b003fc44cdb4a176: No root crt list specified -- certificate will not be verified. b003fc44cdb4a176: Sending ALPN list (1): hq-interop b003fc44cdb4a176: Sending transport parameter TLS extension (83 bytes): b003fc44cdb4a176: Extension list (83 bytes): b003fc44cdb4a176: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 b003fc44cdb4a176: Extension type: 4 (initial_max_data), length 4, 80100000 b003fc44cdb4a176: Extension type: 8 (max_streams_bidi), length 2, 4200 b003fc44cdb4a176: Extension type: 1 (idle_timeout), length 4, 8002bf20 b003fc44cdb4a176: Extension type: 3 (max_packet_size), length 2, 45a0 b003fc44cdb4a176: Extension type: 9 (max_streams_uni), length 2, 4200 b003fc44cdb4a176: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 b003fc44cdb4a176: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff b003fc44cdb4a176: Extension type: 14 (active_connection_id_limit), length 1, 08 b003fc44cdb4a176: Extension type: 11 (max_ack_delay), length 1, 0a b003fc44cdb4a176: Extension type: 15 (hcid), length 8, 4813caf4c7ee028e b003fc44cdb4a176: Extension type: 5514 (unknown), length 2, 43fc b003fc44cdb4a176: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 b003fc44cdb4a176: Extension type: 29016 (enable_time_stamp), length 1, 03 b003fc44cdb4a176: Extension type: 10930 (grease_quic_bit), length 0 b003fc44cdb4a176: Preparing GET on stream 0 for /arygtjgxcf b003fc44cdb4a176: Sending packet type: 2 (initial), S0, Q1, Version 1, b003fc44cdb4a176: , <4813caf4c7ee028e>, Seq: 123389, pl: 663 b003fc44cdb4a176: Token length: 0 b003fc44cdb4a176: Prepared 643 bytes b003fc44cdb4a176: ping, 1 bytes b003fc44cdb4a176: crypto_hs, offset 0, length 638: 0100027a0303e5bd... b003fc44cdb4a176: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, b003fc44cdb4a176: , <4813caf4c7ee028e>, Seq: 0, pl: 538 b003fc44cdb4a176: Prepared 518 bytes b003fc44cdb4a176: stream 0, offset 0, length 17, fin = 1: 474554202f617279... b003fc44cdb4a176: padding, 498 bytes b003fc44cdb4a176: Sending 1252 bytes to 193.167.100.100:443 at T=0.001889 (1ee0299f) b003fc44cdb4a176: Receiving 1065 bytes from 193.167.100.100:443 at T=0.036033 (1ee0aeff) b003fc44cdb4a176: T= 0.036033, Keys unavailable, buffered packet type 6. b003fc44cdb4a176: T= 0.092085, Lost packet type 2, number 123389, size 673, DCID <>, reason: timer b003fc44cdb4a176: Sending packet type: 2 (initial), S0, Q1, Version 1, b003fc44cdb4a176: , <4813caf4c7ee028e>, Seq: 123390, pl: 663 b003fc44cdb4a176: Token length: 0 b003fc44cdb4a176: Prepared 643 bytes b003fc44cdb4a176: ping, 1 bytes b003fc44cdb4a176: crypto_hs, offset 0, length 638: 0100027a0303e5bd... b003fc44cdb4a176: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, b003fc44cdb4a176: , <4813caf4c7ee028e>, Seq: 1, pl: 538 b003fc44cdb4a176: Prepared 518 bytes b003fc44cdb4a176: padding, 518 bytes b003fc44cdb4a176: Sending 1252 bytes to 193.167.100.100:443 at T=0.092085 (1ee189f3) b003fc44cdb4a176: Receiving 1220 bytes from 193.167.100.100:443 at T=0.150156 (1ee26cca) b003fc44cdb4a176: Receiving packet type: 2 (initial), S0, Q1, Version 1, b003fc44cdb4a176: <4813caf4c7ee028e>, <380ee2d09d8bb71160>, Seq: 153, pl: 1193 b003fc44cdb4a176: Token length: 0 b003fc44cdb4a176: Decrypted 1173 bytes b003fc44cdb4a176: ack_ecn (nb=0), 123389-123390, ect0=0, ect1=2, ce=0 b003fc44cdb4a176: padding, 1161 bytes b003fc44cdb4a176: Receiving 1220 bytes from 193.167.100.100:443 at T=0.186324 (1ee2fa12) b003fc44cdb4a176: Receiving packet type: 2 (initial), S0, Q1, Version 1, b003fc44cdb4a176: <4813caf4c7ee028e>, <380ee2d09d8bb71160>, Seq: 154, pl: 153 b003fc44cdb4a176: Token length: 0 b003fc44cdb4a176: Decrypted 133 bytes b003fc44cdb4a176: crypto_hs, offset 0, length 129: 0200007d0303dc4d... b003fc44cdb4a176: Receiving packet type: 4 (handshake), S0, Q1, Version 1, b003fc44cdb4a176: <4813caf4c7ee028e>, <380ee2d09d8bb71160>, Seq: 155, pl: 1014 b003fc44cdb4a176: Decrypted 994 bytes b003fc44cdb4a176: crypto_hs, offset 0, length 213: 0800009d009b000a... b003fc44cdb4a176: padding, 777 bytes b003fc44cdb4a176: Received transport parameter TLS extension (104 bytes): b003fc44cdb4a176: Extension list (104 bytes): b003fc44cdb4a176: Extension type: 0 (ocid), length 8, b003fc44cdb4a176 b003fc44cdb4a176: Extension type: 1 (idle_timeout), length 4, 80007530 b003fc44cdb4a176: Extension type: 2 (stateless_reset_token), length 16, 34d320ae68647a0d2d42c85559e7403b b003fc44cdb4a176: Extension type: 3 (max_packet_size), length 2, 45c0 b003fc44cdb4a176: Extension type: 4 (initial_max_data), length 4, 81000000 b003fc44cdb4a176: Extension type: 5 (max_stream_data_bidi_local), length 4, 80010000 b003fc44cdb4a176: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010000 b003fc44cdb4a176: Extension type: 7 (max_stream_data_uni), length 4, 80010000 b003fc44cdb4a176: Extension type: 8 (max_streams_bidi), length 2, 4064 b003fc44cdb4a176: Extension type: 9 (max_streams_uni), length 2, 4064 b003fc44cdb4a176: Extension type: 10 (ack_delay_exponent), length 1, 08 b003fc44cdb4a176: Extension type: 11 (max_ack_delay), length 1, 1a b003fc44cdb4a176: Extension type: 14 (active_connection_id_limit), length 1, 04 b003fc44cdb4a176: Extension type: 15 (hcid), length 9, 380ee2d09d8bb71160 b003fc44cdb4a176: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 b003fc44cdb4a176: Extension type: 10930 (grease_quic_bit), length 0 b003fc44cdb4a176: The session was properly resumed! b003fc44cdb4a176: Zero RTT data is accepted! b003fc44cdb4a176: Negotiated ALPN: hq-interop b003fc44cdb4a176: Receiving 1065 bytes from 193.167.100.100:443 at T=0.186775 (1ee2fbd5) b003fc44cdb4a176: Receiving packet type: 6 (1rtt protected), S0, Q1, b003fc44cdb4a176: <4813caf4c7ee028e>, Seq: 152 (152), Phi: 0, b003fc44cdb4a176: Decrypted 1036 bytes b003fc44cdb4a176: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 b003fc44cdb4a176: stream 0, offset 0, length 1024, fin = 1: aedf985ccb195db0... b003fc44cdb4a176: T= 0.186775, cwin: 17253,flight: 563,nb_ret: 1,rtt_min: 36033,rtt: 57049,rtt_var: 50790,max_ack_delay: 0,state: 10 b003fc44cdb4a176: Sending packet type: 4 (handshake), S0, Q0, Version 1, b003fc44cdb4a176: <380ee2d09d8bb71160>, <4813caf4c7ee028e>, Seq: 0, pl: 81 b003fc44cdb4a176: Prepared 61 bytes b003fc44cdb4a176: ack (nb=0), 155 b003fc44cdb4a176: crypto_hs, offset 0, length 52: 140000307cd537a6... b003fc44cdb4a176: Sending packet type: 6 (1rtt protected), S1, Q0, b003fc44cdb4a176: <380ee2d09d8bb71160>, Seq: 2 (2), Phi: 0, b003fc44cdb4a176: Prepared 156 bytes b003fc44cdb4a176: ack (nb=0), 152 b003fc44cdb4a176: new_connection_id[1]: 0x018b9c3878f50091, 872c6b56d4122a82a5027f16b0420835 b003fc44cdb4a176: new_connection_id[2]: 0x159395730385e7a5, 29ba7711d02235eec9d8c374b8964d69 b003fc44cdb4a176: new_connection_id[3]: 0xd564f9a1a83db044, 23b64abd47fa69d5da52c7a9cb15912e b003fc44cdb4a176: padding, 63 bytes b003fc44cdb4a176: T= 0.186775, cwin: 17253,flight: 853,nb_ret: 1,rtt_min: 36033,rtt: 57049,rtt_var: 50790,max_ack_delay: 0,state: 13 b003fc44cdb4a176: Sending 290 bytes to 193.167.100.100:443 at T=0.186775 (1ee2fbd5) b003fc44cdb4a176: Connection established. Version = 1, I-CID: b003fc44cdb4a176, verified: 1 b003fc44cdb4a176: T= 0.422478, Lost packet type 4, number 0, size 91, DCID <380ee2d09d8bb71160>, reason: timer b003fc44cdb4a176: Sending packet type: 4 (handshake), S0, Q0, Version 1, b003fc44cdb4a176: <380ee2d09d8bb71160>, <4813caf4c7ee028e>, Seq: 1, pl: 157 b003fc44cdb4a176: Prepared 137 bytes b003fc44cdb4a176: crypto_hs, offset 0, length 52: 140000307cd537a6... b003fc44cdb4a176: ack (nb=0), 155 b003fc44cdb4a176: padding, 73 bytes b003fc44cdb4a176: T= 0.422478, cwin: 17253,flight: 929,nb_ret: 2,rtt_min: 36033,rtt: 57049,rtt_var: 50790,max_ack_delay: 0,state: 13 b003fc44cdb4a176: Sending 183 bytes to 193.167.100.100:443 at T=0.422478 (1ee6948c) b003fc44cdb4a176: Receiving 1252 bytes from 193.167.100.100:443 at T=0.455524 (1ee715a2) b003fc44cdb4a176: Receiving packet type: 6 (1rtt protected), S0, Q1, b003fc44cdb4a176: <4813caf4c7ee028e>, Seq: 157 (157), Phi: 0, b003fc44cdb4a176: Decrypted 1223 bytes b003fc44cdb4a176: ping, 1 bytes b003fc44cdb4a176: padding, 1222 bytes b003fc44cdb4a176: T= 0.455524, cwin: 17253,flight: 929,nb_ret: 2,rtt_min: 36033,rtt: 57049,rtt_var: 50790,max_ack_delay: 0,state: 13 b003fc44cdb4a176: All done, Closing the connection. b003fc44cdb4a176: Sending packet type: 6 (1rtt protected), S1, Q1, b003fc44cdb4a176: <380ee2d09d8bb71160>, Seq: 3 (3), Phi: 0, b003fc44cdb4a176: Prepared 11 bytes b003fc44cdb4a176: ack (nb=1), 157, 152 b003fc44cdb4a176: application_close, Error 0x0000, Reason length 0 b003fc44cdb4a176: Sending 38 bytes to 193.167.100.100:443 at T=0.455603 (1ee715f1) b003fc44cdb4a176: Receiving 354 bytes from 193.167.100.100:443 at T=0.455800 (1ee716b6) b003fc44cdb4a176: Receiving packet type: 6 (1rtt protected), S0, Q1, b003fc44cdb4a176: <4813caf4c7ee028e>, Seq: 158 (158), Phi: 0, b003fc44cdb4a176: Decrypted 325 bytes b003fc44cdb4a176: crypto_hs, offset 0, length 321: 0400013d00001c20... b003fc44cdb4a176: Out of 2 zero RTT packets, 1 were acked by the server. b003fc44cdb4a176: Received 1024 bytes in 1.162317 seconds, 0.007048 Mbps. b003fc44cdb4a176: Sent 17 bytes in 1.162317 seconds, 0.000117 Mbps.