0.000 Creating connection with server4:443 with v1 0.082 Setting up connection for downloading https://server4:443/ivnbrpidqj at 43:38.437 on ClientConnection[193ec20f7277a12f/08e62aabe9abc6a0(V1) with server4/193.167.100.100:443] 0.084 Original destination connection id: 193ec20f7277a12f (scid: 08e62aabe9abc6a0) >- CryptoStream[I|ClientHello] 0.238 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.439/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.232 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.439 loss detection timeout handler running Sending probe 0, because no ack since 0.232. Current RTT: 100/25. 0.440 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.441 (Probe is an initial retransmit) 0.444 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.844/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.443 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.501 <- (1) Packet I|4|L|1220|2 Token=[] AckFrame[1-0|Δ0] Padding(1167) 0.516 probe count not reset on ack because handshake not yet confirmed 0.520 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.921/Initial, because peerAwaitingAddressValidation | RTT:100/25 0.920 loss detection timeout handler running Sending probe 1, because no ack since 0.443. Current RTT: 58/29. 0.920 Sending probe because peer awaiting address validation 0.921 (Probe is Initial ping, because there is no Initial data to retransmit) 0.922 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 695 millis, based on 1.618/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/29 0.922 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1154) 1.324 <- (2) Packet I|7|L|175|2 Token=[] CryptoFrame[0,123] PingFrame[] -< CryptoStream[I|ServerHello] 1.340 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 695 millis, based on 2.036/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/29 1.339 -> Packet I|3|L|1201|2 Token=[] AckFrame[7,4|Δ0] Padding(1150) 1.324 <- (2) Packet H|8|L|1045|2 CryptoFrame[0,740] Padding(255) 1.344 - unknown transport parameter 0xff04de1b, size 2 1.344 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 1.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 695 millis, based on 2.059/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/29 1.363 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.368 -> Packet H|1|L|47|1 AckFrame[8|Δ0] 1.369 Starting downloading https://server4:443/ivnbrpidqj at 43:39.739 on ClientConnection[193ec20f7277a12f/08e62aabe9abc6a0(V1) with server4/193.167.100.100:443] 1.371 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 173 millis, based on 1.546/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/29 1.372 Discarding pn space Initial because first Handshake message is being sent 1.393 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 173 millis, based on 1.567/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/29 1.393 -> Packet A|0|S0|5b9817790ae30d4494|48|1 StreamFrame[0(CIB),0,17,fin] 1.395 <- (3) Packet A|9|S0|08e62aabe9abc6a0|1220|4 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5b9872cda9a6d7c941|7ed6609bec98ad91cfd883b3e32840fc] PingFrame[] Padding(1160) 1.406 State is set to Confirmed reschedule loss detection timer for PTO over 130 millis, based on 1.537/Handshake, because ackElicitingInFlight | RTT:58/29 reschedule loss detection timer for PTO over 186 millis, based on 1.593/App, because ackElicitingInFlight | RTT:58/29 1.406 Discarding pn space Handshake because HandshakeDone is received 1.397 <- (4) Packet A|10|S0|08e62aabe9abc6a0|1252|2 PingFrame[] Padding(1222) 1.397 <- (5) Packet A|11|S0|08e62aabe9abc6a0|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 1.410 -> Packet A|1|S0|5b9817790ae30d4494|33|1 AckFrame[11-9|Δ2] 1.576 <- (6) Packet A|14|S0|08e62aabe9abc6a0|1252|4 AckFrame[1-0|Δ4] PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(188) 1.579 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.581 Finished downloading https://server4:443/ivnbrpidqj at 43:39.952 on ClientConnection[193ec20f7277a12f/08e62aabe9abc6a0(V1) with server4/193.167.100.100:443] 1.582 Closing ClientConnection[193ec20f7277a12f/08e62aabe9abc6a0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.585 Creating connection with server4:443 with v1 1.586 Setting up connection for downloading https://server4:443/gzngpyacal at 43:39.957 on ClientConnection[cdfd998faa9c4095/58bdd01fb6c12922(V1) with server4/193.167.100.100:443] 1.586 Original destination connection id: cdfd998faa9c4095 (scid: 58bdd01fb6c12922) >- CryptoStream[I|ClientHello] 1.585 -> Packet A|2|S0|5b9817790ae30d4494|37|2 ConnectionCloseFrame[0|0|] AckFrame[14|Δ5] 1.590 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.790/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.590 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.616 <- (7) Packet A|15|S0|08e62aabe9abc6a0|38|2 AckFrame[2|Δ0] ConnectionCloseFrame[0|0|] 1.624 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 1.625 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.825/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.630 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.624 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) reschedule loss detection timer for PTO over 101 millis, based on 1.732/Handshake, because peerAwaitingAddressValidation | RTT:34/17 1.630 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 1.631 - unknown transport parameter 0xff04de1b, size 2 1.631 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 1.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.738/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.635 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.739/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.637 Discarding pn space Initial because first Handshake message is being sent 1.637 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 1.637 Starting downloading https://server4:443/gzngpyacal at 43:40.008 on ClientConnection[cdfd998faa9c4095/58bdd01fb6c12922(V1) with server4/193.167.100.100:443] 1.639 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.741/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.638 -> Packet A|0|S0|500db496edbc324d33|48|1 StreamFrame[0(CIB),0,17,fin] 1.667 <- (2) Packet A|2|S0|58bdd01fb6c12922|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|500d9434bbc1489e36|3287d97f0d2fbbb8b9f9e1de0acd3cfe] NewConnectionIdFrame[2,<1|f316209259e5226230|6e9cb57c50b1e9dee52eef73e95d12fc] NewConnectionIdFrame[3,<2|f31681c5566522180f|a7f9e5ee35bc6fbeee7f0bac768d43db] Padding(1103) 1.669 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 1.737/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 97 millis, based on 1.766/App, because ackElicitingInFlight | RTT:34/17 1.669 Discarding pn space Handshake because HandshakeDone is received 1.670 <- (3) Packet A|5|S0|58bdd01fb6c12922|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 127 millis, based on 1.802/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 127 millis, based on 1.802/App, because ackElicitingInFlight | RTT:34/17 1.674 -> Packet A|1|S0|f316209259e5226230|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] 1.675 Finished downloading https://server4:443/gzngpyacal at 43:40.046 on ClientConnection[cdfd998faa9c4095/58bdd01fb6c12922(V1) with server4/193.167.100.100:443] 1.675 Closing ClientConnection[cdfd998faa9c4095/58bdd01fb6c12922(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.676 Creating connection with server4:443 with v1 1.676 -> Packet A|2|S0|f316209259e5226230|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 1.676 Setting up connection for downloading https://server4:443/fiiqxqwtts at 43:40.047 on ClientConnection[da738d8bd5f2dd1d/e3b2d5f3185c3157(V1) with server4/193.167.100.100:443] 1.676 Original destination connection id: da738d8bd5f2dd1d (scid: e3b2d5f3185c3157) >- CryptoStream[I|ClientHello] 1.679 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.879/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.679 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.879 loss detection timeout handler running Sending probe 0, because no ack since 1.679. Current RTT: 100/25. 1.879 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.879 (Probe is an initial retransmit) 1.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.280/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.880 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.279 loss detection timeout handler running Sending probe 1, because no ack since 1.880. Current RTT: 100/25. 2.280 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.280 (Probe is an initial retransmit) 2.280 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.080/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.280 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.281 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.081/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.281 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.315 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[3|Δ0] CryptoFrame[0,123] 2.315 probe count not reset on ack because handshake not yet confirmed 2.317 Retransmitting CryptoFrame[0,257] on level Initial 2.318 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.118/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.317 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) 2.318 Cwnd(-): 6000; inflight: 2400 -< CryptoStream[I|ServerHello] 2.315 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 2.323 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 2.324 - unknown transport parameter 0xff04de1b, size 2 2.324 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 2.328 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.329 Starting downloading https://server4:443/fiiqxqwtts at 43:40.700 on ClientConnection[da738d8bd5f2dd1d/e3b2d5f3185c3157(V1) with server4/193.167.100.100:443] 2.329 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.426/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.329 Discarding pn space Initial because first Handshake message is being sent 2.329 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 2.330 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.427/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.330 -> Packet A|0|S0|f181d942a5c9b67ab0|48|1 StreamFrame[0(CIB),0,17,fin] 2.360 <- (2) Packet A|2|S0|e3b2d5f3185c3157|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f181c41aeaadfdc1f9|6a330789a0976a1957501238648913cb] Padding(1161) 2.361 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 2.425/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 2.453/App, because ackElicitingInFlight | RTT:33/16 2.361 Discarding pn space Handshake because HandshakeDone is received 2.361 <- (3) Packet A|3|S0|e3b2d5f3185c3157|1220|2 PingFrame[] Padding(1190) 2.361 <- (4) Packet A|4|S0|e3b2d5f3185c3157|338|1 CryptoFrame[0,305] 2.362 -> Packet A|1|S0|f181d942a5c9b67ab0|32|1 AckFrame[3-2|Δ0] -< CryptoStream[A|NewSessionTicket] 2.382 -> Packet A|2|S0|f181d942a5c9b67ab0|33|1 AckFrame[4-2|Δ19] 2.393 <- (5) Packet A|5|S0|e3b2d5f3185c3157|92|3 AckFrame[1|Δ0] NewConnectionIdFrame[2,<1|b26f4589df7b1ac493|356c4782232f8f15fcb7dc8dc266d382] NewConnectionIdFrame[3,<2|b26f670efe7134f96f|9737c808a2dc93c9853c9d1cab28fe3d] 2.394 Cwnd(-): 3000; inflight: 0 2.394 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.394 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 122 millis, based on 2.518/App, because ackElicitingInFlight | RTT:33/16 2.394 <- (6) Packet A|6|S0|e3b2d5f3185c3157|1252|2 PingFrame[] Padding(1222) 2.395 -> Packet A|3|S0|f181d942a5c9b67ab0|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4|Δ0] reschedule loss detection timer for PTO over 122 millis, based on 2.518/App, because ackElicitingInFlight | RTT:33/16 2.395 -> Packet A|4|S0|b26f4589df7b1ac493|36|3 AckFrame[6-4|Δ0] RetireConnectionIdFrame[0] RetireConnectionIdFrame[1] 2.425 <- (7) Packet A|7|S0|e3b2d5f3185c3157|41|2 AckFrame[3,1|Δ0] MaxDataFrame[16777233] reschedule loss detection timer for PTO over 92 millis, based on 2.518/App, because ackElicitingInFlight | RTT:33/16 2.426 <- (8) Packet A|8|S0|e3b2d5f3185c3157|1057|1 StreamFrame[0(CIB),0,1024,fin] 2.427 Finished downloading https://server4:443/fiiqxqwtts at 43:40.798 on ClientConnection[da738d8bd5f2dd1d/e3b2d5f3185c3157(V1) with server4/193.167.100.100:443] 2.427 -> Packet A|5|S0|b26f4589df7b1ac493|32|1 AckFrame[8-5|Δ0] 2.427 Closing ClientConnection[da738d8bd5f2dd1d/e3b2d5f3185c3157(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.428 Creating connection with server4:443 with v1 2.428 -> Packet A|6|S0|b26f4589df7b1ac493|36|2 ConnectionCloseFrame[0|0|] AckFrame[8-5|Δ0] 2.429 Setting up connection for downloading https://server4:443/ixlsgrmvfc at 43:40.800 on ClientConnection[129a133c5a902d0c/5e3a932998e83acd(V1) with server4/193.167.100.100:443] 2.429 Original destination connection id: 129a133c5a902d0c (scid: 5e3a932998e83acd) >- CryptoStream[I|ClientHello] 2.431 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.632/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.431 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.631 loss detection timeout handler running Sending probe 0, because no ack since 2.431. Current RTT: 100/25. 2.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.631 (Probe is an initial retransmit) 2.632 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.032/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.632 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.650 <- (9) Packet A|11|S0|e3b2d5f3185c3157|1062|2 MaxDataFrame[16777233] StreamFrame[0(CIB),0,1024,fin] 2.652 -> Packet A|7|S0|b26f4589df7b1ac493|36|2 ConnectionCloseFrame[0|0|] AckFrame[8-5|Δ0] 2.665 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 2.666 probe count not reset on ack because handshake not yet confirmed 2.666 Retransmitting CryptoFrame[0,257] on level Initial 2.666 Cwnd(-): 6000; inflight: 0 2.666 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.066/Initial, because peerAwaitingAddressValidation | RTT:100/25 2.667 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 2.861/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.667 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 2.665 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 2.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.864/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.670 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 2.670 - unknown transport parameter 0xff04de1b, size 2 2.670 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 2.674 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.868/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.674 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.675 Starting downloading https://server4:443/ixlsgrmvfc at 43:41.046 on ClientConnection[129a133c5a902d0c/5e3a932998e83acd(V1) with server4/193.167.100.100:443] 2.675 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.772/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.675 Discarding pn space Initial because first Handshake message is being sent 2.675 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 2.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.676 -> Packet A|0|S0|a16499b7c49b57c9c0|48|1 StreamFrame[0(CIB),0,17,fin] 2.683 <- (10) Packet A|12|S0|e3b2d5f3185c3157|40|2 AckFrame[7,4|Δ0] ConnectionCloseFrame[0|0|] 2.725 Discarding packet (1220 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.772 loss detection timeout handler running Sending probe 0, because no ack since 2.674. Current RTT: 33/16. 2.772 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.772 (Probe is a handshake retransmit) 2.773 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.967/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.773 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 2.966 loss detection timeout handler running Sending probe 1, because no ack since 2.676. Current RTT: 33/16. 2.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.967 (Probe is a handshake retransmit) 2.967 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.355/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.967 -> Packet PH|3|L|81|1 CryptoFrame[0,36] 2.968 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.356/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.968 -> Packet PH|4|L|81|1 CryptoFrame[0,36] 2.999 <- (3) Packet A|5|S0|5e3a932998e83acd|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a1645d6546818206ae|07b99e7e9441cb8efcd00c19a8876491] Padding(1156) 3.000 probe count not reset on ack because handshake not yet confirmed 3.000 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.388/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.000 State is set to Confirmed reschedule loss detection timer for PTO over 1603 millis, based on 4.604/Handshake, because ackElicitingInFlight | RTT:69/85 3.000 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.000 Discarding pn space Handshake because HandshakeDone is received 3.000 <- (4) Packet A|6|S0|5e3a932998e83acd|1252|2 PingFrame[] Padding(1222) 3.000 <- (5) Packet A|7|S0|5e3a932998e83acd|338|1 CryptoFrame[0,305] 3.001 -> Packet A|1|S0|a16499b7c49b57c9c0|32|1 AckFrame[6-5|Δ0] -< CryptoStream[A|NewSessionTicket] 3.021 -> Packet A|2|S0|a16499b7c49b57c9c0|33|1 AckFrame[7-5|Δ19] 3.053 <- (6) Packet A|9|S0|5e3a932998e83acd|1332|2 PingFrame[] Padding(1302) 3.073 -> Packet A|3|S0|a16499b7c49b57c9c0|35|1 AckFrame[9,7-5|Δ19] 3.105 <- (7) Packet A|10|S0|5e3a932998e83acd|1412|4 PingFrame[] AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(349) 3.105 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.106 Finished downloading https://server4:443/ixlsgrmvfc at 43:41.477 on ClientConnection[129a133c5a902d0c/5e3a932998e83acd(V1) with server4/193.167.100.100:443] 3.106 Closing ClientConnection[129a133c5a902d0c/5e3a932998e83acd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.106 -> Packet A|4|S0|a16499b7c49b57c9c0|36|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 3.107 Creating connection with server4:443 with v1 3.107 Setting up connection for downloading https://server4:443/dfinnvguop at 43:41.479 on ClientConnection[85ccf48c95de7788/7e722f533a50ccd3(V1) with server4/193.167.100.100:443] 3.108 Original destination connection id: 85ccf48c95de7788 (scid: 7e722f533a50ccd3) >- CryptoStream[I|ClientHello] 3.110 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.310/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.110 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.143 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.144 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.344/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.143 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 3.147 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.244/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.147 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 3.147 - unknown transport parameter 0xff04de1b, size 2 3.147 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 3.150 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.247/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.150 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.151 Starting downloading https://server4:443/dfinnvguop at 43:41.522 on ClientConnection[85ccf48c95de7788/7e722f533a50ccd3(V1) with server4/193.167.100.100:443] 3.151 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.248/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.151 Discarding pn space Initial because first Handshake message is being sent 3.151 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 3.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.249/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.152 -> Packet A|0|S0|e23f0c52854d2db607|48|1 StreamFrame[0(CIB),0,17,fin] 3.183 <- (2) Packet A|3|S0|7e722f533a50ccd3|1220|2 PingFrame[] Padding(1190) 3.183 <- (3) Packet A|4|S0|7e722f533a50ccd3|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 3.184 <- (4) Packet A|5|S0|7e722f533a50ccd3|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 3.184 -> Packet A|1|S0|e23f0c52854d2db607|32|1 AckFrame[4-3|Δ0] 3.185 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.282/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.185 Finished downloading https://server4:443/dfinnvguop at 43:41.556 on ClientConnection[85ccf48c95de7788/7e722f533a50ccd3(V1) with server4/193.167.100.100:443] 3.185 Closing ClientConnection[85ccf48c95de7788/7e722f533a50ccd3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.186 Creating connection with server4:443 with v1 3.186 -> Packet A|2|S0|e23f0c52854d2db607|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 3.187 Setting up connection for downloading https://server4:443/ygoykifftc at 43:41.558 on ClientConnection[520f17030010873d/9dc60f27dacfe16e(V1) with server4/193.167.100.100:443] 3.187 Original destination connection id: 520f17030010873d (scid: 9dc60f27dacfe16e) >- CryptoStream[I|ClientHello] 3.189 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.389/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.189 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.216 <- (5) Packet A|6|S0|7e722f533a50ccd3|1252|2 PingFrame[] Padding(1222) 3.217 <- (6) Packet A|7|S0|7e722f533a50ccd3|38|2 AckFrame[2-1|Δ0] ConnectionCloseFrame[0|0|] 3.217 -> Packet A|3|S0|e23f0c52854d2db607|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 3.222 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.223 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.423/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.226 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.222 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) reschedule loss detection timer for PTO over 96 millis, based on 3.323/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.226 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 3.226 - unknown transport parameter 0xff04de1b, size 2 3.226 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 3.229 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.326/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.229 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.230 Starting downloading https://server4:443/ygoykifftc at 43:41.601 on ClientConnection[520f17030010873d/9dc60f27dacfe16e(V1) with server4/193.167.100.100:443] 3.230 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.327/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.230 Discarding pn space Initial because first Handshake message is being sent 3.230 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.327/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.230 -> [Packet H|1|L|47|1 AckFrame[1|Δ0], Packet A|0|S0|89e8397e529e3005a1|48|1 StreamFrame[0(CIB),0,17,fin]] 3.261 <- (2) Packet A|2|S0|9dc60f27dacfe16e|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|89e86250607b55303a|9f3b55ce57ac7ca34326b217b9338022] Padding(1161) 3.261 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 3.326/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 3.353/App, because ackElicitingInFlight | RTT:33/16 3.262 Discarding pn space Handshake because HandshakeDone is received 3.263 <- (3) Packet A|5|S0|9dc60f27dacfe16e|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 3.263 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.264 Finished downloading https://server4:443/ygoykifftc at 43:41.635 on ClientConnection[520f17030010873d/9dc60f27dacfe16e(V1) with server4/193.167.100.100:443] 3.264 -> Packet A|1|S0|89e8397e529e3005a1|35|1 AckFrame[5,2|Δ1] 3.264 Closing ClientConnection[520f17030010873d/9dc60f27dacfe16e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.264 -> Packet A|2|S0|89e8397e529e3005a1|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 3.264 Creating connection with server4:443 with v1 3.265 Setting up connection for downloading https://server4:443/pymaszzcdv at 43:41.636 on ClientConnection[6a50467b1ee8eee7/e029ed2a66d90b89(V1) with server4/193.167.100.100:443] 3.265 Original destination connection id: 6a50467b1ee8eee7 (scid: e029ed2a66d90b89) >- CryptoStream[I|ClientHello] 3.268 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.468/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.267 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.294 <- (4) Packet A|6|S0|9dc60f27dacfe16e|37|2 AckFrame[1|Δ0] MaxStreamsFrame[B,101] 3.295 <- (5) Packet A|7|S0|9dc60f27dacfe16e|38|2 AckFrame[2-1|Δ0] ConnectionCloseFrame[0|0|] 3.297 -> Packet A|3|S0|89e8397e529e3005a1|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 3.467 loss detection timeout handler running Sending probe 0, because no ack since 3.267. Current RTT: 100/25. 3.467 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.467 (Probe is an initial retransmit) 3.468 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.868/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.468 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.501 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 3.502 probe count not reset on ack because handshake not yet confirmed 3.502 Retransmitting CryptoFrame[0,257] on level Initial 3.503 Cwnd(-): 6000; inflight: 0 3.503 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.903/Initial, because peerAwaitingAddressValidation | RTT:100/25 3.503 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 3.700/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.503 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 3.501 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 3.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.704/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.510 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 3.510 - unknown transport parameter 0xff04de1b, size 2 3.510 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 3.513 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.707/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.513 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.514 Starting downloading https://server4:443/pymaszzcdv at 43:41.885 on ClientConnection[6a50467b1ee8eee7/e029ed2a66d90b89(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 3.611/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.514 Discarding pn space Initial because first Handshake message is being sent 3.514 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 3.515 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.515 -> Packet A|0|S0|cbf5b9bda0ce541619|48|1 StreamFrame[0(CIB),0,17,fin] 3.611 loss detection timeout handler running Sending probe 0, because no ack since 3.513. Current RTT: 33/16. 3.611 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.611 (Probe is a handshake retransmit) 3.612 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.806/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.611 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 3.643 <- (2) Packet A|2|S0|e029ed2a66d90b89|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|cbf5d72b4bbe9f7c0c|a881329a036059f590e3c6b219db16db] NewConnectionIdFrame[2,<1|5a866fba24bd6318ac|c4fa487b7220d8c117fe786ca7aee901] NewConnectionIdFrame[3,<2|5a86bf5e511da57789|c4a7baa4c89ea102b31f4a569f8a8bb8] Padding(1103) 3.644 State is set to Confirmed reschedule loss detection timer for PTO over 116 millis, based on 3.761/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 3.638/App, because ackElicitingInFlight | RTT:33/16 3.644 Discarding pn space Handshake because HandshakeDone is received 3.644 loss detection timeout handler running Sending probe 0, because no ack since 3.515. Current RTT: 33/16. 3.645 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 3.891/App, because ackElicitingInFlight | RTT:33/16 3.644 <- (3) Packet A|3|S0|e029ed2a66d90b89|1220|2 PingFrame[] Padding(1190) 3.645 -> Packet A|1|S0|5a866fba24bd6318ac|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] 3.645 <- (4) Packet A|4|S0|e029ed2a66d90b89|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 245 millis, based on 3.891/App, because ackElicitingInFlight | RTT:33/16 3.645 -> Packet PA|2|S0|5a866fba24bd6318ac|48|1 StreamFrame[0(CIB),0,17,fin] 3.646 -> Packet A|3|S0|5a866fba24bd6318ac|32|1 AckFrame[4-2|Δ0] 3.812 <- (5) Packet A|8|S0|e029ed2a66d90b89|1068|3 AckFrame[3-1|Δ4] MaxDataFrame[16777233] StreamFrame[0(CIB),0,1024,fin] 3.812 Cwnd(-): 3000; inflight: 0 3.812 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 3.813 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 122 millis, based on 3.936/App, because ackElicitingInFlight | RTT:33/16 3.813 Finished downloading https://server4:443/pymaszzcdv at 43:42.184 on ClientConnection[6a50467b1ee8eee7/e029ed2a66d90b89(V1) with server4/193.167.100.100:443] 3.813 -> Packet A|4|S0|5a866fba24bd6318ac|48|1 StreamFrame[0(CIB),0,17,fin] 3.813 Closing ClientConnection[6a50467b1ee8eee7/e029ed2a66d90b89(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.814 -> Packet A|5|S0|5a866fba24bd6318ac|36|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 3.814 Creating connection with server4:443 with v1 3.814 Setting up connection for downloading https://server4:443/tpeuoqatcx at 43:42.186 on ClientConnection[9bed902df765a202/07e3012f257ba4ee(V1) with server4/193.167.100.100:443] 3.815 Original destination connection id: 9bed902df765a202 (scid: 07e3012f257ba4ee) >- CryptoStream[I|ClientHello] 3.817 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.017/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.816 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.844 <- (6) Packet A|9|S0|e029ed2a66d90b89|38|2 AckFrame[5|Δ0] ConnectionCloseFrame[0|0|] 4.016 loss detection timeout handler running Sending probe 0, because no ack since 3.816. Current RTT: 100/25. 4.016 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.016 (Probe is an initial retransmit) 4.016 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.416/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.016 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.050 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 4.050 probe count not reset on ack because handshake not yet confirmed 4.051 Retransmitting CryptoFrame[0,257] on level Initial 4.051 Cwnd(-): 6000; inflight: 0 4.051 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.451/Initial, because peerAwaitingAddressValidation | RTT:100/25 4.051 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 4.245/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.051 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 4.055 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.050 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) reschedule loss detection timer for PTO over 193 millis, based on 4.249/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.054 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 4.055 - unknown transport parameter 0xff04de1b, size 2 4.055 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 4.058 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.252/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.058 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.058 Starting downloading https://server4:443/tpeuoqatcx at 43:42.430 on ClientConnection[9bed902df765a202/07e3012f257ba4ee(V1) with server4/193.167.100.100:443] 4.058 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.155/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.059 Discarding pn space Initial because first Handshake message is being sent 4.058 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 4.059 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.156/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.059 -> Packet A|0|S0|4036b6692be5a74df2|48|1 StreamFrame[0(CIB),0,17,fin] 4.155 loss detection timeout handler running Sending probe 0, because no ack since 4.058. Current RTT: 33/16. 4.155 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.155 (Probe is a handshake retransmit) 4.156 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.350/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.156 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 4.188 <- (2) Packet A|2|S0|07e3012f257ba4ee|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4036ae5d1eac7588c5|89d92836b43c72b343c20053eb4e6772] Padding(1156) 4.188 probe count not reset on ack because handshake not yet confirmed 4.189 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.383/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.189 State is set to Confirmed reschedule loss detection timer for PTO over 344 millis, based on 4.534/Handshake, because ackElicitingInFlight | RTT:45/36 4.189 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.189 Discarding pn space Handshake because HandshakeDone is received 4.189 <- (3) Packet A|3|S0|07e3012f257ba4ee|1220|2 PingFrame[] Padding(1190) 4.189 <- (4) Packet A|4|S0|07e3012f257ba4ee|338|1 CryptoFrame[0,305] 4.190 -> Packet A|1|S0|4036b6692be5a74df2|32|1 AckFrame[3-2|Δ0] -< CryptoStream[A|NewSessionTicket] 4.190 <- (5) Packet A|5|S0|07e3012f257ba4ee|1057|1 StreamFrame[0(CIB),0,1024,fin] 4.191 -> Packet A|2|S0|4036b6692be5a74df2|32|1 AckFrame[5-2|Δ0] 4.191 Finished downloading https://server4:443/tpeuoqatcx at 43:42.562 on ClientConnection[9bed902df765a202/07e3012f257ba4ee(V1) with server4/193.167.100.100:443] 4.191 Closing ClientConnection[9bed902df765a202/07e3012f257ba4ee(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.191 -> Packet A|3|S0|4036b6692be5a74df2|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 4.192 Creating connection with server4:443 with v1 4.192 Setting up connection for downloading https://server4:443/nmbbkdfsnw at 43:42.563 on ClientConnection[de158929ea32cf0a/7a8931650cfeaa69(V1) with server4/193.167.100.100:443] 4.192 Original destination connection id: de158929ea32cf0a (scid: 7a8931650cfeaa69) >- CryptoStream[I|ClientHello] 4.194 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.394/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.194 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.221 <- (6) Packet A|6|S0|07e3012f257ba4ee|1252|2 PingFrame[] Padding(1222) 4.222 <- (7) Packet A|8|S0|07e3012f257ba4ee|38|2 AckFrame[3-1|Δ0] ConnectionCloseFrame[0|0|] 4.222 -> Packet A|4|S0|4036b6692be5a74df2|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 4.378 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 4.378 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,740] Padding(256) 4.382 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.582/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.382 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 4.382 - unknown transport parameter 0xff04de1b, size 2 4.382 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 4.385 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.585/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.385 -> Packet H|0|L|81|1 CryptoFrame[0,36] 4.386 Starting downloading https://server4:443/nmbbkdfsnw at 43:42.757 on ClientConnection[de158929ea32cf0a/7a8931650cfeaa69(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.386 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.586/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.386 Discarding pn space Initial because first Handshake message is being sent 4.386 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 4.387 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.587/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.386 -> Packet A|0|S0|9399401fad30c49327|48|1 StreamFrame[0(CIB),0,17,fin] 4.417 <- (2) Packet A|4|S0|7a8931650cfeaa69|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|9399a117abca1b1404|4693bba99f5ba7689736a709608ab163] NewConnectionIdFrame[2,<1|823ec63ea5fffa1690|dee8ededc7d42a6b39c06454fae23175] NewConnectionIdFrame[3,<2|823e35b65018a40ffb|ac376fc468477fe9d378be1672567b51] Padding(1103) 4.417 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 4.585/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 195 millis, based on 4.612/App, because ackElicitingInFlight | RTT:100/25 4.418 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 225 millis, based on 4.644/App, because ackElicitingInFlight | RTT:100/25 4.418 <- (3) Packet A|5|S0|7a8931650cfeaa69|1220|2 PingFrame[] Padding(1190) 4.418 -> Packet A|1|S0|823ec63ea5fffa1690|36|3 RetireConnectionIdFrame[0] AckFrame[4|Δ0] RetireConnectionIdFrame[1] 4.419 <- (4) Packet A|7|S0|7a8931650cfeaa69|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 224 millis, based on 4.644/App, because ackElicitingInFlight | RTT:100/25 4.420 -> Packet A|2|S0|823ec63ea5fffa1690|35|1 AckFrame[7,5-4|Δ1] 4.420 Finished downloading https://server4:443/nmbbkdfsnw at 43:42.791 on ClientConnection[de158929ea32cf0a/7a8931650cfeaa69(V1) with server4/193.167.100.100:443] 4.420 Closing ClientConnection[de158929ea32cf0a/7a8931650cfeaa69(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.420 -> Packet A|3|S0|823ec63ea5fffa1690|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 4.421 Creating connection with server4:443 with v1 4.421 Setting up connection for downloading https://server4:443/srqvputiht at 43:42.793 on ClientConnection[756059f55c3fb0c7/52618d1bd723d148(V1) with server4/193.167.100.100:443] 4.421 Original destination connection id: 756059f55c3fb0c7 (scid: 52618d1bd723d148) >- CryptoStream[I|ClientHello] 4.423 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.623/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.423 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.450 <- (5) Packet A|8|S0|7a8931650cfeaa69|37|2 AckFrame[2|Δ0] MaxStreamsFrame[B,101] 4.451 -> Packet A|4|S0|823ec63ea5fffa1690|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 4.451 <- (6) Packet A|9|S0|7a8931650cfeaa69|1252|2 PingFrame[] Padding(1222) 4.451 <- (7) Packet A|10|S0|7a8931650cfeaa69|38|2 AckFrame[3-2|Δ0] ConnectionCloseFrame[0|0|] 4.452 -> Packet A|5|S0|823ec63ea5fffa1690|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 4.456 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.456 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.657/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.456 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 4.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.556/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.459 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 4.459 - unknown transport parameter 0xff04de1b, size 2 4.459 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 4.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.462 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.462 Discarding pn space Initial because first Handshake message is being sent 4.462 Starting downloading https://server4:443/srqvputiht at 43:42.834 on ClientConnection[756059f55c3fb0c7/52618d1bd723d148(V1) with server4/193.167.100.100:443] 4.463 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 4.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.463 -> Packet A|0|S0|0a380f29a1a25d2db2|48|1 StreamFrame[0(CIB),0,17,fin] 4.495 <- (2) Packet A|4|S0|52618d1bd723d148|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 4.496 <- (3) Packet A|5|S0|52618d1bd723d148|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 4.496 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.593/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.497 Finished downloading https://server4:443/srqvputiht at 43:42.868 on ClientConnection[756059f55c3fb0c7/52618d1bd723d148(V1) with server4/193.167.100.100:443] 4.497 Closing ClientConnection[756059f55c3fb0c7/52618d1bd723d148(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.497 -> Packet A|1|S0|0a380f29a1a25d2db2|33|1 AckFrame[5-4|Δ1] 4.497 -> Packet A|2|S0|0a380f29a1a25d2db2|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 4.497 Creating connection with server4:443 with v1 4.498 Setting up connection for downloading https://server4:443/owlgjdmlez at 43:42.869 on ClientConnection[db668c766fdd7e76/e460e1bbd2f9db79(V1) with server4/193.167.100.100:443] 4.498 Original destination connection id: db668c766fdd7e76 (scid: e460e1bbd2f9db79) >- CryptoStream[I|ClientHello] 4.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.700/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.500 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.528 <- (4) Packet A|6|S0|52618d1bd723d148|38|2 AckFrame[2|Δ0] ConnectionCloseFrame[0|0|] 4.684 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 4.684 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,740] Padding(256) 4.687 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.887/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.687 - unknown transport parameter 0xff04de1b, size 2 4.687 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 4.687 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.690 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.890/Handshake, because peerAwaitingAddressValidation | RTT:100/25 4.690 Discarding pn space Initial because first Handshake message is being sent 4.690 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.890/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.690 -> Packet H|0|L|81|1 CryptoFrame[0,36] 4.690 Starting downloading https://server4:443/owlgjdmlez at 43:43.062 on ClientConnection[db668c766fdd7e76/e460e1bbd2f9db79(V1) with server4/193.167.100.100:443] 4.691 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 4.691 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.891/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.691 -> Packet A|0|S0|b30681e023ec10cacd|48|1 StreamFrame[0(CIB),0,17,fin] 4.724 <- (2) Packet A|5|S0|e460e1bbd2f9db79|1220|2 PingFrame[] Padding(1190) 4.725 <- (3) Packet A|7|S0|e460e1bbd2f9db79|1057|1 StreamFrame[0(CIB),0,1024,fin] 4.725 -> Packet A|1|S0|b30681e023ec10cacd|34|1 AckFrame[7,5|Δ0] 4.725 Finished downloading https://server4:443/owlgjdmlez at 43:43.096 on ClientConnection[db668c766fdd7e76/e460e1bbd2f9db79(V1) with server4/193.167.100.100:443] 4.725 Closing ClientConnection[db668c766fdd7e76/e460e1bbd2f9db79(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.726 -> Packet A|2|S0|b30681e023ec10cacd|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,5|Δ0] 4.726 Creating connection with server4:443 with v1 4.727 Setting up connection for downloading https://server4:443/gmrlitezhy at 43:43.098 on ClientConnection[e161f87f9ab6eafc/c1a42e855b7142e3(V1) with server4/193.167.100.100:443] 4.727 Original destination connection id: e161f87f9ab6eafc (scid: c1a42e855b7142e3) >- CryptoStream[I|ClientHello] 4.728 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.928/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.728 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.757 <- (4) Packet A|9|S0|e460e1bbd2f9db79|1252|2 PingFrame[] Padding(1222) 4.757 -> Packet A|3|S0|b30681e023ec10cacd|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,5|Δ0] 4.761 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.762 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.962/Initial, because peerAwaitingAddressValidation | RTT:100/25 4.764 <- (5) Packet A|10|S0|e460e1bbd2f9db79|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b306ed8d095a062a1f|25c216a4784f7c5848a687918a56b258] Padding(852) -< CryptoStream[I|ServerHello] 4.764 -> Packet A|4|S0|b30681e023ec10cacd|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,5|Δ0] 4.761 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 4.765 - unknown transport parameter 0xff04de1b, size 2 4.765 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 4.765 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.862/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.764 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 4.768 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.865/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.768 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.768 Starting downloading https://server4:443/gmrlitezhy at 43:43.139 on ClientConnection[e161f87f9ab6eafc/c1a42e855b7142e3(V1) with server4/193.167.100.100:443] 4.768 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.865/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.768 Discarding pn space Initial because first Handshake message is being sent 4.769 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.866/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.769 -> [Packet H|1|L|47|1 AckFrame[1|Δ0], Packet A|0|S0|fb5a59f29bd31e4595|48|1 StreamFrame[0(CIB),0,17,fin]] 4.795 <- (6) Packet A|11|S0|e460e1bbd2f9db79|40|2 AckFrame[4,1-0|Δ0] ConnectionCloseFrame[0|0|] 4.801 <- (2) Packet A|4|S0|c1a42e855b7142e3|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 4.821 -> Packet A|1|S0|fb5a59f29bd31e4595|33|1 AckFrame[4|Δ19] 4.852 <- (3) Packet A|7|S0|c1a42e855b7142e3|1220|4 AckFrame[1-0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|fb5a80075d1aa94cb0|a8418e0c32915777a99b8d043d961284] Padding(1156) 4.853 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.950/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.853 State is set to Confirmed reschedule loss detection timer for PTO over 11 millis, based on 4.865/Handshake, because ackElicitingInFlight | RTT:33/16 4.853 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.853 Discarding pn space Handshake because HandshakeDone is received 4.873 -> Packet A|2|S0|fb5a59f29bd31e4595|33|1 AckFrame[7|Δ19] 5.009 <- (4) Packet A|10|S0|c1a42e855b7142e3|1220|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(162) 5.010 Finished downloading https://server4:443/gmrlitezhy at 43:43.381 on ClientConnection[e161f87f9ab6eafc/c1a42e855b7142e3(V1) with server4/193.167.100.100:443] 5.010 Closing ClientConnection[e161f87f9ab6eafc/c1a42e855b7142e3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.010 -> Packet A|3|S0|fb5a59f29bd31e4595|38|2 ConnectionCloseFrame[0|0|] AckFrame[10,7|Δ0] 5.011 Creating connection with server4:443 with v1 5.011 Setting up connection for downloading https://server4:443/wvjwmuonis at 43:43.382 on ClientConnection[2d3426075021c3fc/ed06f34e6ebb03f8(V1) with server4/193.167.100.100:443] 5.011 Original destination connection id: 2d3426075021c3fc (scid: ed06f34e6ebb03f8) >- CryptoStream[I|ClientHello] 5.013 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.213/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.013 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.212 loss detection timeout handler running Sending probe 0, because no ack since 5.013. Current RTT: 100/25. 5.213 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.213 (Probe is an initial retransmit) 5.213 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.613/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.213 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.216 <- (5) Packet A|11|S0|c1a42e855b7142e3|1220|5 NewConnectionIdFrame[2,<1|7a16e39807fbb17301|d3f2254d9a9076f5c0f7ae3e8f9802d1] NewConnectionIdFrame[3,<2|7a16c154ace1de9b76|aef6e787d155e9866a36dbdc6c40cef6] PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(104) 5.216 -> Packet A|4|S0|fb5a59f29bd31e4595|38|2 ConnectionCloseFrame[0|0|] AckFrame[10,7|Δ0] 5.247 <- (6) Packet A|12|S0|c1a42e855b7142e3|40|2 AckFrame[4,2|Δ0] ConnectionCloseFrame[0|0|] 5.612 loss detection timeout handler running Sending probe 1, because no ack since 5.213. Current RTT: 100/25. 5.613 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.613 (Probe is an initial retransmit) 5.613 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.413/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.613 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.614 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.414/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.614 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.647 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 5.647 probe count not reset on ack because handshake not yet confirmed 5.648 Retransmitting CryptoFrame[0,257] on level Initial 5.648 Cwnd(-): 6000; inflight: 1200 5.648 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.448/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.648 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 6.036/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.648 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 5.647 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 5.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.039/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.651 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 5.651 - unknown transport parameter 0xff04de1b, size 2 5.651 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 5.654 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.042/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.654 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.654 Starting downloading https://server4:443/wvjwmuonis at 43:44.025 on ClientConnection[2d3426075021c3fc/ed06f34e6ebb03f8(V1) with server4/193.167.100.100:443] 5.654 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.751/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.655 Discarding pn space Initial because first Handshake message is being sent 5.654 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 5.655 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.752/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.655 -> Packet A|0|S0|ca999289d41d462f17|48|1 StreamFrame[0(CIB),0,17,fin] 5.686 <- (2) Packet A|2|S0|ed06f34e6ebb03f8|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|ca99db781a28fd0f49|ee255c556b233f4645063a5dabf00531] Padding(1161) 5.687 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 5.751/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 5.778/App, because ackElicitingInFlight | RTT:33/16 5.687 Discarding pn space Handshake because HandshakeDone is received 5.687 <- (3) Packet A|3|S0|ed06f34e6ebb03f8|1220|2 PingFrame[] Padding(1190) 5.687 <- (4) Packet A|4|S0|ed06f34e6ebb03f8|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 5.688 -> Packet A|1|S0|ca999289d41d462f17|32|1 AckFrame[3-2|Δ0] 5.688 <- (5) Packet A|5|S0|ed06f34e6ebb03f8|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 5.688 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.689 -> Packet A|2|S0|ca999289d41d462f17|32|1 AckFrame[5-2|Δ0] 5.689 Finished downloading https://server4:443/wvjwmuonis at 43:44.060 on ClientConnection[2d3426075021c3fc/ed06f34e6ebb03f8(V1) with server4/193.167.100.100:443] 5.689 Closing ClientConnection[2d3426075021c3fc/ed06f34e6ebb03f8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.689 -> Packet A|3|S0|ca999289d41d462f17|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 5.690 Creating connection with server4:443 with v1 5.690 Setting up connection for downloading https://server4:443/qzadbiyoac at 43:44.061 on ClientConnection[b984ab573758c638/292772c918453eac(V1) with server4/193.167.100.100:443] 5.690 Original destination connection id: b984ab573758c638 (scid: 292772c918453eac) >- CryptoStream[I|ClientHello] 5.692 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.892/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.691 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.719 <- (6) Packet A|6|S0|ed06f34e6ebb03f8|37|2 AckFrame[2|Δ0] MaxStreamsFrame[B,101] 5.720 -> Packet A|4|S0|ca999289d41d462f17|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 5.720 <- (7) Packet A|7|S0|ed06f34e6ebb03f8|1252|2 PingFrame[] Padding(1222) 5.721 -> Packet A|5|S0|ca999289d41d462f17|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 5.725 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 5.725 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.925/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.725 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 5.728 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.825/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.727 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 5.728 - unknown transport parameter 0xff04de1b, size 2 5.728 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 5.730 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.827/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.730 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.730 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.730 Starting downloading https://server4:443/qzadbiyoac at 43:44.102 on ClientConnection[b984ab573758c638/292772c918453eac(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 5.827/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.730 Discarding pn space Initial because first Handshake message is being sent 5.730 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 5.731 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.828/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.731 -> Packet A|0|S0|5af047a2e1180f72b4|48|1 StreamFrame[0(CIB),0,17,fin] 5.827 loss detection timeout handler running Sending probe 0, because no ack since 5.730. Current RTT: 33/16. 5.827 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.827 (Probe is a handshake retransmit) 5.828 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.828 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 6.021 loss detection timeout handler running Sending probe 1, because no ack since 5.731. Current RTT: 33/16. 6.021 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.021 (Probe is a handshake retransmit) 6.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.410/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.022 -> Packet PH|3|L|81|1 CryptoFrame[0,36] 6.023 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.411/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.023 -> Packet PH|4|L|81|1 CryptoFrame[0,36] 6.053 <- (2) Packet A|2|S0|292772c918453eac|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5af039ec76e8a4fe6e|d0e6bccdb6f6f600c36a97847b31467d] Padding(1156) 6.054 probe count not reset on ack because handshake not yet confirmed 6.054 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.442/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.054 State is set to Confirmed reschedule loss detection timer for PTO over 1588 millis, based on 7.643/Handshake, because ackElicitingInFlight | RTT:69/84 6.054 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.055 Discarding pn space Handshake because HandshakeDone is received 6.054 <- (3) Packet A|3|S0|292772c918453eac|1220|2 PingFrame[] Padding(1190) 6.055 <- (4) Packet A|4|S0|292772c918453eac|338|1 CryptoFrame[0,305] 6.055 -> Packet A|1|S0|5af047a2e1180f72b4|32|1 AckFrame[3-2|Δ0] -< CryptoStream[A|NewSessionTicket] 6.075 -> Packet A|2|S0|5af047a2e1180f72b4|33|1 AckFrame[4-2|Δ19] 6.087 <- (5) Packet A|6|S0|292772c918453eac|1252|2 PingFrame[] Padding(1222) 6.106 -> Packet A|3|S0|5af047a2e1180f72b4|35|1 AckFrame[6,4-2|Δ19] 6.260 <- (6) Packet A|8|S0|292772c918453eac|1252|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(194) 6.261 Finished downloading https://server4:443/qzadbiyoac at 43:44.633 on ClientConnection[b984ab573758c638/292772c918453eac(V1) with server4/193.167.100.100:443] 6.262 Closing ClientConnection[b984ab573758c638/292772c918453eac(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.262 -> Packet A|4|S0|5af047a2e1180f72b4|40|2 ConnectionCloseFrame[0|0|] AckFrame[8,6,4-2|Δ0] 6.262 Creating connection with server4:443 with v1 6.263 Setting up connection for downloading https://server4:443/zqcheyyngp at 43:44.634 on ClientConnection[1ea2afe7a094a335/d4d2f47b5125ba08(V1) with server4/193.167.100.100:443] 6.263 Original destination connection id: 1ea2afe7a094a335 (scid: d4d2f47b5125ba08) >- CryptoStream[I|ClientHello] 6.264 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.464/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.264 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.298 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.298 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.498/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.298 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 6.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.398/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.301 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 6.301 - unknown transport parameter 0xff04de1b, size 2 6.301 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 6.303 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.400/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.303 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.303 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.303 Starting downloading https://server4:443/zqcheyyngp at 43:44.675 on ClientConnection[1ea2afe7a094a335/d4d2f47b5125ba08(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 6.400/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.303 Discarding pn space Initial because first Handshake message is being sent 6.303 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 6.304 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.304 -> Packet A|0|S0|81078e38e08ebaeb8e|48|1 StreamFrame[0(CIB),0,17,fin] 6.335 <- (2) Packet A|2|S0|d4d2f47b5125ba08|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|81072077776b58039c|505c6dbec883e0cba281a69ffe8db177] Padding(1161) 6.335 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 6.400/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 6.427/App, because ackElicitingInFlight | RTT:33/16 6.335 Discarding pn space Handshake because HandshakeDone is received 6.336 <- (3) Packet A|3|S0|d4d2f47b5125ba08|1220|2 PingFrame[] Padding(1190) 6.336 <- (4) Packet A|4|S0|d4d2f47b5125ba08|338|1 CryptoFrame[0,305] 6.336 -> Packet A|1|S0|81078e38e08ebaeb8e|32|1 AckFrame[3-2|Δ0] -< CryptoStream[A|NewSessionTicket] 6.337 <- (5) Packet A|5|S0|d4d2f47b5125ba08|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 6.337 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.337 Finished downloading https://server4:443/zqcheyyngp at 43:44.709 on ClientConnection[1ea2afe7a094a335/d4d2f47b5125ba08(V1) with server4/193.167.100.100:443] 6.337 -> Packet A|2|S0|81078e38e08ebaeb8e|32|1 AckFrame[5-2|Δ0] 6.338 Closing ClientConnection[1ea2afe7a094a335/d4d2f47b5125ba08(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.338 -> Packet A|3|S0|81078e38e08ebaeb8e|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 6.338 Creating connection with server4:443 with v1 6.339 Setting up connection for downloading https://server4:443/fugpxrqtmf at 43:44.710 on ClientConnection[d1b8b83519898272/da37fc78445ba3e5(V1) with server4/193.167.100.100:443] 6.339 Original destination connection id: d1b8b83519898272 (scid: da37fc78445ba3e5) >- CryptoStream[I|ClientHello] 6.340 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.540/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.340 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.368 <- (6) Packet A|7|S0|d4d2f47b5125ba08|37|2 AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 6.368 -> Packet A|4|S0|81078e38e08ebaeb8e|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 6.369 <- (7) Packet A|8|S0|d4d2f47b5125ba08|38|2 AckFrame[3-1|Δ0] ConnectionCloseFrame[0|0|] 6.373 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.373 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.574/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.373 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 6.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.473/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.376 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 6.376 - unknown transport parameter 0xff04de1b, size 2 6.376 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 6.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 6.475/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.378 -> Packet H|0|L|81|1 CryptoFrame[0,36] 6.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.378 Starting downloading https://server4:443/fugpxrqtmf at 43:44.750 on ClientConnection[d1b8b83519898272/da37fc78445ba3e5(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 6.475/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.378 Discarding pn space Initial because first Handshake message is being sent 6.378 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 6.379 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.476/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.379 -> Packet A|0|S0|49091f60a25a7d2138|48|1 StreamFrame[0(CIB),0,17,fin] 6.410 <- (2) Packet A|2|S0|da37fc78445ba3e5|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|49095ffcf0a0a0259c|9357a9ef4ed7f31bcf0e7f06268805ed] Padding(1161) 6.411 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 6.475/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 6.502/App, because ackElicitingInFlight | RTT:33/16 6.411 Discarding pn space Handshake because HandshakeDone is received 6.411 <- (3) Packet A|3|S0|da37fc78445ba3e5|1220|2 PingFrame[] Padding(1190) 6.412 -> Packet A|1|S0|49091f60a25a7d2138|32|1 AckFrame[3-2|Δ0] 6.412 <- (4) Packet A|5|S0|da37fc78445ba3e5|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 6.412 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.413 Finished downloading https://server4:443/fugpxrqtmf at 43:44.784 on ClientConnection[d1b8b83519898272/da37fc78445ba3e5(V1) with server4/193.167.100.100:443] 6.413 Closing ClientConnection[d1b8b83519898272/da37fc78445ba3e5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.413 -> Packet A|2|S0|49091f60a25a7d2138|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 6.413 Creating connection with server4:443 with v1 6.414 Setting up connection for downloading https://server4:443/uqgsfasxuc at 43:44.785 on ClientConnection[1012942270d109b9/76ad3a68015edcab(V1) with server4/193.167.100.100:443] 6.414 Original destination connection id: 1012942270d109b9 (scid: 76ad3a68015edcab) >- CryptoStream[I|ClientHello] 6.415 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.615/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.415 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.443 <- (5) Packet A|6|S0|da37fc78445ba3e5|1252|2 PingFrame[] Padding(1222) 6.444 -> Packet A|3|S0|49091f60a25a7d2138|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 6.448 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.449 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.649/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.448 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 6.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.549/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.452 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 6.453 - unknown transport parameter 0xff04de1b, size 2 6.453 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 6.455 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.552/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.455 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.553/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.456 Discarding pn space Initial because first Handshake message is being sent 6.456 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 6.456 Starting downloading https://server4:443/uqgsfasxuc at 43:44.827 on ClientConnection[1012942270d109b9/76ad3a68015edcab(V1) with server4/193.167.100.100:443] 6.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.553/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.456 -> Packet A|0|S0|b96797a82861d7c3d2|48|1 StreamFrame[0(CIB),0,17,fin] 6.488 <- (2) Packet A|3|S0|76ad3a68015edcab|1220|2 PingFrame[] Padding(1190) 6.488 <- (3) Packet A|4|S0|76ad3a68015edcab|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 6.489 -> Packet A|1|S0|b96797a82861d7c3d2|32|1 AckFrame[4-3|Δ0] 6.552 loss detection timeout handler running Sending probe 0, because no ack since 6.455. Current RTT: 33/16. 6.553 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.553 (Probe is a handshake retransmit) 6.553 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.747/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.553 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 6.638 <- (4) Packet A|5|S0|76ad3a68015edcab|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b96779df49a79bcad0|4e9053117436b750bb55402ac06631ea] Padding(852) -< CryptoStream[A|NewSessionTicket] 6.639 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 6.702/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -59 millis, based on 6.579/App, because ackElicitingInFlight | RTT:33/16 6.639 loss detection timeout handler running 6.639 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 6.456. Current RTT: 33/16. 6.639 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 6.885/App, because ackElicitingInFlight | RTT:33/16 6.639 -> Packet PA|2|S0|b96797a82861d7c3d2|48|1 StreamFrame[0(CIB),0,17,fin] 6.659 -> Packet A|3|S0|b96797a82861d7c3d2|33|1 AckFrame[5-3|Δ19] 6.691 <- (5) Packet A|6|S0|76ad3a68015edcab|1220|3 AckFrame[3|Δ0] HandshakeDoneFrame[] Padding(1185) 6.691 Cwnd(-): 6000; inflight: 0 6.691 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.691 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 122 millis, based on 6.814/App, because ackElicitingInFlight | RTT:33/16 6.691 -> Packet A|4|S0|b96797a82861d7c3d2|48|1 StreamFrame[0(CIB),0,17,fin] 6.692 <- (6) Packet A|7|S0|76ad3a68015edcab|1252|2 PingFrame[] Padding(1222) 6.692 -> Packet A|5|S0|b96797a82861d7c3d2|32|1 AckFrame[7-6|Δ0] 6.722 <- (7) Packet A|8|S0|76ad3a68015edcab|92|3 AckFrame[4-3|Δ0] NewConnectionIdFrame[2,<1|18e0e447fed41a1698|46cda50c96cfd2cd8a856b12bd1c6d7b] NewConnectionIdFrame[3,<2|18e01e43ee6b08ad08|ef3dc437d748d4a2035d184c72f509e4] 6.723 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 6.834/App, because ackElicitingInFlight | RTT:33/13 6.723 -> Packet A|6|S0|18e0e447fed41a1698|36|3 RetireConnectionIdFrame[0] AckFrame[8-6|Δ0] RetireConnectionIdFrame[1] 6.723 <- (8) Packet A|9|S0|76ad3a68015edcab|1057|1 StreamFrame[0(CIB),0,1024,fin] 6.724 Finished downloading https://server4:443/uqgsfasxuc at 43:45.095 on ClientConnection[1012942270d109b9/76ad3a68015edcab(V1) with server4/193.167.100.100:443] 6.724 Closing ClientConnection[1012942270d109b9/76ad3a68015edcab(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.725 Creating connection with server4:443 with v1 6.725 -> Packet A|7|S0|18e0e447fed41a1698|36|2 ConnectionCloseFrame[0|0|] AckFrame[9-6|Δ0] 6.725 Setting up connection for downloading https://server4:443/icqulrqiik at 43:45.096 on ClientConnection[a627eed79bdba491/b8bf16195ca514fc(V1) with server4/193.167.100.100:443] 6.725 Original destination connection id: a627eed79bdba491 (scid: b8bf16195ca514fc) >- CryptoStream[I|ClientHello] 6.727 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.927/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.727 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.755 <- (9) Packet A|10|S0|76ad3a68015edcab|1332|2 PingFrame[] Padding(1302) 6.755 <- (10) Packet A|11|S0|76ad3a68015edcab|38|2 AckFrame[7-6|Δ0] ConnectionCloseFrame[0|0|] 6.755 -> Packet A|8|S0|18e0e447fed41a1698|36|2 ConnectionCloseFrame[0|0|] AckFrame[9-6|Δ0] 6.926 loss detection timeout handler running Sending probe 0, because no ack since 6.727. Current RTT: 100/25. 6.926 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.926 (Probe is an initial retransmit) 6.927 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.327/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.927 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.326 loss detection timeout handler running Sending probe 1, because no ack since 6.927. Current RTT: 100/25. 7.326 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.326 (Probe is an initial retransmit) 7.327 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.127/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.327 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.328 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.128/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.327 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.386 <- (1) Packet I|2|L|1220|2 Token=[] AckFrame[3-2|Δ0] Padding(1167) 7.386 probe count not reset on ack because handshake not yet confirmed 7.386 Retransmitting CryptoFrame[0,257] on level Initial 7.387 Cwnd(-): 6000; inflight: 0 7.387 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.187/Initial, because peerAwaitingAddressValidation | RTT:100/25 7.387 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 695 millis, based on 8.083/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/29 7.387 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) 7.511 <- (2) Packet I|3|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 7.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.511 <- (2) Packet H|4|L|1046|2 CryptoFrame[0,741] Padding(255) reschedule loss detection timer for PTO over 695 millis, based on 8.210/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/29 7.514 -> Packet I|5|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1152) 7.514 - unknown transport parameter 0xff04de1b, size 2 7.514 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 7.517 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 695 millis, based on 8.213/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/29 7.517 -> Packet H|0|L|81|1 CryptoFrame[0,36] 7.517 Starting downloading https://server4:443/icqulrqiik at 43:45.888 on ClientConnection[a627eed79bdba491/b8bf16195ca514fc(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.517 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 173 millis, based on 7.691/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/29 7.517 Discarding pn space Initial because first Handshake message is being sent 7.518 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 173 millis, based on 7.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/29 7.518 -> [Packet H|1|L|47|1 AckFrame[4|Δ0], Packet A|0|S0|1327bca328da23af5e|48|1 StreamFrame[0(CIB),0,17,fin]] 7.548 <- (3) Packet A|5|S0|b8bf16195ca514fc|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|132791fca363efbcb2|140b21a47526df86b6bf67bf46aa5ad5] Padding(1161) 7.549 State is set to Confirmed reschedule loss detection timer for PTO over 141 millis, based on 7.691/Handshake, because ackElicitingInFlight | RTT:58/29 reschedule loss detection timer for PTO over 168 millis, based on 7.718/App, because ackElicitingInFlight | RTT:58/29 7.549 Discarding pn space Handshake because HandshakeDone is received 7.549 <- (4) Packet A|6|S0|b8bf16195ca514fc|1252|2 PingFrame[] Padding(1222) 7.550 <- (5) Packet A|7|S0|b8bf16195ca514fc|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 7.550 -> Packet A|1|S0|1327bca328da23af5e|32|1 AckFrame[6-5|Δ0] 7.551 <- (6) Packet A|9|S0|b8bf16195ca514fc|1057|1 StreamFrame[0(CIB),0,1024,fin] 7.551 -> Packet A|2|S0|1327bca328da23af5e|34|1 AckFrame[9,7-5|Δ0] 7.551 Finished downloading https://server4:443/icqulrqiik at 43:45.922 on ClientConnection[a627eed79bdba491/b8bf16195ca514fc(V1) with server4/193.167.100.100:443] 7.551 Closing ClientConnection[a627eed79bdba491/b8bf16195ca514fc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.552 Creating connection with server4:443 with v1 7.552 -> Packet A|3|S0|1327bca328da23af5e|38|2 ConnectionCloseFrame[0|0|] AckFrame[9,7-5|Δ0] 7.552 Setting up connection for downloading https://server4:443/gumeopfdel at 43:45.924 on ClientConnection[80540e8f46140f04/bb93e1fd5ae01043(V1) with server4/193.167.100.100:443] 7.552 Original destination connection id: 80540e8f46140f04 (scid: bb93e1fd5ae01043) >- CryptoStream[I|ClientHello] 7.554 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.754/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.554 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.582 <- (7) Packet A|10|S0|b8bf16195ca514fc|1332|2 PingFrame[] Padding(1302) 7.582 <- (8) Packet A|11|S0|b8bf16195ca514fc|37|2 AckFrame[2-0|Δ0] MaxStreamsFrame[B,101] 7.583 -> Packet A|4|S0|1327bca328da23af5e|38|2 ConnectionCloseFrame[0|0|] AckFrame[9,7-5|Δ0] 7.583 -> Packet A|5|S0|1327bca328da23af5e|38|2 ConnectionCloseFrame[0|0|] AckFrame[9,7-5|Δ0] 7.587 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.588 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.788/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.587 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 7.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.687/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.590 - unknown transport parameter 0xff04de1b, size 2 7.590 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 7.590 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 7.592 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.689/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.592 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.592 Starting downloading https://server4:443/gumeopfdel at 43:45.963 on ClientConnection[80540e8f46140f04/bb93e1fd5ae01043(V1) with server4/193.167.100.100:443] 7.592 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.689/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.592 Discarding pn space Initial because first Handshake message is being sent 7.592 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 7.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.690/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.593 -> Packet A|0|S0|03e2d3cafc7c46b592|48|1 StreamFrame[0(CIB),0,17,fin] 7.689 loss detection timeout handler running Sending probe 0, because no ack since 7.592. Current RTT: 33/16. 7.689 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.689 (Probe is a handshake retransmit) 7.689 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.883/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.689 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 7.721 <- (2) Packet A|2|S0|bb93e1fd5ae01043|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|03e2ec16f38aa66582|32fa8aa8cf29761b7cc77536d3735b5b] Padding(1161) 7.722 State is set to Confirmed reschedule loss detection timer for PTO over 116 millis, based on 7.839/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 7.716/App, because ackElicitingInFlight | RTT:33/16 7.722 Discarding pn space Handshake because HandshakeDone is received 7.722 loss detection timeout handler running Sending probe 0, because no ack since 7.593. Current RTT: 33/16. 7.722 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 7.968/App, because ackElicitingInFlight | RTT:33/16 7.722 <- (3) Packet A|3|S0|bb93e1fd5ae01043|1220|2 PingFrame[] Padding(1190) 7.722 -> Packet PA|1|S0|03e2d3cafc7c46b592|48|1 StreamFrame[0(CIB),0,17,fin] 7.722 <- (4) Packet A|4|S0|bb93e1fd5ae01043|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 7.723 -> Packet A|2|S0|03e2d3cafc7c46b592|32|1 AckFrame[3-2|Δ0] 7.743 -> Packet A|3|S0|03e2d3cafc7c46b592|33|1 AckFrame[4-2|Δ19] 7.753 <- (5) Packet A|5|S0|bb93e1fd5ae01043|92|3 AckFrame[1|Δ0] NewConnectionIdFrame[2,<1|c83ef9ebf663e3b047|9e3680eac65b8b8672ba81326430368a] NewConnectionIdFrame[3,<2|c83e8f5f6d0efc1bec|8a79e4d9745e0e8573f9caff2e97b4c6] 7.754 Cwnd(-): 6000; inflight: 0 7.754 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.754 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 7.865/App, because ackElicitingInFlight | RTT:33/13 7.754 -> Packet A|4|S0|03e2d3cafc7c46b592|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4-2|Δ0] reschedule loss detection timer for PTO over 110 millis, based on 7.865/App, because ackElicitingInFlight | RTT:33/13 7.754 <- (6) Packet A|6|S0|bb93e1fd5ae01043|1057|1 StreamFrame[0(CIB),0,1024,fin] 7.754 -> Packet A|5|S0|c83ef9ebf663e3b047|36|3 RetireConnectionIdFrame[0] AckFrame[5-2|Δ0] RetireConnectionIdFrame[1] 7.755 Finished downloading https://server4:443/gumeopfdel at 43:46.126 on ClientConnection[80540e8f46140f04/bb93e1fd5ae01043(V1) with server4/193.167.100.100:443] 7.755 Closing ClientConnection[80540e8f46140f04/bb93e1fd5ae01043(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.755 -> Packet A|6|S0|c83ef9ebf663e3b047|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-2|Δ0] 7.756 Creating connection with server4:443 with v1 7.756 Setting up connection for downloading https://server4:443/plmjwgdami at 43:46.127 on ClientConnection[ac80255af016f5f5/0bde9a9710f2a367(V1) with server4/193.167.100.100:443] 7.756 Original destination connection id: ac80255af016f5f5 (scid: 0bde9a9710f2a367) >- CryptoStream[I|ClientHello] 7.758 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.958/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.758 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.785 <- (7) Packet A|8|S0|bb93e1fd5ae01043|36|1 AckFrame[5,3|Δ0] 7.785 -> Packet A|7|S0|c83ef9ebf663e3b047|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-2|Δ0] 7.957 loss detection timeout handler running Sending probe 0, because no ack since 7.758. Current RTT: 100/25. 7.957 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.957 (Probe is an initial retransmit) 7.958 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.358/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.958 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.357 loss detection timeout handler running Sending probe 1, because no ack since 7.958. Current RTT: 100/25. 8.357 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.357 (Probe is an initial retransmit) 8.358 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.158/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.358 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.359 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.159/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.359 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.391 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 8.392 probe count not reset on ack because handshake not yet confirmed 8.392 Retransmitting CryptoFrame[0,257] on level Initial 8.392 Cwnd(-): 6000; inflight: 0 8.392 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.192/Initial, because peerAwaitingAddressValidation | RTT:100/25 8.392 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 8.776/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 8.392 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 8.391 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 8.395 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 8.779/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 8.395 - unknown transport parameter 0xff04de1b, size 2 8.395 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 8.395 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 8.397 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 8.781/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.397 -> Packet H|0|L|81|1 CryptoFrame[0,36] 8.398 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.398 Starting downloading https://server4:443/plmjwgdami at 43:46.769 on ClientConnection[ac80255af016f5f5/0bde9a9710f2a367(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 8.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 8.398 Discarding pn space Initial because first Handshake message is being sent 8.398 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 8.398 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 8.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 8.398 -> Packet A|0|S0|1a6292a5e9d0fc97a3|48|1 StreamFrame[0(CIB),0,17,fin] 8.429 <- (2) Packet A|2|S0|0bde9a9710f2a367|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1a629a485e0e09f8d0|0694c7c5e4547510d4e85a10041eebf5] Padding(1161) 8.430 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 8.493/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 8.520/App, because ackElicitingInFlight | RTT:32/16 8.430 Discarding pn space Handshake because HandshakeDone is received 8.430 <- (3) Packet A|4|S0|0bde9a9710f2a367|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 8.431 -> Packet A|1|S0|1a6292a5e9d0fc97a3|34|1 AckFrame[4,2|Δ0] 8.431 <- (4) Packet A|5|S0|0bde9a9710f2a367|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 8.431 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.432 Finished downloading https://server4:443/plmjwgdami at 43:46.803 on ClientConnection[ac80255af016f5f5/0bde9a9710f2a367(V1) with server4/193.167.100.100:443] 8.432 Closing ClientConnection[ac80255af016f5f5/0bde9a9710f2a367(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.432 -> Packet A|2|S0|1a6292a5e9d0fc97a3|38|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 8.432 Creating connection with server4:443 with v1 8.433 Setting up connection for downloading https://server4:443/wvpfnotahx at 43:46.804 on ClientConnection[67ea12d753b6c840/45ff5085541cf711(V1) with server4/193.167.100.100:443] 8.433 Original destination connection id: 67ea12d753b6c840 (scid: 45ff5085541cf711) >- CryptoStream[I|ClientHello] 8.434 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.634/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.434 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.463 <- (5) Packet A|6|S0|0bde9a9710f2a367|38|2 AckFrame[2-1|Δ0] ConnectionCloseFrame[0|0|] 8.467 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.468 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.668/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.467 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 8.470 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.567/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.470 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 8.470 - unknown transport parameter 0xff04de1b, size 2 8.470 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 8.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.570/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.473 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.473 Starting downloading https://server4:443/wvpfnotahx at 43:46.845 on ClientConnection[67ea12d753b6c840/45ff5085541cf711(V1) with server4/193.167.100.100:443] 8.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.570/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.474 Discarding pn space Initial because first Handshake message is being sent 8.473 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 8.474 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.571/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.474 -> Packet A|0|S0|c02d31119033e9b87f|48|1 StreamFrame[0(CIB),0,17,fin] 8.570 loss detection timeout handler running Sending probe 0, because no ack since 8.473. Current RTT: 33/16. 8.570 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.570 (Probe is a handshake retransmit) 8.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.765/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.571 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 8.602 <- (2) Packet A|2|S0|45ff5085541cf711|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c02dc70701eee673c8|5ddb0279f38ffcf00429871a7544e1ad] Padding(1156) 8.603 probe count not reset on ack because handshake not yet confirmed 8.603 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.797/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.604 State is set to Confirmed reschedule loss detection timer for PTO over 344 millis, based on 8.949/Handshake, because ackElicitingInFlight | RTT:45/36 8.604 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.604 Discarding pn space Handshake because HandshakeDone is received 8.603 <- (3) Packet A|3|S0|45ff5085541cf711|1220|2 PingFrame[] Padding(1190) 8.604 -> Packet A|1|S0|c02d31119033e9b87f|32|1 AckFrame[3-2|Δ0] 8.741 <- (4) Packet A|6|S0|45ff5085541cf711|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c02dc70701eee673c8|5ddb0279f38ffcf00429871a7544e1ad] Padding(852) -< CryptoStream[A|NewSessionTicket] 8.761 -> Packet A|2|S0|c02d31119033e9b87f|35|1 AckFrame[6,3-2|Δ19] 9.018 <- (5) Packet A|7|S0|45ff5085541cf711|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c02dc70701eee673c8|5ddb0279f38ffcf00429871a7544e1ad] Padding(852) -< CryptoStream[A|NewSessionTicket] 9.038 -> Packet A|3|S0|c02d31119033e9b87f|35|1 AckFrame[7-6,3-2|Δ19] 9.070 <- (6) Packet A|8|S0|45ff5085541cf711|1252|4 PingFrame[] AckFrame[3|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(189) 9.070 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.071 Finished downloading https://server4:443/wvpfnotahx at 43:47.442 on ClientConnection[67ea12d753b6c840/45ff5085541cf711(V1) with server4/193.167.100.100:443] 9.071 Closing ClientConnection[67ea12d753b6c840/45ff5085541cf711(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.071 -> Packet A|4|S0|c02d31119033e9b87f|36|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 9.071 Creating connection with server4:443 with v1 9.072 Setting up connection for downloading https://server4:443/dcdytisigr at 43:47.443 on ClientConnection[1046651b3e793f83/afafbd6f905b6db9(V1) with server4/193.167.100.100:443] 9.072 Original destination connection id: 1046651b3e793f83 (scid: afafbd6f905b6db9) >- CryptoStream[I|ClientHello] 9.073 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.273/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.073 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.102 <- (7) Packet A|9|S0|45ff5085541cf711|38|2 AckFrame[4|Δ0] ConnectionCloseFrame[0|0|] 9.106 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.107 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.307/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.106 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 9.109 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.206/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.109 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 9.109 - unknown transport parameter 0xff04de1b, size 2 9.109 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 9.112 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.209/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.111 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.112 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.209/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.112 Discarding pn space Initial because first Handshake message is being sent 9.112 Starting downloading https://server4:443/dcdytisigr at 43:47.483 on ClientConnection[1046651b3e793f83/afafbd6f905b6db9(V1) with server4/193.167.100.100:443] 9.112 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 9.112 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.209/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.112 -> Packet A|0|S0|90ca9fd7e634cac545|48|1 StreamFrame[0(CIB),0,17,fin] 9.143 <- (2) Packet A|2|S0|afafbd6f905b6db9|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|90ca7dc698515f42f7|5fc00d0a9a09b377949f5bbfa89620eb] Padding(1161) 9.144 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 9.208/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 9.235/App, because ackElicitingInFlight | RTT:33/16 9.144 Discarding pn space Handshake because HandshakeDone is received 9.144 <- (3) Packet A|3|S0|afafbd6f905b6db9|1220|2 PingFrame[] Padding(1190) 9.144 <- (4) Packet A|4|S0|afafbd6f905b6db9|338|1 CryptoFrame[0,305] 9.144 -> Packet A|1|S0|90ca9fd7e634cac545|32|1 AckFrame[3-2|Δ0] -< CryptoStream[A|NewSessionTicket] 9.164 -> Packet A|2|S0|90ca9fd7e634cac545|33|1 AckFrame[4-2|Δ19] 9.176 <- (5) Packet A|5|S0|afafbd6f905b6db9|1252|2 PingFrame[] Padding(1222) 9.196 -> Packet A|3|S0|90ca9fd7e634cac545|33|1 AckFrame[5-2|Δ19] 9.227 <- (6) Packet A|6|S0|afafbd6f905b6db9|1332|2 PingFrame[] Padding(1302) 9.235 loss detection timeout handler running Sending probe 0, because no ack since 9.112. Current RTT: 33/16. 9.235 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 9.481/App, because ackElicitingInFlight | RTT:33/16 9.235 -> Packet PA|4|S0|90ca9fd7e634cac545|48|1 StreamFrame[0(CIB),0,17,fin] 9.247 -> Packet A|5|S0|90ca9fd7e634cac545|33|1 AckFrame[6-2|Δ19] 9.266 <- (7) Packet A|7|S0|afafbd6f905b6db9|41|2 AckFrame[4-3,1|Δ0] MaxDataFrame[16777233] 9.266 Cwnd(-): 6000; inflight: 0 9.266 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 9.266 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 9.377/App, because ackElicitingInFlight | RTT:33/13 9.266 -> Packet A|6|S0|90ca9fd7e634cac545|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ0] 9.267 <- (8) Packet A|8|S0|afafbd6f905b6db9|1057|1 StreamFrame[0(CIB),0,1024,fin] 9.267 -> Packet A|7|S0|90ca9fd7e634cac545|32|1 AckFrame[8-6|Δ0] 9.267 Finished downloading https://server4:443/dcdytisigr at 43:47.638 on ClientConnection[1046651b3e793f83/afafbd6f905b6db9(V1) with server4/193.167.100.100:443] 9.267 Closing ClientConnection[1046651b3e793f83/afafbd6f905b6db9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.268 -> Packet A|8|S0|90ca9fd7e634cac545|36|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ0] 9.268 Creating connection with server4:443 with v1 9.269 Setting up connection for downloading https://server4:443/zserlqunle at 43:47.640 on ClientConnection[889e8e5ce48ed291/e5e236505af58228(V1) with server4/193.167.100.100:443] 9.269 Original destination connection id: 889e8e5ce48ed291 (scid: e5e236505af58228) >- CryptoStream[I|ClientHello] 9.270 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.470/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.270 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.279 <- (9) Packet A|9|S0|afafbd6f905b6db9|1412|2 PingFrame[] Padding(1382) 9.280 -> Packet A|9|S0|90ca9fd7e634cac545|36|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ0] 9.298 <- (10) Packet A|11|S0|afafbd6f905b6db9|40|2 AckFrame[8-7,5|Δ0] ConnectionCloseFrame[0|0|] 9.303 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.304 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.504/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.303 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 9.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.403/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.306 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 9.306 - unknown transport parameter 0xff04de1b, size 2 9.306 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 9.309 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.406/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.309 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.309 Starting downloading https://server4:443/zserlqunle at 43:47.681 on ClientConnection[889e8e5ce48ed291/e5e236505af58228(V1) with server4/193.167.100.100:443] 9.309 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.407/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.310 Discarding pn space Initial because first Handshake message is being sent 9.310 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 9.310 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.407/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.310 -> Packet A|0|S0|32059a48383e7f1d00|48|1 StreamFrame[0(CIB),0,17,fin] 9.406 loss detection timeout handler running Sending probe 0, because no ack since 9.309. Current RTT: 33/16. 9.406 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.406 (Probe is a handshake retransmit) 9.406 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 9.600/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.406 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 9.439 <- (2) Packet A|3|S0|e5e236505af58228|1220|2 PingFrame[] Padding(1190) 9.439 <- (3) Packet A|4|S0|e5e236505af58228|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 9.440 -> Packet A|1|S0|32059a48383e7f1d00|32|1 AckFrame[4-3|Δ0] 9.440 <- (4) Packet A|5|S0|e5e236505af58228|1057|1 StreamFrame[0(CIB),0,1024,fin] 9.441 Finished downloading https://server4:443/zserlqunle at 43:47.812 on ClientConnection[889e8e5ce48ed291/e5e236505af58228(V1) with server4/193.167.100.100:443] 9.441 Closing ClientConnection[889e8e5ce48ed291/e5e236505af58228(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.441 -> Packet A|2|S0|32059a48383e7f1d00|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 9.441 Creating connection with server4:443 with v1 9.442 Setting up connection for downloading https://server4:443/tosqbeeaei at 43:47.813 on ClientConnection[8622773895ceac4c/3f345e3dd68cee97(V1) with server4/193.167.100.100:443] 9.442 Original destination connection id: 8622773895ceac4c (scid: 3f345e3dd68cee97) >- CryptoStream[I|ClientHello] 9.443 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.643/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.443 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.472 <- (5) Packet A|6|S0|e5e236505af58228|40|2 AckFrame[2,0|Δ0] ConnectionCloseFrame[0|0|] 9.477 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.477 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.677/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.477 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 9.480 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.577/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.480 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 9.480 - unknown transport parameter 0xff04de1b, size 2 9.480 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 9.483 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.580/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.482 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.483 Starting downloading https://server4:443/tosqbeeaei at 43:47.854 on ClientConnection[8622773895ceac4c/3f345e3dd68cee97(V1) with server4/193.167.100.100:443] 9.483 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.580/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.483 Discarding pn space Initial because first Handshake message is being sent 9.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.581/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.484 -> [Packet H|1|L|47|1 AckFrame[1|Δ0], Packet A|0|S0|69c18a59350c907daa|48|1 StreamFrame[0(CIB),0,17,fin]] 9.517 <- (2) Packet A|5|S0|3f345e3dd68cee97|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 9.517 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.614/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.517 Finished downloading https://server4:443/tosqbeeaei at 43:47.889 on ClientConnection[8622773895ceac4c/3f345e3dd68cee97(V1) with server4/193.167.100.100:443] 9.517 Closing ClientConnection[8622773895ceac4c/3f345e3dd68cee97(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.518 -> Packet A|1|S0|69c18a59350c907daa|36|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 9.518 Creating connection with server4:443 with v1 9.519 Setting up connection for downloading https://server4:443/gsiipsmxlt at 43:47.890 on ClientConnection[90191c818afe498a/00f08e75817c540b(V1) with server4/193.167.100.100:443] 9.519 Original destination connection id: 90191c818afe498a (scid: 00f08e75817c540b) >- CryptoStream[I|ClientHello] 9.520 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.720/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.520 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.548 <- (3) Packet A|6|S0|3f345e3dd68cee97|38|2 AckFrame[1|Δ0] ConnectionCloseFrame[0|0|] 9.554 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.554 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.754/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.554 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 9.556 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.653/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.556 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 9.557 - unknown transport parameter 0xff04de1b, size 2 9.557 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 9.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.656/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.559 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.559 Starting downloading https://server4:443/gsiipsmxlt at 43:47.930 on ClientConnection[90191c818afe498a/00f08e75817c540b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 9.656/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.559 Discarding pn space Initial because first Handshake message is being sent 9.559 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 9.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.657/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.560 -> Packet A|0|S0|637de23ac23f7b4531|48|1 StreamFrame[0(CIB),0,17,fin] 9.590 <- (2) Packet A|2|S0|00f08e75817c540b|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|637dc35d3ce41516a7|6418053a4b7e10de8fe4d4f7b27d3cde] NewConnectionIdFrame[2,<1|8a595bbbc34c77063b|ce31513fd1ca6c72c7ea46cf8945f9db] NewConnectionIdFrame[3,<2|8a591e7eadba971d84|a85e5a3e32f55aba4b5cbf15d892cfb2] Padding(1103) 9.591 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 9.656/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 9.683/App, because ackElicitingInFlight | RTT:33/16 9.591 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 122 millis, based on 9.714/App, because ackElicitingInFlight | RTT:33/16 9.591 -> Packet A|1|S0|8a595bbbc34c77063b|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] 9.592 <- (3) Packet A|3|S0|00f08e75817c540b|1220|2 PingFrame[] Padding(1190) 9.592 <- (4) Packet A|4|S0|00f08e75817c540b|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 9.592 -> Packet A|2|S0|8a595bbbc34c77063b|32|1 AckFrame[4-2|Δ0] 9.593 <- (5) Packet A|5|S0|00f08e75817c540b|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 121 millis, based on 9.714/App, because ackElicitingInFlight | RTT:33/16 9.593 Finished downloading https://server4:443/gsiipsmxlt at 43:47.965 on ClientConnection[90191c818afe498a/00f08e75817c540b(V1) with server4/193.167.100.100:443] 9.593 Closing ClientConnection[90191c818afe498a/00f08e75817c540b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.594 -> Packet A|3|S0|8a595bbbc34c77063b|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 9.594 Creating connection with server4:443 with v1 9.594 Setting up connection for downloading https://server4:443/bpqyoxduhu at 43:47.966 on ClientConnection[75495e43f395641e/025e3e8fd4e1ed9d(V1) with server4/193.167.100.100:443] 9.594 Original destination connection id: 75495e43f395641e (scid: 025e3e8fd4e1ed9d) >- CryptoStream[I|ClientHello] 9.596 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.796/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.596 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.624 <- (6) Packet A|6|S0|00f08e75817c540b|40|2 AckFrame[3,1|Δ0] ConnectionCloseFrame[0|0|] 9.629 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.629 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.829/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.629 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 9.631 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.728/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.631 - unknown transport parameter 0xff04de1b, size 2 9.631 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 9.631 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 9.634 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.731/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.634 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.634 Starting downloading https://server4:443/bpqyoxduhu at 43:48.005 on ClientConnection[75495e43f395641e/025e3e8fd4e1ed9d(V1) with server4/193.167.100.100:443] 9.634 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.731/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.634 Discarding pn space Initial because first Handshake message is being sent 9.634 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 9.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.732/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.634 -> Packet A|0|S0|f991165b541f858500|48|1 StreamFrame[0(CIB),0,17,fin] 9.666 <- (2) Packet A|3|S0|025e3e8fd4e1ed9d|1220|2 PingFrame[] Padding(1190) 9.666 <- (3) Packet A|4|S0|025e3e8fd4e1ed9d|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 9.667 -> Packet A|1|S0|f991165b541f858500|32|1 AckFrame[4-3|Δ0] 9.706 <- (4) Packet A|7|S0|025e3e8fd4e1ed9d|1220|4 AckFrame[1-0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f9910dbc47438b72d0|e1264099fd3e9ecfd77c5c6e54b46369] Padding(1156) 9.706 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.803/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.706 State is set to Confirmed reschedule loss detection timer for PTO over 24 millis, based on 9.731/Handshake, because ackElicitingInFlight | RTT:33/16 9.706 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.706 Discarding pn space Handshake because HandshakeDone is received 9.725 -> Packet A|2|S0|f991165b541f858500|33|1 AckFrame[7|Δ19] 9.757 <- (5) Packet A|8|S0|025e3e8fd4e1ed9d|1062|2 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024,fin] 9.757 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.758 Finished downloading https://server4:443/bpqyoxduhu at 43:48.129 on ClientConnection[75495e43f395641e/025e3e8fd4e1ed9d(V1) with server4/193.167.100.100:443] 9.758 Closing ClientConnection[75495e43f395641e/025e3e8fd4e1ed9d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.758 -> Packet A|3|S0|f991165b541f858500|36|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 9.758 Creating connection with server4:443 with v1 9.759 Setting up connection for downloading https://server4:443/xgncdnfshk at 43:48.130 on ClientConnection[877b1192076a98aa/15e88efd7d34a7a6(V1) with server4/193.167.100.100:443] 9.759 Original destination connection id: 877b1192076a98aa (scid: 15e88efd7d34a7a6) >- CryptoStream[I|ClientHello] 9.760 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.960/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.760 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.959 loss detection timeout handler running Sending probe 0, because no ack since 9.760. Current RTT: 100/25. 9.959 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.960 (Probe is an initial retransmit) 9.960 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.360/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.960 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.069 <- (6) Packet A|10|S0|025e3e8fd4e1ed9d|1220|2 PingFrame[] Padding(1190) 10.070 -> Packet A|4|S0|f991165b541f858500|36|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 10.070 <- (7) Packet A|11|S0|025e3e8fd4e1ed9d|1252|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(194) 10.070 -> Packet A|5|S0|f991165b541f858500|36|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 10.359 loss detection timeout handler running Sending probe 1, because no ack since 9.960. Current RTT: 100/25. 10.359 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.359 (Probe is an initial retransmit) 10.360 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.160/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.360 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.361 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.161/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.361 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.393 <- (1) Packet I|4|L|1220|2 Token=[] AckFrame[3,1|Δ0] Padding(1166) 10.394 probe count not reset on ack because handshake not yet confirmed 10.394 Retransmitting CryptoFrame[0,257] on level Initial 10.394 Cwnd(-): 6000; inflight: 1200 10.394 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) 10.444 <- (2) Packet I|5|L|183|3 Token=[] AckFrame[4-3,1|Δ0] CryptoFrame[0,123] PingFrame[] 10.445 probe count not reset on ack because handshake not yet confirmed 10.445 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 10.829/Initial, because peerAwaitingAddressValidation | RTT:32/16 -< CryptoStream[I|ServerHello] 10.444 <- (2) Packet H|6|L|1037|2 CryptoFrame[0,741] Padding(246) 10.448 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 391 millis, based on 10.840/Handshake, because peerAwaitingAddressValidation | RTT:34/16 10.448 -> Packet I|5|L|1201|2 Token=[] AckFrame[5-4|Δ0] Padding(1152) 10.448 - unknown transport parameter 0xff04de1b, size 2 10.448 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 10.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 391 millis, based on 10.842/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/16 10.450 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.451 Starting downloading https://server4:443/xgncdnfshk at 43:48.822 on ClientConnection[877b1192076a98aa/15e88efd7d34a7a6(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 97 millis, based on 10.549/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/16 10.451 Discarding pn space Initial because first Handshake message is being sent 10.451 -> Packet H|1|L|47|1 AckFrame[6|Δ0] 10.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 97 millis, based on 10.549/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/16 10.451 -> Packet A|0|S0|707627b1e4b83e1d82|48|1 StreamFrame[0(CIB),0,17,fin] 10.548 loss detection timeout handler running Sending probe 0, because no ack since 10.450. Current RTT: 34/16. 10.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.549 (Probe is a handshake retransmit) 10.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 195 millis, based on 10.745/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/16 10.549 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 10.578 <- (3) Packet H|7|L|1220|3 CryptoFrame[0,741] PingFrame[] Padding(428) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.579 -> Packet H|3|L|47|1 AckFrame[7-6|Δ0] 10.581 <- (4) Packet A|8|S0|15e88efd7d34a7a6|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|70766dc54c778b4eb0|b19b5b8d3cfafc1d777e9ba95c0b9df8] Padding(1156) 10.581 probe count not reset on ack because handshake not yet confirmed 10.581 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 195 millis, based on 10.777/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/16 10.581 State is set to Confirmed reschedule loss detection timer for PTO over 347 millis, based on 10.929/Handshake, because ackElicitingInFlight | RTT:46/36 10.582 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.582 Discarding pn space Handshake because HandshakeDone is received 10.582 <- (5) Packet A|10|S0|15e88efd7d34a7a6|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 10.582 -> Packet A|1|S0|707627b1e4b83e1d82|34|1 AckFrame[10,8|Δ0] 10.583 <- (6) Packet A|11|S0|15e88efd7d34a7a6|1057|1 StreamFrame[0(CIB),0,1024,fin] 10.584 Finished downloading https://server4:443/xgncdnfshk at 43:48.955 on ClientConnection[877b1192076a98aa/15e88efd7d34a7a6(V1) with server4/193.167.100.100:443] 10.584 Closing ClientConnection[877b1192076a98aa/15e88efd7d34a7a6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.584 -> Packet A|2|S0|707627b1e4b83e1d82|38|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,8|Δ0] 10.584 Creating connection with server4:443 with v1 10.585 Setting up connection for downloading https://server4:443/qdjvjivpaz at 43:48.956 on ClientConnection[910c6691f04a8209/fa3fed4a2eff2dae(V1) with server4/193.167.100.100:443] 10.585 Original destination connection id: 910c6691f04a8209 (scid: fa3fed4a2eff2dae) >- CryptoStream[I|ClientHello] 10.586 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.786/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.586 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.615 <- (7) Packet A|12|S0|15e88efd7d34a7a6|38|2 AckFrame[2-1|Δ0] ConnectionCloseFrame[0|0|] 10.785 loss detection timeout handler running Sending probe 0, because no ack since 10.586. Current RTT: 100/25. 10.785 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.786 (Probe is an initial retransmit) 10.786 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.186/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.786 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.820 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 10.820 probe count not reset on ack because handshake not yet confirmed 10.820 Retransmitting CryptoFrame[0,257] on level Initial 10.820 Cwnd(-): 6000; inflight: 0 10.820 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.220/Initial, because peerAwaitingAddressValidation | RTT:100/25 10.821 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 11.015/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.821 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 10.820 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 10.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.017/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.823 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 10.823 - unknown transport parameter 0xff04de1b, size 2 10.823 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 10.825 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.019/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.825 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.826 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.826 Starting downloading https://server4:443/qdjvjivpaz at 43:49.197 on ClientConnection[910c6691f04a8209/fa3fed4a2eff2dae(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 10.923/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.826 Discarding pn space Initial because first Handshake message is being sent 10.826 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 10.826 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.923/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.826 -> Packet A|0|S0|a117dc27c2d263efe8|48|1 StreamFrame[0(CIB),0,17,fin] 10.857 <- (2) Packet A|2|S0|fa3fed4a2eff2dae|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a1177eb379820f8ac2|f528b518fbda7325574f58e3a21cfcbc] Padding(1161) 10.858 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 10.922/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 10.949/App, because ackElicitingInFlight | RTT:33/16 10.858 Discarding pn space Handshake because HandshakeDone is received 10.858 <- (3) Packet A|3|S0|fa3fed4a2eff2dae|1220|2 PingFrame[] Padding(1190) 10.858 <- (4) Packet A|4|S0|fa3fed4a2eff2dae|338|1 CryptoFrame[0,305] 10.858 -> Packet A|1|S0|a117dc27c2d263efe8|32|1 AckFrame[3-2|Δ0] -< CryptoStream[A|NewSessionTicket] 10.859 <- (5) Packet A|5|S0|fa3fed4a2eff2dae|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 10.859 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.860 -> Packet A|2|S0|a117dc27c2d263efe8|32|1 AckFrame[5-2|Δ0] 10.860 Finished downloading https://server4:443/qdjvjivpaz at 43:49.231 on ClientConnection[910c6691f04a8209/fa3fed4a2eff2dae(V1) with server4/193.167.100.100:443] 10.860 Closing ClientConnection[910c6691f04a8209/fa3fed4a2eff2dae(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.861 Creating connection with server4:443 with v1 10.860 -> Packet A|3|S0|a117dc27c2d263efe8|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 10.861 Setting up connection for downloading https://server4:443/pcjlcajfhm at 43:49.233 on ClientConnection[6e25c84056484ed0/0d48e60446bc609e(V1) with server4/193.167.100.100:443] 10.861 Original destination connection id: 6e25c84056484ed0 (scid: 0d48e60446bc609e) >- CryptoStream[I|ClientHello] 10.863 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.063/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.863 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.890 <- (6) Packet A|6|S0|fa3fed4a2eff2dae|1252|2 PingFrame[] Padding(1222) 10.890 <- (7) Packet A|7|S0|fa3fed4a2eff2dae|37|2 AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 10.891 -> Packet A|4|S0|a117dc27c2d263efe8|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 10.891 -> Packet A|5|S0|a117dc27c2d263efe8|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 11.062 loss detection timeout handler running Sending probe 0, because no ack since 10.863. Current RTT: 100/25. 11.062 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.062 (Probe is an initial retransmit) 11.063 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.463/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.062 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.096 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 11.097 probe count not reset on ack because handshake not yet confirmed 11.097 Retransmitting CryptoFrame[0,257] on level Initial 11.097 Cwnd(-): 6000; inflight: 0 11.097 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.497/Initial, because peerAwaitingAddressValidation | RTT:100/25 11.097 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 11.291/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.097 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 11.099 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.293/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.099 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 11.096 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 11.100 - unknown transport parameter 0xff04de1b, size 2 11.100 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 11.102 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.296/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.102 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.102 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.199/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.102 Discarding pn space Initial because first Handshake message is being sent 11.102 Starting downloading https://server4:443/pcjlcajfhm at 43:49.474 on ClientConnection[6e25c84056484ed0/0d48e60446bc609e(V1) with server4/193.167.100.100:443] 11.102 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 11.103 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.200/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.103 -> Packet A|0|S0|8ba0dbd9019d8999b1|48|1 StreamFrame[0(CIB),0,17,fin] 11.199 loss detection timeout handler running Sending probe 0, because no ack since 11.102. Current RTT: 33/16. 11.199 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.199 (Probe is a handshake retransmit) 11.200 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.394/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.199 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 11.231 <- (2) Packet A|2|S0|0d48e60446bc609e|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|8ba0be7e30a5378306|d60889012017cefcfe97412e4b4cfa0b] Padding(1156) 11.232 probe count not reset on ack because handshake not yet confirmed 11.232 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.426/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.232 State is set to Confirmed reschedule loss detection timer for PTO over 344 millis, based on 11.577/Handshake, because ackElicitingInFlight | RTT:45/36 11.233 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.233 Discarding pn space Handshake because HandshakeDone is received 11.233 <- (3) Packet A|4|S0|0d48e60446bc609e|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 11.233 -> Packet A|1|S0|8ba0dbd9019d8999b1|34|1 AckFrame[4,2|Δ0] 11.338 <- (4) Packet A|6|S0|0d48e60446bc609e|1220|4 AckFrame[1|Δ2] PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(156) 11.339 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.339 Finished downloading https://server4:443/pcjlcajfhm at 43:49.710 on ClientConnection[6e25c84056484ed0/0d48e60446bc609e(V1) with server4/193.167.100.100:443] 11.339 Closing ClientConnection[6e25c84056484ed0/0d48e60446bc609e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.340 -> Packet A|2|S0|8ba0dbd9019d8999b1|36|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 11.340 Creating connection with server4:443 with v1 11.340 Setting up connection for downloading https://server4:443/zyvepgznbn at 43:49.712 on ClientConnection[d46bc7abde4f4ef2/8b121b5af73ada3f(V1) with server4/193.167.100.100:443] 11.340 Original destination connection id: d46bc7abde4f4ef2 (scid: 8b121b5af73ada3f) >- CryptoStream[I|ClientHello] 11.342 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.542/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.341 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.370 <- (5) Packet A|7|S0|0d48e60446bc609e|38|2 AckFrame[2|Δ0] ConnectionCloseFrame[0|0|] 11.525 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 11.525 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,741] Padding(255) 11.529 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.729/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.529 - unknown transport parameter 0xff04de1b, size 2 11.529 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 11.528 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) >- CryptoStream[H|Finished] 11.531 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.731/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.531 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.531 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.531 Starting downloading https://server4:443/zyvepgznbn at 43:49.902 on ClientConnection[d46bc7abde4f4ef2/8b121b5af73ada3f(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 199 millis, based on 11.731/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.531 Discarding pn space Initial because first Handshake message is being sent 11.531 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 11.532 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.732/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.531 -> Packet A|0|S0|1abd07ed533b9377d1|48|1 StreamFrame[0(CIB),0,17,fin] 11.731 loss detection timeout handler running Sending probe 0, because no ack since 11.531. Current RTT: 100/25. 11.731 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.731 (Probe is a handshake retransmit) 11.731 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.131/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.731 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 12.130 loss detection timeout handler running Sending probe 1, because no ack since 11.531. Current RTT: 100/25. 12.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.131 (Probe is a handshake retransmit) 12.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 12.931/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.131 -> Packet PH|3|L|81|1 CryptoFrame[0,36] 12.132 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 12.932/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.132 -> Packet PH|4|L|81|1 CryptoFrame[0,36] 12.163 <- (2) Packet A|4|S0|8b121b5af73ada3f|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1abd5025f0a6089ba7|76df95a9d6596bca3d446420d184b55b] Padding(1156) 12.163 probe count not reset on ack because handshake not yet confirmed 12.163 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 12.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.163 State is set to Confirmed reschedule loss detection timer for PTO over 7532 millis, based on 19.696/Handshake, because ackElicitingInFlight | RTT:631/315 12.163 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.164 Discarding pn space Handshake because HandshakeDone is received 12.164 <- (3) Packet A|6|S0|8b121b5af73ada3f|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 12.164 -> Packet A|1|S0|1abd07ed533b9377d1|34|1 AckFrame[6,4|Δ0] 12.165 <- (4) Packet A|7|S0|8b121b5af73ada3f|1057|1 StreamFrame[0(CIB),0,1024,fin] 12.165 Finished downloading https://server4:443/zyvepgznbn at 43:50.536 on ClientConnection[d46bc7abde4f4ef2/8b121b5af73ada3f(V1) with server4/193.167.100.100:443] 12.165 Closing ClientConnection[d46bc7abde4f4ef2/8b121b5af73ada3f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.166 -> Packet A|2|S0|1abd07ed533b9377d1|38|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4|Δ0] 12.166 Creating connection with server4:443 with v1 12.166 Setting up connection for downloading https://server4:443/yypouinkas at 43:50.538 on ClientConnection[1c38f497692506f3/a4618668163e4479(V1) with server4/193.167.100.100:443] 12.166 Original destination connection id: 1c38f497692506f3 (scid: a4618668163e4479) >- CryptoStream[I|ClientHello] 12.167 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.367/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.167 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.200 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.201 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.401/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.200 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 12.203 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.300/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.203 - unknown transport parameter 0xff04de1b, size 2 12.203 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 12.203 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 12.205 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.302/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.205 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.205 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.205 Starting downloading https://server4:443/yypouinkas at 43:50.576 on ClientConnection[1c38f497692506f3/a4618668163e4479(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 12.302/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.205 Discarding pn space Initial because first Handshake message is being sent 12.205 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 12.206 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.303/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.206 -> Packet A|0|S0|b331773e5d6d960d96|48|1 StreamFrame[0(CIB),0,17,fin] 12.238 <- (2) Packet A|3|S0|a4618668163e4479|1220|2 PingFrame[] Padding(1190) 12.238 <- (3) Packet A|4|S0|a4618668163e4479|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 12.239 -> Packet A|1|S0|b331773e5d6d960d96|32|1 AckFrame[4-3|Δ0] 12.239 <- (4) Packet A|6|S0|a4618668163e4479|1057|1 StreamFrame[0(CIB),0,1024,fin] 12.239 Finished downloading https://server4:443/yypouinkas at 43:50.611 on ClientConnection[1c38f497692506f3/a4618668163e4479(V1) with server4/193.167.100.100:443] 12.239 Closing ClientConnection[1c38f497692506f3/a4618668163e4479(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.240 -> Packet A|2|S0|b331773e5d6d960d96|38|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-3|Δ0] 12.240 Creating connection with server4:443 with v1 12.241 Setting up connection for downloading https://server4:443/ytgfxyzlkq at 43:50.612 on ClientConnection[8c30b460c2aba991/76fa337835ad4cc6(V1) with server4/193.167.100.100:443] 12.241 Original destination connection id: 8c30b460c2aba991 (scid: 76fa337835ad4cc6) >- CryptoStream[I|ClientHello] 12.242 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.442/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.242 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.270 <- (5) Packet A|7|S0|a4618668163e4479|1252|2 PingFrame[] Padding(1222) 12.271 -> Packet A|3|S0|b331773e5d6d960d96|38|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-3|Δ0] 12.275 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.276 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.476/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.275 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 12.278 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.375/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.278 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 12.278 - unknown transport parameter 0xff04de1b, size 2 12.278 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 12.280 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.377/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.280 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.280 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.377/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.280 Discarding pn space Initial because first Handshake message is being sent 12.280 Starting downloading https://server4:443/ytgfxyzlkq at 43:50.652 on ClientConnection[8c30b460c2aba991/76fa337835ad4cc6(V1) with server4/193.167.100.100:443] 12.280 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 12.281 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.378/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.281 -> Packet A|0|S0|526daeca76eabb1f0e|48|1 StreamFrame[0(CIB),0,17,fin] 12.313 <- (2) Packet A|3|S0|76fa337835ad4cc6|1220|2 PingFrame[] Padding(1190) 12.313 <- (3) Packet A|4|S0|76fa337835ad4cc6|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 12.314 -> Packet A|1|S0|526daeca76eabb1f0e|32|1 AckFrame[4-3|Δ0] 12.345 <- (4) Packet A|5|S0|76fa337835ad4cc6|1252|2 PingFrame[] Padding(1222) 12.365 -> Packet A|2|S0|526daeca76eabb1f0e|33|1 AckFrame[5-3|Δ19] 12.377 loss detection timeout handler running Sending probe 0, because no ack since 12.280. Current RTT: 33/16. 12.377 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.377 (Probe is a handshake retransmit) 12.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 12.572/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.377 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 12.390 <- (6) Packet A|9|S0|a4618668163e4479|1115|3 NewConnectionIdFrame[2,<1|88fa07dc72040f56ae|b3f7e96102253cc32560e197b2dc8cd5] NewConnectionIdFrame[3,<2|88fab806e52b2baf04|3ba79cd817aeb848f0b656d5b3f2bdde] StreamFrame[0(CIB),0,1024,fin] 12.391 -> Packet A|4|S0|b331773e5d6d960d96|38|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-3|Δ0] 12.396 <- (5) Packet A|7|S0|76fa337835ad4cc6|1332|2 PingFrame[] Padding(1302) 12.416 -> Packet A|3|S0|526daeca76eabb1f0e|35|1 AckFrame[7,5-3|Δ19] 12.422 <- (7) Packet A|10|S0|a4618668163e4479|40|2 AckFrame[4,1-0|Δ0] ConnectionCloseFrame[0|0|] 12.447 <- (6) Packet A|8|S0|76fa337835ad4cc6|1332|6 AckFrame[3-1|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|526d7841fbd3abd572|544fc1668e665894bf0ed44dfac8182a] NewConnectionIdFrame[2,<1|8304edd307072a0c74|959063568d6bbb8de52a53ca47e57487] NewConnectionIdFrame[3,<2|8304b45e7baf5c5417|d9e93d9f8184ec28476ff56ea43f6203] Padding(1210) 12.448 probe count not reset on ack because handshake not yet confirmed 12.448 Cwnd(-): 6000; inflight: 162 12.448 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.448 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 12.642/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.448 State is set to Confirmed reschedule loss detection timer for PTO over 123 millis, based on 12.571/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 123 millis, based on 12.571/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 122 millis, based on 12.571/App, because ackElicitingInFlight | RTT:33/16 12.448 Discarding pn space Handshake because HandshakeDone is received 12.448 -> Packet A|4|S0|526daeca76eabb1f0e|48|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 122 millis, based on 12.571/App, because ackElicitingInFlight | RTT:33/16 12.448 -> Packet A|5|S0|8304edd307072a0c74|36|3 RetireConnectionIdFrame[0] AckFrame[8|Δ0] RetireConnectionIdFrame[1] 12.449 <- (7) Packet A|9|S0|76fa337835ad4cc6|1412|2 PingFrame[] Padding(1382) 12.468 -> Packet A|6|S0|8304edd307072a0c74|33|1 AckFrame[9-8|Δ19] 12.500 <- (8) Packet A|11|S0|76fa337835ad4cc6|1472|2 PingFrame[] Padding(1442) 12.505 <- (9) Packet A|12|S0|76fa337835ad4cc6|34|1 AckFrame[6-4|Δ0] 12.505 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.513 <- (5) Packet A|10|S0|8b121b5af73ada3f|87|2 NewConnectionIdFrame[2,<1|7993da306059d46d71|848b77939bd5aecf1d43f1d2b77f0f2d] NewConnectionIdFrame[3,<2|79932743a599f522ae|0ef0971c5c8438a9fd5df75022b525a7] 12.514 -> Packet A|3|S0|1abd07ed533b9377d1|38|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4|Δ0] 12.514 <- (6) Packet A|11|S0|8b121b5af73ada3f|1220|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(162) 12.515 -> Packet A|4|S0|1abd07ed533b9377d1|38|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4|Δ0] 12.519 -> Packet A|7|S0|8304edd307072a0c74|33|1 AckFrame[12-11|Δ19] 12.544 <- (7) Packet A|12|S0|8b121b5af73ada3f|40|2 AckFrame[3,1|Δ0] ConnectionCloseFrame[0|0|] 12.551 <- (10) Packet A|13|S0|76fa337835ad4cc6|1062|2 AckFrame[7|Δ0] StreamFrame[0(CIB),0,1024,fin] 12.551 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.551 Finished downloading https://server4:443/ytgfxyzlkq at 43:50.923 on ClientConnection[8c30b460c2aba991/76fa337835ad4cc6(V1) with server4/193.167.100.100:443] 12.552 Closing ClientConnection[8c30b460c2aba991/76fa337835ad4cc6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.552 -> Packet A|8|S0|8304edd307072a0c74|36|2 ConnectionCloseFrame[0|0|] AckFrame[13|Δ0] 12.552 Creating connection with server4:443 with v1 12.553 Setting up connection for downloading https://server4:443/fewzcvjaet at 43:50.924 on ClientConnection[cd89c986864e385d/773abadf83be4e7e(V1) with server4/193.167.100.100:443] 12.553 Original destination connection id: cd89c986864e385d (scid: 773abadf83be4e7e) >- CryptoStream[I|ClientHello] 12.554 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.754/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.554 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.660 <- (11) Packet A|14|S0|76fa337835ad4cc6|1472|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(414) 12.661 -> Packet A|9|S0|8304edd307072a0c74|36|2 ConnectionCloseFrame[0|0|] AckFrame[13|Δ0] 12.738 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 12.738 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,742] Padding(254) 12.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.941/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.740 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 12.741 - unknown transport parameter 0xff04de1b, size 2 12.741 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 12.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.943/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.743 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.943/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.743 Starting downloading https://server4:443/fewzcvjaet at 43:51.114 on ClientConnection[cd89c986864e385d/773abadf83be4e7e(V1) with server4/193.167.100.100:443] 12.743 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 12.743 Discarding pn space Initial because first Handshake message is being sent 12.744 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.944/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.743 -> Packet A|0|S0|79ce82602aab625fb5|48|1 StreamFrame[0(CIB),0,17,fin] 12.775 <- (2) Packet A|4|S0|773abadf83be4e7e|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|79ce92ff8f1cce0ec7|1ee92baa273c5a3e926aa60c4e4191b7] Padding(1161) 12.776 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 12.943/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 12.969/App, because ackElicitingInFlight | RTT:100/25 12.776 Discarding pn space Handshake because HandshakeDone is received 12.776 <- (3) Packet A|5|S0|773abadf83be4e7e|1220|2 PingFrame[] Padding(1190) 12.776 -> Packet A|1|S0|79ce82602aab625fb5|32|1 AckFrame[5-4|Δ0] 12.777 <- (4) Packet A|7|S0|773abadf83be4e7e|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 12.778 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.778 Finished downloading https://server4:443/fewzcvjaet at 43:51.149 on ClientConnection[cd89c986864e385d/773abadf83be4e7e(V1) with server4/193.167.100.100:443] 12.778 Closing ClientConnection[cd89c986864e385d/773abadf83be4e7e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.778 -> Packet A|2|S0|79ce82602aab625fb5|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 12.779 Creating connection with server4:443 with v1 12.779 Setting up connection for downloading https://server4:443/matpylhiuj at 43:51.150 on ClientConnection[495e896d1ff53c1b/17a1d570b50ba7ff(V1) with server4/193.167.100.100:443] 12.779 Original destination connection id: 495e896d1ff53c1b (scid: 17a1d570b50ba7ff) >- CryptoStream[I|ClientHello] 12.780 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.981/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.780 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.807 <- (5) Packet A|8|S0|773abadf83be4e7e|92|3 AckFrame[1-0|Δ0] NewConnectionIdFrame[2,<1|d27d8c284d8c638115|a489df21017ef592c824f9b15eff3109] NewConnectionIdFrame[3,<2|d27d3e50303701bf10|33f0198a3c87167eea56774a1af412a5] 12.808 -> Packet A|3|S0|79ce82602aab625fb5|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 12.814 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.814 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.014/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.814 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 12.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.913/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.816 - unknown transport parameter 0xff04de1b, size 2 12.816 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 12.816 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 12.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.819 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.819 Discarding pn space Initial because first Handshake message is being sent 12.819 Starting downloading https://server4:443/matpylhiuj at 43:51.190 on ClientConnection[495e896d1ff53c1b/17a1d570b50ba7ff(V1) with server4/193.167.100.100:443] 12.819 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 12.820 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.917/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.820 -> Packet A|0|S0|8371c142b188545eba|48|1 StreamFrame[0(CIB),0,17,fin] 12.850 <- (2) Packet A|2|S0|17a1d570b50ba7ff|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|83718a74dca83aaca3|b8c9904f44a1bdf9d737ad651a7e459a] NewConnectionIdFrame[2,<1|f1dc43bb1650cc0161|adc8bb47ce7c1a3f87dc27d97262f524] NewConnectionIdFrame[3,<2|f1dcb363d9dfcecb10|bf864958b32a58b4d7db3ef3f131ab62] Padding(1103) 12.851 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 12.916/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 12.943/App, because ackElicitingInFlight | RTT:33/16 12.851 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 122 millis, based on 12.974/App, because ackElicitingInFlight | RTT:33/16 12.851 -> Packet A|1|S0|f1dc43bb1650cc0161|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] 12.852 <- (3) Packet A|5|S0|17a1d570b50ba7ff|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 121 millis, based on 12.974/App, because ackElicitingInFlight | RTT:33/16 12.853 Finished downloading https://server4:443/matpylhiuj at 43:51.224 on ClientConnection[495e896d1ff53c1b/17a1d570b50ba7ff(V1) with server4/193.167.100.100:443] 12.853 Closing ClientConnection[495e896d1ff53c1b/17a1d570b50ba7ff(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.853 -> Packet A|2|S0|f1dc43bb1650cc0161|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 12.854 Creating connection with server4:443 with v1 12.854 Setting up connection for downloading https://server4:443/shsqrjjpck at 43:51.226 on ClientConnection[470f5eef7125ab1b/0954bda3d6068234(V1) with server4/193.167.100.100:443] 12.854 Original destination connection id: 470f5eef7125ab1b (scid: 0954bda3d6068234) >- CryptoStream[I|ClientHello] 12.856 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.056/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.855 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.907 <- (4) Packet A|6|S0|17a1d570b50ba7ff|35|1 AckFrame[1-0|Δ0] 12.907 -> Packet A|3|S0|f1dc43bb1650cc0161|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 13.055 loss detection timeout handler running Sending probe 0, because no ack since 12.855. Current RTT: 100/25. 13.055 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.055 (Probe is an initial retransmit) 13.055 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.455/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.055 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.089 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 13.089 probe count not reset on ack because handshake not yet confirmed 13.089 Retransmitting CryptoFrame[0,257] on level Initial 13.089 Cwnd(-): 6000; inflight: 0 13.089 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.489/Initial, because peerAwaitingAddressValidation | RTT:100/25 13.089 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 13.283/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.089 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 13.089 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 13.092 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.286/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.091 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 13.092 - unknown transport parameter 0xff04de1b, size 2 13.092 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 13.094 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.289/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.094 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.095 Starting downloading https://server4:443/shsqrjjpck at 43:51.466 on ClientConnection[470f5eef7125ab1b/0954bda3d6068234(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 13.192/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.095 Discarding pn space Initial because first Handshake message is being sent 13.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.192/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.095 -> [Packet H|1|L|47|1 AckFrame[1|Δ0], Packet A|0|S0|c248a42f59c412da42|48|1 StreamFrame[0(CIB),0,17,fin]] 13.127 <- (2) Packet A|3|S0|0954bda3d6068234|1220|2 PingFrame[] Padding(1190) 13.147 -> Packet A|1|S0|c248a42f59c412da42|33|1 AckFrame[3|Δ19] 13.179 <- (3) Packet A|5|S0|0954bda3d6068234|1252|2 PingFrame[] Padding(1222) 13.192 loss detection timeout handler running Sending probe 0, because no ack since 13.094. Current RTT: 33/16. 13.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.192 (Probe is a handshake retransmit) 13.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.386/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.192 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 13.198 -> Packet A|2|S0|c248a42f59c412da42|35|1 AckFrame[5,3|Δ19] 13.229 <- (4) Packet A|7|S0|0954bda3d6068234|343|2 AckFrame[2-1|Δ0] CryptoFrame[0,305] 13.229 probe count not reset on ack because handshake not yet confirmed 13.229 Cwnd(-): 3000; inflight: 162 13.229 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.229 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.423/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.230 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 193 millis, based on 13.424/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.229 -> Packet A|3|S0|c248a42f59c412da42|48|1 StreamFrame[0(CIB),0,17,fin] 13.230 <- (5) Packet A|8|S0|0954bda3d6068234|1332|2 PingFrame[] Padding(1302) 13.230 -> Packet A|4|S0|c248a42f59c412da42|32|1 AckFrame[8-7|Δ0] 13.261 <- (6) Packet A|9|S0|0954bda3d6068234|1062|2 AckFrame[3-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 13.261 probe count not reset on ack because handshake not yet confirmed 13.262 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.456/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.262 Finished downloading https://server4:443/shsqrjjpck at 43:51.633 on ClientConnection[470f5eef7125ab1b/0954bda3d6068234(V1) with server4/193.167.100.100:443] 13.262 Closing ClientConnection[470f5eef7125ab1b/0954bda3d6068234(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.262 -> Packet A|5|S0|c248a42f59c412da42|36|2 ConnectionCloseFrame[0|0|] AckFrame[9-7|Δ0] 13.263 Creating connection with server4:443 with v1 13.263 Setting up connection for downloading https://server4:443/eozkeorgfu at 43:51.634 on ClientConnection[4e9dabd09a6eef89/1668170dfdfea130(V1) with server4/193.167.100.100:443] 13.263 Original destination connection id: 4e9dabd09a6eef89 (scid: 1668170dfdfea130) 13.263 <- (7) Packet A|11|S0|0954bda3d6068234|1412|2 PingFrame[] Padding(1382) 13.264 -> Packet A|6|S0|c248a42f59c412da42|36|2 ConnectionCloseFrame[0|0|] AckFrame[9-7|Δ0] >- CryptoStream[I|ClientHello] 13.265 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.465/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.265 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.298 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.299 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.499/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.298 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 13.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.398/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.301 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 13.301 - unknown transport parameter 0xff04de1b, size 2 13.301 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 13.303 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.400/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.303 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.303 Starting downloading https://server4:443/eozkeorgfu at 43:51.675 on ClientConnection[4e9dabd09a6eef89/1668170dfdfea130(V1) with server4/193.167.100.100:443] 13.303 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.400/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.303 Discarding pn space Initial because first Handshake message is being sent 13.303 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 13.304 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.304 -> Packet A|0|S0|72a4fa16e34f32fffe|48|1 StreamFrame[0(CIB),0,17,fin] 13.400 loss detection timeout handler running Sending probe 0, because no ack since 13.303. Current RTT: 33/16. 13.400 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.400 (Probe is a handshake retransmit) 13.400 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.594/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.400 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 13.432 <- (2) Packet A|2|S0|1668170dfdfea130|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|72a47c383f01b2431e|f26c54018881bf645de94cf6854fe8c1] Padding(1156) 13.432 probe count not reset on ack because handshake not yet confirmed 13.432 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.627/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.433 State is set to Confirmed reschedule loss detection timer for PTO over 345 millis, based on 13.778/Handshake, because ackElicitingInFlight | RTT:45/36 13.433 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.433 Discarding pn space Handshake because HandshakeDone is received 13.433 <- (3) Packet A|3|S0|1668170dfdfea130|1220|2 PingFrame[] Padding(1190) 13.433 -> Packet A|1|S0|72a4fa16e34f32fffe|32|1 AckFrame[3-2|Δ0] 13.433 <- (4) Packet A|4|S0|1668170dfdfea130|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 13.434 <- (5) Packet A|5|S0|1668170dfdfea130|1057|1 StreamFrame[0(CIB),0,1024,fin] 13.434 -> Packet A|2|S0|72a4fa16e34f32fffe|32|1 AckFrame[5-2|Δ0] 13.435 Finished downloading https://server4:443/eozkeorgfu at 43:51.806 on ClientConnection[4e9dabd09a6eef89/1668170dfdfea130(V1) with server4/193.167.100.100:443] 13.435 Closing ClientConnection[4e9dabd09a6eef89/1668170dfdfea130(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.435 -> Packet A|3|S0|72a4fa16e34f32fffe|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 13.435 Creating connection with server4:443 with v1 13.436 Setting up connection for downloading https://server4:443/ekvulbhhtv at 43:51.807 on ClientConnection[a38949f048014588/9b2aa7fc09f683f2(V1) with server4/193.167.100.100:443] 13.436 Original destination connection id: a38949f048014588 (scid: 9b2aa7fc09f683f2) >- CryptoStream[I|ClientHello] 13.437 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.637/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.437 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.465 <- (6) Packet A|6|S0|1668170dfdfea130|1252|2 PingFrame[] Padding(1222) 13.465 -> Packet A|4|S0|72a4fa16e34f32fffe|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 13.636 loss detection timeout handler running Sending probe 0, because no ack since 13.437. Current RTT: 100/25. 13.636 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.636 (Probe is an initial retransmit) 13.637 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.037/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.636 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.670 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 13.670 probe count not reset on ack because handshake not yet confirmed 13.671 Retransmitting CryptoFrame[0,257] on level Initial 13.671 Cwnd(-): 6000; inflight: 0 13.671 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.071/Initial, because peerAwaitingAddressValidation | RTT:100/25 13.671 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 13.865/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.671 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 13.670 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 13.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.867/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.673 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 13.673 - unknown transport parameter 0xff04de1b, size 2 13.673 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 13.675 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.869/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.675 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.675 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.772/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.675 Discarding pn space Initial because first Handshake message is being sent 13.675 Starting downloading https://server4:443/ekvulbhhtv at 43:52.047 on ClientConnection[a38949f048014588/9b2aa7fc09f683f2(V1) with server4/193.167.100.100:443] 13.675 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 13.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.676 -> Packet A|0|S0|6957f0c74a60a2f797|48|1 StreamFrame[0(CIB),0,17,fin] 13.708 <- (2) Packet A|3|S0|9b2aa7fc09f683f2|1220|2 PingFrame[] Padding(1190) 13.708 <- (3) Packet A|4|S0|9b2aa7fc09f683f2|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 13.708 -> Packet A|1|S0|6957f0c74a60a2f797|32|1 AckFrame[4-3|Δ0] 13.709 <- (4) Packet A|5|S0|9b2aa7fc09f683f2|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 13.709 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.806/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.710 Finished downloading https://server4:443/ekvulbhhtv at 43:52.081 on ClientConnection[a38949f048014588/9b2aa7fc09f683f2(V1) with server4/193.167.100.100:443] 13.710 Closing ClientConnection[a38949f048014588/9b2aa7fc09f683f2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.710 -> Packet A|2|S0|6957f0c74a60a2f797|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 13.710 Creating connection with server4:443 with v1 13.711 Setting up connection for downloading https://server4:443/bpwsbhibpy at 43:52.082 on ClientConnection[bfc50f2d75341033/2fd87793407614da(V1) with server4/193.167.100.100:443] 13.711 Original destination connection id: bfc50f2d75341033 (scid: 2fd87793407614da) >- CryptoStream[I|ClientHello] 13.712 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.912/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.712 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.740 <- (5) Packet A|6|S0|9b2aa7fc09f683f2|1252|2 PingFrame[] Padding(1222) 13.740 -> Packet A|3|S0|6957f0c74a60a2f797|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 13.745 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.745 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.945/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.745 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 13.747 <- (6) Packet A|7|S0|9b2aa7fc09f683f2|1220|4 AckFrame[1-0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|6957d3ba5115f0de96|6b3d8998b2dd8181268707eb69aad2c5] Padding(1156) 13.748 - unknown transport parameter 0xff04de1b, size 2 13.748 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 13.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.845/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.748 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 13.748 -> Packet A|4|S0|6957f0c74a60a2f797|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] >- CryptoStream[H|Finished] 13.750 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.847/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.750 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.750 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.750 Starting downloading https://server4:443/bpwsbhibpy at 43:52.121 on ClientConnection[bfc50f2d75341033/2fd87793407614da(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 13.847/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.750 Discarding pn space Initial because first Handshake message is being sent 13.750 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 13.751 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.751 -> Packet A|0|S0|f168a09298fb1e5c4b|48|1 StreamFrame[0(CIB),0,17,fin] 13.771 <- (7) Packet A|8|S0|9b2aa7fc09f683f2|40|2 AckFrame[3,1|Δ0] ConnectionCloseFrame[0|0|] 13.782 <- (2) Packet A|3|S0|2fd87793407614da|1220|2 PingFrame[] Padding(1190) 13.783 <- (3) Packet A|4|S0|2fd87793407614da|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 13.783 -> Packet A|1|S0|f168a09298fb1e5c4b|32|1 AckFrame[4-3|Δ0] 13.784 <- (4) Packet A|5|S0|2fd87793407614da|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 13.784 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.881/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.784 Finished downloading https://server4:443/bpwsbhibpy at 43:52.155 on ClientConnection[bfc50f2d75341033/2fd87793407614da(V1) with server4/193.167.100.100:443] 13.784 Closing ClientConnection[bfc50f2d75341033/2fd87793407614da(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.784 -> Packet A|2|S0|f168a09298fb1e5c4b|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 13.785 Creating connection with server4:443 with v1 13.785 Setting up connection for downloading https://server4:443/morxiaswgt at 43:52.156 on ClientConnection[211332eda6585b24/3e819815dae36f8c(V1) with server4/193.167.100.100:443] 13.785 Original destination connection id: 211332eda6585b24 (scid: 3e819815dae36f8c) >- CryptoStream[I|ClientHello] 13.786 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.986/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.786 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.819 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.820 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.020/Initial, because peerAwaitingAddressValidation | RTT:100/25 13.821 <- (5) Packet A|7|S0|2fd87793407614da|1220|4 AckFrame[1-0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f1683142c108d75c7a|611e771010a4d39c99d56643865ecc6e] Padding(1156) 13.821 -> Packet A|3|S0|f168a09298fb1e5c4b|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] -< CryptoStream[I|ServerHello] 13.819 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 13.822 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.919/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.822 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 13.822 - unknown transport parameter 0xff04de1b, size 2 13.822 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 13.824 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.921/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.824 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.825 Starting downloading https://server4:443/morxiaswgt at 43:52.196 on ClientConnection[211332eda6585b24/3e819815dae36f8c(V1) with server4/193.167.100.100:443] 13.825 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.922/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.825 Discarding pn space Initial because first Handshake message is being sent 13.825 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 13.825 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.922/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.825 -> Packet A|0|S0|db225e8f8f7db029bd|48|1 StreamFrame[0(CIB),0,17,fin] 13.856 <- (2) Packet A|2|S0|3e819815dae36f8c|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|db22267f1cab662be6|676df8903a38c623f0186e26af8afcb5] Padding(1161) 13.856 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 13.921/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 13.948/App, because ackElicitingInFlight | RTT:33/16 13.856 Discarding pn space Handshake because HandshakeDone is received 13.857 <- (3) Packet A|4|S0|3e819815dae36f8c|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 13.857 -> Packet A|1|S0|db225e8f8f7db029bd|35|1 AckFrame[4,2|Δ1] 13.947 loss detection timeout handler running Sending probe 0, because no ack since 13.825. Current RTT: 33/16. 13.947 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 14.194/App, because ackElicitingInFlight | RTT:33/16 13.948 -> Packet PA|2|S0|db225e8f8f7db029bd|48|1 StreamFrame[0(CIB),0,17,fin] 13.973 <- (4) Packet A|6|S0|3e819815dae36f8c|1220|4 AckFrame[1-0|Δ2] PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(156) reschedule loss detection timer for PTO over 97 millis, based on 14.071/App, because ackElicitingInFlight | RTT:33/16 13.974 Finished downloading https://server4:443/morxiaswgt at 43:52.345 on ClientConnection[211332eda6585b24/3e819815dae36f8c(V1) with server4/193.167.100.100:443] 13.974 Closing ClientConnection[211332eda6585b24/3e819815dae36f8c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.974 -> Packet A|3|S0|db225e8f8f7db029bd|36|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 13.974 Creating connection with server4:443 with v1 13.975 Setting up connection for downloading https://server4:443/gyyhaixrtf at 43:52.346 on ClientConnection[c4a91864022130fb/67aa7d64db5b4300(V1) with server4/193.167.100.100:443] 13.975 Original destination connection id: c4a91864022130fb (scid: 67aa7d64db5b4300) >- CryptoStream[I|ClientHello] 13.976 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.176/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.976 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.003 <- (5) Packet A|7|S0|3e819815dae36f8c|35|1 AckFrame[2-0|Δ0] 14.004 -> Packet A|4|S0|db225e8f8f7db029bd|36|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 14.005 <- (6) Packet A|8|S0|3e819815dae36f8c|38|2 AckFrame[3-2|Δ0] ConnectionCloseFrame[0|0|] 14.009 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.009 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.209/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.009 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 14.012 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.109/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.012 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 14.012 - unknown transport parameter 0xff04de1b, size 2 14.012 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 14.014 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.111/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.014 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.014 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.111/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.014 Discarding pn space Initial because first Handshake message is being sent 14.014 Starting downloading https://server4:443/gyyhaixrtf at 43:52.385 on ClientConnection[c4a91864022130fb/67aa7d64db5b4300(V1) with server4/193.167.100.100:443] 14.014 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 14.015 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.112/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.014 -> Packet A|0|S0|633a9251e0463edee3|48|1 StreamFrame[0(CIB),0,17,fin] 14.045 <- (2) Packet A|2|S0|67aa7d64db5b4300|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|633a3792defee4ef9a|0b327fa608b836f7a801650b041b2426] NewConnectionIdFrame[2,<1|aa76f121419d5e84e9|4b1ac8366236ebeaeae349deb9906431] NewConnectionIdFrame[3,<2|aa76d51a9cb5e7866a|fdd426aadc7c835ec4374b98ab7009bb] Padding(1103) 14.046 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 14.111/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 14.137/App, because ackElicitingInFlight | RTT:33/16 14.046 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 122 millis, based on 14.169/App, because ackElicitingInFlight | RTT:33/16 14.046 -> Packet A|1|S0|aa76f121419d5e84e9|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] 14.046 <- (3) Packet A|3|S0|67aa7d64db5b4300|1220|2 PingFrame[] Padding(1190) 14.066 -> Packet A|2|S0|aa76f121419d5e84e9|33|1 AckFrame[3-2|Δ19] 14.097 <- (4) Packet A|5|S0|67aa7d64db5b4300|1252|2 PingFrame[] Padding(1222) 14.102 <- (5) Packet A|6|S0|67aa7d64db5b4300|34|1 AckFrame[2-1|Δ0] 14.103 Cwnd(-): 6000; inflight: 0 14.103 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.103 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 122 millis, based on 14.226/App, because ackElicitingInFlight | RTT:33/16 14.103 -> Packet A|3|S0|aa76f121419d5e84e9|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ5] 14.134 <- (6) Packet A|7|S0|67aa7d64db5b4300|343|2 AckFrame[3-1|Δ0] CryptoFrame[0,305] 14.134 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) -< CryptoStream[A|NewSessionTicket] 14.135 <- (7) Packet A|8|S0|67aa7d64db5b4300|1332|2 PingFrame[] Padding(1302) 14.135 -> Packet A|4|S0|aa76f121419d5e84e9|32|1 AckFrame[8-6|Δ0] 14.501 <- (8) Packet A|12|S0|67aa7d64db5b4300|1252|2 CryptoFrame[0,305] StreamFrame[0(CIB),0,910] -< CryptoStream[A|NewSessionTicket] 14.501 <- (9) Packet A|13|S0|67aa7d64db5b4300|149|1 StreamFrame[0(CIB),910,114,fin] 14.502 -> Packet A|5|S0|aa76f121419d5e84e9|34|1 AckFrame[13-12,8-6|Δ0] 14.502 Finished downloading https://server4:443/gyyhaixrtf at 43:52.873 on ClientConnection[c4a91864022130fb/67aa7d64db5b4300(V1) with server4/193.167.100.100:443] 14.502 Closing ClientConnection[c4a91864022130fb/67aa7d64db5b4300(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.502 -> Packet A|6|S0|aa76f121419d5e84e9|38|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,8-6|Δ0] 14.503 Creating connection with server4:443 with v1 14.503 Setting up connection for downloading https://server4:443/nfoahslwup at 43:52.874 on ClientConnection[5eb9867cc6698b40/8bfc0bbcf4ea583f(V1) with server4/193.167.100.100:443] 14.503 Original destination connection id: 5eb9867cc6698b40 (scid: 8bfc0bbcf4ea583f) >- CryptoStream[I|ClientHello] 14.504 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.704/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.504 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.703 loss detection timeout handler running Sending probe 0, because no ack since 14.504. Current RTT: 100/25. 14.704 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.704 (Probe is an initial retransmit) 14.704 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.104/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.704 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.103 loss detection timeout handler running Sending probe 1, because no ack since 14.704. Current RTT: 100/25. 15.103 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.103 (Probe is an initial retransmit) 15.103 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.904/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.103 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.104 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.905/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.104 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.137 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 15.137 probe count not reset on ack because handshake not yet confirmed 15.137 Retransmitting CryptoFrame[0,257] on level Initial 15.137 Cwnd(-): 6000; inflight: 1200 15.137 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.937/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.137 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 15.525/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.137 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 15.137 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 15.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 15.528/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.140 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 15.140 - unknown transport parameter 0xff04de1b, size 2 15.140 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 15.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 15.531/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.143 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.240/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.143 Discarding pn space Initial because first Handshake message is being sent 15.143 Starting downloading https://server4:443/nfoahslwup at 43:53.514 on ClientConnection[5eb9867cc6698b40/8bfc0bbcf4ea583f(V1) with server4/193.167.100.100:443] 15.143 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 15.144 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.241/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.144 -> Packet A|0|S0|f3004c92ae4f19c3c9|48|1 StreamFrame[0(CIB),0,17,fin] 15.162 Discarding packet (1220 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.240 loss detection timeout handler running Sending probe 0, because no ack since 15.143. Current RTT: 33/16. 15.240 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.240 (Probe is a handshake retransmit) 15.240 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.434/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.240 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 15.268 <- (3) Packet H|4|L|1220|3 CryptoFrame[0,742] PingFrame[] Padding(427) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.269 -> Packet H|3|L|49|1 AckFrame[4,1|Δ0] 15.433 loss detection timeout handler running Sending probe 1, because no ack since 15.144. Current RTT: 33/16. 15.433 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.433 (Probe is a handshake retransmit) 15.434 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 15.822/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.434 -> Packet PH|4|L|81|1 CryptoFrame[0,36] 15.435 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 15.823/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.435 -> Packet PH|5|L|81|1 CryptoFrame[0,36] 15.466 <- (4) Packet A|5|S0|8bfc0bbcf4ea583f|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f30035d889e5f1f441|58f1299a330f48852f911543fe0d4366] Padding(1156) 15.466 probe count not reset on ack because handshake not yet confirmed 15.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 15.854/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.466 State is set to Confirmed reschedule loss detection timer for PTO over 1588 millis, based on 17.055/Handshake, because ackElicitingInFlight | RTT:69/84 15.466 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.466 Discarding pn space Handshake because HandshakeDone is received 15.467 <- (5) Packet A|7|S0|8bfc0bbcf4ea583f|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 15.467 -> Packet A|1|S0|f3004c92ae4f19c3c9|34|1 AckFrame[7,5|Δ0] 15.468 <- (6) Packet A|8|S0|8bfc0bbcf4ea583f|1057|1 StreamFrame[0(CIB),0,1024,fin] 15.468 Finished downloading https://server4:443/nfoahslwup at 43:53.839 on ClientConnection[5eb9867cc6698b40/8bfc0bbcf4ea583f(V1) with server4/193.167.100.100:443] 15.468 Closing ClientConnection[5eb9867cc6698b40/8bfc0bbcf4ea583f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.469 -> Packet A|2|S0|f3004c92ae4f19c3c9|38|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5|Δ0] 15.469 Creating connection with server4:443 with v1 15.470 Setting up connection for downloading https://server4:443/kwsoqmbpif at 43:53.841 on ClientConnection[c03e3ec9f4a91150/b893b43ad611938d(V1) with server4/193.167.100.100:443] 15.470 Original destination connection id: c03e3ec9f4a91150 (scid: b893b43ad611938d) >- CryptoStream[I|ClientHello] 15.471 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.671/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.471 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.499 <- (7) Packet A|9|S0|8bfc0bbcf4ea583f|38|2 AckFrame[2-1|Δ0] ConnectionCloseFrame[0|0|] 15.504 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.705/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.504 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 15.507 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.604/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.507 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 15.507 - unknown transport parameter 0xff04de1b, size 2 15.507 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 15.509 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.606/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.509 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.607/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.510 Discarding pn space Initial because first Handshake message is being sent 15.510 Starting downloading https://server4:443/kwsoqmbpif at 43:53.881 on ClientConnection[c03e3ec9f4a91150/b893b43ad611938d(V1) with server4/193.167.100.100:443] 15.510 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 15.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.607/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.510 -> Packet A|0|S0|f88b31f75e4fd5150f|48|1 StreamFrame[0(CIB),0,17,fin] 15.541 <- (2) Packet A|2|S0|b893b43ad611938d|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f88b27e6c8c5ceba14|a995cc61211c86964b3d5acbdd7ac47a] Padding(1161) 15.541 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 15.606/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 15.633/App, because ackElicitingInFlight | RTT:33/16 15.541 Discarding pn space Handshake because HandshakeDone is received 15.542 <- (3) Packet A|3|S0|b893b43ad611938d|1220|2 PingFrame[] Padding(1190) 15.542 -> Packet A|1|S0|f88b31f75e4fd5150f|32|1 AckFrame[3-2|Δ0] 15.574 <- (4) Packet A|6|S0|b893b43ad611938d|1252|2 PingFrame[] Padding(1222) 15.593 -> Packet A|2|S0|f88b31f75e4fd5150f|35|1 AckFrame[6,3-2|Δ19] 15.632 loss detection timeout handler running Sending probe 0, because no ack since 15.510. Current RTT: 33/16. 15.632 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 15.878/App, because ackElicitingInFlight | RTT:33/16 15.632 -> Packet PA|3|S0|f88b31f75e4fd5150f|48|1 StreamFrame[0(CIB),0,17,fin] 15.688 <- (5) Packet A|9|S0|b893b43ad611938d|35|1 AckFrame[3-0|Δ0] 15.689 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.755 <- (6) Packet A|10|S0|b893b43ad611938d|1252|2 CryptoFrame[0,305] StreamFrame[0(CIB),0,910] -< CryptoStream[A|NewSessionTicket] 15.775 -> Packet A|4|S0|f88b31f75e4fd5150f|33|1 AckFrame[10-9|Δ19] 15.806 <- (7) Packet A|12|S0|b893b43ad611938d|154|2 AckFrame[4|Δ0] StreamFrame[0(CIB),910,114,fin] 15.806 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.806 Finished downloading https://server4:443/kwsoqmbpif at 43:54.178 on ClientConnection[c03e3ec9f4a91150/b893b43ad611938d(V1) with server4/193.167.100.100:443] 15.807 Closing ClientConnection[c03e3ec9f4a91150/b893b43ad611938d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.807 Creating connection with server4:443 with v1 15.807 -> Packet A|5|S0|f88b31f75e4fd5150f|36|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 15.808 Setting up connection for downloading https://server4:443/vrivnbdfuw at 43:54.179 on ClientConnection[9a37eaeb621d704f/773545527ae151a8(V1) with server4/193.167.100.100:443] 15.808 Original destination connection id: 9a37eaeb621d704f (scid: 773545527ae151a8) >- CryptoStream[I|ClientHello] 15.809 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.009/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.809 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.838 <- (8) Packet A|13|S0|b893b43ad611938d|38|2 AckFrame[5|Δ0] ConnectionCloseFrame[0|0|] 15.842 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.843 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.043/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.842 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 15.845 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.942/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.845 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 15.845 - unknown transport parameter 0xff04de1b, size 2 15.845 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 15.848 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.945/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.847 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.848 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.945/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.848 Discarding pn space Initial because first Handshake message is being sent 15.848 Starting downloading https://server4:443/vrivnbdfuw at 43:54.219 on ClientConnection[9a37eaeb621d704f/773545527ae151a8(V1) with server4/193.167.100.100:443] 15.849 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.946/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.848 -> [Packet H|1|L|47|1 AckFrame[1|Δ0], Packet A|0|S0|62f63649dc61e1094a|48|1 StreamFrame[0(CIB),0,17,fin]] 15.945 loss detection timeout handler running Sending probe 0, because no ack since 15.847. Current RTT: 33/16. 15.945 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.945 (Probe is a handshake retransmit) 15.945 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 16.139/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.945 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 16.138 loss detection timeout handler running Sending probe 1, because no ack since 15.848. Current RTT: 33/16. 16.138 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.138 (Probe is a handshake retransmit) 16.138 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.526/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.138 -> Packet PH|3|L|81|1 CryptoFrame[0,36] 16.139 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.527/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.139 -> Packet PH|4|L|81|1 CryptoFrame[0,36] 16.170 <- (2) Packet A|2|S0|773545527ae151a8|1220|6 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|62f66ae4f9a02078e8|92108145ef14ba3b2a02a625d7df4b44] NewConnectionIdFrame[2,<1|bb6f802af164e902f6|b2e5fbc533a88bfae2ae1be87f344f13] NewConnectionIdFrame[3,<2|bb6f36b107b4ee03fc|9d4fbb8d0ad131dab081749b548d0956] Padding(1098) 16.171 probe count not reset on ack because handshake not yet confirmed 16.171 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.171 State is set to Confirmed reschedule loss detection timer for PTO over 1588 millis, based on 17.759/Handshake, because ackElicitingInFlight | RTT:69/84 16.171 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.171 Discarding pn space Handshake because HandshakeDone is received 16.171 <- (3) Packet A|3|S0|773545527ae151a8|1220|2 PingFrame[] Padding(1190) reschedule loss detection timer for PTO over 430 millis, based on 16.603/App, because ackElicitingInFlight | RTT:69/84 16.171 <- (4) Packet A|4|S0|773545527ae151a8|338|1 CryptoFrame[0,305] 16.172 -> Packet A|1|S0|bb6f802af164e902f6|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] -< CryptoStream[A|NewSessionTicket] 16.172 -> Packet A|2|S0|bb6f802af164e902f6|32|1 AckFrame[4-2|Δ0] 16.172 <- (5) Packet A|5|S0|773545527ae151a8|1057|1 StreamFrame[0(CIB),0,1024,fin] 16.173 Finished downloading https://server4:443/vrivnbdfuw at 43:54.544 on ClientConnection[9a37eaeb621d704f/773545527ae151a8(V1) with server4/193.167.100.100:443] 16.173 Closing ClientConnection[9a37eaeb621d704f/773545527ae151a8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.173 -> Packet A|3|S0|bb6f802af164e902f6|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 16.173 Creating connection with server4:443 with v1 16.174 Setting up connection for downloading https://server4:443/jiqfdmaznn at 43:54.545 on ClientConnection[2f4dfe27685fb644/b2dc1453c2eb27f8(V1) with server4/193.167.100.100:443] 16.174 Original destination connection id: 2f4dfe27685fb644 (scid: b2dc1453c2eb27f8) >- CryptoStream[I|ClientHello] 16.175 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.375/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.175 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.208 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.209 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.409/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.208 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 16.212 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.309/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.212 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 16.212 - unknown transport parameter 0xff04de1b, size 2 16.212 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 16.214 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.311/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.214 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.215 Starting downloading https://server4:443/jiqfdmaznn at 43:54.586 on ClientConnection[2f4dfe27685fb644/b2dc1453c2eb27f8(V1) with server4/193.167.100.100:443] 16.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.312/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.215 Discarding pn space Initial because first Handshake message is being sent 16.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.312/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.215 -> [Packet H|1|L|47|1 AckFrame[1|Δ0], Packet A|0|S0|a94e5070ae9a645cf9|48|1 StreamFrame[0(CIB),0,17,fin]] 16.228 <- (6) Packet A|7|S0|773545527ae151a8|35|1 AckFrame[2-1|Δ0] 16.228 -> Packet A|4|S0|bb6f802af164e902f6|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 16.246 <- (2) Packet A|2|S0|b2dc1453c2eb27f8|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a94e1ef4e09effbc42|b72d29384b37f57d3a1cf7972cfc172f] Padding(1161) 16.246 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 16.311/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 16.338/App, because ackElicitingInFlight | RTT:33/16 16.246 Discarding pn space Handshake because HandshakeDone is received 16.247 <- (3) Packet A|3|S0|b2dc1453c2eb27f8|1220|2 PingFrame[] Padding(1190) 16.247 -> Packet A|1|S0|a94e5070ae9a645cf9|32|1 AckFrame[3-2|Δ0] 16.248 <- (4) Packet A|5|S0|b2dc1453c2eb27f8|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 16.248 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.249 Finished downloading https://server4:443/jiqfdmaznn at 43:54.620 on ClientConnection[2f4dfe27685fb644/b2dc1453c2eb27f8(V1) with server4/193.167.100.100:443] 16.249 Closing ClientConnection[2f4dfe27685fb644/b2dc1453c2eb27f8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.249 -> Packet A|2|S0|a94e5070ae9a645cf9|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 16.249 Creating connection with server4:443 with v1 16.250 Setting up connection for downloading https://server4:443/shnawafijk at 43:54.621 on ClientConnection[524d0ecd1034040f/75ed6dbe60eb9b46(V1) with server4/193.167.100.100:443] 16.250 Original destination connection id: 524d0ecd1034040f (scid: 75ed6dbe60eb9b46) >- CryptoStream[I|ClientHello] 16.251 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.451/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.251 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.279 <- (5) Packet A|6|S0|b2dc1453c2eb27f8|1252|2 PingFrame[] Padding(1222) 16.279 -> Packet A|3|S0|a94e5070ae9a645cf9|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 16.284 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.285 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.485/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.284 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 16.287 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.384/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.287 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 16.287 - unknown transport parameter 0xff04de1b, size 2 16.287 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 16.289 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.386/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.289 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.289 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.289 Starting downloading https://server4:443/shnawafijk at 43:54.660 on ClientConnection[524d0ecd1034040f/75ed6dbe60eb9b46(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 16.386/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.289 Discarding pn space Initial because first Handshake message is being sent 16.289 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 16.290 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.387/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.290 -> Packet A|0|S0|2ba323d00f714d86f9|48|1 StreamFrame[0(CIB),0,17,fin] 16.320 <- (2) Packet A|2|S0|75ed6dbe60eb9b46|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2ba3776f6e28c058c4|e3a46e88f2e1f14e6670f22f973726dc] NewConnectionIdFrame[2,<1|d994cb42c74a7c983e|546c11a8e3b37247261b2c649b3d9f00] NewConnectionIdFrame[3,<2|d9949a5265d2f24c55|9b48950801a64eeef1069b497da3a76c] Padding(1103) 16.321 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 16.386/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 16.413/App, because ackElicitingInFlight | RTT:33/16 16.321 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 122 millis, based on 16.444/App, because ackElicitingInFlight | RTT:33/16 16.321 -> Packet A|1|S0|d994cb42c74a7c983e|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] 16.321 <- (3) Packet A|3|S0|75ed6dbe60eb9b46|1220|2 PingFrame[] Padding(1190) 16.323 <- (4) Packet A|5|S0|75ed6dbe60eb9b46|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 121 millis, based on 16.444/App, because ackElicitingInFlight | RTT:33/16 16.323 -> Packet A|2|S0|d994cb42c74a7c983e|35|1 AckFrame[5,3-2|Δ1] 16.323 Finished downloading https://server4:443/shnawafijk at 43:54.694 on ClientConnection[524d0ecd1034040f/75ed6dbe60eb9b46(V1) with server4/193.167.100.100:443] 16.323 Closing ClientConnection[524d0ecd1034040f/75ed6dbe60eb9b46(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.324 Creating connection with server4:443 with v1 16.324 -> Packet A|3|S0|d994cb42c74a7c983e|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 16.324 Setting up connection for downloading https://server4:443/gqjrspjnmi at 43:54.696 on ClientConnection[8181dc9c5cd64d83/6c0510d57385d47d(V1) with server4/193.167.100.100:443] 16.324 Original destination connection id: 8181dc9c5cd64d83 (scid: 6c0510d57385d47d) >- CryptoStream[I|ClientHello] 16.325 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.525/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.325 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.355 <- (5) Packet A|7|S0|75ed6dbe60eb9b46|1252|2 PingFrame[] Padding(1222) 16.355 -> Packet A|4|S0|d994cb42c74a7c983e|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 16.359 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.359 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.559/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.359 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 16.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.458/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.361 - unknown transport parameter 0xff04de1b, size 2 16.361 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 16.361 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 16.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.460/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.363 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.364 Starting downloading https://server4:443/gqjrspjnmi at 43:54.735 on ClientConnection[8181dc9c5cd64d83/6c0510d57385d47d(V1) with server4/193.167.100.100:443] 16.364 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.461/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.364 Discarding pn space Initial because first Handshake message is being sent 16.364 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 16.364 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.461/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.364 -> Packet A|0|S0|61cba27b2d2140d8d2|48|1 StreamFrame[0(CIB),0,17,fin] 16.396 <- (2) Packet A|3|S0|6c0510d57385d47d|1220|2 PingFrame[] Padding(1190) 16.396 <- (3) Packet A|4|S0|6c0510d57385d47d|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 16.397 -> Packet A|1|S0|61cba27b2d2140d8d2|32|1 AckFrame[4-3|Δ0] 16.397 <- (4) Packet A|5|S0|6c0510d57385d47d|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 16.397 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.398 Finished downloading https://server4:443/gqjrspjnmi at 43:54.769 on ClientConnection[8181dc9c5cd64d83/6c0510d57385d47d(V1) with server4/193.167.100.100:443] 16.398 Closing ClientConnection[8181dc9c5cd64d83/6c0510d57385d47d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.398 -> Packet A|2|S0|61cba27b2d2140d8d2|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 16.398 Creating connection with server4:443 with v1 16.399 Setting up connection for downloading https://server4:443/zaizlyqvwz at 43:54.770 on ClientConnection[5c29d3a297350958/13ad963731872aad(V1) with server4/193.167.100.100:443] 16.399 Original destination connection id: 5c29d3a297350958 (scid: 13ad963731872aad) >- CryptoStream[I|ClientHello] 16.400 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.600/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.400 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.433 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.433 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.633/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.433 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 16.436 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.533/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.436 - unknown transport parameter 0xff04de1b, size 2 16.436 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 16.436 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 16.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.535/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.438 -> Packet H|0|L|81|1 CryptoFrame[0,36] 16.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.438 Starting downloading https://server4:443/zaizlyqvwz at 43:54.809 on ClientConnection[5c29d3a297350958/13ad963731872aad(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 16.535/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.438 Discarding pn space Initial because first Handshake message is being sent 16.438 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 16.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.535/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.438 -> Packet A|0|S0|fbd926a5663b91f84b|48|1 StreamFrame[0(CIB),0,17,fin] 16.469 <- (2) Packet A|2|S0|13ad963731872aad|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|fbd9f65fb8f28b818d|18f6410681a4fb6513fe35cd44c011e3] Padding(1161) 16.470 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 16.535/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 16.561/App, because ackElicitingInFlight | RTT:33/16 16.470 Discarding pn space Handshake because HandshakeDone is received 16.471 <- (3) Packet A|4|S0|13ad963731872aad|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 16.471 -> Packet A|1|S0|fbd926a5663b91f84b|35|1 AckFrame[4,2|Δ1] 16.471 <- (4) Packet A|5|S0|13ad963731872aad|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 16.472 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.472 Finished downloading https://server4:443/zaizlyqvwz at 43:54.843 on ClientConnection[5c29d3a297350958/13ad963731872aad(V1) with server4/193.167.100.100:443] 16.472 Closing ClientConnection[5c29d3a297350958/13ad963731872aad(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.472 -> Packet A|2|S0|fbd926a5663b91f84b|38|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 16.472 Creating connection with server4:443 with v1 16.473 Setting up connection for downloading https://server4:443/xmsukpkmpx at 43:54.844 on ClientConnection[fece66f987110141/df94a8670a0a43a0(V1) with server4/193.167.100.100:443] 16.473 Original destination connection id: fece66f987110141 (scid: df94a8670a0a43a0) >- CryptoStream[I|ClientHello] 16.474 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.674/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.474 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.507 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.507 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.708/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.507 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 16.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.607/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.510 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 16.510 - unknown transport parameter 0xff04de1b, size 2 16.510 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 16.512 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.609/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.512 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.512 Starting downloading https://server4:443/xmsukpkmpx at 43:54.883 on ClientConnection[fece66f987110141/df94a8670a0a43a0(V1) with server4/193.167.100.100:443] 16.512 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.609/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.512 Discarding pn space Initial because first Handshake message is being sent 16.512 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 16.512 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.610/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.512 -> Packet A|0|S0|2bb85efe2085eacc48|48|1 StreamFrame[0(CIB),0,17,fin] 16.544 <- (2) Packet A|2|S0|df94a8670a0a43a0|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2bb85dd23fc11f80cf|c705f0119cad3cc6dd5cc194d9a5f9ec] NewConnectionIdFrame[2,<1|d2aa184bfab0e51d1f|40e0306e1f0ba9ec474b20a2baee3d10] NewConnectionIdFrame[3,<2|d2aaeed27440968363|2d97261fb0b78e7f117e44050baced46] Padding(1103) 16.544 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 16.609/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 16.635/App, because ackElicitingInFlight | RTT:33/16 16.544 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 122 millis, based on 16.667/App, because ackElicitingInFlight | RTT:33/16 16.545 <- (3) Packet A|3|S0|df94a8670a0a43a0|1220|2 PingFrame[] Padding(1190) 16.544 -> Packet A|1|S0|d2aa184bfab0e51d1f|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] 16.545 <- (4) Packet A|4|S0|df94a8670a0a43a0|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 16.545 -> Packet A|2|S0|d2aa184bfab0e51d1f|32|1 AckFrame[4-2|Δ0] 16.546 <- (5) Packet A|5|S0|df94a8670a0a43a0|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 121 millis, based on 16.667/App, because ackElicitingInFlight | RTT:33/16 16.546 Finished downloading https://server4:443/xmsukpkmpx at 43:54.918 on ClientConnection[fece66f987110141/df94a8670a0a43a0(V1) with server4/193.167.100.100:443] 16.546 Closing ClientConnection[fece66f987110141/df94a8670a0a43a0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.547 -> Packet A|3|S0|d2aa184bfab0e51d1f|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 16.547 Creating connection with server4:443 with v1 16.548 Setting up connection for downloading https://server4:443/xhiomtehzj at 43:54.919 on ClientConnection[ee748342d72c0aa9/f3a1f74141fc3427(V1) with server4/193.167.100.100:443] 16.548 Original destination connection id: ee748342d72c0aa9 (scid: f3a1f74141fc3427) >- CryptoStream[I|ClientHello] 16.549 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.749/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.549 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.577 <- (6) Packet A|7|S0|df94a8670a0a43a0|38|2 AckFrame[3-2|Δ0] ConnectionCloseFrame[0|0|] 16.748 loss detection timeout handler running Sending probe 0, because no ack since 16.549. Current RTT: 100/25. 16.748 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.748 (Probe is an initial retransmit) 16.749 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.149/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.748 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.148 loss detection timeout handler running Sending probe 1, because no ack since 16.748. Current RTT: 100/25. 17.148 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.148 (Probe is an initial retransmit) 17.148 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.948/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.148 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.149 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.949/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.149 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.182 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 17.182 probe count not reset on ack because handshake not yet confirmed 17.182 Retransmitting CryptoFrame[0,257] on level Initial 17.182 Cwnd(-): 6000; inflight: 1200 17.182 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.982/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.182 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 17.570/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.182 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 17.182 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 17.184 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 17.572/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.184 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 17.185 - unknown transport parameter 0xff04de1b, size 2 17.185 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 17.186 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 17.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.186 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.187 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.284/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.187 Starting downloading https://server4:443/xhiomtehzj at 43:55.558 on ClientConnection[ee748342d72c0aa9/f3a1f74141fc3427(V1) with server4/193.167.100.100:443] 17.187 Discarding pn space Initial because first Handshake message is being sent 17.187 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 17.187 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.284/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.187 -> Packet A|0|S0|5871c91179d6a8d9a1|48|1 StreamFrame[0(CIB),0,17,fin] 17.215 Discarding packet (1220 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 17.283 loss detection timeout handler running Sending probe 0, because no ack since 17.186. Current RTT: 33/16. 17.283 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.283 (Probe is a handshake retransmit) 17.284 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.478/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.283 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 17.315 <- (3) Packet A|3|S0|f3a1f74141fc3427|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|58718155c8968b1a65|b6ac446ab5a93044a82ee8cf96955b0e] Padding(1156) 17.316 probe count not reset on ack because handshake not yet confirmed 17.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.510/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.316 State is set to Confirmed reschedule loss detection timer for PTO over 345 millis, based on 17.661/Handshake, because ackElicitingInFlight | RTT:45/36 17.316 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.316 Discarding pn space Handshake because HandshakeDone is received 17.316 <- (4) Packet A|4|S0|f3a1f74141fc3427|1252|2 PingFrame[] Padding(1222) 17.316 <- (5) Packet A|5|S0|f3a1f74141fc3427|338|1 CryptoFrame[0,305] 17.316 -> Packet A|1|S0|5871c91179d6a8d9a1|32|1 AckFrame[4-3|Δ0] -< CryptoStream[A|NewSessionTicket] 17.317 <- (6) Packet A|6|S0|f3a1f74141fc3427|1057|1 StreamFrame[0(CIB),0,1024,fin] 17.318 -> Packet A|2|S0|5871c91179d6a8d9a1|32|1 AckFrame[6-3|Δ0] 17.318 Finished downloading https://server4:443/xhiomtehzj at 43:55.689 on ClientConnection[ee748342d72c0aa9/f3a1f74141fc3427(V1) with server4/193.167.100.100:443] 17.318 Closing ClientConnection[ee748342d72c0aa9/f3a1f74141fc3427(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.318 -> Packet A|3|S0|5871c91179d6a8d9a1|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 17.319 Creating connection with server4:443 with v1 17.319 Setting up connection for downloading https://server4:443/juprdcfpok at 43:55.690 on ClientConnection[38e1354001f45f74/5cebb09fc6254a0d(V1) with server4/193.167.100.100:443] 17.319 Original destination connection id: 38e1354001f45f74 (scid: 5cebb09fc6254a0d) >- CryptoStream[I|ClientHello] 17.320 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.520/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.320 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.348 <- (7) Packet A|7|S0|f3a1f74141fc3427|37|2 AckFrame[2|Δ0] MaxStreamsFrame[B,101] 17.349 -> Packet A|4|S0|5871c91179d6a8d9a1|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 17.349 <- (8) Packet A|8|S0|f3a1f74141fc3427|1332|2 PingFrame[] Padding(1302) 17.350 -> Packet A|5|S0|5871c91179d6a8d9a1|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 17.354 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 17.354 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.554/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.354 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 17.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.453/Handshake, because peerAwaitingAddressValidation | RTT:33/16 17.356 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 17.356 - unknown transport parameter 0xff04de1b, size 2 17.356 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 17.358 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.455/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.358 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.358 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.455/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.358 Discarding pn space Initial because first Handshake message is being sent 17.358 Starting downloading https://server4:443/juprdcfpok at 43:55.730 on ClientConnection[38e1354001f45f74/5cebb09fc6254a0d(V1) with server4/193.167.100.100:443] 17.358 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 17.359 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.456/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.359 -> Packet A|0|S0|796a53dc4f18b60d18|48|1 StreamFrame[0(CIB),0,17,fin] 17.456 loss detection timeout handler running Sending probe 0, because no ack since 17.358. Current RTT: 33/16. 17.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.456 (Probe is a handshake retransmit) 17.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.650/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.456 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 17.484 <- (2) Packet H|2|L|1220|3 CryptoFrame[0,741] PingFrame[] Padding(428) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.485 -> Packet H|3|L|47|1 AckFrame[2-1|Δ0] 17.649 loss detection timeout handler running Sending probe 1, because no ack since 17.359. Current RTT: 33/16. 17.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.649 (Probe is a handshake retransmit) 17.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.037/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.649 -> Packet PH|4|L|81|1 CryptoFrame[0,36] 17.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.039/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.650 -> Packet PH|5|L|81|1 CryptoFrame[0,36] 17.681 <- (3) Packet A|3|S0|5cebb09fc6254a0d|1220|6 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|796ae2f2f952cc2fb7|020b0e1631250c15dc2cfa7754c17abc] NewConnectionIdFrame[2,<1|3a7ce35ffb4c8e28a9|46dbdbbd6a44d73b114dbe6ec03083a7] NewConnectionIdFrame[3,<2|3a7ca776f7ffafbe22|2e65808209ceb7914a3308206f7ecb3f] Padding(1098) 17.682 probe count not reset on ack because handshake not yet confirmed 17.682 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.070/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.682 State is set to Confirmed reschedule loss detection timer for PTO over 1588 millis, based on 19.270/Handshake, because ackElicitingInFlight | RTT:69/84 17.682 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.682 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 430 millis, based on 18.113/App, because ackElicitingInFlight | RTT:69/84 17.682 -> Packet A|1|S0|3a7ce35ffb4c8e28a9|36|3 RetireConnectionIdFrame[0] AckFrame[3|Δ0] RetireConnectionIdFrame[1] 17.682 <- (4) Packet A|4|S0|5cebb09fc6254a0d|1252|2 PingFrame[] Padding(1222) 17.682 <- (5) Packet A|5|S0|5cebb09fc6254a0d|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 17.683 -> Packet A|2|S0|3a7ce35ffb4c8e28a9|32|1 AckFrame[5-3|Δ0] 17.683 <- (6) Packet A|6|S0|5cebb09fc6254a0d|1057|1 StreamFrame[0(CIB),0,1024,fin] 17.684 Finished downloading https://server4:443/juprdcfpok at 43:56.055 on ClientConnection[38e1354001f45f74/5cebb09fc6254a0d(V1) with server4/193.167.100.100:443] 17.684 Closing ClientConnection[38e1354001f45f74/5cebb09fc6254a0d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.684 -> Packet A|3|S0|3a7ce35ffb4c8e28a9|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0]