0.000 Creating connection with server4:443 with v1 0.087 Setting up connection for downloading https://server4:443/yhwknvdoqu at 42:44.365 on ClientConnection[103adc9213acd601/8e1738d6fd81e11b(V1) with server4/193.167.100.100:443] 0.088 Original destination connection id: 103adc9213acd601 (scid: 8e1738d6fd81e11b) >- CryptoStream[I|ClientHello] 0.266 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.467/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.261 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.301 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.320 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.520/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.347 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 0.462/Handshake, because peerAwaitingAddressValidation | RTT:39/19 0.301 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 0.347 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 0.352 - unknown transport parameter 0xff04de1b, size 2 0.352 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 0.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 0.496/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 0.380 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.386 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 0.388 Starting downloading https://server4:443/yhwknvdoqu at 42:44.684 on ClientConnection[103adc9213acd601/8e1738d6fd81e11b(V1) with server4/193.167.100.100:443] 0.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 0.507/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 0.392 Discarding pn space Initial because first Handshake message is being sent 0.414 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 114 millis, based on 0.529/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 0.414 -> Packet A|0|S0|7bbd78151dd6356916|48|1 StreamFrame[0(CIB),0,17,fin] 0.453 Discarding packet (1220 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 0.529 loss detection timeout handler running Sending probe 0, because no ack since 0.380. Current RTT: 39/19. 0.530 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.531 (Probe is a handshake retransmit) 0.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 229 millis, based on 0.763/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 0.532 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 0.564 <- (3) Packet A|4|S0|8e1738d6fd81e11b|1220|6 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|7bbd059f7fe964fd0a|b5b7b691785891beb01665bca01f8941] NewConnectionIdFrame[2,<1|f9fd534670b759befc|c6f7ab02327aef1efc35eb1df056c845] NewConnectionIdFrame[3,<2|f9fdd97bf7118af679|cd968718803d3c89c37ad157c4636aee] Padding(1098) 0.571 probe count not reset on ack because handshake not yet confirmed 0.572 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 229 millis, based on 0.802/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:39/19 0.572 State is set to Confirmed reschedule loss detection timer for PTO over 402 millis, based on 0.974/Handshake, because ackElicitingInFlight | RTT:53/42 0.573 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 0.573 Discarding pn space Handshake because HandshakeDone is received 0.566 <- (4) Packet A|6|S0|8e1738d6fd81e11b|338|1 CryptoFrame[0,305] reschedule loss detection timer for PTO over 246 millis, based on 0.824/App, because ackElicitingInFlight | RTT:53/42 0.577 -> Packet A|1|S0|f9fd534670b759befc|36|3 RetireConnectionIdFrame[0] AckFrame[4|Δ0] RetireConnectionIdFrame[1] -< CryptoStream[A|NewSessionTicket] 0.567 <- (5) Packet A|7|S0|8e1738d6fd81e11b|1057|1 StreamFrame[0(CIB),0,1024,fin] 0.581 -> Packet A|2|S0|f9fd534670b759befc|35|1 AckFrame[7-6,4|Δ1] 0.582 Finished downloading https://server4:443/yhwknvdoqu at 42:44.878 on ClientConnection[103adc9213acd601/8e1738d6fd81e11b(V1) with server4/193.167.100.100:443] 0.584 Closing ClientConnection[103adc9213acd601/8e1738d6fd81e11b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.587 Creating connection with server4:443 with v1 0.588 Setting up connection for downloading https://server4:443/aeoiozelbq at 42:44.884 on ClientConnection[62a3906f4655d6b7/8860fc68460b2e63(V1) with server4/193.167.100.100:443] 0.588 Original destination connection id: 62a3906f4655d6b7 (scid: 8860fc68460b2e63) >- CryptoStream[I|ClientHello] 0.586 -> Packet A|3|S0|f9fd534670b759befc|38|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4|Δ0] 0.592 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.792/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.592 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.626 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.627 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.827/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.626 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 0.632 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.729/Handshake, because peerAwaitingAddressValidation | RTT:33/16 0.632 - unknown transport parameter 0xff04de1b, size 2 0.632 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 0.632 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.638 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.736/Handshake, because peerAwaitingAddressValidation | RTT:33/16 0.639 Discarding pn space Initial because first Handshake message is being sent 0.639 Starting downloading https://server4:443/aeoiozelbq at 42:44.935 on ClientConnection[62a3906f4655d6b7/8860fc68460b2e63(V1) with server4/193.167.100.100:443] 0.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.737/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.639 -> Packet H|0|L|81|1 CryptoFrame[0,36] 0.641 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.738/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.641 -> [Packet H|1|L|47|1 AckFrame[1|Δ0], Packet A|0|S0|732a7bd76f968343c2|48|1 StreamFrame[0(CIB),0,17,fin]] 0.671 <- (2) Packet A|2|S0|8860fc68460b2e63|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|732a9c4e7c79a71d29|97d34c6af84038e2e3838e9391a7fe67] NewConnectionIdFrame[2,<1|5a02fb55bcf68d9a58|05ec9d9756c6d989a2f8fdc74d9901b7] NewConnectionIdFrame[3,<2|5a02999c6f33993bbc|47f36c92834e6c264ac086deabcf58ef] Padding(1103) 0.673 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 0.736/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 0.764/App, because ackElicitingInFlight | RTT:33/16 0.674 Discarding pn space Handshake because HandshakeDone is received 0.672 <- (3) Packet A|3|S0|8860fc68460b2e63|1220|2 PingFrame[] Padding(1190) reschedule loss detection timer for PTO over 122 millis, based on 0.798/App, because ackElicitingInFlight | RTT:33/16 0.673 <- (4) Packet A|4|S0|8860fc68460b2e63|338|1 CryptoFrame[0,305] 0.675 -> Packet A|1|S0|5a02fb55bcf68d9a58|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] -< CryptoStream[A|NewSessionTicket] 0.676 -> Packet A|2|S0|5a02fb55bcf68d9a58|32|1 AckFrame[4-2|Δ0] 0.708 <- (5) Packet A|6|S0|8860fc68460b2e63|1252|2 PingFrame[] Padding(1222) 0.728 -> Packet A|3|S0|5a02fb55bcf68d9a58|35|1 AckFrame[6,4-2|Δ19] 0.732 <- (6) Packet A|7|S0|8860fc68460b2e63|35|1 AckFrame[2-0|Δ0] 0.733 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 0.787 <- (7) Packet A|8|S0|8860fc68460b2e63|1220|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(162) 0.788 Finished downloading https://server4:443/aeoiozelbq at 42:45.084 on ClientConnection[62a3906f4655d6b7/8860fc68460b2e63(V1) with server4/193.167.100.100:443] 0.788 Closing ClientConnection[62a3906f4655d6b7/8860fc68460b2e63(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.789 Creating connection with server4:443 with v1 0.789 -> Packet A|4|S0|5a02fb55bcf68d9a58|36|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ0] 0.790 Setting up connection for downloading https://server4:443/vnxushjdgk at 42:45.086 on ClientConnection[f1cc753db15ae1ae/b03f4e1b43e74c98(V1) with server4/193.167.100.100:443] 0.790 Original destination connection id: f1cc753db15ae1ae (scid: b03f4e1b43e74c98) >- CryptoStream[I|ClientHello] 0.793 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.993/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.793 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.866 <- (6) Packet A|8|S0|8e1738d6fd81e11b|1220|6 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|7bbd059f7fe964fd0a|b5b7b691785891beb01665bca01f8941] NewConnectionIdFrame[2,<1|f9fd534670b759befc|c6f7ab02327aef1efc35eb1df056c845] NewConnectionIdFrame[3,<2|f9fdd97bf7118af679|cd968718803d3c89c37ad157c4636aee] Padding(794) 0.868 -> Packet A|4|S0|f9fd534670b759befc|38|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4|Δ0] 0.992 loss detection timeout handler running Sending probe 0, because no ack since 0.793. Current RTT: 100/25. 0.992 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.993 (Probe is an initial retransmit) 0.994 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.394/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.993 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.016 <- (8) Packet A|9|S0|8860fc68460b2e63|1220|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(162) 1.017 -> Packet A|5|S0|5a02fb55bcf68d9a58|36|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ0] 1.177 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 1.177 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,740] Padding(256) 1.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.583/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.183 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 1.183 - unknown transport parameter 0xff04de1b, size 2 1.184 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 1.187 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.587/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.187 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.189 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.389/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.189 Discarding pn space Initial because first Handshake message is being sent 1.189 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 1.189 Starting downloading https://server4:443/vnxushjdgk at 42:45.485 on ClientConnection[f1cc753db15ae1ae/b03f4e1b43e74c98(V1) with server4/193.167.100.100:443] 1.190 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.390/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.190 -> Packet A|0|S0|e9c14da176b349a512|48|1 StreamFrame[0(CIB),0,17,fin] 1.220 <- (2) Packet A|6|S0|b03f4e1b43e74c98|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 1.240 -> Packet A|1|S0|e9c14da176b349a512|33|1 AckFrame[6|Δ19] 1.272 <- (3) Packet A|8|S0|b03f4e1b43e74c98|1220|4 AckFrame[1-0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e9c1d6b160b69137b6|4d7a2d12792351a1bf8c766b6be9514e] Padding(1156) 1.273 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.473/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.273 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 1.387/Handshake, because ackElicitingInFlight | RTT:100/25 1.273 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.273 Discarding pn space Handshake because HandshakeDone is received 1.293 -> Packet A|2|S0|e9c14da176b349a512|33|1 AckFrame[8|Δ19] 1.438 <- (4) Packet A|10|S0|b03f4e1b43e74c98|1220|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(162) 1.439 Finished downloading https://server4:443/vnxushjdgk at 42:45.735 on ClientConnection[f1cc753db15ae1ae/b03f4e1b43e74c98(V1) with server4/193.167.100.100:443] 1.439 Closing ClientConnection[f1cc753db15ae1ae/b03f4e1b43e74c98(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.440 -> Packet A|3|S0|e9c14da176b349a512|38|2 ConnectionCloseFrame[0|0|] AckFrame[10,8|Δ0] 1.440 Creating connection with server4:443 with v1 1.441 Setting up connection for downloading https://server4:443/diogthncws at 42:45.737 on ClientConnection[062cd0c4007827c5/6eb8c9e873bc9886(V1) with server4/193.167.100.100:443] 1.441 Original destination connection id: 062cd0c4007827c5 (scid: 6eb8c9e873bc9886) >- CryptoStream[I|ClientHello] 1.443 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.643/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.443 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.626 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 1.626 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,741] Padding(255) 1.630 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.630 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 1.631 - unknown transport parameter 0xff04de1b, size 2 1.631 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 1.634 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.834/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.634 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.635 Starting downloading https://server4:443/diogthncws at 42:45.931 on ClientConnection[062cd0c4007827c5/6eb8c9e873bc9886(V1) with server4/193.167.100.100:443] 1.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.835/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.635 Discarding pn space Initial because first Handshake message is being sent 1.635 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 1.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.836/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.636 -> Packet A|0|S0|60a30c1aa67987960f|48|1 StreamFrame[0(CIB),0,17,fin] 1.665 <- (2) Packet A|4|S0|6eb8c9e873bc9886|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|60a3a5790c30e49d06|a6683346e3f3bec7e13979099ff85a84] Padding(1161) 1.666 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 1.834/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 1.862/App, because ackElicitingInFlight | RTT:100/25 1.667 Discarding pn space Handshake because HandshakeDone is received 1.666 <- (3) Packet A|5|S0|6eb8c9e873bc9886|1220|2 PingFrame[] Padding(1190) 1.667 <- (4) Packet A|6|S0|6eb8c9e873bc9886|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 1.668 -> Packet A|1|S0|60a30c1aa67987960f|32|1 AckFrame[5-4|Δ0] 1.668 <- (5) Packet A|11|S0|b03f4e1b43e74c98|1220|2 PingFrame[] Padding(1190) 1.669 -> Packet A|4|S0|e9c14da176b349a512|38|2 ConnectionCloseFrame[0|0|] AckFrame[10,8|Δ0] 1.688 -> Packet A|2|S0|60a30c1aa67987960f|33|1 AckFrame[6-4|Δ19] 1.719 <- (5) Packet A|7|S0|6eb8c9e873bc9886|1252|2 PingFrame[] Padding(1222) 1.739 -> Packet A|3|S0|60a30c1aa67987960f|33|1 AckFrame[7-4|Δ19] 1.771 <- (6) Packet A|8|S0|6eb8c9e873bc9886|1332|2 PingFrame[] Padding(1302) 1.791 -> Packet A|4|S0|60a30c1aa67987960f|33|1 AckFrame[8-4|Δ19] 1.823 <- (7) Packet A|9|S0|6eb8c9e873bc9886|1412|2 PingFrame[] Padding(1382) 1.843 -> Packet A|5|S0|60a30c1aa67987960f|33|1 AckFrame[9-4|Δ19] 1.861 loss detection timeout handler running Sending probe 0, because no ack since 1.636. Current RTT: 100/25. 1.861 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 451 millis, based on 2.314/App, because ackElicitingInFlight | RTT:100/25 1.862 -> Packet PA|6|S0|60a30c1aa67987960f|48|1 StreamFrame[0(CIB),0,17,fin] 1.894 <- (8) Packet A|11|S0|6eb8c9e873bc9886|1057|1 StreamFrame[0(CIB),0,1024,fin] 1.895 Finished downloading https://server4:443/diogthncws at 42:46.191 on ClientConnection[062cd0c4007827c5/6eb8c9e873bc9886(V1) with server4/193.167.100.100:443] 1.895 Closing ClientConnection[062cd0c4007827c5/6eb8c9e873bc9886(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.896 Creating connection with server4:443 with v1 1.896 -> Packet A|7|S0|60a30c1aa67987960f|38|2 ConnectionCloseFrame[0|0|] AckFrame[11,9-4|Δ0] 1.896 Setting up connection for downloading https://server4:443/nvpnpldjgk at 42:46.192 on ClientConnection[d968affe45a9bf1d/709466ff0d9550df(V1) with server4/193.167.100.100:443] 1.896 Original destination connection id: d968affe45a9bf1d (scid: 709466ff0d9550df) >- CryptoStream[I|ClientHello] 1.898 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.098/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.898 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.082 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 2.082 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,740] Padding(256) 2.087 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.287/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.087 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 2.087 - unknown transport parameter 0xff04de1b, size 2 2.087 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 2.090 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.290/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.090 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.091 Starting downloading https://server4:443/nvpnpldjgk at 42:46.387 on ClientConnection[d968affe45a9bf1d/709466ff0d9550df(V1) with server4/193.167.100.100:443] 2.091 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.291/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.091 Discarding pn space Initial because first Handshake message is being sent 2.091 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 2.092 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.292/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.092 -> Packet A|0|S0|2a2d4b0566e6d1793a|48|1 StreamFrame[0(CIB),0,17,fin] 2.251 <- (9) Packet A|13|S0|6eb8c9e873bc9886|1062|2 MaxDataFrame[16777233] StreamFrame[0(CIB),0,1024,fin] 2.253 -> Packet A|8|S0|60a30c1aa67987960f|38|2 ConnectionCloseFrame[0|0|] AckFrame[11,9-4|Δ0] 2.291 loss detection timeout handler running Sending probe 0, because no ack since 2.090. Current RTT: 100/25. 2.291 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.291 (Probe is a handshake retransmit) 2.292 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 2.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.292 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 2.324 <- (2) Packet A|4|S0|709466ff0d9550df|1220|6 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2a2d2f921439f91093|0ca4ddec831f3c390ec0abff5a50ffbc] NewConnectionIdFrame[2,<1|e39c8175887c5c09e2|ae5fb4d601ff4809c3e1afe982eb1ec8] NewConnectionIdFrame[3,<2|e39c3b96733b2bfb68|6f6f719e98a184396363a504f978a98a] Padding(1098) 2.326 probe count not reset on ack because handshake not yet confirmed 2.326 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 2.726/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.326 State is set to Confirmed reschedule loss detection timer for PTO over 1357 millis, based on 3.684/Handshake, because ackElicitingInFlight | RTT:232/116 2.326 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.326 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 721 millis, based on 3.049/App, because ackElicitingInFlight | RTT:232/116 2.327 -> Packet A|1|S0|e39c8175887c5c09e2|36|3 RetireConnectionIdFrame[0] AckFrame[4|Δ0] RetireConnectionIdFrame[1] 2.383 <- (3) Packet A|8|S0|709466ff0d9550df|35|1 AckFrame[1|Δ0] 2.384 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.435 <- (4) Packet A|9|S0|709466ff0d9550df|1220|2 CryptoFrame[0,305] StreamFrame[0(CIB),0,878] -< CryptoStream[A|NewSessionTicket] 2.436 <- (5) Packet A|10|S0|709466ff0d9550df|181|1 StreamFrame[0(CIB),878,146,fin] 2.437 Finished downloading https://server4:443/nvpnpldjgk at 42:46.733 on ClientConnection[d968affe45a9bf1d/709466ff0d9550df(V1) with server4/193.167.100.100:443] 2.437 Closing ClientConnection[d968affe45a9bf1d/709466ff0d9550df(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.437 -> Packet A|2|S0|e39c8175887c5c09e2|32|1 AckFrame[10-8|Δ0] 2.438 -> Packet A|3|S0|e39c8175887c5c09e2|36|2 ConnectionCloseFrame[0|0|] AckFrame[10-8|Δ0] 2.438 Creating connection with server4:443 with v1 2.439 Setting up connection for downloading https://server4:443/gphxvbjwqj at 42:46.735 on ClientConnection[8a9739f12622efe9/47c7c090d6ecec6d(V1) with server4/193.167.100.100:443] 2.439 Original destination connection id: 8a9739f12622efe9 (scid: 47c7c090d6ecec6d) >- CryptoStream[I|ClientHello] 2.441 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.641/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.441 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.468 <- (6) Packet A|11|S0|709466ff0d9550df|38|2 AckFrame[3|Δ0] ConnectionCloseFrame[0|0|] 2.625 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 2.625 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,742] Padding(254) 2.630 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.630 - unknown transport parameter 0xff04de1b, size 2 2.630 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 2.630 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 2.634 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.834/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.634 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.635 Starting downloading https://server4:443/gphxvbjwqj at 42:46.931 on ClientConnection[8a9739f12622efe9/47c7c090d6ecec6d(V1) with server4/193.167.100.100:443] 2.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.835/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.635 Discarding pn space Initial because first Handshake message is being sent 2.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.836/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.636 -> [Packet H|1|L|47|1 AckFrame[3|Δ0], Packet A|0|S0|9395ffce27dcaf05d8|48|1 StreamFrame[0(CIB),0,17,fin]] 2.668 <- (2) Packet A|7|S0|47c7c090d6ecec6d|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 2.669 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.869/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.669 Finished downloading https://server4:443/gphxvbjwqj at 42:46.966 on ClientConnection[8a9739f12622efe9/47c7c090d6ecec6d(V1) with server4/193.167.100.100:443] 2.670 Closing ClientConnection[8a9739f12622efe9/47c7c090d6ecec6d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.670 -> Packet A|1|S0|9395ffce27dcaf05d8|36|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 2.670 Creating connection with server4:443 with v1 2.671 Setting up connection for downloading https://server4:443/lxxdzywkik at 42:46.967 on ClientConnection[c64639145d06ccb0/87ff65e1d9b197ab(V1) with server4/193.167.100.100:443] 2.671 Original destination connection id: c64639145d06ccb0 (scid: 87ff65e1d9b197ab) >- CryptoStream[I|ClientHello] 2.673 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.873/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.673 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.857 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 2.857 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,740] Padding(256) 2.861 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.061/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.861 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 2.862 - unknown transport parameter 0xff04de1b, size 2 2.862 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 2.865 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.065/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.864 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.868 Starting downloading https://server4:443/lxxdzywkik at 42:47.164 on ClientConnection[c64639145d06ccb0/87ff65e1d9b197ab(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 199 millis, based on 3.068/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.868 Discarding pn space Initial because first Handshake message is being sent 2.869 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.069/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.869 -> [Packet H|1|L|47|1 AckFrame[3|Δ0], Packet A|0|S0|ab37922e04710bc136|48|1 StreamFrame[0(CIB),0,17,fin]] 2.896 <- (2) Packet A|4|S0|87ff65e1d9b197ab|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|ab37c95b92b0a1d4f2|9197fd318a09c4cae45b80d01926ad1d] NewConnectionIdFrame[2,<1|c034f9e9dd0c34d021|ee7d000f71900f100a045a5673de395e] NewConnectionIdFrame[3,<2|c034790b64069c8e0f|e06f571635ff69efa0a02448716d50c5] Padding(1103) 2.897 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 3.064/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 197 millis, based on 3.095/App, because ackElicitingInFlight | RTT:100/25 2.898 Discarding pn space Handshake because HandshakeDone is received 2.898 <- (3) Packet A|6|S0|87ff65e1d9b197ab|338|1 CryptoFrame[0,305] reschedule loss detection timer for PTO over 225 millis, based on 3.124/App, because ackElicitingInFlight | RTT:100/25 -< CryptoStream[A|NewSessionTicket] 2.898 -> Packet A|1|S0|c034f9e9dd0c34d021|36|3 RetireConnectionIdFrame[0] AckFrame[4|Δ0] RetireConnectionIdFrame[1] 2.901 <- (4) Packet A|7|S0|87ff65e1d9b197ab|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 222 millis, based on 3.124/App, because ackElicitingInFlight | RTT:100/25 2.902 Finished downloading https://server4:443/lxxdzywkik at 42:47.198 on ClientConnection[c64639145d06ccb0/87ff65e1d9b197ab(V1) with server4/193.167.100.100:443] 2.902 Closing ClientConnection[c64639145d06ccb0/87ff65e1d9b197ab(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.902 -> Packet A|2|S0|c034f9e9dd0c34d021|35|1 AckFrame[7-6,4|Δ3] 2.903 Creating connection with server4:443 with v1 2.903 -> Packet A|3|S0|c034f9e9dd0c34d021|38|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4|Δ0] 2.903 Setting up connection for downloading https://server4:443/fkrvhtbaxm at 42:47.199 on ClientConnection[ef83519f903c9014/98c7ab31d90c7362(V1) with server4/193.167.100.100:443] 2.903 Original destination connection id: ef83519f903c9014 (scid: 98c7ab31d90c7362) >- CryptoStream[I|ClientHello] 2.905 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.105/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.905 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.954 <- (5) Packet A|8|S0|87ff65e1d9b197ab|35|1 AckFrame[1-0|Δ0] 2.954 -> Packet A|4|S0|c034f9e9dd0c34d021|38|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4|Δ0] 2.968 <- (3) Packet A|8|S0|47c7c090d6ecec6d|1220|6 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|9395f6a34978ffc173|e5bb38efdd5c80bd7afde03f5a2f8c4a] NewConnectionIdFrame[2,<1|e0293045f5d6382b54|94d3cecf3095c01b5755509f5e0b3ca9] NewConnectionIdFrame[3,<2|e02969562f46a1692c|0373ae9f7a847e57034dff3734e5be06] Padding(794) 2.969 -> Packet A|2|S0|9395ffce27dcaf05d8|36|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 2.999 <- (4) Packet A|9|S0|47c7c090d6ecec6d|38|2 AckFrame[2|Δ0] ConnectionCloseFrame[0|0|] 3.104 loss detection timeout handler running Sending probe 0, because no ack since 2.905. Current RTT: 100/25. 3.104 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.104 (Probe is an initial retransmit) 3.105 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.505/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.105 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.288 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 3.288 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,741] Padding(255) 3.293 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.693/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.293 - unknown transport parameter 0xff04de1b, size 2 3.292 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 3.293 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 3.296 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.696/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.296 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.296 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.296 Starting downloading https://server4:443/fkrvhtbaxm at 42:47.592 on ClientConnection[ef83519f903c9014/98c7ab31d90c7362(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 199 millis, based on 3.496/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.296 Discarding pn space Initial because first Handshake message is being sent 3.296 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 3.297 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.497/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.297 -> Packet A|0|S0|310358f5f1a9070821|48|1 StreamFrame[0(CIB),0,17,fin] 3.496 loss detection timeout handler running Sending probe 0, because no ack since 3.296. Current RTT: 100/25. 3.496 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.496 (Probe is a handshake retransmit) 3.497 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.897/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.497 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 3.896 loss detection timeout handler running Sending probe 1, because no ack since 3.297. Current RTT: 100/25. 3.896 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.896 (Probe is a handshake retransmit) 3.897 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 4.697/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.897 -> Packet PH|3|L|81|1 CryptoFrame[0,36] 3.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 4.698/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.898 -> Packet PH|4|L|81|1 CryptoFrame[0,36] 3.930 <- (2) Packet A|4|S0|98c7ab31d90c7362|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|3103c5a034aca73ec5|d6b5ca46f888e23468cd2334ca6a0d2a] Padding(1156) 3.930 probe count not reset on ack because handshake not yet confirmed 3.931 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 4.731/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.931 State is set to Confirmed reschedule loss detection timer for PTO over 7550 millis, based on 11.482/Handshake, because ackElicitingInFlight | RTT:632/316 3.931 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.931 Discarding pn space Handshake because HandshakeDone is received 3.931 <- (3) Packet A|5|S0|98c7ab31d90c7362|1220|2 PingFrame[] Padding(1190) 3.931 <- (4) Packet A|6|S0|98c7ab31d90c7362|338|1 CryptoFrame[0,305] 3.932 -> Packet A|1|S0|310358f5f1a9070821|32|1 AckFrame[5-4|Δ0] -< CryptoStream[A|NewSessionTicket] 3.952 -> Packet A|2|S0|310358f5f1a9070821|33|1 AckFrame[6-4|Δ19] 3.964 <- (5) Packet A|8|S0|98c7ab31d90c7362|1252|2 PingFrame[] Padding(1222) 3.983 -> Packet A|3|S0|310358f5f1a9070821|35|1 AckFrame[8,6-4|Δ19] 4.050 <- (6) Packet A|9|S0|98c7ab31d90c7362|1220|3 AckFrame[1|Δ2] CryptoFrame[0,305] StreamFrame[0(CIB),0,872] 4.051 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) -< CryptoStream[A|NewSessionTicket] 4.050 <- (7) Packet A|10|S0|98c7ab31d90c7362|187|1 StreamFrame[0(CIB),872,152,fin] 4.054 Finished downloading https://server4:443/fkrvhtbaxm at 42:48.350 on ClientConnection[ef83519f903c9014/98c7ab31d90c7362(V1) with server4/193.167.100.100:443] 4.054 Closing ClientConnection[ef83519f903c9014/98c7ab31d90c7362(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.054 -> Packet A|4|S0|310358f5f1a9070821|34|1 AckFrame[10-8,6|Δ0] 4.055 Creating connection with server4:443 with v1 4.054 -> Packet A|5|S0|310358f5f1a9070821|38|2 ConnectionCloseFrame[0|0|] AckFrame[10-8,6|Δ0] 4.055 Setting up connection for downloading https://server4:443/dshcmyrdey at 42:48.351 on ClientConnection[ac7004a4cf1ed245/dea83d95274e731b(V1) with server4/193.167.100.100:443] 4.055 Original destination connection id: ac7004a4cf1ed245 (scid: dea83d95274e731b) >- CryptoStream[I|ClientHello] 4.057 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.257/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.057 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.256 loss detection timeout handler running Sending probe 0, because no ack since 4.057. Current RTT: 100/25. 4.256 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.256 (Probe is an initial retransmit) 4.257 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.657/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.257 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.291 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 4.291 probe count not reset on ack because handshake not yet confirmed 4.293 Retransmitting CryptoFrame[0,257] on level Initial 4.293 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.693/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.293 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) 4.294 Cwnd(-): 6000; inflight: 1200 4.294 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.694/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 4.297 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.291 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) reschedule loss detection timer for PTO over 193 millis, based on 4.491/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.297 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 4.298 - unknown transport parameter 0xff04de1b, size 2 4.298 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 4.300 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.300 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.301 Starting downloading https://server4:443/dshcmyrdey at 42:48.597 on ClientConnection[ac7004a4cf1ed245/dea83d95274e731b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 4.398/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.301 Discarding pn space Initial because first Handshake message is being sent 4.301 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 4.302 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.399/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.302 -> Packet A|0|S0|115c86ba6127a472c6|48|1 StreamFrame[0(CIB),0,17,fin] 4.332 <- (2) Packet A|2|S0|dea83d95274e731b|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|115cf6da93ea0abfda|c04ce3147d3897406199f0b82d713c63] Padding(1161) 4.333 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 4.397/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 4.425/App, because ackElicitingInFlight | RTT:33/16 4.333 Discarding pn space Handshake because HandshakeDone is received 4.333 <- (3) Packet A|3|S0|dea83d95274e731b|1220|2 PingFrame[] Padding(1190) 4.334 -> Packet A|1|S0|115c86ba6127a472c6|32|1 AckFrame[3-2|Δ0] 4.366 <- (4) Packet A|6|S0|dea83d95274e731b|1252|2 PingFrame[] Padding(1222) 4.386 -> Packet A|2|S0|115c86ba6127a472c6|35|1 AckFrame[6,3-2|Δ19] 4.406 <- (8) Packet A|14|S0|98c7ab31d90c7362|1252|3 MaxStreamsFrame[B,101] PingFrame[] Padding(1219) 4.407 -> Packet A|6|S0|310358f5f1a9070821|38|2 ConnectionCloseFrame[0|0|] AckFrame[10-8,6|Δ0] 4.418 <- (5) Packet A|8|S0|dea83d95274e731b|1332|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(274) 4.419 Finished downloading https://server4:443/dshcmyrdey at 42:48.715 on ClientConnection[ac7004a4cf1ed245/dea83d95274e731b(V1) with server4/193.167.100.100:443] 4.419 Closing ClientConnection[ac7004a4cf1ed245/dea83d95274e731b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.420 Creating connection with server4:443 with v1 4.420 -> Packet A|3|S0|115c86ba6127a472c6|40|2 ConnectionCloseFrame[0|0|] AckFrame[8,6,3-2|Δ0] 4.420 Setting up connection for downloading https://server4:443/ryrtwwxnjs at 42:48.716 on ClientConnection[ea1921c435f46a47/e1154bb540e59950(V1) with server4/193.167.100.100:443] 4.420 Original destination connection id: ea1921c435f46a47 (scid: e1154bb540e59950) >- CryptoStream[I|ClientHello] 4.422 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.622/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.422 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.438 <- (9) Packet A|15|S0|98c7ab31d90c7362|40|2 AckFrame[6,4|Δ0] ConnectionCloseFrame[0|0|] 4.450 <- (6) Packet A|9|S0|dea83d95274e731b|38|2 AckFrame[3-0|Δ0] ConnectionCloseFrame[0|0|] 4.621 loss detection timeout handler running Sending probe 0, because no ack since 4.422. Current RTT: 100/25. 4.622 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.622 (Probe is an initial retransmit) 4.623 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.023/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.622 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.656 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 4.657 probe count not reset on ack because handshake not yet confirmed 4.657 Retransmitting CryptoFrame[0,257] on level Initial 4.657 Cwnd(-): 6000; inflight: 0 4.657 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.057/Initial, because peerAwaitingAddressValidation | RTT:100/25 4.658 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 4.852/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.657 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 4.656 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 4.661 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.855/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.661 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 4.661 - unknown transport parameter 0xff04de1b, size 2 4.661 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 4.664 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.858/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.664 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.665 Starting downloading https://server4:443/ryrtwwxnjs at 42:48.961 on ClientConnection[ea1921c435f46a47/e1154bb540e59950(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 4.762/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.665 Discarding pn space Initial because first Handshake message is being sent 4.665 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 4.666 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.763/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.666 -> Packet A|0|S0|ead3781b4487f380e2|48|1 StreamFrame[0(CIB),0,17,fin] 4.696 <- (2) Packet A|2|S0|e1154bb540e59950|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|ead3575a51183c01e6|e7524fd5f274f8c7edcb526d9478c253] Padding(1161) 4.697 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 4.761/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 4.789/App, because ackElicitingInFlight | RTT:33/16 4.698 Discarding pn space Handshake because HandshakeDone is received 4.697 <- (3) Packet A|3|S0|e1154bb540e59950|1220|2 PingFrame[] Padding(1190) 4.698 <- (4) Packet A|4|S0|e1154bb540e59950|338|1 CryptoFrame[0,305] 4.698 -> Packet A|1|S0|ead3781b4487f380e2|32|1 AckFrame[3-2|Δ0] -< CryptoStream[A|NewSessionTicket] 4.718 -> Packet A|2|S0|ead3781b4487f380e2|33|1 AckFrame[4-2|Δ19] 4.730 <- (5) Packet A|6|S0|e1154bb540e59950|1252|2 PingFrame[] Padding(1222) 4.750 -> Packet A|3|S0|ead3781b4487f380e2|35|1 AckFrame[6,4-2|Δ19] 4.782 <- (6) Packet A|7|S0|e1154bb540e59950|1332|4 PingFrame[] AckFrame[3-0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(269) 4.783 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.784 Finished downloading https://server4:443/ryrtwwxnjs at 42:49.080 on ClientConnection[ea1921c435f46a47/e1154bb540e59950(V1) with server4/193.167.100.100:443] 4.784 Closing ClientConnection[ea1921c435f46a47/e1154bb540e59950(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.784 -> Packet A|4|S0|ead3781b4487f380e2|36|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 4.785 Creating connection with server4:443 with v1 4.786 Setting up connection for downloading https://server4:443/jjpfpypjgk at 42:49.082 on ClientConnection[27b31ca5cbaf2bc5/89ddfef74277c7ef(V1) with server4/193.167.100.100:443] 4.786 Original destination connection id: 27b31ca5cbaf2bc5 (scid: 89ddfef74277c7ef) >- CryptoStream[I|ClientHello] 4.788 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.988/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.788 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.815 <- (7) Packet A|8|S0|e1154bb540e59950|38|2 AckFrame[4|Δ0] ConnectionCloseFrame[0|0|] 4.821 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.822 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.022/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.825 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.821 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) reschedule loss detection timer for PTO over 96 millis, based on 4.922/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.825 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 4.826 - unknown transport parameter 0xff04de1b, size 2 4.826 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.829 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.926/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.829 Starting downloading https://server4:443/jjpfpypjgk at 42:49.125 on ClientConnection[27b31ca5cbaf2bc5/89ddfef74277c7ef(V1) with server4/193.167.100.100:443] 4.829 -> Packet H|0|L|81|1 CryptoFrame[0,36] 4.829 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.829 -> Packet H|1|L|47|1 AckFrame[1|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 4.926/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.829 Discarding pn space Initial because first Handshake message is being sent 4.830 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.927/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.830 -> Packet A|0|S0|03a12a978b506d133d|48|1 StreamFrame[0(CIB),0,17,fin] 4.862 <- (2) Packet A|3|S0|89ddfef74277c7ef|1220|2 PingFrame[] Padding(1190) 4.862 <- (3) Packet A|4|S0|89ddfef74277c7ef|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 4.863 <- (4) Packet A|5|S0|89ddfef74277c7ef|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 4.864 -> Packet A|1|S0|03a12a978b506d133d|32|1 AckFrame[4-3|Δ0] 4.864 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.961/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.865 Finished downloading https://server4:443/jjpfpypjgk at 42:49.161 on ClientConnection[27b31ca5cbaf2bc5/89ddfef74277c7ef(V1) with server4/193.167.100.100:443] 4.865 Closing ClientConnection[27b31ca5cbaf2bc5/89ddfef74277c7ef(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.865 -> Packet A|2|S0|03a12a978b506d133d|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 4.866 Creating connection with server4:443 with v1 4.867 Setting up connection for downloading https://server4:443/ciddyeuqqc at 42:49.163 on ClientConnection[621c1e26c0f122fe/5def89946d5d5843(V1) with server4/193.167.100.100:443] 4.867 Original destination connection id: 621c1e26c0f122fe (scid: 5def89946d5d5843) >- CryptoStream[I|ClientHello] 4.869 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.069/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.868 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.896 <- (5) Packet A|7|S0|89ddfef74277c7ef|38|2 AckFrame[2-1|Δ0] ConnectionCloseFrame[0|0|] 4.902 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.903 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.103/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.902 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 4.906 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.003/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.906 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 4.907 - unknown transport parameter 0xff04de1b, size 2 4.907 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 4.910 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.007/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.910 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.911 Starting downloading https://server4:443/ciddyeuqqc at 42:49.207 on ClientConnection[621c1e26c0f122fe/5def89946d5d5843(V1) with server4/193.167.100.100:443] 4.911 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.008/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.911 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.911 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 96 millis, based on 5.008/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.911 -> Packet A|0|S0|2194774117d89e4781|48|1 StreamFrame[0(CIB),0,17,fin] 4.912 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 4.942 <- (2) Packet A|2|S0|5def89946d5d5843|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|219402748de81c2835|3dc9cac101cb019edebdcab3a00bf6ec] NewConnectionIdFrame[2,<1|aa1bf1d84eb99cb349|39328d4a5444a728b774d2cb82623298] NewConnectionIdFrame[3,<2|aa1b829cb7eb7d8087|af68db62bba09f29405f943d33000d3e] Padding(1103) 4.943 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 5.007/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 5.034/App, because ackElicitingInFlight | RTT:33/16 4.943 Discarding pn space Handshake because HandshakeDone is received 4.943 <- (3) Packet A|3|S0|5def89946d5d5843|1220|2 PingFrame[] Padding(1190) 4.943 <- (4) Packet A|4|S0|5def89946d5d5843|338|1 CryptoFrame[0,305] reschedule loss detection timer for PTO over 122 millis, based on 5.067/App, because ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket] 4.944 -> Packet A|1|S0|aa1bf1d84eb99cb349|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] 4.945 -> Packet A|2|S0|aa1bf1d84eb99cb349|32|1 AckFrame[4-2|Δ0] 5.066 loss detection timeout handler running Sending probe 0, because no ack since 4.944. Current RTT: 33/16. 5.067 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 5.313/App, because ackElicitingInFlight | RTT:33/16 5.067 -> Packet PA|3|S0|aa1bf1d84eb99cb349|48|1 StreamFrame[0(CIB),0,17,fin] 5.094 <- (5) Packet A|6|S0|5def89946d5d5843|1220|6 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|219402748de81c2835|3dc9cac101cb019edebdcab3a00bf6ec] NewConnectionIdFrame[2,<1|aa1bf1d84eb99cb349|39328d4a5444a728b774d2cb82623298] NewConnectionIdFrame[3,<2|aa1b829cb7eb7d8087|af68db62bba09f29405f943d33000d3e] Padding(794) -< CryptoStream[A|NewSessionTicket] 5.114 -> Packet A|4|S0|aa1bf1d84eb99cb349|35|1 AckFrame[6,4-2|Δ19] 5.312 loss detection timeout handler running Sending probe 1, because no ack since 5.067. Current RTT: 33/16. 5.313 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 5.805/App, because ackElicitingInFlight | RTT:33/16 5.313 -> Packet PA|5|S0|aa1bf1d84eb99cb349|48|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 5.806/App, because ackElicitingInFlight | RTT:33/16 5.314 -> Packet PA|6|S0|aa1bf1d84eb99cb349|48|1 StreamFrame[0(CIB),0,17,fin] 5.345 <- (6) Packet A|8|S0|5def89946d5d5843|38|1 AckFrame[6,3,0|Δ0] 5.346 Cwnd(-): 6000; inflight: 48 5.346 -> Packet A|7|S0|aa1bf1d84eb99cb349|38|3 RetireConnectionIdFrame[0] AckFrame[6,4-2|Δ0] RetireConnectionIdFrame[1] 5.350 loss detection timeout handler running reschedule loss detection timer for PTO over 106 millis, based on 5.457/App, because ackElicitingInFlight | RTT:33/13 5.456 loss detection timeout handler running Sending probe 0, because no ack since 5.346. Current RTT: 33/13. 5.456 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 5.679/App, because ackElicitingInFlight | RTT:33/13 5.457 -> Packet PA|8|S0|aa1bf1d84eb99cb349|31|2 RetireConnectionIdFrame[0] RetireConnectionIdFrame[1] 5.513 <- (7) Packet A|10|S0|5def89946d5d5843|39|1 AckFrame[8-6,3,0|Δ0] 5.513 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.005 <- (8) Packet A|12|S0|5def89946d5d5843|1220|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(162) 8.006 Finished downloading https://server4:443/ciddyeuqqc at 42:52.302 on ClientConnection[621c1e26c0f122fe/5def89946d5d5843(V1) with server4/193.167.100.100:443] 8.006 Closing ClientConnection[621c1e26c0f122fe/5def89946d5d5843(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.006 -> Packet A|9|S0|aa1bf1d84eb99cb349|40|2 ConnectionCloseFrame[0|0|] AckFrame[12,10,8|Δ0] 8.006 Creating connection with server4:443 with v1 8.007 Setting up connection for downloading https://server4:443/njpdxtzwff at 42:52.303 on ClientConnection[eaf225d42dcff034/5de7ef7499749e35(V1) with server4/193.167.100.100:443] 8.007 Original destination connection id: eaf225d42dcff034 (scid: 5de7ef7499749e35) >- CryptoStream[I|ClientHello] 8.009 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.209/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.008 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.037 <- (9) Packet A|13|S0|5def89946d5d5843|38|2 AckFrame[9|Δ0] ConnectionCloseFrame[0|0|] 8.208 loss detection timeout handler running Sending probe 0, because no ack since 8.008. Current RTT: 100/25. 8.208 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.208 (Probe is an initial retransmit) 8.208 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.609/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.208 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.392 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 8.392 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,742] Padding(254) 8.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.796/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.396 - unknown transport parameter 0xff04de1b, size 2 8.396 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 8.396 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) >- CryptoStream[H|Finished] 8.399 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.799/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.399 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.399 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 8.599/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.400 Discarding pn space Initial because first Handshake message is being sent 8.400 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 8.400 Starting downloading https://server4:443/njpdxtzwff at 42:52.696 on ClientConnection[eaf225d42dcff034/5de7ef7499749e35(V1) with server4/193.167.100.100:443] 8.401 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 8.601/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.400 -> Packet A|0|S0|839884b23a58eecf34|48|1 StreamFrame[0(CIB),0,17,fin] 8.431 <- (2) Packet A|4|S0|5de7ef7499749e35|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|839817e2841b61622a|973ece5ee7ba3b67d83ab5096f42d8b2] Padding(1161) 8.431 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 8.599/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 8.626/App, because ackElicitingInFlight | RTT:100/25 8.432 Discarding pn space Handshake because HandshakeDone is received 8.432 <- (3) Packet A|5|S0|5de7ef7499749e35|1220|2 PingFrame[] Padding(1190) 8.432 -> Packet A|1|S0|839884b23a58eecf34|32|1 AckFrame[5-4|Δ0] 8.433 <- (4) Packet A|7|S0|5de7ef7499749e35|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 8.433 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.434 Finished downloading https://server4:443/njpdxtzwff at 42:52.730 on ClientConnection[eaf225d42dcff034/5de7ef7499749e35(V1) with server4/193.167.100.100:443] 8.434 Closing ClientConnection[eaf225d42dcff034/5de7ef7499749e35(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.434 -> Packet A|2|S0|839884b23a58eecf34|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 8.435 Creating connection with server4:443 with v1 8.435 Setting up connection for downloading https://server4:443/vsoyszkbab at 42:52.731 on ClientConnection[dce6a79fb343955f/c2e3467a228ee100(V1) with server4/193.167.100.100:443] 8.435 Original destination connection id: dce6a79fb343955f (scid: c2e3467a228ee100) >- CryptoStream[I|ClientHello] 8.437 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.637/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.437 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.465 <- (5) Packet A|8|S0|5de7ef7499749e35|38|2 AckFrame[2|Δ0] ConnectionCloseFrame[0|0|] 8.636 loss detection timeout handler running Sending probe 0, because no ack since 8.437. Current RTT: 100/25. 8.637 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.637 (Probe is an initial retransmit) 8.637 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.037/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.637 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.671 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 8.671 probe count not reset on ack because handshake not yet confirmed 8.671 Retransmitting CryptoFrame[0,257] on level Initial 8.672 Cwnd(-): 6000; inflight: 0 8.672 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.072/Initial, because peerAwaitingAddressValidation | RTT:100/25 8.672 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 8.866/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.672 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 8.671 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 8.674 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.868/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.674 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 8.675 - unknown transport parameter 0xff04de1b, size 2 8.675 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 8.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.872/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.677 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.678 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.678 Starting downloading https://server4:443/vsoyszkbab at 42:52.974 on ClientConnection[dce6a79fb343955f/c2e3467a228ee100(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 8.775/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.678 Discarding pn space Initial because first Handshake message is being sent 8.679 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.776/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.679 -> [Packet H|1|L|47|1 AckFrame[1|Δ0], Packet A|0|S0|b217363ea271a77224|48|1 StreamFrame[0(CIB),0,17,fin]] 8.710 <- (2) Packet A|2|S0|c2e3467a228ee100|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b2179a73d8a19e67d2|020a5a4b09d27d469641288733ca8b28] Padding(1161) 8.710 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 8.774/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 8.802/App, because ackElicitingInFlight | RTT:33/16 8.711 Discarding pn space Handshake because HandshakeDone is received 8.711 <- (3) Packet A|3|S0|c2e3467a228ee100|1220|2 PingFrame[] Padding(1190) 8.711 <- (4) Packet A|4|S0|c2e3467a228ee100|338|1 CryptoFrame[0,305] 8.711 -> Packet A|1|S0|b217363ea271a77224|32|1 AckFrame[3-2|Δ0] -< CryptoStream[A|NewSessionTicket] 8.731 -> Packet A|2|S0|b217363ea271a77224|33|1 AckFrame[4-2|Δ19] 8.763 <- (5) Packet A|5|S0|c2e3467a228ee100|1252|2 PingFrame[] Padding(1222) 8.782 -> Packet A|3|S0|b217363ea271a77224|33|1 AckFrame[5-2|Δ19] 8.801 loss detection timeout handler running Sending probe 0, because no ack since 8.679. Current RTT: 33/16. 8.801 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 9.047/App, because ackElicitingInFlight | RTT:33/16 8.801 -> Packet PA|4|S0|b217363ea271a77224|48|1 StreamFrame[0(CIB),0,17,fin] 8.814 <- (6) Packet A|6|S0|c2e3467a228ee100|1332|2 PingFrame[] Padding(1302) 8.833 <- (7) Packet A|7|S0|c2e3467a228ee100|1062|2 AckFrame[4-2|Δ0] StreamFrame[0(CIB),0,1024,fin] 8.834 Cwnd(-): 3000; inflight: 0 8.834 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.834 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 110 millis, based on 8.945/App, because ackElicitingInFlight | RTT:33/13 8.834 Finished downloading https://server4:443/vsoyszkbab at 42:53.130 on ClientConnection[dce6a79fb343955f/c2e3467a228ee100(V1) with server4/193.167.100.100:443] 8.834 -> Packet A|5|S0|b217363ea271a77224|54|2 AckFrame[6|Δ19] StreamFrame[0(CIB),0,17,fin] 8.834 Closing ClientConnection[dce6a79fb343955f/c2e3467a228ee100(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.835 -> Packet A|6|S0|b217363ea271a77224|36|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 8.835 Creating connection with server4:443 with v1 8.835 Setting up connection for downloading https://server4:443/jwtbpyylep at 42:53.131 on ClientConnection[b653b04991d709bf/1cbbab86b7f992c7(V1) with server4/193.167.100.100:443] 8.835 Original destination connection id: b653b04991d709bf (scid: 1cbbab86b7f992c7) >- CryptoStream[I|ClientHello] 8.837 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.037/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.837 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.866 <- (8) Packet A|9|S0|c2e3467a228ee100|38|2 AckFrame[6-5|Δ0] ConnectionCloseFrame[0|0|] 9.036 loss detection timeout handler running Sending probe 0, because no ack since 8.837. Current RTT: 100/25. 9.036 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.036 (Probe is an initial retransmit) 9.037 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.437/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.036 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.436 loss detection timeout handler running Sending probe 1, because no ack since 9.036. Current RTT: 100/25. 9.436 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.436 (Probe is an initial retransmit) 9.436 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.237/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.436 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.437 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.237/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.437 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.470 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 9.471 probe count not reset on ack because handshake not yet confirmed 9.471 Retransmitting CryptoFrame[0,257] on level Initial 9.471 Cwnd(-): 6000; inflight: 1200 9.471 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.271/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.471 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 9.859/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.471 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 9.470 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 9.474 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.862/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.474 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 9.474 - unknown transport parameter 0xff04de1b, size 2 9.474 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 9.477 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.865/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.477 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.477 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.477 Discarding pn space Initial because first Handshake message is being sent 9.477 Starting downloading https://server4:443/jwtbpyylep at 42:53.773 on ClientConnection[b653b04991d709bf/1cbbab86b7f992c7(V1) with server4/193.167.100.100:443] 9.477 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 9.478 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.575/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.478 -> Packet A|0|S0|238e56898afafed3fd|48|1 StreamFrame[0(CIB),0,17,fin] 9.495 Discarding packet (1220 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.509 <- (3) Packet A|4|S0|1cbbab86b7f992c7|1252|2 PingFrame[] Padding(1222) 9.510 <- (4) Packet A|5|S0|1cbbab86b7f992c7|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 9.510 -> Packet A|1|S0|238e56898afafed3fd|32|1 AckFrame[5-4|Δ0] 9.574 loss detection timeout handler running Sending probe 0, because no ack since 9.477. Current RTT: 33/16. 9.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.574 (Probe is a handshake retransmit) 9.575 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 9.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.574 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 9.768 loss detection timeout handler running Sending probe 1, because no ack since 9.478. Current RTT: 33/16. 9.768 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.768 (Probe is a handshake retransmit) 9.768 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 10.156/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.768 -> Packet PH|3|L|81|1 CryptoFrame[0,36] 9.769 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 10.157/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.769 -> Packet PH|4|L|81|1 CryptoFrame[0,36] 9.960 <- (5) Packet A|7|S0|1cbbab86b7f992c7|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|238e75e78f93736af9|c508a15a6ea4074ebef8d53aca4fab15] Padding(852) -< CryptoStream[A|NewSessionTicket] 9.961 State is set to Confirmed reschedule loss detection timer for PTO over 8 millis, based on 9.970/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -360 millis, based on 9.601/App, because ackElicitingInFlight | RTT:33/16 9.961 loss detection timeout handler running 9.961 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 9.478. Current RTT: 33/16. 9.961 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 10.207/App, because ackElicitingInFlight | RTT:33/16 9.961 -> Packet PA|2|S0|238e56898afafed3fd|48|1 StreamFrame[0(CIB),0,17,fin] 9.981 -> Packet A|3|S0|238e56898afafed3fd|35|1 AckFrame[7,5-4|Δ19] 10.207 loss detection timeout handler running Sending probe 1, because no ack since 9.961. Current RTT: 33/16. 10.207 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 10.699/App, because ackElicitingInFlight | RTT:33/16 10.207 -> Packet PA|4|S0|238e56898afafed3fd|48|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 10.700/App, because ackElicitingInFlight | RTT:33/16 10.208 -> Packet PA|5|S0|238e56898afafed3fd|48|1 StreamFrame[0(CIB),0,17,fin] 10.239 <- (6) Packet A|8|S0|1cbbab86b7f992c7|1062|2 AckFrame[4|Δ0] StreamFrame[0(CIB),0,1024,fin] 10.239 Cwnd(-): 3000; inflight: 48 10.239 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 91 millis, based on 10.331/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 110 millis, based on 10.350/App, because ackElicitingInFlight | RTT:33/13 10.239 -> Packet A|6|S0|238e56898afafed3fd|55|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7,5-4|Δ0] 10.240 Finished downloading https://server4:443/jwtbpyylep at 42:54.536 on ClientConnection[b653b04991d709bf/1cbbab86b7f992c7(V1) with server4/193.167.100.100:443] 10.240 Closing ClientConnection[b653b04991d709bf/1cbbab86b7f992c7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.241 Creating connection with server4:443 with v1 10.240 -> Packet A|7|S0|238e56898afafed3fd|38|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5-4|Δ0] 10.241 Setting up connection for downloading https://server4:443/lbwzvjqjqi at 42:54.537 on ClientConnection[a199bf209e3e43cd/826da4949076f0f8(V1) with server4/193.167.100.100:443] 10.241 Original destination connection id: a199bf209e3e43cd (scid: 826da4949076f0f8) >- CryptoStream[I|ClientHello] 10.243 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.443/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.242 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.264 <- (7) Packet A|9|S0|1cbbab86b7f992c7|35|1 AckFrame[5-4|Δ0] 10.264 -> Packet A|8|S0|238e56898afafed3fd|38|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5-4|Δ0] 10.276 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 10.276 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.476/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.276 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 10.279 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.376/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.279 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 10.279 - unknown transport parameter 0xff04de1b, size 2 10.279 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 10.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.379/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.282 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.282 Starting downloading https://server4:443/lbwzvjqjqi at 42:54.578 on ClientConnection[a199bf209e3e43cd/826da4949076f0f8(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 10.379/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.282 Discarding pn space Initial because first Handshake message is being sent 10.283 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 10.283 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.283 -> Packet A|0|S0|a341d4407cfdcacdd7|48|1 StreamFrame[0(CIB),0,17,fin] 10.295 <- (8) Packet A|10|S0|1cbbab86b7f992c7|40|2 AckFrame[8,5|Δ0] ConnectionCloseFrame[0|0|] 10.315 <- (2) Packet A|3|S0|826da4949076f0f8|1220|2 PingFrame[] Padding(1190) 10.316 <- (3) Packet A|5|S0|826da4949076f0f8|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 10.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.413/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.317 Finished downloading https://server4:443/lbwzvjqjqi at 42:54.613 on ClientConnection[a199bf209e3e43cd/826da4949076f0f8(V1) with server4/193.167.100.100:443] 10.317 Closing ClientConnection[a199bf209e3e43cd/826da4949076f0f8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.316 -> Packet A|1|S0|a341d4407cfdcacdd7|35|1 AckFrame[5,3|Δ1] 10.317 -> Packet A|2|S0|a341d4407cfdcacdd7|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3|Δ0] 10.317 Creating connection with server4:443 with v1 10.318 Setting up connection for downloading https://server4:443/vnjwazcjor at 42:54.614 on ClientConnection[c6f99b9508f26f5d/ca6b6665ed037870(V1) with server4/193.167.100.100:443] 10.318 Original destination connection id: c6f99b9508f26f5d (scid: ca6b6665ed037870) >- CryptoStream[I|ClientHello] 10.319 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.519/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.319 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.347 <- (4) Packet A|6|S0|826da4949076f0f8|37|2 AckFrame[1|Δ0] MaxStreamsFrame[B,101] 10.348 -> Packet A|3|S0|a341d4407cfdcacdd7|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3|Δ0] 10.348 <- (5) Packet A|7|S0|826da4949076f0f8|1252|2 PingFrame[] Padding(1222) 10.348 -> Packet A|4|S0|a341d4407cfdcacdd7|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3|Δ0] 10.518 loss detection timeout handler running Sending probe 0, because no ack since 10.319. Current RTT: 100/25. 10.518 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.519 (Probe is an initial retransmit) 10.519 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.919/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.519 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.918 loss detection timeout handler running Sending probe 1, because no ack since 10.519. Current RTT: 100/25. 10.918 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.918 (Probe is an initial retransmit) 10.919 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.719/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.919 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.920 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.720/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.920 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.952 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 10.953 probe count not reset on ack because handshake not yet confirmed 10.953 Retransmitting CryptoFrame[0,257] on level Initial 10.953 Cwnd(-): 6000; inflight: 1200 10.953 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.753/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.953 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 11.341/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.953 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 10.952 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,739] Padding(252) 10.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 11.344/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.956 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 10.956 - unknown transport parameter 0xff04de1b, size 2 10.957 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 10.959 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 11.347/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.959 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.960 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.057/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.960 Discarding pn space Initial because first Handshake message is being sent 10.960 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 10.960 Starting downloading https://server4:443/vnjwazcjor at 42:55.256 on ClientConnection[c6f99b9508f26f5d/ca6b6665ed037870(V1) with server4/193.167.100.100:443] 10.961 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.058/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.961 -> Packet A|0|S0|fa4ddd8b5b8334f2c7|48|1 StreamFrame[0(CIB),0,17,fin] 10.986 Discarding packet (1220 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.991 <- (3) Packet A|3|S0|ca6b6665ed037870|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|fa4d3225a909d623f1|d52124dff0e3bd16653fe02efb75509c] Padding(1161) 10.991 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 11.056/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 11.084/App, because ackElicitingInFlight | RTT:33/16 10.992 Discarding pn space Handshake because HandshakeDone is received 10.992 <- (4) Packet A|4|S0|ca6b6665ed037870|1252|2 PingFrame[] Padding(1222) 10.992 <- (5) Packet A|5|S0|ca6b6665ed037870|338|1 CryptoFrame[0,305] 10.992 -> Packet A|1|S0|fa4ddd8b5b8334f2c7|32|1 AckFrame[4-3|Δ0] -< CryptoStream[A|NewSessionTicket] 10.993 <- (6) Packet A|6|S0|ca6b6665ed037870|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 10.993 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.994 -> Packet A|2|S0|fa4ddd8b5b8334f2c7|32|1 AckFrame[6-3|Δ0] 10.994 Finished downloading https://server4:443/vnjwazcjor at 42:55.290 on ClientConnection[c6f99b9508f26f5d/ca6b6665ed037870(V1) with server4/193.167.100.100:443] 10.994 Closing ClientConnection[c6f99b9508f26f5d/ca6b6665ed037870(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.994 -> Packet A|3|S0|fa4ddd8b5b8334f2c7|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 10.994 Creating connection with server4:443 with v1 10.995 Setting up connection for downloading https://server4:443/gakilggwqa at 42:55.291 on ClientConnection[c4677a478b86955e/ef95b7bc1e9378b9(V1) with server4/193.167.100.100:443] 10.995 Original destination connection id: c4677a478b86955e (scid: ef95b7bc1e9378b9) >- CryptoStream[I|ClientHello] 10.997 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.197/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.997 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.024 <- (7) Packet A|7|S0|ca6b6665ed037870|37|2 AckFrame[2|Δ0] MaxStreamsFrame[B,101] 11.025 -> Packet A|4|S0|fa4ddd8b5b8334f2c7|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 11.025 <- (8) Packet A|8|S0|ca6b6665ed037870|1332|2 PingFrame[] Padding(1302) 11.026 -> Packet A|5|S0|fa4ddd8b5b8334f2c7|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 11.030 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 11.030 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.230/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.030 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 11.033 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.130/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.033 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 11.033 - unknown transport parameter 0xff04de1b, size 2 11.033 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.035 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.132/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.035 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.035 Starting downloading https://server4:443/gakilggwqa at 42:55.332 on ClientConnection[c4677a478b86955e/ef95b7bc1e9378b9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 11.132/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.035 -> Packet H|0|L|81|1 CryptoFrame[0,36] 11.036 Discarding pn space Initial because first Handshake message is being sent 11.036 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 11.036 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.133/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.036 -> Packet A|0|S0|c158c35d77c3a24143|48|1 StreamFrame[0(CIB),0,17,fin] 11.068 <- (2) Packet A|3|S0|ef95b7bc1e9378b9|1220|2 PingFrame[] Padding(1190) 11.068 <- (3) Packet A|5|S0|ef95b7bc1e9378b9|92|3 AckFrame[0|Δ0] NewConnectionIdFrame[2,<1|d25c2b472b316150e3|cf827980572d91e2e1593dbcf2bd7183] NewConnectionIdFrame[3,<2|d25cc63bdefb967af7|3c7260907963585405fc5518961e98a3] 11.069 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.166/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.069 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 11.150/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 11.069 -> Packet A|1|S0|d25c2b472b316150e3|36|2 AckFrame[5,3|Δ0] RetireConnectionIdFrame[0] 11.069 <- (4) Packet A|6|S0|ef95b7bc1e9378b9|1057|1 StreamFrame[0(CIB),0,1024,fin] 11.070 Finished downloading https://server4:443/gakilggwqa at 42:55.366 on ClientConnection[c4677a478b86955e/ef95b7bc1e9378b9(V1) with server4/193.167.100.100:443] 11.070 Closing ClientConnection[c4677a478b86955e/ef95b7bc1e9378b9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.070 -> Packet A|2|S0|d25c2b472b316150e3|38|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3|Δ0] 11.070 Creating connection with server4:443 with v1 11.071 Setting up connection for downloading https://server4:443/ubcnjmhfsy at 42:55.367 on ClientConnection[e98758853fb926c9/4b63bfe89a2c9707(V1) with server4/193.167.100.100:443] 11.071 Original destination connection id: e98758853fb926c9 (scid: 4b63bfe89a2c9707) >- CryptoStream[I|ClientHello] 11.072 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.272/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.072 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.105 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 11.106 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.306/Initial, because peerAwaitingAddressValidation | RTT:100/25 11.107 <- (5) Packet A|8|S0|ef95b7bc1e9378b9|1220|5 AckFrame[1|Δ0] CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c158358c5a3fae7344|b61512b71a8d682cca5ae177dc7624b5] Padding(847) -< CryptoStream[I|ServerHello] 11.105 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 11.108 -> Packet A|3|S0|d25c2b472b316150e3|38|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3|Δ0] 11.108 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.205/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.108 - unknown transport parameter 0xff04de1b, size 2 11.108 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 11.108 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 11.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.208/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.111 -> Packet H|0|L|81|1 CryptoFrame[0,36] 11.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.111 Starting downloading https://server4:443/ubcnjmhfsy at 42:55.407 on ClientConnection[e98758853fb926c9/4b63bfe89a2c9707(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 11.208/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.111 Discarding pn space Initial because first Handshake message is being sent 11.111 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 11.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.208/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.111 -> Packet A|0|S0|22fb9f51b04e6da66f|48|1 StreamFrame[0(CIB),0,17,fin] 11.142 <- (2) Packet A|2|S0|4b63bfe89a2c9707|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|22fb1ee23c1b69ba94|1142efb985ce8e5b2a3ad9854777292b] Padding(1161) 11.143 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 11.208/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 11.234/App, because ackElicitingInFlight | RTT:33/16 11.143 Discarding pn space Handshake because HandshakeDone is received 11.143 <- (3) Packet A|3|S0|4b63bfe89a2c9707|1220|2 PingFrame[] Padding(1190) 11.143 <- (4) Packet A|4|S0|4b63bfe89a2c9707|338|1 CryptoFrame[0,305] 11.144 -> Packet A|1|S0|22fb9f51b04e6da66f|32|1 AckFrame[3-2|Δ0] -< CryptoStream[A|NewSessionTicket] 11.163 -> Packet A|2|S0|22fb9f51b04e6da66f|33|1 AckFrame[4-2|Δ19] 11.224 <- (6) Packet A|9|S0|ef95b7bc1e9378b9|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c158358c5a3fae7344|b61512b71a8d682cca5ae177dc7624b5] StreamFrame[0(CIB),0,848] 11.224 <- (7) Packet A|10|S0|ef95b7bc1e9378b9|211|1 StreamFrame[0(CIB),848,176,fin] 11.224 -> Packet A|4|S0|d25c2b472b316150e3|38|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3|Δ0] 11.234 loss detection timeout handler running Sending probe 0, because no ack since 11.111. Current RTT: 33/16. 11.234 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 11.481/App, because ackElicitingInFlight | RTT:33/16 11.235 -> Packet PA|3|S0|22fb9f51b04e6da66f|48|1 StreamFrame[0(CIB),0,17,fin] 11.255 <- (8) Packet A|11|S0|ef95b7bc1e9378b9|40|2 AckFrame[4,1|Δ0] ConnectionCloseFrame[0|0|] 11.275 <- (5) Packet A|5|S0|4b63bfe89a2c9707|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|22fb1ee23c1b69ba94|1142efb985ce8e5b2a3ad9854777292b] Padding(852) -< CryptoStream[A|NewSessionTicket] 11.295 -> Packet A|4|S0|22fb9f51b04e6da66f|33|1 AckFrame[5-2|Δ19] 11.326 <- (6) Packet A|6|S0|4b63bfe89a2c9707|1252|2 PingFrame[] Padding(1222) 11.346 -> Packet A|5|S0|22fb9f51b04e6da66f|33|1 AckFrame[6-2|Δ19] 11.378 <- (7) Packet A|7|S0|4b63bfe89a2c9707|1332|2 PingFrame[] Padding(1302) 11.397 -> Packet A|6|S0|22fb9f51b04e6da66f|33|1 AckFrame[7-2|Δ19] 11.480 loss detection timeout handler running Sending probe 1, because no ack since 11.235. Current RTT: 33/16. 11.480 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 11.972/App, because ackElicitingInFlight | RTT:33/16 11.480 -> Packet PA|7|S0|22fb9f51b04e6da66f|48|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 11.973/App, because ackElicitingInFlight | RTT:33/16 11.481 -> Packet PA|8|S0|22fb9f51b04e6da66f|48|1 StreamFrame[0(CIB),0,17,fin] 11.537 <- (8) Packet A|10|S0|4b63bfe89a2c9707|35|1 AckFrame[8-4|Δ0] 11.537 Cwnd(-): 6000; inflight: 0 11.538 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 11.538 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 133 millis, based on 11.672/App, because ackElicitingInFlight | RTT:36/18 11.538 -> Packet A|9|S0|22fb9f51b04e6da66f|48|1 StreamFrame[0(CIB),0,17,fin] 11.629 <- (9) Packet A|11|S0|4b63bfe89a2c9707|1332|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(274) 11.630 Finished downloading https://server4:443/ubcnjmhfsy at 42:55.926 on ClientConnection[e98758853fb926c9/4b63bfe89a2c9707(V1) with server4/193.167.100.100:443] 11.630 Closing ClientConnection[e98758853fb926c9/4b63bfe89a2c9707(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.630 -> Packet A|10|S0|22fb9f51b04e6da66f|36|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 11.631 Creating connection with server4:443 with v1 11.631 Setting up connection for downloading https://server4:443/wnhmhmmfcl at 42:55.927 on ClientConnection[503dfccc9abc0f67/c66e014d264e3fa8(V1) with server4/193.167.100.100:443] 11.631 Original destination connection id: 503dfccc9abc0f67 (scid: c66e014d264e3fa8) >- CryptoStream[I|ClientHello] 11.633 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.833/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.633 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.666 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 11.667 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.867/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.666 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 11.669 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.766/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.669 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 11.669 - unknown transport parameter 0xff04de1b, size 2 11.669 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 11.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.671 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.672 Starting downloading https://server4:443/wnhmhmmfcl at 42:55.968 on ClientConnection[503dfccc9abc0f67/c66e014d264e3fa8(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 11.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.672 Discarding pn space Initial because first Handshake message is being sent 11.672 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 11.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.770/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.673 -> Packet A|0|S0|62b51a853c1fe80e9e|48|1 StreamFrame[0(CIB),0,17,fin] 11.704 <- (2) Packet A|4|S0|c66e014d264e3fa8|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 11.724 -> Packet A|1|S0|62b51a853c1fe80e9e|33|1 AckFrame[4|Δ19] 11.756 <- (3) Packet A|5|S0|c66e014d264e3fa8|1220|4 AckFrame[1|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|62b5eb5765e15ab0db|da01530f24fa4ef06d9d7192de8d0904] Padding(1156) 11.756 Cwnd(-): 6000; inflight: 81 11.756 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 11.756 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.853/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.756 State is set to Confirmed reschedule loss detection timer for PTO over 11 millis, based on 11.768/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 11 millis, based on 11.768/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 122 millis, based on 11.879/App, because ackElicitingInFlight | RTT:33/16 11.757 Discarding pn space Handshake because HandshakeDone is received 11.756 -> Packet A|2|S0|62b51a853c1fe80e9e|48|1 StreamFrame[0(CIB),0,17,fin] 11.776 -> Packet A|3|S0|62b51a853c1fe80e9e|33|1 AckFrame[5|Δ19] 11.788 <- (4) Packet A|6|S0|c66e014d264e3fa8|1062|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 11.788 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.789 Finished downloading https://server4:443/wnhmhmmfcl at 42:56.085 on ClientConnection[503dfccc9abc0f67/c66e014d264e3fa8(V1) with server4/193.167.100.100:443] 11.789 Closing ClientConnection[503dfccc9abc0f67/c66e014d264e3fa8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.789 -> Packet A|4|S0|62b51a853c1fe80e9e|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 11.789 Creating connection with server4:443 with v1 11.790 Setting up connection for downloading https://server4:443/pbdtoslgvi at 42:56.086 on ClientConnection[8857aceaa83caac5/6a470e531a018476(V1) with server4/193.167.100.100:443] 11.790 Original destination connection id: 8857aceaa83caac5 (scid: 6a470e531a018476) >- CryptoStream[I|ClientHello] 11.791 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.991/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.791 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.990 loss detection timeout handler running Sending probe 0, because no ack since 11.791. Current RTT: 100/25. 11.991 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.991 (Probe is an initial retransmit) 11.991 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.391/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.991 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.175 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 12.175 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,740] Padding(256) 12.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.579/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.179 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 12.179 - unknown transport parameter 0xff04de1b, size 2 12.179 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 12.182 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.582/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.182 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.182 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.182 Starting downloading https://server4:443/pbdtoslgvi at 42:56.478 on ClientConnection[8857aceaa83caac5/6a470e531a018476(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 199 millis, based on 12.382/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.182 Discarding pn space Initial because first Handshake message is being sent 12.182 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 12.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.383/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.183 -> Packet A|0|S0|f8c62704733b6814bb|48|1 StreamFrame[0(CIB),0,17,fin] 12.382 loss detection timeout handler running Sending probe 0, because no ack since 12.182. Current RTT: 100/25. 12.382 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.382 (Probe is a handshake retransmit) 12.383 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.783/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.382 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 12.414 <- (2) Packet A|4|S0|6a470e531a018476|1220|6 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f8c67cc2062e2fc714|2ae911a47a9ede105c739fe3ac62bd2e] NewConnectionIdFrame[2,<1|c3faa902764efbcf4f|e471cb76413a1c98aa871cc566e5233c] NewConnectionIdFrame[3,<2|c3fa5299061d564e42|307c781bf3ac60be20c3045939f81f8f] Padding(1098) 12.415 probe count not reset on ack because handshake not yet confirmed 12.415 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.815/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.415 State is set to Confirmed reschedule loss detection timer for PTO over 1349 millis, based on 13.764/Handshake, because ackElicitingInFlight | RTT:231/115 12.415 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.415 Discarding pn space Handshake because HandshakeDone is received 12.415 <- (3) Packet A|5|S0|6a470e531a018476|1220|2 PingFrame[] Padding(1190) reschedule loss detection timer for PTO over 716 millis, based on 13.133/App, because ackElicitingInFlight | RTT:231/115 12.416 -> Packet A|1|S0|c3faa902764efbcf4f|36|3 RetireConnectionIdFrame[0] AckFrame[4|Δ0] RetireConnectionIdFrame[1] 12.416 <- (4) Packet A|6|S0|6a470e531a018476|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 12.416 -> Packet A|2|S0|c3faa902764efbcf4f|32|1 AckFrame[6-4|Δ0] 12.417 <- (5) Packet A|7|S0|6a470e531a018476|1057|1 StreamFrame[0(CIB),0,1024,fin] 12.417 Finished downloading https://server4:443/pbdtoslgvi at 42:56.713 on ClientConnection[8857aceaa83caac5/6a470e531a018476(V1) with server4/193.167.100.100:443] 12.417 Closing ClientConnection[8857aceaa83caac5/6a470e531a018476(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.418 -> Packet A|3|S0|c3faa902764efbcf4f|36|2 ConnectionCloseFrame[0|0|] AckFrame[7-4|Δ0] 12.418 Creating connection with server4:443 with v1 12.418 Setting up connection for downloading https://server4:443/bfuavriecx at 42:56.714 on ClientConnection[a489e0901ddbfdba/1b95a1727b2424d3(V1) with server4/193.167.100.100:443] 12.418 Original destination connection id: a489e0901ddbfdba (scid: 1b95a1727b2424d3) >- CryptoStream[I|ClientHello] 12.420 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.620/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.419 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.448 <- (6) Packet A|8|S0|6a470e531a018476|40|2 AckFrame[3,1|Δ0] ConnectionCloseFrame[0|0|] 12.453 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.453 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.653/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.554/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.453 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 12.456 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 12.457 - unknown transport parameter 0xff04de1b, size 2 12.457 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 12.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.556/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.459 -> Packet H|0|L|81|1 CryptoFrame[0,36] 12.459 Starting downloading https://server4:443/bfuavriecx at 42:56.755 on ClientConnection[a489e0901ddbfdba/1b95a1727b2424d3(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.460 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.557/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.460 Discarding pn space Initial because first Handshake message is being sent 12.460 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.557/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.460 -> Packet A|0|S0|0256b5ed9531510d71|48|1 StreamFrame[0(CIB),0,17,fin] 12.460 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 12.491 <- (2) Packet A|3|S0|1b95a1727b2424d3|1220|2 PingFrame[] Padding(1190) 12.492 <- (3) Packet A|4|S0|1b95a1727b2424d3|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 12.492 -> Packet A|1|S0|0256b5ed9531510d71|32|1 AckFrame[4-3|Δ0] 12.493 <- (4) Packet A|6|S0|1b95a1727b2424d3|1057|1 StreamFrame[0(CIB),0,1024,fin] 12.493 Finished downloading https://server4:443/bfuavriecx at 42:56.789 on ClientConnection[a489e0901ddbfdba/1b95a1727b2424d3(V1) with server4/193.167.100.100:443] 12.493 Closing ClientConnection[a489e0901ddbfdba/1b95a1727b2424d3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.494 Creating connection with server4:443 with v1 12.494 -> Packet A|2|S0|0256b5ed9531510d71|38|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-3|Δ0] 12.494 Setting up connection for downloading https://server4:443/vwwutmndxx at 42:56.790 on ClientConnection[9c44d1ea48d2bcb7/12c1011cfad7d0dd(V1) with server4/193.167.100.100:443] 12.494 Original destination connection id: 9c44d1ea48d2bcb7 (scid: 12c1011cfad7d0dd) >- CryptoStream[I|ClientHello] 12.496 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.696/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.496 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.524 <- (5) Packet A|7|S0|1b95a1727b2424d3|1252|2 PingFrame[] Padding(1222) 12.524 -> Packet A|3|S0|0256b5ed9531510d71|38|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-3|Δ0] 12.524 <- (6) Packet A|8|S0|1b95a1727b2424d3|38|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 12.529 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.530 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.730/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.529 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 12.532 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.629/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.532 - unknown transport parameter 0xff04de1b, size 2 12.532 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 12.532 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 12.534 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 12.631/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.534 -> Packet H|0|L|81|1 CryptoFrame[0,36] 12.534 Starting downloading https://server4:443/vwwutmndxx at 42:56.830 on ClientConnection[9c44d1ea48d2bcb7/12c1011cfad7d0dd(V1) with server4/193.167.100.100:443] 12.534 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.631/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.534 Discarding pn space Initial because first Handshake message is being sent 12.534 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 12.535 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.632/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.535 -> Packet A|0|S0|48221e17322eccd60e|48|1 StreamFrame[0(CIB),0,17,fin] 12.566 <- (2) Packet A|2|S0|12c1011cfad7d0dd|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|48222068a1e672e79d|bd80ba3105bfe7facea921318c8eefe3] Padding(1161) 12.566 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 12.631/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 12.658/App, because ackElicitingInFlight | RTT:33/16 12.566 Discarding pn space Handshake because HandshakeDone is received 12.568 <- (3) Packet A|5|S0|12c1011cfad7d0dd|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 12.568 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.568 Finished downloading https://server4:443/vwwutmndxx at 42:56.864 on ClientConnection[9c44d1ea48d2bcb7/12c1011cfad7d0dd(V1) with server4/193.167.100.100:443] 12.568 -> Packet A|1|S0|48221e17322eccd60e|35|1 AckFrame[5,2|Δ1] 12.568 Closing ClientConnection[9c44d1ea48d2bcb7/12c1011cfad7d0dd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.569 -> Packet A|2|S0|48221e17322eccd60e|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 12.569 Creating connection with server4:443 with v1 12.569 Setting up connection for downloading https://server4:443/galpnunwkf at 42:56.865 on ClientConnection[eeead58feae15451/4590f13763ac1755(V1) with server4/193.167.100.100:443] 12.569 Original destination connection id: eeead58feae15451 (scid: 4590f13763ac1755) >- CryptoStream[I|ClientHello] 12.571 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.771/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.571 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.698 <- (4) Packet A|6|S0|12c1011cfad7d0dd|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|48222068a1e672e79d|bd80ba3105bfe7facea921318c8eefe3] Padding(852) 12.698 -> Packet A|3|S0|48221e17322eccd60e|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 12.729 <- (5) Packet A|7|S0|12c1011cfad7d0dd|38|2 AckFrame[3|Δ0] ConnectionCloseFrame[0|0|] 12.770 loss detection timeout handler running Sending probe 0, because no ack since 12.571. Current RTT: 100/25. 12.770 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.770 (Probe is an initial retransmit) 12.770 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.170/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.770 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.804 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 12.804 probe count not reset on ack because handshake not yet confirmed 12.804 Retransmitting CryptoFrame[0,257] on level Initial 12.804 Cwnd(-): 6000; inflight: 0 12.804 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.204/Initial, because peerAwaitingAddressValidation | RTT:100/25 12.805 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 12.999/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.804 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 12.804 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 12.807 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.001/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.807 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 12.807 - unknown transport parameter 0xff04de1b, size 2 12.808 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 12.810 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.004/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.810 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.810 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.810 Starting downloading https://server4:443/galpnunwkf at 42:57.107 on ClientConnection[eeead58feae15451/4590f13763ac1755(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 12.907/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.811 Discarding pn space Initial because first Handshake message is being sent 12.810 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 12.811 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.908/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.811 -> Packet A|0|S0|b1e4f68c540580838b|48|1 StreamFrame[0(CIB),0,17,fin] 12.842 <- (2) Packet A|2|S0|4590f13763ac1755|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b1e447c263166aaf76|dc3eff5077ca4da1b54c860c80d785f6] Padding(1161) 12.842 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 12.907/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 12.934/App, because ackElicitingInFlight | RTT:33/16 12.842 Discarding pn space Handshake because HandshakeDone is received 12.843 <- (3) Packet A|3|S0|4590f13763ac1755|1220|2 PingFrame[] Padding(1190) 12.843 -> Packet A|1|S0|b1e4f68c540580838b|32|1 AckFrame[3-2|Δ0] 12.933 loss detection timeout handler running Sending probe 0, because no ack since 12.811. Current RTT: 33/16. 12.934 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 13.180/App, because ackElicitingInFlight | RTT:33/16 12.934 -> Packet PA|2|S0|b1e4f68c540580838b|48|1 StreamFrame[0(CIB),0,17,fin] 12.965 <- (4) Packet A|5|S0|4590f13763ac1755|1062|2 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024,fin] 12.966 Cwnd(-): 3000; inflight: 0 12.966 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.966 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 13.077/App, because ackElicitingInFlight | RTT:33/13 12.966 -> Packet A|3|S0|b1e4f68c540580838b|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-2|Δ0] 12.967 Finished downloading https://server4:443/galpnunwkf at 42:57.263 on ClientConnection[eeead58feae15451/4590f13763ac1755(V1) with server4/193.167.100.100:443] 12.967 Closing ClientConnection[eeead58feae15451/4590f13763ac1755(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.967 -> Packet A|4|S0|b1e4f68c540580838b|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 12.967 Creating connection with server4:443 with v1 12.968 Setting up connection for downloading https://server4:443/qymhxlsxax at 42:57.264 on ClientConnection[30ccc4e80f8df288/a6bbb18dfef16652(V1) with server4/193.167.100.100:443] 12.968 Original destination connection id: 30ccc4e80f8df288 (scid: a6bbb18dfef16652) >- CryptoStream[I|ClientHello] 12.969 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.169/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.969 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.003 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.003 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.203/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.003 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 13.005 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.102/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.006 - unknown transport parameter 0xff04de1b, size 2 13.006 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 13.005 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 13.008 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.105/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.008 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.009 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.009 Starting downloading https://server4:443/qymhxlsxax at 42:57.305 on ClientConnection[30ccc4e80f8df288/a6bbb18dfef16652(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 13.106/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.009 Discarding pn space Initial because first Handshake message is being sent 13.009 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.106/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.009 -> [Packet H|1|L|47|1 AckFrame[1|Δ0], Packet A|0|S0|f9cb03d3770d22503a|48|1 StreamFrame[0(CIB),0,17,fin]] 13.023 <- (5) Packet A|7|S0|4590f13763ac1755|35|1 AckFrame[3-2|Δ0] 13.023 -> Packet A|5|S0|b1e4f68c540580838b|38|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2|Δ0] 13.105 loss detection timeout handler running Sending probe 0, because no ack since 13.008. Current RTT: 33/16. 13.105 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.106 (Probe is a handshake retransmit) 13.106 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.300/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.106 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 13.299 loss detection timeout handler running Sending probe 1, because no ack since 13.009. Current RTT: 33/16. 13.299 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.299 (Probe is a handshake retransmit) 13.299 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 13.687/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.299 -> Packet PH|3|L|81|1 CryptoFrame[0,36] 13.300 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 13.688/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.300 -> Packet PH|4|L|81|1 CryptoFrame[0,36] 13.331 <- (2) Packet A|2|S0|a6bbb18dfef16652|1220|4 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f9cb75547af0d36dfe|c9d601a55fd4edc0a7542a70d2295f06] Padding(1156) 13.331 probe count not reset on ack because handshake not yet confirmed 13.332 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 13.720/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.332 State is set to Confirmed reschedule loss detection timer for PTO over 1588 millis, based on 14.920/Handshake, because ackElicitingInFlight | RTT:69/84 13.332 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.332 Discarding pn space Handshake because HandshakeDone is received 13.332 <- (3) Packet A|3|S0|a6bbb18dfef16652|1220|2 PingFrame[] Padding(1190) 13.332 <- (4) Packet A|4|S0|a6bbb18dfef16652|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 13.333 -> Packet A|1|S0|f9cb03d3770d22503a|32|1 AckFrame[3-2|Δ0] 13.333 <- (5) Packet A|5|S0|a6bbb18dfef16652|1057|1 StreamFrame[0(CIB),0,1024,fin] 13.333 -> Packet A|2|S0|f9cb03d3770d22503a|32|1 AckFrame[5-2|Δ0] 13.334 Finished downloading https://server4:443/qymhxlsxax at 42:57.630 on ClientConnection[30ccc4e80f8df288/a6bbb18dfef16652(V1) with server4/193.167.100.100:443] 13.334 Closing ClientConnection[30ccc4e80f8df288/a6bbb18dfef16652(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.334 -> Packet A|3|S0|f9cb03d3770d22503a|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 13.334 Creating connection with server4:443 with v1 13.335 Setting up connection for downloading https://server4:443/jdcpukegyn at 42:57.631 on ClientConnection[4bf186561104266a/626fdab963faea28(V1) with server4/193.167.100.100:443] 13.335 Original destination connection id: 4bf186561104266a (scid: 626fdab963faea28) >- CryptoStream[I|ClientHello] 13.336 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.536/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.336 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.363 <- (6) Packet A|6|S0|a6bbb18dfef16652|92|3 AckFrame[1|Δ0] NewConnectionIdFrame[2,<1|4311414d14be7420ee|e157b49f1bf60e94fcf55d56e9626880] NewConnectionIdFrame[3,<2|431101f45e3c5f4356|e501b14ff15edbe94dd213f11c9e488d] 13.364 -> Packet A|4|S0|f9cb03d3770d22503a|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 13.364 <- (7) Packet A|7|S0|a6bbb18dfef16652|1252|2 PingFrame[] Padding(1222) 13.364 <- (8) Packet A|8|S0|a6bbb18dfef16652|37|2 AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 13.365 -> Packet A|5|S0|f9cb03d3770d22503a|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 13.369 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.369 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.569/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.369 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 13.371 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.468/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.371 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 13.372 - unknown transport parameter 0xff04de1b, size 2 13.372 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 13.374 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.471/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.373 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.374 Starting downloading https://server4:443/jdcpukegyn at 42:57.670 on ClientConnection[4bf186561104266a/626fdab963faea28(V1) with server4/193.167.100.100:443] 13.374 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.471/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.374 Discarding pn space Initial because first Handshake message is being sent 13.374 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 13.374 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.471/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.374 -> Packet A|0|S0|aa5f294cff42f18b83|48|1 StreamFrame[0(CIB),0,17,fin] 13.405 <- (2) Packet A|2|S0|626fdab963faea28|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|aa5f0703399ce1d014|e89c021a9d7710d70fe9902f9b6c51ed] Padding(1161) 13.406 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 13.470/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 13.497/App, because ackElicitingInFlight | RTT:33/16 13.406 Discarding pn space Handshake because HandshakeDone is received 13.406 <- (3) Packet A|3|S0|626fdab963faea28|1220|2 PingFrame[] Padding(1190) 13.406 -> Packet A|1|S0|aa5f294cff42f18b83|32|1 AckFrame[3-2|Δ0] 13.470 <- (9) Packet A|9|S0|a6bbb18dfef16652|90|3 MaxStreamsFrame[B,101] NewConnectionIdFrame[2,<1|4311414d14be7420ee|e157b49f1bf60e94fcf55d56e9626880] NewConnectionIdFrame[3,<2|431101f45e3c5f4356|e501b14ff15edbe94dd213f11c9e488d] 13.470 -> Packet A|6|S0|f9cb03d3770d22503a|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 13.497 loss detection timeout handler running Sending probe 0, because no ack since 13.374. Current RTT: 33/16. 13.497 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 13.743/App, because ackElicitingInFlight | RTT:33/16 13.497 -> Packet PA|2|S0|aa5f294cff42f18b83|48|1 StreamFrame[0(CIB),0,17,fin] 13.659 <- (4) Packet A|6|S0|626fdab963faea28|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|aa5f0703399ce1d014|e89c021a9d7710d70fe9902f9b6c51ed] Padding(852) -< CryptoStream[A|NewSessionTicket] 13.679 -> Packet A|3|S0|aa5f294cff42f18b83|35|1 AckFrame[6,3-2|Δ19] 13.743 loss detection timeout handler running Sending probe 1, because no ack since 13.497. Current RTT: 33/16. 13.743 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 14.235/App, because ackElicitingInFlight | RTT:33/16 13.743 -> Packet PA|4|S0|aa5f294cff42f18b83|48|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 14.236/App, because ackElicitingInFlight | RTT:33/16 13.744 -> Packet PA|5|S0|aa5f294cff42f18b83|48|1 StreamFrame[0(CIB),0,17,fin] 14.055 <- (5) Packet A|10|S0|626fdab963faea28|1220|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(162) 14.056 Finished downloading https://server4:443/jdcpukegyn at 42:58.352 on ClientConnection[4bf186561104266a/626fdab963faea28(V1) with server4/193.167.100.100:443] 14.056 Closing ClientConnection[4bf186561104266a/626fdab963faea28(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.057 -> Packet A|6|S0|aa5f294cff42f18b83|40|2 ConnectionCloseFrame[0|0|] AckFrame[10,6,3-2|Δ0] 14.057 Creating connection with server4:443 with v1 14.058 Setting up connection for downloading https://server4:443/ryjudmbrjx at 42:58.354 on ClientConnection[d77edb2507e8c7f4/823fe9cd80ded2b2(V1) with server4/193.167.100.100:443] 14.058 Original destination connection id: d77edb2507e8c7f4 (scid: 823fe9cd80ded2b2) >- CryptoStream[I|ClientHello] 14.059 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.259/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.059 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.092 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.093 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.293/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.092 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 14.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.192/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.095 - unknown transport parameter 0xff04de1b, size 2 14.095 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 14.095 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 14.097 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.194/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.097 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.098 Starting downloading https://server4:443/ryjudmbrjx at 42:58.394 on ClientConnection[d77edb2507e8c7f4/823fe9cd80ded2b2(V1) with server4/193.167.100.100:443] 14.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.195/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.098 Discarding pn space Initial because first Handshake message is being sent 14.098 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 14.099 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.196/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.098 -> Packet A|0|S0|bac912c118b5b9950d|48|1 StreamFrame[0(CIB),0,17,fin] 14.129 <- (2) Packet A|2|S0|823fe9cd80ded2b2|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|bac9a3e916f474a780|dced4fe5c34f6dc3e65d635964354730] NewConnectionIdFrame[2,<1|a9c9d5e84b85ae2758|b0b61d54bc24f6ee8feaf83827e7515a] NewConnectionIdFrame[3,<2|a9c93b7f2a0b46af34|1fa4e1576a9a36606b005e2be8ab0637] Padding(1103) 14.129 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 14.194/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 14.221/App, because ackElicitingInFlight | RTT:33/16 14.129 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 122 millis, based on 14.253/App, because ackElicitingInFlight | RTT:33/16 14.130 -> Packet A|1|S0|a9c9d5e84b85ae2758|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] 14.130 <- (3) Packet A|3|S0|823fe9cd80ded2b2|1220|2 PingFrame[] Padding(1190) 14.130 <- (4) Packet A|4|S0|823fe9cd80ded2b2|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 14.131 -> Packet A|2|S0|a9c9d5e84b85ae2758|32|1 AckFrame[4-2|Δ0] 14.131 <- (5) Packet A|5|S0|823fe9cd80ded2b2|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 121 millis, based on 14.253/App, because ackElicitingInFlight | RTT:33/16 14.132 Finished downloading https://server4:443/ryjudmbrjx at 42:58.428 on ClientConnection[d77edb2507e8c7f4/823fe9cd80ded2b2(V1) with server4/193.167.100.100:443] 14.132 Closing ClientConnection[d77edb2507e8c7f4/823fe9cd80ded2b2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.132 Creating connection with server4:443 with v1 14.132 -> Packet A|3|S0|a9c9d5e84b85ae2758|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 14.133 Setting up connection for downloading https://server4:443/paezayzggr at 42:58.429 on ClientConnection[442f984b832b9560/437a0307d57462c5(V1) with server4/193.167.100.100:443] 14.133 Original destination connection id: 442f984b832b9560 (scid: 437a0307d57462c5) >- CryptoStream[I|ClientHello] 14.134 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.334/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.134 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.163 <- (6) Packet A|7|S0|823fe9cd80ded2b2|38|2 AckFrame[3-1|Δ0] ConnectionCloseFrame[0|0|] 14.167 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.168 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.368/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.167 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 14.170 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.267/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.170 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 14.170 - unknown transport parameter 0xff04de1b, size 2 14.170 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 14.172 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.269/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.172 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.172 Starting downloading https://server4:443/paezayzggr at 42:58.468 on ClientConnection[442f984b832b9560/437a0307d57462c5(V1) with server4/193.167.100.100:443] 14.172 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.269/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.172 Discarding pn space Initial because first Handshake message is being sent 14.172 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 14.172 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.270/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.172 -> Packet A|0|S0|207075b6bea8b57abe|48|1 StreamFrame[0(CIB),0,17,fin] 14.269 loss detection timeout handler running Sending probe 0, because no ack since 14.172. Current RTT: 33/16. 14.269 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.269 (Probe is a handshake retransmit) 14.269 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.463/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.269 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 14.302 <- (2) Packet A|4|S0|437a0307d57462c5|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 14.303 <- (3) Packet A|5|S0|437a0307d57462c5|1057|1 StreamFrame[0(CIB),0,1024,fin] 14.303 -> Packet A|1|S0|207075b6bea8b57abe|32|1 AckFrame[5-4|Δ0] 14.303 Finished downloading https://server4:443/paezayzggr at 42:58.599 on ClientConnection[442f984b832b9560/437a0307d57462c5(V1) with server4/193.167.100.100:443] 14.303 Closing ClientConnection[442f984b832b9560/437a0307d57462c5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.304 -> Packet A|2|S0|207075b6bea8b57abe|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 14.304 Creating connection with server4:443 with v1 14.304 Setting up connection for downloading https://server4:443/bmvbsoylsf at 42:58.600 on ClientConnection[a9579af4b7ce2930/aac93a2f0121035b(V1) with server4/193.167.100.100:443] 14.304 Original destination connection id: a9579af4b7ce2930 (scid: aac93a2f0121035b) >- CryptoStream[I|ClientHello] 14.306 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.506/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.305 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.341 <- (4) Packet A|7|S0|437a0307d57462c5|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|20708fe7a04e5dcfc2|4ddc2c4ce0c6faeebdfcd76d217d87e3] Padding(1161) 14.341 -> Packet A|3|S0|207075b6bea8b57abe|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 14.372 <- (5) Packet A|8|S0|437a0307d57462c5|40|2 AckFrame[3,1-0|Δ0] ConnectionCloseFrame[0|0|] 14.505 loss detection timeout handler running Sending probe 0, because no ack since 14.305. Current RTT: 100/25. 14.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.505 (Probe is an initial retransmit) 14.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.905/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.505 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.539 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 14.539 probe count not reset on ack because handshake not yet confirmed 14.539 Retransmitting CryptoFrame[0,257] on level Initial 14.539 Cwnd(-): 6000; inflight: 0 14.539 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.939/Initial, because peerAwaitingAddressValidation | RTT:100/25 14.540 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 14.734/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.540 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 14.539 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 14.543 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.737/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.542 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 14.543 - unknown transport parameter 0xff04de1b, size 2 14.543 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 14.545 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.739/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.545 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.545 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.545 Starting downloading https://server4:443/bmvbsoylsf at 42:58.841 on ClientConnection[a9579af4b7ce2930/aac93a2f0121035b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 14.642/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.545 Discarding pn space Initial because first Handshake message is being sent 14.545 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 14.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.643/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.546 -> Packet A|0|S0|5b1525194cf09ad04b|48|1 StreamFrame[0(CIB),0,17,fin] 14.577 <- (2) Packet A|2|S0|aac93a2f0121035b|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5b1566d3d26dc2b642|26a54f4cfdf082ab938fe1019cc60c09] Padding(1161) 14.577 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 14.642/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 14.669/App, because ackElicitingInFlight | RTT:33/16 14.577 Discarding pn space Handshake because HandshakeDone is received 14.578 <- (3) Packet A|4|S0|aac93a2f0121035b|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 14.578 <- (4) Packet A|5|S0|aac93a2f0121035b|92|3 AckFrame[0|Δ0] NewConnectionIdFrame[2,<1|787aed8629cba2b993|f8605df94a9fec960cb988d19b317733] NewConnectionIdFrame[3,<2|787a00a3bf24c1585a|e823bd5e773c15528224130319d1bbf7] 14.578 -> Packet A|1|S0|5b1525194cf09ad04b|35|1 AckFrame[4,2|Δ1] 14.578 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.579 <- (5) Packet A|6|S0|aac93a2f0121035b|1057|1 StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 106 millis, based on 14.686/App, because ackElicitingInFlight | RTT:33/12 14.579 -> Packet A|2|S0|787aed8629cba2b993|38|3 RetireConnectionIdFrame[0] AckFrame[5-4,2|Δ0] RetireConnectionIdFrame[1] 14.579 Finished downloading https://server4:443/bmvbsoylsf at 42:58.876 on ClientConnection[a9579af4b7ce2930/aac93a2f0121035b(V1) with server4/193.167.100.100:443] 14.579 Closing ClientConnection[a9579af4b7ce2930/aac93a2f0121035b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.580 -> Packet A|3|S0|787aed8629cba2b993|38|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,2|Δ0] 14.580 Creating connection with server4:443 with v1 14.580 Setting up connection for downloading https://server4:443/botobtlofv at 42:58.876 on ClientConnection[55b2411a5f389f50/502723b5880d463a(V1) with server4/193.167.100.100:443] 14.580 Original destination connection id: 55b2411a5f389f50 (scid: 502723b5880d463a) >- CryptoStream[I|ClientHello] 14.581 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.781/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.581 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.610 <- (6) Packet A|7|S0|aac93a2f0121035b|38|2 AckFrame[3-2|Δ0] ConnectionCloseFrame[0|0|] 14.781 loss detection timeout handler running Sending probe 0, because no ack since 14.581. Current RTT: 100/25. 14.781 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.781 (Probe is an initial retransmit) 14.781 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.181/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.781 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.065 <- (1) Packet I|5|L|175|2 Token=[] CryptoFrame[0,123] PingFrame[] -< CryptoStream[I|ServerHello] 15.065 <- (1) Packet H|6|L|1045|2 CryptoFrame[0,742] Padding(253) 15.068 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 15.468/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.068 -> Packet I|2|L|1201|2 Token=[] AckFrame[5|Δ0] Padding(1152) 15.068 - unknown transport parameter 0xff04de1b, size 2 15.069 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 15.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 15.471/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.070 -> Packet H|0|L|81|1 CryptoFrame[0,36] 15.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.271/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.071 Discarding pn space Initial because first Handshake message is being sent 15.071 -> Packet H|1|L|47|1 AckFrame[6|Δ0] 15.071 Starting downloading https://server4:443/botobtlofv at 42:59.367 on ClientConnection[55b2411a5f389f50/502723b5880d463a(V1) with server4/193.167.100.100:443] 15.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.271/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.071 -> Packet A|0|S0|801854120cad802159|48|1 StreamFrame[0(CIB),0,17,fin] 15.103 <- (2) Packet A|8|S0|502723b5880d463a|1252|2 PingFrame[] Padding(1222) 15.123 -> Packet A|1|S0|801854120cad802159|33|1 AckFrame[8|Δ19] 15.154 <- (3) Packet A|11|S0|502723b5880d463a|1332|2 PingFrame[] Padding(1302) 15.174 -> Packet A|2|S0|801854120cad802159|35|1 AckFrame[11,8|Δ19] 15.206 <- (4) Packet A|14|S0|502723b5880d463a|1412|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(354) 15.206 Finished downloading https://server4:443/botobtlofv at 42:59.502 on ClientConnection[55b2411a5f389f50/502723b5880d463a(V1) with server4/193.167.100.100:443] 15.206 Closing ClientConnection[55b2411a5f389f50/502723b5880d463a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.207 -> Packet A|3|S0|801854120cad802159|40|2 ConnectionCloseFrame[0|0|] AckFrame[14,11,8|Δ0] 15.207 Creating connection with server4:443 with v1 15.207 Setting up connection for downloading https://server4:443/uhybxmrvxy at 42:59.504 on ClientConnection[5daab6f2404236dd/c6e43e7200bbf3d1(V1) with server4/193.167.100.100:443] 15.207 Original destination connection id: 5daab6f2404236dd (scid: c6e43e7200bbf3d1) >- CryptoStream[I|ClientHello] 15.209 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.409/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.208 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.238 <- (5) Packet A|15|S0|502723b5880d463a|38|2 AckFrame[3-0|Δ0] ConnectionCloseFrame[0|0|] 15.392 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 15.392 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,740] Padding(256) 15.395 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.596/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.395 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 15.396 - unknown transport parameter 0xff04de1b, size 2 15.396 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 15.398 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.598/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.398 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.398 Starting downloading https://server4:443/uhybxmrvxy at 42:59.694 on ClientConnection[5daab6f2404236dd/c6e43e7200bbf3d1(V1) with server4/193.167.100.100:443] 15.398 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.598/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.398 Discarding pn space Initial because first Handshake message is being sent 15.398 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 15.399 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.599/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.399 -> Packet A|0|S0|2aeff24825ccfc9831|48|1 StreamFrame[0(CIB),0,17,fin] 15.430 <- (2) Packet A|4|S0|c6e43e7200bbf3d1|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2aef60211d8c3c02f5|6153955727279c01c355a0539ec7b1ac] Padding(1161) 15.430 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 15.598/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 15.625/App, because ackElicitingInFlight | RTT:100/25 15.430 Discarding pn space Handshake because HandshakeDone is received 15.431 <- (3) Packet A|5|S0|c6e43e7200bbf3d1|1220|2 PingFrame[] Padding(1190) 15.431 <- (4) Packet A|6|S0|c6e43e7200bbf3d1|338|1 CryptoFrame[0,305] 15.431 -> Packet A|1|S0|2aeff24825ccfc9831|32|1 AckFrame[5-4|Δ0] -< CryptoStream[A|NewSessionTicket] 15.432 <- (5) Packet A|7|S0|c6e43e7200bbf3d1|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 15.432 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.432 -> Packet A|2|S0|2aeff24825ccfc9831|33|1 AckFrame[7-4|Δ1] 15.432 Finished downloading https://server4:443/uhybxmrvxy at 42:59.729 on ClientConnection[5daab6f2404236dd/c6e43e7200bbf3d1(V1) with server4/193.167.100.100:443] 15.433 Closing ClientConnection[5daab6f2404236dd/c6e43e7200bbf3d1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.433 -> Packet A|3|S0|2aeff24825ccfc9831|36|2 ConnectionCloseFrame[0|0|] AckFrame[7-4|Δ0] 15.433 Creating connection with server4:443 with v1 15.434 Setting up connection for downloading https://server4:443/ynfkwvjtdk at 42:59.730 on ClientConnection[c2df33e84b42ce79/6ace9ccf6a74c13d(V1) with server4/193.167.100.100:443] 15.434 Original destination connection id: c2df33e84b42ce79 (scid: 6ace9ccf6a74c13d) >- CryptoStream[I|ClientHello] 15.435 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.635/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.435 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.463 <- (6) Packet A|8|S0|c6e43e7200bbf3d1|1252|2 PingFrame[] Padding(1222) 15.463 <- (7) Packet A|9|S0|c6e43e7200bbf3d1|37|2 AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 15.463 -> Packet A|4|S0|2aeff24825ccfc9831|36|2 ConnectionCloseFrame[0|0|] AckFrame[7-4|Δ0] 15.463 -> Packet A|5|S0|2aeff24825ccfc9831|36|2 ConnectionCloseFrame[0|0|] AckFrame[7-4|Δ0] 15.468 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.468 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.668/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.468 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 15.471 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.568/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.471 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 15.471 - unknown transport parameter 0xff04de1b, size 2 15.471 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 15.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.570/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.473 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.473 Starting downloading https://server4:443/ynfkwvjtdk at 42:59.770 on ClientConnection[c2df33e84b42ce79/6ace9ccf6a74c13d(V1) with server4/193.167.100.100:443] 15.473 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 15.474 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.571/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.474 -> Packet A|0|S0|a0d5a70132ef776fbe|48|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 96 millis, based on 15.570/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.474 Discarding pn space Initial because first Handshake message is being sent 15.494 <- (8) Packet A|10|S0|c6e43e7200bbf3d1|40|2 AckFrame[5,2-1|Δ0] ConnectionCloseFrame[0|0|] 15.505 <- (2) Packet A|2|S0|6ace9ccf6a74c13d|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a0d527e416cb788dca|013cc5b9c6d10116ff772063e644b7d0] NewConnectionIdFrame[2,<1|039757eac3e15c3a20|2a0a9992cda8dae2e73488b43d5338ee] NewConnectionIdFrame[3,<2|039783f65bbcee6120|601b89138509039d843bcdaaad41a09a] Padding(1103) 15.505 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 15.570/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 15.597/App, because ackElicitingInFlight | RTT:33/16 15.505 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 122 millis, based on 15.628/App, because ackElicitingInFlight | RTT:33/16 15.505 -> Packet A|1|S0|039757eac3e15c3a20|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] 15.506 <- (3) Packet A|4|S0|6ace9ccf6a74c13d|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 15.525 -> Packet A|2|S0|039757eac3e15c3a20|35|1 AckFrame[4,2|Δ19] 15.561 <- (4) Packet A|5|S0|6ace9ccf6a74c13d|34|1 AckFrame[2-1|Δ0] 15.562 Cwnd(-): 6000; inflight: 0 15.562 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.562 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 122 millis, based on 15.685/App, because ackElicitingInFlight | RTT:33/16 15.562 -> Packet A|3|S0|039757eac3e15c3a20|48|1 StreamFrame[0(CIB),0,17,fin] 15.593 <- (5) Packet A|6|S0|6ace9ccf6a74c13d|1062|2 AckFrame[3-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 15.594 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.594 Finished downloading https://server4:443/ynfkwvjtdk at 42:59.890 on ClientConnection[c2df33e84b42ce79/6ace9ccf6a74c13d(V1) with server4/193.167.100.100:443] 15.594 Closing ClientConnection[c2df33e84b42ce79/6ace9ccf6a74c13d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.594 -> Packet A|4|S0|039757eac3e15c3a20|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 15.595 Creating connection with server4:443 with v1 15.595 Setting up connection for downloading https://server4:443/mtbyuhzyud at 42:59.891 on ClientConnection[3b3d9dda15c2e320/4a9329f9bdcd327d(V1) with server4/193.167.100.100:443] 15.595 Original destination connection id: 3b3d9dda15c2e320 (scid: 4a9329f9bdcd327d) >- CryptoStream[I|ClientHello] 15.596 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.796/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.596 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.701 <- (6) Packet A|7|S0|6ace9ccf6a74c13d|1220|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(162) 15.701 -> Packet A|5|S0|039757eac3e15c3a20|36|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 15.732 <- (7) Packet A|8|S0|6ace9ccf6a74c13d|38|2 AckFrame[5|Δ0] ConnectionCloseFrame[0|0|] 15.780 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 15.780 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,740] Padding(256) 15.783 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.983/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.783 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 15.783 - unknown transport parameter 0xff04de1b, size 2 15.783 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 15.785 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.785 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.785 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.785 Discarding pn space Initial because first Handshake message is being sent 15.785 Starting downloading https://server4:443/mtbyuhzyud at 43:00.081 on ClientConnection[3b3d9dda15c2e320/4a9329f9bdcd327d(V1) with server4/193.167.100.100:443] 15.785 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 15.786 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.986/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.786 -> Packet A|0|S0|034d900264df9dd24b|48|1 StreamFrame[0(CIB),0,17,fin] 15.816 <- (2) Packet A|4|S0|4a9329f9bdcd327d|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|034d85768cf80906c9|2a96d95fab3ce0117e0a0ab6026255c6] Padding(1161) 15.817 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 15.985/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 16.012/App, because ackElicitingInFlight | RTT:100/25 15.817 Discarding pn space Handshake because HandshakeDone is received 15.818 <- (3) Packet A|6|S0|4a9329f9bdcd327d|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 15.818 -> Packet A|1|S0|034d900264df9dd24b|35|1 AckFrame[6,4|Δ1] 15.819 <- (4) Packet A|8|S0|4a9329f9bdcd327d|1057|1 StreamFrame[0(CIB),0,1024,fin] 15.819 Finished downloading https://server4:443/mtbyuhzyud at 43:00.115 on ClientConnection[3b3d9dda15c2e320/4a9329f9bdcd327d(V1) with server4/193.167.100.100:443] 15.819 Closing ClientConnection[3b3d9dda15c2e320/4a9329f9bdcd327d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.819 -> Packet A|2|S0|034d900264df9dd24b|40|2 ConnectionCloseFrame[0|0|] AckFrame[8,6,4|Δ0] 15.820 Creating connection with server4:443 with v1 15.820 Setting up connection for downloading https://server4:443/woeqglpdxq at 43:00.116 on ClientConnection[0dd89f481fd2f9ec/05e10ed530e51cf4(V1) with server4/193.167.100.100:443] 15.820 Original destination connection id: 0dd89f481fd2f9ec (scid: 05e10ed530e51cf4) >- CryptoStream[I|ClientHello] 15.821 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.021/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.821 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.005 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 16.005 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,741] Padding(255) 16.007 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.207/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.007 - unknown transport parameter 0xff04de1b, size 2 16.008 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 16.007 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) >- CryptoStream[H|Finished] 16.010 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.210/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.010 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.011 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.011 Starting downloading https://server4:443/woeqglpdxq at 43:00.307 on ClientConnection[0dd89f481fd2f9ec/05e10ed530e51cf4(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 199 millis, based on 16.211/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.011 Discarding pn space Initial because first Handshake message is being sent 16.011 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 16.011 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.211/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.011 -> Packet A|0|S0|cad93d3ade20f528ee|48|1 StreamFrame[0(CIB),0,17,fin] 16.042 <- (2) Packet A|4|S0|05e10ed530e51cf4|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|cad9b3963ef06feffe|4e2e30e037c8124f57f8fdeeedb040c3] Padding(1161) 16.042 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 16.210/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 16.237/App, because ackElicitingInFlight | RTT:100/25 16.042 Discarding pn space Handshake because HandshakeDone is received 16.043 <- (3) Packet A|5|S0|05e10ed530e51cf4|1220|2 PingFrame[] Padding(1190) 16.043 -> Packet A|1|S0|cad93d3ade20f528ee|32|1 AckFrame[5-4|Δ0] 16.043 <- (4) Packet A|6|S0|05e10ed530e51cf4|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 16.063 -> Packet A|2|S0|cad93d3ade20f528ee|33|1 AckFrame[6-4|Δ19] 16.236 loss detection timeout handler running Sending probe 0, because no ack since 16.011. Current RTT: 100/25. 16.237 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 451 millis, based on 16.689/App, because ackElicitingInFlight | RTT:100/25 16.237 -> Packet PA|3|S0|cad93d3ade20f528ee|48|1 StreamFrame[0(CIB),0,17,fin] 16.267 <- (5) Packet A|9|S0|05e10ed530e51cf4|36|1 AckFrame[3,0|Δ0] 16.268 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.436 <- (6) Packet A|10|S0|05e10ed530e51cf4|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|cad9b3963ef06feffe|4e2e30e037c8124f57f8fdeeedb040c3] Padding(852) -< CryptoStream[A|NewSessionTicket] 16.455 -> Packet A|4|S0|cad93d3ade20f528ee|35|1 AckFrame[10-9,6-4|Δ19] 16.488 <- (7) Packet A|12|S0|05e10ed530e51cf4|1252|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(194) 16.489 Finished downloading https://server4:443/woeqglpdxq at 43:00.785 on ClientConnection[0dd89f481fd2f9ec/05e10ed530e51cf4(V1) with server4/193.167.100.100:443] 16.489 Closing ClientConnection[0dd89f481fd2f9ec/05e10ed530e51cf4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.489 -> Packet A|5|S0|cad93d3ade20f528ee|40|2 ConnectionCloseFrame[0|0|] AckFrame[12,10-9,6-4|Δ0] 16.489 Creating connection with server4:443 with v1 16.490 Setting up connection for downloading https://server4:443/mxmmqmaijl at 43:00.786 on ClientConnection[e929a936276054d3/402398adb5261d27(V1) with server4/193.167.100.100:443] 16.490 Original destination connection id: e929a936276054d3 (scid: 402398adb5261d27) >- CryptoStream[I|ClientHello] 16.491 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.691/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.491 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.519 <- (8) Packet A|13|S0|05e10ed530e51cf4|38|2 AckFrame[5-4|Δ0] ConnectionCloseFrame[0|0|] 16.674 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 16.674 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,741] Padding(255) 16.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.877/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.677 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 16.677 - unknown transport parameter 0xff04de1b, size 2 16.677 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 16.680 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.679 -> Packet H|0|L|81|1 CryptoFrame[0,36] 16.680 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.680 Starting downloading https://server4:443/mxmmqmaijl at 43:00.976 on ClientConnection[e929a936276054d3/402398adb5261d27(V1) with server4/193.167.100.100:443] 16.680 Discarding pn space Initial because first Handshake message is being sent 16.680 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 16.680 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.680 -> Packet A|0|S0|29b0fe186e8aaed4b6|48|1 StreamFrame[0(CIB),0,17,fin] 16.879 loss detection timeout handler running Sending probe 0, because no ack since 16.679. Current RTT: 100/25. 16.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.880 (Probe is a handshake retransmit) 16.880 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 17.280/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.880 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 16.912 <- (2) Packet A|5|S0|402398adb5261d27|1220|2 PingFrame[] Padding(1190) 16.913 <- (3) Packet A|6|S0|402398adb5261d27|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 16.913 -> Packet A|1|S0|29b0fe186e8aaed4b6|32|1 AckFrame[6-5|Δ0] 17.027 <- (4) Packet A|8|S0|402398adb5261d27|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|29b07ac083177e83a9|673bb3a6d4eed83d133c464cfc14963d] Padding(852) -< CryptoStream[A|NewSessionTicket] 17.028 State is set to Confirmed reschedule loss detection timer for PTO over 104 millis, based on 17.132/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -121 millis, based on 16.906/App, because ackElicitingInFlight | RTT:100/25 17.028 Discarding pn space Handshake because HandshakeDone is received 17.028 loss detection timeout handler running Sending probe 0, because no ack since 16.680. Current RTT: 100/25. 17.028 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 451 millis, based on 17.480/App, because ackElicitingInFlight | RTT:100/25 17.028 -> Packet PA|2|S0|29b0fe186e8aaed4b6|48|1 StreamFrame[0(CIB),0,17,fin] 17.047 -> Packet A|3|S0|29b0fe186e8aaed4b6|35|1 AckFrame[8,6-5|Δ19] 17.058 <- (5) Packet A|9|S0|402398adb5261d27|36|1 AckFrame[2,0|Δ0] 17.059 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.079 <- (6) Packet A|10|S0|402398adb5261d27|1220|3 AckFrame[3-2,0|Δ0] HandshakeDoneFrame[] Padding(1183) 17.079 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.080 <- (7) Packet A|11|S0|402398adb5261d27|1252|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(194) 17.080 -> Packet A|4|S0|29b0fe186e8aaed4b6|32|1 AckFrame[11-9|Δ0] 17.080 Finished downloading https://server4:443/mxmmqmaijl at 43:01.377 on ClientConnection[e929a936276054d3/402398adb5261d27(V1) with server4/193.167.100.100:443] 17.080 Closing ClientConnection[e929a936276054d3/402398adb5261d27(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.081 -> Packet A|5|S0|29b0fe186e8aaed4b6|36|2 ConnectionCloseFrame[0|0|] AckFrame[11-9|Δ0] 17.081 Creating connection with server4:443 with v1 17.081 Setting up connection for downloading https://server4:443/wwydiyrnqh at 43:01.378 on ClientConnection[de83700051cca239/49f770348b11ba35(V1) with server4/193.167.100.100:443] 17.082 Original destination connection id: de83700051cca239 (scid: 49f770348b11ba35) >- CryptoStream[I|ClientHello] 17.083 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.283/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.083 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.111 <- (8) Packet A|12|S0|402398adb5261d27|37|2 AckFrame[4|Δ0] MaxStreamsFrame[B,101] 17.111 -> Packet A|6|S0|29b0fe186e8aaed4b6|36|2 ConnectionCloseFrame[0|0|] AckFrame[11-9|Δ0] 17.112 <- (9) Packet A|13|S0|402398adb5261d27|1332|2 PingFrame[] Padding(1302) 17.112 -> Packet A|7|S0|29b0fe186e8aaed4b6|36|2 ConnectionCloseFrame[0|0|] AckFrame[11-9|Δ0] 17.116 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 17.117 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.317/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.116 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 17.119 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.216/Handshake, because peerAwaitingAddressValidation | RTT:33/16 17.119 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 17.119 - unknown transport parameter 0xff04de1b, size 2 17.119 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 17.121 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.218/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.121 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.122 Starting downloading https://server4:443/wwydiyrnqh at 43:01.418 on ClientConnection[de83700051cca239/49f770348b11ba35(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 17.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.122 Discarding pn space Initial because first Handshake message is being sent 17.122 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 17.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.122 -> Packet A|0|S0|189707eebaf823e4da|48|1 StreamFrame[0(CIB),0,17,fin] 17.218 loss detection timeout handler running Sending probe 0, because no ack since 17.121. Current RTT: 33/16. 17.218 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.218 (Probe is a handshake retransmit) 17.219 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.413/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.218 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 17.412 loss detection timeout handler running Sending probe 1, because no ack since 17.122. Current RTT: 33/16. 17.412 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.412 (Probe is a handshake retransmit) 17.413 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 17.801/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.412 -> Packet PH|3|L|81|1 CryptoFrame[0,36] 17.413 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 17.801/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.413 -> Packet PH|4|L|81|1 CryptoFrame[0,36] 17.445 <- (2) Packet A|3|S0|49f770348b11ba35|1220|2 PingFrame[] Padding(1190) 17.446 <- (3) Packet A|4|S0|49f770348b11ba35|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 17.446 -> Packet A|1|S0|189707eebaf823e4da|32|1 AckFrame[4-3|Δ0] 17.447 <- (4) Packet A|5|S0|49f770348b11ba35|1057|1 StreamFrame[0(CIB),0,1024,fin] 17.447 Finished downloading https://server4:443/wwydiyrnqh at 43:01.743 on ClientConnection[de83700051cca239/49f770348b11ba35(V1) with server4/193.167.100.100:443] 17.447 Closing ClientConnection[de83700051cca239/49f770348b11ba35(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.448 -> Packet A|2|S0|189707eebaf823e4da|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 17.448 Creating connection with server4:443 with v1 17.448 Setting up connection for downloading https://server4:443/xwuvtopraw at 43:01.744 on ClientConnection[b77d4122d77b811f/4f062884dd13cd02(V1) with server4/193.167.100.100:443] 17.448 Original destination connection id: b77d4122d77b811f (scid: 4f062884dd13cd02) >- CryptoStream[I|ClientHello] 17.449 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.649/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.449 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.478 <- (5) Packet A|6|S0|49f770348b11ba35|1252|2 PingFrame[] Padding(1222) 17.478 <- (6) Packet A|7|S0|49f770348b11ba35|38|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 17.479 -> Packet A|3|S0|189707eebaf823e4da|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 17.483 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 17.483 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.683/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.483 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 17.485 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.485 - unknown transport parameter 0xff04de1b, size 2 reschedule loss detection timer for PTO over 96 millis, based on 17.582/Handshake, because peerAwaitingAddressValidation | RTT:33/16 17.485 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 17.485 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 17.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.585/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.488 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.489 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.586/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.489 Discarding pn space Initial because first Handshake message is being sent 17.489 Starting downloading https://server4:443/xwuvtopraw at 43:01.785 on ClientConnection[b77d4122d77b811f/4f062884dd13cd02(V1) with server4/193.167.100.100:443] 17.489 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 17.489 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.586/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.489 -> Packet A|0|S0|a236bf5f2473077565|48|1 StreamFrame[0(CIB),0,17,fin] 17.585 loss detection timeout handler running Sending probe 0, because no ack since 17.488. Current RTT: 33/16. 17.585 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.585 (Probe is a handshake retransmit) 17.586 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.780/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.586 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 17.618 <- (2) Packet A|2|S0|4f062884dd13cd02|1220|6 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a236529e708d974be5|d08bec1d8199225f21eedb158da0b9a4] NewConnectionIdFrame[2,<1|03bd502419f6716441|65948ccff47a1d684f2d5f450d7bd90f] NewConnectionIdFrame[3,<2|03bdd867eab330f8a0|70c359fb54e2ab74903b50c5b66a0f6f] Padding(1098) 17.618 probe count not reset on ack because handshake not yet confirmed 17.618 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.812/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.618 State is set to Confirmed reschedule loss detection timer for PTO over 345 millis, based on 17.964/Handshake, because ackElicitingInFlight | RTT:45/36 17.618 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.618 Discarding pn space Handshake because HandshakeDone is received 17.619 <- (3) Packet A|3|S0|4f062884dd13cd02|1220|2 PingFrame[] Padding(1190) reschedule loss detection timer for PTO over 214 millis, based on 17.834/App, because ackElicitingInFlight | RTT:45/36 17.619 -> Packet A|1|S0|03bd502419f6716441|36|3 RetireConnectionIdFrame[0] AckFrame[2|Δ0] RetireConnectionIdFrame[1] 17.638 -> Packet A|2|S0|03bd502419f6716441|33|1 AckFrame[3-2|Δ19] 17.833 loss detection timeout handler running Sending probe 0, because no ack since 17.619. Current RTT: 45/36. 17.833 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 429 millis, based on 18.263/App, because ackElicitingInFlight | RTT:45/36 17.833 -> Packet PA|3|S0|03bd502419f6716441|31|2 RetireConnectionIdFrame[0] RetireConnectionIdFrame[1] 17.864 <- (4) Packet A|7|S0|4f062884dd13cd02|36|1 AckFrame[3,0|Δ0] 17.865 Cwnd(-): 6000; inflight: 0 17.865 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 192 millis, based on 18.058/App, because ackElicitingInFlight | RTT:43/31 17.865 -> Packet A|4|S0|03bd502419f6716441|36|3 RetireConnectionIdFrame[0] AckFrame[3-2|Δ0] RetireConnectionIdFrame[1] 17.897 <- (5) Packet A|8|S0|4f062884dd13cd02|1252|2 PingFrame[] Padding(1222) 17.916 -> Packet A|5|S0|03bd502419f6716441|35|1 AckFrame[8-7,3-2|Δ19] 17.919 <- (6) Packet A|10|S0|4f062884dd13cd02|187|1 StreamFrame[0(CIB),872,152,fin] 17.938 -> Packet A|6|S0|03bd502419f6716441|37|1 AckFrame[10,8-7,3-2|Δ19] 18.057 loss detection timeout handler running Sending probe 0, because no ack since 17.865. Current RTT: 43/31. 18.057 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 385 millis, based on 18.443/App, because ackElicitingInFlight | RTT:43/31 18.057 -> Packet PA|7|S0|03bd502419f6716441|31|2 RetireConnectionIdFrame[0] RetireConnectionIdFrame[1] 18.092 <- (7) Packet A|14|S0|4f062884dd13cd02|1252|4 CryptoFrame[0,305] HandshakeDoneFrame[] StreamFrame[0(CIB),0,872] Padding(37) -< CryptoStream[A|NewSessionTicket] 18.093 Finished downloading https://server4:443/xwuvtopraw at 43:02.389 on ClientConnection[b77d4122d77b811f/4f062884dd13cd02(V1) with server4/193.167.100.100:443] 18.093 Closing ClientConnection[b77d4122d77b811f/4f062884dd13cd02(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.094 Creating connection with server4:443 with v1 18.094 -> Packet A|8|S0|03bd502419f6716441|42|2 ConnectionCloseFrame[0|0|] AckFrame[14,10,8-7,3-2|Δ0] 18.094 Setting up connection for downloading https://server4:443/arxemlplvg at 43:02.390 on ClientConnection[295dbfd83192d0b1/bfc1a65c1a9f951f(V1) with server4/193.167.100.100:443] 18.094 Original destination connection id: 295dbfd83192d0b1 (scid: bfc1a65c1a9f951f) >- CryptoStream[I|ClientHello] 18.096 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.296/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.095 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.129 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18.129 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.329/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.129 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 18.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.228/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.131 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 18.132 - unknown transport parameter 0xff04de1b, size 2 18.132 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 18.134 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.231/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.134 -> Packet H|0|L|81|1 CryptoFrame[0,36] 18.134 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.231/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.134 Discarding pn space Initial because first Handshake message is being sent 18.134 Starting downloading https://server4:443/arxemlplvg at 43:02.430 on ClientConnection[295dbfd83192d0b1/bfc1a65c1a9f951f(V1) with server4/193.167.100.100:443] 18.134 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 18.134 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.231/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.134 -> Packet A|0|S0|6a558bec7b86ffaa79|48|1 StreamFrame[0(CIB),0,17,fin] 18.165 <- (2) Packet A|2|S0|bfc1a65c1a9f951f|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|6a5598ae5cf7ac50e3|2c369becc60aea470c9bf6e3b9149c1f] Padding(1161) 18.166 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 18.231/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 18.257/App, because ackElicitingInFlight | RTT:33/16 18.166 Discarding pn space Handshake because HandshakeDone is received 18.167 <- (3) Packet A|4|S0|bfc1a65c1a9f951f|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 18.167 <- (4) Packet A|5|S0|bfc1a65c1a9f951f|92|3 AckFrame[0|Δ0] NewConnectionIdFrame[2,<1|817d4801fa70adb9b8|27771c9ed0df3e45b39e494932f08d9a] NewConnectionIdFrame[3,<2|817d53274a53569f1b|3ae69e118425b1052dbc8cb157b77667] 18.167 -> Packet A|1|S0|6a558bec7b86ffaa79|34|1 AckFrame[4,2|Δ0] 18.167 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 106 millis, based on 18.274/App, because ackElicitingInFlight | RTT:33/12 18.167 -> Packet A|2|S0|817d4801fa70adb9b8|38|3 RetireConnectionIdFrame[0] AckFrame[5-4,2|Δ0] RetireConnectionIdFrame[1] 18.168 <- (5) Packet A|6|S0|bfc1a65c1a9f951f|1057|1 StreamFrame[0(CIB),0,1024,fin] 18.168 Finished downloading https://server4:443/arxemlplvg at 43:02.464 on ClientConnection[295dbfd83192d0b1/bfc1a65c1a9f951f(V1) with server4/193.167.100.100:443] 18.168 Closing ClientConnection[295dbfd83192d0b1/bfc1a65c1a9f951f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.169 Creating connection with server4:443 with v1 18.169 -> Packet A|3|S0|817d4801fa70adb9b8|38|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,2|Δ0] 18.169 Setting up connection for downloading https://server4:443/ggjiosufke at 43:02.465 on ClientConnection[ce3c3bc0c9e12b2e/db74b53968e3172e(V1) with server4/193.167.100.100:443] 18.169 Original destination connection id: ce3c3bc0c9e12b2e (scid: db74b53968e3172e) >- CryptoStream[I|ClientHello] 18.170 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.371/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.170 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.204 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18.204 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.404/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.204 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 18.206 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.303/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.206 - unknown transport parameter 0xff04de1b, size 2 18.206 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 18.206 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 18.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.305/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.208 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.209 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.209 Starting downloading https://server4:443/ggjiosufke at 43:02.505 on ClientConnection[ce3c3bc0c9e12b2e/db74b53968e3172e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 18.306/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.209 Discarding pn space Initial because first Handshake message is being sent 18.209 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 18.209 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.306/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.209 -> Packet A|0|S0|fbed0cbd3f86d7d275|48|1 StreamFrame[0(CIB),0,17,fin] 18.223 <- (6) Packet A|7|S0|bfc1a65c1a9f951f|35|1 AckFrame[2|Δ0] 18.224 -> Packet A|4|S0|817d4801fa70adb9b8|38|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,2|Δ0] 18.254 <- (7) Packet A|8|S0|bfc1a65c1a9f951f|40|2 AckFrame[4,2|Δ0] ConnectionCloseFrame[0|0|] 18.305 loss detection timeout handler running Sending probe 0, because no ack since 18.208. Current RTT: 33/16. 18.305 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.305 (Probe is a handshake retransmit) 18.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.500/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.306 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 18.499 loss detection timeout handler running Sending probe 1, because no ack since 18.209. Current RTT: 33/16. 18.499 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.499 (Probe is a handshake retransmit) 18.499 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.887/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.499 -> Packet PH|3|L|81|1 CryptoFrame[0,36] 18.500 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.888/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.500 -> Packet PH|4|L|81|1 CryptoFrame[0,36] 18.533 <- (2) Packet A|5|S0|db74b53968e3172e|1220|2 PingFrame[] Padding(1190) 18.533 <- (3) Packet A|6|S0|db74b53968e3172e|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 18.534 -> Packet A|1|S0|fbed0cbd3f86d7d275|32|1 AckFrame[6-5|Δ0] 18.534 <- (4) Packet A|7|S0|db74b53968e3172e|1057|1 StreamFrame[0(CIB),0,1024,fin] 18.535 Finished downloading https://server4:443/ggjiosufke at 43:02.831 on ClientConnection[ce3c3bc0c9e12b2e/db74b53968e3172e(V1) with server4/193.167.100.100:443] 18.535 Closing ClientConnection[ce3c3bc0c9e12b2e/db74b53968e3172e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.535 -> Packet A|2|S0|fbed0cbd3f86d7d275|36|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 18.535 Creating connection with server4:443 with v1 18.536 Setting up connection for downloading https://server4:443/zctzexlfua at 43:02.832 on ClientConnection[73be502da9e0fa1f/d5e92ec79e759227(V1) with server4/193.167.100.100:443] 18.536 Original destination connection id: 73be502da9e0fa1f (scid: d5e92ec79e759227) >- CryptoStream[I|ClientHello] 18.537 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.737/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.537 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.566 <- (5) Packet A|9|S0|db74b53968e3172e|38|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 18.570 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18.570 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.770/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.570 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 18.573 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.671/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.573 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 18.574 - unknown transport parameter 0xff04de1b, size 2 18.574 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 18.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.673/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.576 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.576 Starting downloading https://server4:443/zctzexlfua at 43:02.873 on ClientConnection[73be502da9e0fa1f/d5e92ec79e759227(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 18.673/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.577 Discarding pn space Initial because first Handshake message is being sent 18.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.674/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.577 -> [Packet H|1|L|47|1 AckFrame[1|Δ0], Packet A|0|S0|f142bfec47c070cc05|48|1 StreamFrame[0(CIB),0,17,fin]] 18.608 <- (2) Packet A|2|S0|d5e92ec79e759227|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f1423f5c570c44b20e|7a5d8d76266cf7a2bb1225bbc2db8080] Padding(1161) 18.608 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 18.673/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 18.700/App, because ackElicitingInFlight | RTT:33/16 18.608 Discarding pn space Handshake because HandshakeDone is received 18.609 <- (3) Packet A|3|S0|d5e92ec79e759227|1220|2 PingFrame[] Padding(1190) 18.609 <- (4) Packet A|4|S0|d5e92ec79e759227|338|1 CryptoFrame[0,305] 18.609 -> Packet A|1|S0|f142bfec47c070cc05|32|1 AckFrame[3-2|Δ0] -< CryptoStream[A|NewSessionTicket] 18.628 -> Packet A|2|S0|f142bfec47c070cc05|33|1 AckFrame[4-2|Δ19] 18.641 <- (5) Packet A|6|S0|d5e92ec79e759227|1252|2 PingFrame[] Padding(1222) 18.661 -> Packet A|3|S0|f142bfec47c070cc05|35|1 AckFrame[6,4-2|Δ19] 18.699 loss detection timeout handler running Sending probe 0, because no ack since 18.577. Current RTT: 33/16. 18.699 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 18.945/App, because ackElicitingInFlight | RTT:33/16 18.699 -> Packet PA|4|S0|f142bfec47c070cc05|48|1 StreamFrame[0(CIB),0,17,fin] 18.755 <- (6) Packet A|8|S0|d5e92ec79e759227|37|1 AckFrame[4-3,1-0|Δ0] 18.756 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.826 <- (7) Packet A|9|S0|d5e92ec79e759227|1252|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(194) 18.826 Finished downloading https://server4:443/zctzexlfua at 43:03.122 on ClientConnection[73be502da9e0fa1f/d5e92ec79e759227(V1) with server4/193.167.100.100:443] 18.826 Closing ClientConnection[73be502da9e0fa1f/d5e92ec79e759227(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.827 -> Packet A|5|S0|f142bfec47c070cc05|36|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 18.827 Creating connection with server4:443 with v1 18.827 Setting up connection for downloading https://server4:443/yjhlqqbsmw at 43:03.124 on ClientConnection[0e382ed84c47f5c2/ef7d8481959396a3(V1) with server4/193.167.100.100:443] 18.828 Original destination connection id: 0e382ed84c47f5c2 (scid: ef7d8481959396a3) >- CryptoStream[I|ClientHello] 18.829 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.029/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.829 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.857 <- (8) Packet A|10|S0|d5e92ec79e759227|38|2 AckFrame[5|Δ0] ConnectionCloseFrame[0|0|] 18.862 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18.863 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.063/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.862 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 18.865 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.962/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.865 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 18.865 - unknown transport parameter 0xff04de1b, size 2 18.865 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 18.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.965/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.867 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.965/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.868 Starting downloading https://server4:443/yjhlqqbsmw at 43:03.164 on ClientConnection[0e382ed84c47f5c2/ef7d8481959396a3(V1) with server4/193.167.100.100:443] 18.868 Discarding pn space Initial because first Handshake message is being sent 18.868 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 18.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.965/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.868 -> Packet A|0|S0|d29f541dc723ea9988|48|1 StreamFrame[0(CIB),0,17,fin] 18.965 loss detection timeout handler running Sending probe 0, because no ack since 18.867. Current RTT: 33/16. 18.965 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.965 (Probe is a handshake retransmit) 18.965 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.159/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.965 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 18.994 <- (2) Packet H|2|L|1220|3 CryptoFrame[0,742] PingFrame[] Padding(427) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.994 -> Packet H|3|L|47|1 AckFrame[2-1|Δ0] 18.998 <- (3) Packet A|4|S0|ef7d8481959396a3|1252|2 PingFrame[] Padding(1222) 18.998 <- (4) Packet A|5|S0|ef7d8481959396a3|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 18.999 -> Packet A|1|S0|d29f541dc723ea9988|32|1 AckFrame[5-4|Δ0] 19.030 <- (5) Packet A|6|S0|ef7d8481959396a3|1332|2 PingFrame[] Padding(1302) 19.036 <- (6) Packet A|7|S0|ef7d8481959396a3|1252|4 AckFrame[1|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|d29f1d8cf769992554|df3e335ff90ab513025c625b9a957464] Padding(1188) 19.037 probe count not reset on ack because handshake not yet confirmed 19.037 Cwnd(-): 6000; inflight: 162 19.037 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.037 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 193 millis, based on 19.231/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.037 State is set to Confirmed reschedule loss detection timer for PTO over 121 millis, based on 19.159/Handshake, because ackElicitingInFlight | RTT:33/16 19.037 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.037 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 122 millis, based on 19.160/App, because ackElicitingInFlight | RTT:33/16 19.037 -> Packet A|2|S0|d29f541dc723ea9988|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ6] 19.050 -> Packet A|3|S0|d29f541dc723ea9988|33|1 AckFrame[7-6|Δ13] 19.159 loss detection timeout handler running Sending probe 0, because no ack since 19.037. Current RTT: 33/16. 19.160 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 19.406/App, because ackElicitingInFlight | RTT:33/16 19.160 -> Packet PA|4|S0|d29f541dc723ea9988|48|1 StreamFrame[0(CIB),0,17,fin] 19.173 <- (7) Packet A|10|S0|ef7d8481959396a3|1332|4 AckFrame[3-2|Δ2] PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(268) reschedule loss detection timer for PTO over 109 millis, based on 19.283/App, because ackElicitingInFlight | RTT:33/16 19.174 Finished downloading https://server4:443/yjhlqqbsmw at 43:03.470 on ClientConnection[0e382ed84c47f5c2/ef7d8481959396a3(V1) with server4/193.167.100.100:443] 19.174 Closing ClientConnection[0e382ed84c47f5c2/ef7d8481959396a3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.174 -> Packet A|5|S0|d29f541dc723ea9988|36|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 19.174 Creating connection with server4:443 with v1 19.175 Setting up connection for downloading https://server4:443/hszxnsoujc at 43:03.472 on ClientConnection[43f29a452a117b5f/018520ef5cb4218a(V1) with server4/193.167.100.100:443] 19.176 Original destination connection id: 43f29a452a117b5f (scid: 018520ef5cb4218a) >- CryptoStream[I|ClientHello] 19.177 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.377/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.177 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.205 <- (8) Packet A|11|S0|ef7d8481959396a3|38|2 AckFrame[5|Δ0] ConnectionCloseFrame[0|0|] 19.210 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.210 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.410/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.210 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 19.213 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.310/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.213 - unknown transport parameter 0xff04de1b, size 2 19.213 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 19.213 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 19.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.312/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.215 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.312/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.215 Discarding pn space Initial because first Handshake message is being sent 19.215 Starting downloading https://server4:443/hszxnsoujc at 43:03.511 on ClientConnection[43f29a452a117b5f/018520ef5cb4218a(V1) with server4/193.167.100.100:443] 19.215 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 19.216 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.313/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.216 -> Packet A|0|S0|61948adf8b93867457|48|1 StreamFrame[0(CIB),0,17,fin] 19.247 <- (2) Packet A|3|S0|018520ef5cb4218a|1220|2 PingFrame[] Padding(1190) 19.267 -> Packet A|1|S0|61948adf8b93867457|33|1 AckFrame[3|Δ19] 19.312 loss detection timeout handler running Sending probe 0, because no ack since 19.215. Current RTT: 33/16. 19.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.312 (Probe is a handshake retransmit) 19.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.506/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.312 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 19.378 <- (3) Packet A|5|S0|018520ef5cb4218a|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|619421a695d44d81f5|d7f8ad71a6b2f37109d1bf0d934a4d19] Padding(852) -< CryptoStream[A|NewSessionTicket] 19.379 State is set to Confirmed reschedule loss detection timer for PTO over 82 millis, based on 19.462/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -40 millis, based on 19.339/App, because ackElicitingInFlight | RTT:33/16 19.379 Discarding pn space Handshake because HandshakeDone is received 19.379 loss detection timeout handler running Sending probe 0, because no ack since 19.216. Current RTT: 33/16. 19.379 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 19.625/App, because ackElicitingInFlight | RTT:33/16 19.379 -> Packet PA|2|S0|61948adf8b93867457|48|1 StreamFrame[0(CIB),0,17,fin] 19.399 -> Packet A|3|S0|61948adf8b93867457|35|1 AckFrame[5,3|Δ19] 19.624 loss detection timeout handler running Sending probe 1, because no ack since 19.379. Current RTT: 33/16. 19.625 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 20.117/App, because ackElicitingInFlight | RTT:33/16 19.625 -> Packet PA|4|S0|61948adf8b93867457|48|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 20.118/App, because ackElicitingInFlight | RTT:33/16 19.626 -> Packet PA|5|S0|61948adf8b93867457|48|1 StreamFrame[0(CIB),0,17,fin] 19.674 <- (4) Packet A|7|S0|018520ef5cb4218a|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|619421a695d44d81f5|d7f8ad71a6b2f37109d1bf0d934a4d19] Padding(852) -< CryptoStream[A|NewSessionTicket] 19.694 -> Packet A|6|S0|61948adf8b93867457|37|1 AckFrame[7,5,3|Δ19] 19.725 <- (5) Packet A|8|S0|018520ef5cb4218a|1220|3 AckFrame[6,2|Δ0] HandshakeDoneFrame[] Padding(1183) 19.726 Cwnd(-): 6000; inflight: 0 19.726 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.726 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 122 millis, based on 19.849/App, because ackElicitingInFlight | RTT:33/16 19.726 -> Packet A|7|S0|61948adf8b93867457|48|1 StreamFrame[0(CIB),0,17,fin] 19.746 -> Packet A|8|S0|61948adf8b93867457|33|1 AckFrame[8|Δ19] 19.848 loss detection timeout handler running Sending probe 0, because no ack since 19.726. Current RTT: 33/16. 19.849 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 20.095/App, because ackElicitingInFlight | RTT:33/16 19.849 -> Packet PA|9|S0|61948adf8b93867457|48|1 StreamFrame[0(CIB),0,17,fin] 19.905 <- (6) Packet A|11|S0|018520ef5cb4218a|35|1 AckFrame[9-8|Δ0] 19.906 Cwnd(-): 3000; inflight: 0 19.906 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.906 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 133 millis, based on 20.040/App, because ackElicitingInFlight | RTT:36/18 19.906 -> Packet A|10|S0|61948adf8b93867457|48|1 StreamFrame[0(CIB),0,17,fin] 19.962 <- (7) Packet A|12|S0|018520ef5cb4218a|35|1 AckFrame[10-8|Δ0] 19.963 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.037 <- (8) Packet A|13|S0|018520ef5cb4218a|1220|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(162) 20.038 Finished downloading https://server4:443/hszxnsoujc at 43:04.334 on ClientConnection[43f29a452a117b5f/018520ef5cb4218a(V1) with server4/193.167.100.100:443] 20.038 Closing ClientConnection[43f29a452a117b5f/018520ef5cb4218a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.039 -> Packet A|11|S0|61948adf8b93867457|36|2 ConnectionCloseFrame[0|0|] AckFrame[13-11|Δ0] 20.039 Creating connection with server4:443 with v1 20.040 Setting up connection for downloading https://server4:443/ccdrfsuqls at 43:04.336 on ClientConnection[b78bb17ba21f8f81/dac6e25bd9bd5c40(V1) with server4/193.167.100.100:443] 20.040 Original destination connection id: b78bb17ba21f8f81 (scid: dac6e25bd9bd5c40) >- CryptoStream[I|ClientHello] 20.041 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.241/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.041 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.225 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 20.225 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,741] Padding(255) 20.228 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.428/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.228 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 20.228 - unknown transport parameter 0xff04de1b, size 2 20.228 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 20.231 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.431/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.231 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.232 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.432/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.232 Discarding pn space Initial because first Handshake message is being sent 20.232 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 20.232 Starting downloading https://server4:443/ccdrfsuqls at 43:04.528 on ClientConnection[b78bb17ba21f8f81/dac6e25bd9bd5c40(V1) with server4/193.167.100.100:443] 20.233 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.433/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.233 -> Packet A|0|S0|6971bfce8802cefd1c|48|1 StreamFrame[0(CIB),0,17,fin] 20.432 loss detection timeout handler running Sending probe 0, because no ack since 20.231. Current RTT: 100/25. 20.432 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.432 (Probe is a handshake retransmit) 20.432 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.832/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.432 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 20.464 <- (2) Packet A|4|S0|dac6e25bd9bd5c40|1220|6 AckFrame[0|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|69712b1ee88832c501|dfc5a3d3da36a4d70e784dd0fa5604b4] NewConnectionIdFrame[2,<1|fb191c559251801b64|902095aeb09f0bbaa7b744e52a3da89d] NewConnectionIdFrame[3,<2|fb19492a6893f32cf1|f760f295b4eb3c19a9231238b03150ab] Padding(1098) 20.465 probe count not reset on ack because handshake not yet confirmed 20.465 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.865/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.465 State is set to Confirmed reschedule loss detection timer for PTO over 1349 millis, based on 21.814/Handshake, because ackElicitingInFlight | RTT:231/115 20.465 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.465 Discarding pn space Handshake because HandshakeDone is received 20.465 <- (3) Packet A|5|S0|dac6e25bd9bd5c40|1220|2 PingFrame[] Padding(1190) reschedule loss detection timer for PTO over 716 millis, based on 21.182/App, because ackElicitingInFlight | RTT:231/115 20.465 <- (4) Packet A|6|S0|dac6e25bd9bd5c40|338|1 CryptoFrame[0,305] 20.465 -> Packet A|1|S0|fb191c559251801b64|36|3 RetireConnectionIdFrame[0] AckFrame[4|Δ0] RetireConnectionIdFrame[1] -< CryptoStream[A|NewSessionTicket] 20.466 -> Packet A|2|S0|fb191c559251801b64|32|1 AckFrame[6-4|Δ0] 20.466 <- (5) Packet A|7|S0|dac6e25bd9bd5c40|1057|1 StreamFrame[0(CIB),0,1024,fin] 20.467 Finished downloading https://server4:443/ccdrfsuqls at 43:04.763 on ClientConnection[b78bb17ba21f8f81/dac6e25bd9bd5c40(V1) with server4/193.167.100.100:443] 20.467 Closing ClientConnection[b78bb17ba21f8f81/dac6e25bd9bd5c40(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.467 -> Packet A|3|S0|fb191c559251801b64|36|2 ConnectionCloseFrame[0|0|] AckFrame[7-4|Δ0] 20.467 Creating connection with server4:443 with v1 20.468 Setting up connection for downloading https://server4:443/jjkkmdovpq at 43:04.764 on ClientConnection[bde2ed37c8a86cc1/956d6ed69dccbf8f(V1) with server4/193.167.100.100:443] 20.468 Original destination connection id: bde2ed37c8a86cc1 (scid: 956d6ed69dccbf8f) >- CryptoStream[I|ClientHello] 20.469 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.669/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.469 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.498 <- (6) Packet A|8|S0|dac6e25bd9bd5c40|1252|2 PingFrame[] Padding(1222) 20.498 <- (7) Packet A|9|S0|dac6e25bd9bd5c40|38|2 AckFrame[3-1|Δ0] ConnectionCloseFrame[0|0|] 20.498 -> Packet A|4|S0|fb191c559251801b64|36|2 ConnectionCloseFrame[0|0|] AckFrame[7-4|Δ0] 20.653 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 20.653 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,742] Padding(254) 20.656 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.856/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.656 - unknown transport parameter 0xff04de1b, size 2 20.656 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 20.656 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 20.658 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.858/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.658 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.659 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.859/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.659 Discarding pn space Initial because first Handshake message is being sent 20.659 Starting downloading https://server4:443/jjkkmdovpq at 43:04.955 on ClientConnection[bde2ed37c8a86cc1/956d6ed69dccbf8f(V1) with server4/193.167.100.100:443] 20.660 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.860/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.660 -> [Packet H|1|L|47|1 AckFrame[3|Δ0], Packet A|0|S0|2a54300417ea1ba470|48|1 StreamFrame[0(CIB),0,17,fin]] 20.690 <- (2) Packet A|4|S0|956d6ed69dccbf8f|1220|5 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|2a54547179bbd1ba09|5f21646b0685478c716d45e8ffd3c8ff] NewConnectionIdFrame[2,<1|8b8584376abd18c26b|c11a55d73609c3bafad0913cb5300c4d] NewConnectionIdFrame[3,<2|8b85730f17e013e990|8aa355acd5a0720eedc4c5a3d641b30b] Padding(1103) 20.691 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 20.858/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 20.886/App, because ackElicitingInFlight | RTT:100/25 20.691 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 225 millis, based on 20.917/App, because ackElicitingInFlight | RTT:100/25 20.691 -> Packet A|1|S0|8b8584376abd18c26b|36|3 RetireConnectionIdFrame[0] AckFrame[4|Δ0] RetireConnectionIdFrame[1] 20.691 <- (3) Packet A|5|S0|956d6ed69dccbf8f|1220|2 PingFrame[] Padding(1190) 20.692 <- (4) Packet A|7|S0|956d6ed69dccbf8f|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 224 millis, based on 20.917/App, because ackElicitingInFlight | RTT:100/25 20.693 -> Packet A|2|S0|8b8584376abd18c26b|35|1 AckFrame[7,5-4|Δ1] 20.693 Finished downloading https://server4:443/jjkkmdovpq at 43:04.989 on ClientConnection[bde2ed37c8a86cc1/956d6ed69dccbf8f(V1) with server4/193.167.100.100:443] 20.693 Closing ClientConnection[bde2ed37c8a86cc1/956d6ed69dccbf8f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.694 -> Packet A|3|S0|8b8584376abd18c26b|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 20.694 Creating connection with server4:443 with v1 20.694 Setting up connection for downloading https://server4:443/vkyqekvudf at 43:04.991 on ClientConnection[c8ab7a1244d6a64b/482ffc3be5349ddf(V1) with server4/193.167.100.100:443] 20.694 Original destination connection id: c8ab7a1244d6a64b (scid: 482ffc3be5349ddf) >- CryptoStream[I|ClientHello] 20.696 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.896/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.695 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.725 <- (5) Packet A|9|S0|956d6ed69dccbf8f|1252|2 PingFrame[] Padding(1222) 20.725 -> Packet A|4|S0|8b8584376abd18c26b|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 20.895 loss detection timeout handler running Sending probe 0, because no ack since 20.695. Current RTT: 100/25. 20.895 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.895 (Probe is an initial retransmit) 20.895 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.295/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.895 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.929 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 20.929 probe count not reset on ack because handshake not yet confirmed 20.930 Retransmitting CryptoFrame[0,257] on level Initial 20.930 Cwnd(-): 6000; inflight: 0 20.930 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.330/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.930 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 21.124/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.930 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 20.929 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,742] Padding(249) 20.933 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.127/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.933 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 20.933 - unknown transport parameter 0xff04de1b, size 2 20.933 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 20.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.129/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.935 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.032/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.935 Discarding pn space Initial because first Handshake message is being sent 20.935 Starting downloading https://server4:443/vkyqekvudf at 43:05.232 on ClientConnection[c8ab7a1244d6a64b/482ffc3be5349ddf(V1) with server4/193.167.100.100:443] 20.935 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 20.936 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.033/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.936 -> Packet A|0|S0|421bd25f2914c53d85|48|1 StreamFrame[0(CIB),0,17,fin] 21.032 loss detection timeout handler running Sending probe 0, because no ack since 20.935. Current RTT: 33/16. 21.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.032 (Probe is a handshake retransmit) 21.033 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.227/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.033 -> Packet PH|2|L|81|1 CryptoFrame[0,36] 21.066 <- (2) Packet A|4|S0|482ffc3be5349ddf|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 21.086 -> Packet A|1|S0|421bd25f2914c53d85|33|1 AckFrame[4|Δ19] 21.225 <- (3) Packet A|6|S0|482ffc3be5349ddf|1220|4 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|421b719c152ef288db|f347a9eb9f87db219ab1aa5aaac45844] PingFrame[] Padding(1160) 21.225 State is set to Confirmed reschedule loss detection timer for PTO over -43 millis, based on 21.182/App, because ackElicitingInFlight | RTT:33/16 21.225 loss detection timeout handler running reschedule loss detection timer for PTO over -166 millis, based on 21.059/App, because ackElicitingInFlight | RTT:33/16 Sending probe 1, because no ack since 20.936. Current RTT: 33/16. 21.225 Discarding pn space Handshake because HandshakeDone is received 21.226 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 21.472/App, because ackElicitingInFlight | RTT:33/16 21.226 -> Packet PA|2|S0|421bd25f2914c53d85|48|1 StreamFrame[0(CIB),0,17,fin] 21.245 -> Packet A|3|S0|421bd25f2914c53d85|35|1 AckFrame[6,4|Δ19] 21.277 <- (4) Packet A|8|S0|482ffc3be5349ddf|1220|3 AckFrame[3-1|Δ0] HandshakeDoneFrame[] Padding(1185) 21.277 Cwnd(-): 3000; inflight: 0 21.277 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 21.277 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 122 millis, based on 21.400/App, because ackElicitingInFlight | RTT:33/16 21.277 -> Packet A|4|S0|421bd25f2914c53d85|48|1 StreamFrame[0(CIB),0,17,fin] 21.296 -> Packet A|5|S0|421bd25f2914c53d85|33|1 AckFrame[8|Δ19] 21.328 <- (5) Packet A|10|S0|482ffc3be5349ddf|1062|2 AckFrame[5-4|Δ0] StreamFrame[0(CIB),0,1024,fin] 21.328 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.329 Finished downloading https://server4:443/vkyqekvudf at 43:05.625 on ClientConnection[c8ab7a1244d6a64b/482ffc3be5349ddf(V1) with server4/193.167.100.100:443] 21.329 Closing ClientConnection[c8ab7a1244d6a64b/482ffc3be5349ddf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.329 -> Packet A|6|S0|421bd25f2914c53d85|36|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 21.330 Creating connection with server4:443 with v1 21.330 Setting up connection for downloading https://server4:443/toerngctks at 43:05.626 on ClientConnection[82c9762a3fc0fa40/3b87597fef9ce929(V1) with server4/193.167.100.100:443] 21.330 Original destination connection id: 82c9762a3fc0fa40 (scid: 3b87597fef9ce929) >- CryptoStream[I|ClientHello] 21.331 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.532/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.331 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.360 <- (6) Packet A|11|S0|482ffc3be5349ddf|38|2 AckFrame[6|Δ0] ConnectionCloseFrame[0|0|] 21.365 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.365 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.565/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.365 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 21.368 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.465/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.368 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 21.368 - unknown transport parameter 0xff04de1b, size 2 21.368 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 21.370 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.467/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.370 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.371 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.468/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.371 Discarding pn space Initial because first Handshake message is being sent 21.371 Starting downloading https://server4:443/toerngctks at 43:05.667 on ClientConnection[82c9762a3fc0fa40/3b87597fef9ce929(V1) with server4/193.167.100.100:443] 21.371 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 21.371 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.468/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.371 -> Packet A|0|S0|aae8d44d4db274f66c|48|1 StreamFrame[0(CIB),0,17,fin] 21.402 <- (2) Packet A|2|S0|3b87597fef9ce929|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|aae8c70f8741e9882a|35152a25a38cb895c022197fe0ce2dab] Padding(1161) 21.402 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 21.467/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 21.494/App, because ackElicitingInFlight | RTT:33/16 21.402 Discarding pn space Handshake because HandshakeDone is received 21.403 <- (3) Packet A|3|S0|3b87597fef9ce929|1220|2 PingFrame[] Padding(1190) 21.403 -> Packet A|1|S0|aae8d44d4db274f66c|32|1 AckFrame[3-2|Δ0] 21.493 loss detection timeout handler running Sending probe 0, because no ack since 21.371. Current RTT: 33/16. 21.494 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 21.740/App, because ackElicitingInFlight | RTT:33/16 21.494 -> Packet PA|2|S0|aae8d44d4db274f66c|48|1 StreamFrame[0(CIB),0,17,fin] 21.525 <- (4) Packet A|6|S0|3b87597fef9ce929|36|1 AckFrame[2,0|Δ0] 21.525 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.535 <- (5) Packet A|7|S0|3b87597fef9ce929|1220|4 CryptoFrame[0,305] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|aae8c70f8741e9882a|35152a25a38cb895c022197fe0ce2dab] Padding(852) -< CryptoStream[A|NewSessionTicket] 21.555 -> Packet A|3|S0|aae8d44d4db274f66c|35|1 AckFrame[7-6,3-2|Δ19] 21.587 <- (6) Packet A|8|S0|3b87597fef9ce929|1252|4 PingFrame[] AckFrame[3|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(189) 21.587 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.588 Finished downloading https://server4:443/toerngctks at 43:05.884 on ClientConnection[82c9762a3fc0fa40/3b87597fef9ce929(V1) with server4/193.167.100.100:443] 21.588 Closing ClientConnection[82c9762a3fc0fa40/3b87597fef9ce929(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.588 -> Packet A|4|S0|aae8d44d4db274f66c|36|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 21.588 Creating connection with server4:443 with v1 21.589 Setting up connection for downloading https://server4:443/fwwsoubtve at 43:05.885 on ClientConnection[2cfb79b11079e94f/04b1cef283c0d68b(V1) with server4/193.167.100.100:443] 21.589 Original destination connection id: 2cfb79b11079e94f (scid: 04b1cef283c0d68b) >- CryptoStream[I|ClientHello] 21.590 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.790/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.590 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.704 <- (7) Packet A|9|S0|3b87597fef9ce929|1220|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(162) 21.705 -> Packet A|5|S0|aae8d44d4db274f66c|36|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 21.789 loss detection timeout handler running Sending probe 0, because no ack since 21.590. Current RTT: 100/25. 21.789 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.789 (Probe is an initial retransmit) 21.790 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.190/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.789 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.823 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 21.824 probe count not reset on ack because handshake not yet confirmed 21.824 Retransmitting CryptoFrame[0,257] on level Initial 21.824 Cwnd(-): 6000; inflight: 0 21.824 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.224/Initial, because peerAwaitingAddressValidation | RTT:100/25 21.824 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 22.018/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.824 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(895) -< CryptoStream[I|ServerHello] 21.823 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 21.826 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.020/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.826 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 21.826 - unknown transport parameter 0xff04de1b, size 2 21.826 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 21.828 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.828 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.829 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.926/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.829 Starting downloading https://server4:443/fwwsoubtve at 43:06.125 on ClientConnection[2cfb79b11079e94f/04b1cef283c0d68b(V1) with server4/193.167.100.100:443] 21.829 Discarding pn space Initial because first Handshake message is being sent 21.829 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 21.829 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.926/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.829 -> Packet A|0|S0|198aa259dbe21c479b|48|1 StreamFrame[0(CIB),0,17,fin] 21.860 <- (2) Packet A|2|S0|04b1cef283c0d68b|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|198a58871f04ddc09f|4181f63e0e4d4a38024a07e419f88f5f] Padding(1161) 21.860 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 21.925/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 21.952/App, because ackElicitingInFlight | RTT:33/16 21.860 Discarding pn space Handshake because HandshakeDone is received 21.861 <- (3) Packet A|3|S0|04b1cef283c0d68b|1220|2 PingFrame[] Padding(1190) 21.861 -> Packet A|1|S0|198aa259dbe21c479b|32|1 AckFrame[3-2|Δ0] 21.861 <- (4) Packet A|4|S0|04b1cef283c0d68b|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 21.881 -> Packet A|2|S0|198aa259dbe21c479b|33|1 AckFrame[4-2|Δ19] 21.893 <- (5) Packet A|5|S0|04b1cef283c0d68b|1252|2 PingFrame[] Padding(1222) 21.912 -> Packet A|3|S0|198aa259dbe21c479b|33|1 AckFrame[5-2|Δ19] 21.944 <- (6) Packet A|6|S0|04b1cef283c0d68b|1332|2 PingFrame[] Padding(1302) 21.951 loss detection timeout handler running Sending probe 0, because no ack since 21.829. Current RTT: 33/16. 21.952 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 22.198/App, because ackElicitingInFlight | RTT:33/16 21.952 -> Packet PA|4|S0|198aa259dbe21c479b|48|1 StreamFrame[0(CIB),0,17,fin] 21.964 -> Packet A|5|S0|198aa259dbe21c479b|33|1 AckFrame[6-2|Δ19] 21.983 <- (7) Packet A|7|S0|04b1cef283c0d68b|1062|2 AckFrame[4-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 21.984 Cwnd(-): 3000; inflight: 0 21.984 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 21.984 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 22.095/App, because ackElicitingInFlight | RTT:33/13 21.984 -> Packet A|6|S0|198aa259dbe21c479b|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ0] 21.984 Finished downloading https://server4:443/fwwsoubtve at 43:06.280 on ClientConnection[2cfb79b11079e94f/04b1cef283c0d68b(V1) with server4/193.167.100.100:443] 21.984 Closing ClientConnection[2cfb79b11079e94f/04b1cef283c0d68b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.985 -> Packet A|7|S0|198aa259dbe21c479b|36|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 21.987 Creating connection with server4:443 with v1 21.987 Setting up connection for downloading https://server4:443/utaiptnrgd at 43:06.283 on ClientConnection[033380feeee0d13c/a6ffdfa6a98999ce(V1) with server4/193.167.100.100:443] 21.987 Original destination connection id: 033380feeee0d13c (scid: a6ffdfa6a98999ce) >- CryptoStream[I|ClientHello] 21.989 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.189/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.989 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.022 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.023 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.223/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.022 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,741] Padding(250) 22.026 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.026 - unknown transport parameter 0xff04de1b, size 2 reschedule loss detection timer for PTO over 96 millis, based on 22.123/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.026 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 22.026 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) >- CryptoStream[H|Finished] 22.029 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.126/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.029 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.029 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.126/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.029 Discarding pn space Initial because first Handshake message is being sent 22.029 Starting downloading https://server4:443/utaiptnrgd at 43:06.325 on ClientConnection[033380feeee0d13c/a6ffdfa6a98999ce(V1) with server4/193.167.100.100:443] 22.029 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 22.029 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.127/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.029 -> Packet A|0|S0|21a2a6803ebf19667a|48|1 StreamFrame[0(CIB),0,17,fin] 22.060 <- (2) Packet A|2|S0|a6ffdfa6a98999ce|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|21a20aabe7f8d8cc89|8b17fb45c870c48344b2400ab7155e57] Padding(1161) 22.061 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 22.126/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 22.152/App, because ackElicitingInFlight | RTT:33/16 22.061 Discarding pn space Handshake because HandshakeDone is received 22.061 <- (3) Packet A|3|S0|a6ffdfa6a98999ce|1220|2 PingFrame[] Padding(1190) 22.062 -> Packet A|1|S0|21a2a6803ebf19667a|32|1 AckFrame[3-2|Δ0] 22.062 <- (4) Packet A|4|S0|a6ffdfa6a98999ce|338|1 CryptoFrame[0,305] -< CryptoStream[A|NewSessionTicket] 22.062 <- (5) Packet A|5|S0|a6ffdfa6a98999ce|1062|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 22.063 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.063 -> Packet A|2|S0|21a2a6803ebf19667a|32|1 AckFrame[5-2|Δ0] 22.063 Finished downloading https://server4:443/utaiptnrgd at 43:06.359 on ClientConnection[033380feeee0d13c/a6ffdfa6a98999ce(V1) with server4/193.167.100.100:443] 22.063 Closing ClientConnection[033380feeee0d13c/a6ffdfa6a98999ce(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.064 Creating connection with server4:443 with v1 22.064 -> Packet A|3|S0|21a2a6803ebf19667a|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 22.064 Setting up connection for downloading https://server4:443/vutuvolvbo at 43:06.361 on ClientConnection[b2b05e387e2170b9/d267f439450f9c82(V1) with server4/193.167.100.100:443] 22.064 Original destination connection id: b2b05e387e2170b9 (scid: d267f439450f9c82) >- CryptoStream[I|ClientHello] 22.066 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.266/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.066 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.093 <- (6) Packet A|6|S0|a6ffdfa6a98999ce|1252|2 PingFrame[] Padding(1222) 22.094 <- (7) Packet A|7|S0|a6ffdfa6a98999ce|37|2 AckFrame[2-1|Δ0] MaxStreamsFrame[B,101] 22.094 -> Packet A|4|S0|21a2a6803ebf19667a|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 22.094 -> Packet A|5|S0|21a2a6803ebf19667a|36|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 22.094 <- (8) Packet A|8|S0|a6ffdfa6a98999ce|38|2 AckFrame[3-1|Δ0] ConnectionCloseFrame[0|0|] 22.100 <- (8) Packet A|9|S0|04b1cef283c0d68b|1332|4 AckFrame[5-1|Δ3] PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(268) 22.100 -> Packet A|8|S0|198aa259dbe21c479b|36|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 22.131 <- (9) Packet A|10|S0|04b1cef283c0d68b|40|2 AckFrame[8,5|Δ0] ConnectionCloseFrame[0|0|] 22.249 <- (1) Packet I|2|L|174|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 22.249 <- (1) Packet H|3|L|1046|2 CryptoFrame[0,742] Padding(254) 22.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 22.452/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.252 -> Packet I|1|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1152) 22.252 - unknown transport parameter 0xff04de1b, size 2 22.252 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 22.254 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 22.454/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.254 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.254 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.254 Starting downloading https://server4:443/vutuvolvbo at 43:06.551 on ClientConnection[b2b05e387e2170b9/d267f439450f9c82(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 199 millis, based on 22.454/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.254 -> Packet H|1|L|47|1 AckFrame[3|Δ0] 22.254 Discarding pn space Initial because first Handshake message is being sent 22.255 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 22.455/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.255 -> Packet A|0|S0|127ca64d97708f1ef3|48|1 StreamFrame[0(CIB),0,17,fin] 22.287 <- (2) Packet A|5|S0|d267f439450f9c82|1220|2 PingFrame[] Padding(1190) 22.287 <- (3) Packet A|7|S0|d267f439450f9c82|92|3 AckFrame[0|Δ0] NewConnectionIdFrame[2,<1|43737c09399c6c83b5|7eec376593ae622eb8cf90f4768a7997] NewConnectionIdFrame[3,<2|4373dc9ddaa0878f91|e91b97e33e4dfba9f3ebede3ab489d6d] 22.287 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 22.487/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 22.384/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.287 -> Packet A|1|S0|43737c09399c6c83b5|36|2 AckFrame[7,5|Δ0] RetireConnectionIdFrame[0] 22.288 <- (4) Packet A|8|S0|d267f439450f9c82|1057|1 StreamFrame[0(CIB),0,1024,fin] 22.288 Finished downloading https://server4:443/vutuvolvbo at 43:06.584 on ClientConnection[b2b05e387e2170b9/d267f439450f9c82(V1) with server4/193.167.100.100:443] 22.288 Closing ClientConnection[b2b05e387e2170b9/d267f439450f9c82(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.289 -> Packet A|2|S0|43737c09399c6c83b5|38|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5|Δ0] 22.289 Creating connection with server4:443 with v1 22.289 Setting up connection for downloading https://server4:443/hwfraoqohb at 43:06.586 on ClientConnection[dd924d0b1c525c9d/0b0e4269132d6e85(V1) with server4/193.167.100.100:443] 22.289 Original destination connection id: dd924d0b1c525c9d (scid: 0b0e4269132d6e85) >- CryptoStream[I|ClientHello] 22.291 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.491/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.291 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.319 <- (5) Packet A|9|S0|d267f439450f9c82|38|2 AckFrame[2|Δ0] ConnectionCloseFrame[0|0|] 22.324 <- (1) Packet I|0|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.324 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.524/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.324 <- (1) Packet H|1|L|1041|2 CryptoFrame[0,740] Padding(251) 22.328 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.425/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.327 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1152) 22.328 - unknown transport parameter 0xff04de1b, size 2 22.328 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 22.330 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.427/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.330 -> Packet H|0|L|81|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.331 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.428/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.331 Discarding pn space Initial because first Handshake message is being sent 22.331 Starting downloading https://server4:443/hwfraoqohb at 43:06.627 on ClientConnection[dd924d0b1c525c9d/0b0e4269132d6e85(V1) with server4/193.167.100.100:443] 22.331 -> Packet H|1|L|47|1 AckFrame[1|Δ0] 22.331 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.428/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.331 -> Packet A|0|S0|da675f2f7c128fe26e|48|1 StreamFrame[0(CIB),0,17,fin] 22.362 <- (2) Packet A|2|S0|0b0e4269132d6e85|1220|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|da676d6f62bf213099|27960bf21a25674908223b000c4c53e1] Padding(1161) 22.362 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 22.427/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 22.454/App, because ackElicitingInFlight | RTT:33/16 22.362 Discarding pn space Handshake because HandshakeDone is received 22.363 <- (3) Packet A|3|S0|0b0e4269132d6e85|1220|2 PingFrame[] Padding(1190) 22.363 -> Packet A|1|S0|da675f2f7c128fe26e|32|1 AckFrame[3-2|Δ0] 22.363 <- (4) Packet A|5|S0|0b0e4269132d6e85|92|3 AckFrame[0|Δ0] NewConnectionIdFrame[2,<1|6045080e721204630f|55666b2c946afc920f93b6e56934bdd7] NewConnectionIdFrame[3,<2|6045692d40b7c97316|1baf4a8bfb7b629a939a7af5f567fe37] 22.364 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 106 millis, based on 22.471/App, because ackElicitingInFlight | RTT:33/12 22.364 -> Packet A|2|S0|6045080e721204630f|38|3 RetireConnectionIdFrame[0] AckFrame[5,3-2|Δ0] RetireConnectionIdFrame[1] 22.364 <- (5) Packet A|6|S0|0b0e4269132d6e85|1057|1 StreamFrame[0(CIB),0,1024,fin] 22.365 Finished downloading https://server4:443/hwfraoqohb at 43:06.661 on ClientConnection[dd924d0b1c525c9d/0b0e4269132d6e85(V1) with server4/193.167.100.100:443] 22.365 Closing ClientConnection[dd924d0b1c525c9d/0b0e4269132d6e85(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.365 -> Packet A|3|S0|6045080e721204630f|38|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3-2|Δ0]