56acc4a9c277aaea: No root crt list specified -- certificate will not be verified. 56acc4a9c277aaea: Sending ALPN list (1): hq-interop 56acc4a9c277aaea: Sending transport parameter TLS extension (85 bytes): 56acc4a9c277aaea: Extension list (85 bytes): 56acc4a9c277aaea: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 56acc4a9c277aaea: Extension type: 4 (initial_max_data), length 4, 80100000 56acc4a9c277aaea: Extension type: 8 (max_streams_bidi), length 2, 4200 56acc4a9c277aaea: Extension type: 1 (idle_timeout), length 4, 8002bf20 56acc4a9c277aaea: Extension type: 3 (max_packet_size), length 2, 45a0 56acc4a9c277aaea: Extension type: 9 (max_streams_uni), length 2, 4200 56acc4a9c277aaea: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 56acc4a9c277aaea: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 56acc4a9c277aaea: Extension type: 14 (active_connection_id_limit), length 1, 08 56acc4a9c277aaea: Extension type: 11 (max_ack_delay), length 1, 0a 56acc4a9c277aaea: Extension type: 15 (hcid), length 8, 992c4e9502683126 56acc4a9c277aaea: Extension type: 2724 (unknown), length 4, 8000acc4 56acc4a9c277aaea: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 56acc4a9c277aaea: Extension type: 29016 (enable_time_stamp), length 1, 03 56acc4a9c277aaea: Extension type: 10930 (grease_quic_bit), length 0 56acc4a9c277aaea: Preparing GET on stream 0 for /cruel-mild-rocket 56acc4a9c277aaea: Sending packet type: 2 (initial), S0, Q1, Version 1, 56acc4a9c277aaea: <56acc4a9c277aaea>, <992c4e9502683126>, Seq: 95897, pl: 617 56acc4a9c277aaea: Token length: 42, Token: 01ca0fb1371e13b654c0b85fa420d3d3... 56acc4a9c277aaea: Prepared 597 bytes 56acc4a9c277aaea: ping, 1 bytes 56acc4a9c277aaea: crypto_hs, offset 0, length 592: 0100024c0303702a... 56acc4a9c277aaea: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 56acc4a9c277aaea: <56acc4a9c277aaea>, <992c4e9502683126>, Seq: 0, pl: 542 56acc4a9c277aaea: Prepared 522 bytes 56acc4a9c277aaea: stream 0, offset 0, length 24, fin = 1: 474554202f637275... 56acc4a9c277aaea: padding, 495 bytes 56acc4a9c277aaea: Sending 1252 bytes to 193.167.100.100:443 at T=0.001905 (24ac6d91) 56acc4a9c277aaea: T= 0.252198, Lost packet type 2, number 95897, size 669, DCID <>, reason: timer 56acc4a9c277aaea: Sending packet type: 2 (initial), S0, Q1, Version 1, 56acc4a9c277aaea: <56acc4a9c277aaea>, <992c4e9502683126>, Seq: 95898, pl: 617 56acc4a9c277aaea: Token length: 42, Token: 01ca0fb1371e13b654c0b85fa420d3d3... 56acc4a9c277aaea: Prepared 597 bytes 56acc4a9c277aaea: ping, 1 bytes 56acc4a9c277aaea: crypto_hs, offset 0, length 592: 0100024c0303702a... 56acc4a9c277aaea: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 56acc4a9c277aaea: <56acc4a9c277aaea>, <992c4e9502683126>, Seq: 1, pl: 542 56acc4a9c277aaea: Prepared 522 bytes 56acc4a9c277aaea: padding, 522 bytes 56acc4a9c277aaea: Sending 1252 bytes to 193.167.100.100:443 at T=0.252198 (24b03f46) 56acc4a9c277aaea: T= 0.752750, Lost packet type 2, number 95898, size 669, DCID <>, reason: timer 56acc4a9c277aaea: Sending packet type: 2 (initial), S0, Q1, Version 1, 56acc4a9c277aaea: <56acc4a9c277aaea>, <992c4e9502683126>, Seq: 95899, pl: 617 56acc4a9c277aaea: Token length: 42, Token: 01ca0fb1371e13b654c0b85fa420d3d3... 56acc4a9c277aaea: Prepared 597 bytes 56acc4a9c277aaea: ping, 1 bytes 56acc4a9c277aaea: crypto_hs, offset 0, length 592: 0100024c0303702a... 56acc4a9c277aaea: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 56acc4a9c277aaea: <56acc4a9c277aaea>, <992c4e9502683126>, Seq: 2, pl: 542 56acc4a9c277aaea: Prepared 522 bytes 56acc4a9c277aaea: padding, 522 bytes 56acc4a9c277aaea: Sending 1252 bytes to 193.167.100.100:443 at T=0.752750 (24b7e28e) 56acc4a9c277aaea: Receiving 1200 bytes from 193.167.100.100:443 at T=0.787678 (24b86afe) 56acc4a9c277aaea: Receiving packet type: 2 (initial), S0, Q0, Version 1, 56acc4a9c277aaea: <992c4e9502683126>, <11fa5c21bc414d34>, Seq: 0, pl: 1174 56acc4a9c277aaea: Token length: 0 56acc4a9c277aaea: Decrypted 1157 bytes 56acc4a9c277aaea: ack_ecn (nb=0), 95899, ect0=0, ect1=1, ce=0 56acc4a9c277aaea: crypto_hs, offset 0, length 129: 0200007d03036356... 56acc4a9c277aaea: padding, 1012 bytes 56acc4a9c277aaea: Receiving 1064 bytes from 193.167.100.100:443 at T=0.788534 (24b86e56) 56acc4a9c277aaea: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 56acc4a9c277aaea: <992c4e9502683126>, <11fa5c21bc414d34>, Seq: 1, pl: 1039 56acc4a9c277aaea: Decrypted 1022 bytes 56acc4a9c277aaea: crypto_hs, offset 0, length 165: 0800007d007b0010... 56acc4a9c277aaea: padding, 853 bytes 56acc4a9c277aaea: Received transport parameter TLS extension (98 bytes): 56acc4a9c277aaea: Extension list (98 bytes): 56acc4a9c277aaea: Extension type: 1 (idle_timeout), length 4, 80007530 56acc4a9c277aaea: Extension type: 4 (initial_max_data), length 4, 80180000 56acc4a9c277aaea: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80100000 56acc4a9c277aaea: Extension type: 7 (max_stream_data_uni), length 2, 7000 56acc4a9c277aaea: Extension type: 8 (max_streams_bidi), length 2, 4064 56acc4a9c277aaea: Extension type: 9 (max_streams_uni), length 1, 03 56acc4a9c277aaea: Extension type: 14 (active_connection_id_limit), length 1, 08 56acc4a9c277aaea: Extension type: 56858 (unknown), length 2, 6710 56acc4a9c277aaea: Extension type: 4278378010 (unknown), length 2, 6710 56acc4a9c277aaea: Extension type: 29016 (enable_time_stamp), length 1, 02 56acc4a9c277aaea: Extension type: 4183 (enable_loss_bit), length 1, 01 56acc4a9c277aaea: Extension type: 0 (ocid), length 8, 56acc4a9c277aaea 56acc4a9c277aaea: Extension type: 15 (hcid), length 8, 11fa5c21bc414d34 56acc4a9c277aaea: Extension type: 2 (stateless_reset_token), length 16, 5ddc315b4847199c853ceaa48a73366c 56acc4a9c277aaea: The session was properly resumed! 56acc4a9c277aaea: Zero RTT data is accepted! 56acc4a9c277aaea: Negotiated ALPN: hq-interop 56acc4a9c277aaea: Sending packet type: 4 (handshake), S0, Q1, Version 1, 56acc4a9c277aaea: <11fa5c21bc414d34>, <992c4e9502683126>, Seq: 0, pl: 67 56acc4a9c277aaea: Prepared 47 bytes 56acc4a9c277aaea: ack_ecn (nb=0), 1, ect0=1, ect1=0, ce=0 56acc4a9c277aaea: crypto_hs, offset 0, length 36: 1400002008876301... 56acc4a9c277aaea: T= 0.788735, Lost packet type 5, number 0, size 551, DCID <11fa5c21bc414d34>, reason: timer 56acc4a9c277aaea: Sending packet type: 6 (1rtt protected), S0, Q1, 56acc4a9c277aaea: <11fa5c21bc414d34>, Seq: 3 (3), Phi: 0, 56acc4a9c277aaea: Prepared 285 bytes 56acc4a9c277aaea: new_connection_id[1]: 0x275a103d69162d57, f3969f1d38617e121cf6f8eb7369c2e1 56acc4a9c277aaea: new_connection_id[2]: 0x317f067649e02a25, be0afc7fd01dbb672682f518b8390344 56acc4a9c277aaea: new_connection_id[3]: 0xf2f4059f603411ff, b9f0576cbefdc4e2d02ef0bb26ae0255 56acc4a9c277aaea: new_connection_id[4]: 0xabf5510be7ba7781, 7991ecf359dbba03159c71afc2349825 56acc4a9c277aaea: new_connection_id[5]: 0xbc556e9901b9c48f, b2d5ebb2ba49ec54649bf84c352643f6 56acc4a9c277aaea: new_connection_id[6]: 0x6ede2163b232b784, 6a6af4ba4eba226823f1777aa67be2ad 56acc4a9c277aaea: new_connection_id[7]: 0xa39a24d4a0321e83, 7d753db6c05f36984fb6e97aa1a8bd81 56acc4a9c277aaea: stream 0, offset 0, length 24, fin = 1: 474554202f637275... 56acc4a9c277aaea: padding, 62 bytes 56acc4a9c277aaea: T= 0.788735, cwin: 16029,flight: 1537,nb_ret: 3,rtt_min: 34928,rtt: 34928,rtt_var: 17464,max_ack_delay: 0,state: 13 56acc4a9c277aaea: Sending 403 bytes to 193.167.100.100:443 at T=0.788735 (24b86f1f) 56acc4a9c277aaea: T= 0.788735, Lost packet type 5, number 1, size 551, DCID <11fa5c21bc414d34>, reason: repeat 56acc4a9c277aaea: Connection established. Version = 1, I-CID: 56acc4a9c277aaea, verified: 1 56acc4a9c277aaea: Receiving 602 bytes from 193.167.100.100:443 at T=0.789020 (24b8703c) 56acc4a9c277aaea: Receiving packet type: 6 (1rtt protected), S0, Q0, 56acc4a9c277aaea: <992c4e9502683126>, Seq: 2 (2), Phi: 0, 56acc4a9c277aaea: Decrypted 576 bytes 56acc4a9c277aaea: crypto_hs, offset 0, length 572: 0400011a0002a300... 56acc4a9c277aaea: T= 0.789020, cwin: 16029,flight: 970,nb_ret: 4,rtt_min: 34928,rtt: 34928,rtt_var: 17464,max_ack_delay: 0,state: 13 56acc4a9c277aaea: Sending packet type: 6 (1rtt protected), S1, Q1, 56acc4a9c277aaea: <11fa5c21bc414d34>, Seq: 4 (4), Phi: 0, 56acc4a9c277aaea: Prepared 29 bytes 56acc4a9c277aaea: ack_ecn (nb=0), 2, ect0=1, ect1=0, ce=0 56acc4a9c277aaea: padding, 21 bytes 56acc4a9c277aaea: T= 0.789087, cwin: 16029,flight: 1025,nb_ret: 4,rtt_min: 34928,rtt: 34928,rtt_var: 17464,max_ack_delay: 0,state: 13 56acc4a9c277aaea: Sending 55 bytes to 193.167.100.100:443 at T=0.789087 (24b8707f) 56acc4a9c277aaea: Receiving 238 bytes from 193.167.100.100:443 at T=0.789195 (24b870eb) 56acc4a9c277aaea: Receiving packet type: 6 (1rtt protected), S0, Q0, 56acc4a9c277aaea: <992c4e9502683126>, Seq: 3 (3), Phi: 0, 56acc4a9c277aaea: Decrypted 212 bytes 56acc4a9c277aaea: new_connection_id[1]: 0x9000a34a1bc40d31, 33feaef9fe84ff172ec2a6485f893d2d 56acc4a9c277aaea: new_connection_id[2]: 0x38ddcf13c9e5b70a, 83037229b1a606a8f123fc695cd505c9 56acc4a9c277aaea: new_connection_id[3]: 0x7431033e3f81288b, d7d8ce7e9b661ce546fb13b7088bd96e 56acc4a9c277aaea: new_connection_id[4]: 0x0be8104870d86e2b, f273734eed0bd96aa6dbf50c59b5e4e7 56acc4a9c277aaea: new_connection_id[5]: 0xb10dec5ff9b8508e, 52691e5bae8825f2b2bdaa4ebc7cf069 56acc4a9c277aaea: new_connection_id[6]: 0x4205f9a47d093c90, ad28f1f8824acccfee3d12841df53c01 56acc4a9c277aaea: new_token[42]: 0x017804be0c035704d3a00090db3666c5... 56acc4a9c277aaea: T= 0.789195, cwin: 16029,flight: 1025,nb_ret: 4,rtt_min: 34928,rtt: 34928,rtt_var: 17464,max_ack_delay: 0,state: 13 56acc4a9c277aaea: Sending packet type: 6 (1rtt protected), S1, Q1, 56acc4a9c277aaea: <11fa5c21bc414d34>, Seq: 5 (5), Phi: 0, 56acc4a9c277aaea: Prepared 29 bytes 56acc4a9c277aaea: ack_ecn (nb=0), 2-3, ect0=1, ect1=1, ce=0 56acc4a9c277aaea: padding, 20 bytes 56acc4a9c277aaea: T= 0.790258, cwin: 16029,flight: 1080,nb_ret: 4,rtt_min: 34928,rtt: 34928,rtt_var: 17464,max_ack_delay: 0,state: 13 56acc4a9c277aaea: Sending 55 bytes to 193.167.100.100:443 at T=0.790258 (24b87512) 56acc4a9c277aaea: Receiving 1103 bytes from 193.167.100.100:443 at T=0.821171 (24b8edd3) 56acc4a9c277aaea: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 56acc4a9c277aaea: <992c4e9502683126>, <11fa5c21bc414d34>, Seq: 4, pl: 23 56acc4a9c277aaea: Decrypted 5 bytes 56acc4a9c277aaea: ack (nb=0), 0 56acc4a9c277aaea: Receiving packet type: 6 (1rtt protected), S0, Q0, 56acc4a9c277aaea: <992c4e9502683126>, Seq: 5 (5), Phi: 0, 56acc4a9c277aaea: Decrypted 1029 bytes 56acc4a9c277aaea: handshake_done 56acc4a9c277aaea: stream 0, offset 0, length 1024, fin = 1: 72374024f2fba170... 56acc4a9c277aaea: T= 0.821171, cwin: 16105,flight: 988,nb_ret: 4,rtt_min: 32436,rtt: 34616,rtt_var: 13721,max_ack_delay: 0,state: 14 56acc4a9c277aaea: All done, Closing the connection. 56acc4a9c277aaea: Sending packet type: 6 (1rtt protected), S1, Q1, 56acc4a9c277aaea: <11fa5c21bc414d34>, Seq: 6 (6), Phi: 0, 56acc4a9c277aaea: Prepared 13 bytes 56acc4a9c277aaea: ack_ecn (nb=1), 5, 2-3, ect0=1, ect1=2, ce=0 56acc4a9c277aaea: application_close, Error 0x0000, Reason length 0 56acc4a9c277aaea: Sending 39 bytes to 193.167.100.100:443 at T=0.821384 (24b8eea8) 56acc4a9c277aaea: Out of 3 zero RTT packets, 0 were acked by the server. 56acc4a9c277aaea: Received 1024 bytes in 1.124167 seconds, 0.007287 Mbps. 56acc4a9c277aaea: Sent 24 bytes in 1.124167 seconds, 0.000171 Mbps.