClientConnection[40ea7f29fa99f49a/189e812c130b1219(V1) with server4/193.167.100.100:443] 6.244 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.341/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.243 -> Packet A|0|S0|b6c197901a22cc1f|47|1 StreamFrame[0(CIB),0,17,fin] 6.274 <- (2) Packet A|3|S0|189e812c130b1219|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.275 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 6.339/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 6.365/App, because ackElicitingInFlight | RTT:33/16 6.275 Discarding pn space Handshake because HandshakeDone is received 6.275 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 6.294 -> Packet A|1|S0|b6c197901a22cc1f|32|1 AckFrame[3|Δ19] 6.345 <- (4) Packet A|7|S0|189e812c130b1219|32|1 AckFrame[0|Δ70] 6.345 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.418 <- (5) Packet A|9|S0|189e812c130b1219|1054|1 StreamFrame[0(CIB),0,1024,fin] 6.419 Finished downloading https://server4:443/cbqyyrqzjh at 21:23.816 on ClientConnection[40ea7f29fa99f49a/189e812c130b1219(V1) with server4/193.167.100.100:443] 6.419 Closing ClientConnection[40ea7f29fa99f49a/189e812c130b1219(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.419 Creating connection with server4:443 with v1 6.419 -> Packet A|2|S0|b6c197901a22cc1f|39|2 ConnectionCloseFrame[0|0|] AckFrame[9,7,3|Δ0] 6.420 Setting up connection for downloading https://server4:443/eeokqiqnto at 21:23.817 on ClientConnection[332c6d4b1a55e52b/435707cf3bc55c57(V1) with server4/193.167.100.100:443] 6.420 Original destination connection id: 332c6d4b1a55e52b (scid: 435707cf3bc55c57) >- CryptoStream[I|ClientHello] 6.421 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.621/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.421 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.450 <- (6) Packet A|10|S0|189e812c130b1219|98|2 NewConnectionIdFrame[1,<0|6b2841a1b3bb9c71|0b9feaca05c7cb19de2562f6e41e52cb] NewTokenFrame[013fd3e5fc3c33c2e86b70b714b7524f91d2bfde5388611960371d22424a182049c4b344ae70446177aa] 6.450 <- (7) Packet A|11|S0|189e812c130b1219|30|1 ConnectionCloseFrame[0|0|] 6.451 -> Packet A|3|S0|b6c197901a22cc1f|39|2 ConnectionCloseFrame[0|0|] AckFrame[9,7,3|Δ0] 6.454 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.455 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.655/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.555/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.458 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 6.454 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 6.459 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 6.459 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 6.459 - unsupported transport parameter 0x7158, size 1 (timestamp) 6.459 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 6.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.462 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.463 Starting downloading https://server4:443/eeokqiqnto at 21:23.860 on ClientConnection[332c6d4b1a55e52b/435707cf3bc55c57(V1) with server4/193.167.100.100:443] 6.463 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 6.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 6.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.463 -> Packet A|0|S0|491c4470243c5f5f|47|1 StreamFrame[0(CIB),0,17,fin] 6.463 Discarding pn space Initial because first Handshake message is being sent 6.490 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.559 loss detection timeout handler running Sending probe 0, because no ack since 6.462. Current RTT: 33/16. 6.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.559 (Probe is a handshake retransmit) 6.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.754/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.560 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 6.591 <- (3) Packet A|5|S0|435707cf3bc55c57|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.592 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 6.707/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 6.585/App, because ackElicitingInFlight | RTT:33/16 6.592 loss detection timeout handler running 6.592 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 6.463. Current RTT: 33/16. 6.592 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 6.836/App, because ackElicitingInFlight | RTT:33/16 6.592 -> Packet PA|1|S0|491c4470243c5f5f|47|1 StreamFrame[0(CIB),0,17,fin] 6.612 -> Packet A|2|S0|491c4470243c5f5f|32|1 AckFrame[5|Δ19] 6.625 <- (4) Packet A|8|S0|435707cf3bc55c57|1059|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 6.625 Cwnd(-): 6000; inflight: 0 6.625 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.625 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 6.731/App, because ackElicitingInFlight | RTT:33/12 6.625 -> Packet A|3|S0|491c4470243c5f5f|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 6.626 Finished downloading https://server4:443/eeokqiqnto at 21:24.023 on ClientConnection[332c6d4b1a55e52b/435707cf3bc55c57(V1) with server4/193.167.100.100:443] 6.626 Closing ClientConnection[332c6d4b1a55e52b/435707cf3bc55c57(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.627 Creating connection with server4:443 with v1 6.627 -> Packet A|4|S0|491c4470243c5f5f|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,5|Δ0] 6.627 Setting up connection for downloading https://server4:443/yulwrzmpeo at 21:24.024 on ClientConnection[f564d2ff7d282bdb/5a78fa9888f55912(V1) with server4/193.167.100.100:443] 6.628 Original destination connection id: f564d2ff7d282bdb (scid: 5a78fa9888f55912) >- CryptoStream[I|ClientHello] 6.630 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.830/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.630 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.637 Discarding packet (1077 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 6.663 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.664 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.864/Initial, because peerAwaitingAddressValidation | RTT:100/25 6.664 <- (6) Packet A|10|S0|435707cf3bc55c57|33|1 AckFrame[2-1|Δ21] 6.664 -> Packet A|5|S0|491c4470243c5f5f|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,5|Δ0] -< CryptoStream[I|ServerHello] 6.663 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 6.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.764/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.667 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 6.668 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 6.668 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 6.668 - unsupported transport parameter 0x7158, size 1 (timestamp) 6.668 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 6.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.768/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.670 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.671 Starting downloading https://server4:443/yulwrzmpeo at 21:24.068 on ClientConnection[f564d2ff7d282bdb/5a78fa9888f55912(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 6.768/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.671 Discarding pn space Initial because first Handshake message is being sent 6.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.672 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|689f974cdb810990|47|1 StreamFrame[0(CIB),0,17,fin]] 6.696 <- (7) Packet A|12|S0|435707cf3bc55c57|98|2 NewConnectionIdFrame[1,<0|ab3f61b3b47ea269|89949d1654c9f0263bc2752a00d6f817] NewTokenFrame[0199d384f3d00193de025d45d8a4cf489f81bc40f7e384919b7a55038f5d7dbf07d0496f9ea6da35d4a0] 6.696 <- (8) Packet A|13|S0|435707cf3bc55c57|30|1 ConnectionCloseFrame[0|0|] 6.696 -> Packet A|6|S0|491c4470243c5f5f|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,5|Δ0] 6.702 <- (2) Packet H|3|L|47|1 AckFrame[0|Δ0] 6.703 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 6.703 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 6.702 <- (2) Packet A|4|S0|5a78fa9888f55912|98|2 NewConnectionIdFrame[1,<0|eb3b479b787d3ae2|2f5fb4ccf82185109b344bfed119b78e] NewTokenFrame[01cfec1307f1632d718160f15207212372fe9d994e6ff9fc8b0474d45bbc6e15409c544f53dfc0db6dca] 6.722 -> Packet A|1|S0|689f974cdb810990|32|1 AckFrame[4|Δ19] 6.754 <- (3) Packet A|5|S0|5a78fa9888f55912|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.754 State is set to Confirmed reschedule loss detection timer for PTO over 27 millis, based on 6.782/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 26 millis, based on 6.782/App, because ackElicitingInFlight | RTT:33/13 6.755 Discarding pn space Handshake because HandshakeDone is received 6.774 -> Packet A|2|S0|689f974cdb810990|32|1 AckFrame[5-4|Δ19] 6.781 loss detection timeout handler running Sending probe 0, because no ack since 6.672. Current RTT: 33/13. 6.781 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 7.001/App, because ackElicitingInFlight | RTT:33/13 6.781 -> Packet PA|3|S0|689f974cdb810990|47|1 StreamFrame[0(CIB),0,17,fin] 6.887 <- (4) Packet A|7|S0|5a78fa9888f55912|33|1 AckFrame[3-1|Δ74] 6.887 Cwnd(-): 6000; inflight: 0 6.887 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.887 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 151 millis, based on 7.039/App, because ackElicitingInFlight | RTT:39/22 6.887 -> Packet A|4|S0|689f974cdb810990|47|1 StreamFrame[0(CIB),0,17,fin] 6.887 <- (5) Packet A|8|S0|5a78fa9888f55912|1055|1 StreamFrame[0(CIB),0,1024,fin] 6.888 Finished downloading https://server4:443/yulwrzmpeo at 21:24.285 on ClientConnection[f564d2ff7d282bdb/5a78fa9888f55912(V1) with server4/193.167.100.100:443] 6.888 Closing ClientConnection[f564d2ff7d282bdb/5a78fa9888f55912(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.889 Creating connection with server4:443 with v1 6.889 -> Packet A|5|S0|689f974cdb810990|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 6.889 Setting up connection for downloading https://server4:443/afoqxnbtfx at 21:24.286 on ClientConnection[d2f9dc195c87e20c/3e2d2b01de71f13e(V1) with server4/193.167.100.100:443] 6.889 Original destination connection id: d2f9dc195c87e20c (scid: 3e2d2b01de71f13e) >- CryptoStream[I|ClientHello] 6.891 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.091/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.891 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.090 loss detection timeout handler running Sending probe 0, because no ack since 6.891. Current RTT: 100/25. 7.090 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.090 (Probe is an initial retransmit) 7.091 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.491/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.091 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.124 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 7.125 probe count not reset on ack because handshake not yet confirmed 7.125 Retransmitting CryptoFrame[0,257] on level Initial 7.125 Cwnd(-): 6000; inflight: 0 7.125 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.525/Initial, because peerAwaitingAddressValidation | RTT:100/25 7.125 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 7.319/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.125 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 7.124 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 7.127 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.322/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.127 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 7.128 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 7.128 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 7.128 - unsupported transport parameter 0x7158, size 1 (timestamp) 7.128 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 7.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.325/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.131 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.131 Starting downloading https://server4:443/afoqxnbtfx at 21:24.528 on ClientConnection[d2f9dc195c87e20c/3e2d2b01de71f13e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 7.228/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.131 Discarding pn space Initial because first Handshake message is being sent 7.131 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 7.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.229/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.131 -> Packet A|0|S0|d5b03837023149c7|47|1 StreamFrame[0(CIB),0,17,fin] 7.157 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.228 loss detection timeout handler running Sending probe 0, because no ack since 7.131. Current RTT: 33/16. 7.228 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.228 (Probe is a handshake retransmit) 7.228 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.422/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.228 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 7.421 loss detection timeout handler running Sending probe 1, because no ack since 7.131. Current RTT: 33/16. 7.421 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.422 (Probe is a handshake retransmit) 7.422 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.422 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 7.423 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.811/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.423 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 7.426 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.454 <- (4) Packet A|5|S0|3e2d2b01de71f13e|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.454 State is set to Confirmed reschedule loss detection timer for PTO over 164 millis, based on 7.619/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -201 millis, based on 7.253/App, because ackElicitingInFlight | RTT:33/16 7.455 Discarding pn space Handshake because HandshakeDone is received 7.455 loss detection timeout handler running Sending probe 0, because no ack since 7.131. Current RTT: 33/16. 7.455 Discarding packet (47 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 7.455 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 7.699/App, because ackElicitingInFlight | RTT:33/16 7.455 -> Packet PA|1|S0|d5b03837023149c7|47|1 StreamFrame[0(CIB),0,17,fin] 7.474 -> Packet A|2|S0|d5b03837023149c7|32|1 AckFrame[5|Δ19] 7.698 loss detection timeout handler running Sending probe 1, because no ack since 7.455. Current RTT: 33/16. 7.699 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 8.187/App, because ackElicitingInFlight | RTT:33/16 7.699 -> Packet PA|3|S0|d5b03837023149c7|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 8.188/App, because ackElicitingInFlight | RTT:33/16 7.700 -> Packet PA|4|S0|d5b03837023149c7|47|1 StreamFrame[0(CIB),0,17,fin] 7.732 <- (6) Packet A|9|S0|3e2d2b01de71f13e|1059|2 AckFrame[4|Δ0] StreamFrame[0(CIB),0,1024,fin] 7.732 Cwnd(-): 3000; inflight: 47 7.732 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.732 -> Packet A|5|S0|d5b03837023149c7|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 7.733 Finished downloading https://server4:443/afoqxnbtfx at 21:25.130 on ClientConnection[d2f9dc195c87e20c/3e2d2b01de71f13e(V1) with server4/193.167.100.100:443] 7.733 Closing ClientConnection[d2f9dc195c87e20c/3e2d2b01de71f13e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.733 -> Packet A|6|S0|d5b03837023149c7|37|2 ConnectionCloseFrame[0|0|] AckFrame[9,5|Δ0] 7.734 Creating connection with server4:443 with v1 7.734 Setting up connection for downloading https://server4:443/awtmxhrbyz at 21:25.131 on ClientConnection[3b1639a5ce34eba4/2ae456ae398d585e(V1) with server4/193.167.100.100:443] 7.734 Original destination connection id: 3b1639a5ce34eba4 (scid: 2ae456ae398d585e) >- CryptoStream[I|ClientHello] 7.736 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.936/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.735 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.764 <- (7) Packet A|10|S0|3e2d2b01de71f13e|98|2 NewConnectionIdFrame[1,<0|ee8c9611558b782d|97d911bd345a52a63900888bf4697b2d] NewTokenFrame[01e766fc2b8339f11ca8216d0baa8f4916b084d08b9204d7e9a24fcb1467ed71833da32061a1c6d368e6] 7.764 <- (8) Packet A|11|S0|3e2d2b01de71f13e|30|1 ConnectionCloseFrame[0|0|] 7.765 -> Packet A|7|S0|d5b03837023149c7|37|2 ConnectionCloseFrame[0|0|] AckFrame[9,5|Δ0] 7.769 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.769 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.969/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.769 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 7.772 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 7.772 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 7.772 - unsupported transport parameter 0x7158, size 1 (timestamp) 7.772 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.772 - unsupported transport parameter 0x1057, size 1 (loss-bits) reschedule loss detection timer for PTO over 96 millis, based on 7.869/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.772 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 7.774 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 7.871/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.774 -> Packet H|0|L|80|1 CryptoFrame[0,36] 7.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.872/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.775 Discarding pn space Initial because first Handshake message is being sent 7.775 Starting downloading https://server4:443/awtmxhrbyz at 21:25.172 on ClientConnection[3b1639a5ce34eba4/2ae456ae398d585e(V1) with server4/193.167.100.100:443] 7.775 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 7.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.872/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.775 -> Packet A|0|S0|d16d29e85e0458bb|47|1 StreamFrame[0(CIB),0,17,fin] 7.804 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.806 <- (3) Packet A|3|S0|2ae456ae398d585e|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.807 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 7.871/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 7.897/App, because ackElicitingInFlight | RTT:33/16 7.807 Discarding pn space Handshake because HandshakeDone is received 7.807 <- (4) Packet A|6|S0|2ae456ae398d585e|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 7.807 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.808 -> Packet A|1|S0|d16d29e85e0458bb|33|1 AckFrame[6,3|Δ0] 7.808 Finished downloading https://server4:443/awtmxhrbyz at 21:25.205 on ClientConnection[3b1639a5ce34eba4/2ae456ae398d585e(V1) with server4/193.167.100.100:443] 7.808 Closing ClientConnection[3b1639a5ce34eba4/2ae456ae398d585e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.808 Creating connection with server4:443 with v1 7.808 -> Packet A|2|S0|d16d29e85e0458bb|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 7.809 Setting up connection for downloading https://server4:443/ufizclhmfw at 21:25.206 on ClientConnection[d47f87de9843397f/9e9a7a6a11df4056(V1) with server4/193.167.100.100:443] 7.809 Original destination connection id: d47f87de9843397f (scid: 9e9a7a6a11df4056) >- CryptoStream[I|ClientHello] 7.810 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.010/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.810 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.839 <- (5) Packet A|7|S0|2ae456ae398d585e|98|2 NewConnectionIdFrame[1,<0|e7149f61ff994dd4|4691b40e1ea6ef7bcec8070c3f2e0a09] NewTokenFrame[0181951c3aed1a52868fc489836a6bbc9e808d7f4b84da59dddf53b2c759919701957c4f43e0f22d51c4] 7.839 -> Packet A|3|S0|d16d29e85e0458bb|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 8.010 loss detection timeout handler running Sending probe 0, because no ack since 7.810. Current RTT: 100/25. 8.010 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.010 (Probe is an initial retransmit) 8.010 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.410/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.010 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.344 <- (1) Packet I|2|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 8.344 <- (1) Packet H|3|L|1076|2 CryptoFrame[0,712] Padding(318) 8.347 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.347 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) reschedule loss detection timer for PTO over 399 millis, based on 8.747/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.347 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 8.347 - unsupported transport parameter 0x7158, size 1 (timestamp) 8.347 - unsupported transport parameter 0x1057, size 1 (loss-bits) 8.347 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) >- CryptoStream[H|Finished] 8.350 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.750/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.350 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.350 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 8.550/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.350 Discarding pn space Initial because first Handshake message is being sent 8.350 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 8.351 Starting downloading https://server4:443/ufizclhmfw at 21:25.748 on ClientConnection[d47f87de9843397f/9e9a7a6a11df4056(V1) with server4/193.167.100.100:443] 8.351 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 8.551/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.351 -> Packet A|0|S0|eed60800ccddd264|47|1 StreamFrame[0(CIB),0,17,fin] 8.381 <- (2) Packet H|5|L|47|1 AckFrame[1|Δ0] 8.462 loss detection timeout handler running 8.462 Retransmitting CryptoFrame[0,36] on level Handshake 8.462 Cwnd(-): 6000; inflight: 47 8.462 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 8.462 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 8.462 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 199 millis, based on 8.662/Handshake, because ackElicitingInFlight | RTT:100/25 8.462 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[5|Δ0] 8.494 <- (3) Packet A|6|S0|9e9a7a6a11df4056|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 8.495 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 8.576/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 80 millis, based on 8.576/App, because ackElicitingInFlight | RTT:100/25 8.495 Discarding pn space Handshake because HandshakeDone is received 8.514 -> Packet A|1|S0|eed60800ccddd264|32|1 AckFrame[6|Δ19] 8.575 loss detection timeout handler running Sending probe 0, because no ack since 8.351. Current RTT: 100/25. 8.575 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 9.025/App, because ackElicitingInFlight | RTT:100/25 8.575 -> Packet PA|2|S0|eed60800ccddd264|47|1 StreamFrame[0(CIB),0,17,fin] 8.607 <- (4) Packet A|10|S0|9e9a7a6a11df4056|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 8.608 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.608 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 115 millis, based on 8.724/App, because ackElicitingInFlight | RTT:31/15 8.608 -> Packet A|3|S0|eed60800ccddd264|47|1 StreamFrame[0(CIB),0,17,fin] 8.608 Finished downloading https://server4:443/ufizclhmfw at 21:26.005 on ClientConnection[d47f87de9843397f/9e9a7a6a11df4056(V1) with server4/193.167.100.100:443] 8.608 Closing ClientConnection[d47f87de9843397f/9e9a7a6a11df4056(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.609 -> Packet A|4|S0|eed60800ccddd264|35|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 8.609 Creating connection with server4:443 with v1 8.609 Setting up connection for downloading https://server4:443/usegaujggn at 21:26.006 on ClientConnection[a138ccde081d8fb6/bc5b0bbfbaa7f551(V1) with server4/193.167.100.100:443] 8.609 Original destination connection id: a138ccde081d8fb6 (scid: bc5b0bbfbaa7f551) >- CryptoStream[I|ClientHello] 8.611 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.811/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.611 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.644 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.645 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.845/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.644 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) 8.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.745/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.648 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 8.648 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 8.647 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 8.648 - unsupported transport parameter 0x7158, size 1 (timestamp) 8.648 - unsupported transport parameter 0x1057, size 1 (loss-bits) 8.648 <- (5) Packet A|11|S0|9e9a7a6a11df4056|33|1 AckFrame[3-1|Δ9] 8.649 -> Packet A|5|S0|eed60800ccddd264|35|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] >- CryptoStream[H|Finished] 8.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 8.747/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.650 -> Packet H|0|L|80|1 CryptoFrame[0,36] 8.651 Starting downloading https://server4:443/usegaujggn at 21:26.048 on ClientConnection[a138ccde081d8fb6/bc5b0bbfbaa7f551(V1) with server4/193.167.100.100:443] 8.651 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 8.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.748/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.651 Discarding pn space Initial because first Handshake message is being sent 8.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.748/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.651 -> Packet A|0|S0|18900f8c169f7fb3|47|1 StreamFrame[0(CIB),0,17,fin] 8.679 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.680 <- (6) Packet A|14|S0|9e9a7a6a11df4056|98|2 NewConnectionIdFrame[1,<0|1c821d98a307f608|cc1363be1bdd43e4f4851f02ff5c87dc] NewTokenFrame[016fc48f96d39027c33e7face158324c85d2e58ccef90a07a9bdecfbe056715261fac1bd86aa82f76beb] 8.680 <- (7) Packet A|15|S0|9e9a7a6a11df4056|30|1 ConnectionCloseFrame[0|0|] 8.680 -> Packet A|6|S0|eed60800ccddd264|35|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 8.682 <- (3) Packet A|3|S0|bc5b0bbfbaa7f551|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 8.682 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 8.747/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 8.773/App, because ackElicitingInFlight | RTT:33/16 8.683 Discarding pn space Handshake because HandshakeDone is received 8.683 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 8.683 <- (5) Packet A|6|S0|bc5b0bbfbaa7f551|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 8.683 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.684 Finished downloading https://server4:443/usegaujggn at 21:26.081 on ClientConnection[a138ccde081d8fb6/bc5b0bbfbaa7f551(V1) with server4/193.167.100.100:443] 8.684 Closing ClientConnection[a138ccde081d8fb6/bc5b0bbfbaa7f551(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.684 -> Packet A|1|S0|18900f8c169f7fb3|33|1 AckFrame[6,3|Δ0] 8.684 -> Packet A|2|S0|18900f8c169f7fb3|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 8.684 Creating connection with server4:443 with v1 8.685 Setting up connection for downloading https://server4:443/bgoyzvchnx at 21:26.082 on ClientConnection[28d32d49d45a5a73/4346b81ea6881e62(V1) with server4/193.167.100.100:443] 8.685 Original destination connection id: 28d32d49d45a5a73 (scid: 4346b81ea6881e62) >- CryptoStream[I|ClientHello] 8.686 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.886/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.686 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.719 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.720 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.920/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.719 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) 8.722 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.819/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.722 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 8.722 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 8.723 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 8.723 - unsupported transport parameter 0x7158, size 1 (timestamp) 8.723 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 8.726 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.823/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.725 -> Packet H|0|L|80|1 CryptoFrame[0,36] 8.726 Starting downloading https://server4:443/bgoyzvchnx at 21:26.123 on ClientConnection[28d32d49d45a5a73/4346b81ea6881e62(V1) with server4/193.167.100.100:443] 8.726 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 8.726 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.823/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.726 Discarding pn space Initial because first Handshake message is being sent 8.727 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.824/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.726 -> Packet A|0|S0|26b447dd9c79b4be|47|1 StreamFrame[0(CIB),0,17,fin] 8.754 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.757 <- (3) Packet A|3|S0|4346b81ea6881e62|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 8.758 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 8.822/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 8.848/App, because ackElicitingInFlight | RTT:33/16 8.758 Discarding pn space Handshake because HandshakeDone is received 8.758 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 8.758 <- (5) Packet A|6|S0|4346b81ea6881e62|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 8.758 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.759 -> Packet A|1|S0|26b447dd9c79b4be|33|1 AckFrame[6,3|Δ0] 8.759 Finished downloading https://server4:443/bgoyzvchnx at 21:26.156 on ClientConnection[28d32d49d45a5a73/4346b81ea6881e62(V1) with server4/193.167.100.100:443] 8.759 Closing ClientConnection[28d32d49d45a5a73/4346b81ea6881e62(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.759 Creating connection with server4:443 with v1 8.759 -> Packet A|2|S0|26b447dd9c79b4be|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 8.760 Setting up connection for downloading https://server4:443/yelujmeums at 21:26.157 on ClientConnection[4af074841192793f/56c04344c54f3192(V1) with server4/193.167.100.100:443] 8.760 Original destination connection id: 4af074841192793f (scid: 56c04344c54f3192) >- CryptoStream[I|ClientHello] 8.762 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.962/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.762 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.790 <- (6) Packet A|7|S0|4346b81ea6881e62|98|2 NewConnectionIdFrame[1,<0|37ed76628be50f9d|cefc09f4fc1b2497f68e5c809ddbcaa8] NewTokenFrame[0147671b4f5f59f5c6768b1bf67b805b62df35a1072391730c4a2774e132062458676cd2b4412ac4d447] 8.790 -> Packet A|3|S0|26b447dd9c79b4be|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 8.961 loss detection timeout handler running Sending probe 0, because no ack since 8.762. Current RTT: 100/25. 8.961 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.961 (Probe is an initial retransmit) 8.961 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.362/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.961 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.993 <- (1) Packet I|2|L|48|1 Token=[] AckFrame[1-0|Δ0] 8.994 probe count not reset on ack because handshake not yet confirmed 8.994 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.394/Initial, because peerAwaitingAddressValidation | RTT:100/25 9.393 loss detection timeout handler running Sending probe 1, because no ack since 8.961. Current RTT: 31/15. 9.393 Sending probe because peer awaiting address validation 9.394 (Probe is Initial ping, because there is no Initial data to retransmit) 9.394 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 363 millis, based on 9.758/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 9.394 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 9.396 <- (2) Packet I|5|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 9.399 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.396 <- (2) Packet H|6|L|1077|2 CryptoFrame[0,711] Padding(320) reschedule loss detection timer for PTO over 363 millis, based on 9.763/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 9.399 -> Packet I|3|L|1201|2 Token=[] AckFrame[5,2|Δ0] Padding(1151) 9.399 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 9.400 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 9.400 - unsupported transport parameter 0x7158, size 1 (timestamp) 9.400 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 9.402 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 9.766/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.402 -> Packet H|0|L|80|1 CryptoFrame[0,36] 9.402 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.402 Starting downloading https://server4:443/yelujmeums at 21:26.799 on ClientConnection[4af074841192793f/56c04344c54f3192(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 90 millis, based on 9.493/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 9.402 Discarding pn space Initial because first Handshake message is being sent 9.403 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 9.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 9.403 -> [Packet H|1|L|46|1 AckFrame[6|Δ0], Packet A|0|S0|ef907768731f3ccb|47|1 StreamFrame[0(CIB),0,17,fin]] 9.434 <- (3) Packet H|8|L|47|1 AckFrame[1|Δ0] 9.436 loss detection timeout handler running 9.436 Retransmitting CryptoFrame[0,36] on level Handshake 9.436 Cwnd(-): 6000; inflight: 47 9.436 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 9.436 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 9.436 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 90 millis, based on 9.527/Handshake, because ackElicitingInFlight | RTT:31/15 9.436 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[8|Δ0] 9.468 <- (4) Packet H|10|L|47|1 AckFrame[2-1|Δ0] 9.468 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 9.468 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 9.468 <- (4) Packet A|11|S0|56c04344c54f3192|98|2 NewConnectionIdFrame[1,<0|b540ec29c83e3096|08cd328151344076def61096c8ba176f] NewTokenFrame[010003ba342ff445fc384bc1313f5a45336b8836398505ce47b3bccbfbd17e7b5a70a2b08c9cce18b1de] 9.488 -> Packet A|1|S0|ef907768731f3ccb|32|1 AckFrame[11|Δ19] 9.519 <- (5) Packet A|12|S0|56c04344c54f3192|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.520 State is set to Confirmed reschedule loss detection timer for PTO over -16 millis, based on 9.503/App, because ackElicitingInFlight | RTT:31/11 9.520 loss detection timeout handler running Sending probe 0, because no ack since 9.403. Current RTT: 31/11. reschedule loss detection timer for PTO over -16 millis, based on 9.503/App, because ackElicitingInFlight | RTT:31/11 9.520 Discarding pn space Handshake because HandshakeDone is received 9.520 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 199 millis, based on 9.720/App, because ackElicitingInFlight | RTT:31/11 9.520 -> Packet PA|2|S0|ef907768731f3ccb|47|1 StreamFrame[0(CIB),0,17,fin] 9.539 -> Packet A|3|S0|ef907768731f3ccb|32|1 AckFrame[12-11|Δ19] 9.606 <- (6) Packet A|14|S0|56c04344c54f3192|33|1 AckFrame[2-1|Δ55] 9.607 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 9.607 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 123 millis, based on 9.731/App, because ackElicitingInFlight | RTT:35/16 9.607 <- (7) Packet A|15|S0|56c04344c54f3192|1055|1 StreamFrame[0(CIB),0,1024,fin] 9.607 -> Packet A|4|S0|ef907768731f3ccb|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[12|Δ0] 9.608 Finished downloading https://server4:443/yelujmeums at 21:27.005 on ClientConnection[4af074841192793f/56c04344c54f3192(V1) with server4/193.167.100.100:443] 9.608 Closing ClientConnection[4af074841192793f/56c04344c54f3192(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.608 -> Packet A|5|S0|ef907768731f3ccb|37|2 ConnectionCloseFrame[0|0|] AckFrame[15-14,12|Δ0] 9.608 Creating connection with server4:443 with v1 9.609 Setting up connection for downloading https://server4:443/yrvborxzvv at 21:27.006 on ClientConnection[e6b0aad19893981c/c6422cda12efc8d9(V1) with server4/193.167.100.100:443] 9.609 Original destination connection id: e6b0aad19893981c (scid: c6422cda12efc8d9) >- CryptoStream[I|ClientHello] 9.611 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.811/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.610 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.810 loss detection timeout handler running Sending probe 0, because no ack since 9.610. Current RTT: 100/25. 9.810 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.810 (Probe is an initial retransmit) 9.810 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.210/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.810 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.842 <- (1) Packet I|2|L|48|1 Token=[] AckFrame[1-0|Δ0] 9.843 probe count not reset on ack because handshake not yet confirmed 9.843 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.243/Initial, because peerAwaitingAddressValidation | RTT:100/25 10.242 loss detection timeout handler running Sending probe 1, because no ack since 9.810. Current RTT: 31/15. 10.242 Sending probe because peer awaiting address validation 10.242 (Probe is Initial ping, because there is no Initial data to retransmit) 10.243 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 363 millis, based on 10.607/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 10.242 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 10.245 <- (2) Packet I|5|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 10.245 <- (2) Packet H|6|L|1077|2 CryptoFrame[0,711] Padding(320) 10.248 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 10.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 10.248 -> Packet I|3|L|1201|2 Token=[] AckFrame[5,2|Δ0] Padding(1151) 10.248 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 10.248 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 10.248 - unsupported transport parameter 0x7158, size 1 (timestamp) 10.248 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 10.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 363 millis, based on 10.615/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 10.251 -> Packet H|0|L|80|1 CryptoFrame[0,36] 10.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.251 Starting downloading https://server4:443/yrvborxzvv at 21:27.648 on ClientConnection[e6b0aad19893981c/c6422cda12efc8d9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 90 millis, based on 10.342/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 10.251 Discarding pn space Initial because first Handshake message is being sent 10.251 -> Packet H|1|L|46|1 AckFrame[6|Δ0] 10.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 10.342/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 10.251 -> Packet A|0|S0|40ccd0178fcc2628|47|1 StreamFrame[0(CIB),0,17,fin] 10.342 loss detection timeout handler running Sending probe 0, because no ack since 10.251. Current RTT: 31/15. 10.342 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.342 (Probe is a handshake retransmit) 10.342 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 10.524/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 10.342 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.374 <- (3) Packet A|8|S0|c6422cda12efc8d9|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.374 State is set to Confirmed reschedule loss detection timer for PTO over 108 millis, based on 10.483/App, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over -7 millis, based on 10.367/App, because ackElicitingInFlight | RTT:31/15 10.375 Discarding pn space Handshake because HandshakeDone is received 10.375 loss detection timeout handler running Sending probe 0, because no ack since 10.251. Current RTT: 31/15. 10.375 (Probe is retransmit on level App) 10.375 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) reschedule loss detection timer for PTO over 231 millis, based on 10.607/App, because ackElicitingInFlight | RTT:31/15 10.375 -> Packet PA|1|S0|40ccd0178fcc2628|47|1 StreamFrame[0(CIB),0,17,fin] 10.394 -> Packet A|2|S0|40ccd0178fcc2628|32|1 AckFrame[8|Δ19] 10.407 <- (5) Packet A|11|S0|c6422cda12efc8d9|1059|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 10.407 Cwnd(-): 6000; inflight: 0 10.407 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 10.407 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 99 millis, based on 10.507/App, because ackElicitingInFlight | RTT:31/11 10.407 -> Packet A|3|S0|40ccd0178fcc2628|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8|Δ0] 10.408 Finished downloading https://server4:443/yrvborxzvv at 21:27.805 on ClientConnection[e6b0aad19893981c/c6422cda12efc8d9(V1) with server4/193.167.100.100:443] 10.408 Closing ClientConnection[e6b0aad19893981c/c6422cda12efc8d9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.408 -> Packet A|4|S0|40ccd0178fcc2628|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,8|Δ0] 10.408 Creating connection with server4:443 with v1 10.409 Setting up connection for downloading https://server4:443/msneaqbddx at 21:27.806 on ClientConnection[3d726c8696145faa/0cba32037c9c8e1f(V1) with server4/193.167.100.100:443] 10.409 Original destination connection id: 3d726c8696145faa (scid: 0cba32037c9c8e1f) >- CryptoStream[I|ClientHello] 10.410 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.610/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.410 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.439 <- (6) Packet A|12|S0|c6422cda12efc8d9|98|2 NewConnectionIdFrame[1,<0|793ae39eb7b5efc3|953713e53c8bf79f9ef0ca381a7a3fd9] NewTokenFrame[0169e5ed5ad3deb2784c3f60c9ba8d19ac986dbb8838fec5039d812a1189e11d23f311522565fe3248eb] 10.439 <- (7) Packet A|13|S0|c6422cda12efc8d9|30|1 ConnectionCloseFrame[0|0|] 10.439 -> Packet A|5|S0|40ccd0178fcc2628|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,8|Δ0] 10.444 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 10.444 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.644/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.447 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.544/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.447 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 10.444 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) 10.448 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 10.448 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 10.448 - unsupported transport parameter 0x7158, size 1 (timestamp) 10.448 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 10.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.548/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.450 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.451 Starting downloading https://server4:443/msneaqbddx at 21:27.848 on ClientConnection[3d726c8696145faa/0cba32037c9c8e1f(V1) with server4/193.167.100.100:443] 10.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.548/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.451 Discarding pn space Initial because first Handshake message is being sent 10.451 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 10.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.548/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.451 -> Packet A|0|S0|5524f61bd8fdccde|47|1 StreamFrame[0(CIB),0,17,fin] 10.479 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.548 loss detection timeout handler running Sending probe 0, because no ack since 10.450. Current RTT: 33/16. 10.548 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.548 (Probe is a handshake retransmit) 10.548 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.742/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.548 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.741 loss detection timeout handler running Sending probe 1, because no ack since 10.451. Current RTT: 33/16. 10.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.741 (Probe is a handshake retransmit) 10.742 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 11.130/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.741 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 10.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 11.131/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.742 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 10.774 <- (3) Packet H|5|L|49|1 AckFrame[4,1|Δ0] 10.775 probe count not reset on ack because handshake not yet confirmed 10.775 Retransmitting CryptoFrame[0,36] on level Handshake 10.775 Cwnd(-): 6000; inflight: 127 10.775 -> Packet H|5|L|80|1 CryptoFrame[0,36] 10.774 <- (3) Packet A|6|S0|0cba32037c9c8e1f|98|2 NewConnectionIdFrame[1,<0|e9eaa781faa569ab|b8dc670c110c6d91d52d64314d92d64e] NewTokenFrame[0169c391326d763a593875c3c9ff97649810c54fafa37257e49edd926f943ea9578f0ffc3be7472a54bc] 10.778 loss detection timeout handler running 10.778 loss detection timeout handler running 10.778 loss detection timeout handler running 10.778 loss detection timeout handler running 10.779 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 336 millis, based on 11.115/Handshake, because ackElicitingInFlight | RTT:33/13 10.795 -> Packet A|1|S0|5524f61bd8fdccde|32|1 AckFrame[6|Δ19] 10.806 <- (4) Packet H|7|L|49|1 AckFrame[5-4,1|Δ0] 10.806 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 10.806 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 10.826 <- (5) Packet A|8|S0|0cba32037c9c8e1f|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.827 State is set to Confirmed reschedule loss detection timer for PTO over -273 millis, based on 10.553/App, because ackElicitingInFlight | RTT:33/11 10.827 loss detection timeout handler running Sending probe 0, because no ack since 10.451. Current RTT: 33/11. reschedule loss detection timer for PTO over -273 millis, based on 10.553/App, because ackElicitingInFlight | RTT:33/11 10.827 Discarding pn space Handshake because HandshakeDone is received 10.827 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 203 millis, based on 11.031/App, because ackElicitingInFlight | RTT:33/11 10.827 -> Packet PA|2|S0|5524f61bd8fdccde|47|1 StreamFrame[0(CIB),0,17,fin] 10.846 -> Packet A|3|S0|5524f61bd8fdccde|34|1 AckFrame[8,6|Δ19] 11.030 loss detection timeout handler running Sending probe 1, because no ack since 10.827. Current RTT: 33/11. 11.030 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 407 millis, based on 11.439/App, because ackElicitingInFlight | RTT:33/11 11.031 -> Packet PA|4|S0|5524f61bd8fdccde|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 407 millis, based on 11.440/App, because ackElicitingInFlight | RTT:33/11 11.032 -> Packet PA|5|S0|5524f61bd8fdccde|47|1 StreamFrame[0(CIB),0,17,fin] 11.063 <- (6) Packet A|9|S0|0cba32037c9c8e1f|1064|2 AckFrame[5,3,1|Δ0] StreamFrame[0(CIB),0,1024,fin] 11.064 Cwnd(-): 3000; inflight: 47 11.064 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 11.064 -> Packet A|6|S0|5524f61bd8fdccde|47|1 StreamFrame[0(CIB),0,17,fin] 11.065 Finished downloading https://server4:443/msneaqbddx at 21:28.462 on ClientConnection[3d726c8696145faa/0cba32037c9c8e1f(V1) with server4/193.167.100.100:443] 11.065 Closing ClientConnection[3d726c8696145faa/0cba32037c9c8e1f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.065 -> Packet A|7|S0|5524f61bd8fdccde|35|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 11.065 Creating connection with server4:443 with v1 11.066 Setting up connection for downloading https://server4:443/jyqdiibfgg at 21:28.463 on ClientConnection[bfcd425039463a39/b3555ef58bf5884e(V1) with server4/193.167.100.100:443] 11.066 Original destination connection id: bfcd425039463a39 (scid: b3555ef58bf5884e) >- CryptoStream[I|ClientHello] 11.067 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.267/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.067 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.142 <- (7) Packet A|11|S0|0cba32037c9c8e1f|37|1 AckFrame[6-5,3,1|Δ46] 11.142 -> Packet A|8|S0|5524f61bd8fdccde|35|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 11.143 <- (8) Packet A|12|S0|0cba32037c9c8e1f|1055|1 StreamFrame[0(CIB),0,1024,fin] 11.143 -> Packet A|9|S0|5524f61bd8fdccde|35|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 11.266 loss detection timeout handler running Sending probe 0, because no ack since 11.067. Current RTT: 100/25. 11.267 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.267 (Probe is an initial retransmit) 11.267 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.667/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.267 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.401 <- (1) Packet I|3|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 11.404 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.401 <- (1) Packet H|4|L|1077|2 CryptoFrame[0,711] Padding(320) reschedule loss detection timer for PTO over 399 millis, based on 11.804/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.404 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 11.404 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) 11.404 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 11.404 - unsupported transport parameter 0x7158, size 1 (timestamp) 11.404 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 11.407 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 399 millis, based on 11.807/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.406 -> Packet H|0|L|80|1 CryptoFrame[0,36] 11.407 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.607/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.407 Discarding pn space Initial because first Handshake message is being sent 11.407 Starting downloading https://server4:443/jyqdiibfgg at 21:28.804 on ClientConnection[bfcd425039463a39/b3555ef58bf5884e(V1) with server4/193.167.100.100:443] 11.407 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 11.407 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.607/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.407 -> Packet A|0|S0|8ff18e5a9020bce9|47|1 StreamFrame[0(CIB),0,17,fin] 11.438 <- (2) Packet A|6|S0|b3555ef58bf5884e|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 11.439 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 11.606/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 11.632/App, because ackElicitingInFlight | RTT:100/25 11.439 Discarding pn space Handshake because HandshakeDone is received 11.439 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 11.458 -> Packet A|1|S0|8ff18e5a9020bce9|32|1 AckFrame[6|Δ19] 11.473 Discarding packet (1077 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 11.509 <- (5) Packet A|10|S0|b3555ef58bf5884e|98|2 NewConnectionIdFrame[1,<0|a94b0c3f88a2210b|22755b43d25e5a171b1ea3eaafa25758] NewTokenFrame[01d7a079679e67655524e54361c58200672f0740ea7be1a605c48f426d7bb9acfb8485c38e281d69559a] 11.529 -> Packet A|2|S0|8ff18e5a9020bce9|34|1 AckFrame[10,6|Δ19] 11.545 Discarding packet (1125 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 11.632 loss detection timeout handler running Sending probe 0, because no ack since 11.407. Current RTT: 100/25. 11.632 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 12.082/App, because ackElicitingInFlight | RTT:100/25 11.632 -> Packet PA|3|S0|8ff18e5a9020bce9|47|1 StreamFrame[0(CIB),0,17,fin] 11.664 <- (7) Packet A|13|S0|b3555ef58bf5884e|1060|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] 11.665 Cwnd(-): 6000; inflight: 0 11.665 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 11.665 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 11.781/App, because ackElicitingInFlight | RTT:31/15 11.665 -> Packet A|4|S0|8ff18e5a9020bce9|47|1 StreamFrame[0(CIB),0,17,fin] 11.665 Finished downloading https://server4:443/jyqdiibfgg at 21:29.062 on ClientConnection[bfcd425039463a39/b3555ef58bf5884e(V1) with server4/193.167.100.100:443] 11.665 Closing ClientConnection[bfcd425039463a39/b3555ef58bf5884e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.666 -> Packet A|5|S0|8ff18e5a9020bce9|35|2 ConnectionCloseFrame[0|0|] AckFrame[13|Δ0] 11.666 Creating connection with server4:443 with v1 11.667 Setting up connection for downloading https://server4:443/hnihxcsqmm at 21:29.064 on ClientConnection[3e83a4d7f1593422/f66ec541daf27faa(V1) with server4/193.167.100.100:443] 11.667 Original destination connection id: 3e83a4d7f1593422 (scid: f66ec541daf27faa) >- CryptoStream[I|ClientHello] 11.668 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.868/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.668 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.867 loss detection timeout handler running Sending probe 0, because no ack since 11.668. Current RTT: 100/25. 11.867 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.868 (Probe is an initial retransmit) 11.868 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.268/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.868 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.901 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 11.902 probe count not reset on ack because handshake not yet confirmed 11.902 Retransmitting CryptoFrame[0,257] on level Initial 11.902 Cwnd(-): 6000; inflight: 0 11.902 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.302/Initial, because peerAwaitingAddressValidation | RTT:100/25 11.902 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 12.096/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.902 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 11.904 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 12.098/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.901 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 11.904 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 11.905 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 11.905 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 11.905 - unsupported transport parameter 0x7158, size 1 (timestamp) 11.905 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 11.908 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 12.102/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.907 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.908 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.908 Starting downloading https://server4:443/hnihxcsqmm at 21:29.305 on ClientConnection[3e83a4d7f1593422/f66ec541daf27faa(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 12.005/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.908 Discarding pn space Initial because first Handshake message is being sent 11.908 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 11.908 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.005/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.908 -> Packet A|0|S0|a8faf56250169f7a|47|1 StreamFrame[0(CIB),0,17,fin] 11.934 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 11.936 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 12.005 loss detection timeout handler running Sending probe 0, because no ack since 11.907. Current RTT: 33/16. 12.005 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.005 (Probe is a handshake retransmit) 12.005 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 12.199/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.005 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 12.037 <- (4) Packet A|5|S0|f66ec541daf27faa|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.037 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 12.152/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 12.030/App, because ackElicitingInFlight | RTT:33/16 12.037 loss detection timeout handler running Sending probe 0, because no ack since 11.908. Current RTT: 33/16. 12.038 Discarding pn space Handshake because HandshakeDone is received 12.038 (Probe is retransmit on level App) 12.038 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) reschedule loss detection timer for PTO over 243 millis, based on 12.282/App, because ackElicitingInFlight | RTT:33/16 12.038 -> Packet PA|1|S0|a8faf56250169f7a|47|1 StreamFrame[0(CIB),0,17,fin] 12.057 -> Packet A|2|S0|a8faf56250169f7a|32|1 AckFrame[5|Δ19] 12.116 <- (6) Packet A|9|S0|f66ec541daf27faa|33|1 AckFrame[2-1|Δ28] 12.117 Cwnd(-): 3000; inflight: 0 12.117 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.117 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 12.239/App, because ackElicitingInFlight | RTT:33/16 12.117 -> Packet A|3|S0|a8faf56250169f7a|47|1 StreamFrame[0(CIB),0,17,fin] 12.238 loss detection timeout handler running Sending probe 0, because no ack since 12.117. Current RTT: 33/16. 12.239 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 12.483/App, because ackElicitingInFlight | RTT:33/16 12.239 -> Packet PA|4|S0|a8faf56250169f7a|47|1 StreamFrame[0(CIB),0,17,fin] 12.395 <- (7) Packet A|12|S0|f66ec541daf27faa|35|1 AckFrame[2-1|Δ307] reschedule loss detection timer for PTO over -35 millis, based on 12.361/App, because ackElicitingInFlight | RTT:33/16 12.396 loss detection timeout handler running Sending probe 0, because no ack since 12.239. Current RTT: 33/16. 12.396 (Probe is retransmit on level App) 12.395 <- (8) Packet A|13|S0|f66ec541daf27faa|98|2 NewConnectionIdFrame[1,<0|924f30a773658d59|f1392399fb3f8be90047e717d8bd8453] NewTokenFrame[01e8c91072165869e6c9d03be347d27614255edc3c07a0aba8a294c431869691b4c5f0b080c9023f72a5] 12.396 <- (9) Packet A|14|S0|f66ec541daf27faa|1054|1 StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 243 millis, based on 12.640/App, because ackElicitingInFlight | RTT:33/16 12.396 -> Packet PA|5|S0|a8faf56250169f7a|47|1 StreamFrame[0(CIB),0,17,fin] 12.397 -> Packet A|6|S0|a8faf56250169f7a|33|1 AckFrame[14-12,9|Δ0] 12.397 Finished downloading https://server4:443/hnihxcsqmm at 21:29.794 on ClientConnection[3e83a4d7f1593422/f66ec541daf27faa(V1) with server4/193.167.100.100:443] 12.397 Closing ClientConnection[3e83a4d7f1593422/f66ec541daf27faa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.398 -> Packet A|7|S0|a8faf56250169f7a|37|2 ConnectionCloseFrame[0|0|] AckFrame[14-12,9|Δ0] 12.398 Creating connection with server4:443 with v1 12.398 Setting up connection for downloading https://server4:443/wwncthdskf at 21:29.795 on ClientConnection[df995ccac0af5d09/0f92258726e1eadb(V1) with server4/193.167.100.100:443] 12.398 Original destination connection id: df995ccac0af5d09 (scid: 0f92258726e1eadb) >- CryptoStream[I|ClientHello] 12.400 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.600/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.399 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.433 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.433 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.633/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.433 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 12.436 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.533/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.435 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 12.436 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 12.436 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 12.436 - unsupported transport parameter 0x7158, size 1 (timestamp) 12.436 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 12.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.535/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.438 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.439 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.439 Starting downloading https://server4:443/wwncthdskf at 21:29.836 on ClientConnection[df995ccac0af5d09/0f92258726e1eadb(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 12.536/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.439 Discarding pn space Initial because first Handshake message is being sent 12.439 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 12.440 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.537/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.439 -> Packet A|0|S0|ea8f7e70b9337df2|47|1 StreamFrame[0(CIB),0,17,fin] 12.486 <- (2) Packet H|3|L|1076|2 CryptoFrame[0,711] Padding(319) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.487 -> Packet H|2|L|48|1 AckFrame[3,1|Δ0] 12.536 loss detection timeout handler running Sending probe 0, because no ack since 12.438. Current RTT: 33/16. 12.536 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.536 (Probe is a handshake retransmit) 12.536 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 12.730/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.536 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 12.568 <- (3) Packet A|5|S0|0f92258726e1eadb|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.568 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 12.683/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 12.561/App, because ackElicitingInFlight | RTT:33/16 12.568 Discarding pn space Handshake because HandshakeDone is received 12.568 loss detection timeout handler running Sending probe 0, because no ack since 12.439. Current RTT: 33/16. 12.569 (Probe is retransmit on level App) 12.569 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) reschedule loss detection timer for PTO over 243 millis, based on 12.813/App, because ackElicitingInFlight | RTT:33/16 12.569 -> Packet PA|1|S0|ea8f7e70b9337df2|47|1 StreamFrame[0(CIB),0,17,fin] 12.588 -> Packet A|2|S0|ea8f7e70b9337df2|32|1 AckFrame[5|Δ19] 12.600 <- (5) Packet A|8|S0|0f92258726e1eadb|1059|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 12.601 Cwnd(-): 6000; inflight: 0 12.601 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.601 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 12.711/App, because ackElicitingInFlight | RTT:33/13 12.601 -> Packet A|3|S0|ea8f7e70b9337df2|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 12.601 Finished downloading https://server4:443/wwncthdskf at 21:29.998 on ClientConnection[df995ccac0af5d09/0f92258726e1eadb(V1) with server4/193.167.100.100:443] 12.601 Closing ClientConnection[df995ccac0af5d09/0f92258726e1eadb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.602 -> Packet A|4|S0|ea8f7e70b9337df2|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,5|Δ0] 12.602 Creating connection with server4:443 with v1 12.602 Setting up connection for downloading https://server4:443/tdumwmrfrv at 21:30.000 on ClientConnection[f0c2d76f6b01dc2d/a19b30c311cd6285(V1) with server4/193.167.100.100:443] 12.603 Original destination connection id: f0c2d76f6b01dc2d (scid: a19b30c311cd6285) >- CryptoStream[I|ClientHello] 12.604 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.804/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.604 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.637 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.637 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.838/Initial, because peerAwaitingAddressValidation | RTT:100/25 12.638 <- (6) Packet A|10|S0|0f92258726e1eadb|1054|1 StreamFrame[0(CIB),0,1024,fin] 12.638 -> Packet A|5|S0|ea8f7e70b9337df2|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,5|Δ0] -< CryptoStream[I|ServerHello] 12.637 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,712] Padding(318) 12.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.737/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.640 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 12.640 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 12.640 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 12.640 - unsupported transport parameter 0x7158, size 1 (timestamp) 12.640 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 12.642 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.739/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.642 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.642 Starting downloading https://server4:443/tdumwmrfrv at 21:30.040 on ClientConnection[f0c2d76f6b01dc2d/a19b30c311cd6285(V1) with server4/193.167.100.100:443] 12.643 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.643 Discarding pn space Initial because first Handshake message is being sent 12.643 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 12.643 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.643 -> Packet A|0|S0|d974aa2fd0d7d362|47|1 StreamFrame[0(CIB),0,17,fin] 12.669 <- (7) Packet A|11|S0|0f92258726e1eadb|98|2 NewConnectionIdFrame[1,<0|867ed093eca1a369|e13a69ee3f4f78a95b5168c88a851c20] NewTokenFrame[01d68ea0da49fd9547ff1b2350a52c6681657a6644864f67cadee3f60b6972e4966f9c6647053d93d8c8] 12.669 <- (8) Packet A|12|S0|0f92258726e1eadb|30|1 ConnectionCloseFrame[0|0|] 12.670 -> Packet A|6|S0|ea8f7e70b9337df2|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,5|Δ0] 12.674 <- (2) Packet A|2|S0|a19b30c311cd6285|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.674 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 12.739/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 12.765/App, because ackElicitingInFlight | RTT:33/16 12.674 Discarding pn space Handshake because HandshakeDone is received 12.675 <- (3) Packet A|5|S0|a19b30c311cd6285|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 12.675 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.675 Finished downloading https://server4:443/tdumwmrfrv at 21:30.072 on ClientConnection[f0c2d76f6b01dc2d/a19b30c311cd6285(V1) with server4/193.167.100.100:443] 12.675 -> Packet A|1|S0|d974aa2fd0d7d362|33|1 AckFrame[5,2|Δ0] 12.675 Closing ClientConnection[f0c2d76f6b01dc2d/a19b30c311cd6285(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.676 -> Packet A|2|S0|d974aa2fd0d7d362|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 12.676 Creating connection with server4:443 with v1 12.676 Setting up connection for downloading https://server4:443/fnwmfgkzpr at 21:30.073 on ClientConnection[ce6b8ff46471d37e/069ffa7173f7578b(V1) with server4/193.167.100.100:443] 12.676 Original destination connection id: ce6b8ff46471d37e (scid: 069ffa7173f7578b) >- CryptoStream[I|ClientHello] 12.678 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.878/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.677 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.706 <- (4) Packet A|6|S0|a19b30c311cd6285|98|2 NewConnectionIdFrame[1,<0|94ec959de8199ab0|d8b549f99328b6377d258db140d9b36b] NewTokenFrame[01d63c5bf5239fcd21e082f1da0e187276430310809eaadb27d2571c3117903ad68aefb158d7e42156ab] 12.707 -> Packet A|3|S0|d974aa2fd0d7d362|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 12.711 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.711 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.911/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.711 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 12.713 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.810/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.713 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 12.713 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 12.713 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 12.713 - unsupported transport parameter 0x7158, size 1 (timestamp) 12.713 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 12.715 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.812/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.715 -> Packet H|0|L|80|1 CryptoFrame[0,36] 12.715 Starting downloading https://server4:443/fnwmfgkzpr at 21:30.113 on ClientConnection[ce6b8ff46471d37e/069ffa7173f7578b(V1) with server4/193.167.100.100:443] 12.716 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.813/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.716 Discarding pn space Initial because first Handshake message is being sent 12.716 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 12.716 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.813/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.716 -> Packet A|0|S0|2b0d109e5aabe9b3|47|1 StreamFrame[0(CIB),0,17,fin] 12.747 <- (2) Packet A|2|S0|069ffa7173f7578b|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.747 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 12.812/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 12.838/App, because ackElicitingInFlight | RTT:33/16 12.748 Discarding pn space Handshake because HandshakeDone is received 12.748 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 12.748 <- (4) Packet A|5|S0|069ffa7173f7578b|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 12.748 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.748 -> Packet A|1|S0|2b0d109e5aabe9b3|33|1 AckFrame[5,2|Δ0] 12.749 Finished downloading https://server4:443/fnwmfgkzpr at 21:30.146 on ClientConnection[ce6b8ff46471d37e/069ffa7173f7578b(V1) with server4/193.167.100.100:443] 12.749 Closing ClientConnection[ce6b8ff46471d37e/069ffa7173f7578b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.749 -> Packet A|2|S0|2b0d109e5aabe9b3|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 12.749 Creating connection with server4:443 with v1 12.750 Setting up connection for downloading https://server4:443/vuvfizwxlj at 21:30.147 on ClientConnection[339c5397a875fa1a/c7378d447e04b9a1(V1) with server4/193.167.100.100:443] 12.750 Original destination connection id: 339c5397a875fa1a (scid: c7378d447e04b9a1) >- CryptoStream[I|ClientHello] 12.751 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.951/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.751 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.950 loss detection timeout handler running Sending probe 0, because no ack since 12.751. Current RTT: 100/25. 12.950 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.950 (Probe is an initial retransmit) 12.951 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.351/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.951 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.350 loss detection timeout handler running Sending probe 1, because no ack since 12.951. Current RTT: 100/25. 13.350 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.350 (Probe is an initial retransmit) 13.351 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.151/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.350 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.352 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.152/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.351 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.382 <- (1) Packet I|4|L|51|2 Token=[] AckFrame[2,0|Δ0] PingFrame[] 13.383 probe count not reset on ack because handshake not yet confirmed 13.383 Cwnd(-): 6000; inflight: 1200 13.383 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.183/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.383 <- (2) Packet I|5|L|51|2 Token=[] AckFrame[3-2,0|Δ0] PingFrame[] 13.383 probe count not reset on ack because handshake not yet confirmed 13.384 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.384 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 363 millis, based on 13.748/Initial, because peerAwaitingAddressValidation | RTT:31/15 reschedule loss detection timer for PTO over 363 millis, based on 13.748/Initial, because peerAwaitingAddressValidation | RTT:31/15 13.383 -> Packet I|4|L|1201|2 Token=[] AckFrame[4|Δ0] Padding(1153) 13.384 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 299 millis, based on 13.684/Initial, because peerAwaitingAddressValidation | RTT:31/11 13.384 -> Packet I|5|L|1201|2 Token=[] AckFrame[5-4|Δ0] Padding(1153) 13.385 <- (3) Packet I|6|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 13.388 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.385 <- (3) Packet H|7|L|1077|2 CryptoFrame[0,711] Padding(320) reschedule loss detection timer for PTO over 299 millis, based on 13.688/Handshake, because peerAwaitingAddressValidation | RTT:31/11 13.388 -> Packet I|6|L|1201|2 Token=[] AckFrame[6-4|Δ0] Padding(1153) 13.388 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 13.388 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 13.388 - unsupported transport parameter 0x7158, size 1 (timestamp) 13.388 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 13.390 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 299 millis, based on 13.690/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/11 13.390 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.390 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.390 Starting downloading https://server4:443/vuvfizwxlj at 21:30.787 on ClientConnection[339c5397a875fa1a/c7378d447e04b9a1(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 74 millis, based on 13.465/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/11 13.390 Discarding pn space Initial because first Handshake message is being sent 13.391 -> Packet H|1|L|46|1 AckFrame[7|Δ0] 13.391 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 74 millis, based on 13.466/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/11 13.391 -> Packet A|0|S0|eb3585558c34a1b5|47|1 StreamFrame[0(CIB),0,17,fin] 13.415 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.438 <- (5) Packet H|11|L|1077|2 CryptoFrame[0,711] Padding(320) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.439 -> Packet H|2|L|48|1 AckFrame[11,7|Δ0] 13.465 loss detection timeout handler running Sending probe 0, because no ack since 13.390. Current RTT: 31/11. 13.465 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.465 (Probe is a handshake retransmit) 13.465 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 149 millis, based on 13.615/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/11 13.465 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 13.492 <- (6) Packet H|12|L|1077|2 CryptoFrame[0,711] Padding(320) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.492 -> Packet H|4|L|48|1 AckFrame[12-11,7|Δ0] 13.523 <- (7) Packet H|13|L|47|1 AckFrame[4|Δ0] 13.523 probe count not reset on ack because handshake not yet confirmed 13.523 Retransmitting CryptoFrame[0,36] on level Handshake 13.523 Cwnd(-): 3000; inflight: 47 13.523 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 13.523 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 13.523 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 149 millis, based on 13.673/Handshake, because ackElicitingInFlight | RTT:31/11 13.523 -> Packet H|5|L|80|1 CryptoFrame[0,36] 13.555 <- (8) Packet A|14|S0|c7378d447e04b9a1|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.556 State is set to Confirmed reschedule loss detection timer for PTO over 35 millis, based on 13.591/App, because ackElicitingInFlight | RTT:31/11 reschedule loss detection timer for PTO over -64 millis, based on 13.491/App, because ackElicitingInFlight | RTT:31/11 13.556 Discarding pn space Handshake because HandshakeDone is received 13.556 loss detection timeout handler running Sending probe 0, because no ack since 13.391. Current RTT: 31/11. 13.556 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 13.556 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 199 millis, based on 13.756/App, because ackElicitingInFlight | RTT:31/11 13.556 -> Packet PA|1|S0|eb3585558c34a1b5|47|1 StreamFrame[0(CIB),0,17,fin] 13.575 -> Packet A|2|S0|eb3585558c34a1b5|32|1 AckFrame[14|Δ19] 13.693 <- (10) Packet A|18|S0|c7378d447e04b9a1|98|2 NewConnectionIdFrame[1,<0|b0804944b0736f6b|8275320941201a9bc3aa2ef774200a75] NewTokenFrame[01cd6466a12d6ac0b211b90265fb1bd10dbf10c9e6dbccdd728a6dcb8332b986e016efeedb8a55bafb50] 13.713 -> Packet A|3|S0|eb3585558c34a1b5|34|1 AckFrame[18,14|Δ19] 13.755 loss detection timeout handler running Sending probe 1, because no ack since 13.556. Current RTT: 31/11. 13.755 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 399 millis, based on 14.155/App, because ackElicitingInFlight | RTT:31/11 13.755 -> Packet PA|4|S0|eb3585558c34a1b5|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 399 millis, based on 14.157/App, because ackElicitingInFlight | RTT:31/11 13.757 -> Packet PA|5|S0|eb3585558c34a1b5|47|1 StreamFrame[0(CIB),0,17,fin] 13.788 <- (11) Packet A|19|S0|c7378d447e04b9a1|1062|2 AckFrame[5,3|Δ0] StreamFrame[0(CIB),0,1024,fin] 13.789 Cwnd(-): 2400; inflight: 47 13.789 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.789 loss detection timeout handler running 13.789 loss detection timeout handler running 13.789 loss detection timeout handler running 13.789 loss detection timeout handler running 13.789 -> Packet A|6|S0|eb3585558c34a1b5|47|1 StreamFrame[0(CIB),0,17,fin] 13.789 loss detection timeout handler running 13.789 loss detection timeout handler running 13.789 loss detection timeout handler running 13.789 Finished downloading https://server4:443/vuvfizwxlj at 21:31.186 on ClientConnection[339c5397a875fa1a/c7378d447e04b9a1(V1) with server4/193.167.100.100:443] 13.789 loss detection timeout handler running 13.789 Closing ClientConnection[339c5397a875fa1a/c7378d447e04b9a1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.790 -> Packet A|7|S0|eb3585558c34a1b5|35|2 ConnectionCloseFrame[0|0|] AckFrame[19|Δ0] 13.790 Creating connection with server4:443 with v1 13.791 Setting up connection for downloading https://server4:443/mdynuttqct at 21:31.188 on ClientConnection[e525213df41ad8de/dcb188f4acfa2703(V1) with server4/193.167.100.100:443] 13.791 Original destination connection id: e525213df41ad8de (scid: dcb188f4acfa2703) >- CryptoStream[I|ClientHello] 13.792 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.992/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.792 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.991 loss detection timeout handler running Sending probe 0, because no ack since 13.792. Current RTT: 100/25. 13.991 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.991 (Probe is an initial retransmit) 13.992 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.392/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.991 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.025 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 14.025 probe count not reset on ack because handshake not yet confirmed 14.026 Retransmitting CryptoFrame[0,257] on level Initial 14.026 Cwnd(-): 6000; inflight: 0 14.026 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.426/Initial, because peerAwaitingAddressValidation | RTT:100/25 14.026 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 14.220/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.026 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 14.029 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.025 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) reschedule loss detection timer for PTO over 193 millis, based on 14.223/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.029 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 14.029 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 14.029 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 14.029 - unsupported transport parameter 0x7158, size 1 (timestamp) 14.029 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 14.031 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.226/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.031 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.032 Starting downloading https://server4:443/mdynuttqct at 21:31.429 on ClientConnection[e525213df41ad8de/dcb188f4acfa2703(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 14.129/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.032 Discarding pn space Initial because first Handshake message is being sent 14.032 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 14.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.129/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.032 -> Packet A|0|S0|513d4f2d9f51c076|47|1 StreamFrame[0(CIB),0,17,fin] 14.063 <- (2) Packet H|5|L|47|1 AckFrame[0|Δ0] 14.064 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 14.064 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 14.063 <- (2) Packet A|6|S0|dcb188f4acfa2703|98|2 NewConnectionIdFrame[1,<0|facea28f3a2bc082|8cdfa082fdd0284f5d28b504c7636948] NewTokenFrame[01326a6f8e3f644145f2b8456c7c69e05688a7147d08a90400689255c53579ecdfa73827d85d17b5012b] 14.064 <- (3) Packet A|7|S0|dcb188f4acfa2703|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 14.064 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.064 -> Packet A|1|S0|513d4f2d9f51c076|31|1 AckFrame[7-6|Δ0] 14.065 Finished downloading https://server4:443/mdynuttqct at 21:31.462 on ClientConnection[e525213df41ad8de/dcb188f4acfa2703(V1) with server4/193.167.100.100:443] 14.065 Closing ClientConnection[e525213df41ad8de/dcb188f4acfa2703(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.065 -> Packet A|2|S0|513d4f2d9f51c076|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 14.065 Creating connection with server4:443 with v1 14.066 Setting up connection for downloading https://server4:443/moqygeznaz at 21:31.463 on ClientConnection[aebbfe65d803fba2/bce8c1d20c9aefb4(V1) with server4/193.167.100.100:443] 14.066 Original destination connection id: aebbfe65d803fba2 (scid: bce8c1d20c9aefb4) >- CryptoStream[I|ClientHello] 14.067 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.267/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.067 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.096 <- (4) Packet A|8|S0|dcb188f4acfa2703|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] 14.096 -> Packet A|3|S0|513d4f2d9f51c076|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 14.100 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.100 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.300/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.100 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) 14.103 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.200/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.103 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 14.103 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 14.103 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 14.103 - unsupported transport parameter 0x7158, size 1 (timestamp) 14.103 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 14.105 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.202/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.105 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.106 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.106 Starting downloading https://server4:443/moqygeznaz at 21:31.503 on ClientConnection[aebbfe65d803fba2/bce8c1d20c9aefb4(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 14.203/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.106 Discarding pn space Initial because first Handshake message is being sent 14.106 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 14.106 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.203/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.106 -> Packet A|0|S0|0aca013a7de1fb65|47|1 StreamFrame[0(CIB),0,17,fin] 14.135 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 14.137 <- (3) Packet A|3|S0|bce8c1d20c9aefb4|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.137 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 14.202/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 14.228/App, because ackElicitingInFlight | RTT:33/16 14.137 Discarding pn space Handshake because HandshakeDone is received 14.137 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 14.138 <- (5) Packet A|6|S0|bce8c1d20c9aefb4|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 14.138 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.139 -> Packet A|1|S0|0aca013a7de1fb65|34|1 AckFrame[6,3|Δ1] 14.139 Finished downloading https://server4:443/moqygeznaz at 21:31.536 on ClientConnection[aebbfe65d803fba2/bce8c1d20c9aefb4(V1) with server4/193.167.100.100:443] 14.139 Closing ClientConnection[aebbfe65d803fba2/bce8c1d20c9aefb4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.139 -> Packet A|2|S0|0aca013a7de1fb65|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 14.139 Creating connection with server4:443 with v1 14.140 Setting up connection for downloading https://server4:443/yzlemnhoyc at 21:31.537 on ClientConnection[96c177225cbcc25e/423cd9853b89a306(V1) with server4/193.167.100.100:443] 14.140 Original destination connection id: 96c177225cbcc25e (scid: 423cd9853b89a306) >- CryptoStream[I|ClientHello] 14.141 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.341/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.141 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.340 loss detection timeout handler running Sending probe 0, because no ack since 14.141. Current RTT: 100/25. 14.340 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.340 (Probe is an initial retransmit) 14.341 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.741/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.340 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.675 <- (1) Packet I|2|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 14.675 <- (1) Packet H|3|L|1076|2 CryptoFrame[0,711] Padding(319) 14.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.678 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) reschedule loss detection timer for PTO over 399 millis, based on 15.078/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.678 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 14.678 - unsupported transport parameter 0x7158, size 1 (timestamp) 14.678 - unsupported transport parameter 0x1057, size 1 (loss-bits) 14.677 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) >- CryptoStream[H|Finished] 14.680 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 15.080/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.680 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.680 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.680 Starting downloading https://server4:443/yzlemnhoyc at 21:32.077 on ClientConnection[96c177225cbcc25e/423cd9853b89a306(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 199 millis, based on 14.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.680 Discarding pn space Initial because first Handshake message is being sent 14.680 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 14.680 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 14.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.680 -> Packet A|0|S0|cca52e325bb3c4c5|47|1 StreamFrame[0(CIB),0,17,fin] 14.711 <- (2) Packet H|5|L|47|1 AckFrame[1|Δ0] 14.791 loss detection timeout handler running 14.791 loss detection timeout handler running 14.791 loss detection timeout handler running 14.791 loss detection timeout handler running 14.791 loss detection timeout handler running 14.792 loss detection timeout handler running 14.792 Retransmitting CryptoFrame[0,36] on level Handshake 14.792 Cwnd(-): 6000; inflight: 47 14.792 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 14.792 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 14.792 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 199 millis, based on 14.992/Handshake, because ackElicitingInFlight | RTT:100/25 14.792 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[5|Δ0] 14.975 <- (3) Packet A|10|S0|423cd9853b89a306|98|2 NewConnectionIdFrame[1,<0|e9d78b6690daff43|49622e9f60780b6083e3075ca9ccbd6d] NewTokenFrame[01377120b7a41fc7cd1ff439c972701283aad7d82184fb0e20cf2a70d6ce54b8f3260b3cf979d36cf9a3] 14.991 loss detection timeout handler running Sending probe 0, because no ack since 14.680. Current RTT: 100/25. 14.991 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 14.991 (Probe is a handshake retransmit) 14.991 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 399 millis, based on 15.391/Handshake, because ackElicitingInFlight | RTT:100/25 14.991 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 14.996 -> Packet A|1|S0|cca52e325bb3c4c5|32|1 AckFrame[10|Δ19] 15.022 <- (4) Packet H|11|L|47|1 AckFrame[3-1|Δ0] 15.023 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.023 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 15.027 <- (5) Packet A|12|S0|423cd9853b89a306|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.027 State is set to Confirmed reschedule loss detection timer for PTO over -232 millis, based on 14.795/App, because ackElicitingInFlight | RTT:30/15 15.027 loss detection timeout handler running Sending probe 0, because no ack since 14.680. Current RTT: 30/15. reschedule loss detection timer for PTO over -232 millis, based on 14.795/App, because ackElicitingInFlight | RTT:30/15 15.028 Discarding pn space Handshake because HandshakeDone is received 15.028 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 229 millis, based on 15.258/App, because ackElicitingInFlight | RTT:30/15 15.028 -> Packet PA|2|S0|cca52e325bb3c4c5|47|1 StreamFrame[0(CIB),0,17,fin] 15.047 -> Packet A|3|S0|cca52e325bb3c4c5|34|1 AckFrame[12,10|Δ19] 15.059 <- (6) Packet A|13|S0|423cd9853b89a306|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 15.060 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.060 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 102 millis, based on 15.163/App, because ackElicitingInFlight | RTT:30/12 15.060 -> Packet A|4|S0|cca52e325bb3c4c5|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[12|Δ0] 15.060 Finished downloading https://server4:443/yzlemnhoyc at 21:32.457 on ClientConnection[96c177225cbcc25e/423cd9853b89a306(V1) with server4/193.167.100.100:443] 15.060 Closing ClientConnection[96c177225cbcc25e/423cd9853b89a306(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.061 -> Packet A|5|S0|cca52e325bb3c4c5|35|2 ConnectionCloseFrame[0|0|] AckFrame[13-12|Δ0] 15.061 Creating connection with server4:443 with v1 15.061 Setting up connection for downloading https://server4:443/rksjyhuohf at 21:32.459 on ClientConnection[91291c41ee0c4a9b/ce83d385f580e470(V1) with server4/193.167.100.100:443] 15.062 Original destination connection id: 91291c41ee0c4a9b (scid: ce83d385f580e470) >- CryptoStream[I|ClientHello] 15.063 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.263/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.063 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.262 loss detection timeout handler running Sending probe 0, because no ack since 15.063. Current RTT: 100/25. 15.262 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.262 (Probe is an initial retransmit) 15.263 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.663/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.263 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.296 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 15.297 probe count not reset on ack because handshake not yet confirmed 15.297 Retransmitting CryptoFrame[0,257] on level Initial 15.297 Cwnd(-): 6000; inflight: 0 15.297 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.697/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.297 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 15.491/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.297 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 15.296 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 15.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.495/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.300 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 15.301 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 15.301 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 15.301 - unsupported transport parameter 0x7158, size 1 (timestamp) 15.301 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 15.303 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.497/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.303 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.304 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.304 Starting downloading https://server4:443/rksjyhuohf at 21:32.701 on ClientConnection[91291c41ee0c4a9b/ce83d385f580e470(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 15.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.304 Discarding pn space Initial because first Handshake message is being sent 15.304 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 15.304 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.304 -> Packet A|0|S0|5f4ed1ba58702e7b|47|1 StreamFrame[0(CIB),0,17,fin] 15.332 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.334 <- (3) Packet A|4|S0|ce83d385f580e470|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.335 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 15.400/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 15.426/App, because ackElicitingInFlight | RTT:33/16 15.335 Discarding pn space Handshake because HandshakeDone is received 15.335 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 15.336 <- (5) Packet A|7|S0|ce83d385f580e470|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 15.336 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.336 -> Packet A|1|S0|5f4ed1ba58702e7b|33|1 AckFrame[7,4|Δ0] 15.336 Finished downloading https://server4:443/rksjyhuohf at 21:32.733 on ClientConnection[91291c41ee0c4a9b/ce83d385f580e470(V1) with server4/193.167.100.100:443] 15.336 Closing ClientConnection[91291c41ee0c4a9b/ce83d385f580e470(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.337 -> Packet A|2|S0|5f4ed1ba58702e7b|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,4|Δ0] 15.337 Creating connection with server4:443 with v1 15.338 Setting up connection for downloading https://server4:443/qtpaplgnje at 21:32.735 on ClientConnection[f5d937f7e6933261/d381cdbddd1381e7(V1) with server4/193.167.100.100:443] 15.338 Original destination connection id: f5d937f7e6933261 (scid: d381cdbddd1381e7) >- CryptoStream[I|ClientHello] 15.339 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.539/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.339 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.457 <- (6) Packet A|9|S0|ce83d385f580e470|98|2 NewConnectionIdFrame[1,<0|f7216acab6eb3a1c|29bb8567e0ea4c4b90134e200032e4c1] NewTokenFrame[01cca08e9e5763ad50c814b4210fe85c826d68f6137c3bec894b8c1f45870ff0a45c67e171467d69897c] 15.458 -> Packet A|3|S0|5f4ed1ba58702e7b|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,4|Δ0] 15.538 loss detection timeout handler running Sending probe 0, because no ack since 15.339. Current RTT: 100/25. 15.538 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.538 (Probe is an initial retransmit) 15.538 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.938/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.538 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.572 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 15.572 probe count not reset on ack because handshake not yet confirmed 15.572 Retransmitting CryptoFrame[0,257] on level Initial 15.572 Cwnd(-): 6000; inflight: 0 15.572 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.972/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.572 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 15.766/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.572 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 15.572 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 15.575 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.574 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 15.575 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 15.575 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 15.575 - unsupported transport parameter 0x7158, size 1 (timestamp) 15.575 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 15.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.771/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.577 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.577 Starting downloading https://server4:443/qtpaplgnje at 21:32.974 on ClientConnection[f5d937f7e6933261/d381cdbddd1381e7(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 15.674/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.577 Discarding pn space Initial because first Handshake message is being sent 15.577 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 15.578 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.675/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.577 -> Packet A|0|S0|61acd29b090923b2|47|1 StreamFrame[0(CIB),0,17,fin] 15.608 <- (2) Packet A|3|S0|d381cdbddd1381e7|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.609 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 15.674/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 15.699/App, because ackElicitingInFlight | RTT:33/16 15.609 Discarding pn space Handshake because HandshakeDone is received 15.609 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 15.609 <- (4) Packet A|6|S0|d381cdbddd1381e7|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 15.610 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.610 -> Packet A|1|S0|61acd29b090923b2|33|1 AckFrame[6,3|Δ0] 15.610 Finished downloading https://server4:443/qtpaplgnje at 21:33.007 on ClientConnection[f5d937f7e6933261/d381cdbddd1381e7(V1) with server4/193.167.100.100:443] 15.610 Closing ClientConnection[f5d937f7e6933261/d381cdbddd1381e7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.610 -> Packet A|2|S0|61acd29b090923b2|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 15.610 Creating connection with server4:443 with v1 15.611 Setting up connection for downloading https://server4:443/lbflrkfecy at 21:33.008 on ClientConnection[d9148a6f94f2aa7f/c0a2a80baa779997(V1) with server4/193.167.100.100:443] 15.611 Original destination connection id: d9148a6f94f2aa7f (scid: c0a2a80baa779997) >- CryptoStream[I|ClientHello] 15.612 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.812/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.612 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.645 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.646 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.846/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.745/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.645 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 15.648 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 15.648 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 15.648 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 15.648 - unsupported transport parameter 0x7158, size 1 (timestamp) 15.648 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 15.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.747/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.650 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.651 Starting downloading https://server4:443/lbflrkfecy at 21:33.048 on ClientConnection[d9148a6f94f2aa7f/c0a2a80baa779997(V1) with server4/193.167.100.100:443] 15.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.748/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.651 Discarding pn space Initial because first Handshake message is being sent 15.651 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 15.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.748/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.651 -> Packet A|0|S0|3b8d77d5bcfa2a5e|47|1 StreamFrame[0(CIB),0,17,fin] 15.680 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.682 <- (3) Packet H|4|L|47|1 AckFrame[0|Δ0] 15.682 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.682 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 15.682 <- (3) Packet A|5|S0|c0a2a80baa779997|98|2 NewConnectionIdFrame[1,<0|0bc6ea0e59ad74c3|ee2a4aee0d8ebd7dd48146ce7d290412] NewTokenFrame[019937a784c4826bc3f2aa5e27a935ae12b26bf6b76b9bf84c28999cc9b8c55779189394e4c26f5817fe] 15.683 <- (4) Packet A|6|S0|c0a2a80baa779997|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 15.683 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.683 Finished downloading https://server4:443/lbflrkfecy at 21:33.080 on ClientConnection[d9148a6f94f2aa7f/c0a2a80baa779997(V1) with server4/193.167.100.100:443] 15.683 -> Packet A|1|S0|3b8d77d5bcfa2a5e|31|1 AckFrame[6-5|Δ0] 15.683 Closing ClientConnection[d9148a6f94f2aa7f/c0a2a80baa779997(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.684 -> Packet A|2|S0|3b8d77d5bcfa2a5e|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 15.684 Creating connection with server4:443 with v1 15.684 Setting up connection for downloading https://server4:443/brhkmvgmpg at 21:33.081 on ClientConnection[a21630b99c91a302/708060d9cb55853c(V1) with server4/193.167.100.100:443] 15.684 Original destination connection id: a21630b99c91a302 (scid: 708060d9cb55853c) >- CryptoStream[I|ClientHello] 15.685 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.885/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.685 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.715 <- (5) Packet A|7|S0|c0a2a80baa779997|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] 15.715 -> Packet A|3|S0|3b8d77d5bcfa2a5e|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 15.884 loss detection timeout handler running Sending probe 0, because no ack since 15.685. Current RTT: 100/25. 15.885 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.885 (Probe is an initial retransmit) 15.885 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.285/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.885 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.918 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 15.919 probe count not reset on ack because handshake not yet confirmed 15.919 Retransmitting CryptoFrame[0,257] on level Initial 15.919 Cwnd(-): 6000; inflight: 0 15.919 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.319/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.919 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 16.113/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.919 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 15.921 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.918 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,712] Padding(318) reschedule loss detection timer for PTO over 193 millis, based on 16.115/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.921 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 15.921 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 15.921 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 15.921 - unsupported transport parameter 0x7158, size 1 (timestamp) 15.921 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 15.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 16.118/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.923 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.924 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.924 Starting downloading https://server4:443/brhkmvgmpg at 21:33.321 on ClientConnection[a21630b99c91a302/708060d9cb55853c(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 16.021/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.924 Discarding pn space Initial because first Handshake message is being sent 15.924 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 15.924 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.021/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.924 -> Packet A|0|S0|95d882a0466b5e95|47|1 StreamFrame[0(CIB),0,17,fin] 15.953 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.955 <- (3) Packet A|3|S0|708060d9cb55853c|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.955 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 16.020/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 16.046/App, because ackElicitingInFlight | RTT:33/16 15.955 Discarding pn space Handshake because HandshakeDone is received 15.975 -> Packet A|1|S0|95d882a0466b5e95|32|1 AckFrame[3|Δ19] 16.026 <- (4) Packet A|7|S0|708060d9cb55853c|98|2 NewConnectionIdFrame[1,<0|63a082509101b1ef|2a7890aa34937f258ca30126eed30f37] NewTokenFrame[015283b4a3532d60220c54aa238820d27390f492e55702f55e1ebbbf24a29abea22f0d3d4674214ed276] 16.046 loss detection timeout handler running Sending probe 0, because no ack since 15.924. Current RTT: 33/16. 16.046 (Probe is retransmit on level App) 16.046 -> Packet A|2|S0|95d882a0466b5e95|34|1 AckFrame[7,3|Δ19] reschedule loss detection timer for PTO over 243 millis, based on 16.290/App, because ackElicitingInFlight | RTT:33/16 16.046 -> Packet PA|3|S0|95d882a0466b5e95|47|1 StreamFrame[0(CIB),0,17,fin] 16.062 Discarding packet (1124 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 16.078 <- (6) Packet A|10|S0|708060d9cb55853c|1060|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] 16.078 Cwnd(-): 3000; inflight: 0 16.078 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.079 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 16.189/App, because ackElicitingInFlight | RTT:33/13 16.079 -> Packet A|4|S0|95d882a0466b5e95|47|1 StreamFrame[0(CIB),0,17,fin] 16.079 Finished downloading https://server4:443/brhkmvgmpg at 21:33.476 on ClientConnection[a21630b99c91a302/708060d9cb55853c(V1) with server4/193.167.100.100:443] 16.079 Closing ClientConnection[a21630b99c91a302/708060d9cb55853c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.079 -> Packet A|5|S0|95d882a0466b5e95|35|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 16.080 Creating connection with server4:443 with v1 16.080 Setting up connection for downloading https://server4:443/ecbyghseml at 21:33.477 on ClientConnection[87f8df51019d9d6e/1030469b15d915a2(V1) with server4/193.167.100.100:443] 16.080 Original destination connection id: 87f8df51019d9d6e (scid: 1030469b15d915a2) >- CryptoStream[I|ClientHello] 16.082 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.282/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.081 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.119 <- (7) Packet A|11|S0|708060d9cb55853c|33|1 AckFrame[4-2|Δ10] 16.120 -> Packet A|6|S0|95d882a0466b5e95|35|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 16.281 loss detection timeout handler running Sending probe 0, because no ack since 16.081. Current RTT: 100/25. 16.281 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.281 (Probe is an initial retransmit) 16.281 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.681/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.281 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.680 loss detection timeout handler running Sending probe 1, because no ack since 16.281. Current RTT: 100/25. 16.681 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.681 (Probe is an initial retransmit) 16.681 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.481/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.681 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.682 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.482/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.682 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.714 <- (1) Packet I|2|L|48|1 Token=[] AckFrame[3-2|Δ0] 16.715 probe count not reset on ack because handshake not yet confirmed 16.715 Retransmitting CryptoFrame[0,257] on level Initial 16.715 Cwnd(-): 6000; inflight: 0 16.715 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.515/Initial, because peerAwaitingAddressValidation | RTT:100/25 16.715 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 17.099/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.715 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.014 <- (2) Packet I|3|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 17.014 <- (2) Packet H|4|L|1077|2 CryptoFrame[0,711] Padding(320) 17.017 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 17.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.017 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 17.017 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 17.017 - unsupported transport parameter 0x7158, size 1 (timestamp) 17.017 - unsupported transport parameter 0x1057, size 1 (loss-bits) 17.017 -> Packet I|5|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1153) >- CryptoStream[H|Finished] 17.020 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 17.404/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.019 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.020 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 17.116/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.020 Discarding pn space Initial because first Handshake message is being sent 17.020 Starting downloading https://server4:443/ecbyghseml at 21:34.417 on ClientConnection[87f8df51019d9d6e/1030469b15d915a2(V1) with server4/193.167.100.100:443] 17.020 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 17.020 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 17.116/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.020 -> Packet A|0|S0|c16797fdeca16e5d|47|1 StreamFrame[0(CIB),0,17,fin] 17.049 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 17.051 <- (4) Packet A|6|S0|1030469b15d915a2|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.052 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 17.115/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 17.141/App, because ackElicitingInFlight | RTT:32/16 17.052 Discarding pn space Handshake because HandshakeDone is received 17.071 -> Packet A|1|S0|c16797fdeca16e5d|32|1 AckFrame[6|Δ19] 17.123 <- (5) Packet A|11|S0|1030469b15d915a2|1054|1 StreamFrame[0(CIB),0,1024,fin] 17.123 Finished downloading https://server4:443/ecbyghseml at 21:34.520 on ClientConnection[87f8df51019d9d6e/1030469b15d915a2(V1) with server4/193.167.100.100:443] 17.123 Closing ClientConnection[87f8df51019d9d6e/1030469b15d915a2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.124 Creating connection with server4:443 with v1 17.124 -> Packet A|2|S0|c16797fdeca16e5d|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,6|Δ0] 17.125 Setting up connection for downloading https://server4:443/nwubvwlcjy at 21:34.521 on ClientConnection[383956eca272c2e3/81eeddba732ffaab(V1) with server4/193.167.100.100:443] 17.125 Original destination connection id: 383956eca272c2e3 (scid: 81eeddba732ffaab) >- CryptoStream[I|ClientHello] 17.126 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.326/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.126 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.201 <- (6) Packet A|12|S0|1030469b15d915a2|1054|1 StreamFrame[0(CIB),0,1024,fin] 17.202 -> Packet A|3|S0|c16797fdeca16e5d|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,6|Δ0] 17.233 <- (7) Packet A|14|S0|1030469b15d915a2|30|1 ConnectionCloseFrame[0|0|] 17.325 loss detection timeout handler running Sending probe 0, because no ack since 17.126. Current RTT: 100/25. 17.325 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.325 (Probe is an initial retransmit) 17.326 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.726/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.325 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.725 loss detection timeout handler running Sending probe 1, because no ack since 17.325. Current RTT: 100/25. 17.725 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.725 (Probe is an initial retransmit) 17.725 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.525/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.725 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.726 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.526/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.726 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.759 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 17.759 probe count not reset on ack because handshake not yet confirmed 17.759 Retransmitting CryptoFrame[0,257] on level Initial 17.760 Cwnd(-): 6000; inflight: 1200 17.760 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.560/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.760 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 18.148/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.760 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 17.759 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,712] Padding(318) 17.762 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.150/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.762 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 17.762 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 17.762 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 17.762 - unsupported transport parameter 0x7158, size 1 (timestamp) 17.762 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 17.764 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.152/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.764 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.764 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.861/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.764 Starting downloading https://server4:443/nwubvwlcjy at 21:35.161 on ClientConnection[383956eca272c2e3/81eeddba732ffaab(V1) with server4/193.167.100.100:443] 17.764 Discarding pn space Initial because first Handshake message is being sent 17.764 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 17.765 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.862/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.765 -> Packet A|0|S0|4a0a02430dd63935|47|1 StreamFrame[0(CIB),0,17,fin] 17.796 <- (2) Packet H|3|L|47|1 AckFrame[0|Δ0] 17.797 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 17.797 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 17.796 <- (2) Packet A|4|S0|81eeddba732ffaab|98|2 NewConnectionIdFrame[1,<0|b7944ca414144527|eb6e252b4913403265a45ea4a19ddd2a] NewTokenFrame[013e180fbd04c7db26a4ff935e5985c0c7220da99f9620ad0f4d0138b07bdbce0f87e7e247c941464514] 17.816 -> Packet A|1|S0|4a0a02430dd63935|32|1 AckFrame[4|Δ19] 18.540 <- (3) Packet A|6|S0|81eeddba732ffaab|98|2 NewConnectionIdFrame[1,<0|b7944ca414144527|eb6e252b4913403265a45ea4a19ddd2a] NewTokenFrame[013e180fbd04c7db26a4ff935e5985c0c7220da99f9620ad0f4d0138b07bdbce0f87e7e247c941464514] 18.560 -> Packet A|2|S0|4a0a02430dd63935|34|1 AckFrame[6,4|Δ19] 18.885 <- (4) Packet A|8|S0|81eeddba732ffaab|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 18.886 State is set to Confirmed reschedule loss detection timer for PTO over -1015 millis, based on 17.871/App, because ackElicitingInFlight | RTT:33/12 18.886 loss detection timeout handler running Sending probe 0, because no ack since 17.764. Current RTT: 33/12. reschedule loss detection timer for PTO over -1015 millis, based on 17.871/App, because ackElicitingInFlight | RTT:33/12 18.886 Discarding pn space Handshake because HandshakeDone is received 18.886 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 211 millis, based on 19.098/App, because ackElicitingInFlight | RTT:33/12 18.886 -> Packet PA|3|S0|4a0a02430dd63935|47|1 StreamFrame[0(CIB),0,17,fin] 18.905 -> Packet A|4|S0|4a0a02430dd63935|36|1 AckFrame[8,6,4|Δ19] 19.097 loss detection timeout handler running Sending probe 1, because no ack since 18.886. Current RTT: 33/12. 19.098 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 423 millis, based on 19.522/App, because ackElicitingInFlight | RTT:33/12 19.098 -> Packet PA|5|S0|4a0a02430dd63935|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 423 millis, based on 19.523/App, because ackElicitingInFlight | RTT:33/12 19.099 -> Packet PA|6|S0|4a0a02430dd63935|47|1 StreamFrame[0(CIB),0,17,fin] 19.146 <- (5) Packet A|10|S0|81eeddba732ffaab|35|1 AckFrame[4-2|Δ209] 19.146 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.146 Cwnd(-): 3000; inflight: 94 reschedule loss detection timer for PTO over 58 millis, based on 19.205/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 105 millis, based on 19.252/App, because ackElicitingInFlight | RTT:33/12 19.146 -> Packet A|7|S0|4a0a02430dd63935|47|1 StreamFrame[0(CIB),0,17,fin] 19.147 <- (6) Packet A|11|S0|81eeddba732ffaab|1055|1 StreamFrame[0(CIB),0,1024,fin] 19.147 Finished downloading https://server4:443/nwubvwlcjy at 21:36.544 on ClientConnection[383956eca272c2e3/81eeddba732ffaab(V1) with server4/193.167.100.100:443] 19.147 Closing ClientConnection[383956eca272c2e3/81eeddba732ffaab(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.148 -> Packet A|8|S0|4a0a02430dd63935|35|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 19.148 Creating connection with server4:443 with v1 19.148 Setting up connection for downloading https://server4:443/ufizfbthgm at 21:36.546 on ClientConnection[c207586b0e12d809/83e35d17632364af(V1) with server4/193.167.100.100:443] 19.149 Original destination connection id: c207586b0e12d809 (scid: 83e35d17632364af) >- CryptoStream[I|ClientHello] 19.150 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.350/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.150 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.177 <- (7) Packet A|12|S0|81eeddba732ffaab|34|1 AckFrame[7,4-2|Δ0] 19.178 -> Packet A|9|S0|4a0a02430dd63935|35|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 19.183 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.184 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.384/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.183 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 19.186 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.283/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.187 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 19.186 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 19.187 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 19.187 - unsupported transport parameter 0x7158, size 1 (timestamp) 19.187 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 19.188 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.286/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.188 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.189 Starting downloading https://server4:443/ufizfbthgm at 21:36.586 on ClientConnection[c207586b0e12d809/83e35d17632364af(V1) with server4/193.167.100.100:443] 19.189 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.286/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.189 Discarding pn space Initial because first Handshake message is being sent 19.189 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 19.189 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.286/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.189 -> Packet A|0|S0|bc0e692a8ce20847|47|1 StreamFrame[0(CIB),0,17,fin] 19.218 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.219 <- (3) Packet H|3|L|47|1 AckFrame[1|Δ0] 19.225 loss detection timeout handler running 19.225 loss detection timeout handler running 19.225 loss detection timeout handler running 19.225 loss detection timeout handler running 19.225 loss detection timeout handler running 19.225 loss detection timeout handler running 19.225 loss detection timeout handler running 19.225 loss detection timeout handler running 19.225 loss detection timeout handler running 19.225 loss detection timeout handler running 19.226 Retransmitting CryptoFrame[0,36] on level Handshake 19.226 Cwnd(-): 6000; inflight: 47 19.226 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 19.226 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 19.226 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 19.323/Handshake, because ackElicitingInFlight | RTT:33/16 19.226 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 19.257 <- (4) Packet A|4|S0|83e35d17632364af|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.258 State is set to Confirmed reschedule loss detection timer for PTO over 52 millis, based on 19.311/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 52 millis, based on 19.311/App, because ackElicitingInFlight | RTT:33/16 19.258 Discarding pn space Handshake because HandshakeDone is received 19.278 -> Packet A|1|S0|bc0e692a8ce20847|32|1 AckFrame[4|Δ19] 19.310 loss detection timeout handler running Sending probe 0, because no ack since 19.189. Current RTT: 33/16. 19.310 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 19.555/App, because ackElicitingInFlight | RTT:33/16 19.311 -> Packet PA|2|S0|bc0e692a8ce20847|47|1 StreamFrame[0(CIB),0,17,fin] 19.337 <- (5) Packet A|7|S0|83e35d17632364af|98|2 NewConnectionIdFrame[1,<0|7b42915a8b5b7491|01768a9ead9ca52347244c7ba7c84cb7] NewTokenFrame[0121921442f8479183f3dca1108c100543dfe3ddffd93f83abb8402489c59586cbe6ab7659c8ad255a5f] 19.343 <- (6) Packet A|8|S0|83e35d17632364af|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 19.343 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.343 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 19.453/App, because ackElicitingInFlight | RTT:33/13 19.343 -> Packet A|3|S0|bc0e692a8ce20847|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7|Δ5] 19.344 Finished downloading https://server4:443/ufizfbthgm at 21:36.741 on ClientConnection[c207586b0e12d809/83e35d17632364af(V1) with server4/193.167.100.100:443] 19.344 Closing ClientConnection[c207586b0e12d809/83e35d17632364af(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.344 -> Packet A|4|S0|bc0e692a8ce20847|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 19.344 Creating connection with server4:443 with v1 19.345 Setting up connection for downloading https://server4:443/mcnhukntde at 21:36.742 on ClientConnection[98dee6ff2ccd0fb1/19f9df62680e211d(V1) with server4/193.167.100.100:443] 19.345 Original destination connection id: 98dee6ff2ccd0fb1 (scid: 19f9df62680e211d) >- CryptoStream[I|ClientHello] 19.346 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.546/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.346 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.379 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.380 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.580/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.379 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 19.382 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.479/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.382 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 19.382 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 19.383 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 19.383 - unsupported transport parameter 0x7158, size 1 (timestamp) 19.383 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 19.385 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.482/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.385 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.386 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.483/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.386 Discarding pn space Initial because first Handshake message is being sent 19.386 Starting downloading https://server4:443/mcnhukntde at 21:36.783 on ClientConnection[98dee6ff2ccd0fb1/19f9df62680e211d(V1) with server4/193.167.100.100:443] 19.386 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.483/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.386 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|47d5db36778cd5f9|47|1 StreamFrame[0(CIB),0,17,fin]] 19.417 <- (2) Packet A|2|S0|19f9df62680e211d|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.418 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 19.482/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 19.508/App, because ackElicitingInFlight | RTT:33/16 19.418 Discarding pn space Handshake because HandshakeDone is received 19.418 <- (3) Packet A|5|S0|19f9df62680e211d|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 19.418 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.419 -> Packet A|1|S0|47d5db36778cd5f9|33|1 AckFrame[5,2|Δ0] 19.419 Finished downloading https://server4:443/mcnhukntde at 21:36.816 on ClientConnection[98dee6ff2ccd0fb1/19f9df62680e211d(V1) with server4/193.167.100.100:443] 19.419 Closing ClientConnection[98dee6ff2ccd0fb1/19f9df62680e211d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.419 -> Packet A|2|S0|47d5db36778cd5f9|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 19.420 Creating connection with server4:443 with v1 19.420 Setting up connection for downloading https://server4:443/herdotshzs at 21:36.817 on ClientConnection[d5dbee860969b522/5bd8aa1551ad532d(V1) with server4/193.167.100.100:443] 19.420 Original destination connection id: d5dbee860969b522 (scid: 5bd8aa1551ad532d) >- CryptoStream[I|ClientHello] 19.421 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.621/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.421 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.450 <- (4) Packet A|6|S0|19f9df62680e211d|98|2 NewConnectionIdFrame[1,<0|b9f842cd882769c3|54625d81426e7744988497315b9b73c3] NewTokenFrame[01527020194f349f7c019bd6d7e4c8fa075aa63666db08a63bf6e8ba29fcd682fe0ed96e2f5ee983c84e] 19.451 -> Packet A|3|S0|47d5db36778cd5f9|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 19.621 loss detection timeout handler running Sending probe 0, because no ack since 19.421. Current RTT: 100/25. 19.621 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.621 (Probe is an initial retransmit) 19.621 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.021/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.621 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.655 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 19.655 probe count not reset on ack because handshake not yet confirmed 19.655 Retransmitting CryptoFrame[0,257] on level Initial 19.655 Cwnd(-): 6000; inflight: 0 19.655 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.055/Initial, because peerAwaitingAddressValidation | RTT:100/25 19.655 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 19.849/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.655 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 19.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.655 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) reschedule loss detection timer for PTO over 193 millis, based on 19.851/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.657 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 19.658 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 19.658 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 19.658 - unsupported transport parameter 0x7158, size 1 (timestamp) 19.658 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 19.660 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.854/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.660 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.660 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.757/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.660 Discarding pn space Initial because first Handshake message is being sent 19.660 Starting downloading https://server4:443/herdotshzs at 21:37.057 on ClientConnection[d5dbee860969b522/5bd8aa1551ad532d(V1) with server4/193.167.100.100:443] 19.660 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 19.660 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.758/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.660 -> Packet A|0|S0|1c1df22a70fb4564|47|1 StreamFrame[0(CIB),0,17,fin] 19.687 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.757 loss detection timeout handler running Sending probe 0, because no ack since 19.660. Current RTT: 33/16. 19.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.757 (Probe is a handshake retransmit) 19.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.951/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.757 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 19.788 <- (3) Packet A|6|S0|5bd8aa1551ad532d|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.789 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 19.904/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 19.782/App, because ackElicitingInFlight | RTT:33/16 19.789 Discarding pn space Handshake because HandshakeDone is received 19.789 loss detection timeout handler running Sending probe 0, because no ack since 19.660. Current RTT: 33/16. 19.789 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 19.789 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 20.034/App, because ackElicitingInFlight | RTT:33/16 19.790 -> Packet PA|1|S0|1c1df22a70fb4564|47|1 StreamFrame[0(CIB),0,17,fin] 19.809 -> Packet A|2|S0|1c1df22a70fb4564|32|1 AckFrame[6|Δ19] 19.821 <- (5) Packet A|9|S0|5bd8aa1551ad532d|1059|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 19.822 Cwnd(-): 3000; inflight: 0 19.822 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.822 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 19.932/App, because ackElicitingInFlight | RTT:33/13 19.822 -> Packet A|3|S0|1c1df22a70fb4564|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ0] 19.822 Finished downloading https://server4:443/herdotshzs at 21:37.219 on ClientConnection[d5dbee860969b522/5bd8aa1551ad532d(V1) with server4/193.167.100.100:443] 19.822 Closing ClientConnection[d5dbee860969b522/5bd8aa1551ad532d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.823 -> Packet A|4|S0|1c1df22a70fb4564|37|2 ConnectionCloseFrame[0|0|] AckFrame[9,6|Δ0] 19.823 Creating connection with server4:443 with v1 19.824 Setting up connection for downloading https://server4:443/qazbotisjt at 21:37.221 on ClientConnection[091e3c68597e60d1/f1c0a79c22f8619c(V1) with server4/193.167.100.100:443] 19.824 Original destination connection id: 091e3c68597e60d1 (scid: f1c0a79c22f8619c) >- CryptoStream[I|ClientHello] 19.825 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.025/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.825 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.834 Discarding packet (1076 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 19.859 <- (7) Packet A|11|S0|5bd8aa1551ad532d|32|1 AckFrame[1|Δ38] 19.859 -> Packet A|5|S0|1c1df22a70fb4564|37|2 ConnectionCloseFrame[0|0|] AckFrame[9,6|Δ0] 19.890 <- (8) Packet A|13|S0|5bd8aa1551ad532d|98|2 NewConnectionIdFrame[1,<0|ed83be30790fc5b3|56fe5d61379c832626381581c60c471a] NewTokenFrame[01116305122a159158491f294ac159e00abbe75b69aae135a4e13aefbb5c71801563cd59e05c5c3f7ebc] 19.891 -> Packet A|6|S0|1c1df22a70fb4564|37|2 ConnectionCloseFrame[0|0|] AckFrame[9,6|Δ0] 20.024 loss detection timeout handler running Sending probe 0, because no ack since 19.825. Current RTT: 100/25. 20.024 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.024 (Probe is an initial retransmit) 20.025 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.425/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.024 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.056 <- (1) Packet I|2|L|48|1 Token=[] AckFrame[1-0|Δ0] 20.057 probe count not reset on ack because handshake not yet confirmed 20.057 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.457/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.456 loss detection timeout handler running Sending probe 1, because no ack since 20.024. Current RTT: 31/15. 20.456 Sending probe because peer awaiting address validation 20.456 (Probe is Initial ping, because there is no Initial data to retransmit) 20.457 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 363 millis, based on 20.821/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 20.457 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 20.459 <- (2) Packet I|5|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 20.459 <- (2) Packet H|6|L|1077|2 CryptoFrame[0,711] Padding(320) 20.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 20.826/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 20.462 -> Packet I|3|L|1201|2 Token=[] AckFrame[5,2|Δ0] Padding(1151) 20.462 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 20.462 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 20.462 - unsupported transport parameter 0x7158, size 1 (timestamp) 20.462 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 20.464 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 20.828/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 20.464 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.464 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.464 Starting downloading https://server4:443/qazbotisjt at 21:37.861 on ClientConnection[091e3c68597e60d1/f1c0a79c22f8619c(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 90 millis, based on 20.555/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 20.464 Discarding pn space Initial because first Handshake message is being sent 20.464 -> Packet H|1|L|46|1 AckFrame[6|Δ0] 20.465 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 20.556/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 20.465 -> Packet A|0|S0|eae58588a806b7ee|47|1 StreamFrame[0(CIB),0,17,fin] 20.496 <- (3) Packet A|8|S0|f1c0a79c22f8619c|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.496 State is set to Confirmed reschedule loss detection timer for PTO over 58 millis, based on 20.555/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 84 millis, based on 20.581/App, because ackElicitingInFlight | RTT:31/15 20.496 Discarding pn space Handshake because HandshakeDone is received 20.497 <- (4) Packet A|11|S0|f1c0a79c22f8619c|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 20.497 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.497 -> Packet A|1|S0|eae58588a806b7ee|33|1 AckFrame[11,8|Δ0] 20.497 Finished downloading https://server4:443/qazbotisjt at 21:37.894 on ClientConnection[091e3c68597e60d1/f1c0a79c22f8619c(V1) with server4/193.167.100.100:443] 20.497 Closing ClientConnection[091e3c68597e60d1/f1c0a79c22f8619c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.498 -> Packet A|2|S0|eae58588a806b7ee|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,8|Δ0] 20.498 Creating connection with server4:443 with v1 20.499 Setting up connection for downloading https://server4:443/tsjmdhnkxb at 21:37.896 on ClientConnection[ad396f652bd95a41/465cadce91b3c9b2(V1) with server4/193.167.100.100:443] 20.499 Original destination connection id: ad396f652bd95a41 (scid: 465cadce91b3c9b2) >- CryptoStream[I|ClientHello] 20.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.700/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.500 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.528 <- (5) Packet A|12|S0|f1c0a79c22f8619c|98|2 NewConnectionIdFrame[1,<0|544f66ee006f314d|eb10eaa0c49950a06b68b0ee6e8d76f5] NewTokenFrame[0114e7688aae62b065e14010918a2f6c77a63c871bf6b48f3c24e896b34c43b4156f73faaf93e6c119a2] 20.528 -> Packet A|3|S0|eae58588a806b7ee|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,8|Δ0] 20.699 loss detection timeout handler running Sending probe 0, because no ack since 20.500. Current RTT: 100/25. 20.699 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.699 (Probe is an initial retransmit) 20.700 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.100/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.699 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.834 <- (1) Packet I|2|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 20.834 <- (1) Packet H|3|L|1076|2 CryptoFrame[0,711] Padding(319) 20.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.238/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.838 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 20.838 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 20.838 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 20.838 - unsupported transport parameter 0x7158, size 1 (timestamp) 20.838 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 20.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.240/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.840 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.841 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.041/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.841 Discarding pn space Initial because first Handshake message is being sent 20.841 Starting downloading https://server4:443/tsjmdhnkxb at 21:38.238 on ClientConnection[ad396f652bd95a41/465cadce91b3c9b2(V1) with server4/193.167.100.100:443] 20.842 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.042/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.841 -> [Packet H|1|L|46|1 AckFrame[3|Δ0], Packet A|0|S0|fa9e7856db02f7ee|47|1 StreamFrame[0(CIB),0,17,fin]] 21.041 loss detection timeout handler running Sending probe 0, because no ack since 20.840. Current RTT: 100/25. 21.041 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.041 (Probe is a handshake retransmit) 21.041 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.441/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.041 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 21.440 loss detection timeout handler running Sending probe 1, because no ack since 20.841. Current RTT: 100/25. 21.440 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.441 (Probe is a handshake retransmit) 21.441 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 22.241/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.441 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 21.442 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 22.242/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.442 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 21.473 <- (2) Packet H|8|L|50|1 AckFrame[4,1-0|Δ0] 21.473 probe count not reset on ack because handshake not yet confirmed 21.473 Cwnd(-): 6000; inflight: 127 21.540 <- (3) Packet A|10|S0|465cadce91b3c9b2|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.541 Finished downloading https://server4:443/tsjmdhnkxb at 21:38.938 on ClientConnection[ad396f652bd95a41/465cadce91b3c9b2(V1) with server4/193.167.100.100:443] 21.541 Closing ClientConnection[ad396f652bd95a41/465cadce91b3c9b2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.541 -> Packet A|1|S0|fa9e7856db02f7ee|35|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 21.541 Creating connection with server4:443 with v1 21.542 Setting up connection for downloading https://server4:443/azsoddtmpc at 21:38.939 on ClientConnection[f8edbfbe597d790f/72e002c43e4ed24a(V1) with server4/193.167.100.100:443] 21.542 Original destination connection id: f8edbfbe597d790f (scid: 72e002c43e4ed24a) >- CryptoStream[I|ClientHello] 21.543 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.743/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.543 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.573 <- (4) Packet A|11|S0|465cadce91b3c9b2|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] 21.573 <- (5) Packet A|12|S0|465cadce91b3c9b2|98|2 NewConnectionIdFrame[1,<0|89fcdb728f1bb4c2|8acb9cd11415a85d91a01c99f153e662] NewTokenFrame[01e77497fa6d810d33ce2bdad933ceb686c6f6e65602b2f09cf6d3f138ef1d05e51a513cfe096e970564] 21.573 -> Packet A|2|S0|fa9e7856db02f7ee|35|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 21.573 <- (6) Packet A|13|S0|465cadce91b3c9b2|30|1 ConnectionCloseFrame[0|0|] 21.573 -> Packet A|3|S0|fa9e7856db02f7ee|35|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 21.742 loss detection timeout handler running Sending probe 0, because no ack since 21.543. Current RTT: 100/25. 21.743 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.743 (Probe is an initial retransmit) 21.743 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.143/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.743 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.776 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 21.776 probe count not reset on ack because handshake not yet confirmed 21.777 Retransmitting CryptoFrame[0,257] on level Initial 21.777 Cwnd(-): 6000; inflight: 0 21.777 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.177/Initial, because peerAwaitingAddressValidation | RTT:100/25 21.777 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 21.971/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.777 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 21.776 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 21.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.973/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.779 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 21.779 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 21.779 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 21.779 - unsupported transport parameter 0x7158, size 1 (timestamp) 21.779 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 21.781 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.975/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.781 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.781 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.879/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.782 Discarding pn space Initial because first Handshake message is being sent 21.782 Starting downloading https://server4:443/azsoddtmpc at 21:39.179 on ClientConnection[f8edbfbe597d790f/72e002c43e4ed24a(V1) with server4/193.167.100.100:443] 21.782 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 21.782 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.879/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.782 -> Packet A|0|S0|51ef24362a12cc54|47|1 StreamFrame[0(CIB),0,17,fin] 21.878 loss detection timeout handler running Sending probe 0, because no ack since 21.781. Current RTT: 33/16. 21.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.879 (Probe is a handshake retransmit) 21.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.073/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.879 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 22.072 loss detection timeout handler running Sending probe 1, because no ack since 21.782. Current RTT: 33/16. 22.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.072 (Probe is a handshake retransmit) 22.073 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 22.461/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.072 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 22.074 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 22.462/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.073 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 22.078 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 22.378 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 22.461 loss detection timeout handler running Sending probe 2, because no ack since 21.782. Current RTT: 33/16. 22.461 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.461 (Probe is a handshake retransmit) 22.461 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 23.237/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.461 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 22.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 23.238/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.462 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 22.493 <- (4) Packet A|7|S0|72e002c43e4ed24a|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.494 State is set to Confirmed reschedule loss detection timer for PTO over 264 millis, based on 22.758/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -589 millis, based on 21.904/App, because ackElicitingInFlight | RTT:33/16 22.494 Discarding pn space Handshake because HandshakeDone is received 22.494 loss detection timeout handler running Sending probe 0, because no ack since 21.782. Current RTT: 33/16. 22.494 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 22.738/App, because ackElicitingInFlight | RTT:33/16 22.494 -> Packet PA|1|S0|51ef24362a12cc54|47|1 StreamFrame[0(CIB),0,17,fin] 22.513 -> Packet A|2|S0|51ef24362a12cc54|32|1 AckFrame[7|Δ19] 22.526 <- (5) Packet A|11|S0|72e002c43e4ed24a|1059|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 22.526 Cwnd(-): 3000; inflight: 0 22.526 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.526 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 22.636/App, because ackElicitingInFlight | RTT:33/13 22.526 -> Packet A|3|S0|51ef24362a12cc54|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7|Δ0] 22.527 Finished downloading https://server4:443/azsoddtmpc at 21:39.924 on ClientConnection[f8edbfbe597d790f/72e002c43e4ed24a(V1) with server4/193.167.100.100:443] 22.527 Closing ClientConnection[f8edbfbe597d790f/72e002c43e4ed24a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.527 -> Packet A|4|S0|51ef24362a12cc54|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,7|Δ0] 22.528 Creating connection with server4:443 with v1 22.528 Setting up connection for downloading https://server4:443/ybwijamhhs at 21:39.925 on ClientConnection[426e9c214fb57d87/ed1c1f6476e8aa9c(V1) with server4/193.167.100.100:443] 22.528 Original destination connection id: 426e9c214fb57d87 (scid: ed1c1f6476e8aa9c) >- CryptoStream[I|ClientHello] 22.530 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.730/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.530 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.558 <- (6) Packet A|12|S0|72e002c43e4ed24a|34|1 AckFrame[3,1|Δ0] 22.558 -> Packet A|5|S0|51ef24362a12cc54|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,7|Δ0] 22.563 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.563 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.763/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.563 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) 22.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.662/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.565 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 22.565 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 22.565 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 22.565 - unsupported transport parameter 0x7158, size 1 (timestamp) 22.565 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 22.567 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.664/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.567 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.567 Starting downloading https://server4:443/ybwijamhhs at 21:39.965 on ClientConnection[426e9c214fb57d87/ed1c1f6476e8aa9c(V1) with server4/193.167.100.100:443] 22.567 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.664/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.568 Discarding pn space Initial because first Handshake message is being sent 22.567 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 22.568 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.665/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.568 -> Packet A|0|S0|8271a07d80f99677|47|1 StreamFrame[0(CIB),0,17,fin] 22.589 <- (7) Packet A|13|S0|72e002c43e4ed24a|98|2 NewConnectionIdFrame[1,<0|88f876f61e261812|076e97c1704bb36e48cc80dd33f1bb47] NewTokenFrame[01fc5730c2d13284063f7509da528e0635a9dc0bcd714193d30b81d24303a4c4c6d029d62724b41e3cb2] 22.589 -> Packet A|6|S0|51ef24362a12cc54|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,7|Δ0] 22.597 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 22.598 <- (3) Packet H|3|L|47|1 AckFrame[1|Δ0] 22.604 loss detection timeout handler running 22.604 loss detection timeout handler running 22.604 loss detection timeout handler running 22.604 loss detection timeout handler running 22.604 loss detection timeout handler running 22.604 loss detection timeout handler running 22.604 loss detection timeout handler running 22.604 loss detection timeout handler running 22.604 loss detection timeout handler running 22.604 loss detection timeout handler running 22.604 loss detection timeout handler running 22.604 loss detection timeout handler running 22.604 Retransmitting CryptoFrame[0,36] on level Handshake 22.604 Cwnd(-): 6000; inflight: 47 22.604 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 22.604 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 22.604 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 22.701/Handshake, because ackElicitingInFlight | RTT:33/16 22.604 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 22.636 <- (4) Packet H|5|L|47|1 AckFrame[2-1|Δ0] 22.637 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 22.637 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 22.636 <- (4) Packet A|6|S0|ed1c1f6476e8aa9c|98|2 NewConnectionIdFrame[1,<0|3642aa68c1c6a750|ecb394ec88518c5568276a56a6a43045] NewTokenFrame[011ffd9ceccd246668b5ced151be6b5f5b9fd2e241edf598bbb6d99ac7ad006ba6ce1a4066da2543526b] 22.656 -> Packet A|1|S0|8271a07d80f99677|32|1 AckFrame[6|Δ19] 22.714 <- (5) Packet A|7|S0|ed1c1f6476e8aa9c|98|2 NewConnectionIdFrame[1,<0|3642aa68c1c6a750|ecb394ec88518c5568276a56a6a43045] NewTokenFrame[011ffd9ceccd246668b5ced151be6b5f5b9fd2e241edf598bbb6d99ac7ad006ba6ce1a4066da2543526b] 22.734 -> Packet A|2|S0|8271a07d80f99677|32|1 AckFrame[7-6|Δ19] 22.784 <- (6) Packet A|8|S0|ed1c1f6476e8aa9c|98|2 NewConnectionIdFrame[1,<0|3642aa68c1c6a750|ecb394ec88518c5568276a56a6a43045] NewTokenFrame[011ffd9ceccd246668b5ced151be6b5f5b9fd2e241edf598bbb6d99ac7ad006ba6ce1a4066da2543526b] 22.804 -> Packet A|3|S0|8271a07d80f99677|32|1 AckFrame[8-6|Δ19] 22.835 <- (7) Packet A|9|S0|ed1c1f6476e8aa9c|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.836 State is set to Confirmed reschedule loss detection timer for PTO over -158 millis, based on 22.678/App, because ackElicitingInFlight | RTT:33/13 22.836 loss detection timeout handler running reschedule loss detection timer for PTO over -158 millis, based on 22.678/App, because ackElicitingInFlight | RTT:33/13 Sending probe 0, because no ack since 22.568. Current RTT: 33/13. 22.836 Discarding pn space Handshake because HandshakeDone is received 22.836 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 23.056/App, because ackElicitingInFlight | RTT:33/13 22.836 -> Packet PA|4|S0|8271a07d80f99677|47|1 StreamFrame[0(CIB),0,17,fin] 22.855 -> Packet A|5|S0|8271a07d80f99677|32|1 AckFrame[9-6|Δ19] 22.957 <- (8) Packet A|12|S0|ed1c1f6476e8aa9c|1055|1 StreamFrame[0(CIB),0,1024,fin] 22.958 Finished downloading https://server4:443/ybwijamhhs at 21:40.355 on ClientConnection[426e9c214fb57d87/ed1c1f6476e8aa9c(V1) with server4/193.167.100.100:443] 22.958 Closing ClientConnection[426e9c214fb57d87/ed1c1f6476e8aa9c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.958 Creating connection with server4:443 with v1 22.958 -> Packet A|6|S0|8271a07d80f99677|37|2 ConnectionCloseFrame[0|0|] AckFrame[12,9-6|Δ0] 22.959 Setting up connection for downloading https://server4:443/hxttsauzua at 21:40.356 on ClientConnection[fcd93da3fcc7622a/3894629ecae06f7b(V1) with server4/193.167.100.100:443] 22.959 Original destination connection id: fcd93da3fcc7622a (scid: 3894629ecae06f7b) >- CryptoStream[I|ClientHello] 22.960 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.160/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.960 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.993 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.993 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.193/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.993 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 22.995 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.995 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) reschedule loss detection timer for PTO over 96 millis, based on 23.092/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.996 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 22.996 - unsupported transport parameter 0x7158, size 1 (timestamp) 22.996 - unsupported transport parameter 0x1057, size 1 (loss-bits) 22.995 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 22.997 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.094/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.997 -> Packet H|0|L|80|1 CryptoFrame[0,36] 22.997 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.095/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.998 Discarding pn space Initial because first Handshake message is being sent 22.998 Starting downloading https://server4:443/hxttsauzua at 21:40.395 on ClientConnection[fcd93da3fcc7622a/3894629ecae06f7b(V1) with server4/193.167.100.100:443] 22.997 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 22.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.095/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.998 -> Packet A|0|S0|fd0be322d7a86efd|47|1 StreamFrame[0(CIB),0,17,fin] 23.094 loss detection timeout handler running Sending probe 0, because no ack since 22.997. Current RTT: 33/16. 23.094 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.095 (Probe is a handshake retransmit) 23.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.289/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.095 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 23.126 <- (2) Packet A|2|S0|3894629ecae06f7b|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 23.127 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 23.242/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 23.120/App, because ackElicitingInFlight | RTT:33/16 23.127 Discarding pn space Handshake because HandshakeDone is received 23.127 loss detection timeout handler running Sending probe 0, because no ack since 22.998. Current RTT: 33/16. 23.127 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 23.371/App, because ackElicitingInFlight | RTT:33/16 23.127 -> Packet PA|1|S0|fd0be322d7a86efd|47|1 StreamFrame[0(CIB),0,17,fin] 23.147 -> Packet A|2|S0|fd0be322d7a86efd|32|1 AckFrame[2|Δ19] 23.370 loss detection timeout handler running Sending probe 1, because no ack since 23.127. Current RTT: 33/16. 23.371 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 23.859/App, because ackElicitingInFlight | RTT:33/16 23.371 -> Packet PA|3|S0|fd0be322d7a86efd|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 23.860/App, because ackElicitingInFlight | RTT:33/16 23.372 -> Packet PA|4|S0|fd0be322d7a86efd|47|1 StreamFrame[0(CIB),0,17,fin] 23.403 <- (3) Packet A|6|S0|3894629ecae06f7b|32|1 AckFrame[4-1|Δ0] 23.403 Cwnd(-): 6000; inflight: 0 23.403 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 23.403 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 23.513/App, because ackElicitingInFlight | RTT:33/13 23.403 -> Packet A|5|S0|fd0be322d7a86efd|47|1 StreamFrame[0(CIB),0,17,fin] 23.513 loss detection timeout handler running Sending probe 0, because no ack since 23.403. Current RTT: 33/13. 23.513 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 23.733/App, because ackElicitingInFlight | RTT:33/13 23.513 -> Packet PA|6|S0|fd0be322d7a86efd|47|1 StreamFrame[0(CIB),0,17,fin] 23.732 loss detection timeout handler running Sending probe 1, because no ack since 23.513. Current RTT: 33/13. 23.733 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 439 millis, based on 24.173/App, because ackElicitingInFlight | RTT:33/13 23.733 -> Packet PA|7|S0|fd0be322d7a86efd|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 439 millis, based on 24.174/App, because ackElicitingInFlight | RTT:33/13 23.734 -> Packet PA|8|S0|fd0be322d7a86efd|47|1 StreamFrame[0(CIB),0,17,fin] 23.765 <- (4) Packet A|9|S0|3894629ecae06f7b|32|1 AckFrame[8-1|Δ0] 23.765 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 23.793 <- (5) Packet A|10|S0|3894629ecae06f7b|33|1 AckFrame[8-1|Δ28] 23.793 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 23.859 <- (6) Packet A|12|S0|3894629ecae06f7b|1054|1 StreamFrame[0(CIB),0,1024,fin] 23.860 Finished downloading https://server4:443/hxttsauzua at 21:41.257 on ClientConnection[fcd93da3fcc7622a/3894629ecae06f7b(V1) with server4/193.167.100.100:443] 23.860 Closing ClientConnection[fcd93da3fcc7622a/3894629ecae06f7b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.860 -> Packet A|9|S0|fd0be322d7a86efd|39|2 ConnectionCloseFrame[0|0|] AckFrame[12,10-9,6|Δ0] 23.860 Creating connection with server4:443 with v1 23.861 Setting up connection for downloading https://server4:443/nrxglqygma at 21:41.258 on ClientConnection[5d45d518bf3fba89/052944fe7c4b04d3(V1) with server4/193.167.100.100:443] 23.861 Original destination connection id: 5d45d518bf3fba89 (scid: 052944fe7c4b04d3) >- CryptoStream[I|ClientHello] 23.862 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.062/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.862 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.895 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 23.895 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.095/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.897 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.895 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) reschedule loss detection timer for PTO over 96 millis, based on 23.994/Handshake, because peerAwaitingAddressValidation | RTT:33/16 23.897 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 23.898 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 23.898 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 23.898 - unsupported transport parameter 0x7158, size 1 (timestamp) 23.898 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 23.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.997/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.900 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.900 Starting downloading https://server4:443/nrxglqygma at 21:41.297 on ClientConnection[5d45d518bf3fba89/052944fe7c4b04d3(V1) with server4/193.167.100.100:443] 23.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.997/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.900 Discarding pn space Initial because first Handshake message is being sent 23.900 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 23.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.997/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.900 -> Packet A|0|S0|cb010baa63b8aa32|47|1 StreamFrame[0(CIB),0,17,fin] 23.929 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 23.931 <- (3) Packet A|3|S0|052944fe7c4b04d3|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 23.932 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 23.997/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 24.022/App, because ackElicitingInFlight | RTT:33/16 23.932 Discarding pn space Handshake because HandshakeDone is received 23.932 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 23.951 -> Packet A|1|S0|cb010baa63b8aa32|32|1 AckFrame[3|Δ19] 24.001 <- (5) Packet A|6|S0|052944fe7c4b04d3|98|2 NewConnectionIdFrame[1,<0|c86e162cb34f3355|70a9417f404703ba66bcab5820c008e8] NewTokenFrame[0111cbca9ff9524c38c0397ff7e7c153fb36c500d886bb5d9c7ec29880740211efd1797d673993983c37] 24.021 -> Packet A|2|S0|cb010baa63b8aa32|34|1 AckFrame[6,3|Δ19] 24.022 loss detection timeout handler running Sending probe 0, because no ack since 23.900. Current RTT: 33/16. 24.022 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 24.266/App, because ackElicitingInFlight | RTT:33/16 24.022 -> Packet PA|3|S0|cb010baa63b8aa32|47|1 StreamFrame[0(CIB),0,17,fin] 24.059 <- (7) Packet A|13|S0|3894629ecae06f7b|35|1 AckFrame[8-1|Δ294] 24.059 <- (8) Packet A|14|S0|3894629ecae06f7b|98|2 NewConnectionIdFrame[1,<0|5aee2b5e0a476203|179a7f5858074db4803b89dc91b0aa32] NewTokenFrame[01444e0712e25694ec3acd4c013d5644e37ed7abe94547f6ca42f6b370b2f4cdbb69a19843d50c20421e] 24.060 -> Packet A|10|S0|fd0be322d7a86efd|39|2 ConnectionCloseFrame[0|0|] AckFrame[12,10-9,6|Δ0] 24.060 -> Packet A|11|S0|fd0be322d7a86efd|39|2 ConnectionCloseFrame[0|0|] AckFrame[12,10-9,6|Δ0] 24.060 <- (9) Packet A|15|S0|3894629ecae06f7b|1054|1 StreamFrame[0(CIB),0,1024,fin] 24.265 loss detection timeout handler running Sending probe 1, because no ack since 24.022. Current RTT: 33/16. 24.266 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 24.754/App, because ackElicitingInFlight | RTT:33/16 24.266 -> Packet PA|4|S0|cb010baa63b8aa32|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 24.755/App, because ackElicitingInFlight | RTT:33/16 24.267 -> Packet PA|5|S0|cb010baa63b8aa32|47|1 StreamFrame[0(CIB),0,17,fin] 24.298 <- (6) Packet A|7|S0|052944fe7c4b04d3|1062|2 AckFrame[4,2|Δ0] StreamFrame[0(CIB),0,1024,fin] 24.298 Cwnd(-): 6000; inflight: 47 24.298 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 24.389/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 105 millis, based on 24.404/App, because ackElicitingInFlight | RTT:33/12 24.298 -> Packet A|6|S0|cb010baa63b8aa32|47|1 StreamFrame[0(CIB),0,17,fin] 24.299 Finished downloading https://server4:443/nrxglqygma at 21:41.696 on ClientConnection[5d45d518bf3fba89/052944fe7c4b04d3(V1) with server4/193.167.100.100:443] 24.299 Closing ClientConnection[5d45d518bf3fba89/052944fe7c4b04d3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.299 -> Packet A|7|S0|cb010baa63b8aa32|35|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 24.299 Creating connection with server4:443 with v1 24.300 Setting up connection for downloading https://server4:443/qozsachokv at 21:41.697 on ClientConnection[39e795d9c7a95956/9c17845709504d8c(V1) with server4/193.167.100.100:443] 24.300 Original destination connection id: 39e795d9c7a95956 (scid: 9c17845709504d8c) >- CryptoStream[I|ClientHello] 24.301 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.501/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.301 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.329 <- (7) Packet A|8|S0|052944fe7c4b04d3|36|1 AckFrame[6,4,2|Δ0] 24.330 -> Packet A|8|S0|cb010baa63b8aa32|35|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 24.334 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.335 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.535/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.334 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,712] Padding(318) 24.337 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.434/Handshake, because peerAwaitingAddressValidation | RTT:33/16 24.337 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 24.337 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 24.337 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 24.337 - unsupported transport parameter 0x7158, size 1 (timestamp) 24.337 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 24.339 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.436/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.339 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.339 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.436/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.339 Discarding pn space Initial because first Handshake message is being sent 24.339 Starting downloading https://server4:443/qozsachokv at 21:41.736 on ClientConnection[39e795d9c7a95956/9c17845709504d8c(V1) with server4/193.167.100.100:443] 24.339 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 24.339 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.436/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.339 -> Packet A|0|S0|cc26b6465a05bed4|47|1 StreamFrame[0(CIB),0,17,fin] 24.369 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.370 <- (3) Packet A|3|S0|9c17845709504d8c|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.371 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 24.436/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 24.461/App, because ackElicitingInFlight | RTT:33/16 24.371 Discarding pn space Handshake because HandshakeDone is received 24.371 <- (4) Packet A|6|S0|9c17845709504d8c|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 24.372 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.372 -> Packet A|1|S0|cc26b6465a05bed4|33|1 AckFrame[6,3|Δ0] 24.372 Finished downloading https://server4:443/qozsachokv at 21:41.769 on ClientConnection[39e795d9c7a95956/9c17845709504d8c(V1) with server4/193.167.100.100:443] 24.372 Closing ClientConnection[39e795d9c7a95956/9c17845709504d8c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.372 -> Packet A|2|S0|cc26b6465a05bed4|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 24.372 Creating connection with server4:443 with v1 24.373 Setting up connection for downloading https://server4:443/spasomhjbw at 21:41.770 on ClientConnection[d1641911353d7414/39519da2779a565d(V1) with server4/193.167.100.100:443] 24.373 Original destination connection id: d1641911353d7414 (scid: 39519da2779a565d) >- CryptoStream[I|ClientHello] 24.374 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.574/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.374 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.375 <- (8) Packet A|9|S0|052944fe7c4b04d3|37|1 AckFrame[6,4,2|Δ45] 24.375 -> Packet A|9|S0|cb010baa63b8aa32|35|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 24.375 <- (9) Packet A|10|S0|052944fe7c4b04d3|1055|1 StreamFrame[0(CIB),0,1024,fin] 24.403 <- (5) Packet A|7|S0|9c17845709504d8c|98|2 NewConnectionIdFrame[1,<0|c9be8f3ba0666b42|1b3e729b15adf72783ebab21694c474b] NewTokenFrame[01fe1e7b9d8959c15d7ada989463f71505a188eaab8a17c66a3685afc7dcfae4b6014e67890047f5ef04] 24.403 -> Packet A|3|S0|cc26b6465a05bed4|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 24.407 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.407 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.607/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.407 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,712] Padding(318) 24.409 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.506/Handshake, because peerAwaitingAddressValidation | RTT:33/16 24.409 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 24.409 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 24.409 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 24.409 - unsupported transport parameter 0x7158, size 1 (timestamp) 24.409 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 24.411 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.508/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.411 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.411 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.509/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.411 Starting downloading https://server4:443/spasomhjbw at 21:41.809 on ClientConnection[d1641911353d7414/39519da2779a565d(V1) with server4/193.167.100.100:443] 24.412 Discarding pn space Initial because first Handshake message is being sent 24.412 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 24.412 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.509/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.412 -> Packet A|0|S0|273109096840aec2|47|1 StreamFrame[0(CIB),0,17,fin] 24.443 <- (2) Packet A|2|S0|39519da2779a565d|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.443 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 24.508/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 24.534/App, because ackElicitingInFlight | RTT:33/16 24.444 Discarding pn space Handshake because HandshakeDone is received 24.444 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 24.444 <- (4) Packet A|5|S0|39519da2779a565d|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 24.444 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.444 -> Packet A|1|S0|273109096840aec2|33|1 AckFrame[5,2|Δ0] 24.444 Finished downloading https://server4:443/spasomhjbw at 21:41.842 on ClientConnection[d1641911353d7414/39519da2779a565d(V1) with server4/193.167.100.100:443] 24.444 Closing ClientConnection[d1641911353d7414/39519da2779a565d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.445 Creating connection with server4:443 with v1 24.445 -> Packet A|2|S0|273109096840aec2|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 24.445 Setting up connection for downloading https://server4:443/mpmlltlntl at 21:41.843 on ClientConnection[6c49fc4454c153ad/ce148b5a641d77b3(V1) with server4/193.167.100.100:443] 24.446 Original destination connection id: 6c49fc4454c153ad (scid: ce148b5a641d77b3) >- CryptoStream[I|ClientHello] 24.447 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.647/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.447 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.646 loss detection timeout handler running Sending probe 0, because no ack since 24.447. Current RTT: 100/25. 24.646 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.646 (Probe is an initial retransmit) 24.646 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.046/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.646 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.680 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 24.680 probe count not reset on ack because handshake not yet confirmed 24.681 Retransmitting CryptoFrame[0,257] on level Initial 24.681 Cwnd(-): 6000; inflight: 0 24.681 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.081/Initial, because peerAwaitingAddressValidation | RTT:100/25 24.681 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 24.875/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.681 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 24.680 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 24.683 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 24.877/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.683 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 24.683 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 24.683 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 24.683 - unsupported transport parameter 0x7158, size 1 (timestamp) 24.683 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 24.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 24.879/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.685 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.782/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.685 Starting downloading https://server4:443/mpmlltlntl at 21:42.082 on ClientConnection[6c49fc4454c153ad/ce148b5a641d77b3(V1) with server4/193.167.100.100:443] 24.685 Discarding pn space Initial because first Handshake message is being sent 24.685 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 24.686 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.783/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.686 -> Packet A|0|S0|63939bc8811aff22|47|1 StreamFrame[0(CIB),0,17,fin] 24.713 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.717 <- (3) Packet A|4|S0|ce148b5a641d77b3|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.717 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 24.782/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 24.808/App, because ackElicitingInFlight | RTT:33/16 24.717 Discarding pn space Handshake because HandshakeDone is received 24.736 -> Packet A|1|S0|63939bc8811aff22|32|1 AckFrame[4|Δ19] 24.789 <- (4) Packet A|7|S0|ce148b5a641d77b3|98|2 NewConnectionIdFrame[1,<0|7ae5dff3c989401c|b79a3b06469c0a96dbcd1d8661cbfeb3] NewTokenFrame[0104c4484c0b0e5d78fee0db7a3948ce36b63ac16b782e32e6c1107127abe2663df79ff12be9d2a4fd21] 24.807 loss detection timeout handler running Sending probe 0, because no ack since 24.686. Current RTT: 33/16. 24.807 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 25.051/App, because ackElicitingInFlight | RTT:33/16 24.807 -> Packet PA|2|S0|63939bc8811aff22|47|1 StreamFrame[0(CIB),0,17,fin] 24.809 -> Packet A|3|S0|63939bc8811aff22|34|1 AckFrame[7,4|Δ19] 24.839 <- (5) Packet A|8|S0|ce148b5a641d77b3|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 24.840 Cwnd(-): 3000; inflight: 0 24.840 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 24.840 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 24.950/App, because ackElicitingInFlight | RTT:33/13 24.840 -> Packet A|4|S0|63939bc8811aff22|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7|Δ0] 24.840 Finished downloading https://server4:443/mpmlltlntl at 21:42.237 on ClientConnection[6c49fc4454c153ad/ce148b5a641d77b3(V1) with server4/193.167.100.100:443] 24.840 Closing ClientConnection[6c49fc4454c153ad/ce148b5a641d77b3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.841 -> Packet A|5|S0|63939bc8811aff22|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 24.841 Creating connection with server4:443 with v1 24.841 Setting up connection for downloading https://server4:443/nvdxybauyw at 21:42.239 on ClientConnection[cf8deeeed9ca9d84/ca39e217ff730898(V1) with server4/193.167.100.100:443] 24.841 Original destination connection id: cf8deeeed9ca9d84 (scid: ca39e217ff730898) >- CryptoStream[I|ClientHello] 24.843 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.043/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.842 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.042 loss detection timeout handler running Sending probe 0, because no ack since 24.842. Current RTT: 100/25. 25.042 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.042 (Probe is an initial retransmit) 25.042 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.442/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.042 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.377 <- (1) Packet I|2|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 25.377 <- (1) Packet H|3|L|1076|2 CryptoFrame[0,711] Padding(319) 25.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 25.781/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.381 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 25.381 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 25.381 - unsupported transport parameter 0x7158, size 1 (timestamp) 25.381 - unsupported transport parameter 0x1057, size 1 (loss-bits) 25.380 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) >- CryptoStream[H|Finished] 25.383 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 25.783/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.383 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.384 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.584/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.384 Starting downloading https://server4:443/nvdxybauyw at 21:42.781 on ClientConnection[cf8deeeed9ca9d84/ca39e217ff730898(V1) with server4/193.167.100.100:443] 25.384 Discarding pn space Initial because first Handshake message is being sent 25.384 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 25.384 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.584/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.384 -> Packet A|0|S0|2e208aac7f324add|47|1 StreamFrame[0(CIB),0,17,fin] 25.415 <- (2) Packet H|5|L|47|1 AckFrame[0|Δ0] 25.416 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 25.416 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 25.415 <- (2) Packet A|6|S0|ca39e217ff730898|98|2 NewConnectionIdFrame[1,<0|38f61d9f0d770b83|9c1ef9c48685abbf074241d7ef4bcaac] NewTokenFrame[0121f29920c47b00537bc3afc401fc58caec70fe548740a2be5c7b828ccd4b0520e7ef03a068b5898041] 25.416 <- (3) Packet A|7|S0|ca39e217ff730898|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 25.416 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 25.416 -> Packet A|1|S0|2e208aac7f324add|31|1 AckFrame[7-6|Δ0] 25.417 Finished downloading https://server4:443/nvdxybauyw at 21:42.814 on ClientConnection[cf8deeeed9ca9d84/ca39e217ff730898(V1) with server4/193.167.100.100:443] 25.417 Closing ClientConnection[cf8deeeed9ca9d84/ca39e217ff730898(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.417 -> Packet A|2|S0|2e208aac7f324add|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0]