0.000 Creating connection with server4:443 with v1 0.081 Setting up connection for downloading https://server4:443/pjnrtgrflj at 25:36.065 on ClientConnection[de5764281a2e48d9/a50d8d883875555b(V1) with server4/193.167.100.100:443] 0.083 Original destination connection id: de5764281a2e48d9 (scid: a50d8d883875555b) >- CryptoStream[I|ClientHello] 0.259 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.460/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.255 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.460 loss detection timeout handler running Sending probe 0, because no ack since 0.255. Current RTT: 100/25. 0.461 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.463 (Probe is an initial retransmit) 0.466 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.867/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.466 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.505 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 0.518 probe count not reset on ack because handshake not yet confirmed 0.522 Retransmitting CryptoFrame[0,257] on level Initial 0.526 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.926/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.525 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.529 Cwnd(-): 6000; inflight: 0 0.530 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.930/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 0.554 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.783/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.554 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 0.505 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 0.559 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 0.560 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 0.560 - unsupported transport parameter 0x7158, size 1 (timestamp) 0.560 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 0.582 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.582 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.586 Starting downloading https://server4:443/pjnrtgrflj at 25:36.586 on ClientConnection[de5764281a2e48d9/a50d8d883875555b(V1) with server4/193.167.100.100:443] 0.588 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 0.591 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.705/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.592 Discarding pn space Initial because first Handshake message is being sent 0.610 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.724/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.609 -> Packet A|0|S0|efbe8b0d20ecf974|47|1 StreamFrame[0(CIB),0,17,fin] 0.614 <- (2) Packet A|4|S0|a50d8d883875555b|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 0.623 State is set to Confirmed reschedule loss detection timer for PTO over 72 millis, based on 0.696/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 125 millis, based on 0.748/App, because ackElicitingInFlight | RTT:38/19 0.623 Discarding pn space Handshake because HandshakeDone is received 0.625 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 0.644 -> Packet A|1|S0|efbe8b0d20ecf974|32|1 AckFrame[4|Δ19] 0.671 Discarding packet (1077 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 0.748 loss detection timeout handler running Sending probe 0, because no ack since 0.609. Current RTT: 38/19. 0.749 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 1.028/App, because ackElicitingInFlight | RTT:38/19 0.750 -> Packet PA|2|S0|efbe8b0d20ecf974|47|1 StreamFrame[0(CIB),0,17,fin] 0.779 <- (5) Packet A|8|S0|a50d8d883875555b|98|2 NewConnectionIdFrame[1,<0|a06985e269ec3f17|86543b273fbc7c6ff88d653a56d35cc6] NewTokenFrame[01b72c858dfd3e10ec4f897aebdea03a612ea3e76f0460f3f14282055e31e5aa1204b2bec1d0a718e59b] 0.782 <- (6) Packet A|9|S0|a50d8d883875555b|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 0.785 Cwnd(-): 3000; inflight: 0 0.786 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 0.786 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 125 millis, based on 0.912/App, because ackElicitingInFlight | RTT:37/16 0.786 -> Packet A|3|S0|efbe8b0d20ecf974|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8|Δ2] 0.788 Finished downloading https://server4:443/pjnrtgrflj at 25:36.787 on ClientConnection[de5764281a2e48d9/a50d8d883875555b(V1) with server4/193.167.100.100:443] 0.789 Closing ClientConnection[de5764281a2e48d9/a50d8d883875555b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.790 Creating connection with server4:443 with v1 0.791 Setting up connection for downloading https://server4:443/xbbojfzcnj at 25:36.791 on ClientConnection[84ea4022ce7c9139/b3781794454add99(V1) with server4/193.167.100.100:443] 0.792 Original destination connection id: 84ea4022ce7c9139 (scid: b3781794454add99) >- CryptoStream[I|ClientHello] 0.795 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.995/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.795 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.790 -> Packet A|4|S0|efbe8b0d20ecf974|36|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ4] 0.963 <- (7) Packet A|11|S0|a50d8d883875555b|35|1 AckFrame[3-1|Δ145] 0.964 <- (8) Packet A|12|S0|a50d8d883875555b|1055|1 StreamFrame[0(CIB),0,1024,fin] 0.965 -> Packet A|5|S0|efbe8b0d20ecf974|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 0.966 -> Packet A|6|S0|efbe8b0d20ecf974|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 0.994 loss detection timeout handler running Sending probe 0, because no ack since 0.795. Current RTT: 100/25. 0.995 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.995 (Probe is an initial retransmit) 0.996 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.396/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.996 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.129 <- (1) Packet I|2|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 1.129 <- (1) Packet H|3|L|1077|2 CryptoFrame[0,709] Padding(322) 1.135 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.535/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.135 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 1.135 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 1.135 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 1.135 - unsupported transport parameter 0x7158, size 1 (timestamp) 1.135 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 1.139 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.539/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.139 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.140 Starting downloading https://server4:443/xbbojfzcnj at 25:37.140 on ClientConnection[84ea4022ce7c9139/b3781794454add99(V1) with server4/193.167.100.100:443] 1.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.340/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.141 Discarding pn space Initial because first Handshake message is being sent 1.140 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 1.141 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.341/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.141 -> Packet A|0|S0|eaa54084291528ee|47|1 StreamFrame[0(CIB),0,17,fin] 1.167 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.171 <- (3) Packet A|5|S0|b3781794454add99|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.172 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 1.339/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 1.366/App, because ackElicitingInFlight | RTT:100/25 1.172 Discarding pn space Handshake because HandshakeDone is received 1.192 -> Packet A|1|S0|eaa54084291528ee|32|1 AckFrame[5|Δ19] 1.249 <- (4) Packet A|9|S0|b3781794454add99|33|1 AckFrame[1-0|Δ26] 1.251 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.250 <- (5) Packet A|10|S0|b3781794454add99|1054|1 StreamFrame[0(CIB),0,1024,fin] 1.252 Finished downloading https://server4:443/xbbojfzcnj at 25:37.252 on ClientConnection[84ea4022ce7c9139/b3781794454add99(V1) with server4/193.167.100.100:443] 1.252 Closing ClientConnection[84ea4022ce7c9139/b3781794454add99(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.253 Creating connection with server4:443 with v1 1.252 -> Packet A|2|S0|eaa54084291528ee|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9|Δ0] 1.253 Setting up connection for downloading https://server4:443/fxmcimkagb at 25:37.253 on ClientConnection[9da13cbaf5530d08/d82fab75e440b5f7(V1) with server4/193.167.100.100:443] 1.254 Original destination connection id: 9da13cbaf5530d08 (scid: d82fab75e440b5f7) >- CryptoStream[I|ClientHello] 1.256 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.456/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.256 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.284 <- (6) Packet A|12|S0|b3781794454add99|30|1 ConnectionCloseFrame[0|0|] 1.456 loss detection timeout handler running Sending probe 0, because no ack since 1.256. Current RTT: 100/25. 1.456 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.456 (Probe is an initial retransmit) 1.457 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.857/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.457 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.590 <- (1) Packet I|3|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 1.590 <- (1) Packet H|4|L|1076|2 CryptoFrame[0,710] Padding(320) 1.595 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.595 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 1.595 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) 1.596 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 1.596 - unsupported transport parameter 0x7158, size 1 (timestamp) 1.596 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 1.599 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.999/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.599 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.600 Starting downloading https://server4:443/fxmcimkagb at 25:37.600 on ClientConnection[9da13cbaf5530d08/d82fab75e440b5f7(V1) with server4/193.167.100.100:443] 1.600 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 1.600 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.800/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.600 Discarding pn space Initial because first Handshake message is being sent 1.601 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.801/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.601 -> Packet A|0|S0|abbb01278425071f|47|1 StreamFrame[0(CIB),0,17,fin] 1.628 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.631 <- (3) Packet A|6|S0|d82fab75e440b5f7|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.632 State is set to Confirmed reschedule loss detection timer for PTO over 166 millis, based on 1.799/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 1.826/App, because ackElicitingInFlight | RTT:100/25 1.632 Discarding pn space Handshake because HandshakeDone is received 1.652 -> Packet A|1|S0|abbb01278425071f|32|1 AckFrame[6|Δ19] 1.707 <- (4) Packet A|9|S0|d82fab75e440b5f7|98|2 NewConnectionIdFrame[1,<0|4e2ba918e06920c1|c0f0ecc4d589e7211b5f64fe7139192b] NewTokenFrame[01cc2ed759ca9ae3d352822d1877241ece68dfafc2bc6aa4dd73c53130f134b8378005a0d333c13e6a0f] 1.727 -> Packet A|2|S0|abbb01278425071f|34|1 AckFrame[9,6|Δ19] 1.825 loss detection timeout handler running Sending probe 0, because no ack since 1.601. Current RTT: 100/25. 1.826 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 2.276/App, because ackElicitingInFlight | RTT:100/25 1.826 -> Packet PA|3|S0|abbb01278425071f|47|1 StreamFrame[0(CIB),0,17,fin] 1.858 <- (5) Packet A|10|S0|d82fab75e440b5f7|1060|2 AckFrame[3-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 1.860 Cwnd(-): 6000; inflight: 0 1.860 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 1.860 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 120 millis, based on 1.981/App, because ackElicitingInFlight | RTT:32/16 1.860 -> Packet A|4|S0|abbb01278425071f|47|1 StreamFrame[0(CIB),0,17,fin] 1.860 Finished downloading https://server4:443/fxmcimkagb at 25:37.860 on ClientConnection[9da13cbaf5530d08/d82fab75e440b5f7(V1) with server4/193.167.100.100:443] 1.860 Closing ClientConnection[9da13cbaf5530d08/d82fab75e440b5f7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.861 Creating connection with server4:443 with v1 1.861 -> Packet A|5|S0|abbb01278425071f|36|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ1] 1.862 Setting up connection for downloading https://server4:443/skyaofjeuq at 25:37.862 on ClientConnection[f6ab8a00f633c067/5301a9aee5ffd4eb(V1) with server4/193.167.100.100:443] 1.862 Original destination connection id: f6ab8a00f633c067 (scid: 5301a9aee5ffd4eb) >- CryptoStream[I|ClientHello] 1.864 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.064/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.864 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.064 loss detection timeout handler running Sending probe 0, because no ack since 1.864. Current RTT: 100/25. 2.064 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.064 (Probe is an initial retransmit) 2.065 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.465/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.065 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.098 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 2.099 probe count not reset on ack because handshake not yet confirmed 2.099 Retransmitting CryptoFrame[0,257] on level Initial 2.099 Cwnd(-): 6000; inflight: 0 2.099 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.499/Initial, because peerAwaitingAddressValidation | RTT:100/25 2.100 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 2.294/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.100 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 2.098 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,709] Padding(321) 2.103 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.297/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.103 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 2.103 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 2.103 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 2.103 - unsupported transport parameter 0x7158, size 1 (timestamp) 2.104 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 2.107 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.301/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.107 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.108 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.205/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.108 Discarding pn space Initial because first Handshake message is being sent 2.108 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 2.108 Starting downloading https://server4:443/skyaofjeuq at 25:38.108 on ClientConnection[f6ab8a00f633c067/5301a9aee5ffd4eb(V1) with server4/193.167.100.100:443] 2.109 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.206/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.109 -> Packet A|0|S0|5c7120abeacd59f6|47|1 StreamFrame[0(CIB),0,17,fin] 2.132 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.135 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.139 <- (4) Packet H|4|L|47|1 AckFrame[1|Δ0] 2.144 loss detection timeout handler running 2.144 loss detection timeout handler running 2.144 Retransmitting CryptoFrame[0,36] on level Handshake 2.144 Cwnd(-): 3000; inflight: 47 2.144 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.144 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 2.145 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 2.241/Handshake, because ackElicitingInFlight | RTT:33/16 2.144 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[4|Δ0] 2.241 loss detection timeout handler running Sending probe 0, because no ack since 2.109. Current RTT: 33/16. 2.241 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.241 (Probe is a handshake retransmit) 2.242 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 193 millis, based on 2.436/Handshake, because ackElicitingInFlight | RTT:33/16 2.242 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 2.274 <- (5) Packet A|5|S0|5301a9aee5ffd4eb|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.275 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 2.353/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -43 millis, based on 2.231/App, because ackElicitingInFlight | RTT:33/16 2.275 loss detection timeout handler running 2.275 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 2.109. Current RTT: 33/16. 2.275 Discarding packet (147 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 2.275 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 2.520/App, because ackElicitingInFlight | RTT:33/16 2.276 -> Packet PA|1|S0|5c7120abeacd59f6|47|1 StreamFrame[0(CIB),0,17,fin] 2.295 -> Packet A|2|S0|5c7120abeacd59f6|32|1 AckFrame[5|Δ19] 2.357 <- (7) Packet A|8|S0|5301a9aee5ffd4eb|98|2 NewConnectionIdFrame[1,<0|77ceb644b5bb9489|f1b28e28aef8fea2fd83cad62576ea42] NewTokenFrame[01a6a6eb5a7ff13b58f58c92418f409ee9e77eb947f06913f738e0a4e186e52b9cca41a9942b0158804d] 2.376 -> Packet A|3|S0|5c7120abeacd59f6|34|1 AckFrame[8,5|Δ19] 2.519 loss detection timeout handler running Sending probe 1, because no ack since 2.276. Current RTT: 33/16. 2.519 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 3.008/App, because ackElicitingInFlight | RTT:33/16 2.520 -> Packet PA|4|S0|5c7120abeacd59f6|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 3.009/App, because ackElicitingInFlight | RTT:33/16 2.521 -> Packet PA|5|S0|5c7120abeacd59f6|47|1 StreamFrame[0(CIB),0,17,fin] 2.552 <- (8) Packet A|9|S0|5301a9aee5ffd4eb|1062|2 AckFrame[5,3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] 2.553 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 2.553 Cwnd(-): 2400; inflight: 47 2.553 -> Packet A|6|S0|5c7120abeacd59f6|47|1 StreamFrame[0(CIB),0,17,fin] 2.554 Finished downloading https://server4:443/skyaofjeuq at 25:38.554 on ClientConnection[f6ab8a00f633c067/5301a9aee5ffd4eb(V1) with server4/193.167.100.100:443] 2.554 Closing ClientConnection[f6ab8a00f633c067/5301a9aee5ffd4eb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.554 -> Packet A|7|S0|5c7120abeacd59f6|35|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 2.555 Creating connection with server4:443 with v1 2.555 Setting up connection for downloading https://server4:443/vldpxbragu at 25:38.555 on ClientConnection[efb4f69355379f00/6610fdb90918e4a8(V1) with server4/193.167.100.100:443] 2.555 Original destination connection id: efb4f69355379f00 (scid: 6610fdb90918e4a8) >- CryptoStream[I|ClientHello] 2.557 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.757/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.557 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.756 loss detection timeout handler running Sending probe 0, because no ack since 2.557. Current RTT: 100/25. 2.757 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.757 (Probe is an initial retransmit) 2.757 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.158/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.757 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.789 <- (1) Packet I|2|L|48|1 Token=[] AckFrame[1-0|Δ0] 2.790 probe count not reset on ack because handshake not yet confirmed 2.790 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.190/Initial, because peerAwaitingAddressValidation | RTT:100/25 3.189 loss detection timeout handler running Sending probe 1, because no ack since 2.757. Current RTT: 31/15. 3.190 Sending probe because peer awaiting address validation 3.190 (Probe is Initial ping, because there is no Initial data to retransmit) 3.191 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 363 millis, based on 3.555/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 3.191 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 3.191 <- (2) Packet I|5|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 3.191 <- (2) Packet H|6|L|1077|2 CryptoFrame[0,709] Padding(322) 3.195 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 3.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 3.195 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 3.195 -> Packet I|3|L|1201|2 Token=[] AckFrame[5,2|Δ0] Padding(1151) 3.195 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 3.195 - unsupported transport parameter 0x7158, size 1 (timestamp) 3.195 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 3.198 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 3.562/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 3.198 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.199 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.199 Starting downloading https://server4:443/vldpxbragu at 25:39.199 on ClientConnection[efb4f69355379f00/6610fdb90918e4a8(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 90 millis, based on 3.290/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 3.199 Discarding pn space Initial because first Handshake message is being sent 3.199 -> Packet H|1|L|46|1 AckFrame[6|Δ0] 3.200 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 3.291/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 3.199 -> Packet A|0|S0|f20d2285e50d4059|47|1 StreamFrame[0(CIB),0,17,fin] 3.230 <- (3) Packet A|8|S0|6610fdb90918e4a8|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.231 State is set to Confirmed reschedule loss detection timer for PTO over 57 millis, based on 3.289/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 84 millis, based on 3.315/App, because ackElicitingInFlight | RTT:31/15 3.231 Discarding pn space Handshake because HandshakeDone is received 3.231 <- (4) Packet A|11|S0|6610fdb90918e4a8|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 3.232 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.233 Finished downloading https://server4:443/vldpxbragu at 25:39.233 on ClientConnection[efb4f69355379f00/6610fdb90918e4a8(V1) with server4/193.167.100.100:443] 3.233 Closing ClientConnection[efb4f69355379f00/6610fdb90918e4a8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.233 -> Packet A|1|S0|f20d2285e50d4059|34|1 AckFrame[11,8|Δ1] 3.233 -> Packet A|2|S0|f20d2285e50d4059|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,8|Δ0] 3.234 Creating connection with server4:443 with v1 3.235 Setting up connection for downloading https://server4:443/ihpzyqumlm at 25:39.235 on ClientConnection[0113d235430dc0ec/12baf76228d6d7ef(V1) with server4/193.167.100.100:443] 3.235 Original destination connection id: 0113d235430dc0ec (scid: 12baf76228d6d7ef) >- CryptoStream[I|ClientHello] 3.237 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.437/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.237 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.436 loss detection timeout handler running Sending probe 0, because no ack since 3.237. Current RTT: 100/25. 3.436 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.436 (Probe is an initial retransmit) 3.437 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.837/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.437 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.469 <- (1) Packet I|2|L|48|1 Token=[] AckFrame[1-0|Δ0] 3.470 probe count not reset on ack because handshake not yet confirmed 3.470 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.870/Initial, because peerAwaitingAddressValidation | RTT:100/25 3.570 <- (2) Packet I|3|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 3.570 <- (2) Packet H|4|L|1076|2 CryptoFrame[0,710] Padding(320) 3.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 3.766/Handshake, because peerAwaitingAddressValidation | RTT:32/16 3.575 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 3.575 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 3.574 -> Packet I|2|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1153) 3.575 - unsupported transport parameter 0x7158, size 1 (timestamp) 3.575 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 3.578 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 3.770/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.578 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.579 Starting downloading https://server4:443/ihpzyqumlm at 25:39.579 on ClientConnection[0113d235430dc0ec/12baf76228d6d7ef(V1) with server4/193.167.100.100:443] 3.579 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 3.579 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 3.676/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.580 Discarding pn space Initial because first Handshake message is being sent 3.580 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 3.676/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.580 -> Packet A|0|S0|4e1b0d3d2b1a28b7|47|1 StreamFrame[0(CIB),0,17,fin] 3.606 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.610 <- (4) Packet H|6|L|47|1 AckFrame[1|Δ0] 3.613 loss detection timeout handler running 3.613 loss detection timeout handler running 3.614 loss detection timeout handler running 3.614 loss detection timeout handler running 3.614 loss detection timeout handler running 3.614 loss detection timeout handler running 3.614 loss detection timeout handler running 3.614 loss detection timeout handler running 3.614 Retransmitting CryptoFrame[0,36] on level Handshake 3.614 Cwnd(-): 6000; inflight: 47 3.614 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.614 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.615 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 95 millis, based on 3.710/Handshake, because ackElicitingInFlight | RTT:32/16 3.614 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[6|Δ0] 3.646 <- (5) Packet A|7|S0|12baf76228d6d7ef|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.648 State is set to Confirmed reschedule loss detection timer for PTO over 53 millis, based on 3.701/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 53 millis, based on 3.701/App, because ackElicitingInFlight | RTT:32/16 3.648 Discarding pn space Handshake because HandshakeDone is received 3.648 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 3.667 -> Packet A|1|S0|4e1b0d3d2b1a28b7|32|1 AckFrame[7|Δ19] 3.701 loss detection timeout handler running Sending probe 0, because no ack since 3.580. Current RTT: 32/16. 3.701 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 3.944/App, because ackElicitingInFlight | RTT:32/16 3.702 -> Packet PA|2|S0|4e1b0d3d2b1a28b7|47|1 StreamFrame[0(CIB),0,17,fin] 3.733 <- (7) Packet A|11|S0|12baf76228d6d7ef|1059|2 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024,fin] 3.734 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 3.734 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 104 millis, based on 3.840/App, because ackElicitingInFlight | RTT:32/12 3.735 Finished downloading https://server4:443/ihpzyqumlm at 25:39.735 on ClientConnection[0113d235430dc0ec/12baf76228d6d7ef(V1) with server4/193.167.100.100:443] 3.735 -> Packet A|3|S0|4e1b0d3d2b1a28b7|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7|Δ0] 3.735 Closing ClientConnection[0113d235430dc0ec/12baf76228d6d7ef(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.736 Creating connection with server4:443 with v1 3.736 -> Packet A|4|S0|4e1b0d3d2b1a28b7|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,7|Δ0] 3.737 Setting up connection for downloading https://server4:443/kelturilow at 25:39.737 on ClientConnection[2f25a0faad791aeb/ef94d9a63ce6e15a(V1) with server4/193.167.100.100:443] 3.737 Original destination connection id: 2f25a0faad791aeb (scid: ef94d9a63ce6e15a) >- CryptoStream[I|ClientHello] 3.738 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.939/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.738 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.767 <- (8) Packet A|12|S0|12baf76228d6d7ef|98|2 NewConnectionIdFrame[1,<0|84dae07aa4a5a275|d79a01e98377e19cf1973075a98f760a] NewTokenFrame[011221bb1fb9c1544b3689ccf154885fd87898ede0e6de5499e864a1e8c2aa8bf6f7e372bc494c447ab2] 3.767 <- (9) Packet A|13|S0|12baf76228d6d7ef|30|1 ConnectionCloseFrame[0|0|] 3.767 -> Packet A|5|S0|4e1b0d3d2b1a28b7|37|2 ConnectionCloseFrame[0|0|] AckFrame[11,7|Δ0] 3.771 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.772 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.972/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.771 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) reschedule loss detection timer for PTO over 96 millis, based on 3.872/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.775 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 3.778 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 3.778 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 3.778 - unsupported transport parameter 0x7158, size 1 (timestamp) 3.779 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 3.782 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.879/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.782 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.783 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.783 Discarding pn space Initial because first Handshake message is being sent 3.783 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 3.783 Starting downloading https://server4:443/kelturilow at 25:39.783 on ClientConnection[2f25a0faad791aeb/ef94d9a63ce6e15a(V1) with server4/193.167.100.100:443] 3.784 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.881/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.784 -> Packet A|0|S0|bb71953ce98e87b7|47|1 StreamFrame[0(CIB),0,17,fin] 3.807 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.814 <- (3) Packet A|3|S0|ef94d9a63ce6e15a|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.815 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 3.879/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 3.906/App, because ackElicitingInFlight | RTT:33/16 3.815 Discarding pn space Handshake because HandshakeDone is received 3.834 -> Packet A|1|S0|bb71953ce98e87b7|32|1 AckFrame[3|Δ19] 3.887 <- (4) Packet A|8|S0|ef94d9a63ce6e15a|1054|1 StreamFrame[0(CIB),0,1024,fin] 3.888 Finished downloading https://server4:443/kelturilow at 25:39.888 on ClientConnection[2f25a0faad791aeb/ef94d9a63ce6e15a(V1) with server4/193.167.100.100:443] 3.888 Closing ClientConnection[2f25a0faad791aeb/ef94d9a63ce6e15a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.889 Creating connection with server4:443 with v1 3.888 -> Packet A|2|S0|bb71953ce98e87b7|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3|Δ0] 3.889 Setting up connection for downloading https://server4:443/cqancyacyh at 25:39.889 on ClientConnection[308fbcc1645d6e68/fcd4492ca0f19ff3(V1) with server4/193.167.100.100:443] 3.889 Original destination connection id: 308fbcc1645d6e68 (scid: fcd4492ca0f19ff3) >- CryptoStream[I|ClientHello] 3.891 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.091/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.891 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.920 <- (5) Packet A|9|S0|ef94d9a63ce6e15a|98|2 NewConnectionIdFrame[1,<0|18bb3256cdf8bc66|d4557707d4385e155242308d3e28b2c1] NewTokenFrame[01ed26366efb92dce4f4100d3cd6cdd61ae87a840476b982e38abe663546705e35c4b0feaf5bdd7b3b71] 3.920 <- (6) Packet A|10|S0|ef94d9a63ce6e15a|30|1 ConnectionCloseFrame[0|0|] 3.921 -> Packet A|3|S0|bb71953ce98e87b7|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3|Δ0] 3.924 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.925 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.125/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.928 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.924 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) reschedule loss detection timer for PTO over 96 millis, based on 4.025/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.928 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 3.928 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 3.928 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 3.928 - unsupported transport parameter 0x7158, size 1 (timestamp) 3.928 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 3.932 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.029/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.932 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.932 Starting downloading https://server4:443/cqancyacyh at 25:39.932 on ClientConnection[308fbcc1645d6e68/fcd4492ca0f19ff3(V1) with server4/193.167.100.100:443] 3.932 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.029/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.932 Discarding pn space Initial because first Handshake message is being sent 3.932 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 3.933 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.030/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.933 -> Packet A|0|S0|9cd97be6ed52ba5d|47|1 StreamFrame[0(CIB),0,17,fin] 3.960 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.963 <- (3) Packet H|3|L|47|1 AckFrame[1|Δ0] 3.968 loss detection timeout handler running 3.968 loss detection timeout handler running 3.968 loss detection timeout handler running 3.968 loss detection timeout handler running 3.968 loss detection timeout handler running 3.969 loss detection timeout handler running 3.969 Retransmitting CryptoFrame[0,36] on level Handshake 3.969 Cwnd(-): 6000; inflight: 47 3.969 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.969 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.969 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 4.066/Handshake, because ackElicitingInFlight | RTT:33/16 3.969 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 4.001 <- (4) Packet A|4|S0|fcd4492ca0f19ff3|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 4.002 State is set to Confirmed reschedule loss detection timer for PTO over 53 millis, based on 4.055/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 53 millis, based on 4.055/App, because ackElicitingInFlight | RTT:33/16 4.002 Discarding pn space Handshake because HandshakeDone is received 4.021 -> Packet A|1|S0|9cd97be6ed52ba5d|32|1 AckFrame[4|Δ19] 4.055 loss detection timeout handler running Sending probe 0, because no ack since 3.933. Current RTT: 33/16. 4.055 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 4.299/App, because ackElicitingInFlight | RTT:33/16 4.055 -> Packet PA|2|S0|9cd97be6ed52ba5d|47|1 StreamFrame[0(CIB),0,17,fin] 4.081 <- (5) Packet A|7|S0|fcd4492ca0f19ff3|98|2 NewConnectionIdFrame[1,<0|df94d076365952e0|81b6fff4b89ded28df983251d2485aa8] NewTokenFrame[013874f370637b519942d06edd894148fd5282b97c1c768a7ab66c5ced8c21e86b5131d96b6d24e4c610] 4.087 <- (6) Packet A|8|S0|fcd4492ca0f19ff3|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 4.087 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.087 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 4.198/App, because ackElicitingInFlight | RTT:33/13 4.088 -> Packet A|3|S0|9cd97be6ed52ba5d|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7|Δ5] 4.088 Finished downloading https://server4:443/cqancyacyh at 25:40.088 on ClientConnection[308fbcc1645d6e68/fcd4492ca0f19ff3(V1) with server4/193.167.100.100:443] 4.088 Closing ClientConnection[308fbcc1645d6e68/fcd4492ca0f19ff3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.089 Creating connection with server4:443 with v1 4.088 -> Packet A|4|S0|9cd97be6ed52ba5d|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 4.089 Setting up connection for downloading https://server4:443/oqeakwxwux at 25:40.089 on ClientConnection[f1a40a701f6e8089/bd49c123301bbbf2(V1) with server4/193.167.100.100:443] 4.089 Original destination connection id: f1a40a701f6e8089 (scid: bd49c123301bbbf2) >- CryptoStream[I|ClientHello] 4.091 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.291/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.091 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.124 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.125 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.325/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.128 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.124 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) reschedule loss detection timer for PTO over 96 millis, based on 4.225/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.128 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 4.128 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 4.128 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 4.128 - unsupported transport parameter 0x7158, size 1 (timestamp) 4.128 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 4.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.228/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.130 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.131 Starting downloading https://server4:443/oqeakwxwux at 25:40.131 on ClientConnection[f1a40a701f6e8089/bd49c123301bbbf2(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 4.228/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.131 Discarding pn space Initial because first Handshake message is being sent 4.131 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 4.132 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.229/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.132 -> Packet A|0|S0|15a96eae5b1af0c1|47|1 StreamFrame[0(CIB),0,17,fin] 4.162 <- (2) Packet A|3|S0|bd49c123301bbbf2|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 4.163 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 4.227/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 4.254/App, because ackElicitingInFlight | RTT:33/16 4.163 Discarding pn space Handshake because HandshakeDone is received 4.163 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 4.183 -> Packet A|1|S0|15a96eae5b1af0c1|32|1 AckFrame[3|Δ19] 4.253 loss detection timeout handler running Sending probe 0, because no ack since 4.132. Current RTT: 33/16. 4.254 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 4.498/App, because ackElicitingInFlight | RTT:33/16 4.254 -> Packet PA|2|S0|15a96eae5b1af0c1|47|1 StreamFrame[0(CIB),0,17,fin] 4.294 <- (4) Packet A|9|S0|bd49c123301bbbf2|33|1 AckFrame[2-0|Δ9] 4.294 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.314 <- (5) Packet A|10|S0|bd49c123301bbbf2|1054|1 StreamFrame[0(CIB),0,1024,fin] 4.314 Finished downloading https://server4:443/oqeakwxwux at 25:40.315 on ClientConnection[f1a40a701f6e8089/bd49c123301bbbf2(V1) with server4/193.167.100.100:443] 4.315 Closing ClientConnection[f1a40a701f6e8089/bd49c123301bbbf2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.315 -> Packet A|3|S0|15a96eae5b1af0c1|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9|Δ0] 4.315 Creating connection with server4:443 with v1 4.316 Setting up connection for downloading https://server4:443/mylmizbepe at 25:40.316 on ClientConnection[10cfed4d80351932/ddf28fbb9db242bb(V1) with server4/193.167.100.100:443] 4.316 Original destination connection id: 10cfed4d80351932 (scid: ddf28fbb9db242bb) >- CryptoStream[I|ClientHello] 4.318 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.518/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.317 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.514 <- (6) Packet A|12|S0|bd49c123301bbbf2|98|2 NewConnectionIdFrame[1,<0|44b9881b8f1f1d94|6031f4be3babe2910965d4d6e91d6a7d] NewTokenFrame[01757d2f56f3fd1fde06d56b475b6c5e9a1fdaf570160e29730e739117bc4d2ae2108a7826a03c3df309] 4.515 <- (7) Packet A|13|S0|bd49c123301bbbf2|1054|1 StreamFrame[0(CIB),0,1024,fin] 4.515 -> Packet A|4|S0|15a96eae5b1af0c1|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9|Δ0] 4.515 -> Packet A|5|S0|15a96eae5b1af0c1|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9|Δ0] 4.517 loss detection timeout handler running Sending probe 0, because no ack since 4.317. Current RTT: 100/25. 4.517 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.517 (Probe is an initial retransmit) 4.517 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.917/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.517 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.550 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 4.551 probe count not reset on ack because handshake not yet confirmed 4.551 Retransmitting CryptoFrame[0,257] on level Initial 4.551 Cwnd(-): 6000; inflight: 0 4.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.951/Initial, because peerAwaitingAddressValidation | RTT:100/25 4.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 4.746/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.551 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 4.550 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) 4.554 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.748/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.554 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 4.554 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 4.554 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 4.554 - unsupported transport parameter 0x7158, size 1 (timestamp) 4.555 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 4.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.751/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.557 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.558 Starting downloading https://server4:443/mylmizbepe at 25:40.558 on ClientConnection[10cfed4d80351932/ddf28fbb9db242bb(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 4.655/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.558 Discarding pn space Initial because first Handshake message is being sent 4.558 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 4.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.655/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.558 -> Packet A|0|S0|f5e6cfc0bc796209|47|1 StreamFrame[0(CIB),0,17,fin] 4.586 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.588 <- (3) Packet A|3|S0|ddf28fbb9db242bb|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 4.589 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 4.654/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 4.680/App, because ackElicitingInFlight | RTT:33/16 4.590 Discarding pn space Handshake because HandshakeDone is received 4.590 <- (4) Packet A|6|S0|ddf28fbb9db242bb|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 4.590 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.591 Finished downloading https://server4:443/mylmizbepe at 25:40.591 on ClientConnection[10cfed4d80351932/ddf28fbb9db242bb(V1) with server4/193.167.100.100:443] 4.590 -> Packet A|1|S0|f5e6cfc0bc796209|33|1 AckFrame[6,3|Δ0] 4.591 Closing ClientConnection[10cfed4d80351932/ddf28fbb9db242bb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.591 -> Packet A|2|S0|f5e6cfc0bc796209|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 4.591 Creating connection with server4:443 with v1 4.592 Setting up connection for downloading https://server4:443/rpuyvajffo at 25:40.592 on ClientConnection[fdff02aaf3f138ac/c8f599c9ebe29a55(V1) with server4/193.167.100.100:443] 4.592 Original destination connection id: fdff02aaf3f138ac (scid: c8f599c9ebe29a55) >- CryptoStream[I|ClientHello] 4.593 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.793/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.593 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.622 <- (5) Packet A|7|S0|ddf28fbb9db242bb|98|2 NewConnectionIdFrame[1,<0|3b75e4bb8943106b|1f4de8b7c95db323c5b491bcb9dc9431] NewTokenFrame[01d2c7908702c78048f6b7c16f925d55afbde0fd852ccee163f68aae704ab7089ad3a55ccd41631dada4] 4.622 <- (6) Packet A|8|S0|ddf28fbb9db242bb|30|1 ConnectionCloseFrame[0|0|] 4.623 -> Packet A|3|S0|f5e6cfc0bc796209|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 4.792 loss detection timeout handler running Sending probe 0, because no ack since 4.593. Current RTT: 100/25. 4.793 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.793 (Probe is an initial retransmit) 4.793 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.193/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.793 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.826 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 4.827 probe count not reset on ack because handshake not yet confirmed 4.827 Retransmitting CryptoFrame[0,257] on level Initial 4.827 Cwnd(-): 6000; inflight: 0 4.827 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.227/Initial, because peerAwaitingAddressValidation | RTT:100/25 4.828 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 5.022/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.827 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 4.826 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,709] Padding(321) 4.830 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 5.024/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.830 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 4.830 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 4.830 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 4.830 - unsupported transport parameter 0x7158, size 1 (timestamp) 4.830 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.833 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.833 Starting downloading https://server4:443/rpuyvajffo at 25:40.833 on ClientConnection[fdff02aaf3f138ac/c8f599c9ebe29a55(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 4.930/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.833 Discarding pn space Initial because first Handshake message is being sent 4.833 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.930/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.833 -> Packet H|0|L|80|1 CryptoFrame[0,36] 4.834 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.931/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.834 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|db2b815b0ea2d681|47|1 StreamFrame[0(CIB),0,17,fin]] 4.865 <- (2) Packet A|3|S0|c8f599c9ebe29a55|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 4.866 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 4.930/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 4.956/App, because ackElicitingInFlight | RTT:33/16 4.866 Discarding pn space Handshake because HandshakeDone is received 4.866 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 4.885 -> Packet A|1|S0|db2b815b0ea2d681|32|1 AckFrame[3|Δ19] 4.956 loss detection timeout handler running Sending probe 0, because no ack since 4.834. Current RTT: 33/16. 4.956 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 5.200/App, because ackElicitingInFlight | RTT:33/16 4.956 -> Packet PA|2|S0|db2b815b0ea2d681|47|1 StreamFrame[0(CIB),0,17,fin] 4.997 <- (4) Packet A|7|S0|c8f599c9ebe29a55|34|1 AckFrame[2,0|Δ10] 4.998 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.532 <- (5) Packet A|8|S0|c8f599c9ebe29a55|36|1 AckFrame[2,0|Δ545] 5.533 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.613 <- (6) Packet A|10|S0|c8f599c9ebe29a55|1054|1 StreamFrame[0(CIB),0,1024,fin] 5.613 Finished downloading https://server4:443/rpuyvajffo at 25:41.613 on ClientConnection[fdff02aaf3f138ac/c8f599c9ebe29a55(V1) with server4/193.167.100.100:443] 5.613 Closing ClientConnection[fdff02aaf3f138ac/c8f599c9ebe29a55(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.614 -> Packet A|3|S0|db2b815b0ea2d681|39|2 ConnectionCloseFrame[0|0|] AckFrame[10,8-7,3|Δ0] 5.614 Creating connection with server4:443 with v1 5.615 Setting up connection for downloading https://server4:443/jqyxifdnsq at 25:41.615 on ClientConnection[bb285199dd7d79b1/b32197554f217bf9(V1) with server4/193.167.100.100:443] 5.615 Original destination connection id: bb285199dd7d79b1 (scid: b32197554f217bf9) >- CryptoStream[I|ClientHello] 5.617 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.817/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.617 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.645 <- (7) Packet A|11|S0|c8f599c9ebe29a55|98|2 NewConnectionIdFrame[1,<0|f50398dc8b8eda05|2e709aab21d22d9bf9628c499dd7cff2] NewTokenFrame[01231c642bd375267f35cb7c2cfd0559dc17057dbe82b30f058e6715c81b720014d4f68bfa5c71bf0475] 5.645 <- (8) Packet A|12|S0|c8f599c9ebe29a55|30|1 ConnectionCloseFrame[0|0|] 5.645 -> Packet A|4|S0|db2b815b0ea2d681|39|2 ConnectionCloseFrame[0|0|] AckFrame[10,8-7,3|Δ0] 5.816 loss detection timeout handler running Sending probe 0, because no ack since 5.617. Current RTT: 100/25. 5.816 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.816 (Probe is an initial retransmit) 5.817 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.217/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.817 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.151 <- (1) Packet I|2|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 6.151 <- (1) Packet H|3|L|1076|2 CryptoFrame[0,710] Padding(320) 6.155 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.155 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) reschedule loss detection timer for PTO over 399 millis, based on 6.555/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.155 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 6.155 - unsupported transport parameter 0x7158, size 1 (timestamp) 6.155 - unsupported transport parameter 0x1057, size 1 (loss-bits) 6.154 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) >- CryptoStream[H|Finished] 6.157 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.557/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.157 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.158 Starting downloading https://server4:443/jqyxifdnsq at 25:42.158 on ClientConnection[bb285199dd7d79b1/b32197554f217bf9(V1) with server4/193.167.100.100:443] 6.158 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 6.158 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.358/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.158 Discarding pn space Initial because first Handshake message is being sent 6.158 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.358/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.158 -> Packet A|0|S0|5900a27be674f49c|47|1 StreamFrame[0(CIB),0,17,fin] 6.186 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.357 loss detection timeout handler running Sending probe 0, because no ack since 6.157. Current RTT: 100/25. 6.358 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.358 (Probe is a handshake retransmit) 6.358 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.758/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.358 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 6.390 <- (3) Packet A|6|S0|b32197554f217bf9|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.390 State is set to Confirmed reschedule loss detection timer for PTO over 217 millis, based on 6.608/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -7 millis, based on 6.383/App, because ackElicitingInFlight | RTT:100/25 6.391 Discarding pn space Handshake because HandshakeDone is received 6.391 loss detection timeout handler running Sending probe 0, because no ack since 6.158. Current RTT: 100/25. 6.391 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 6.391 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 6.841/App, because ackElicitingInFlight | RTT:100/25 6.391 -> Packet PA|1|S0|5900a27be674f49c|47|1 StreamFrame[0(CIB),0,17,fin] 6.411 -> Packet A|2|S0|5900a27be674f49c|32|1 AckFrame[6|Δ19] 6.470 <- (5) Packet A|10|S0|b32197554f217bf9|33|1 AckFrame[2-1|Δ28] 6.471 Cwnd(-): 6000; inflight: 0 6.471 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.471 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.471 <- (6) Packet A|11|S0|b32197554f217bf9|1054|1 StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 224 millis, based on 6.696/App, because ackElicitingInFlight | RTT:100/25 6.471 -> Packet A|3|S0|5900a27be674f49c|47|1 StreamFrame[0(CIB),0,17,fin] 6.471 Finished downloading https://server4:443/jqyxifdnsq at 25:42.472 on ClientConnection[bb285199dd7d79b1/b32197554f217bf9(V1) with server4/193.167.100.100:443] 6.472 Closing ClientConnection[bb285199dd7d79b1/b32197554f217bf9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.472 -> Packet A|4|S0|5900a27be674f49c|35|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 6.472 Creating connection with server4:443 with v1 6.473 Setting up connection for downloading https://server4:443/iduxfhmfld at 25:42.473 on ClientConnection[a463caf0c120e867/aa8045f269f04b00(V1) with server4/193.167.100.100:443] 6.473 Original destination connection id: a463caf0c120e867 (scid: aa8045f269f04b00) >- CryptoStream[I|ClientHello] 6.474 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.674/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.474 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.507 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.508 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.708/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.507 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 6.511 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.608/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.510 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 6.511 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 6.511 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 6.511 - unsupported transport parameter 0x7158, size 1 (timestamp) 6.511 - unsupported transport parameter 0x1057, size 1 (loss-bits) 6.512 <- (7) Packet A|12|S0|b32197554f217bf9|33|1 AckFrame[3-1|Δ10] 6.512 -> Packet A|5|S0|5900a27be674f49c|35|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] >- CryptoStream[H|Finished] 6.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.611/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.514 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.514 Starting downloading https://server4:443/iduxfhmfld at 25:42.514 on ClientConnection[a463caf0c120e867/aa8045f269f04b00(V1) with server4/193.167.100.100:443] 6.515 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.515 Discarding pn space Initial because first Handshake message is being sent 6.515 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 6.515 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.515 -> Packet A|0|S0|414fc636473749e6|47|1 StreamFrame[0(CIB),0,17,fin] 6.543 <- (8) Packet A|13|S0|b32197554f217bf9|98|2 NewConnectionIdFrame[1,<0|05d5a69b39ce0c6e|df7d5d24779610ccb25e276719afa638] NewTokenFrame[01e529cdac77119c06250bd910d1e60ba00796b4037fabe693d0e1c18bc95a2c9614c0d9c7615398110e] 6.543 <- (9) Packet A|14|S0|b32197554f217bf9|30|1 ConnectionCloseFrame[0|0|] 6.544 -> Packet A|6|S0|5900a27be674f49c|35|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 6.546 <- (2) Packet A|3|S0|aa8045f269f04b00|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.546 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 6.611/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 6.637/App, because ackElicitingInFlight | RTT:33/16 6.546 Discarding pn space Handshake because HandshakeDone is received 6.546 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 6.566 -> Packet A|1|S0|414fc636473749e6|32|1 AckFrame[3|Δ19] 6.636 loss detection timeout handler running Sending probe 0, because no ack since 6.515. Current RTT: 33/16. 6.637 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 6.881/App, because ackElicitingInFlight | RTT:33/16 6.637 -> Packet PA|2|S0|414fc636473749e6|47|1 StreamFrame[0(CIB),0,17,fin] 6.677 <- (4) Packet A|9|S0|aa8045f269f04b00|34|1 AckFrame[2,0|Δ9] 6.677 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.690 <- (5) Packet A|10|S0|aa8045f269f04b00|1054|1 StreamFrame[0(CIB),0,1024,fin] 6.690 Finished downloading https://server4:443/iduxfhmfld at 25:42.690 on ClientConnection[a463caf0c120e867/aa8045f269f04b00(V1) with server4/193.167.100.100:443] 6.690 Closing ClientConnection[a463caf0c120e867/aa8045f269f04b00(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.691 -> Packet A|3|S0|414fc636473749e6|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,3|Δ0] 6.691 Creating connection with server4:443 with v1 6.691 Setting up connection for downloading https://server4:443/kinihspqei at 25:42.692 on ClientConnection[9d24592e478a11d9/de60ef48c267b495(V1) with server4/193.167.100.100:443] 6.692 Original destination connection id: 9d24592e478a11d9 (scid: de60ef48c267b495) >- CryptoStream[I|ClientHello] 6.693 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.893/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.693 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.722 <- (6) Packet A|11|S0|aa8045f269f04b00|32|1 AckFrame[3|Δ0] 6.722 <- (7) Packet A|13|S0|aa8045f269f04b00|30|1 ConnectionCloseFrame[0|0|] 6.722 -> Packet A|4|S0|414fc636473749e6|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,3|Δ0] 6.726 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.727 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.927/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.726 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,709] Padding(321) 6.730 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.827/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.730 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 6.730 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 6.730 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 6.730 - unsupported transport parameter 0x7158, size 1 (timestamp) 6.730 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 6.732 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 6.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.732 -> Packet H|0|L|80|1 CryptoFrame[0,36] 6.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.733 Discarding pn space Initial because first Handshake message is being sent 6.733 Starting downloading https://server4:443/kinihspqei at 25:42.733 on ClientConnection[9d24592e478a11d9/de60ef48c267b495(V1) with server4/193.167.100.100:443] 6.733 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 6.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.733 -> Packet A|0|S0|8b15023af227bf76|47|1 StreamFrame[0(CIB),0,17,fin] 6.762 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.763 <- (3) Packet H|3|L|47|1 AckFrame[1|Δ0] 6.769 loss detection timeout handler running 6.769 loss detection timeout handler running 6.769 loss detection timeout handler running 6.769 loss detection timeout handler running 6.769 loss detection timeout handler running 6.769 loss detection timeout handler running 6.769 loss detection timeout handler running 6.769 Retransmitting CryptoFrame[0,36] on level Handshake 6.770 Cwnd(-): 6000; inflight: 47 6.770 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 6.770 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 6.770 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 6.867/Handshake, because ackElicitingInFlight | RTT:33/16 6.770 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 6.802 <- (4) Packet H|5|L|47|1 AckFrame[2-1|Δ0] 6.802 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 6.802 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 6.802 <- (4) Packet A|6|S0|de60ef48c267b495|98|2 NewConnectionIdFrame[1,<0|5ccd05f2854f7abf|5ae92c6bd7a4e8c330146a0ebab828d9] NewTokenFrame[0130b7e48fb7b0e67c31798c61613f37f8d0e61d3b7e48452480bdb45660341898ae4b7d9edab89da66c] 6.822 -> Packet A|1|S0|8b15023af227bf76|32|1 AckFrame[6|Δ19] 6.881 <- (5) Packet A|7|S0|de60ef48c267b495|98|2 NewConnectionIdFrame[1,<0|5ccd05f2854f7abf|5ae92c6bd7a4e8c330146a0ebab828d9] NewTokenFrame[0130b7e48fb7b0e67c31798c61613f37f8d0e61d3b7e48452480bdb45660341898ae4b7d9edab89da66c] 6.901 -> Packet A|2|S0|8b15023af227bf76|32|1 AckFrame[7-6|Δ19] 7.038 <- (6) Packet A|9|S0|de60ef48c267b495|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.039 State is set to Confirmed 7.039 loss detection timeout handler running reschedule loss detection timer for PTO over -196 millis, based on 6.843/App, because ackElicitingInFlight | RTT:33/13 Sending probe 0, because no ack since 6.733. Current RTT: 33/13. 7.040 (Probe is retransmit on level App) reschedule loss detection timer for PTO over -196 millis, based on 6.843/App, because ackElicitingInFlight | RTT:33/13 7.040 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 109 millis, based on 7.150/App, because ackElicitingInFlight | RTT:33/13 7.040 -> Packet PA|3|S0|8b15023af227bf76|47|1 StreamFrame[0(CIB),0,17,fin] 7.059 -> Packet A|4|S0|8b15023af227bf76|34|1 AckFrame[9,7-6|Δ19] 7.072 <- (7) Packet A|10|S0|de60ef48c267b495|1060|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] 7.072 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.072 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 97 millis, based on 7.170/App, because ackElicitingInFlight | RTT:33/10 7.073 Finished downloading https://server4:443/kinihspqei at 25:43.073 on ClientConnection[9d24592e478a11d9/de60ef48c267b495(V1) with server4/193.167.100.100:443] 7.072 -> Packet A|5|S0|8b15023af227bf76|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[9|Δ0] 7.073 Closing ClientConnection[9d24592e478a11d9/de60ef48c267b495(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.073 -> Packet A|6|S0|8b15023af227bf76|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9|Δ0] 7.073 Creating connection with server4:443 with v1 7.074 Setting up connection for downloading https://server4:443/wsswpolhkq at 25:43.074 on ClientConnection[27c15c5c5213fea3/90b08e41f3ea38b1(V1) with server4/193.167.100.100:443] 7.074 Original destination connection id: 27c15c5c5213fea3 (scid: 90b08e41f3ea38b1) >- CryptoStream[I|ClientHello] 7.075 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.275/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.075 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.275 loss detection timeout handler running Sending probe 0, because no ack since 7.075. Current RTT: 100/25. 7.275 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.275 (Probe is an initial retransmit) 7.275 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.675/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.275 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.674 loss detection timeout handler running Sending probe 1, because no ack since 7.275. Current RTT: 100/25. 7.675 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.675 (Probe is an initial retransmit) 7.675 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.475/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.675 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.676 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.476/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.676 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.708 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 7.709 probe count not reset on ack because handshake not yet confirmed 7.709 Retransmitting CryptoFrame[0,257] on level Initial 7.709 Cwnd(-): 6000; inflight: 1200 7.709 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.509/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.710 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 8.098/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.709 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 7.708 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 7.712 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 8.100/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.712 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 7.712 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 7.712 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 7.712 - unsupported transport parameter 0x7158, size 1 (timestamp) 7.712 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 7.715 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 8.103/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.714 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.715 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.715 Starting downloading https://server4:443/wsswpolhkq at 25:43.715 on ClientConnection[27c15c5c5213fea3/90b08e41f3ea38b1(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 7.812/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.715 Discarding pn space Initial because first Handshake message is being sent 7.715 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 7.715 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.812/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.715 -> Packet A|0|S0|897d662dc03d1872|47|1 StreamFrame[0(CIB),0,17,fin] 7.741 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.746 <- (3) Packet H|5|L|47|1 AckFrame[0|Δ0] 7.747 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 7.747 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 7.746 <- (3) Packet A|6|S0|90b08e41f3ea38b1|98|2 NewConnectionIdFrame[1,<0|e686161935276325|007d044d22f1cb7410900fb551c1f46e] NewTokenFrame[01d41f3c570dbf7692718218f89bd32d232d1a6d69934724f1806abae98fbfd5da34c34f87b51c06ea22] 7.747 <- (4) Packet A|7|S0|90b08e41f3ea38b1|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 7.747 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.748 -> Packet A|1|S0|897d662dc03d1872|31|1 AckFrame[7-6|Δ0] 7.748 Finished downloading https://server4:443/wsswpolhkq at 25:43.748 on ClientConnection[27c15c5c5213fea3/90b08e41f3ea38b1(V1) with server4/193.167.100.100:443] 7.748 Closing ClientConnection[27c15c5c5213fea3/90b08e41f3ea38b1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.748 -> Packet A|2|S0|897d662dc03d1872|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 7.748 Creating connection with server4:443 with v1 7.749 Setting up connection for downloading https://server4:443/gqxyqxgpjm at 25:43.749 on ClientConnection[a2e87166ecf3e2d9/3eef494e32bb714d(V1) with server4/193.167.100.100:443] 7.749 Original destination connection id: a2e87166ecf3e2d9 (scid: 3eef494e32bb714d) >- CryptoStream[I|ClientHello] 7.750 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.950/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.750 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.779 <- (5) Packet A|8|S0|90b08e41f3ea38b1|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] 7.780 -> Packet A|3|S0|897d662dc03d1872|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 7.950 loss detection timeout handler running Sending probe 0, because no ack since 7.750. Current RTT: 100/25. 7.950 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.950 (Probe is an initial retransmit) 7.950 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.350/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.950 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.084 <- (1) Packet I|2|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 8.084 <- (1) Packet H|3|L|1077|2 CryptoFrame[0,710] Padding(321) 8.087 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.488/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.088 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 8.088 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 8.087 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 8.088 - unsupported transport parameter 0x7158, size 1 (timestamp) 8.088 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 8.090 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.490/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.090 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.090 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.090 Starting downloading https://server4:443/gqxyqxgpjm at 25:44.091 on ClientConnection[a2e87166ecf3e2d9/3eef494e32bb714d(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 199 millis, based on 8.290/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.090 Discarding pn space Initial because first Handshake message is being sent 8.090 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 8.091 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 8.291/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.091 -> Packet A|0|S0|b8392eacbdf92e3b|47|1 StreamFrame[0(CIB),0,17,fin] 8.290 loss detection timeout handler running Sending probe 0, because no ack since 8.090. Current RTT: 100/25. 8.290 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.290 (Probe is a handshake retransmit) 8.291 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.691/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.290 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 8.322 <- (2) Packet H|7|L|49|1 AckFrame[2,0|Δ0] 8.322 probe count not reset on ack because handshake not yet confirmed 8.322 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 8.322 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 8.789 <- (3) Packet A|9|S0|3eef494e32bb714d|98|2 NewConnectionIdFrame[1,<0|ef966130a3f3e4bd|bde4b6d1bdc045dc14577d3f343ece95] NewTokenFrame[01299284bf24386d2c99a893c9a2d8ed95712c14be0e71d8b484062e3f59829dc7b6b6829b719a50d4f5] 8.809 -> Packet A|1|S0|b8392eacbdf92e3b|32|1 AckFrame[9|Δ19] 8.840 <- (4) Packet A|10|S0|3eef494e32bb714d|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 8.841 State is set to Confirmed reschedule loss detection timer for PTO over -518 millis, based on 8.323/App, because ackElicitingInFlight | RTT:31/15 8.841 loss detection timeout handler running Sending probe 0, because no ack since 8.091. Current RTT: 31/15. reschedule loss detection timer for PTO over -634 millis, based on 8.207/App, because ackElicitingInFlight | RTT:31/15 8.841 Discarding pn space Handshake because HandshakeDone is received 8.841 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 9.073/App, because ackElicitingInFlight | RTT:31/15 8.841 -> Packet PA|2|S0|b8392eacbdf92e3b|47|1 StreamFrame[0(CIB),0,17,fin] 8.861 -> Packet A|3|S0|b8392eacbdf92e3b|32|1 AckFrame[10-9|Δ19] 8.873 <- (5) Packet A|11|S0|3eef494e32bb714d|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 8.874 Cwnd(-): 6000; inflight: 0 8.874 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.874 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 99 millis, based on 8.974/App, because ackElicitingInFlight | RTT:31/11 8.874 -> Packet A|4|S0|b8392eacbdf92e3b|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[10|Δ0] 8.874 Finished downloading https://server4:443/gqxyqxgpjm at 25:44.874 on ClientConnection[a2e87166ecf3e2d9/3eef494e32bb714d(V1) with server4/193.167.100.100:443] 8.874 Closing ClientConnection[a2e87166ecf3e2d9/3eef494e32bb714d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.874 -> Packet A|5|S0|b8392eacbdf92e3b|35|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 8.875 Creating connection with server4:443 with v1 8.875 Setting up connection for downloading https://server4:443/xnrrdbelao at 25:44.875 on ClientConnection[c755c29415e3bb27/e9b5d7e034dbc41e(V1) with server4/193.167.100.100:443] 8.875 Original destination connection id: c755c29415e3bb27 (scid: e9b5d7e034dbc41e) >- CryptoStream[I|ClientHello] 8.877 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.077/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.877 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.911 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.911 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.111/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.911 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 8.914 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.011/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.914 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 8.914 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 8.914 - unsupported transport parameter 0x7158, size 1 (timestamp) 8.913 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 8.914 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 8.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.014/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.916 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.917 Starting downloading https://server4:443/xnrrdbelao at 25:44.917 on ClientConnection[c755c29415e3bb27/e9b5d7e034dbc41e(V1) with server4/193.167.100.100:443] 8.917 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 8.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.014/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.917 -> Packet A|0|S0|3d70ffbdc4c72664|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 96 millis, based on 9.014/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.918 Discarding pn space Initial because first Handshake message is being sent 8.945 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.949 <- (3) Packet A|6|S0|e9b5d7e034dbc41e|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 8.950 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.047/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.950 Finished downloading https://server4:443/xnrrdbelao at 25:44.950 on ClientConnection[c755c29415e3bb27/e9b5d7e034dbc41e(V1) with server4/193.167.100.100:443] 8.950 Closing ClientConnection[c755c29415e3bb27/e9b5d7e034dbc41e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.950 -> Packet A|1|S0|3d70ffbdc4c72664|35|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 8.950 Creating connection with server4:443 with v1 8.951 Setting up connection for downloading https://server4:443/vcygxmwvqj at 25:44.951 on ClientConnection[c3ddbee8d49f58e5/e16ebc4586c34f31(V1) with server4/193.167.100.100:443] 8.951 Original destination connection id: c3ddbee8d49f58e5 (scid: e16ebc4586c34f31) >- CryptoStream[I|ClientHello] 8.952 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.152/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.952 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.982 <- (4) Packet A|7|S0|e9b5d7e034dbc41e|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] 8.982 <- (5) Packet A|8|S0|e9b5d7e034dbc41e|98|2 NewConnectionIdFrame[1,<0|a634bd227b6bf705|e2ffaa72539802e9690dd9a489cfaca2] NewTokenFrame[019a945e3dcd2c008af0840992dc360f28f1859f7d1c0247bd7e692bae5e5f6cba3676c2396964af4b8f] 8.982 -> Packet A|2|S0|3d70ffbdc4c72664|35|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 8.982 <- (6) Packet A|9|S0|e9b5d7e034dbc41e|30|1 ConnectionCloseFrame[0|0|] 8.983 -> Packet A|3|S0|3d70ffbdc4c72664|35|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 9.151 loss detection timeout handler running Sending probe 0, because no ack since 8.952. Current RTT: 100/25. 9.152 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.152 (Probe is an initial retransmit) 9.152 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.552/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.152 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.486 <- (1) Packet I|2|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 9.486 <- (1) Packet H|3|L|1076|2 CryptoFrame[0,709] Padding(321) 9.489 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.489 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 9.489 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 9.489 - unsupported transport parameter 0x7158, size 1 (timestamp) reschedule loss detection timer for PTO over 399 millis, based on 9.889/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.489 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 9.489 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 9.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 9.892/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.491 -> Packet H|0|L|80|1 CryptoFrame[0,36] 9.492 Starting downloading https://server4:443/vcygxmwvqj at 25:45.492 on ClientConnection[c3ddbee8d49f58e5/e16ebc4586c34f31(V1) with server4/193.167.100.100:443] 9.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.492 Discarding pn space Initial because first Handshake message is being sent 9.492 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 9.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.492 -> Packet A|0|S0|2ad3e89392ed7af4|47|1 StreamFrame[0(CIB),0,17,fin] 9.523 <- (2) Packet A|4|S0|e16ebc4586c34f31|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.524 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 9.691/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 9.717/App, because ackElicitingInFlight | RTT:100/25 9.524 Discarding pn space Handshake because HandshakeDone is received 9.524 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 9.524 <- (4) Packet A|7|S0|e16ebc4586c34f31|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 9.524 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.525 Finished downloading https://server4:443/vcygxmwvqj at 25:45.525 on ClientConnection[c3ddbee8d49f58e5/e16ebc4586c34f31(V1) with server4/193.167.100.100:443] 9.525 -> Packet A|1|S0|2ad3e89392ed7af4|33|1 AckFrame[7,4|Δ0] 9.525 Closing ClientConnection[c3ddbee8d49f58e5/e16ebc4586c34f31(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.525 -> Packet A|2|S0|2ad3e89392ed7af4|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,4|Δ0] 9.526 Creating connection with server4:443 with v1 9.526 Setting up connection for downloading https://server4:443/rdftxgqxsn at 25:45.526 on ClientConnection[ebc683e5fcd8355b/8c9653af024b9612(V1) with server4/193.167.100.100:443] 9.526 Original destination connection id: ebc683e5fcd8355b (scid: 8c9653af024b9612) >- CryptoStream[I|ClientHello] 9.527 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.727/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.527 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.556 <- (5) Packet A|8|S0|e16ebc4586c34f31|98|2 NewConnectionIdFrame[1,<0|757dda4f898b9c5a|4c0d992bdadae8b0371d989baeb6b9b9] NewTokenFrame[01625e4abb1166917137fe0645420ef82609fbeb055ee3ccf691b36f9da35de522ab6686a5a7c6b5daf6] 9.556 -> Packet A|3|S0|2ad3e89392ed7af4|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,4|Δ0] 9.727 loss detection timeout handler running Sending probe 0, because no ack since 9.527. Current RTT: 100/25. 9.727 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.727 (Probe is an initial retransmit) 9.727 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.127/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.727 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.861 <- (1) Packet I|3|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 9.861 <- (1) Packet H|4|L|1076|2 CryptoFrame[0,709] Padding(321) 9.865 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 10.265/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.865 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 9.864 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) 9.865 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 9.865 - unsupported transport parameter 0x7158, size 1 (timestamp) 9.865 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 9.867 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 10.267/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.867 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.868 Starting downloading https://server4:443/rdftxgqxsn at 25:45.868 on ClientConnection[ebc683e5fcd8355b/8c9653af024b9612(V1) with server4/193.167.100.100:443] 9.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.068/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.868 Discarding pn space Initial because first Handshake message is being sent 9.868 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 9.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.068/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.868 -> Packet A|0|S0|7d7c7179195bfaff|47|1 StreamFrame[0(CIB),0,17,fin] 9.899 <- (2) Packet A|6|S0|8c9653af024b9612|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.900 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 10.067/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 10.093/App, because ackElicitingInFlight | RTT:100/25 9.900 Discarding pn space Handshake because HandshakeDone is received 9.900 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 9.919 -> Packet A|1|S0|7d7c7179195bfaff|32|1 AckFrame[6|Δ19] 10.044 <- (4) Packet A|10|S0|8c9653af024b9612|98|2 NewConnectionIdFrame[1,<0|ee2ce2ba66119c74|4c5ab00ad8a547f6a84a3569b3b4cd27] NewTokenFrame[01c9bd214a58975b819ba86ef2b710fd36e905d2c4c8cda6269c6e77a5aa86dd2046f62889eaa193b91c] 10.064 -> Packet A|2|S0|7d7c7179195bfaff|34|1 AckFrame[10,6|Δ19] 10.093 loss detection timeout handler running Sending probe 0, because no ack since 9.868. Current RTT: 100/25. 10.093 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 10.543/App, because ackElicitingInFlight | RTT:100/25 10.093 -> Packet PA|3|S0|7d7c7179195bfaff|47|1 StreamFrame[0(CIB),0,17,fin] 10.203 <- (5) Packet A|12|S0|8c9653af024b9612|33|1 AckFrame[3-2|Δ79] 10.204 Cwnd(-): 6000; inflight: 0 10.204 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 10.204 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 354 millis, based on 10.559/App, because ackElicitingInFlight | RTT:110/55 10.204 <- (6) Packet A|13|S0|8c9653af024b9612|1055|1 StreamFrame[0(CIB),0,1024,fin] 10.204 -> Packet A|4|S0|7d7c7179195bfaff|47|1 StreamFrame[0(CIB),0,17,fin] 10.205 Finished downloading https://server4:443/rdftxgqxsn at 25:46.205 on ClientConnection[ebc683e5fcd8355b/8c9653af024b9612(V1) with server4/193.167.100.100:443] 10.205 Closing ClientConnection[ebc683e5fcd8355b/8c9653af024b9612(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.206 Creating connection with server4:443 with v1 10.206 -> Packet A|5|S0|7d7c7179195bfaff|36|2 ConnectionCloseFrame[0|0|] AckFrame[13-12|Δ1] 10.206 Setting up connection for downloading https://server4:443/ydlpznbjsc at 25:46.206 on ClientConnection[428e509ef5f92f15/440b6882d4c3093b(V1) with server4/193.167.100.100:443] 10.206 Original destination connection id: 428e509ef5f92f15 (scid: 440b6882d4c3093b) >- CryptoStream[I|ClientHello] 10.208 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.408/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.208 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.241 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 10.242 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.442/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.241 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 10.244 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.341/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.244 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 10.244 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 10.245 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 10.245 - unsupported transport parameter 0x7158, size 1 (timestamp) 10.245 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 10.247 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.344/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.247 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.247 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.247 Starting downloading https://server4:443/ydlpznbjsc at 25:46.247 on ClientConnection[428e509ef5f92f15/440b6882d4c3093b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 10.344/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.247 Discarding pn space Initial because first Handshake message is being sent 10.247 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 10.247 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.344/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.247 -> Packet A|0|S0|65c91064084f927a|47|1 StreamFrame[0(CIB),0,17,fin] 10.344 loss detection timeout handler running Sending probe 0, because no ack since 10.247. Current RTT: 33/16. 10.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.344 (Probe is a handshake retransmit) 10.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.538/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.344 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.376 <- (2) Packet A|2|S0|440b6882d4c3093b|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.376 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 10.491/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 10.369/App, because ackElicitingInFlight | RTT:33/16 10.376 loss detection timeout handler running 10.376 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 10.247. Current RTT: 33/16. 10.377 (Probe is retransmit on level App) 10.377 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) reschedule loss detection timer for PTO over 243 millis, based on 10.621/App, because ackElicitingInFlight | RTT:33/16 10.377 -> Packet PA|1|S0|65c91064084f927a|47|1 StreamFrame[0(CIB),0,17,fin] 10.396 -> Packet A|2|S0|65c91064084f927a|32|1 AckFrame[2|Δ19] 10.408 <- (4) Packet A|5|S0|440b6882d4c3093b|1059|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 10.409 Cwnd(-): 6000; inflight: 0 10.409 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 10.409 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 10.519/App, because ackElicitingInFlight | RTT:33/13 10.409 -> Packet A|3|S0|65c91064084f927a|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 10.409 Finished downloading https://server4:443/ydlpznbjsc at 25:46.410 on ClientConnection[428e509ef5f92f15/440b6882d4c3093b(V1) with server4/193.167.100.100:443] 10.410 Closing ClientConnection[428e509ef5f92f15/440b6882d4c3093b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.410 Creating connection with server4:443 with v1 10.410 -> Packet A|4|S0|65c91064084f927a|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 10.411 Setting up connection for downloading https://server4:443/ogcmwgozry at 25:46.411 on ClientConnection[1cef88fe6fd9e520/478af5e06eb8ccfa(V1) with server4/193.167.100.100:443] 10.411 Original destination connection id: 1cef88fe6fd9e520 (scid: 478af5e06eb8ccfa) >- CryptoStream[I|ClientHello] 10.412 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.612/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.412 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.440 <- (5) Packet A|6|S0|440b6882d4c3093b|34|1 AckFrame[3,1|Δ0] 10.440 -> Packet A|5|S0|65c91064084f927a|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 10.441 <- (6) Packet A|8|S0|440b6882d4c3093b|30|1 ConnectionCloseFrame[0|0|] 10.611 loss detection timeout handler running Sending probe 0, because no ack since 10.412. Current RTT: 100/25. 10.611 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.611 (Probe is an initial retransmit) 10.612 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.012/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.612 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.946 <- (1) Packet I|2|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 10.946 <- (1) Packet H|3|L|1076|2 CryptoFrame[0,711] Padding(319) 10.949 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.949 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 10.949 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 10.949 - unsupported transport parameter 0x7158, size 1 (timestamp) 10.949 - unsupported transport parameter 0x1057, size 1 (loss-bits) reschedule loss detection timer for PTO over 399 millis, based on 11.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.949 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) >- CryptoStream[H|Finished] 10.952 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 11.352/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.952 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.952 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.152/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.952 Starting downloading https://server4:443/ogcmwgozry at 25:46.953 on ClientConnection[1cef88fe6fd9e520/478af5e06eb8ccfa(V1) with server4/193.167.100.100:443] 10.952 Discarding pn space Initial because first Handshake message is being sent 10.952 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 10.953 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.153/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.953 -> Packet A|0|S0|a3888b42aa7f77fa|47|1 StreamFrame[0(CIB),0,17,fin] 10.981 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.984 <- (3) Packet A|5|S0|478af5e06eb8ccfa|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.984 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 11.152/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 11.178/App, because ackElicitingInFlight | RTT:100/25 10.984 Discarding pn space Handshake because HandshakeDone is received 10.984 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 11.004 -> Packet A|1|S0|a3888b42aa7f77fa|32|1 AckFrame[5|Δ19] 11.056 <- (5) Packet A|8|S0|478af5e06eb8ccfa|98|2 NewConnectionIdFrame[1,<0|c0d359b95e7d47a7|2bc6874bfd8c09ecae7b7ab3ce8dbf66] NewTokenFrame[016ce702f279fb6dfda0e73cf24569300190ae8cfce35ec640127502cbf4f5972297f9414f15174948de] 11.075 -> Packet A|2|S0|a3888b42aa7f77fa|34|1 AckFrame[8,5|Δ19] 11.177 loss detection timeout handler running Sending probe 0, because no ack since 10.953. Current RTT: 100/25. 11.178 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 11.628/App, because ackElicitingInFlight | RTT:100/25 11.178 -> Packet PA|3|S0|a3888b42aa7f77fa|47|1 StreamFrame[0(CIB),0,17,fin] 11.210 <- (6) Packet A|9|S0|478af5e06eb8ccfa|1060|2 AckFrame[3-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 11.210 Cwnd(-): 6000; inflight: 0 11.210 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 11.210 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 11.326/App, because ackElicitingInFlight | RTT:31/15 11.210 -> Packet A|4|S0|a3888b42aa7f77fa|47|1 StreamFrame[0(CIB),0,17,fin] 11.211 Finished downloading https://server4:443/ogcmwgozry at 25:47.211 on ClientConnection[1cef88fe6fd9e520/478af5e06eb8ccfa(V1) with server4/193.167.100.100:443] 11.211 Closing ClientConnection[1cef88fe6fd9e520/478af5e06eb8ccfa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.211 -> Packet A|5|S0|a3888b42aa7f77fa|35|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 11.211 Creating connection with server4:443 with v1 11.212 Setting up connection for downloading https://server4:443/oxeghvqthu at 25:47.212 on ClientConnection[96e518b14ef056dd/011b00ee822cc17d(V1) with server4/193.167.100.100:443] 11.212 Original destination connection id: 96e518b14ef056dd (scid: 011b00ee822cc17d) >- CryptoStream[I|ClientHello] 11.213 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.413/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.213 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.246 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 11.247 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.447/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.249 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.346/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.246 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 11.249 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 11.249 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 11.250 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 11.250 - unsupported transport parameter 0x7158, size 1 (timestamp) 11.250 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 11.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.251 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.252 Starting downloading https://server4:443/oxeghvqthu at 25:47.252 on ClientConnection[96e518b14ef056dd/011b00ee822cc17d(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 11.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.252 Discarding pn space Initial because first Handshake message is being sent 11.252 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 11.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.252 -> Packet A|0|S0|dd96dd6505e97938|47|1 StreamFrame[0(CIB),0,17,fin] 11.281 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 11.287 <- (7) Packet A|10|S0|478af5e06eb8ccfa|33|1 AckFrame[3-1|Δ78] 11.288 -> Packet A|6|S0|a3888b42aa7f77fa|35|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 11.288 <- (8) Packet A|11|S0|478af5e06eb8ccfa|1055|1 StreamFrame[0(CIB),0,1024,fin] 11.289 -> Packet A|7|S0|a3888b42aa7f77fa|35|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 11.318 <- (3) Packet H|7|L|1077|2 CryptoFrame[0,710] Padding(321) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.319 -> Packet H|2|L|48|1 AckFrame[7,1|Δ0] 11.348 loss detection timeout handler running Sending probe 0, because no ack since 11.251. Current RTT: 33/16. 11.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.349 (Probe is a handshake retransmit) 11.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.543/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.349 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 11.353 <- (4) Packet A|8|S0|011b00ee822cc17d|32|1 AckFrame[0|Δ70] 11.354 probe count not reset on ack because handshake not yet confirmed 11.354 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.548/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.354 <- (5) Packet A|9|S0|011b00ee822cc17d|1054|1 StreamFrame[0(CIB),0,1024,fin] 11.355 Finished downloading https://server4:443/oxeghvqthu at 25:47.355 on ClientConnection[96e518b14ef056dd/011b00ee822cc17d(V1) with server4/193.167.100.100:443] 11.355 Closing ClientConnection[96e518b14ef056dd/011b00ee822cc17d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.355 -> Packet A|1|S0|dd96dd6505e97938|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 11.355 Creating connection with server4:443 with v1 11.356 Setting up connection for downloading https://server4:443/tlbujvwdnq at 25:47.356 on ClientConnection[2fe1f6f90d41f60c/3fa3f1d026f1d1ff(V1) with server4/193.167.100.100:443] 11.356 Original destination connection id: 2fe1f6f90d41f60c (scid: 3fa3f1d026f1d1ff) >- CryptoStream[I|ClientHello] 11.358 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.558/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.357 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.379 <- (6) Packet H|10|L|50|1 AckFrame[3-2,0|Δ0] 11.380 -> Packet H|4|L|52|2 ConnectionCloseFrame[0|0|] AckFrame[7,1|Δ0] 11.387 <- (7) Packet A|11|S0|011b00ee822cc17d|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] 11.387 <- (8) Packet A|12|S0|011b00ee822cc17d|98|2 NewConnectionIdFrame[1,<0|d5ba163b84fd360b|daae1ab0bcba3d2dd3087c25ec179c5b] NewTokenFrame[010d6006e8a6f27a9bf706902b55b2cae2e22bc95b4f4694652afa67cde3d8a0d0b2efa46105d022278e] 11.387 -> Packet A|2|S0|dd96dd6505e97938|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 11.387 <- (9) Packet A|13|S0|011b00ee822cc17d|30|1 ConnectionCloseFrame[0|0|] 11.557 loss detection timeout handler running Sending probe 0, because no ack since 11.357. Current RTT: 100/25. 11.557 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.557 (Probe is an initial retransmit) 11.557 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.957/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.557 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.957 loss detection timeout handler running Sending probe 1, because no ack since 11.557. Current RTT: 100/25. 11.957 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.957 (Probe is an initial retransmit) 11.958 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 12.758/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.957 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.958 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 12.758/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.958 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.990 <- (1) Packet I|4|L|51|2 Token=[] AckFrame[3,0|Δ0] PingFrame[] 11.991 probe count not reset on ack because handshake not yet confirmed 11.991 Cwnd(-): 6000; inflight: 1200 11.991 -> Packet I|4|L|1201|2 Token=[] AckFrame[4|Δ0] Padding(1153) 11.992 <- (2) Packet I|5|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 11.992 <- (2) Packet H|6|L|1076|2 CryptoFrame[0,711] Padding(319) 11.995 -> Packet I|5|L|1201|2 Token=[] AckFrame[5-4|Δ0] Padding(1153) 11.995 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 11.995 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 11.995 - unsupported transport parameter 0x7158, size 1 (timestamp) 11.995 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 11.997 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.998 Starting downloading https://server4:443/tlbujvwdnq at 25:47.998 on ClientConnection[2fe1f6f90d41f60c/3fa3f1d026f1d1ff(V1) with server4/193.167.100.100:443] 11.998 -> Packet H|1|L|46|1 AckFrame[6|Δ0] 11.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 12.089/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 11.998 Discarding pn space Initial because first Handshake message is being sent 11.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 12.090/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 11.998 -> Packet A|0|S0|df75977f64215820|47|1 StreamFrame[0(CIB),0,17,fin] 12.027 Discarding packet (52 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 12.029 <- (4) Packet A|8|S0|3fa3f1d026f1d1ff|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.030 State is set to Confirmed reschedule loss detection timer for PTO over 58 millis, based on 12.088/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 84 millis, based on 12.114/App, because ackElicitingInFlight | RTT:31/15 12.030 Discarding pn space Handshake because HandshakeDone is received 12.030 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 12.049 -> Packet A|1|S0|df75977f64215820|32|1 AckFrame[8|Δ19] 12.063 Discarding packet (1076 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 12.100 <- (7) Packet A|12|S0|3fa3f1d026f1d1ff|98|2 NewConnectionIdFrame[1,<0|66c045a463c358df|b1edd8190279b570f618e53f30e462cf] NewTokenFrame[0149abd47d8e0842ab195e21952358ce57501aab4f95a9af9d6db48780c7cc8453e7e5b0aa1a71832193] 12.114 loss detection timeout handler running Sending probe 0, because no ack since 11.998. Current RTT: 31/15. 12.114 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 12.346/App, because ackElicitingInFlight | RTT:31/15 12.114 -> Packet PA|2|S0|df75977f64215820|47|1 StreamFrame[0(CIB),0,17,fin] 12.120 -> Packet A|3|S0|df75977f64215820|34|1 AckFrame[12,8|Δ19] 12.228 <- (8) Packet A|14|S0|3fa3f1d026f1d1ff|33|1 AckFrame[3-1|Δ77] 12.228 Cwnd(-): 3000; inflight: 0 12.228 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.228 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 12.344/App, because ackElicitingInFlight | RTT:31/15 12.228 -> Packet A|4|S0|df75977f64215820|47|1 StreamFrame[0(CIB),0,17,fin] 12.344 loss detection timeout handler running Sending probe 0, because no ack since 12.228. Current RTT: 31/15. 12.344 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 12.576/App, because ackElicitingInFlight | RTT:31/15 12.344 -> Packet PA|5|S0|df75977f64215820|47|1 StreamFrame[0(CIB),0,17,fin] 12.375 <- (9) Packet A|17|S0|3fa3f1d026f1d1ff|34|1 AckFrame[5,3-1|Δ0] 12.375 Cwnd(-): 2400; inflight: 0 12.375 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.375 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 103 millis, based on 12.479/App, because ackElicitingInFlight | RTT:31/12 12.375 -> Packet A|6|S0|df75977f64215820|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[14|Δ0] 12.479 loss detection timeout handler running Sending probe 0, because no ack since 12.375. Current RTT: 31/12. 12.479 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 207 millis, based on 12.687/App, because ackElicitingInFlight | RTT:31/12 12.479 -> Packet PA|7|S0|df75977f64215820|47|1 StreamFrame[0(CIB),0,17,fin] 12.498 <- (10) Packet A|18|S0|3fa3f1d026f1d1ff|35|1 AckFrame[5,3-1|Δ123] reschedule loss detection timer for PTO over 84 millis, based on 12.583/App, because ackElicitingInFlight | RTT:31/12 12.499 <- (11) Packet A|19|S0|3fa3f1d026f1d1ff|1055|1 StreamFrame[0(CIB),0,1024,fin] 12.499 Finished downloading https://server4:443/tlbujvwdnq at 25:48.500 on ClientConnection[2fe1f6f90d41f60c/3fa3f1d026f1d1ff(V1) with server4/193.167.100.100:443] 12.499 Closing ClientConnection[2fe1f6f90d41f60c/3fa3f1d026f1d1ff(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.500 Creating connection with server4:443 with v1 12.500 -> Packet A|8|S0|df75977f64215820|37|2 ConnectionCloseFrame[0|0|] AckFrame[19-17,14|Δ0] 12.501 Setting up connection for downloading https://server4:443/kvycdabpag at 25:48.501 on ClientConnection[2f7c69fa46a787e9/3a70e8fb1f4cb218(V1) with server4/193.167.100.100:443] 12.501 Original destination connection id: 2f7c69fa46a787e9 (scid: 3a70e8fb1f4cb218) >- CryptoStream[I|ClientHello] 12.502 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.702/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.502 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.510 <- (12) Packet A|20|S0|3fa3f1d026f1d1ff|36|1 AckFrame[7,5,3-1|Δ0] 12.510 -> Packet A|9|S0|df75977f64215820|37|2 ConnectionCloseFrame[0|0|] AckFrame[19-17,14|Δ0] 12.701 loss detection timeout handler running Sending probe 0, because no ack since 12.502. Current RTT: 100/25. 12.701 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.702 (Probe is an initial retransmit) 12.702 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.102/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.702 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.735 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 12.736 probe count not reset on ack because handshake not yet confirmed 12.736 Retransmitting CryptoFrame[0,257] on level Initial 12.736 Cwnd(-): 6000; inflight: 0 12.736 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.136/Initial, because peerAwaitingAddressValidation | RTT:100/25 12.736 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 12.930/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.736 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 12.735 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 12.738 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 12.932/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.738 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 12.739 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 12.739 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 12.739 - unsupported transport parameter 0x7158, size 1 (timestamp) 12.739 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 12.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 12.935/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.741 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.741 Starting downloading https://server4:443/kvycdabpag at 25:48.741 on ClientConnection[2f7c69fa46a787e9/3a70e8fb1f4cb218(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 12.838/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.741 Discarding pn space Initial because first Handshake message is being sent 12.741 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 12.742 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.839/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.741 -> Packet A|0|S0|8317846448c5bdff|47|1 StreamFrame[0(CIB),0,17,fin] 12.772 <- (2) Packet H|3|L|47|1 AckFrame[1|Δ0] 12.777 loss detection timeout handler running 12.777 loss detection timeout handler running 12.777 loss detection timeout handler running 12.777 loss detection timeout handler running 12.778 loss detection timeout handler running 12.778 loss detection timeout handler running 12.778 Retransmitting CryptoFrame[0,36] on level Handshake 12.778 Cwnd(-): 3000; inflight: 47 12.778 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 12.778 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 12.778 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 12.875/Handshake, because ackElicitingInFlight | RTT:33/16 12.778 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 12.810 <- (3) Packet A|4|S0|3a70e8fb1f4cb218|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.810 State is set to Confirmed reschedule loss detection timer for PTO over 53 millis, based on 12.863/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 53 millis, based on 12.863/App, because ackElicitingInFlight | RTT:33/16 12.810 Discarding pn space Handshake because HandshakeDone is received 12.810 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 12.830 -> Packet A|1|S0|8317846448c5bdff|32|1 AckFrame[4|Δ19] 12.863 loss detection timeout handler running Sending probe 0, because no ack since 12.741. Current RTT: 33/16. 12.863 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 13.108/App, because ackElicitingInFlight | RTT:33/16 12.864 -> Packet PA|2|S0|8317846448c5bdff|47|1 StreamFrame[0(CIB),0,17,fin] 12.967 <- (5) Packet A|8|S0|3a70e8fb1f4cb218|98|2 NewConnectionIdFrame[1,<0|af828b5968a0b48e|4a880f865cc03f068e2ee4f1f0e68b61] NewTokenFrame[01d93476d1e3666cfbf86a491572121850c79e266042fae6a482f2823680316b830d12dbd89e34ce4770] 12.987 -> Packet A|3|S0|8317846448c5bdff|34|1 AckFrame[8,4|Δ19] 13.107 loss detection timeout handler running Sending probe 1, because no ack since 12.864. Current RTT: 33/16. 13.107 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 13.595/App, because ackElicitingInFlight | RTT:33/16 13.107 -> Packet PA|4|S0|8317846448c5bdff|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 13.596/App, because ackElicitingInFlight | RTT:33/16 13.108 -> Packet PA|5|S0|8317846448c5bdff|47|1 StreamFrame[0(CIB),0,17,fin] 13.139 <- (6) Packet A|9|S0|3a70e8fb1f4cb218|1059|2 AckFrame[4|Δ0] StreamFrame[0(CIB),0,1024,fin] 13.139 Cwnd(-): 2400; inflight: 47 13.139 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 13.230/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 109 millis, based on 13.249/App, because ackElicitingInFlight | RTT:33/13 13.139 -> Packet A|6|S0|8317846448c5bdff|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8,4|Δ0] 13.140 Finished downloading https://server4:443/kvycdabpag at 25:49.140 on ClientConnection[2f7c69fa46a787e9/3a70e8fb1f4cb218(V1) with server4/193.167.100.100:443] 13.140 Closing ClientConnection[2f7c69fa46a787e9/3a70e8fb1f4cb218(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.140 -> Packet A|7|S0|8317846448c5bdff|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,4|Δ0] 13.141 Creating connection with server4:443 with v1 13.141 Setting up connection for downloading https://server4:443/pniostmhff at 25:49.141 on ClientConnection[8139a42067281d05/cfed7582b6f37f63(V1) with server4/193.167.100.100:443] 13.141 Original destination connection id: 8139a42067281d05 (scid: cfed7582b6f37f63) >- CryptoStream[I|ClientHello] 13.142 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.342/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.142 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.149 <- (7) Packet A|10|S0|3a70e8fb1f4cb218|32|1 AckFrame[5-4|Δ10] 13.149 -> Packet A|8|S0|8317846448c5bdff|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,4|Δ0] 13.169 <- (8) Packet A|12|S0|3a70e8fb1f4cb218|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] 13.169 <- (9) Packet A|13|S0|3a70e8fb1f4cb218|98|2 NewConnectionIdFrame[1,<0|af828b5968a0b48e|4a880f865cc03f068e2ee4f1f0e68b61] NewTokenFrame[01d93476d1e3666cfbf86a491572121850c79e266042fae6a482f2823680316b830d12dbd89e34ce4770] 13.169 -> Packet A|9|S0|8317846448c5bdff|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,4|Δ0] 13.170 <- (10) Packet A|14|S0|3a70e8fb1f4cb218|1054|1 StreamFrame[0(CIB),0,1024,fin] 13.170 -> Packet A|10|S0|8317846448c5bdff|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,4|Δ0] 13.176 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.176 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.376/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.176 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 13.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.275/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.178 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 13.178 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 13.178 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 13.178 - unsupported transport parameter 0x7158, size 1 (timestamp) 13.178 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 13.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.277/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.180 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.181 Starting downloading https://server4:443/pniostmhff at 25:49.181 on ClientConnection[8139a42067281d05/cfed7582b6f37f63(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 13.278/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.181 Discarding pn space Initial because first Handshake message is being sent 13.181 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 13.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.278/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.181 -> Packet A|0|S0|9d6ae5f646c7883e|47|1 StreamFrame[0(CIB),0,17,fin] 13.277 loss detection timeout handler running Sending probe 0, because no ack since 13.180. Current RTT: 33/16. 13.277 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.277 (Probe is a handshake retransmit) 13.277 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.471/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.277 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 13.309 <- (2) Packet A|4|S0|cfed7582b6f37f63|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.310 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 13.425/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 13.303/App, because ackElicitingInFlight | RTT:33/16 13.310 Discarding pn space Handshake because HandshakeDone is received 13.310 loss detection timeout handler running Sending probe 0, because no ack since 13.181. Current RTT: 33/16. 13.310 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 13.310 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 13.554/App, because ackElicitingInFlight | RTT:33/16 13.310 -> Packet PA|1|S0|9d6ae5f646c7883e|47|1 StreamFrame[0(CIB),0,17,fin] 13.329 -> Packet A|2|S0|9d6ae5f646c7883e|32|1 AckFrame[4|Δ19] 13.387 <- (4) Packet A|8|S0|cfed7582b6f37f63|33|1 AckFrame[2-1|Δ27] 13.388 Cwnd(-): 6000; inflight: 0 13.388 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.388 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 13.510/App, because ackElicitingInFlight | RTT:33/16 13.388 -> Packet A|3|S0|9d6ae5f646c7883e|47|1 StreamFrame[0(CIB),0,17,fin] 13.388 <- (5) Packet A|9|S0|cfed7582b6f37f63|1054|1 StreamFrame[0(CIB),0,1024,fin] 13.389 Finished downloading https://server4:443/pniostmhff at 25:49.389 on ClientConnection[8139a42067281d05/cfed7582b6f37f63(V1) with server4/193.167.100.100:443] 13.389 Closing ClientConnection[8139a42067281d05/cfed7582b6f37f63(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.389 -> Packet A|4|S0|9d6ae5f646c7883e|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 13.389 Creating connection with server4:443 with v1 13.390 Setting up connection for downloading https://server4:443/hmqcohqmzg at 25:49.390 on ClientConnection[435c61071f7dce50/8ca35cf49295eeb5(V1) with server4/193.167.100.100:443] 13.390 Original destination connection id: 435c61071f7dce50 (scid: 8ca35cf49295eeb5) >- CryptoStream[I|ClientHello] 13.391 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.591/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.391 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.420 <- (6) Packet A|10|S0|cfed7582b6f37f63|98|2 NewConnectionIdFrame[1,<0|8c5947125786b9cf|294aa6c472a1736c9f4e2650ab038258] NewTokenFrame[017ab6ec996cb8ecbc4c72e3f59ad4bdc4b9cd0b6fc71b924b7f921349b39b03c60abe655d1decb4a9f9] 13.420 <- (7) Packet A|11|S0|cfed7582b6f37f63|30|1 ConnectionCloseFrame[0|0|] 13.421 -> Packet A|5|S0|9d6ae5f646c7883e|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 13.424 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.425 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.625/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.424 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 13.427 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.524/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.427 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 13.427 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 13.427 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 13.427 - unsupported transport parameter 0x7158, size 1 (timestamp) 13.427 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 13.429 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.526/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.429 -> Packet H|0|L|80|1 CryptoFrame[0,36] 13.429 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.429 Starting downloading https://server4:443/hmqcohqmzg at 25:49.429 on ClientConnection[435c61071f7dce50/8ca35cf49295eeb5(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 13.526/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.429 Discarding pn space Initial because first Handshake message is being sent 13.429 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 13.430 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.527/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.430 -> Packet A|0|S0|fde2e47cfaac7b9a|47|1 StreamFrame[0(CIB),0,17,fin] 13.459 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.477 <- (3) Packet H|3|L|1077|2 CryptoFrame[0,710] Padding(321) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.478 -> Packet H|2|L|48|1 AckFrame[3,1|Δ0] 13.509 <- (4) Packet H|4|L|47|1 AckFrame[2|Δ0] 13.509 Retransmitting CryptoFrame[0,36] on level Handshake 13.509 Cwnd(-): 6000; inflight: 47 13.509 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 13.509 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 13.509 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 13.606/Handshake, because ackElicitingInFlight | RTT:33/16 13.509 -> Packet H|3|L|80|1 CryptoFrame[0,36] 13.541 <- (5) Packet A|5|S0|8ca35cf49295eeb5|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.541 State is set to Confirmed reschedule loss detection timer for PTO over 9 millis, based on 13.552/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 9 millis, based on 13.552/App, because ackElicitingInFlight | RTT:33/16 13.542 Discarding pn space Handshake because HandshakeDone is received 13.542 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 13.551 loss detection timeout handler running Sending probe 0, because no ack since 13.430. Current RTT: 33/16. 13.551 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 13.795/App, because ackElicitingInFlight | RTT:33/16 13.551 -> Packet PA|1|S0|fde2e47cfaac7b9a|47|1 StreamFrame[0(CIB),0,17,fin] 13.561 -> Packet A|2|S0|fde2e47cfaac7b9a|32|1 AckFrame[5|Δ19] 13.610 <- (7) Packet A|9|S0|8ca35cf49295eeb5|33|1 AckFrame[2-1|Δ18] 13.611 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.611 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 121 millis, based on 13.733/App, because ackElicitingInFlight | RTT:33/16 13.611 -> Packet A|3|S0|fde2e47cfaac7b9a|47|1 StreamFrame[0(CIB),0,17,fin] 13.651 <- (8) Packet A|11|S0|8ca35cf49295eeb5|33|1 AckFrame[3-1|Δ9] 13.651 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.689 <- (9) Packet A|12|S0|8ca35cf49295eeb5|1054|1 StreamFrame[0(CIB),0,1024,fin] 13.690 Finished downloading https://server4:443/hmqcohqmzg at 25:49.690 on ClientConnection[435c61071f7dce50/8ca35cf49295eeb5(V1) with server4/193.167.100.100:443] 13.690 Closing ClientConnection[435c61071f7dce50/8ca35cf49295eeb5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.690 -> Packet A|4|S0|fde2e47cfaac7b9a|37|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,9|Δ0] 13.690 Creating connection with server4:443 with v1 13.691 Setting up connection for downloading https://server4:443/vrpbgxpsew at 25:49.691 on ClientConnection[61d68258a2b9746e/dcf0c4c0df4082a6(V1) with server4/193.167.100.100:443] 13.691 Original destination connection id: 61d68258a2b9746e (scid: dcf0c4c0df4082a6) >- CryptoStream[I|ClientHello] 13.692 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.892/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.692 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.725 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.726 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.926/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.725 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 13.728 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.825/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.728 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 13.728 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 13.728 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 13.728 - unsupported transport parameter 0x7158, size 1 (timestamp) 13.728 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 13.730 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.827/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.730 -> Packet H|0|L|80|1 CryptoFrame[0,36] 13.730 Starting downloading https://server4:443/vrpbgxpsew at 25:49.730 on ClientConnection[61d68258a2b9746e/dcf0c4c0df4082a6(V1) with server4/193.167.100.100:443] 13.730 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.827/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.730 Discarding pn space Initial because first Handshake message is being sent 13.730 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 13.730 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.828/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.730 -> Packet A|0|S0|65779f49a2527f86|47|1 StreamFrame[0(CIB),0,17,fin] 13.761 <- (2) Packet H|3|L|47|1 AckFrame[1|Δ0] 13.766 loss detection timeout handler running 13.766 loss detection timeout handler running 13.766 loss detection timeout handler running 13.766 loss detection timeout handler running 13.766 loss detection timeout handler running 13.767 loss detection timeout handler running 13.767 loss detection timeout handler running 13.767 loss detection timeout handler running 13.767 loss detection timeout handler running 13.767 loss detection timeout handler running 13.767 loss detection timeout handler running 13.767 Retransmitting CryptoFrame[0,36] on level Handshake 13.767 Cwnd(-): 6000; inflight: 47 13.767 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 13.767 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 13.767 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 13.864/Handshake, because ackElicitingInFlight | RTT:33/16 13.767 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 13.799 <- (3) Packet H|5|L|47|1 AckFrame[2-1|Δ0] 13.799 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 13.799 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 13.799 <- (3) Packet A|6|S0|dcf0c4c0df4082a6|98|2 NewConnectionIdFrame[1,<0|1785c4034ca1970e|257a0f6a689241b9ea94d53607e25a15] NewTokenFrame[01f2ce21294c630c960ce8036b0030ac974f87aabe4ffef12e02f43921d52b8706b12487fe0970468a62] 13.819 -> Packet A|1|S0|65779f49a2527f86|32|1 AckFrame[6|Δ19] 13.850 <- (4) Packet A|7|S0|dcf0c4c0df4082a6|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.851 State is set to Confirmed reschedule loss detection timer for PTO over -10 millis, based on 13.840/App, because ackElicitingInFlight | RTT:33/13 13.851 loss detection timeout handler running Sending probe 0, because no ack since 13.730. Current RTT: 33/13. reschedule loss detection timer for PTO over -10 millis, based on 13.840/App, because ackElicitingInFlight | RTT:33/13 13.851 Discarding pn space Handshake because HandshakeDone is received 13.851 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 14.071/App, because ackElicitingInFlight | RTT:33/13 13.851 -> Packet PA|2|S0|65779f49a2527f86|47|1 StreamFrame[0(CIB),0,17,fin] 13.870 -> Packet A|3|S0|65779f49a2527f86|32|1 AckFrame[7-6|Δ19] 13.883 <- (5) Packet A|8|S0|dcf0c4c0df4082a6|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 13.883 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.883 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 97 millis, based on 13.981/App, because ackElicitingInFlight | RTT:33/10 13.883 -> Packet A|4|S0|65779f49a2527f86|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7|Δ0] 13.884 Finished downloading https://server4:443/vrpbgxpsew at 25:49.884 on ClientConnection[61d68258a2b9746e/dcf0c4c0df4082a6(V1) with server4/193.167.100.100:443] 13.884 Closing ClientConnection[61d68258a2b9746e/dcf0c4c0df4082a6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.884 -> Packet A|5|S0|65779f49a2527f86|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 13.884 Creating connection with server4:443 with v1 13.885 Setting up connection for downloading https://server4:443/sopcshqbuz at 25:49.885 on ClientConnection[a3c5aab3d04d098e/5bd298693cb40d1e(V1) with server4/193.167.100.100:443] 13.885 Original destination connection id: a3c5aab3d04d098e (scid: 5bd298693cb40d1e) >- CryptoStream[I|ClientHello] 13.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.086/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.886 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.889 <- (10) Packet A|14|S0|8ca35cf49295eeb5|98|2 NewConnectionIdFrame[1,<0|2b6236b3dd3561b7|92aa75acbc74148ec689656832bffe85] NewTokenFrame[01f835b8f0bb13810bc29ed468a6838f3a1fb8417d731c509f27144fcd1d9f88d9426a45add104b9e44f] 13.890 -> Packet A|5|S0|fde2e47cfaac7b9a|37|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,9|Δ0] 13.890 <- (11) Packet A|15|S0|8ca35cf49295eeb5|1054|1 StreamFrame[0(CIB),0,1024,fin] 13.891 -> Packet A|6|S0|fde2e47cfaac7b9a|37|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,9|Δ0] 14.085 loss detection timeout handler running Sending probe 0, because no ack since 13.886. Current RTT: 100/25. 14.085 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.086 (Probe is an initial retransmit) 14.086 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.486/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.086 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.119 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 14.120 probe count not reset on ack because handshake not yet confirmed 14.120 Retransmitting CryptoFrame[0,257] on level Initial 14.120 Cwnd(-): 6000; inflight: 0 14.120 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.520/Initial, because peerAwaitingAddressValidation | RTT:100/25 14.120 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 14.314/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.120 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 14.119 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 14.123 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.317/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.123 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 14.123 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 14.123 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 14.123 - unsupported transport parameter 0x7158, size 1 (timestamp) 14.123 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 14.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.319/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.125 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.126 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.126 Starting downloading https://server4:443/sopcshqbuz at 25:50.126 on ClientConnection[a3c5aab3d04d098e/5bd298693cb40d1e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 14.223/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.126 Discarding pn space Initial because first Handshake message is being sent 14.126 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 14.126 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.223/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.126 -> Packet A|0|S0|4f62fbaf0127956e|47|1 StreamFrame[0(CIB),0,17,fin] 14.152 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 14.157 <- (3) Packet A|4|S0|5bd298693cb40d1e|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.157 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 14.222/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 14.248/App, because ackElicitingInFlight | RTT:33/16 14.157 Discarding pn space Handshake because HandshakeDone is received 14.158 <- (4) Packet A|7|S0|5bd298693cb40d1e|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 14.158 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.159 Finished downloading https://server4:443/sopcshqbuz at 25:50.159 on ClientConnection[a3c5aab3d04d098e/5bd298693cb40d1e(V1) with server4/193.167.100.100:443] 14.158 -> Packet A|1|S0|4f62fbaf0127956e|33|1 AckFrame[7,4|Δ0] 14.159 Closing ClientConnection[a3c5aab3d04d098e/5bd298693cb40d1e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.159 -> Packet A|2|S0|4f62fbaf0127956e|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,4|Δ0] 14.159 Creating connection with server4:443 with v1 14.160 Setting up connection for downloading https://server4:443/jpcctgbbmz at 25:50.160 on ClientConnection[6fe7bccbbf89b67d/7b46f89c05351065(V1) with server4/193.167.100.100:443] 14.160 Original destination connection id: 6fe7bccbbf89b67d (scid: 7b46f89c05351065) >- CryptoStream[I|ClientHello] 14.161 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.361/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.161 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.194 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.195 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.395/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.198 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.194 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) reschedule loss detection timer for PTO over 96 millis, based on 14.295/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.198 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 14.198 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 14.198 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 14.198 - unsupported transport parameter 0x7158, size 1 (timestamp) 14.198 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 14.200 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.297/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.200 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.201 Starting downloading https://server4:443/jpcctgbbmz at 25:50.201 on ClientConnection[6fe7bccbbf89b67d/7b46f89c05351065(V1) with server4/193.167.100.100:443] 14.201 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 14.201 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.298/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.201 Discarding pn space Initial because first Handshake message is being sent 14.202 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.299/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.201 -> Packet A|0|S0|92570471ce11cbd7|47|1 StreamFrame[0(CIB),0,17,fin] 14.232 <- (2) Packet A|2|S0|7b46f89c05351065|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.233 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 14.297/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 14.323/App, because ackElicitingInFlight | RTT:33/16 14.233 Discarding pn space Handshake because HandshakeDone is received 14.233 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 14.233 <- (4) Packet A|5|S0|7b46f89c05351065|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 14.233 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.234 -> Packet A|1|S0|92570471ce11cbd7|33|1 AckFrame[5,2|Δ0] 14.234 Finished downloading https://server4:443/jpcctgbbmz at 25:50.234 on ClientConnection[6fe7bccbbf89b67d/7b46f89c05351065(V1) with server4/193.167.100.100:443] 14.234 Closing ClientConnection[6fe7bccbbf89b67d/7b46f89c05351065(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.234 -> Packet A|2|S0|92570471ce11cbd7|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 14.234 Creating connection with server4:443 with v1 14.235 Setting up connection for downloading https://server4:443/zitfuslrrx at 25:50.235 on ClientConnection[fb9c98a064a3e3e6/2013ff3ff0a28013(V1) with server4/193.167.100.100:443] 14.235 Original destination connection id: fb9c98a064a3e3e6 (scid: 2013ff3ff0a28013) >- CryptoStream[I|ClientHello] 14.236 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.436/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.236 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.265 <- (5) Packet A|6|S0|7b46f89c05351065|98|2 NewConnectionIdFrame[1,<0|ae0496c75aa663a7|1be2c0c1818a47305b45afe578236851] NewTokenFrame[01520674c4765f9ed0b410321e0a86f6cf24a549f9a71c7b0bc7f40dfaa91aefb61b26dff4bab1e0ce0c] 14.265 <- (6) Packet A|7|S0|7b46f89c05351065|30|1 ConnectionCloseFrame[0|0|] 14.266 -> Packet A|3|S0|92570471ce11cbd7|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 14.269 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.270 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.470/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.269 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) 14.272 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.369/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.272 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 14.272 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 14.272 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 14.272 - unsupported transport parameter 0x7158, size 1 (timestamp) 14.272 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 14.274 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.371/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.274 -> Packet H|0|L|80|1 CryptoFrame[0,36] 14.274 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.274 Starting downloading https://server4:443/zitfuslrrx at 25:50.274 on ClientConnection[fb9c98a064a3e3e6/2013ff3ff0a28013(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 14.371/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.274 Discarding pn space Initial because first Handshake message is being sent 14.274 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 14.274 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.371/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.274 -> Packet A|0|S0|b6b86eea06d2acf9|47|1 StreamFrame[0(CIB),0,17,fin] 14.305 <- (2) Packet A|2|S0|2013ff3ff0a28013|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.306 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 14.371/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 14.396/App, because ackElicitingInFlight | RTT:33/16 14.306 Discarding pn space Handshake because HandshakeDone is received 14.306 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 14.325 -> Packet A|1|S0|b6b86eea06d2acf9|32|1 AckFrame[2|Δ19] 14.396 loss detection timeout handler running Sending probe 0, because no ack since 14.274. Current RTT: 33/16. 14.396 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 14.640/App, because ackElicitingInFlight | RTT:33/16 14.396 -> Packet PA|2|S0|b6b86eea06d2acf9|47|1 StreamFrame[0(CIB),0,17,fin] 14.435 <- (4) Packet A|6|S0|2013ff3ff0a28013|33|1 AckFrame[2-0|Δ8] 14.436 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.973 <- (5) Packet A|7|S0|2013ff3ff0a28013|35|1 AckFrame[2-0|Δ546] 14.974 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.974 <- (6) Packet A|8|S0|2013ff3ff0a28013|1054|1 StreamFrame[0(CIB),0,1024,fin] 14.974 Finished downloading https://server4:443/zitfuslrrx at 25:50.975 on ClientConnection[fb9c98a064a3e3e6/2013ff3ff0a28013(V1) with server4/193.167.100.100:443] 14.975 Closing ClientConnection[fb9c98a064a3e3e6/2013ff3ff0a28013(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.975 -> Packet A|3|S0|b6b86eea06d2acf9|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ0] 14.975 Creating connection with server4:443 with v1 14.976 Setting up connection for downloading https://server4:443/fzjclldyaz at 25:50.976 on ClientConnection[105ec03e4b48b061/a1e28133ee32f676(V1) with server4/193.167.100.100:443] 14.976 Original destination connection id: 105ec03e4b48b061 (scid: a1e28133ee32f676) >- CryptoStream[I|ClientHello] 14.977 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.177/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.977 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.010 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.211/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.010 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 15.014 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.111/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.014 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 15.013 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 15.014 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 15.014 - unsupported transport parameter 0x7158, size 1 (timestamp) 15.014 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 15.016 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.113/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.016 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.016 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.016 Starting downloading https://server4:443/fzjclldyaz at 25:51.017 on ClientConnection[105ec03e4b48b061/a1e28133ee32f676(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 15.113/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.016 Discarding pn space Initial because first Handshake message is being sent 15.016 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 15.017 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.114/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.017 -> Packet A|0|S0|2c0bd818b80401d1|47|1 StreamFrame[0(CIB),0,17,fin] 15.038 <- (7) Packet A|9|S0|2013ff3ff0a28013|1054|1 StreamFrame[0(CIB),0,1024,fin] 15.039 -> Packet A|4|S0|b6b86eea06d2acf9|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ0] 15.045 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.047 <- (3) Packet H|3|L|47|1 AckFrame[1|Δ0] 15.052 loss detection timeout handler running 15.053 loss detection timeout handler running 15.053 loss detection timeout handler running 15.053 loss detection timeout handler running 15.053 loss detection timeout handler running 15.053 loss detection timeout handler running 15.053 loss detection timeout handler running 15.053 loss detection timeout handler running 15.053 loss detection timeout handler running 15.053 Retransmitting CryptoFrame[0,36] on level Handshake 15.053 Cwnd(-): 6000; inflight: 47 15.053 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.053 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 15.053 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 15.150/Handshake, because ackElicitingInFlight | RTT:33/16 15.053 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 15.069 <- (8) Packet A|10|S0|2013ff3ff0a28013|98|2 NewConnectionIdFrame[1,<0|a5bcbf7feb3ae0a2|995395d7f5081fc94df0a88d72962a4e] NewTokenFrame[0106a4f55d9dc347e050bcf1ba9ae80cdbfd5029d2da2f9e513d670f083c28d7c4b0229fcbb4a4e0c752] 15.070 -> Packet A|5|S0|b6b86eea06d2acf9|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ0] 15.085 <- (4) Packet A|4|S0|a1e28133ee32f676|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.086 State is set to Confirmed reschedule loss detection timer for PTO over 53 millis, based on 15.139/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 53 millis, based on 15.139/App, because ackElicitingInFlight | RTT:33/16 15.086 Discarding pn space Handshake because HandshakeDone is received 15.086 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 15.105 -> Packet A|1|S0|2c0bd818b80401d1|32|1 AckFrame[4|Δ19] 15.139 loss detection timeout handler running Sending probe 0, because no ack since 15.017. Current RTT: 33/16. 15.139 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 15.383/App, because ackElicitingInFlight | RTT:33/16 15.139 -> Packet PA|2|S0|2c0bd818b80401d1|47|1 StreamFrame[0(CIB),0,17,fin] 15.165 <- (6) Packet A|7|S0|a1e28133ee32f676|98|2 NewConnectionIdFrame[1,<0|5f124628344b5616|ecf80e3be103e13926e93570359c1b65] NewTokenFrame[010a6102147ce0540864cd79d0e09eb82a7b9e091b7066608dc448f0ce820e9685b599565feb97928f7f] 15.185 -> Packet A|3|S0|2c0bd818b80401d1|34|1 AckFrame[7,4|Δ19] 15.245 <- (7) Packet A|10|S0|a1e28133ee32f676|1055|1 StreamFrame[0(CIB),0,1024,fin] 15.246 Finished downloading https://server4:443/fzjclldyaz at 25:51.246 on ClientConnection[105ec03e4b48b061/a1e28133ee32f676(V1) with server4/193.167.100.100:443] 15.246 Closing ClientConnection[105ec03e4b48b061/a1e28133ee32f676(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.246 -> Packet A|4|S0|2c0bd818b80401d1|39|2 ConnectionCloseFrame[0|0|] AckFrame[10,7,4|Δ0] 15.246 Creating connection with server4:443 with v1 15.247 Setting up connection for downloading https://server4:443/eunmgavlcp at 25:51.247 on ClientConnection[bffcbd9eacad160e/a4cbad3cd897e13a(V1) with server4/193.167.100.100:443] 15.247 Original destination connection id: bffcbd9eacad160e (scid: a4cbad3cd897e13a) >- CryptoStream[I|ClientHello] 15.248 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.448/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.248 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.282 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.282 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.482/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.282 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) reschedule loss detection timer for PTO over 96 millis, based on 15.382/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.286 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 15.286 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 15.285 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 15.286 - unsupported transport parameter 0x7158, size 1 (timestamp) 15.286 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 15.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.385/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.288 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.385/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.288 Discarding pn space Initial because first Handshake message is being sent 15.288 Starting downloading https://server4:443/eunmgavlcp at 25:51.288 on ClientConnection[bffcbd9eacad160e/a4cbad3cd897e13a(V1) with server4/193.167.100.100:443] 15.288 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 15.289 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.386/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.289 -> Packet A|0|S0|dfd93a20cec8b050|47|1 StreamFrame[0(CIB),0,17,fin] 15.317 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.319 <- (3) Packet A|3|S0|a4cbad3cd897e13a|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.320 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 15.385/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 15.411/App, because ackElicitingInFlight | RTT:33/16 15.320 Discarding pn space Handshake because HandshakeDone is received 15.320 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 15.339 -> Packet A|1|S0|dfd93a20cec8b050|32|1 AckFrame[3|Δ19] 15.391 <- (5) Packet A|7|S0|a4cbad3cd897e13a|33|1 AckFrame[1-0|Δ21] 15.392 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.392 <- (6) Packet A|8|S0|a4cbad3cd897e13a|1054|1 StreamFrame[0(CIB),0,1024,fin] 15.393 Finished downloading https://server4:443/eunmgavlcp at 25:51.393 on ClientConnection[bffcbd9eacad160e/a4cbad3cd897e13a(V1) with server4/193.167.100.100:443] 15.393 Closing ClientConnection[bffcbd9eacad160e/a4cbad3cd897e13a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.393 -> Packet A|2|S0|dfd93a20cec8b050|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 15.393 Creating connection with server4:443 with v1 15.394 Setting up connection for downloading https://server4:443/pzsxqrsyti at 25:51.394 on ClientConnection[4fc6b4a6b93f41b5/e8e8222fa213b4b5(V1) with server4/193.167.100.100:443] 15.394 Original destination connection id: 4fc6b4a6b93f41b5 (scid: e8e8222fa213b4b5) >- CryptoStream[I|ClientHello] 15.395 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.595/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.395 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.428 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.429 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.629/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.431 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.528/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.428 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,709] Padding(322) 15.431 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 15.431 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 15.431 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 15.431 - unsupported transport parameter 0x7158, size 1 (timestamp) 15.431 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 15.434 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.531/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.434 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.434 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.434 Starting downloading https://server4:443/pzsxqrsyti at 25:51.434 on ClientConnection[4fc6b4a6b93f41b5/e8e8222fa213b4b5(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 15.531/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.434 Discarding pn space Initial because first Handshake message is being sent 15.434 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 15.435 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.532/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.435 -> Packet A|0|S0|ced45bbf2c26ff5d|47|1 StreamFrame[0(CIB),0,17,fin] 15.445 <- (8) Packet A|11|S0|a1e28133ee32f676|35|1 AckFrame[2-1|Δ274] 15.445 <- (9) Packet A|12|S0|a1e28133ee32f676|98|2 NewConnectionIdFrame[1,<0|5f124628344b5616|ecf80e3be103e13926e93570359c1b65] NewTokenFrame[010a6102147ce0540864cd79d0e09eb82a7b9e091b7066608dc448f0ce820e9685b599565feb97928f7f] 15.445 -> Packet A|5|S0|2c0bd818b80401d1|39|2 ConnectionCloseFrame[0|0|] AckFrame[10,7,4|Δ0] 15.445 -> Packet A|6|S0|2c0bd818b80401d1|39|2 ConnectionCloseFrame[0|0|] AckFrame[10,7,4|Δ0] 15.446 <- (10) Packet A|13|S0|a1e28133ee32f676|1055|1 StreamFrame[0(CIB),0,1024,fin] 15.465 <- (2) Packet H|2|L|47|1 AckFrame[1|Δ0] 15.471 loss detection timeout handler running 15.471 loss detection timeout handler running 15.471 loss detection timeout handler running 15.471 loss detection timeout handler running 15.471 loss detection timeout handler running 15.471 Retransmitting CryptoFrame[0,36] on level Handshake 15.471 Cwnd(-): 6000; inflight: 47 15.471 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.471 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 15.471 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 15.568/Handshake, because ackElicitingInFlight | RTT:33/16 15.471 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[2|Δ0] 15.503 <- (3) Packet A|3|S0|e8e8222fa213b4b5|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.503 State is set to Confirmed reschedule loss detection timer for PTO over 53 millis, based on 15.557/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 53 millis, based on 15.557/App, because ackElicitingInFlight | RTT:33/16 15.503 Discarding pn space Handshake because HandshakeDone is received 15.503 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 15.523 -> Packet A|1|S0|ced45bbf2c26ff5d|32|1 AckFrame[3|Δ19] 15.556 loss detection timeout handler running Sending probe 0, because no ack since 15.435. Current RTT: 33/16. 15.556 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 15.801/App, because ackElicitingInFlight | RTT:33/16 15.557 -> Packet PA|2|S0|ced45bbf2c26ff5d|47|1 StreamFrame[0(CIB),0,17,fin] 15.585 <- (5) Packet A|6|S0|e8e8222fa213b4b5|98|2 NewConnectionIdFrame[1,<0|38ad85e0cb10a810|1e2e2eb4874697b4ce02dd9304f2ccfe] NewTokenFrame[013019738140ee7c86843c5f9c35106b8195f18a1d51cfd4c0d9649e306a78bbcd7f2aa96f8e896ea482] 15.588 <- (6) Packet A|7|S0|e8e8222fa213b4b5|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 15.589 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.589 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 15.699/App, because ackElicitingInFlight | RTT:33/13 15.589 -> Packet A|3|S0|ced45bbf2c26ff5d|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ3] 15.589 Finished downloading https://server4:443/pzsxqrsyti at 25:51.589 on ClientConnection[4fc6b4a6b93f41b5/e8e8222fa213b4b5(V1) with server4/193.167.100.100:443] 15.589 Closing ClientConnection[4fc6b4a6b93f41b5/e8e8222fa213b4b5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.590 -> Packet A|4|S0|ced45bbf2c26ff5d|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 15.590 Creating connection with server4:443 with v1 15.590 Setting up connection for downloading https://server4:443/mzxeyejmwd at 25:51.591 on ClientConnection[31a5c98d1c2e43ce/dab6deee7595a965(V1) with server4/193.167.100.100:443] 15.590 Original destination connection id: 31a5c98d1c2e43ce (scid: dab6deee7595a965) >- CryptoStream[I|ClientHello] 15.591 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.791/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.591 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.666 <- (7) Packet A|8|S0|e8e8222fa213b4b5|33|1 AckFrame[2-1|Δ78] 15.666 -> Packet A|5|S0|ced45bbf2c26ff5d|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 15.667 <- (8) Packet A|9|S0|e8e8222fa213b4b5|1055|1 StreamFrame[0(CIB),0,1024,fin] 15.667 -> Packet A|6|S0|ced45bbf2c26ff5d|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 15.791 loss detection timeout handler running Sending probe 0, because no ack since 15.591. Current RTT: 100/25. 15.791 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.791 (Probe is an initial retransmit) 15.791 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.191/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.791 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.125 <- (1) Packet I|2|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 16.125 <- (1) Packet H|3|L|1077|2 CryptoFrame[0,711] Padding(320) 16.128 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.128 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 16.128 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 16.128 - unsupported transport parameter 0x7158, size 1 (timestamp) reschedule loss detection timer for PTO over 399 millis, based on 16.528/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.128 - unsupported transport parameter 0x1057, size 1 (loss-bits) 16.128 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 16.531/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.131 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.331/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.131 Starting downloading https://server4:443/mzxeyejmwd at 25:52.131 on ClientConnection[31a5c98d1c2e43ce/dab6deee7595a965(V1) with server4/193.167.100.100:443] 16.131 Discarding pn space Initial because first Handshake message is being sent 16.131 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 16.132 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.332/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.132 -> Packet A|0|S0|39a1b4aec043f5b7|47|1 StreamFrame[0(CIB),0,17,fin] 16.331 loss detection timeout handler running Sending probe 0, because no ack since 16.131. Current RTT: 100/25. 16.331 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.331 (Probe is a handshake retransmit) 16.331 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 16.731/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.331 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 16.731 loss detection timeout handler running Sending probe 1, because no ack since 16.132. Current RTT: 100/25. 16.731 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.731 (Probe is a handshake retransmit) 16.731 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 17.531/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.731 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 16.732 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 17.532/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.732 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 16.764 <- (2) Packet A|5|S0|dab6deee7595a965|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 16.764 State is set to Confirmed reschedule loss detection timer for PTO over 267 millis, based on 17.032/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -407 millis, based on 16.357/App, because ackElicitingInFlight | RTT:100/25 16.764 Discarding pn space Handshake because HandshakeDone is received 16.764 loss detection timeout handler running Sending probe 0, because no ack since 16.132. Current RTT: 100/25. 16.765 (Probe is retransmit on level App) 16.765 Discarding packet (147 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) reschedule loss detection timer for PTO over 449 millis, based on 17.215/App, because ackElicitingInFlight | RTT:100/25 16.765 -> Packet PA|1|S0|39a1b4aec043f5b7|47|1 StreamFrame[0(CIB),0,17,fin] 16.784 -> Packet A|2|S0|39a1b4aec043f5b7|32|1 AckFrame[5|Δ19] 16.796 <- (4) Packet A|8|S0|dab6deee7595a965|1059|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 16.797 Cwnd(-): 6000; inflight: 0 16.797 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.797 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 16.913/App, because ackElicitingInFlight | RTT:31/15 16.797 -> Packet A|3|S0|39a1b4aec043f5b7|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 16.798 Finished downloading https://server4:443/mzxeyejmwd at 25:52.798 on ClientConnection[31a5c98d1c2e43ce/dab6deee7595a965(V1) with server4/193.167.100.100:443] 16.798 Closing ClientConnection[31a5c98d1c2e43ce/dab6deee7595a965(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.798 -> Packet A|4|S0|39a1b4aec043f5b7|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,5|Δ0] 16.798 Creating connection with server4:443 with v1 16.799 Setting up connection for downloading https://server4:443/axatruznop at 25:52.799 on ClientConnection[db2da51c6790b7c9/06ce0f1cf36e5f4b(V1) with server4/193.167.100.100:443] 16.799 Original destination connection id: db2da51c6790b7c9 (scid: 06ce0f1cf36e5f4b) >- CryptoStream[I|ClientHello] 16.800 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.000/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.800 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.829 <- (5) Packet A|9|S0|dab6deee7595a965|98|2 NewConnectionIdFrame[1,<0|2c26b6166629c001|533cb4fa5f3afe6c557f30b9b459c256] NewTokenFrame[0141a6b5512ad54d1fe2cd694b0670d6402555207e0274f313164700df2bd9433c194be43b1272afce26] 16.829 <- (6) Packet A|10|S0|dab6deee7595a965|30|1 ConnectionCloseFrame[0|0|] 16.830 -> Packet A|5|S0|39a1b4aec043f5b7|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,5|Δ0] 16.833 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.834 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.034/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.833 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) 16.836 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.933/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.836 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 16.836 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 16.836 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 16.836 - unsupported transport parameter 0x7158, size 1 (timestamp) 16.836 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 16.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.935/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.838 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.839 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.936/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.839 Starting downloading https://server4:443/axatruznop at 25:52.839 on ClientConnection[db2da51c6790b7c9/06ce0f1cf36e5f4b(V1) with server4/193.167.100.100:443] 16.839 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 16.839 Discarding pn space Initial because first Handshake message is being sent 16.839 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.936/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.839 -> Packet A|0|S0|61d938f69f5e5c52|47|1 StreamFrame[0(CIB),0,17,fin] 16.868 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.935 loss detection timeout handler running Sending probe 0, because no ack since 16.838. Current RTT: 33/16. 16.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.935 (Probe is a handshake retransmit) 16.936 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.130/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.936 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 16.967 <- (3) Packet H|5|L|47|1 AckFrame[2-1|Δ0] 16.968 probe count not reset on ack because handshake not yet confirmed 16.968 Retransmitting CryptoFrame[0,36] on level Handshake 16.968 Cwnd(-): 6000; inflight: 47 16.968 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 16.968 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 16.968 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 169 millis, based on 17.138/Handshake, because ackElicitingInFlight | RTT:33/13 16.967 <- (3) Packet A|6|S0|06ce0f1cf36e5f4b|98|2 NewConnectionIdFrame[1,<0|a23248e923353f4c|6264f82ea3cd4412aa56008ad15fa103] NewTokenFrame[01f835483fc191c0752ece00f5b037f49f7629a7df21a1354202f2c97fdb87fb559198e3bc718d6fd2fe] 16.968 -> Packet H|3|L|80|1 CryptoFrame[0,36] 16.987 -> Packet A|1|S0|61d938f69f5e5c52|32|1 AckFrame[6|Δ19] 16.999 <- (4) Packet H|7|L|47|1 AckFrame[3-1|Δ0] 16.999 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 16.999 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 17.185 <- (5) Packet A|10|S0|06ce0f1cf36e5f4b|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.185 State is set to Confirmed reschedule loss detection timer for PTO over -244 millis, based on 16.941/App, because ackElicitingInFlight | RTT:33/11 17.185 loss detection timeout handler running reschedule loss detection timer for PTO over -244 millis, based on 16.941/App, because ackElicitingInFlight | RTT:33/11 17.185 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 16.839. Current RTT: 33/11. 17.185 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 203 millis, based on 17.389/App, because ackElicitingInFlight | RTT:33/11 17.185 -> Packet PA|2|S0|61d938f69f5e5c52|47|1 StreamFrame[0(CIB),0,17,fin] 17.205 -> Packet A|3|S0|61d938f69f5e5c52|34|1 AckFrame[10,6|Δ19] 17.217 <- (6) Packet A|11|S0|06ce0f1cf36e5f4b|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 17.218 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.218 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 93 millis, based on 17.312/App, because ackElicitingInFlight | RTT:33/9 17.218 -> Packet A|4|S0|61d938f69f5e5c52|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[10|Δ0] 17.218 Finished downloading https://server4:443/axatruznop at 25:53.218 on ClientConnection[db2da51c6790b7c9/06ce0f1cf36e5f4b(V1) with server4/193.167.100.100:443] 17.218 Closing ClientConnection[db2da51c6790b7c9/06ce0f1cf36e5f4b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.219 -> Packet A|5|S0|61d938f69f5e5c52|35|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 17.219 Creating connection with server4:443 with v1 17.219 Setting up connection for downloading https://server4:443/qfejdhjxkb at 25:53.219 on ClientConnection[25f2f2a847e56222/fdd1095e16e52610(V1) with server4/193.167.100.100:443] 17.219 Original destination connection id: 25f2f2a847e56222 (scid: fdd1095e16e52610) >- CryptoStream[I|ClientHello] 17.221 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.421/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.220 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.254 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 17.255 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.455/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.254 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 17.257 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.354/Handshake, because peerAwaitingAddressValidation | RTT:33/16 17.257 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 17.257 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 17.257 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 17.257 - unsupported transport parameter 0x7158, size 1 (timestamp) 17.257 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 17.260 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.357/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.260 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.260 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.357/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.260 Discarding pn space Initial because first Handshake message is being sent 17.260 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 17.260 Starting downloading https://server4:443/qfejdhjxkb at 25:53.260 on ClientConnection[25f2f2a847e56222/fdd1095e16e52610(V1) with server4/193.167.100.100:443] 17.261 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.358/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.261 -> Packet A|0|S0|ae880db49a12df52|47|1 StreamFrame[0(CIB),0,17,fin] 17.291 <- (2) Packet H|3|L|47|1 AckFrame[0|Δ0] 17.292 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 17.292 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 17.291 <- (2) Packet A|4|S0|fdd1095e16e52610|98|2 NewConnectionIdFrame[1,<0|cdf487afedd41056|dd2e5375b25b1d1d60c4babb764e143d] NewTokenFrame[01892eac69f1d609b81d1c3ea0abb14c57f5ed5059191120a54e88e407fb17e772364d0f49533534f4d8] 17.311 -> Packet A|1|S0|ae880db49a12df52|32|1 AckFrame[4|Δ19] 17.959 <- (3) Packet A|6|S0|fdd1095e16e52610|35|1 AckFrame[1-0|Δ616] 17.960 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.041 <- (4) Packet A|8|S0|fdd1095e16e52610|1054|1 StreamFrame[0(CIB),0,1024,fin] 18.042 Finished downloading https://server4:443/qfejdhjxkb at 25:54.042 on ClientConnection[25f2f2a847e56222/fdd1095e16e52610(V1) with server4/193.167.100.100:443] 18.042 Closing ClientConnection[25f2f2a847e56222/fdd1095e16e52610(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.042 -> Packet A|2|S0|ae880db49a12df52|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,6|Δ0] 18.043 Creating connection with server4:443 with v1 18.043 Setting up connection for downloading https://server4:443/wskxrzemlc at 25:54.043 on ClientConnection[aecdccd60822903d/dba14ddbd0fbc8f7(V1) with server4/193.167.100.100:443] 18.043 Original destination connection id: aecdccd60822903d (scid: dba14ddbd0fbc8f7) >- CryptoStream[I|ClientHello] 18.045 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.245/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.045 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.244 loss detection timeout handler running Sending probe 0, because no ack since 18.045. Current RTT: 100/25. 18.244 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.244 (Probe is an initial retransmit) 18.245 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.645/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.244 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.276 <- (1) Packet I|2|L|48|1 Token=[] AckFrame[1-0|Δ0] 18.277 probe count not reset on ack because handshake not yet confirmed 18.277 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.677/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.676 loss detection timeout handler running Sending probe 1, because no ack since 18.244. Current RTT: 31/15. 18.676 Sending probe because peer awaiting address validation 18.676 (Probe is Initial ping, because there is no Initial data to retransmit) 18.676 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 363 millis, based on 19.040/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 18.676 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 18.679 <- (2) Packet I|5|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 18.682 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.679 <- (2) Packet H|6|L|1077|2 CryptoFrame[0,710] Padding(321) reschedule loss detection timer for PTO over 363 millis, based on 19.046/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 18.682 -> Packet I|3|L|1201|2 Token=[] AckFrame[5,2|Δ0] Padding(1151) 18.682 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 18.682 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 18.682 - unsupported transport parameter 0x7158, size 1 (timestamp) 18.682 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 18.684 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 19.048/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 18.684 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.684 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 18.775/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 18.684 Starting downloading https://server4:443/wskxrzemlc at 25:54.684 on ClientConnection[aecdccd60822903d/dba14ddbd0fbc8f7(V1) with server4/193.167.100.100:443] 18.684 Discarding pn space Initial because first Handshake message is being sent 18.684 -> Packet H|1|L|46|1 AckFrame[6|Δ0] 18.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 18.776/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 18.685 -> Packet A|0|S0|7e752d9b4df7b94a|47|1 StreamFrame[0(CIB),0,17,fin] 18.775 loss detection timeout handler running Sending probe 0, because no ack since 18.684. Current RTT: 31/15. 18.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.775 (Probe is a handshake retransmit) 18.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 18.957/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 18.775 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 18.807 <- (3) Packet H|9|L|47|1 AckFrame[2-1|Δ0] 18.807 probe count not reset on ack because handshake not yet confirmed 18.808 Retransmitting CryptoFrame[0,36] on level Handshake 18.808 Cwnd(-): 6000; inflight: 47 18.808 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 18.808 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 18.808 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 149 millis, based on 18.958/Handshake, because ackElicitingInFlight | RTT:31/11 18.808 -> Packet H|3|L|80|1 CryptoFrame[0,36] 18.807 <- (3) Packet A|10|S0|dba14ddbd0fbc8f7|98|2 NewConnectionIdFrame[1,<0|3db01d79e22290c0|c76cab5246d01f75ba40e9fbf95acc09] NewTokenFrame[0101cff65010fc36a006b3ee1cfb25f774eadf00178c17e607a76be68815a5784ed5b5542d229170812f] 18.827 -> Packet A|1|S0|7e752d9b4df7b94a|32|1 AckFrame[10|Δ19] 18.858 <- (4) Packet A|11|S0|dba14ddbd0fbc8f7|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 18.859 State is set to Confirmed reschedule loss detection timer for PTO over 25 millis, based on 18.885/App, because ackElicitingInFlight | RTT:31/11 reschedule loss detection timer for PTO over -74 millis, based on 18.785/App, because ackElicitingInFlight | RTT:31/11 18.859 Discarding pn space Handshake because HandshakeDone is received 18.859 loss detection timeout handler running Sending probe 0, because no ack since 18.685. Current RTT: 31/11. 18.859 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 199 millis, based on 19.059/App, because ackElicitingInFlight | RTT:31/11 18.859 -> Packet PA|2|S0|7e752d9b4df7b94a|47|1 StreamFrame[0(CIB),0,17,fin] 18.878 -> Packet A|3|S0|7e752d9b4df7b94a|32|1 AckFrame[11-10|Δ19] 18.891 <- (5) Packet A|12|S0|dba14ddbd0fbc8f7|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 18.891 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.891 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 87 millis, based on 18.979/App, because ackElicitingInFlight | RTT:31/8 18.891 -> Packet A|4|S0|7e752d9b4df7b94a|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[11|Δ0] 18.892 Finished downloading https://server4:443/wskxrzemlc at 25:54.892 on ClientConnection[aecdccd60822903d/dba14ddbd0fbc8f7(V1) with server4/193.167.100.100:443] 18.892 Closing ClientConnection[aecdccd60822903d/dba14ddbd0fbc8f7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.892 -> Packet A|5|S0|7e752d9b4df7b94a|35|2 ConnectionCloseFrame[0|0|] AckFrame[12-11|Δ0] 18.892 Creating connection with server4:443 with v1 18.893 Setting up connection for downloading https://server4:443/oxpztseljg at 25:54.893 on ClientConnection[c7759760a0b0a186/4bedd30dff07fa63(V1) with server4/193.167.100.100:443] 18.893 Original destination connection id: c7759760a0b0a186 (scid: 4bedd30dff07fa63) >- CryptoStream[I|ClientHello] 18.895 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.095/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.895 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.928 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18.928 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.128/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.928 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 18.931 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.028/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.931 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 18.931 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 18.931 - unsupported transport parameter 0x7158, size 1 (timestamp) 18.931 - unsupported transport parameter 0x1057, size 1 (loss-bits) 18.930 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 18.933 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.030/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.933 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.934 Starting downloading https://server4:443/oxpztseljg at 25:54.934 on ClientConnection[c7759760a0b0a186/4bedd30dff07fa63(V1) with server4/193.167.100.100:443] 18.934 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.031/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.934 Discarding pn space Initial because first Handshake message is being sent 18.934 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 18.934 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.031/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.934 -> Packet A|0|S0|ab3eec2285ae64e2|47|1 StreamFrame[0(CIB),0,17,fin] 18.963 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 18.965 <- (3) Packet A|3|S0|4bedd30dff07fa63|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 18.966 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 19.030/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 19.056/App, because ackElicitingInFlight | RTT:33/16 18.966 Discarding pn space Handshake because HandshakeDone is received 18.966 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 18.985 -> Packet A|1|S0|ab3eec2285ae64e2|32|1 AckFrame[3|Δ19] 18.999 Discarding packet (1077 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 19.036 <- (6) Packet A|8|S0|4bedd30dff07fa63|33|1 AckFrame[1-0|Δ20] 19.037 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.315 <- (7) Packet A|12|S0|4bedd30dff07fa63|98|2 NewConnectionIdFrame[1,<0|3d6f3e023a9f3a7b|a1622db0c300717666a07beb5421bb94] NewTokenFrame[013f8414ae8a233f78e8d9a980063aea8d26bad0d7f215778c3730c2a81c8f3eae8882dcde6ec704d307] 19.316 <- (8) Packet A|13|S0|4bedd30dff07fa63|1054|1 StreamFrame[0(CIB),0,1024,fin] 19.317 -> Packet A|2|S0|ab3eec2285ae64e2|33|1 AckFrame[13-12,8|Δ0] 19.317 Finished downloading https://server4:443/oxpztseljg at 25:55.317 on ClientConnection[c7759760a0b0a186/4bedd30dff07fa63(V1) with server4/193.167.100.100:443] 19.317 Closing ClientConnection[c7759760a0b0a186/4bedd30dff07fa63(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.317 -> Packet A|3|S0|ab3eec2285ae64e2|37|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,8|Δ0] 19.318 Creating connection with server4:443 with v1 19.318 Setting up connection for downloading https://server4:443/ndrebcsggy at 25:55.318 on ClientConnection[3747023a64376530/3ad80173d4072630(V1) with server4/193.167.100.100:443] 19.318 Original destination connection id: 3747023a64376530 (scid: 3ad80173d4072630) >- CryptoStream[I|ClientHello] 19.319 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.519/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.319 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.352 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.353 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.553/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.352 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 19.355 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.452/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.355 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 19.355 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 19.355 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 19.355 - unsupported transport parameter 0x7158, size 1 (timestamp) 19.355 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 19.357 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.454/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.357 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.357 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.357 Starting downloading https://server4:443/ndrebcsggy at 25:55.358 on ClientConnection[3747023a64376530/3ad80173d4072630(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 19.455/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.358 Discarding pn space Initial because first Handshake message is being sent 19.358 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 19.358 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.455/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.358 -> Packet A|0|S0|d5393c3aadaa0bff|47|1 StreamFrame[0(CIB),0,17,fin] 19.454 loss detection timeout handler running Sending probe 0, because no ack since 19.357. Current RTT: 33/16. 19.454 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.454 (Probe is a handshake retransmit) 19.454 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.648/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.454 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 19.459 <- (2) Packet H|4|L|1077|2 CryptoFrame[0,710] Padding(321) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.459 -> Packet H|3|L|48|1 AckFrame[4,1|Δ0] 19.490 <- (3) Packet H|5|L|47|1 AckFrame[3|Δ0] 19.490 probe count not reset on ack because handshake not yet confirmed 19.490 Retransmitting CryptoFrame[0,36] on level Handshake 19.490 Cwnd(-): 6000; inflight: 127 19.490 loss detection timeout handler running 19.491 loss detection timeout handler running 19.490 -> Packet H|4|L|80|1 CryptoFrame[0,36] 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 loss detection timeout handler running 19.491 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 193 millis, based on 19.684/Handshake, because ackElicitingInFlight | RTT:33/16 19.522 <- (4) Packet H|7|L|47|1 AckFrame[4-3|Δ0] 19.523 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 19.523 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 19.522 <- (4) Packet A|8|S0|3ad80173d4072630|98|2 NewConnectionIdFrame[1,<0|ab4d0b31421eee73|aeb22482ef9b155ea553f25907ef6679] NewTokenFrame[0148e05dd70afe74d74b2191e3df8ff6ee67bba6d1aaa67e499242872f05a87951f732b5952b48b2af26] 19.542 -> Packet A|1|S0|d5393c3aadaa0bff|32|1 AckFrame[8|Δ19] 19.661 <- (5) Packet A|10|S0|3ad80173d4072630|98|2 NewConnectionIdFrame[1,<0|ab4d0b31421eee73|aeb22482ef9b155ea553f25907ef6679] NewTokenFrame[0148e05dd70afe74d74b2191e3df8ff6ee67bba6d1aaa67e499242872f05a87951f732b5952b48b2af26] 19.680 -> Packet A|2|S0|d5393c3aadaa0bff|34|1 AckFrame[10,8|Δ19] 19.712 <- (6) Packet A|11|S0|3ad80173d4072630|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.712 State is set to Confirmed reschedule loss detection timer for PTO over -244 millis, based on 19.468/App, because ackElicitingInFlight | RTT:33/13 19.712 loss detection timeout handler running Sending probe 0, because no ack since 19.358. Current RTT: 33/13. reschedule loss detection timer for PTO over -244 millis, based on 19.468/App, because ackElicitingInFlight | RTT:33/13 19.712 Discarding pn space Handshake because HandshakeDone is received 19.712 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 19.932/App, because ackElicitingInFlight | RTT:33/13 19.712 -> Packet PA|3|S0|d5393c3aadaa0bff|47|1 StreamFrame[0(CIB),0,17,fin] 19.732 -> Packet A|4|S0|d5393c3aadaa0bff|34|1 AckFrame[11-10,8|Δ19] 19.744 <- (7) Packet A|12|S0|3ad80173d4072630|1060|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] 19.745 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.745 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 97 millis, based on 19.843/App, because ackElicitingInFlight | RTT:33/10 19.745 -> Packet A|5|S0|d5393c3aadaa0bff|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[11|Δ0] 19.745 Finished downloading https://server4:443/ndrebcsggy at 25:55.745 on ClientConnection[3747023a64376530/3ad80173d4072630(V1) with server4/193.167.100.100:443] 19.745 Closing ClientConnection[3747023a64376530/3ad80173d4072630(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.745 -> Packet A|6|S0|d5393c3aadaa0bff|35|2 ConnectionCloseFrame[0|0|] AckFrame[12-11|Δ0] 19.746 Creating connection with server4:443 with v1 19.746 Setting up connection for downloading https://server4:443/udfianzemg at 25:55.746 on ClientConnection[9236d0ccab534d92/a4a0c6f45bac68c9(V1) with server4/193.167.100.100:443] 19.746 Original destination connection id: 9236d0ccab534d92 (scid: a4a0c6f45bac68c9) >- CryptoStream[I|ClientHello] 19.748 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.948/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.748 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.776 <- (8) Packet A|13|S0|3ad80173d4072630|34|1 AckFrame[5,3-2|Δ0] 19.776 -> Packet A|7|S0|d5393c3aadaa0bff|35|2 ConnectionCloseFrame[0|0|] AckFrame[12-11|Δ0] 19.781 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.782 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.982/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.781 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 19.784 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.881/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.784 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 19.784 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 19.784 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 19.784 - unsupported transport parameter 0x7158, size 1 (timestamp) 19.784 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 19.786 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.883/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.786 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.786 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.883/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.786 Starting downloading https://server4:443/udfianzemg at 25:55.786 on ClientConnection[9236d0ccab534d92/a4a0c6f45bac68c9(V1) with server4/193.167.100.100:443] 19.786 Discarding pn space Initial because first Handshake message is being sent 19.786 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 19.787 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.884/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.786 -> Packet A|0|S0|cbd6c90e36d0f771|47|1 StreamFrame[0(CIB),0,17,fin] 19.817 <- (2) Packet A|3|S0|a4a0c6f45bac68c9|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.818 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 19.883/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 19.908/App, because ackElicitingInFlight | RTT:33/16 19.818 Discarding pn space Handshake because HandshakeDone is received 19.818 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 19.837 -> Packet A|1|S0|cbd6c90e36d0f771|32|1 AckFrame[3|Δ19] 19.888 <- (4) Packet A|8|S0|a4a0c6f45bac68c9|1054|1 StreamFrame[0(CIB),0,1024,fin] 19.889 Finished downloading https://server4:443/udfianzemg at 25:55.889 on ClientConnection[9236d0ccab534d92/a4a0c6f45bac68c9(V1) with server4/193.167.100.100:443] 19.889 Closing ClientConnection[9236d0ccab534d92/a4a0c6f45bac68c9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.889 -> Packet A|2|S0|cbd6c90e36d0f771|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3|Δ0] 19.890 Creating connection with server4:443 with v1 19.890 Setting up connection for downloading https://server4:443/ihgpvniaie at 25:55.890 on ClientConnection[8b266b530cd8ef6c/34b4def6403b9228(V1) with server4/193.167.100.100:443] 19.890 Original destination connection id: 8b266b530cd8ef6c (scid: 34b4def6403b9228) >- CryptoStream[I|ClientHello] 19.891 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.091/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.891 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.925 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.925 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.125/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.925 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 19.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.024/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.927 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 19.927 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 19.927 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 19.927 - unsupported transport parameter 0x7158, size 1 (timestamp) 19.927 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 19.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.027/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.930 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.930 Starting downloading https://server4:443/ihgpvniaie at 25:55.930 on ClientConnection[8b266b530cd8ef6c/34b4def6403b9228(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 20.027/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.930 Discarding pn space Initial because first Handshake message is being sent 19.930 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 19.931 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.028/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.931 -> Packet A|0|S0|80ebfba346cfc28f|47|1 StreamFrame[0(CIB),0,17,fin] 19.960 <- (5) Packet A|9|S0|a4a0c6f45bac68c9|1054|1 StreamFrame[0(CIB),0,1024,fin] 19.960 -> Packet A|3|S0|cbd6c90e36d0f771|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3|Δ0] 19.962 <- (2) Packet A|3|S0|34b4def6403b9228|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.962 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 20.027/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 20.053/App, because ackElicitingInFlight | RTT:33/16 19.962 Discarding pn space Handshake because HandshakeDone is received 19.962 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 19.963 <- (4) Packet A|6|S0|34b4def6403b9228|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 19.963 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.963 -> Packet A|1|S0|80ebfba346cfc28f|33|1 AckFrame[6,3|Δ0] 19.963 Finished downloading https://server4:443/ihgpvniaie at 25:55.963 on ClientConnection[8b266b530cd8ef6c/34b4def6403b9228(V1) with server4/193.167.100.100:443] 19.963 Closing ClientConnection[8b266b530cd8ef6c/34b4def6403b9228(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.963 -> Packet A|2|S0|80ebfba346cfc28f|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 19.964 Creating connection with server4:443 with v1 19.964 Setting up connection for downloading https://server4:443/wexvlxzfzm at 25:55.965 on ClientConnection[41bce950b36a26f5/b05ef14e2c86b074(V1) with server4/193.167.100.100:443] 19.964 Original destination connection id: 41bce950b36a26f5 (scid: b05ef14e2c86b074) >- CryptoStream[I|ClientHello] 19.965 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.165/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.965 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.991 <- (6) Packet A|11|S0|a4a0c6f45bac68c9|30|1 ConnectionCloseFrame[0|0|] 19.994 <- (5) Packet A|7|S0|34b4def6403b9228|98|2 NewConnectionIdFrame[1,<0|c92fe44c6871ea40|7aa8a413b5c2cc9ece5f55a425d83deb] NewTokenFrame[010a9a2248c65682261bdc3228cc64966c136c1c753a1f9ab59b2beece56c23c17efc8542a79402d936e] 19.994 -> Packet A|3|S0|80ebfba346cfc28f|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 20.165 loss detection timeout handler running Sending probe 0, because no ack since 19.965. Current RTT: 100/25. 20.165 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.165 (Probe is an initial retransmit) 20.165 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.565/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.165 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.198 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 20.199 probe count not reset on ack because handshake not yet confirmed 20.199 Retransmitting CryptoFrame[0,257] on level Initial 20.199 Cwnd(-): 6000; inflight: 0 20.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.599/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 20.393/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.199 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 20.198 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) 20.201 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.395/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.201 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 20.203 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 20.203 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 20.203 - unsupported transport parameter 0x7158, size 1 (timestamp) 20.203 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 20.205 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.399/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.205 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.205 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.302/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.205 Discarding pn space Initial because first Handshake message is being sent 20.205 Starting downloading https://server4:443/wexvlxzfzm at 25:56.205 on ClientConnection[41bce950b36a26f5/b05ef14e2c86b074(V1) with server4/193.167.100.100:443] 20.205 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 20.206 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.303/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.206 -> Packet A|0|S0|8072dd86da22b2ef|47|1 StreamFrame[0(CIB),0,17,fin] 20.231 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.302 loss detection timeout handler running Sending probe 0, because no ack since 20.205. Current RTT: 33/16. 20.302 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.302 (Probe is a handshake retransmit) 20.302 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.496/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.302 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 20.334 <- (3) Packet A|3|S0|b05ef14e2c86b074|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.335 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 20.450/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 20.328/App, because ackElicitingInFlight | RTT:33/16 20.335 loss detection timeout handler running 20.335 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 20.206. Current RTT: 33/16. 20.335 (Probe is retransmit on level App) 20.335 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) reschedule loss detection timer for PTO over 243 millis, based on 20.579/App, because ackElicitingInFlight | RTT:33/16 20.335 -> Packet PA|1|S0|8072dd86da22b2ef|47|1 StreamFrame[0(CIB),0,17,fin] 20.355 -> Packet A|2|S0|8072dd86da22b2ef|32|1 AckFrame[3|Δ19] 20.367 <- (5) Packet A|6|S0|b05ef14e2c86b074|1059|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 20.368 Cwnd(-): 3000; inflight: 0 20.368 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.368 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 20.478/App, because ackElicitingInFlight | RTT:33/13 20.368 -> Packet A|3|S0|8072dd86da22b2ef|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 20.368 Finished downloading https://server4:443/wexvlxzfzm at 25:56.368 on ClientConnection[41bce950b36a26f5/b05ef14e2c86b074(V1) with server4/193.167.100.100:443] 20.368 Closing ClientConnection[41bce950b36a26f5/b05ef14e2c86b074(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.368 -> Packet A|4|S0|8072dd86da22b2ef|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 20.368 Creating connection with server4:443 with v1 20.369 Setting up connection for downloading https://server4:443/picjxblrqp at 25:56.369 on ClientConnection[eb5577abd6f7f468/7e22691729cb544a(V1) with server4/193.167.100.100:443] 20.369 Original destination connection id: eb5577abd6f7f468 (scid: 7e22691729cb544a) >- CryptoStream[I|ClientHello] 20.370 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.570/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.370 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.407 <- (6) Packet A|7|S0|b05ef14e2c86b074|33|1 AckFrame[3-1|Δ8] 20.407 -> Packet A|5|S0|8072dd86da22b2ef|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 20.438 <- (7) Packet A|8|S0|b05ef14e2c86b074|98|2 NewConnectionIdFrame[1,<0|031d8b0e654740dc|6fde86105473e295c640f5016cf93c29] NewTokenFrame[01bcda37fa2b78c153680b6552eafed04b34a2a1a3fc11c88eb1399047fbc9b617b5914b0f46e01cddd5] 20.438 -> Packet A|6|S0|8072dd86da22b2ef|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 20.569 loss detection timeout handler running Sending probe 0, because no ack since 20.370. Current RTT: 100/25. 20.569 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.569 (Probe is an initial retransmit) 20.570 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.970/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.570 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.705 <- (1) Packet I|2|L|176|2 Token=[] CryptoFrame[0,123] Padding(6) -< CryptoStream[I|ServerHello] 20.705 <- (1) Packet H|3|L|1076|2 CryptoFrame[0,709] Padding(321) 20.707 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.107/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.707 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 20.708 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 20.707 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 20.708 - unsupported transport parameter 0x7158, size 1 (timestamp) 20.708 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 20.710 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.110/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.710 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.710 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.710 Starting downloading https://server4:443/picjxblrqp at 25:56.710 on ClientConnection[eb5577abd6f7f468/7e22691729cb544a(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 199 millis, based on 20.910/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.710 Discarding pn space Initial because first Handshake message is being sent 20.710 -> Packet H|1|L|46|1 AckFrame[3|Δ0] 20.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.911/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.711 -> Packet A|0|S0|1ee52d4d8133658d|47|1 StreamFrame[0(CIB),0,17,fin] 20.739 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.742 <- (3) Packet H|6|L|47|1 AckFrame[0|Δ0] 20.742 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 20.742 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 20.742 <- (3) Packet A|7|S0|7e22691729cb544a|98|2 NewConnectionIdFrame[1,<0|783bb012b69b6590|69ff75cad7bd9a0f8534a0f8370c32a9] NewTokenFrame[01a95fc7757cbffaeb19d766295a8ef077d1ae25bd9ed356d62f26eeba40dd6dda4a68af9fbf623c62f2] 20.742 <- (4) Packet A|8|S0|7e22691729cb544a|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 20.743 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.743 -> Packet A|1|S0|1ee52d4d8133658d|31|1 AckFrame[8-7|Δ0] 20.743 Finished downloading https://server4:443/picjxblrqp at 25:56.744 on ClientConnection[eb5577abd6f7f468/7e22691729cb544a(V1) with server4/193.167.100.100:443] 20.743 Closing ClientConnection[eb5577abd6f7f468/7e22691729cb544a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.744 -> Packet A|2|S0|1ee52d4d8133658d|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 20.744 Creating connection with server4:443 with v1 20.745 Setting up connection for downloading https://server4:443/rmkdmqtkry at 25:56.745 on ClientConnection[9bad43ccac038ce7/43ea1f273f4733f1(V1) with server4/193.167.100.100:443] 20.745 Original destination connection id: 9bad43ccac038ce7 (scid: 43ea1f273f4733f1) >- CryptoStream[I|ClientHello] 20.746 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.946/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.746 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.779 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 20.780 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.980/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.779 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 20.782 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.879/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.782 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 20.782 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 20.782 - unsupported transport parameter 0x7158, size 1 (timestamp) 20.782 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 20.782 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 20.784 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.881/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.784 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.784 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.881/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.784 Discarding pn space Initial because first Handshake message is being sent 20.784 Starting downloading https://server4:443/rmkdmqtkry at 25:56.785 on ClientConnection[9bad43ccac038ce7/43ea1f273f4733f1(V1) with server4/193.167.100.100:443] 20.784 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 20.785 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.882/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.785 -> Packet A|0|S0|d3797f2cce95a2ff|47|1 StreamFrame[0(CIB),0,17,fin] 20.813 <- (5) Packet A|9|S0|7e22691729cb544a|32|1 AckFrame[0|Δ71] 20.813 -> Packet A|3|S0|1ee52d4d8133658d|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 20.814 <- (6) Packet A|10|S0|7e22691729cb544a|1054|1 StreamFrame[0(CIB),0,1024,fin] 20.814 -> Packet A|4|S0|1ee52d4d8133658d|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 20.815 <- (2) Packet H|3|L|47|1 AckFrame[1|Δ0] 20.820 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 loss detection timeout handler running 20.821 Retransmitting CryptoFrame[0,36] on level Handshake 20.821 Cwnd(-): 6000; inflight: 47 20.821 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 20.821 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 20.822 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 20.918/Handshake, because ackElicitingInFlight | RTT:33/16 20.821 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 20.844 <- (7) Packet A|11|S0|7e22691729cb544a|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] 20.844 <- (8) Packet A|12|S0|7e22691729cb544a|30|1 ConnectionCloseFrame[0|0|] 20.918 loss detection timeout handler running Sending probe 0, because no ack since 20.785. Current RTT: 33/16. 20.918 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 20.918 (Probe is a handshake retransmit) 20.918 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 193 millis, based on 21.112/Handshake, because ackElicitingInFlight | RTT:33/16 20.918 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 20.950 <- (3) Packet H|5|L|49|1 AckFrame[3,1|Δ0] 20.950 Retransmitting CryptoFrame[0,36] on level Handshake 20.950 Cwnd(-): 3000; inflight: 47 20.950 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 20.950 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 20.950 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 84 millis, based on 21.035/Handshake, because ackElicitingInFlight | RTT:33/13 20.950 -> Packet H|4|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 20.950 <- (3) Packet A|6|S0|43ea1f273f4733f1|98|2 NewConnectionIdFrame[1,<0|1270a9157fed16e0|efa28268680ca4e2c6c9702c936f77ce] NewTokenFrame[01d1bf0cd8087ef43249c63ab793fbe14ac5cfc9f585fd77270d316fed7b25dc0314451532a1585ef4e7] 20.970 -> Packet A|1|S0|d3797f2cce95a2ff|32|1 AckFrame[6|Δ19] 20.981 <- (4) Packet H|7|L|50|1 AckFrame[4-3,1|Δ0] 20.981 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 20.981 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.367 <- (5) Packet A|11|S0|43ea1f273f4733f1|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 21.368 State is set to Confirmed reschedule loss detection timer for PTO over -480 millis, based on 20.887/App, because ackElicitingInFlight | RTT:33/11 21.368 loss detection timeout handler running Sending probe 0, because no ack since 20.785. Current RTT: 33/11. reschedule loss detection timer for PTO over -480 millis, based on 20.887/App, because ackElicitingInFlight | RTT:33/11 21.368 Discarding pn space Handshake because HandshakeDone is received 21.368 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 203 millis, based on 21.572/App, because ackElicitingInFlight | RTT:33/11 21.368 -> Packet PA|2|S0|d3797f2cce95a2ff|47|1 StreamFrame[0(CIB),0,17,fin] 21.387 -> Packet A|3|S0|d3797f2cce95a2ff|34|1 AckFrame[11,6|Δ19] 21.400 <- (6) Packet A|12|S0|43ea1f273f4733f1|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 21.400 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.400 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 93 millis, based on 21.494/App, because ackElicitingInFlight | RTT:33/9 21.400 -> Packet A|4|S0|d3797f2cce95a2ff|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[11|Δ0] 21.401 Finished downloading https://server4:443/rmkdmqtkry at 25:57.401 on ClientConnection[9bad43ccac038ce7/43ea1f273f4733f1(V1) with server4/193.167.100.100:443] 21.401 Closing ClientConnection[9bad43ccac038ce7/43ea1f273f4733f1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.401 -> Packet A|5|S0|d3797f2cce95a2ff|35|2 ConnectionCloseFrame[0|0|] AckFrame[12-11|Δ0] 21.401 Creating connection with server4:443 with v1 21.402 Setting up connection for downloading https://server4:443/ljmrwgfwyz at 25:57.402 on ClientConnection[ef0a657ee4246eea/383bfd1913af3fa1(V1) with server4/193.167.100.100:443] 21.402 Original destination connection id: ef0a657ee4246eea (scid: 383bfd1913af3fa1) >- CryptoStream[I|ClientHello] 21.403 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.603/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.403 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.602 loss detection timeout handler running Sending probe 0, because no ack since 21.403. Current RTT: 100/25. 21.602 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.602 (Probe is an initial retransmit) 21.603 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.003/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.603 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.634 <- (1) Packet I|2|L|48|1 Token=[] AckFrame[1-0|Δ0] 21.635 probe count not reset on ack because handshake not yet confirmed 21.635 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.035/Initial, because peerAwaitingAddressValidation | RTT:100/25 21.737 <- (2) Packet I|3|L|175|2 Token=[] CryptoFrame[0,123] Padding(5) -< CryptoStream[I|ServerHello] 21.737 <- (2) Packet H|4|L|1077|2 CryptoFrame[0,711] Padding(320) 21.739 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 21.921/Handshake, because peerAwaitingAddressValidation | RTT:31/15 21.739 -> Packet I|2|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1153) 21.739 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 21.739 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 21.739 - unsupported transport parameter 0x7158, size 1 (timestamp) 21.739 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 21.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 21.923/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 21.741 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.741 Starting downloading https://server4:443/ljmrwgfwyz at 25:57.742 on ClientConnection[ef0a657ee4246eea/383bfd1913af3fa1(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 90 millis, based on 21.832/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 21.742 Discarding pn space Initial because first Handshake message is being sent 21.741 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 21.742 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 21.833/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 21.742 -> Packet A|0|S0|42a72145e3db5f73|47|1 StreamFrame[0(CIB),0,17,fin] 21.771 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.790 <- (4) Packet H|6|L|1077|2 CryptoFrame[0,711] Padding(320) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.790 -> Packet H|2|L|48|1 AckFrame[6,4|Δ0] 21.832 loss detection timeout handler running Sending probe 0, because no ack since 21.741. Current RTT: 31/15. 21.832 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.832 (Probe is a handshake retransmit) 21.832 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 22.014/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 21.832 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 21.864 <- (5) Packet A|8|S0|383bfd1913af3fa1|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 21.864 State is set to Confirmed reschedule loss detection timer for PTO over 109 millis, based on 21.974/App, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over -6 millis, based on 21.858/App, because ackElicitingInFlight | RTT:31/15 21.865 Discarding pn space Handshake because HandshakeDone is received 21.865 loss detection timeout handler running Sending probe 0, because no ack since 21.742. Current RTT: 31/15. 21.865 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 21.865 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 22.097/App, because ackElicitingInFlight | RTT:31/15 21.865 -> Packet PA|1|S0|42a72145e3db5f73|47|1 StreamFrame[0(CIB),0,17,fin] 21.884 -> Packet A|2|S0|42a72145e3db5f73|32|1 AckFrame[8|Δ19] 21.933 <- (7) Packet A|12|S0|383bfd1913af3fa1|33|1 AckFrame[2-1|Δ18] 21.933 Cwnd(-): 6000; inflight: 0 21.933 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 21.933 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 22.049/App, because ackElicitingInFlight | RTT:31/15 21.933 -> Packet A|3|S0|42a72145e3db5f73|47|1 StreamFrame[0(CIB),0,17,fin] 21.934 <- (8) Packet A|13|S0|383bfd1913af3fa1|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.934 Finished downloading https://server4:443/ljmrwgfwyz at 25:57.934 on ClientConnection[ef0a657ee4246eea/383bfd1913af3fa1(V1) with server4/193.167.100.100:443] 21.934 Closing ClientConnection[ef0a657ee4246eea/383bfd1913af3fa1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.935 -> Packet A|4|S0|42a72145e3db5f73|35|2 ConnectionCloseFrame[0|0|] AckFrame[13-12|Δ0] 21.935 Creating connection with server4:443 with v1 21.935 Setting up connection for downloading https://server4:443/nkdplapfgs at 25:57.935 on ClientConnection[5c328b6e90be8c96/74566a055e3e0e56(V1) with server4/193.167.100.100:443] 21.935 Original destination connection id: 5c328b6e90be8c96 (scid: 74566a055e3e0e56) >- CryptoStream[I|ClientHello] 21.936 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.136/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.936 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.965 <- (9) Packet A|14|S0|383bfd1913af3fa1|98|2 NewConnectionIdFrame[1,<0|5d705db9c4eaf2ed|79e601ca57ab991eb8f949011de84720] NewTokenFrame[01e6984b7736c966cbedae6627ecb876f4d9ff84423a7a2358ce1c541b157bc64b80df7a5b5ae35129a7] 21.966 <- (10) Packet A|15|S0|383bfd1913af3fa1|30|1 ConnectionCloseFrame[0|0|] 21.966 -> Packet A|5|S0|42a72145e3db5f73|35|2 ConnectionCloseFrame[0|0|] AckFrame[13-12|Δ0] 21.969 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.970 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.170/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.969 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,710] Padding(321) 21.972 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.069/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.972 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 21.972 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 21.972 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 21.972 - unsupported transport parameter 0x7158, size 1 (timestamp) 21.972 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 21.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.071/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.974 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.974 Starting downloading https://server4:443/nkdplapfgs at 25:57.974 on ClientConnection[5c328b6e90be8c96/74566a055e3e0e56(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 22.071/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.974 Discarding pn space Initial because first Handshake message is being sent 21.974 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 21.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.071/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.974 -> Packet A|0|S0|c2281a219f983c6f|47|1 StreamFrame[0(CIB),0,17,fin] 22.003 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 22.005 <- (3) Packet A|3|S0|74566a055e3e0e56|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.006 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 22.071/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 22.096/App, because ackElicitingInFlight | RTT:33/16 22.006 Discarding pn space Handshake because HandshakeDone is received 22.006 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 22.006 <- (5) Packet A|6|S0|74566a055e3e0e56|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 22.007 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.007 -> Packet A|1|S0|c2281a219f983c6f|33|1 AckFrame[6,3|Δ0] 22.007 Finished downloading https://server4:443/nkdplapfgs at 25:58.007 on ClientConnection[5c328b6e90be8c96/74566a055e3e0e56(V1) with server4/193.167.100.100:443] 22.007 Closing ClientConnection[5c328b6e90be8c96/74566a055e3e0e56(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.007 -> Packet A|2|S0|c2281a219f983c6f|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 22.007 Creating connection with server4:443 with v1 22.008 Setting up connection for downloading https://server4:443/pszmabmhkj at 25:58.008 on ClientConnection[6c678ffe10f43439/d1e245977fd52359(V1) with server4/193.167.100.100:443] 22.008 Original destination connection id: 6c678ffe10f43439 (scid: d1e245977fd52359) >- CryptoStream[I|ClientHello] 22.009 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.209/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.008 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.042 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.042 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.242/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.042 <- (1) Packet H|1|L|1077|2 CryptoFrame[0,711] Padding(320) 22.044 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 22.044 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 22.044 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.044 - unsupported transport parameter 0x7158, size 1 (timestamp) reschedule loss detection timer for PTO over 96 millis, based on 22.141/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.044 - unsupported transport parameter 0x1057, size 1 (loss-bits) 22.044 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.046 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.143/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.046 Discarding pn space Initial because first Handshake message is being sent 22.046 Starting downloading https://server4:443/pszmabmhkj at 25:58.046 on ClientConnection[6c678ffe10f43439/d1e245977fd52359(V1) with server4/193.167.100.100:443] 22.046 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.046 -> Packet H|0|L|80|1 CryptoFrame[0,36] 22.047 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.144/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.046 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|8abcbf9b3778d73c|47|1 StreamFrame[0(CIB),0,17,fin]] 22.076 <- (6) Packet A|8|S0|74566a055e3e0e56|1054|1 StreamFrame[0(CIB),0,1024,fin] 22.076 -> Packet A|3|S0|c2281a219f983c6f|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 22.077 <- (2) Packet H|2|L|47|1 AckFrame[1|Δ0] 22.083 loss detection timeout handler running 22.083 loss detection timeout handler running 22.083 loss detection timeout handler running 22.083 loss detection timeout handler running 22.083 loss detection timeout handler running 22.083 loss detection timeout handler running 22.083 Retransmitting CryptoFrame[0,36] on level Handshake 22.083 Cwnd(-): 6000; inflight: 47 22.083 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 22.083 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 22.083 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 22.180/Handshake, because ackElicitingInFlight | RTT:33/16 22.083 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[2|Δ0] 22.107 <- (7) Packet A|9|S0|74566a055e3e0e56|98|2 NewConnectionIdFrame[1,<0|661f7ba53dc3ef9e|b222e1863d3b57c3b8c18621d8a8e832] NewTokenFrame[0139358ad2f31fa64f81df0ed1d2ed21869ff32d7072533a5f3ee800cdfd70fcf75a2da07cacfda68432] 22.107 -> Packet A|4|S0|c2281a219f983c6f|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 22.115 <- (3) Packet A|3|S0|d1e245977fd52359|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.115 State is set to Confirmed reschedule loss detection timer for PTO over 53 millis, based on 22.168/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 53 millis, based on 22.168/App, because ackElicitingInFlight | RTT:33/16 22.115 Discarding pn space Handshake because HandshakeDone is received 22.115 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 22.135 -> Packet A|1|S0|8abcbf9b3778d73c|32|1 AckFrame[3|Δ19] 22.168 loss detection timeout handler running Sending probe 0, because no ack since 22.046. Current RTT: 33/16. 22.168 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 22.412/App, because ackElicitingInFlight | RTT:33/16 22.168 -> Packet PA|2|S0|8abcbf9b3778d73c|47|1 StreamFrame[0(CIB),0,17,fin] 22.274 <- (5) Packet A|8|S0|d1e245977fd52359|33|1 AckFrame[2-1|Δ74] 22.274 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 22.274 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 159 millis, based on 22.434/App, because ackElicitingInFlight | RTT:39/24 22.274 -> Packet A|3|S0|8abcbf9b3778d73c|47|1 StreamFrame[0(CIB),0,17,fin] 22.275 <- (6) Packet A|9|S0|d1e245977fd52359|1055|1 StreamFrame[0(CIB),0,1024,fin] 22.275 Finished downloading https://server4:443/pszmabmhkj at 25:58.275 on ClientConnection[6c678ffe10f43439/d1e245977fd52359(V1) with server4/193.167.100.100:443] 22.275 Closing ClientConnection[6c678ffe10f43439/d1e245977fd52359(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.276 -> Packet A|4|S0|8abcbf9b3778d73c|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 22.276 Creating connection with server4:443 with v1 22.276 Setting up connection for downloading https://server4:443/xeryrldwnh at 25:58.276 on ClientConnection[e65cfbba05c20c78/be6c3af0d10e2765(V1) with server4/193.167.100.100:443] 22.276 Original destination connection id: e65cfbba05c20c78 (scid: be6c3af0d10e2765) >- CryptoStream[I|ClientHello] 22.277 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.477/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.277 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.477 loss detection timeout handler running Sending probe 0, because no ack since 22.277. Current RTT: 100/25. 22.477 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.477 (Probe is an initial retransmit) 22.477 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.877/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.477 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.511 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 22.511 probe count not reset on ack because handshake not yet confirmed 22.511 Retransmitting CryptoFrame[0,257] on level Initial 22.511 Cwnd(-): 6000; inflight: 0 22.511 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.911/Initial, because peerAwaitingAddressValidation | RTT:100/25 22.511 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 22.705/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.511 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 22.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.511 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,711] Padding(319) reschedule loss detection timer for PTO over 193 millis, based on 22.708/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.514 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 22.514 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 22.514 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 22.514 - unsupported transport parameter 0x7158, size 1 (timestamp) 22.514 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 22.516 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.710/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.516 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.516 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.613/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.516 Discarding pn space Initial because first Handshake message is being sent 22.516 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 22.516 Starting downloading https://server4:443/xeryrldwnh at 25:58.516 on ClientConnection[e65cfbba05c20c78/be6c3af0d10e2765(V1) with server4/193.167.100.100:443] 22.517 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.614/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.516 -> Packet A|0|S0|68508f7a08ad76fa|47|1 StreamFrame[0(CIB),0,17,fin] 22.547 <- (2) Packet H|3|L|47|1 AckFrame[1|Δ0] 22.552 loss detection timeout handler running 22.552 loss detection timeout handler running 22.552 loss detection timeout handler running 22.552 loss detection timeout handler running 22.552 loss detection timeout handler running 22.552 loss detection timeout handler running 22.552 loss detection timeout handler running 22.552 loss detection timeout handler running 22.552 loss detection timeout handler running 22.552 loss detection timeout handler running 22.552 loss detection timeout handler running 22.552 loss detection timeout handler running 22.553 loss detection timeout handler running 22.553 loss detection timeout handler running 22.553 loss detection timeout handler running 22.553 loss detection timeout handler running 22.553 loss detection timeout handler running 22.553 loss detection timeout handler running 22.553 loss detection timeout handler running 22.553 Retransmitting CryptoFrame[0,36] on level Handshake 22.553 Cwnd(-): 3000; inflight: 47 22.553 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 22.553 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 22.553 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 22.650/Handshake, because ackElicitingInFlight | RTT:33/16 22.553 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 22.585 <- (3) Packet A|4|S0|be6c3af0d10e2765|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.585 State is set to Confirmed reschedule loss detection timer for PTO over 53 millis, based on 22.638/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 53 millis, based on 22.638/App, because ackElicitingInFlight | RTT:33/16 22.585 Discarding pn space Handshake because HandshakeDone is received 22.585 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 22.604 -> Packet A|1|S0|68508f7a08ad76fa|32|1 AckFrame[4|Δ19] 22.638 loss detection timeout handler running Sending probe 0, because no ack since 22.516. Current RTT: 33/16. 22.638 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 22.882/App, because ackElicitingInFlight | RTT:33/16 22.638 -> Packet PA|2|S0|68508f7a08ad76fa|47|1 StreamFrame[0(CIB),0,17,fin] 22.664 <- (5) Packet A|7|S0|be6c3af0d10e2765|98|2 NewConnectionIdFrame[1,<0|74883b3b6efadf5d|537f865a5ec530965fefaa8e48b27279] NewTokenFrame[01c699480251afc04104093e52daab798591619db317f3e05b5a3e4228eb95275aaee3a0e36666ae917e] 22.670 <- (6) Packet A|8|S0|be6c3af0d10e2765|1059|2 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024,fin] 22.671 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.671 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 22.781/App, because ackElicitingInFlight | RTT:33/13 22.671 -> Packet A|3|S0|68508f7a08ad76fa|55|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7,4|Δ6] 22.671 Finished downloading https://server4:443/xeryrldwnh at 25:58.671 on ClientConnection[e65cfbba05c20c78/be6c3af0d10e2765(V1) with server4/193.167.100.100:443] 22.671 Closing ClientConnection[e65cfbba05c20c78/be6c3af0d10e2765(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.672 -> Packet A|4|S0|68508f7a08ad76fa|37|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,4|Δ0] 22.672 Creating connection with server4:443 with v1 22.672 Setting up connection for downloading https://server4:443/mnlfpfbhvg at 25:58.673 on ClientConnection[64aa7096421f27e6/a0a72c6f5cf1f66b(V1) with server4/193.167.100.100:443] 22.672 Original destination connection id: 64aa7096421f27e6 (scid: a0a72c6f5cf1f66b) >- CryptoStream[I|ClientHello] 22.674 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.874/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.673 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.873 loss detection timeout handler running Sending probe 0, because no ack since 22.673. Current RTT: 100/25. 22.873 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.873 (Probe is an initial retransmit) 22.873 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.273/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.873 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.907 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 22.907 probe count not reset on ack because handshake not yet confirmed 22.907 Retransmitting CryptoFrame[0,257] on level Initial 22.907 Cwnd(-): 6000; inflight: 0 22.907 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.307/Initial, because peerAwaitingAddressValidation | RTT:100/25 22.908 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 23.102/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.907 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 22.907 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 22.910 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.104/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.910 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 22.910 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 22.910 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 22.910 - unsupported transport parameter 0x7158, size 1 (timestamp) 22.910 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 22.912 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.106/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.912 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.912 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.009/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.912 Starting downloading https://server4:443/mnlfpfbhvg at 25:58.912 on ClientConnection[64aa7096421f27e6/a0a72c6f5cf1f66b(V1) with server4/193.167.100.100:443] 22.912 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 22.912 Discarding pn space Initial because first Handshake message is being sent 22.913 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.010/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.913 -> Packet A|0|S0|4db077e4e0eda63f|47|1 StreamFrame[0(CIB),0,17,fin] 22.941 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 22.943 <- (3) Packet A|4|S0|a0a72c6f5cf1f66b|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.944 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 23.009/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 23.035/App, because ackElicitingInFlight | RTT:33/16 22.944 Discarding pn space Handshake because HandshakeDone is received 22.944 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 22.944 <- (5) Packet A|7|S0|a0a72c6f5cf1f66b|1059|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 22.945 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.945 -> Packet A|1|S0|4db077e4e0eda63f|33|1 AckFrame[7,4|Δ0] 22.945 Finished downloading https://server4:443/mnlfpfbhvg at 25:58.945 on ClientConnection[64aa7096421f27e6/a0a72c6f5cf1f66b(V1) with server4/193.167.100.100:443] 22.945 Closing ClientConnection[64aa7096421f27e6/a0a72c6f5cf1f66b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.945 -> Packet A|2|S0|4db077e4e0eda63f|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,4|Δ0] 22.946 Creating connection with server4:443 with v1 22.946 Setting up connection for downloading https://server4:443/zibvubhxvl at 25:58.946 on ClientConnection[4aa96af7e343fe5e/004f57834cdf6cb0(V1) with server4/193.167.100.100:443] 22.946 Original destination connection id: 4aa96af7e343fe5e (scid: 004f57834cdf6cb0) >- CryptoStream[I|ClientHello] 22.947 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.147/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.947 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.146 loss detection timeout handler running Sending probe 0, because no ack since 22.947. Current RTT: 100/25. 23.146 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.147 (Probe is an initial retransmit) 23.147 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.547/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.147 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.180 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 23.181 probe count not reset on ack because handshake not yet confirmed 23.181 Retransmitting CryptoFrame[0,257] on level Initial 23.181 Cwnd(-): 6000; inflight: 0 23.181 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.581/Initial, because peerAwaitingAddressValidation | RTT:100/25 23.181 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 23.375/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.181 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 23.180 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 23.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.377/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.183 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 23.184 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 23.184 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 23.184 - unsupported transport parameter 0x7158, size 1 (timestamp) 23.184 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 23.186 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.186 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.186 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 23.186 Starting downloading https://server4:443/zibvubhxvl at 25:59.187 on ClientConnection[4aa96af7e343fe5e/004f57834cdf6cb0(V1) with server4/193.167.100.100:443] 23.187 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.284/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.187 Discarding pn space Initial because first Handshake message is being sent 23.187 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.284/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.187 -> Packet A|0|S0|32f2a78ea4520728|47|1 StreamFrame[0(CIB),0,17,fin] 23.213 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 23.218 <- (3) Packet A|3|S0|004f57834cdf6cb0|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 23.219 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 23.283/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 23.309/App, because ackElicitingInFlight | RTT:33/16 23.219 Discarding pn space Handshake because HandshakeDone is received 23.238 -> Packet A|1|S0|32f2a78ea4520728|32|1 AckFrame[3|Δ19] 23.309 loss detection timeout handler running Sending probe 0, because no ack since 23.187. Current RTT: 33/16. 23.309 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 23.553/App, because ackElicitingInFlight | RTT:33/16 23.309 -> Packet PA|2|S0|32f2a78ea4520728|47|1 StreamFrame[0(CIB),0,17,fin] 23.552 loss detection timeout handler running Sending probe 1, because no ack since 23.309. Current RTT: 33/16. 23.552 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 24.041/App, because ackElicitingInFlight | RTT:33/16 23.553 -> Packet PA|3|S0|32f2a78ea4520728|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 24.042/App, because ackElicitingInFlight | RTT:33/16 23.554 -> Packet PA|4|S0|32f2a78ea4520728|47|1 StreamFrame[0(CIB),0,17,fin] 23.584 <- (4) Packet A|7|S0|004f57834cdf6cb0|32|1 AckFrame[4-1|Δ0] 23.585 Cwnd(-): 3000; inflight: 0 23.585 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 23.585 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 23.695/App, because ackElicitingInFlight | RTT:33/13 23.585 -> Packet A|5|S0|32f2a78ea4520728|47|1 StreamFrame[0(CIB),0,17,fin] 23.626 <- (5) Packet A|8|S0|004f57834cdf6cb0|33|1 AckFrame[5-1|Δ10] 23.626 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 23.886 <- (6) Packet A|10|S0|004f57834cdf6cb0|1055|1 StreamFrame[0(CIB),0,1024,fin] 23.887 Finished downloading https://server4:443/zibvubhxvl at 25:59.887 on ClientConnection[4aa96af7e343fe5e/004f57834cdf6cb0(V1) with server4/193.167.100.100:443] 23.887 Closing ClientConnection[4aa96af7e343fe5e/004f57834cdf6cb0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.887 -> Packet A|6|S0|32f2a78ea4520728|37|2 ConnectionCloseFrame[0|0|] AckFrame[10,8-7|Δ0]