18:28.962 Starting first download at 18:28.953 18:28.989 Creating connection with server4:443 with v1 18:29.040 Original destination connection id: 1b191d054d96ec37 (scid: 4572a1eb10b266a5) >- CryptoStream[I|ClientHello] 18:29.188 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 18:29.388/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18:29.183 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18:29.222 <- (1) Packet I|0|L|176|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18:29.237 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18:29.437/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18:29.263 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 18:29.377/Handshake, because peerAwaitingAddressValidation | RTT:38/19 18:29.263 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 18:29.222 <- (1) Packet H|1|L|1076|2 CryptoFrame[0,710] Padding(320) 18:29.277 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 18:29.277 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 18:29.277 - unsupported transport parameter 0x7158, size 1 (timestamp) 18:29.277 - unsupported transport parameter 0x1057, size 1 (loss-bits) >- CryptoStream[H|Finished] 18:29.302 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 18:29.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 18:29.301 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18:29.307 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 18:29.311 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 18:29.425/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 18:29.311 Discarding pn space Initial because first Handshake message is being sent 18:29.312 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 18:29.330 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 18:29.444/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 18:29.334 <- (3) Packet A|3|S0|4572a1eb10b266a5|603|2 CryptoFrame[0,572] HandshakeDoneFrame[] 18:29.330 -> Packet A|0|S0|10b6c0c1c7ebf27f|288|1 StreamFrame[0(CIB),0,257,fin] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 18:29.343 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 18:29.415/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 125 millis, based on 18:29.469/App, because ackElicitingInFlight | RTT:38/19 18:29.344 Discarding pn space Handshake because HandshakeDone is received 18:29.344 Discarding packet (145 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 18:29.361 <- (5) Packet A|6|S0|4572a1eb10b266a5|66|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,32,fin] 18:29.362 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18:29.364 Downloaded https://server4:443/tgjzxudxgbzsknwcbtkswrkmbbkpdykkcsdbnszcbbezrtjflqatfomppvwzwzqnkxwpcpjpodlnuqxmixzoinrdsfzkgynlzdmnlmhlfinnkrxgtimejdrubmjywgrjtloymbgcytbrvpvolonfvfibllkdzvoqaoddmhyhbcnkrvowrdedoghvrxcsbpcybijestusnldafykubyaenjwbkovggviemycwboxmdviqbahnyxytanjddk finished at 18:29.364 18:29.364 -> Packet A|1|S0|10b6c0c1c7ebf27f|34|1 AckFrame[6,3|Δ19] 18:29.364 Got 2 new session tickets 18:29.371 Closing ClientConnection[1b191d054d96ec37/4572a1eb10b266a5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18:29.373 Connection closed; starting second connection with 0-rtt 18:29.373 Creating connection with server4:443 with v1 18:29.375 Original destination connection id: 554159d065b39f2d (scid: 9541bf6ec75bfc4a) 18:29.374 -> Packet A|2|S0|10b6c0c1c7ebf27f|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] >- CryptoStream[I|ClientHello] 18:29.381 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18:29.382 Sending 257 bytes of early data on Stream 0 18:29.382 Sending 257 bytes of early data on Stream 4 18:29.382 Sending 257 bytes of early data on Stream 8 18:29.382 Sending 257 bytes of early data on Stream 12 18:29.382 Sending 257 bytes of early data on Stream 16 18:29.382 Sending 257 bytes of early data on Stream 20 18:29.383 Sending 257 bytes of early data on Stream 24 18:29.383 Sending 257 bytes of early data on Stream 28 18:29.383 Sending 257 bytes of early data on Stream 32 18:29.383 Sending 257 bytes of early data on Stream 36 18:29.383 Sending 257 bytes of early data on Stream 40 18:29.383 Sending 257 bytes of early data on Stream 44 18:29.383 Sending 257 bytes of early data on Stream 48 18:29.383 Sending 257 bytes of early data on Stream 52 18:29.384 Sending 257 bytes of early data on Stream 56 18:29.384 Sending 257 bytes of early data on Stream 60 18:29.384 Sending 257 bytes of early data on Stream 64 18:29.384 Sending 257 bytes of early data on Stream 68 18:29.384 Sending 257 bytes of early data on Stream 72 18:29.384 Sending 257 bytes of early data on Stream 76 18:29.384 Sending 257 bytes of early data on Stream 80 18:29.384 Sending 257 bytes of early data on Stream 84 18:29.385 Sending 257 bytes of early data on Stream 88 reschedule loss detection timer for PTO over 196 millis, based on 18:29.582/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18:29.385 Sending 257 bytes of early data on Stream 92 18:29.385 Sending 257 bytes of early data on Stream 96 18:29.381 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,564] Padding(589) 18:29.385 Sending 257 bytes of early data on Stream 100 18:29.385 Sending 257 bytes of early data on Stream 104 18:29.385 Sending 257 bytes of early data on Stream 108 18:29.386 Sending 257 bytes of early data on Stream 112 18:29.386 Sending 257 bytes of early data on Stream 116 18:29.386 Sending 257 bytes of early data on Stream 120 18:29.386 Sending 257 bytes of early data on Stream 124 18:29.386 Sending 257 bytes of early data on Stream 128 18:29.386 Sending 257 bytes of early data on Stream 132 18:29.386 Sending 257 bytes of early data on Stream 136 18:29.386 Sending 257 bytes of early data on Stream 140 18:29.387 Sending 257 bytes of early data on Stream 144 18:29.387 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18:29.587/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18:29.388 Sending 257 bytes of early data on Stream 148 18:29.388 Sending 257 bytes of early data on Stream 152 18:29.387 -> Packet Z|0|Z|1252|5 StreamFrame[0(CIB),0,257,fin] StreamFrame[4(CIB),0,257,fin] StreamFrame[8(CIB),0,257,fin] StreamFrame[12(CIB),0,257,fin] StreamFrame[16(CIB),0,157] 18:29.391 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18:29.592/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18:29.391 -> Packet Z|1|Z|1252|5 StreamFrame[20(CIB),0,257,fin] StreamFrame[24(CIB),0,257,fin] StreamFrame[28(CIB),0,257,fin] StreamFrame[32(CIB),0,257,fin] StreamFrame[36(CIB),0,157] 18:29.393 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18:29.593/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18:29.393 -> Packet Z|2|Z|1252|5 StreamFrame[40(CIB),0,257,fin] StreamFrame[44(CIB),0,257,fin] StreamFrame[48(CIB),0,257,fin] StreamFrame[52(CIB),0,257,fin] StreamFrame[56(CIB),0,157] 18:29.394 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18:29.594/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18:29.394 -> Packet Z|3|Z|1252|5 StreamFrame[60(CIB),0,257,fin] StreamFrame[64(CIB),0,257,fin] StreamFrame[68(CIB),0,257,fin] StreamFrame[72(CIB),0,257,fin] StreamFrame[76(CIB),0,153] 18:29.395 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18:29.595/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18:29.395 -> Packet Z|4|Z|1252|5 StreamFrame[80(CIB),0,257,fin] StreamFrame[84(CIB),0,257,fin] StreamFrame[88(CIB),0,257,fin] StreamFrame[92(CIB),0,257,fin] StreamFrame[96(CIB),0,152] 18:29.396 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18:29.596/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18:29.396 -> Packet Z|5|Z|1252|5 StreamFrame[100(CIB),0,257,fin] StreamFrame[104(CIB),0,257,fin] StreamFrame[108(CIB),0,257,fin] StreamFrame[112(CIB),0,257,fin] StreamFrame[116(CIB),0,152] 18:29.398 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18:29.598/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18:29.398 -> Packet Z|6|Z|1251|6 StreamFrame[120(CIB),0,257,fin] StreamFrame[16(CIB),157,100,fin] StreamFrame[124(CIB),0,257,fin] StreamFrame[128(CIB),0,257,fin] StreamFrame[132(CIB),0,257,fin] StreamFrame[136(CIB),0,46] 18:29.399 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18:29.599/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18:29.399 -> Packet Z|7|Z|1251|6 StreamFrame[140(CIB),0,257,fin] StreamFrame[144(CIB),0,257,fin] StreamFrame[148(CIB),0,257,fin] StreamFrame[152(CIB),0,257,fin] StreamFrame[36(CIB),157,100,fin] StreamFrame[56(CIB),157,46] 18:29.395 <- (6) Packet A|7|S0|4572a1eb10b266a5|98|2 NewConnectionIdFrame[1,<0|8d684705b979a8a6|4bd86279ea95e704dc154e33054ef063] NewTokenFrame[01b3d8c3cd2426457532ebc856907b2c89265e0c8da629ea91df903e426e154007d568e9b2a06289acb3] 18:29.404 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18:29.604/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18:29.401 -> Packet Z|8|Z|653|5 StreamFrame[76(CIB),153,104,fin] StreamFrame[96(CIB),152,105,fin] StreamFrame[116(CIB),152,105,fin] StreamFrame[136(CIB),46,211,fin] StreamFrame[56(CIB),203,54,fin] 18:29.405 -> Packet A|3|S0|10b6c0c1c7ebf27f|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 18:29.416 <- (1) Packet I|0|L|1200|3 Token=[] AckFrame[0|Δ0] CryptoFrame[0,129] Padding(1018) 18:29.418 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18:29.619/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 18:29.425 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18:29.527/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18:29.425 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 18:29.426 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18:29.528/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18:29.426 Discarding pn space Initial because first Handshake message is being sent 18:29.418 <- (2) Packet H|1|L|1070|2 CryptoFrame[0,165] Padding(859) 18:29.427 - unsupported transport parameter 0xde1a, size 2 (delayed-ack) 18:29.427 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 18:29.427 - unsupported transport parameter 0x7158, size 1 (timestamp) 18:29.428 - unsupported transport parameter 0x1057, size 1 (loss-bits) 18:29.428 Server has accepted early data. >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Finished] 18:29.418 <- (3) Packet A|2|S0|9541bf6ec75bfc4a|602|1 CryptoFrame[0,572] 18:29.432 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18:29.534/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18:29.429 -> Packet H|0|L|80|1 CryptoFrame[0,36] 18:29.432 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 18:29.433 Processing response for stream Stream 0 18:29.418 <- (4) Packet A|3|S0|9541bf6ec75bfc4a|98|2 NewConnectionIdFrame[1,<0|85c7fe924b0be6f4|446dd8bf16e6acc198bf635edd50dc93] NewTokenFrame[01dac68963d54a31f3f9698273b102026fd4ca2c27361aefe711cc1d617c2db5f874b842850360bf75b6] 18:29.420 <- (5) Packet A|4|S0|9541bf6ec75bfc4a|171|5 AckFrame[0|Δ0] StreamFrame[0(CIB),0,32,fin] StreamFrame[4(CIB),0,32,fin] StreamFrame[8(CIB),0,32,fin] StreamFrame[12(CIB),0,32,fin] 18:29.437 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18:29.434 -> Packet A|9|S0|dfc5739f85a82839|32|1 AckFrame[3-2|Δ1] reschedule loss detection timer for PTO over 101 millis, based on 18:29.539/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18:29.437 Processing response for stream Stream 4 18:29.437 Processing response for stream Stream 8 18:29.437 Processing response for stream Stream 12 18:29.426 <- (6) Packet A|5|S0|9541bf6ec75bfc4a|171|5 AckFrame[1-0|Δ0] StreamFrame[20(CIB),0,32,fin] StreamFrame[24(CIB),0,32,fin] StreamFrame[28(CIB),0,32,fin] StreamFrame[32(CIB),0,32,fin] 18:29.437 Processing response for stream Stream 16 18:29.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 85 millis, based on 18:29.524/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/13 18:29.426 <- (7) Packet A|6|S0|9541bf6ec75bfc4a|171|5 AckFrame[2-0|Δ0] StreamFrame[40(CIB),0,32,fin] StreamFrame[44(CIB),0,32,fin] StreamFrame[48(CIB),0,32,fin] StreamFrame[52(CIB),0,32,fin] 18:29.439 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 73 millis, based on 18:29.513/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 18:29.427 <- (8) Packet A|7|S0|9541bf6ec75bfc4a|174|5 AckFrame[3-0|Δ0] StreamFrame[60(CIB),0,32,fin] StreamFrame[64(CIB),0,32,fin] StreamFrame[68(CIB),0,32,fin] StreamFrame[72(CIB),0,32,fin] 18:29.440 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 65 millis, based on 18:29.506/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/8 18:29.440 -> Packet A|10|S0|dfc5739f85a82839|32|1 AckFrame[6-2|Δ2] 18:29.428 <- (9) Packet A|8|S0|9541bf6ec75bfc4a|175|5 AckFrame[4-0|Δ0] StreamFrame[80(CIB),0,32,fin] StreamFrame[84(CIB),0,32,fin] StreamFrame[88(CIB),0,32,fin] StreamFrame[92(CIB),0,32,fin] 18:29.441 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 61 millis, based on 18:29.503/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/7 18:29.441 -> Packet A|11|S0|dfc5739f85a82839|32|1 AckFrame[8-2|Δ1] 18:29.429 <- (10) Packet A|9|S0|9541bf6ec75bfc4a|175|5 AckFrame[5-0|Δ0] StreamFrame[100(CIB),0,32,fin] StreamFrame[104(CIB),0,32,fin] StreamFrame[108(CIB),0,32,fin] StreamFrame[112(CIB),0,32,fin] 18:29.442 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 57 millis, based on 18:29.500/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/6 18:29.431 <- (11) Packet A|10|S0|9541bf6ec75bfc4a|210|6 AckFrame[6-0|Δ0] StreamFrame[16(CIB),0,32,fin] StreamFrame[120(CIB),0,32,fin] StreamFrame[124(CIB),0,32,fin] StreamFrame[128(CIB),0,32,fin] StreamFrame[132(CIB),0,32,fin] 18:29.443 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 53 millis, based on 18:29.497/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/5 18:29.443 Processing response for stream Stream 20 18:29.443 Processing response for stream Stream 24 18:29.444 Processing response for stream Stream 28 18:29.444 -> Packet A|12|S0|dfc5739f85a82839|32|1 AckFrame[10-2|Δ1] 18:29.444 Processing response for stream Stream 32 18:29.444 Processing response for stream Stream 36 18:29.432 <- (12) Packet A|11|S0|9541bf6ec75bfc4a|210|6 AckFrame[7-0|Δ0] StreamFrame[36(CIB),0,32,fin] StreamFrame[140(CIB),0,32,fin] StreamFrame[144(CIB),0,32,fin] StreamFrame[148(CIB),0,32,fin] StreamFrame[152(CIB),0,32,fin] 18:29.445 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 49 millis, based on 18:29.495/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/4 18:29.433 <- (13) Packet A|12|S0|9541bf6ec75bfc4a|210|6 AckFrame[8-0|Δ0] StreamFrame[56(CIB),0,32,fin] StreamFrame[76(CIB),0,32,fin] StreamFrame[96(CIB),0,32,fin] StreamFrame[116(CIB),0,32,fin] StreamFrame[136(CIB),0,32,fin] 18:29.446 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 45 millis, based on 18:29.492/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/3 18:29.446 Processing response for stream Stream 40 18:29.446 Processing response for stream Stream 44 18:29.446 -> Packet A|13|S0|dfc5739f85a82839|31|1 AckFrame[12-2|Δ0] 18:29.446 Processing response for stream Stream 48 18:29.447 Processing response for stream Stream 52 18:29.447 Processing response for stream Stream 56 18:29.447 Processing response for stream Stream 60 18:29.447 Processing response for stream Stream 64 18:29.447 Processing response for stream Stream 68 18:29.448 Processing response for stream Stream 72 18:29.448 Processing response for stream Stream 76 18:29.448 Processing response for stream Stream 80 18:29.448 Processing response for stream Stream 84 18:29.448 Processing response for stream Stream 88 18:29.448 Processing response for stream Stream 92 18:29.449 Processing response for stream Stream 96 18:29.449 Processing response for stream Stream 100 18:29.449 Processing response for stream Stream 104 18:29.449 Processing response for stream Stream 108 18:29.449 Processing response for stream Stream 112 18:29.449 Processing response for stream Stream 116 18:29.450 Processing response for stream Stream 120 18:29.450 Processing response for stream Stream 124 18:29.450 Processing response for stream Stream 128 18:29.450 Processing response for stream Stream 132 18:29.450 Processing response for stream Stream 136 18:29.450 Processing response for stream Stream 140 18:29.451 Processing response for stream Stream 144 18:29.451 Processing response for stream Stream 148 18:29.451 Processing response for stream Stream 152 18:29.452 Download finished at 18:29.451