0.000 Creating connection with server4:443 with v1 0.082 Setting up connection for downloading https://server4:443/yhymdpidxe at 46:39.961 on ClientConnection[86d7cfa9c2c6c61c/01ee5725109647f8(V1) with server4/193.167.100.100:443] 0.084 Original destination connection id: 86d7cfa9c2c6c61c (scid: 01ee5725109647f8) >- CryptoStream[I|ClientHello] 0.229 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.430/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.224 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.273 Discarding packet (760 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 0.375 Discarding packet (760 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 0.430 loss detection timeout handler running Sending probe 0, because no ack since 0.224. Current RTT: 100/25. 0.431 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.433 (Probe is an initial retransmit) 0.436 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.836/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.436 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.585 <- (3) Packet I|211786|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[0|Δ321] Padding(1051) -< CryptoStream[I|ServerHello] 0.606 probe count not reset on ack because handshake not yet confirmed 0.610 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.010/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.620 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.620 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1079 millis, based on 1.700/Handshake, because peerAwaitingAddressValidation | RTT:360/180 reschedule loss detection timer for PTO over 1079 millis, based on 1.700/Handshake, because peerAwaitingAddressValidation | RTT:360/180 0.621 Discarding pn space Initial because first Handshake message is being sent 0.615 -> Packet I|2|L|1201|2 Token=[] AckFrame[211786|Δ0] Padding(1150) 0.996 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 0.996 <- (5) Packet H|211788|L|760|1 CryptoFrame[0,712] 1.003 - unknown transport parameter 0xff0a001, size 1 1.003 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 1.025 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1079 millis, based on 2.105/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:360/180 1.025 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.030 -> Packet H|1|L|49|1 AckFrame[211788|Δ0] 1.030 Starting downloading https://server4:443/yhymdpidxe at 46:40.927 on ClientConnection[86d7cfa9c2c6c61c/01ee5725109647f8(V1) with server4/193.167.100.100:443] 1.053 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1079 millis, based on 2.133/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:360/180 1.056 <- (6) Packet H|211789|L|48|1 AckFrame[0|Δ0] 1.057 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 1.057 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 1.052 -> Packet A|0|S0|4000001d5b092a07|47|1 StreamFrame[0(CIB),0,17,fin] 1.257 <- (7) Packet A|211784|S0|01ee5725109647f8|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000000ad1fd411c|8ec691c2c284b75977f7447efe69e415] Padding(1) -< CryptoStream[A|NewSessionTicket] 1.262 State is set to Confirmed reschedule loss detection timer for PTO over 1002 millis, based on 2.264/App, because ackElicitingInFlight | RTT:319/217 reschedule loss detection timer for PTO over 1001 millis, based on 2.264/App, because ackElicitingInFlight | RTT:319/217 1.263 Discarding pn space Handshake because HandshakeDone is received 1.282 -> Packet A|1|S0|4000001d5b092a07|35|1 AckFrame[211784|Δ19] 2.264 loss detection timeout handler running Sending probe 0, because no ack since 1.052. Current RTT: 319/217. 2.265 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 2423 millis, based on 4.689/App, because ackElicitingInFlight | RTT:319/217 2.265 -> Packet PA|2|S0|4000001d5b092a07|47|1 StreamFrame[0(CIB),0,17,fin] 4.689 loss detection timeout handler running Sending probe 1, because no ack since 2.265. Current RTT: 319/217. 4.689 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 4847 millis, based on 9.538/App, because ackElicitingInFlight | RTT:319/217 4.690 -> Packet PA|3|S0|4000001d5b092a07|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 4847 millis, based on 9.539/App, because ackElicitingInFlight | RTT:319/217 4.691 -> Packet PA|4|S0|4000001d5b092a07|47|1 StreamFrame[0(CIB),0,17,fin] 4.923 <- (8) Packet A|211788|S0|01ee5725109647f8|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 4.927 Finished downloading https://server4:443/yhymdpidxe at 46:44.823 on ClientConnection[86d7cfa9c2c6c61c/01ee5725109647f8(V1) with server4/193.167.100.100:443] 4.929 Closing ClientConnection[86d7cfa9c2c6c61c/01ee5725109647f8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.931 Creating connection with server4:443 with v1 4.932 Setting up connection for downloading https://server4:443/ghkuapgixw at 46:44.829 on ClientConnection[1627e818aa29b181/ba140130ba379ff0(V1) with server4/193.167.100.100:443] 4.932 Original destination connection id: 1627e818aa29b181 (scid: ba140130ba379ff0) >- CryptoStream[I|ClientHello] 4.931 -> Packet A|5|S0|4000001d5b092a07|41|2 ConnectionCloseFrame[0|0|] AckFrame[211788,211784|Δ5] 4.935 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.136/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.935 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.962 <- (9) Packet A|211789|S0|01ee5725109647f8|41|1 ConnectionCloseFrame[0|28|Peer closed] 4.969 <- (1) Packet I|11322791|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 4.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 5.174/Handshake, because peerAwaitingAddressValidation | RTT:100/25 4.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.072/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.975 Discarding pn space Initial because first Handshake message is being sent 4.975 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.072/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.975 -> Packet I|1|L|1201|2 Token=[] AckFrame[11322791|Δ0] Padding(1150) 5.071 loss detection timeout handler running 5.071 Sending probe 0. Current RTT: 33/16. 5.072 Sending probe because peer awaiting address validation 5.072 (Probe is a handshake ping) 5.073 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 5.267/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.073 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 5.078 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.079 <- (3) Packet H|11322793|L|761|1 CryptoFrame[0,712] 5.080 - unknown transport parameter 0xff0a001, size 1 5.080 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 5.084 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 5.278/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.083 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.085 Starting downloading https://server4:443/ghkuapgixw at 46:44.982 on ClientConnection[1627e818aa29b181/ba140130ba379ff0(V1) with server4/193.167.100.100:443] 5.086 -> Packet H|2|L|49|1 AckFrame[11322793|Δ0] 5.086 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 5.281/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.086 -> Packet A|0|S0|4000004d7861806c|47|1 StreamFrame[0(CIB),0,17,fin] 5.280 loss detection timeout handler running Sending probe 1, because no ack since 5.083. Current RTT: 33/16. 5.280 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.281 (Probe is a handshake retransmit) 5.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 5.670/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.281 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 5.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 5.670/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.282 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 5.313 <- (4) Packet H|11322794|L|48|1 AckFrame[3-2,0|Δ0] 5.315 probe count not reset on ack because handshake not yet confirmed 5.316 Retransmitting CryptoFrame[0,36] on level Handshake 5.317 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 387 millis, based on 5.705/Handshake, because ackElicitingInFlight | RTT:33/16 5.317 -> Packet H|5|L|80|1 CryptoFrame[0,36] 5.318 Cwnd(-): 6000; inflight: 207 5.319 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 385 millis, based on 5.705/Handshake, because ackElicitingInFlight | RTT:33/16 5.313 <- (5) Packet A|11322791|S0|ba140130ba379ff0|336|5 CryptoFrame[0,250] AckFrame[0|Δ195] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000045cd93b08f|2c9a97af9998e54da93236c0b7bdf2d0] Padding(16) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 81 millis, based on 5.402/Handshake, because ackElicitingInFlight | RTT:33/13 5.321 State is set to Confirmed reschedule loss detection timer for PTO over 257 millis, based on 5.579/Handshake, because ackElicitingInFlight | RTT:54/52 5.321 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.321 Discarding pn space Handshake because HandshakeDone is received 5.314 <- (6) Packet A|11322792|S0|ba140130ba379ff0|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 5.322 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 5.322 Finished downloading https://server4:443/ghkuapgixw at 46:45.219 on ClientConnection[1627e818aa29b181/ba140130ba379ff0(V1) with server4/193.167.100.100:443] 5.322 Closing ClientConnection[1627e818aa29b181/ba140130ba379ff0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.322 -> Packet A|1|S0|4000004d7861806c|34|1 AckFrame[11322792-11322791|Δ0] 5.322 -> Packet A|2|S0|4000004d7861806c|38|2 ConnectionCloseFrame[0|0|] AckFrame[11322792-11322791|Δ0] 5.323 Creating connection with server4:443 with v1 5.323 Setting up connection for downloading https://server4:443/lhhkspgduy at 46:45.221 on ClientConnection[f452c4ae8123adb2/e6acf5f63b59c4d9(V1) with server4/193.167.100.100:443] 5.324 Original destination connection id: f452c4ae8123adb2 (scid: e6acf5f63b59c4d9) >- CryptoStream[I|ClientHello] 5.326 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.527/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.326 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.353 <- (8) Packet A|11322793|S0|ba140130ba379ff0|41|1 ConnectionCloseFrame[0|28|Peer closed] 5.479 Discarding packet (760 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 5.526 loss detection timeout handler running Sending probe 0, because no ack since 5.326. Current RTT: 100/25. 5.526 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.526 (Probe is an initial retransmit) 5.527 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.927/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.527 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.926 loss detection timeout handler running Sending probe 1, because no ack since 5.527. Current RTT: 100/25. 5.926 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.927 (Probe is an initial retransmit) 5.927 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.727/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.927 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.928 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.728/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.928 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.961 <- (2) Packet I|15128843|L|1232|2 Token=[] AckFrame[3,0|Δ0] Padding(1179) 5.962 probe count not reset on ack because handshake not yet confirmed 5.962 Cwnd(-): 6000; inflight: 1200 6.038 loss detection timeout handler running 6.039 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 6.423/Initial, because peerAwaitingAddressValidation | RTT:32/16 6.422 loss detection timeout handler running Sending probe 2, because no ack since 5.928. Current RTT: 32/16. 6.422 Sending probe because peer awaiting address validation 6.422 (Probe is Initial ping, because there is no Initial data to retransmit) 6.424 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 7.192/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 6.423 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 6.927 <- (3) Packet I|15128847|L|1232|2 Token=[] AckFrame[4-3,0|Δ470] Padding(1176) 6.928 probe count not reset on ack because handshake not yet confirmed 6.928 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 7.696/Initial, because peerAwaitingAddressValidation | RTT:32/16 6.929 Discarding packet (760 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 7.696 loss detection timeout handler running Sending probe 3, because no ack since 6.423. Current RTT: 91/130. 7.696 Sending probe because peer awaiting address validation 7.696 (Probe is Initial ping, because there is no Initial data to retransmit) 7.697 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 9775 millis, based on 17.473/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:91/130 7.697 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 11.736 Discarding packet (760 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 17.472 loss detection timeout handler running Sending probe 4, because no ack since 7.697. Current RTT: 91/130. 17.473 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.473 (Probe is Initial ping, because there is no Initial data to retransmit) 17.474 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 19551 millis, based on 37.026/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:91/130 17.474 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 17.475 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 19551 millis, based on 37.027/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:91/130 17.475 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 35.327 Error: 47:15.224 Error in client: java.net.ConnectException: Connection timed out after 30000 ms for ClientConnection[f452c4ae8123adb2/e6acf5f63b59c4d9(V1) with server4/193.167.100.100:443] 35.327 Creating connection with server4:443 with v1 35.328 Setting up connection for downloading https://server4:443/kqbhzuxoro at 47:15.225 on ClientConnection[3f4373404c56fedf/1f250386c4cd02aa(V1) with server4/193.167.100.100:443] 35.328 Original destination connection id: 3f4373404c56fedf (scid: 1f250386c4cd02aa) >- CryptoStream[I|ClientHello] 35.331 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.532/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.331 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.531 loss detection timeout handler running Sending probe 0, because no ack since 35.331. Current RTT: 100/25. 35.531 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 35.531 (Probe is an initial retransmit) 35.532 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 35.932/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.532 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.566 <- (1) Packet I|1481018|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[1|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 35.570 probe count not reset on ack because handshake not yet confirmed 35.570 Retransmitting CryptoFrame[0,257] on level Initial 35.570 Cwnd(-): 6000; inflight: 0 35.570 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 35.970/Handshake, because peerAwaitingAddressValidation | RTT:100/25 35.570 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 35.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 35.668/Handshake, because peerAwaitingAddressValidation | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 35.668/Handshake, because peerAwaitingAddressValidation | RTT:33/16 35.571 Discarding pn space Initial because first Handshake message is being sent 35.570 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.571 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[1481018|Δ0] Padding(1150) 35.667 loss detection timeout handler running 35.667 Sending probe 0. Current RTT: 33/16. 35.667 Sending probe because peer awaiting address validation 35.667 (Probe is a handshake ping) 35.668 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 35.862/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 35.668 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 35.674 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 35.674 <- (3) Packet H|1481020|L|760|1 CryptoFrame[0,712] 35.675 - unknown transport parameter 0xff0a001, size 1 35.675 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 35.678 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 35.873/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 35.678 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.680 Starting downloading https://server4:443/kqbhzuxoro at 47:15.577 on ClientConnection[3f4373404c56fedf/1f250386c4cd02aa(V1) with server4/193.167.100.100:443] 35.680 -> Packet H|2|L|49|1 AckFrame[1481020|Δ0] 35.680 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 35.874/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 35.680 -> Packet A|0|S0|40000081fdbf2a1d|47|1 StreamFrame[0(CIB),0,17,fin] 35.838 <- (4) Packet A|1481020|S0|1f250386c4cd02aa|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000892785a40a|7de02b8fe79f0c048487e813817d089f] Padding(1) -< CryptoStream[A|NewSessionTicket] 35.839 State is set to Confirmed reschedule loss detection timer for PTO over 33 millis, based on 35.872/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -37 millis, based on 35.802/App, because ackElicitingInFlight | RTT:33/16 35.839 loss detection timeout handler running 35.839 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 35.680. Current RTT: 33/16. 35.840 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 36.084/App, because ackElicitingInFlight | RTT:33/16 35.840 -> Packet PA|1|S0|40000081fdbf2a1d|47|1 StreamFrame[0(CIB),0,17,fin] 35.859 -> Packet A|2|S0|40000081fdbf2a1d|35|1 AckFrame[1481020|Δ19] 36.083 loss detection timeout handler running Sending probe 1, because no ack since 35.840. Current RTT: 33/16. 36.084 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 36.572/App, because ackElicitingInFlight | RTT:33/16 36.084 -> Packet PA|3|S0|40000081fdbf2a1d|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 36.573/App, because ackElicitingInFlight | RTT:33/16 36.085 -> Packet PA|4|S0|40000081fdbf2a1d|47|1 StreamFrame[0(CIB),0,17,fin] 36.256 <- (5) Packet A|1481024|S0|1f250386c4cd02aa|1063|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[3-2|Δ140] 36.258 Finished downloading https://server4:443/kqbhzuxoro at 47:16.155 on ClientConnection[3f4373404c56fedf/1f250386c4cd02aa(V1) with server4/193.167.100.100:443] 36.258 Closing ClientConnection[3f4373404c56fedf/1f250386c4cd02aa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 36.258 Cwnd(-): 3000; inflight: 0 36.259 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 36.259 Creating connection with server4:443 with v1 36.259 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 36.259 -> Packet A|5|S0|40000081fdbf2a1d|51|2 ConnectionCloseFrame[0|0|] StreamFrame[0(CIB),0,17,fin] 36.260 Setting up connection for downloading https://server4:443/yhotqklvjk at 47:16.157 on ClientConnection[6834de0b97a4e69f/2d4ba69dc88604f7(V1) with server4/193.167.100.100:443] 36.260 Original destination connection id: 6834de0b97a4e69f (scid: 2d4ba69dc88604f7) >- CryptoStream[I|ClientHello] 36.262 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.462/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.262 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.279 -> Packet A|6|S0|40000081fdbf2a1d|35|1 AckFrame[1481024|Δ19] 36.290 <- (6) Packet A|1481025|S0|1f250386c4cd02aa|41|1 ConnectionCloseFrame[0|28|Peer closed] 36.295 <- (1) Packet I|11061210|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 36.299 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.499/Handshake, because peerAwaitingAddressValidation | RTT:100/25 36.299 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 36.396/Handshake, because peerAwaitingAddressValidation | RTT:33/16 36.300 Discarding pn space Initial because first Handshake message is being sent 36.300 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 36.397/Handshake, because peerAwaitingAddressValidation | RTT:33/16 36.296 <- (2) Packet H|11061210|L|760|1 CryptoFrame[0,711] 36.300 -> Packet I|1|L|1201|2 Token=[] AckFrame[11061210|Δ0] Padding(1150) 36.300 - unknown transport parameter 0xff0a001, size 1 36.301 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 36.304 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 36.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 36.303 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 36.304 Starting downloading https://server4:443/yhotqklvjk at 47:16.202 on ClientConnection[6834de0b97a4e69f/2d4ba69dc88604f7(V1) with server4/193.167.100.100:443] 36.305 -> Packet H|1|L|49|1 AckFrame[11061210|Δ0] 36.305 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 36.402/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 36.305 -> Packet A|0|S0|40000052b9484eb1|47|1 StreamFrame[0(CIB),0,17,fin] 36.334 <- (3) Packet H|11061211|L|49|1 AckFrame[0|Δ0] 36.335 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 36.335 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 36.335 <- (4) Packet A|11061210|S0|2d4ba69dc88604f7|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000578effd453|d45f2148785daf8eb4c22cec03dbe178] Padding(24) -< CryptoStream[A|NewSessionTicket] 36.336 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 36.415/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 36.415/App, because ackElicitingInFlight | RTT:33/13 36.337 Discarding pn space Handshake because HandshakeDone is received 36.337 <- (5) Packet A|11061211|S0|2d4ba69dc88604f7|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 36.337 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 36.338 Finished downloading https://server4:443/yhotqklvjk at 47:16.235 on ClientConnection[6834de0b97a4e69f/2d4ba69dc88604f7(V1) with server4/193.167.100.100:443] 36.338 Closing ClientConnection[6834de0b97a4e69f/2d4ba69dc88604f7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 36.338 -> Packet A|1|S0|40000052b9484eb1|34|1 AckFrame[11061211-11061210|Δ0] 36.338 -> Packet A|2|S0|40000052b9484eb1|38|2 ConnectionCloseFrame[0|0|] AckFrame[11061211-11061210|Δ0] 36.338 Creating connection with server4:443 with v1 36.339 Setting up connection for downloading https://server4:443/mxiyhnqjyq at 47:16.236 on ClientConnection[95ed570012039006/e3f8e45af1913890(V1) with server4/193.167.100.100:443] 36.339 Original destination connection id: 95ed570012039006 (scid: e3f8e45af1913890) >- CryptoStream[I|ClientHello] 36.341 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.541/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.341 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.369 <- (6) Packet A|11061212|S0|2d4ba69dc88604f7|41|1 ConnectionCloseFrame[0|28|Peer closed] 36.484 <- (1) Packet I|10867867|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[0|Δ110] Padding(1052) -< CryptoStream[I|ServerHello] 36.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.688/Handshake, because peerAwaitingAddressValidation | RTT:100/25 36.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 36.914/Handshake, because peerAwaitingAddressValidation | RTT:142/71 36.488 Discarding pn space Initial because first Handshake message is being sent 36.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 36.914/Handshake, because peerAwaitingAddressValidation | RTT:142/71 36.488 -> Packet I|1|L|1201|2 Token=[] AckFrame[10867867|Δ0] Padding(1150) 36.695 <- (2) Packet H|10867869|L|761|1 CryptoFrame[0,712] 36.696 - unknown transport parameter 0xff0a001, size 1 36.696 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 36.699 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 37.125/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:142/71 36.699 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 36.700 Starting downloading https://server4:443/mxiyhnqjyq at 47:16.597 on ClientConnection[95ed570012039006/e3f8e45af1913890(V1) with server4/193.167.100.100:443] 36.701 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 37.127/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:142/71 36.701 -> [Packet H|1|L|49|1 AckFrame[10867869|Δ0], Packet A|0|S0|40000048648a9089|47|1 StreamFrame[0(CIB),0,17,fin]] 36.730 <- (3) Packet A|10867865|S0|e3f8e45af1913890|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000049f6a8c3f0|a3873c78f18318e19fd4bc8e833fae0c] Padding(24) -< CryptoStream[A|NewSessionTicket] 36.731 State is set to Confirmed reschedule loss detection timer for PTO over 393 millis, based on 37.125/Handshake, because ackElicitingInFlight | RTT:142/71 reschedule loss detection timer for PTO over 419 millis, based on 37.152/App, because ackElicitingInFlight | RTT:142/71 36.732 Discarding pn space Handshake because HandshakeDone is received 36.751 -> Packet A|1|S0|40000048648a9089|35|1 AckFrame[10867865|Δ19] 37.151 loss detection timeout handler running Sending probe 0, because no ack since 36.701. Current RTT: 142/71. 37.151 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 901 millis, based on 38.053/App, because ackElicitingInFlight | RTT:142/71 37.151 -> Packet PA|2|S0|40000048648a9089|47|1 StreamFrame[0(CIB),0,17,fin] 38.053 loss detection timeout handler running Sending probe 1, because no ack since 37.151. Current RTT: 142/71. 38.053 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1803 millis, based on 39.857/App, because ackElicitingInFlight | RTT:142/71 38.053 -> Packet PA|3|S0|40000048648a9089|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1803 millis, based on 39.858/App, because ackElicitingInFlight | RTT:142/71 38.054 -> Packet PA|4|S0|40000048648a9089|47|1 StreamFrame[0(CIB),0,17,fin] 38.267 <- (4) Packet A|10867870|S0|e3f8e45af1913890|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 38.268 Finished downloading https://server4:443/mxiyhnqjyq at 47:18.165 on ClientConnection[95ed570012039006/e3f8e45af1913890(V1) with server4/193.167.100.100:443] 38.268 Closing ClientConnection[95ed570012039006/e3f8e45af1913890(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 38.269 Creating connection with server4:443 with v1 38.269 -> Packet A|5|S0|40000048648a9089|41|2 ConnectionCloseFrame[0|0|] AckFrame[10867870,10867865|Δ1] 38.270 Setting up connection for downloading https://server4:443/bhbtympeax at 47:18.167 on ClientConnection[2e487f70310f430f/acac5b0a9791a8f8(V1) with server4/193.167.100.100:443] 38.270 Original destination connection id: 2e487f70310f430f (scid: acac5b0a9791a8f8) >- CryptoStream[I|ClientHello] 38.272 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 38.472/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 38.272 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 38.300 <- (5) Packet A|10867871|S0|e3f8e45af1913890|41|1 ConnectionCloseFrame[0|28|Peer closed] 38.305 <- (1) Packet I|8714805|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 38.309 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 38.509/Handshake, because peerAwaitingAddressValidation | RTT:100/25 38.310 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 38.407/Handshake, because peerAwaitingAddressValidation | RTT:33/16 38.310 Discarding pn space Initial because first Handshake message is being sent 38.310 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 38.407/Handshake, because peerAwaitingAddressValidation | RTT:33/16 38.306 <- (2) Packet H|8714805|L|762|1 CryptoFrame[0,713] 38.310 -> Packet I|1|L|1201|2 Token=[] AckFrame[8714805|Δ0] Padding(1150) 38.310 - unknown transport parameter 0xff0a001, size 1 38.311 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 38.313 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 38.410/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 38.313 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 38.314 Starting downloading https://server4:443/bhbtympeax at 47:18.211 on ClientConnection[2e487f70310f430f/acac5b0a9791a8f8(V1) with server4/193.167.100.100:443] 38.314 -> Packet H|1|L|49|1 AckFrame[8714805|Δ0] 38.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 38.412/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 38.314 -> Packet A|0|S0|4000005764d0140d|47|1 StreamFrame[0(CIB),0,17,fin] 38.411 loss detection timeout handler running Sending probe 0, because no ack since 38.313. Current RTT: 33/16. 38.411 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 38.411 (Probe is a handshake retransmit) 38.412 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 38.606/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 38.411 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 38.458 <- (3) Packet H|8714809|L|762|1 CryptoFrame[0,713] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 38.461 -> Packet H|3|L|51|1 AckFrame[8714809,8714805|Δ0] 38.458 <- (4) Packet A|8714807|S0|acac5b0a9791a8f8|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000052474cebbd|e74b2dae33be142fd9fe052d18fdb5d6] Padding(1) -< CryptoStream[A|NewSessionTicket] 38.461 State is set to Confirmed reschedule loss detection timer for PTO over 97 millis, based on 38.558/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -24 millis, based on 38.436/App, because ackElicitingInFlight | RTT:33/16 38.462 Discarding pn space Handshake because HandshakeDone is received 38.461 loss detection timeout handler running Sending probe 0, because no ack since 38.314. Current RTT: 33/16. 38.462 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 38.706/App, because ackElicitingInFlight | RTT:33/16 38.462 -> Packet PA|1|S0|4000005764d0140d|47|1 StreamFrame[0(CIB),0,17,fin] 38.481 -> Packet A|2|S0|4000005764d0140d|35|1 AckFrame[8714807|Δ19] 38.604 <- (5) Packet A|8714810|S0|acac5b0a9791a8f8|1061|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[2-1|Δ91] 38.606 Cwnd(-): 6000; inflight: 0 38.606 Finished downloading https://server4:443/bhbtympeax at 47:18.503 on ClientConnection[2e487f70310f430f/acac5b0a9791a8f8(V1) with server4/193.167.100.100:443] 38.606 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 38.606 Closing ClientConnection[2e487f70310f430f/acac5b0a9791a8f8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 38.606 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 38.606 -> Packet A|3|S0|4000005764d0140d|47|1 StreamFrame[0(CIB),0,17,fin] 38.606 -> Packet A|4|S0|4000005764d0140d|38|2 ConnectionCloseFrame[0|0|] AckFrame[8714810|Δ0] 38.607 Creating connection with server4:443 with v1 38.607 Setting up connection for downloading https://server4:443/qkscsznmfg at 47:18.504 on ClientConnection[26fe7dcfb089042e/9e7cfa53a0485e06(V1) with server4/193.167.100.100:443] 38.607 Original destination connection id: 26fe7dcfb089042e (scid: 9e7cfa53a0485e06) >- CryptoStream[I|ClientHello] 38.609 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 38.809/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 38.609 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 38.637 <- (6) Packet A|8714811|S0|acac5b0a9791a8f8|41|1 ConnectionCloseFrame[0|28|Peer closed] 38.643 Discarding packet (760 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 38.752 <- (2) Packet I|1996244|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[0|Δ110] Padding(1053) -< CryptoStream[I|ServerHello] 38.756 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 38.956/Handshake, because peerAwaitingAddressValidation | RTT:100/25 38.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 39.184/Handshake, because peerAwaitingAddressValidation | RTT:143/71 38.757 Discarding pn space Initial because first Handshake message is being sent 38.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 39.184/Handshake, because peerAwaitingAddressValidation | RTT:143/71 38.753 <- (3) Packet H|1996244|L|760|1 CryptoFrame[0,712] 38.757 -> Packet I|1|L|1201|2 Token=[] AckFrame[1996244|Δ0] Padding(1150) 38.757 - unknown transport parameter 0xff0a001, size 1 38.757 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 38.760 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 39.187/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 38.760 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 38.761 Starting downloading https://server4:443/qkscsznmfg at 47:18.658 on ClientConnection[26fe7dcfb089042e/9e7cfa53a0485e06(V1) with server4/193.167.100.100:443] 38.761 -> Packet H|1|L|49|1 AckFrame[1996244|Δ0] 38.762 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 39.189/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 38.762 -> Packet A|0|S0|400000d880fe98aa|47|1 StreamFrame[0(CIB),0,17,fin] 38.791 <- (4) Packet H|1996245|L|48|1 AckFrame[0|Δ0] 38.792 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 38.792 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 38.791 <- (5) Packet A|1996242|S0|9e7cfa53a0485e06|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000dea863eaba|6d2ff3559027a9386248ef4e3531a880] Padding(25) -< CryptoStream[A|NewSessionTicket] 38.792 State is set to Confirmed reschedule loss detection timer for PTO over 451 millis, based on 39.244/App, because ackElicitingInFlight | RTT:129/82 reschedule loss detection timer for PTO over 451 millis, based on 39.244/App, because ackElicitingInFlight | RTT:129/82 38.793 Discarding pn space Handshake because HandshakeDone is received 38.812 -> Packet A|1|S0|400000d880fe98aa|35|1 AckFrame[1996242|Δ19] 39.243 loss detection timeout handler running Sending probe 0, because no ack since 38.762. Current RTT: 129/82. 39.244 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 963 millis, based on 40.208/App, because ackElicitingInFlight | RTT:129/82 39.244 -> Packet PA|2|S0|400000d880fe98aa|47|1 StreamFrame[0(CIB),0,17,fin] 39.276 <- (6) Packet A|1996247|S0|9e7cfa53a0485e06|1072|3 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 39.277 Cwnd(-): 6000; inflight: 0 39.277 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 39.277 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 485 millis, based on 39.763/App, because ackElicitingInFlight | RTT:117/86 39.278 Finished downloading https://server4:443/qkscsznmfg at 47:19.175 on ClientConnection[26fe7dcfb089042e/9e7cfa53a0485e06(V1) with server4/193.167.100.100:443] 39.277 -> Packet A|3|S0|400000d880fe98aa|55|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1996242|Δ0] 39.278 Closing ClientConnection[26fe7dcfb089042e/9e7cfa53a0485e06(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 39.278 Creating connection with server4:443 with v1 39.278 -> Packet A|4|S0|400000d880fe98aa|40|2 ConnectionCloseFrame[0|0|] AckFrame[1996247,1996242|Δ0] 39.279 Setting up connection for downloading https://server4:443/crskqwkkns at 47:19.176 on ClientConnection[b2646175128ee40d/e4e194ca9c6a8bf6(V1) with server4/193.167.100.100:443] 39.279 Original destination connection id: b2646175128ee40d (scid: e4e194ca9c6a8bf6) >- CryptoStream[I|ClientHello] 39.281 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 39.481/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.281 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.314 <- (1) Packet I|16487209|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 39.318 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 39.518/Handshake, because peerAwaitingAddressValidation | RTT:100/25 39.318 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 39.415/Handshake, because peerAwaitingAddressValidation | RTT:33/16 39.318 Discarding pn space Initial because first Handshake message is being sent 39.318 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 39.415/Handshake, because peerAwaitingAddressValidation | RTT:33/16 39.318 -> Packet I|1|L|1201|2 Token=[] AckFrame[16487209|Δ0] Padding(1150) 39.315 <- (2) Packet H|16487209|L|761|1 CryptoFrame[0,712] 39.319 - unknown transport parameter 0xff0a001, size 1 39.319 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 39.322 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 39.419/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 39.322 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 39.323 Starting downloading https://server4:443/crskqwkkns at 47:19.220 on ClientConnection[b2646175128ee40d/e4e194ca9c6a8bf6(V1) with server4/193.167.100.100:443] 39.323 -> Packet H|1|L|49|1 AckFrame[16487209|Δ0] 39.324 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 39.421/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 39.324 -> Packet A|0|S0|40000008e4657100|47|1 StreamFrame[0(CIB),0,17,fin] 39.420 loss detection timeout handler running Sending probe 0, because no ack since 39.322. Current RTT: 33/16. 39.420 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 39.420 (Probe is a handshake retransmit) 39.420 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 39.614/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 39.420 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 39.451 <- (3) Packet H|16487210|L|46|1 AckFrame[2-1|Δ0] 39.452 probe count not reset on ack because handshake not yet confirmed 39.452 Retransmitting CryptoFrame[0,36] on level Handshake 39.452 Cwnd(-): 6000; inflight: 47 39.452 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 39.452 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 39.453 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 169 millis, based on 39.622/Handshake, because ackElicitingInFlight | RTT:33/13 39.452 -> Packet H|3|L|80|1 CryptoFrame[0,36] 39.452 <- (4) Packet A|16487209|S0|e4e194ca9c6a8bf6|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000001d392f1531|7cf2febc06b06cd3e53b25c126168718] Padding(24) -< CryptoStream[A|NewSessionTicket] 39.453 State is set to Confirmed reschedule loss detection timer for PTO over 90 millis, based on 39.544/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over -19 millis, based on 39.434/App, because ackElicitingInFlight | RTT:33/13 39.453 loss detection timeout handler running 39.453 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 39.324. Current RTT: 33/13. 39.454 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 39.674/App, because ackElicitingInFlight | RTT:33/13 39.454 -> Packet PA|1|S0|40000008e4657100|47|1 StreamFrame[0(CIB),0,17,fin] 39.473 -> Packet A|2|S0|40000008e4657100|35|1 AckFrame[16487209|Δ19] 39.483 Discarding packet (46 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 39.673 loss detection timeout handler running Sending probe 1, because no ack since 39.454. Current RTT: 33/13. 39.673 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 439 millis, based on 40.114/App, because ackElicitingInFlight | RTT:33/13 39.674 -> Packet PA|3|S0|40000008e4657100|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 439 millis, based on 40.115/App, because ackElicitingInFlight | RTT:33/13 39.675 -> Packet PA|4|S0|40000008e4657100|47|1 StreamFrame[0(CIB),0,17,fin] 39.676 <- (7) Packet A|1996249|S0|9e7cfa53a0485e06|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000dea863eaba|6d2ff3559027a9386248ef4e3531a880] Padding(1) 39.677 <- (8) Packet A|1996250|S0|9e7cfa53a0485e06|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000dea863eaba|6d2ff3559027a9386248ef4e3531a880] Padding(1) 39.678 -> Packet A|5|S0|400000d880fe98aa|40|2 ConnectionCloseFrame[0|0|] AckFrame[1996247,1996242|Δ0] 39.678 -> Packet A|6|S0|400000d880fe98aa|40|2 ConnectionCloseFrame[0|0|] AckFrame[1996247,1996242|Δ0] 39.709 <- (9) Packet A|1996251|S0|9e7cfa53a0485e06|43|1 ConnectionCloseFrame[0|28|Peer closed] 39.847 <- (6) Packet A|16487213|S0|e4e194ca9c6a8bf6|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 39.848 Finished downloading https://server4:443/crskqwkkns at 47:19.745 on ClientConnection[b2646175128ee40d/e4e194ca9c6a8bf6(V1) with server4/193.167.100.100:443] 39.848 Closing ClientConnection[b2646175128ee40d/e4e194ca9c6a8bf6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 39.848 Creating connection with server4:443 with v1 39.848 -> Packet A|5|S0|40000008e4657100|40|2 ConnectionCloseFrame[0|0|] AckFrame[16487213,16487209|Δ0] 39.849 Setting up connection for downloading https://server4:443/sdlcwgwmlt at 47:19.746 on ClientConnection[e971e3fb886247b5/42c1a9dececad86a(V1) with server4/193.167.100.100:443] 39.849 Original destination connection id: e971e3fb886247b5 (scid: 42c1a9dececad86a) >- CryptoStream[I|ClientHello] 39.851 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.051/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.851 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.879 <- (7) Packet A|16487214|S0|e4e194ca9c6a8bf6|41|1 ConnectionCloseFrame[0|28|Peer closed] 39.884 <- (1) Packet I|14409976|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 39.887 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 40.087/Handshake, because peerAwaitingAddressValidation | RTT:100/25 39.888 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 39.985/Handshake, because peerAwaitingAddressValidation | RTT:33/16 39.888 Discarding pn space Initial because first Handshake message is being sent 39.888 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 39.985/Handshake, because peerAwaitingAddressValidation | RTT:33/16 39.888 -> Packet I|1|L|1201|2 Token=[] AckFrame[14409976|Δ0] Padding(1150) 39.984 loss detection timeout handler running 39.984 Sending probe 0. Current RTT: 33/16. 39.984 Sending probe because peer awaiting address validation 39.984 (Probe is a handshake ping) 39.985 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 40.179/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 39.985 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 40.003 <- (2) Packet H|14409978|L|761|1 CryptoFrame[0,712] 40.004 - unknown transport parameter 0xff0a001, size 1 40.004 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 40.007 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 40.201/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.007 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 40.007 Starting downloading https://server4:443/sdlcwgwmlt at 47:19.904 on ClientConnection[e971e3fb886247b5/42c1a9dececad86a(V1) with server4/193.167.100.100:443] 40.007 -> Packet H|2|L|49|1 AckFrame[14409978|Δ0] 40.008 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 40.202/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.008 -> Packet A|0|S0|40000096871f4664|47|1 StreamFrame[0(CIB),0,17,fin] 40.037 <- (3) Packet H|14409979|L|49|1 AckFrame[1|Δ0] 40.038 probe count not reset on ack because handshake not yet confirmed 40.038 Cwnd(-): 6000; inflight: 47 40.038 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 40.038 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 40.253 <- (4) Packet H|14409981|L|761|1 CryptoFrame[0,712] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 40.254 -> Packet H|3|L|51|1 AckFrame[14409981,14409979-14409978|Δ0] 40.545 <- (5) Packet A|14409982|S0|42c1a9dececad86a|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000009d0d4e079f|89bebf02a5874e05d45db113cf1689d2] Padding(1) -< CryptoStream[A|NewSessionTicket] 40.547 State is set to Confirmed reschedule loss detection timer for PTO over -318 millis, based on 40.228/App, because ackElicitingInFlight | RTT:33/13 40.547 loss detection timeout handler running Sending probe 1, because no ack since 40.007. Current RTT: 33/13. reschedule loss detection timer for PTO over -429 millis, based on 40.118/App, because ackElicitingInFlight | RTT:33/13 40.547 Discarding pn space Handshake because HandshakeDone is received 40.547 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 40.767/App, because ackElicitingInFlight | RTT:33/13 40.547 -> Packet PA|1|S0|40000096871f4664|47|1 StreamFrame[0(CIB),0,17,fin] 40.567 -> Packet A|2|S0|40000096871f4664|35|1 AckFrame[14409982|Δ19] 40.579 <- (6) Packet A|14409983|S0|42c1a9dececad86a|1072|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 40.580 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 40.580 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 97 millis, based on 40.678/App, because ackElicitingInFlight | RTT:33/10 40.580 Finished downloading https://server4:443/sdlcwgwmlt at 47:20.477 on ClientConnection[e971e3fb886247b5/42c1a9dececad86a(V1) with server4/193.167.100.100:443] 40.580 -> Packet A|3|S0|40000096871f4664|55|2 StreamFrame[0(CIB),0,17,fin] AckFrame[14409982|Δ0] 40.580 Closing ClientConnection[e971e3fb886247b5/42c1a9dececad86a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 40.581 -> Packet A|4|S0|40000096871f4664|38|2 ConnectionCloseFrame[0|0|] AckFrame[14409983-14409982|Δ0] 40.581 Creating connection with server4:443 with v1 40.582 Setting up connection for downloading https://server4:443/swsemcbhgk at 47:20.479 on ClientConnection[844bcf122d1db980/55fd5d362a86637c(V1) with server4/193.167.100.100:443] 40.582 Original destination connection id: 844bcf122d1db980 (scid: 55fd5d362a86637c) >- CryptoStream[I|ClientHello] 40.584 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.784/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.583 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.611 <- (7) Packet A|14409984|S0|42c1a9dececad86a|48|2 AckFrame[3,1|Δ0] Padding(15) 40.611 -> Packet A|5|S0|40000096871f4664|38|2 ConnectionCloseFrame[0|0|] AckFrame[14409983-14409982|Δ0] 40.702 <- (8) Packet A|14409986|S0|42c1a9dececad86a|1063|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[3,1|Δ90] 40.703 -> Packet A|6|S0|40000096871f4664|38|2 ConnectionCloseFrame[0|0|] AckFrame[14409983-14409982|Δ0] 40.734 <- (9) Packet A|14409987|S0|42c1a9dececad86a|41|1 ConnectionCloseFrame[0|28|Peer closed] 40.783 loss detection timeout handler running Sending probe 0, because no ack since 40.583. Current RTT: 100/25. 40.783 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 40.783 (Probe is an initial retransmit) 40.783 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 41.183/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.783 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.817 <- (1) Packet I|12333953|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[1|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 40.820 probe count not reset on ack because handshake not yet confirmed 40.821 Retransmitting CryptoFrame[0,257] on level Initial 40.821 Cwnd(-): 6000; inflight: 0 40.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 41.221/Handshake, because peerAwaitingAddressValidation | RTT:100/25 40.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 40.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.918/Handshake, because peerAwaitingAddressValidation | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 40.918/Handshake, because peerAwaitingAddressValidation | RTT:33/16 40.821 Discarding pn space Initial because first Handshake message is being sent 40.821 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.821 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[12333953|Δ0] Padding(1150) 40.817 <- (2) Packet H|12333953|L|760|1 CryptoFrame[0,711] 40.822 - unknown transport parameter 0xff0a001, size 1 40.822 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 40.824 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.922/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.824 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 40.825 -> Packet H|1|L|49|1 AckFrame[12333953|Δ0] 40.825 Starting downloading https://server4:443/swsemcbhgk at 47:20.723 on ClientConnection[844bcf122d1db980/55fd5d362a86637c(V1) with server4/193.167.100.100:443] 40.826 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.923/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.826 -> Packet A|0|S0|400000cb90f3219b|47|1 StreamFrame[0(CIB),0,17,fin] 40.922 loss detection timeout handler running Sending probe 0, because no ack since 40.824. Current RTT: 33/16. 40.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 40.922 (Probe is a handshake retransmit) 40.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 41.117/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.923 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 40.954 <- (3) Packet H|12333954|L|46|1 AckFrame[2-1|Δ0] 40.954 probe count not reset on ack because handshake not yet confirmed 40.954 Retransmitting CryptoFrame[0,36] on level Handshake 40.955 Cwnd(-): 3000; inflight: 47 40.955 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 40.955 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 40.955 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 169 millis, based on 41.125/Handshake, because ackElicitingInFlight | RTT:33/13 40.955 -> Packet H|3|L|80|1 CryptoFrame[0,36] 40.954 <- (4) Packet A|12333953|S0|55fd5d362a86637c|336|5 CryptoFrame[0,250] AckFrame[0|Δ96] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c85af25732|7ab18956c7733713215ee9c22e552bda] Padding(18) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 84 millis, based on 41.040/Handshake, because ackElicitingInFlight | RTT:33/13 40.956 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 41.105/Handshake, because ackElicitingInFlight | RTT:42/27 40.956 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 40.956 Discarding pn space Handshake because HandshakeDone is received 40.955 <- (5) Packet A|12333954|S0|55fd5d362a86637c|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 40.956 -> Packet A|1|S0|400000cb90f3219b|34|1 AckFrame[12333954-12333953|Δ0] 40.956 Finished downloading https://server4:443/swsemcbhgk at 47:20.853 on ClientConnection[844bcf122d1db980/55fd5d362a86637c(V1) with server4/193.167.100.100:443] 40.956 Closing ClientConnection[844bcf122d1db980/55fd5d362a86637c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 40.957 -> Packet A|2|S0|400000cb90f3219b|38|2 ConnectionCloseFrame[0|0|] AckFrame[12333954-12333953|Δ0] 40.957 Creating connection with server4:443 with v1 40.958 Setting up connection for downloading https://server4:443/fomtquszhn at 47:20.855 on ClientConnection[6c1a6bacb1098f22/9ad902fd722d14ba(V1) with server4/193.167.100.100:443] 40.958 Original destination connection id: 6c1a6bacb1098f22 (scid: 9ad902fd722d14ba) >- CryptoStream[I|ClientHello] 40.960 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 41.160/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.960 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.988 <- (6) Packet A|12333955|S0|55fd5d362a86637c|44|1 ConnectionCloseFrame[0|28|Peer closed] 40.988 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 40.993 <- (1) Packet I|6181161|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 40.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 41.198/Handshake, because peerAwaitingAddressValidation | RTT:100/25 40.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 41.095/Handshake, because peerAwaitingAddressValidation | RTT:33/16 40.998 Discarding pn space Initial because first Handshake message is being sent 40.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 41.096/Handshake, because peerAwaitingAddressValidation | RTT:33/16 40.998 -> Packet I|1|L|1201|2 Token=[] AckFrame[6181161|Δ0] Padding(1150) 41.095 loss detection timeout handler running 41.095 Sending probe 0. Current RTT: 33/16. 41.095 Sending probe because peer awaiting address validation 41.095 (Probe is a handshake ping) 41.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 41.290/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.095 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 41.289 loss detection timeout handler running Sending probe 1, because no ack since 41.095. Current RTT: 33/16. 41.289 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 41.289 (Probe is a handshake ping) 41.290 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 41.678/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.289 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 41.290 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 41.678/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.290 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 41.570 <- (2) Packet H|6181167|L|760|1 CryptoFrame[0,712] 41.571 - unknown transport parameter 0xff0a001, size 1 41.571 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 41.575 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 41.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.574 -> Packet H|3|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 41.575 Starting downloading https://server4:443/fomtquszhn at 47:21.472 on ClientConnection[6c1a6bacb1098f22/9ad902fd722d14ba(V1) with server4/193.167.100.100:443] 41.575 -> Packet H|4|L|49|1 AckFrame[6181167|Δ0] 41.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 41.964/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.575 -> Packet A|0|S0|400000036aab8bc6|47|1 StreamFrame[0(CIB),0,17,fin] 41.963 loss detection timeout handler running Sending probe 2, because no ack since 41.574. Current RTT: 33/16. 41.963 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 41.963 (Probe is a handshake retransmit) 41.963 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 42.739/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.963 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 41.964 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 42.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.964 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 41.994 <- (3) Packet H|6181168|L|48|1 AckFrame[5-4,2-0|Δ0] 41.995 probe count not reset on ack because handshake not yet confirmed 41.995 Retransmitting CryptoFrame[0,36] on level Handshake 41.995 Cwnd(-): 6000; inflight: 127 41.995 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 744 millis, based on 42.740/Handshake, because ackElicitingInFlight | RTT:33/16 41.995 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 679 millis, based on 42.675/Handshake, because ackElicitingInFlight | RTT:33/13 41.995 -> Packet H|7|L|80|1 CryptoFrame[0,36] 41.996 <- (4) Packet A|6181162|S0|9ad902fd722d14ba|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 41.996 <- (5) Packet H|6181169|L|48|1 AckFrame[6-4,2-0|Δ0] 41.996 Finished downloading https://server4:443/fomtquszhn at 47:21.893 on ClientConnection[6c1a6bacb1098f22/9ad902fd722d14ba(V1) with server4/193.167.100.100:443] 41.996 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 41.996 Closing ClientConnection[6c1a6bacb1098f22/9ad902fd722d14ba(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 83 millis, based on 42.080/Handshake, because ackElicitingInFlight | RTT:33/13 41.997 -> Packet A|1|S0|400000036aab8bc6|38|2 ConnectionCloseFrame[0|0|] AckFrame[6181162|Δ0] 41.997 Creating connection with server4:443 with v1 41.998 Setting up connection for downloading https://server4:443/qgppxatejt at 47:21.895 on ClientConnection[7ad930d35b6a3d60/5123cda6095d9ab0(V1) with server4/193.167.100.100:443] 41.998 Original destination connection id: 7ad930d35b6a3d60 (scid: 5123cda6095d9ab0) >- CryptoStream[I|ClientHello] 41.999 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 42.199/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.999 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.102 <- (6) Packet A|6181165|S0|9ad902fd722d14ba|320|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000002ebaaac72|c80b04d37096d82a50ceaecbf3cb79fb] Padding(1) AckFrame[0|Δ495] 42.103 -> Packet A|2|S0|400000036aab8bc6|38|2 ConnectionCloseFrame[0|0|] AckFrame[6181162|Δ0] 42.133 <- (7) Packet A|6181166|S0|9ad902fd722d14ba|43|1 ConnectionCloseFrame[0|28|Peer closed] 42.198 loss detection timeout handler running Sending probe 0, because no ack since 41.999. Current RTT: 100/25. 42.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 42.199 (Probe is an initial retransmit) 42.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 42.599/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.199 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.598 loss detection timeout handler running Sending probe 1, because no ack since 42.199. Current RTT: 100/25. 42.598 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 42.598 (Probe is an initial retransmit) 42.599 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 43.399/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.599 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.600 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 43.400/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.600 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.633 <- (1) Packet I|6127734|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[2|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 42.636 probe count not reset on ack because handshake not yet confirmed 42.636 Retransmitting CryptoFrame[0,257] on level Initial 42.636 Cwnd(-): 6000; inflight: 1200 42.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 43.436/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 42.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.734/Handshake, because peerAwaitingAddressValidation | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 42.734/Handshake, because peerAwaitingAddressValidation | RTT:33/16 42.637 Discarding pn space Initial because first Handshake message is being sent 42.636 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.637 Packet not sent because keys are discarded: Packet I|5|L|.|2 Token=[] AckFrame[6127734|Δ0] Padding(1150) 42.633 <- (2) Packet H|6127734|L|760|1 CryptoFrame[0,712] 42.637 - unknown transport parameter 0xff0a001, size 1 42.637 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 42.639 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.736/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 42.639 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 42.640 Starting downloading https://server4:443/qgppxatejt at 47:22.537 on ClientConnection[7ad930d35b6a3d60/5123cda6095d9ab0(V1) with server4/193.167.100.100:443] 42.640 -> Packet H|1|L|49|1 AckFrame[6127734|Δ0] 42.641 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.738/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 42.640 -> Packet A|0|S0|400000de1dfbe921|47|1 StreamFrame[0(CIB),0,17,fin] 42.671 <- (3) Packet H|6127735|L|48|1 AckFrame[0|Δ0] 42.671 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 42.671 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 42.671 <- (4) Packet A|6127734|S0|5123cda6095d9ab0|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c59d9ac550|bb3f11eaaca5d5c8edbfa765250a03cc] Padding(25) -< CryptoStream[A|NewSessionTicket] 42.672 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 42.750/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 42.750/App, because ackElicitingInFlight | RTT:33/13 42.672 Discarding pn space Handshake because HandshakeDone is received 42.692 -> Packet A|1|S0|400000de1dfbe921|35|1 AckFrame[6127734|Δ19] 42.750 loss detection timeout handler running Sending probe 0, because no ack since 42.640. Current RTT: 33/13. 42.750 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 42.971/App, because ackElicitingInFlight | RTT:33/13 42.751 -> Packet PA|2|S0|400000de1dfbe921|47|1 StreamFrame[0(CIB),0,17,fin] 42.862 <- (5) Packet A|6127739|S0|5123cda6095d9ab0|48|2 AckFrame[1-0|Δ138] Padding(14) reschedule loss detection timer for PTO over -1 millis, based on 42.861/App, because ackElicitingInFlight | RTT:33/13 42.862 loss detection timeout handler running Sending probe 0, because no ack since 42.751. Current RTT: 33/13. 42.863 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 43.083/App, because ackElicitingInFlight | RTT:33/13 42.863 -> Packet PA|3|S0|400000de1dfbe921|47|1 StreamFrame[0(CIB),0,17,fin] 43.082 loss detection timeout handler running Sending probe 1, because no ack since 42.863. Current RTT: 33/13. 43.082 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 439 millis, based on 43.523/App, because ackElicitingInFlight | RTT:33/13 43.083 -> Packet PA|4|S0|400000de1dfbe921|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 439 millis, based on 43.524/App, because ackElicitingInFlight | RTT:33/13 43.084 -> Packet PA|5|S0|400000de1dfbe921|47|1 StreamFrame[0(CIB),0,17,fin] 43.134 <- (6) Packet A|6127741|S0|5123cda6095d9ab0|48|2 AckFrame[4-3,1-0|Δ20] Padding(14) 43.134 Cwnd(-): 3000; inflight: 47 reschedule loss detection timer for PTO over 59 millis, based on 43.194/App, because ackElicitingInFlight | RTT:33/13 43.194 loss detection timeout handler running Sending probe 0, because no ack since 43.084. Current RTT: 33/10. 43.194 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 195 millis, based on 43.390/App, because ackElicitingInFlight | RTT:33/10 43.194 -> Packet PA|6|S0|400000de1dfbe921|47|1 StreamFrame[0(CIB),0,17,fin] 43.215 <- (7) Packet A|6127743|S0|5123cda6095d9ab0|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 43.215 Finished downloading https://server4:443/qgppxatejt at 47:23.113 on ClientConnection[7ad930d35b6a3d60/5123cda6095d9ab0(V1) with server4/193.167.100.100:443] 43.215 Closing ClientConnection[7ad930d35b6a3d60/5123cda6095d9ab0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 43.216 Creating connection with server4:443 with v1 43.216 -> Packet A|7|S0|400000de1dfbe921|42|2 ConnectionCloseFrame[0|0|] AckFrame[6127743,6127741,6127739|Δ0] 43.217 Setting up connection for downloading https://server4:443/bcdvacdqdn at 47:23.114 on ClientConnection[3e1b07500436fa76/238cb114947caa20(V1) with server4/193.167.100.100:443] 43.217 Original destination connection id: 3e1b07500436fa76 (scid: 238cb114947caa20) >- CryptoStream[I|ClientHello] 43.218 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 43.418/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.218 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 43.225 <- (8) Packet A|6127744|S0|5123cda6095d9ab0|48|2 AckFrame[6,4-3,1-0|Δ0] Padding(13) 43.225 -> Packet A|8|S0|400000de1dfbe921|42|2 ConnectionCloseFrame[0|0|] AckFrame[6127743,6127741,6127739|Δ0] 43.247 <- (9) Packet A|6127745|S0|5123cda6095d9ab0|41|1 ConnectionCloseFrame[0|28|Peer closed] 43.251 <- (1) Packet I|2895441|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 43.255 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 43.455/Handshake, because peerAwaitingAddressValidation | RTT:100/25 43.255 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 43.352/Handshake, because peerAwaitingAddressValidation | RTT:33/16 43.255 Discarding pn space Initial because first Handshake message is being sent 43.255 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 43.352/Handshake, because peerAwaitingAddressValidation | RTT:33/16 43.252 <- (2) Packet H|2895441|L|759|1 CryptoFrame[0,711] 43.255 -> Packet I|1|L|1201|2 Token=[] AckFrame[2895441|Δ0] Padding(1150) 43.255 - unknown transport parameter 0xff0a001, size 1 43.255 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 43.258 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 43.355/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 43.258 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 43.258 Starting downloading https://server4:443/bcdvacdqdn at 47:23.155 on ClientConnection[3e1b07500436fa76/238cb114947caa20(V1) with server4/193.167.100.100:443] 43.258 -> Packet H|1|L|49|1 AckFrame[2895441|Δ0] 43.259 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 43.356/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 43.258 -> Packet A|0|S0|4000000681e573e8|47|1 StreamFrame[0(CIB),0,17,fin] 43.289 <- (3) Packet H|2895442|L|48|1 AckFrame[0|Δ0] 43.289 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 43.289 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 43.289 <- (4) Packet A|2895441|S0|238cb114947caa20|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000015c135b64f|72f8f4d648185d1d1b78d69d334d6166] Padding(25) -< CryptoStream[A|NewSessionTicket] 43.290 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 43.368/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 43.368/App, because ackElicitingInFlight | RTT:33/13 43.290 Discarding pn space Handshake because HandshakeDone is received 43.309 -> Packet A|1|S0|4000000681e573e8|35|1 AckFrame[2895441|Δ19] 43.368 loss detection timeout handler running Sending probe 0, because no ack since 43.258. Current RTT: 33/13. 43.368 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 43.588/App, because ackElicitingInFlight | RTT:33/13 43.368 -> Packet PA|2|S0|4000000681e573e8|47|1 StreamFrame[0(CIB),0,17,fin] 43.400 Discarding packet (759 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 43.400 <- (6) Packet A|2895446|S0|238cb114947caa20|48|2 AckFrame[2,0|Δ0] Padding(13) 43.400 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 43.621 <- (7) Packet A|2895449|S0|238cb114947caa20|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000015c135b64f|72f8f4d648185d1d1b78d69d334d6166] Padding(1) -< CryptoStream[A|NewSessionTicket] 43.641 -> Packet A|3|S0|4000000681e573e8|39|1 AckFrame[2895449,2895446,2895441|Δ19] 44.061 Discarding packet (759 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 44.061 <- (9) Packet A|2895451|S0|238cb114947caa20|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000015c135b64f|72f8f4d648185d1d1b78d69d334d6166] Padding(1) -< CryptoStream[A|NewSessionTicket] 44.061 <- (10) Packet A|2895452|S0|238cb114947caa20|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000015c135b64f|72f8f4d648185d1d1b78d69d334d6166] Padding(1) -< CryptoStream[A|NewSessionTicket] 44.062 -> Packet A|4|S0|4000000681e573e8|40|1 AckFrame[2895452-2895451,2895449,2895446,2895441|Δ0] 44.094 <- (11) Packet A|2895453|S0|238cb114947caa20|1072|3 AckFrame[4,2,0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(9) 44.095 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 44.095 Finished downloading https://server4:443/bcdvacdqdn at 47:23.992 on ClientConnection[3e1b07500436fa76/238cb114947caa20(V1) with server4/193.167.100.100:443] 44.095 Closing ClientConnection[3e1b07500436fa76/238cb114947caa20(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 44.095 -> Packet A|5|S0|4000000681e573e8|38|2 ConnectionCloseFrame[0|0|] AckFrame[2895453|Δ0] 44.096 Creating connection with server4:443 with v1 44.096 Setting up connection for downloading https://server4:443/sszawxcerm at 47:23.993 on ClientConnection[f6bdb0e88d49a38a/99ea49e1b84d94a9(V1) with server4/193.167.100.100:443] 44.096 Original destination connection id: f6bdb0e88d49a38a (scid: 99ea49e1b84d94a9) >- CryptoStream[I|ClientHello] 44.098 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44.298/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.098 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.126 <- (12) Packet A|2895454|S0|238cb114947caa20|41|1 ConnectionCloseFrame[0|28|Peer closed] 44.132 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 44.242 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 44.297 loss detection timeout handler running Sending probe 0, because no ack since 44.098. Current RTT: 100/25. 44.297 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 44.297 (Probe is an initial retransmit) 44.298 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 44.698/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.298 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.451 <- (3) Packet I|6129734|L|1232|2 Token=[] AckFrame[1-0|Δ120] Padding(1181) 44.452 probe count not reset on ack because handshake not yet confirmed 44.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 44.852/Initial, because peerAwaitingAddressValidation | RTT:100/25 44.452 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 44.851 loss detection timeout handler running Sending probe 1, because no ack since 44.298. Current RTT: 153/76. 44.851 Sending probe because peer awaiting address validation 44.851 (Probe is Initial ping, because there is no Initial data to retransmit) 44.852 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1827 millis, based on 46.680/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 44.852 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 44.861 <- (5) Packet I|6129736|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[1-0|Δ530] Padding(1051) -< CryptoStream[I|ServerHello] 44.864 probe count not reset on ack because handshake not yet confirmed 44.865 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1827 millis, based on 46.693/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 44.865 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 456 millis, based on 45.322/Handshake, because peerAwaitingAddressValidation | RTT:153/76 44.865 Discarding pn space Initial because first Handshake message is being sent 44.865 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 456 millis, based on 45.322/Handshake, because peerAwaitingAddressValidation | RTT:153/76 44.865 -> Packet I|3|L|1201|2 Token=[] AckFrame[6129736,6129734|Δ0] Padding(1148) 45.321 loss detection timeout handler running 45.321 Sending probe 0. Current RTT: 153/76. 45.321 Sending probe because peer awaiting address validation 45.321 (Probe is a handshake ping) 45.322 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 913 millis, based on 46.236/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 45.322 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 45.806 <- (6) Packet H|6129742|L|761|1 CryptoFrame[0,713] 45.807 - unknown transport parameter 0xff0a001, size 1 45.807 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 45.810 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 913 millis, based on 46.724/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 45.809 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 45.810 Starting downloading https://server4:443/sszawxcerm at 47:25.707 on ClientConnection[f6bdb0e88d49a38a/99ea49e1b84d94a9(V1) with server4/193.167.100.100:443] 45.810 -> Packet H|2|L|49|1 AckFrame[6129742|Δ0] 45.810 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 913 millis, based on 46.724/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 45.810 -> Packet A|0|S0|400000505478688b|47|1 StreamFrame[0(CIB),0,17,fin] 45.841 <- (7) Packet H|6129743|L|48|1 AckFrame[1-0|Δ0] 45.841 probe count not reset on ack because handshake not yet confirmed 45.841 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 45.841 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 45.841 <- (8) Packet A|6129730|S0|99ea49e1b84d94a9|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005ec582fb5e|7142fff3a0c818b3c43c2092be7901ce] Padding(25) -< CryptoStream[A|NewSessionTicket] 45.842 State is set to Confirmed reschedule loss detection timer for PTO over 998 millis, based on 46.840/App, because ackElicitingInFlight | RTT:138/88 reschedule loss detection timer for PTO over 483 millis, based on 46.325/App, because ackElicitingInFlight | RTT:138/88 45.842 Discarding pn space Handshake because HandshakeDone is received 45.861 -> Packet A|1|S0|400000505478688b|35|1 AckFrame[6129730|Δ19] 46.325 loss detection timeout handler running Sending probe 0, because no ack since 45.810. Current RTT: 138/88. 46.325 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1029 millis, based on 47.356/App, because ackElicitingInFlight | RTT:138/88 46.326 -> Packet PA|2|S0|400000505478688b|47|1 StreamFrame[0(CIB),0,17,fin] 46.488 <- (9) Packet A|6129734|S0|99ea49e1b84d94a9|1061|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[2-1|Δ130] 46.489 Cwnd(-): 6000; inflight: 0 46.489 Finished downloading https://server4:443/sszawxcerm at 47:26.386 on ClientConnection[f6bdb0e88d49a38a/99ea49e1b84d94a9(V1) with server4/193.167.100.100:443] 46.489 Closing ClientConnection[f6bdb0e88d49a38a/99ea49e1b84d94a9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 46.489 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 46.489 -> Packet A|3|S0|400000505478688b|47|1 StreamFrame[0(CIB),0,17,fin] 46.489 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 46.490 -> Packet A|4|S0|400000505478688b|30|1 ConnectionCloseFrame[0|0|] 46.490 Creating connection with server4:443 with v1 46.491 Setting up connection for downloading https://server4:443/sdzjgjsdum at 47:26.388 on ClientConnection[586eba6dc003b376/77ce2764c21798c5(V1) with server4/193.167.100.100:443] 46.491 Original destination connection id: 586eba6dc003b376 (scid: 77ce2764c21798c5) >- CryptoStream[I|ClientHello] 46.493 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 46.693/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 46.492 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 46.509 -> Packet A|5|S0|400000505478688b|35|1 AckFrame[6129734|Δ19] 46.520 <- (10) Packet A|6129735|S0|99ea49e1b84d94a9|41|1 ConnectionCloseFrame[0|28|Peer closed] 46.526 <- (1) Packet I|12266599|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 46.529 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 46.729/Handshake, because peerAwaitingAddressValidation | RTT:100/25 46.529 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 46.626/Handshake, because peerAwaitingAddressValidation | RTT:33/16 46.529 Discarding pn space Initial because first Handshake message is being sent 46.529 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 46.626/Handshake, because peerAwaitingAddressValidation | RTT:33/16 46.529 -> Packet I|1|L|1201|2 Token=[] AckFrame[12266599|Δ0] Padding(1150) 46.626 loss detection timeout handler running 46.626 Sending probe 0. Current RTT: 33/16. 46.626 Sending probe because peer awaiting address validation 46.626 (Probe is a handshake ping) 46.626 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 46.820/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 46.626 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 46.636 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 46.636 <- (3) Packet H|12266601|L|761|1 CryptoFrame[0,712] 46.637 - unknown transport parameter 0xff0a001, size 1 46.637 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 46.639 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 46.833/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 46.639 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 46.639 Starting downloading https://server4:443/sdzjgjsdum at 47:26.536 on ClientConnection[586eba6dc003b376/77ce2764c21798c5(V1) with server4/193.167.100.100:443] 46.639 -> Packet H|2|L|49|1 AckFrame[12266601|Δ0] 46.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 46.834/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 46.640 -> Packet A|0|S0|4000009d28f75709|47|1 StreamFrame[0(CIB),0,17,fin] 46.670 <- (4) Packet H|12266602|L|49|1 AckFrame[1-0|Δ0] 46.670 probe count not reset on ack because handshake not yet confirmed 46.670 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 46.670 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 46.670 <- (5) Packet A|12266599|S0|77ce2764c21798c5|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000090be88504e|a006abd60ec701207d62f2b1623ef5df] Padding(24) -< CryptoStream[A|NewSessionTicket] 46.671 State is set to Confirmed reschedule loss detection timer for PTO over 188 millis, based on 46.860/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 46.750/App, because ackElicitingInFlight | RTT:33/13 46.671 Discarding pn space Handshake because HandshakeDone is received 46.690 -> Packet A|1|S0|4000009d28f75709|35|1 AckFrame[12266599|Δ19] 46.749 loss detection timeout handler running Sending probe 0, because no ack since 46.640. Current RTT: 33/13. 46.749 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 46.969/App, because ackElicitingInFlight | RTT:33/13 46.749 -> Packet PA|2|S0|4000009d28f75709|47|1 StreamFrame[0(CIB),0,17,fin] 46.787 <- (6) Packet A|12266602|S0|77ce2764c21798c5|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000090be88504e|a006abd60ec701207d62f2b1623ef5df] Padding(1) -< CryptoStream[A|NewSessionTicket] 46.807 -> Packet A|3|S0|4000009d28f75709|37|1 AckFrame[12266602,12266599|Δ19] 46.838 <- (7) Packet A|12266604|S0|77ce2764c21798c5|1072|3 AckFrame[3,0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 46.839 Cwnd(-): 6000; inflight: 0 46.839 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 46.839 Finished downloading https://server4:443/sdzjgjsdum at 47:26.737 on ClientConnection[586eba6dc003b376/77ce2764c21798c5(V1) with server4/193.167.100.100:443] 46.840 Closing ClientConnection[586eba6dc003b376/77ce2764c21798c5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 46.840 -> Packet A|4|S0|4000009d28f75709|38|2 ConnectionCloseFrame[0|0|] AckFrame[12266604|Δ0] 46.840 Creating connection with server4:443 with v1 46.841 Setting up connection for downloading https://server4:443/gsxfufishw at 47:26.738 on ClientConnection[d4bcaafbb158dcb3/0598a08622486287(V1) with server4/193.167.100.100:443] 46.841 Original destination connection id: d4bcaafbb158dcb3 (scid: 0598a08622486287) >- CryptoStream[I|ClientHello] 46.842 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 47.042/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 46.842 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 47.041 loss detection timeout handler running Sending probe 0, because no ack since 46.842. Current RTT: 100/25. 47.041 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 47.041 (Probe is an initial retransmit) 47.042 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 47.442/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 47.042 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 47.075 <- (1) Packet I|2752748|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[1|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 47.078 probe count not reset on ack because handshake not yet confirmed 47.079 Retransmitting CryptoFrame[0,257] on level Initial 47.079 Cwnd(-): 6000; inflight: 0 47.079 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 47.079 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 47.479/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 399 millis, based on 47.479/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 47.079 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 47.079 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 47.176/Handshake, because peerAwaitingAddressValidation | RTT:33/16 47.079 Discarding pn space Initial because first Handshake message is being sent 47.080 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 47.177/Handshake, because peerAwaitingAddressValidation | RTT:33/16 47.079 -> Packet I|3|L|1201|2 Token=[] AckFrame[2752748|Δ0] Padding(1150) 47.076 <- (2) Packet H|2752748|L|760|1 CryptoFrame[0,712] 47.080 - unknown transport parameter 0xff0a001, size 1 47.080 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 47.082 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 47.179/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.082 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 47.083 Starting downloading https://server4:443/gsxfufishw at 47:26.980 on ClientConnection[d4bcaafbb158dcb3/0598a08622486287(V1) with server4/193.167.100.100:443] 47.083 -> Packet H|1|L|49|1 AckFrame[2752748|Δ0] 47.083 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 47.180/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.083 -> Packet A|0|S0|4000005a477ace9b|47|1 StreamFrame[0(CIB),0,17,fin] 47.179 loss detection timeout handler running Sending probe 0, because no ack since 47.082. Current RTT: 33/16. 47.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 47.180 (Probe is a handshake retransmit) 47.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 47.374/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.180 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 47.373 loss detection timeout handler running Sending probe 1, because no ack since 47.083. Current RTT: 33/16. 47.373 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 47.373 (Probe is a handshake retransmit) 47.374 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 47.762/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.374 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 47.375 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 47.763/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.375 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 47.405 <- (3) Packet A|2752748|S0|0598a08622486287|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000040fead4fa0|90030933c4877fc213e302d6d3ab14fb] Padding(25) -< CryptoStream[A|NewSessionTicket] 47.406 State is set to Confirmed reschedule loss detection timer for PTO over 165 millis, based on 47.571/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -200 millis, based on 47.205/App, because ackElicitingInFlight | RTT:33/16 47.406 Discarding pn space Handshake because HandshakeDone is received 47.406 loss detection timeout handler running Sending probe 0, because no ack since 47.083. Current RTT: 33/16. 47.406 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 47.650/App, because ackElicitingInFlight | RTT:33/16 47.406 -> Packet PA|1|S0|4000005a477ace9b|47|1 StreamFrame[0(CIB),0,17,fin] 47.426 -> Packet A|2|S0|4000005a477ace9b|35|1 AckFrame[2752748|Δ19] 47.437 <- (4) Packet A|2752749|S0|0598a08622486287|48|2 AckFrame[1|Δ0] Padding(15) 47.438 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 47.438 Cwnd(-): 3000; inflight: 0 47.438 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 47.548/App, because ackElicitingInFlight | RTT:33/13 47.438 -> Packet A|3|S0|4000005a477ace9b|55|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2752748|Δ0] 47.438 <- (5) Packet A|2752750|S0|0598a08622486287|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 47.439 Finished downloading https://server4:443/gsxfufishw at 47:27.336 on ClientConnection[d4bcaafbb158dcb3/0598a08622486287(V1) with server4/193.167.100.100:443] 47.439 Closing ClientConnection[d4bcaafbb158dcb3/0598a08622486287(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 47.439 Creating connection with server4:443 with v1 47.439 -> Packet A|4|S0|4000005a477ace9b|38|2 ConnectionCloseFrame[0|0|] AckFrame[2752750-2752748|Δ0] 47.440 Setting up connection for downloading https://server4:443/uwqcrxkzxq at 47:27.337 on ClientConnection[8426408333960596/c9470b91e5da7b80(V1) with server4/193.167.100.100:443] 47.440 Original destination connection id: 8426408333960596 (scid: c9470b91e5da7b80) >- CryptoStream[I|ClientHello] 47.442 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 47.642/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 47.441 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 47.470 <- (6) Packet A|2752751|S0|0598a08622486287|41|1 ConnectionCloseFrame[0|28|Peer closed] 47.475 <- (1) Packet I|2066220|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 47.478 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 47.678/Handshake, because peerAwaitingAddressValidation | RTT:100/25 47.478 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 47.575/Handshake, because peerAwaitingAddressValidation | RTT:33/16 47.478 Discarding pn space Initial because first Handshake message is being sent 47.478 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 47.575/Handshake, because peerAwaitingAddressValidation | RTT:33/16 47.478 -> Packet I|1|L|1201|2 Token=[] AckFrame[2066220|Δ0] Padding(1150) 47.475 <- (2) Packet H|2066220|L|760|1 CryptoFrame[0,712] 47.479 - unknown transport parameter 0xff0a001, size 1 47.479 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 47.481 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 47.578/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.481 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 47.482 Starting downloading https://server4:443/uwqcrxkzxq at 47:27.379 on ClientConnection[8426408333960596/c9470b91e5da7b80(V1) with server4/193.167.100.100:443] 47.482 -> Packet H|1|L|49|1 AckFrame[2066220|Δ0] 47.482 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 47.579/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.482 -> Packet A|0|S0|4000001462cd6e16|47|1 StreamFrame[0(CIB),0,17,fin] 47.578 loss detection timeout handler running Sending probe 0, because no ack since 47.481. Current RTT: 33/16. 47.578 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 47.579 (Probe is a handshake retransmit) 47.579 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 47.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.579 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 47.614 <- (3) Packet H|2066223|L|760|1 CryptoFrame[0,712] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 47.614 -> Packet H|3|L|51|1 AckFrame[2066223,2066220|Δ0] 47.614 <- (4) Packet A|2066222|S0|c9470b91e5da7b80|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000001fee25e6de|ed8e4cbebb2aca80c7928f7382a6029b] Padding(1) -< CryptoStream[A|NewSessionTicket] 47.615 State is set to Confirmed reschedule loss detection timer for PTO over 111 millis, based on 47.726/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -10 millis, based on 47.604/App, because ackElicitingInFlight | RTT:33/16 47.615 Discarding pn space Handshake because HandshakeDone is received 47.615 loss detection timeout handler running Sending probe 0, because no ack since 47.482. Current RTT: 33/16. 47.615 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 47.859/App, because ackElicitingInFlight | RTT:33/16 47.615 -> Packet PA|1|S0|4000001462cd6e16|47|1 StreamFrame[0(CIB),0,17,fin] 47.635 -> Packet A|2|S0|4000001462cd6e16|35|1 AckFrame[2066222|Δ19] 47.858 loss detection timeout handler running Sending probe 1, because no ack since 47.615. Current RTT: 33/16. 47.859 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 48.347/App, because ackElicitingInFlight | RTT:33/16 47.859 -> Packet PA|3|S0|4000001462cd6e16|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 48.348/App, because ackElicitingInFlight | RTT:33/16 47.860 -> Packet PA|4|S0|4000001462cd6e16|47|1 StreamFrame[0(CIB),0,17,fin] 47.891 <- (5) Packet A|2066226|S0|c9470b91e5da7b80|48|2 AckFrame[4,2-1|Δ0] Padding(15) 47.891 Cwnd(-): 6000; inflight: 47 47.891 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 47.891 -> Packet A|5|S0|4000001462cd6e16|47|1 StreamFrame[0(CIB),0,17,fin] 47.896 loss detection timeout handler running 47.896 loss detection timeout handler running 47.896 loss detection timeout handler running 47.896 loss detection timeout handler running 47.896 loss detection timeout handler running reschedule loss detection timer for PTO over 105 millis, based on 48.001/App, because ackElicitingInFlight | RTT:33/13 48.001 loss detection timeout handler running Sending probe 0, because no ack since 47.891. Current RTT: 33/13. 48.001 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 48.221/App, because ackElicitingInFlight | RTT:33/13 48.001 -> Packet PA|6|S0|4000001462cd6e16|47|1 StreamFrame[0(CIB),0,17,fin] 48.052 <- (6) Packet A|2066230|S0|c9470b91e5da7b80|48|2 AckFrame[6-4,2-1|Δ20] Padding(14) 48.053 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 48.374 <- (7) Packet A|2066232|S0|c9470b91e5da7b80|1065|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[6-4,2-1|Δ340] 48.374 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 48.375 Finished downloading https://server4:443/uwqcrxkzxq at 47:28.272 on ClientConnection[8426408333960596/c9470b91e5da7b80(V1) with server4/193.167.100.100:443] 48.375 Closing ClientConnection[8426408333960596/c9470b91e5da7b80(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 48.375 Creating connection with server4:443 with v1 48.375 -> Packet A|7|S0|4000001462cd6e16|42|2 ConnectionCloseFrame[0|0|] AckFrame[2066232,2066230,2066226|Δ0] 48.376 Setting up connection for downloading https://server4:443/ockhpjecya at 47:28.273 on ClientConnection[6b53759beedfd0f2/a9c386a37ef19e1e(V1) with server4/193.167.100.100:443] 48.376 Original destination connection id: 6b53759beedfd0f2 (scid: a9c386a37ef19e1e) >- CryptoStream[I|ClientHello] 48.377 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.577/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.377 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 48.411 <- (1) Packet I|6272704|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 48.413 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 48.613/Handshake, because peerAwaitingAddressValidation | RTT:100/25 48.413 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.510/Handshake, because peerAwaitingAddressValidation | RTT:33/16 48.413 Discarding pn space Initial because first Handshake message is being sent 48.414 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.511/Handshake, because peerAwaitingAddressValidation | RTT:33/16 48.413 -> Packet I|1|L|1201|2 Token=[] AckFrame[6272704|Δ0] Padding(1150) 48.411 <- (2) Packet H|6272704|L|760|1 CryptoFrame[0,712] 48.414 - unknown transport parameter 0xff0a001, size 1 48.414 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 48.416 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.513/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.416 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 48.416 Starting downloading https://server4:443/ockhpjecya at 47:28.314 on ClientConnection[6b53759beedfd0f2/a9c386a37ef19e1e(V1) with server4/193.167.100.100:443] 48.416 -> Packet H|1|L|49|1 AckFrame[6272704|Δ0] 48.417 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.514/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.417 -> Packet A|0|S0|40000002185f0cc1|47|1 StreamFrame[0(CIB),0,17,fin] 48.447 <- (3) Packet H|6272705|L|48|1 AckFrame[0|Δ0] 48.448 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 48.448 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 48.447 <- (4) Packet A|6272704|S0|a9c386a37ef19e1e|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000079d3e9a04|073ef6414da522fabdad8765f45fda06] Padding(25) -< CryptoStream[A|NewSessionTicket] 48.448 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 48.527/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 48.527/App, because ackElicitingInFlight | RTT:33/13 48.448 Discarding pn space Handshake because HandshakeDone is received 48.448 <- (5) Packet A|6272705|S0|a9c386a37ef19e1e|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 48.449 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 48.449 -> Packet A|1|S0|40000002185f0cc1|34|1 AckFrame[6272705-6272704|Δ0] 48.449 Finished downloading https://server4:443/ockhpjecya at 47:28.346 on ClientConnection[6b53759beedfd0f2/a9c386a37ef19e1e(V1) with server4/193.167.100.100:443] 48.449 Closing ClientConnection[6b53759beedfd0f2/a9c386a37ef19e1e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 48.450 Creating connection with server4:443 with v1 48.450 -> Packet A|2|S0|40000002185f0cc1|38|2 ConnectionCloseFrame[0|0|] AckFrame[6272705-6272704|Δ0] 48.451 Setting up connection for downloading https://server4:443/qoeqjebwlh at 47:28.348 on ClientConnection[4ac58edbf8ca4c9f/485f15438854b81c(V1) with server4/193.167.100.100:443] 48.451 Original destination connection id: 4ac58edbf8ca4c9f (scid: 485f15438854b81c) >- CryptoStream[I|ClientHello] 48.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.652/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.452 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 48.481 <- (6) Packet A|6272706|S0|a9c386a37ef19e1e|43|1 ConnectionCloseFrame[0|28|Peer closed] 48.486 <- (1) Packet I|5847320|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 48.489 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 48.689/Handshake, because peerAwaitingAddressValidation | RTT:100/25 48.489 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.586/Handshake, because peerAwaitingAddressValidation | RTT:33/16 48.489 Discarding pn space Initial because first Handshake message is being sent 48.490 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.587/Handshake, because peerAwaitingAddressValidation | RTT:33/16 48.489 -> Packet I|1|L|1201|2 Token=[] AckFrame[5847320|Δ0] Padding(1150) 48.586 loss detection timeout handler running 48.586 Sending probe 0. Current RTT: 33/16. 48.586 Sending probe because peer awaiting address validation 48.586 (Probe is a handshake ping) 48.586 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 48.780/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.586 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 48.599 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 48.600 <- (3) Packet H|5847322|L|760|1 CryptoFrame[0,712] 48.601 - unknown transport parameter 0xff0a001, size 1 48.601 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 48.603 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 48.797/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.603 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 48.604 Starting downloading https://server4:443/qoeqjebwlh at 47:28.501 on ClientConnection[4ac58edbf8ca4c9f/485f15438854b81c(V1) with server4/193.167.100.100:443] 48.604 -> Packet H|2|L|49|1 AckFrame[5847322|Δ0] 48.604 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 48.798/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.604 -> Packet A|0|S0|400000010c42c32c|47|1 StreamFrame[0(CIB),0,17,fin] 48.634 <- (4) Packet H|5847323|L|48|1 AckFrame[1-0|Δ0] 48.635 probe count not reset on ack because handshake not yet confirmed 48.635 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 48.635 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 48.634 <- (5) Packet A|5847320|S0|485f15438854b81c|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000008d90fc7b7|e768b076e695c70f18121329a483c862] Padding(25) -< CryptoStream[A|NewSessionTicket] 48.635 State is set to Confirmed reschedule loss detection timer for PTO over 188 millis, based on 48.824/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 48.714/App, because ackElicitingInFlight | RTT:33/13 48.636 Discarding pn space Handshake because HandshakeDone is received 48.655 -> Packet A|1|S0|400000010c42c32c|35|1 AckFrame[5847320|Δ19] 48.714 loss detection timeout handler running Sending probe 0, because no ack since 48.604. Current RTT: 33/13. 48.714 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 48.934/App, because ackElicitingInFlight | RTT:33/13 48.714 -> Packet PA|2|S0|400000010c42c32c|47|1 StreamFrame[0(CIB),0,17,fin] 48.857 <- (6) Packet A|5847323|S0|485f15438854b81c|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000008d90fc7b7|e768b076e695c70f18121329a483c862] Padding(1) -< CryptoStream[A|NewSessionTicket] 48.877 -> Packet A|3|S0|400000010c42c32c|37|1 AckFrame[5847323,5847320|Δ19] 48.909 <- (7) Packet A|5847325|S0|485f15438854b81c|1072|3 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 48.910 Cwnd(-): 6000; inflight: 0 48.910 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 48.910 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 49.020/App, because ackElicitingInFlight | RTT:33/13 48.910 -> Packet A|4|S0|400000010c42c32c|47|1 StreamFrame[0(CIB),0,17,fin] 48.910 Finished downloading https://server4:443/qoeqjebwlh at 47:28.807 on ClientConnection[4ac58edbf8ca4c9f/485f15438854b81c(V1) with server4/193.167.100.100:443] 48.910 Closing ClientConnection[4ac58edbf8ca4c9f/485f15438854b81c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 48.911 -> Packet A|5|S0|400000010c42c32c|38|2 ConnectionCloseFrame[0|0|] AckFrame[5847325|Δ0] 48.911 Creating connection with server4:443 with v1 48.911 Setting up connection for downloading https://server4:443/agqhwcjnrt at 47:28.809 on ClientConnection[b9efef860965a7a7/9d21d3df24bd4b1e(V1) with server4/193.167.100.100:443] 48.911 Original destination connection id: b9efef860965a7a7 (scid: 9d21d3df24bd4b1e) >- CryptoStream[I|ClientHello] 48.913 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 49.113/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.913 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 48.947 <- (1) Packet I|11609847|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 48.949 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 49.149/Handshake, because peerAwaitingAddressValidation | RTT:100/25 48.949 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 49.046/Handshake, because peerAwaitingAddressValidation | RTT:33/16 48.950 Discarding pn space Initial because first Handshake message is being sent 48.950 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 49.047/Handshake, because peerAwaitingAddressValidation | RTT:33/16 48.950 -> Packet I|1|L|1201|2 Token=[] AckFrame[11609847|Δ0] Padding(1150) 49.043 <- (8) Packet A|5847328|S0|485f15438854b81c|1061|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[4-2|Δ101] 49.044 -> Packet A|6|S0|400000010c42c32c|38|2 ConnectionCloseFrame[0|0|] AckFrame[5847325|Δ0] 49.046 loss detection timeout handler running 49.046 Sending probe 0. Current RTT: 33/16. 49.046 Sending probe because peer awaiting address validation 49.046 (Probe is a handshake ping) 49.046 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 49.240/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.046 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 49.063 <- (2) Packet H|11609849|L|761|1 CryptoFrame[0,712] 49.064 - unknown transport parameter 0xff0a001, size 1 49.064 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 49.066 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 49.260/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.066 -> Packet H|1|L|80|1 CryptoFrame[0,36] 49.066 Starting downloading https://server4:443/agqhwcjnrt at 47:28.963 on ClientConnection[b9efef860965a7a7/9d21d3df24bd4b1e(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 49.067 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 49.261/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.067 -> Packet A|0|S0|4000001c785b701b|47|1 StreamFrame[0(CIB),0,17,fin] 49.067 -> Packet H|2|L|49|1 AckFrame[11609849|Δ0] 49.260 loss detection timeout handler running Sending probe 1, because no ack since 49.066. Current RTT: 33/16. 49.260 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 49.260 (Probe is a handshake retransmit) 49.260 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 49.648/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.260 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 49.261 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 49.649/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.261 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 49.291 <- (3) Packet H|11609850|L|48|1 AckFrame[3-2,0|Δ0] 49.292 probe count not reset on ack because handshake not yet confirmed 49.292 Retransmitting CryptoFrame[0,36] on level Handshake 49.292 Cwnd(-): 6000; inflight: 127 49.292 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 356 millis, based on 49.649/Handshake, because ackElicitingInFlight | RTT:33/16 49.292 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 339 millis, based on 49.632/Handshake, because ackElicitingInFlight | RTT:33/13 49.292 -> Packet H|5|L|80|1 CryptoFrame[0,36] 49.292 <- (4) Packet A|11609847|S0|9d21d3df24bd4b1e|336|5 CryptoFrame[0,250] AckFrame[0|Δ194] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000108460defd|6317517d8b5d89cf09c1b950425fa6c6] Padding(16) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 84 millis, based on 49.377/Handshake, because ackElicitingInFlight | RTT:33/13 49.293 State is set to Confirmed reschedule loss detection timer for PTO over 261 millis, based on 49.554/Handshake, because ackElicitingInFlight | RTT:54/52 49.293 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 49.293 Discarding pn space Handshake because HandshakeDone is received 49.293 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 49.313 -> Packet A|1|S0|4000001c785b701b|35|1 AckFrame[11609847|Δ19] 49.420 <- (6) Packet A|11609850|S0|9d21d3df24bd4b1e|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 49.421 Finished downloading https://server4:443/agqhwcjnrt at 47:29.318 on ClientConnection[b9efef860965a7a7/9d21d3df24bd4b1e(V1) with server4/193.167.100.100:443] 49.421 Closing ClientConnection[b9efef860965a7a7/9d21d3df24bd4b1e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 49.421 -> Packet A|2|S0|4000001c785b701b|40|2 ConnectionCloseFrame[0|0|] AckFrame[11609850,11609847|Δ0] 49.421 Creating connection with server4:443 with v1 49.422 Setting up connection for downloading https://server4:443/rkperjhtjx at 47:29.319 on ClientConnection[5334e2745f73631c/6883b5067c1b6d30(V1) with server4/193.167.100.100:443] 49.422 Original destination connection id: 5334e2745f73631c (scid: 6883b5067c1b6d30) >- CryptoStream[I|ClientHello] 49.424 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 49.624/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 49.423 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 49.452 <- (7) Packet A|11609852|S0|9d21d3df24bd4b1e|41|1 ConnectionCloseFrame[0|28|Peer closed] 49.623 loss detection timeout handler running Sending probe 0, because no ack since 49.423. Current RTT: 100/25. 49.623 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 49.623 (Probe is an initial retransmit) 49.623 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 50.023/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 49.623 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 49.767 <- (1) Packet I|12400055|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[1|Δ110] Padding(1052) -< CryptoStream[I|ServerHello] 49.769 probe count not reset on ack because handshake not yet confirmed 49.770 Retransmitting CryptoFrame[0,257] on level Initial 49.770 Cwnd(-): 6000; inflight: 0 49.770 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 50.170/Handshake, because peerAwaitingAddressValidation | RTT:100/25 49.770 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 49.770 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 50.197/Handshake, because peerAwaitingAddressValidation | RTT:143/71 49.770 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 426 millis, based on 50.197/Handshake, because peerAwaitingAddressValidation | RTT:143/71 49.770 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 49.770 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[12400055|Δ0] Padding(1150) 49.767 <- (2) Packet H|12400055|L|762|1 CryptoFrame[0,713] 49.771 - unknown transport parameter 0xff0a001, size 1 49.771 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 49.773 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 50.200/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 49.773 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 49.773 Starting downloading https://server4:443/rkperjhtjx at 47:29.670 on ClientConnection[5334e2745f73631c/6883b5067c1b6d30(V1) with server4/193.167.100.100:443] 49.773 -> Packet H|1|L|49|1 AckFrame[12400055|Δ0] 49.774 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 50.201/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 49.774 -> Packet A|0|S0|40000081562b57fd|47|1 StreamFrame[0(CIB),0,17,fin] 49.805 <- (3) Packet A|12400054|S0|6883b5067c1b6d30|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 49.806 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 50.233/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 49.807 Finished downloading https://server4:443/rkperjhtjx at 47:29.704 on ClientConnection[5334e2745f73631c/6883b5067c1b6d30(V1) with server4/193.167.100.100:443] 49.807 Closing ClientConnection[5334e2745f73631c/6883b5067c1b6d30(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 49.807 Creating connection with server4:443 with v1 49.807 -> Packet A|1|S0|40000081562b57fd|38|2 ConnectionCloseFrame[0|0|] AckFrame[12400054|Δ0] 49.808 Setting up connection for downloading https://server4:443/lpofqjbwwi at 47:29.705 on ClientConnection[1b7646b240475f99/d8ac36994961b476(V1) with server4/193.167.100.100:443] 49.808 Original destination connection id: 1b7646b240475f99 (scid: d8ac36994961b476) >- CryptoStream[I|ClientHello] 49.809 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 50.009/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 49.809 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 49.843 <- (1) Packet I|4667025|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 49.846 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 50.046/Handshake, because peerAwaitingAddressValidation | RTT:100/25 49.846 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 49.943/Handshake, because peerAwaitingAddressValidation | RTT:33/16 49.846 Discarding pn space Initial because first Handshake message is being sent 49.847 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 49.944/Handshake, because peerAwaitingAddressValidation | RTT:33/16 49.843 <- (2) Packet H|4667025|L|761|1 CryptoFrame[0,713] 49.846 -> Packet I|1|L|1201|2 Token=[] AckFrame[4667025|Δ0] Padding(1150) 49.847 - unknown transport parameter 0xff0a001, size 1 49.847 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 49.850 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 49.947/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.850 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 49.850 Starting downloading https://server4:443/lpofqjbwwi at 47:29.747 on ClientConnection[1b7646b240475f99/d8ac36994961b476(V1) with server4/193.167.100.100:443] 49.851 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 49.948/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.851 -> [Packet H|1|L|49|1 AckFrame[4667025|Δ0], Packet A|0|S0|400000153704f8bc|47|1 StreamFrame[0(CIB),0,17,fin]] 49.881 <- (3) Packet H|4667026|L|48|1 AckFrame[0|Δ0] 49.881 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 49.881 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 49.881 <- (4) Packet A|4667025|S0|d8ac36994961b476|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000001d0135df1a|caeb46a3c9197b367f2e077a5c6c5b93] Padding(25) -< CryptoStream[A|NewSessionTicket] 49.882 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 49.961/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 49.961/App, because ackElicitingInFlight | RTT:33/13 49.882 Discarding pn space Handshake because HandshakeDone is received 49.882 <- (5) Packet A|4667026|S0|d8ac36994961b476|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 49.883 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 49.883 Finished downloading https://server4:443/lpofqjbwwi at 47:29.780 on ClientConnection[1b7646b240475f99/d8ac36994961b476(V1) with server4/193.167.100.100:443] 49.883 Closing ClientConnection[1b7646b240475f99/d8ac36994961b476(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 49.883 -> Packet A|1|S0|400000153704f8bc|34|1 AckFrame[4667026-4667025|Δ0] 49.884 -> Packet A|2|S0|400000153704f8bc|38|2 ConnectionCloseFrame[0|0|] AckFrame[4667026-4667025|Δ0] 49.884 Creating connection with server4:443 with v1 49.885 Setting up connection for downloading https://server4:443/oqxzmxrcet at 47:29.782 on ClientConnection[8942a2a19c1d83fa/44e902a89decb2b3(V1) with server4/193.167.100.100:443] 49.885 Original destination connection id: 8942a2a19c1d83fa (scid: 44e902a89decb2b3) >- CryptoStream[I|ClientHello] 49.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 50.086/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 49.886 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 49.915 <- (6) Packet A|4667027|S0|d8ac36994961b476|43|1 ConnectionCloseFrame[0|28|Peer closed] 49.915 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 49.920 <- (1) Packet I|12843723|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) 49.922 <- (4) Packet A|12400056|S0|6883b5067c1b6d30|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000093b4560026|72ee9ccb7c1de52f177a4fb31c41bca4] Padding(1) -< CryptoStream[I|ServerHello] 49.922 <- (5) Packet A|12400057|S0|6883b5067c1b6d30|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000093b4560026|72ee9ccb7c1de52f177a4fb31c41bca4] Padding(1) 49.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 50.123/Handshake, because peerAwaitingAddressValidation | RTT:100/25 49.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.020/Handshake, because peerAwaitingAddressValidation | RTT:33/16 49.923 Discarding pn space Initial because first Handshake message is being sent 49.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 49.923 -> Packet A|2|S0|40000081562b57fd|42|3 ConnectionCloseFrame[0|0|] AckFrame[12400054|Δ0] ConnectionCloseFrame[0|0|] reschedule loss detection timer for PTO over 96 millis, based on 50.020/Handshake, because peerAwaitingAddressValidation | RTT:33/16 49.923 -> Packet I|1|L|1201|2 Token=[] AckFrame[12843723|Δ0] Padding(1150) 49.920 <- (2) Packet H|12843723|L|760|1 CryptoFrame[0,711] 49.923 - unknown transport parameter 0xff0a001, size 1 49.923 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 49.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.023/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.925 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 49.926 Starting downloading https://server4:443/oqxzmxrcet at 47:29.823 on ClientConnection[8942a2a19c1d83fa/44e902a89decb2b3(V1) with server4/193.167.100.100:443] 49.926 -> Packet H|1|L|49|1 AckFrame[12843723|Δ0] 49.926 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.023/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.926 -> Packet A|0|S0|400000585e435a96|47|1 StreamFrame[0(CIB),0,17,fin] 49.957 <- (3) Packet H|12843724|L|49|1 AckFrame[0|Δ0] 49.957 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 49.957 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 49.957 <- (4) Packet A|12843723|S0|44e902a89decb2b3|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005fe9445d66|e4812e3716cf4a59a4b5f352982c5b75] Padding(24) -< CryptoStream[A|NewSessionTicket] 49.958 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 50.036/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 50.036/App, because ackElicitingInFlight | RTT:33/13 49.958 Discarding pn space Handshake because HandshakeDone is received 49.978 -> Packet A|1|S0|400000585e435a96|35|1 AckFrame[12843723|Δ19] 50.036 loss detection timeout handler running Sending probe 0, because no ack since 49.926. Current RTT: 33/13. 50.036 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 50.257/App, because ackElicitingInFlight | RTT:33/13 50.037 -> Packet PA|2|S0|400000585e435a96|47|1 StreamFrame[0(CIB),0,17,fin] 50.069 <- (5) Packet A|12843724|S0|44e902a89decb2b3|1072|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 50.069 Cwnd(-): 6000; inflight: 0 50.069 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 50.069 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 97 millis, based on 50.167/App, because ackElicitingInFlight | RTT:33/10 50.069 -> Packet A|3|S0|400000585e435a96|47|1 StreamFrame[0(CIB),0,17,fin] 50.070 Finished downloading https://server4:443/oqxzmxrcet at 47:29.967 on ClientConnection[8942a2a19c1d83fa/44e902a89decb2b3(V1) with server4/193.167.100.100:443] 50.070 Closing ClientConnection[8942a2a19c1d83fa/44e902a89decb2b3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 50.070 -> Packet A|4|S0|400000585e435a96|38|2 ConnectionCloseFrame[0|0|] AckFrame[12843724|Δ0] 50.071 Creating connection with server4:443 with v1 50.071 Setting up connection for downloading https://server4:443/ajfrkfxydk at 47:29.968 on ClientConnection[c756c20cb73138b2/cc259e95469c8e1f(V1) with server4/193.167.100.100:443] 50.071 Original destination connection id: c756c20cb73138b2 (scid: cc259e95469c8e1f) >- CryptoStream[I|ClientHello] 50.073 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 50.273/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.073 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.106 <- (1) Packet I|6677105|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 50.109 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 50.309/Handshake, because peerAwaitingAddressValidation | RTT:100/25 50.109 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.206/Handshake, because peerAwaitingAddressValidation | RTT:33/16 50.109 Discarding pn space Initial because first Handshake message is being sent 50.109 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.206/Handshake, because peerAwaitingAddressValidation | RTT:33/16 50.107 <- (2) Packet H|6677105|L|760|1 CryptoFrame[0,712] 50.109 -> Packet I|1|L|1201|2 Token=[] AckFrame[6677105|Δ0] Padding(1150) 50.109 - unknown transport parameter 0xff0a001, size 1 50.109 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 50.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.208/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.111 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 50.112 Starting downloading https://server4:443/ajfrkfxydk at 47:30.009 on ClientConnection[c756c20cb73138b2/cc259e95469c8e1f(V1) with server4/193.167.100.100:443] 50.112 -> Packet H|1|L|49|1 AckFrame[6677105|Δ0] 50.112 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.209/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.112 -> Packet A|0|S0|40000042cbfa2b1c|47|1 StreamFrame[0(CIB),0,17,fin] 50.120 <- (6) Packet A|12843725|S0|44e902a89decb2b3|48|2 AckFrame[3-1|Δ20] Padding(16) 50.121 -> Packet A|5|S0|400000585e435a96|38|2 ConnectionCloseFrame[0|0|] AckFrame[12843724|Δ0] 50.142 <- (3) Packet H|6677106|L|48|1 AckFrame[0|Δ0] 50.142 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 50.142 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 50.142 <- (4) Packet A|6677105|S0|cc259e95469c8e1f|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000046a41a86e2|03e749e045f31b39afcf3a3d2ed64c92] Padding(25) -< CryptoStream[A|NewSessionTicket] 50.143 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 50.222/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 50.222/App, because ackElicitingInFlight | RTT:33/13 50.143 Discarding pn space Handshake because HandshakeDone is received 50.163 -> Packet A|1|S0|40000042cbfa2b1c|35|1 AckFrame[6677105|Δ19] 50.162 <- (6) Packet A|12400059|S0|6883b5067c1b6d30|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000093b4560026|72ee9ccb7c1de52f177a4fb31c41bca4] Padding(1) 50.163 <- (7) Packet A|12400060|S0|6883b5067c1b6d30|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000093b4560026|72ee9ccb7c1de52f177a4fb31c41bca4] Padding(1) 50.163 -> Packet A|3|S0|40000081562b57fd|38|2 ConnectionCloseFrame[0|0|] AckFrame[12400054|Δ0] 50.194 <- (8) Packet A|12400061|S0|6883b5067c1b6d30|44|1 ConnectionCloseFrame[0|28|Peer closed] 50.221 loss detection timeout handler running Sending probe 0, because no ack since 50.112. Current RTT: 33/13. 50.221 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 50.442/App, because ackElicitingInFlight | RTT:33/13 50.222 -> Packet PA|2|S0|40000042cbfa2b1c|47|1 StreamFrame[0(CIB),0,17,fin] 50.243 <- (5) Packet A|6677107|S0|cc259e95469c8e1f|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000046a41a86e2|03e749e045f31b39afcf3a3d2ed64c92] Padding(1) -< CryptoStream[A|NewSessionTicket] 50.253 <- (7) Packet A|12843727|S0|44e902a89decb2b3|1063|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[3-1|Δ152] 50.254 -> Packet A|6|S0|400000585e435a96|38|2 ConnectionCloseFrame[0|0|] AckFrame[12843724|Δ0] 50.254 <- (6) Packet A|6677108|S0|cc259e95469c8e1f|1072|3 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 50.255 Cwnd(-): 6000; inflight: 0 50.255 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 50.255 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 97 millis, based on 50.353/App, because ackElicitingInFlight | RTT:33/10 50.255 -> Packet A|3|S0|40000042cbfa2b1c|58|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6677107,6677105|Δ11] 50.255 Finished downloading https://server4:443/ajfrkfxydk at 47:30.152 on ClientConnection[c756c20cb73138b2/cc259e95469c8e1f(V1) with server4/193.167.100.100:443] 50.255 Closing ClientConnection[c756c20cb73138b2/cc259e95469c8e1f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 50.256 Creating connection with server4:443 with v1 50.256 -> Packet A|4|S0|40000042cbfa2b1c|40|2 ConnectionCloseFrame[0|0|] AckFrame[6677108-6677107,6677105|Δ0] 50.256 Setting up connection for downloading https://server4:443/kvqcdpoffd at 47:30.153 on ClientConnection[a46cff840482c71b/afa347c254184259(V1) with server4/193.167.100.100:443] 50.256 Original destination connection id: a46cff840482c71b (scid: afa347c254184259) >- CryptoStream[I|ClientHello] 50.258 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 50.458/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.257 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.285 <- (8) Packet A|12843728|S0|44e902a89decb2b3|41|1 ConnectionCloseFrame[0|28|Peer closed] 50.286 <- (7) Packet A|6677109|S0|cc259e95469c8e1f|41|1 ConnectionCloseFrame[0|28|Peer closed] 50.291 <- (1) Packet I|2756919|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 50.294 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 50.494/Handshake, because peerAwaitingAddressValidation | RTT:100/25 50.294 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.391/Handshake, because peerAwaitingAddressValidation | RTT:33/16 50.294 Discarding pn space Initial because first Handshake message is being sent 50.294 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.391/Handshake, because peerAwaitingAddressValidation | RTT:33/16 50.294 -> Packet I|1|L|1201|2 Token=[] AckFrame[2756919|Δ0] Padding(1150) 50.390 loss detection timeout handler running 50.390 Sending probe 0. Current RTT: 33/16. 50.390 Sending probe because peer awaiting address validation 50.390 (Probe is a handshake ping) 50.390 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 50.585/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.390 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 50.401 <- (2) Packet H|2756921|L|761|1 CryptoFrame[0,713] 50.401 - unknown transport parameter 0xff0a001, size 1 50.401 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 50.404 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 50.598/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.404 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 50.404 Starting downloading https://server4:443/kvqcdpoffd at 47:30.301 on ClientConnection[a46cff840482c71b/afa347c254184259(V1) with server4/193.167.100.100:443] 50.404 -> Packet H|2|L|49|1 AckFrame[2756921|Δ0] 50.405 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 50.599/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.405 -> Packet A|0|S0|400000d8a09d1190|47|1 StreamFrame[0(CIB),0,17,fin] 50.435 <- (3) Packet A|2756919|S0|afa347c254184259|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000cd552541b1|58a1b871cde20bc4ced3fae158b1db95] Padding(25) -< CryptoStream[A|NewSessionTicket] 50.435 State is set to Confirmed reschedule loss detection timer for PTO over 162 millis, based on 50.598/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 50.527/App, because ackElicitingInFlight | RTT:33/16 50.435 Discarding pn space Handshake because HandshakeDone is received 50.436 <- (4) Packet A|2756920|S0|afa347c254184259|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 50.437 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 50.437 Finished downloading https://server4:443/kvqcdpoffd at 47:30.334 on ClientConnection[a46cff840482c71b/afa347c254184259(V1) with server4/193.167.100.100:443] 50.437 -> Packet A|1|S0|400000d8a09d1190|35|1 AckFrame[2756920-2756919|Δ1] 50.437 Closing ClientConnection[a46cff840482c71b/afa347c254184259(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 50.438 -> Packet A|2|S0|400000d8a09d1190|38|2 ConnectionCloseFrame[0|0|] AckFrame[2756920-2756919|Δ0] 50.438 Creating connection with server4:443 with v1 50.438 Setting up connection for downloading https://server4:443/gnecuaxkkw at 47:30.335 on ClientConnection[96d6996f338d4585/2f958b7342afd891(V1) with server4/193.167.100.100:443] 50.438 Original destination connection id: 96d6996f338d4585 (scid: 2f958b7342afd891) >- CryptoStream[I|ClientHello] 50.440 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 50.640/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.440 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.468 <- (5) Packet A|2756921|S0|afa347c254184259|41|1 ConnectionCloseFrame[0|28|Peer closed] 50.473 <- (1) Packet I|2330904|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 50.476 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 50.676/Handshake, because peerAwaitingAddressValidation | RTT:100/25 50.476 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.573/Handshake, because peerAwaitingAddressValidation | RTT:33/16 50.476 Discarding pn space Initial because first Handshake message is being sent 50.476 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.573/Handshake, because peerAwaitingAddressValidation | RTT:33/16 50.476 -> Packet I|1|L|1201|2 Token=[] AckFrame[2330904|Δ0] Padding(1150) 50.474 <- (2) Packet H|2330904|L|760|1 CryptoFrame[0,712] 50.477 - unknown transport parameter 0xff0a001, size 1 50.477 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 50.479 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.576/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 50.479 -> Packet H|0|L|80|1 CryptoFrame[0,36] 50.479 Starting downloading https://server4:443/gnecuaxkkw at 47:30.376 on ClientConnection[96d6996f338d4585/2f958b7342afd891(V1) with server4/193.167.100.100:443] 50.479 -> Packet H|1|L|49|1 AckFrame[2330904|Δ0] 50.480 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.577/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.480 -> Packet A|0|S0|40000015c1811e4f|47|1 StreamFrame[0(CIB),0,17,fin] 50.510 <- (3) Packet H|2330905|L|48|1 AckFrame[0|Δ0] 50.510 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 50.510 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 51.175 <- (4) Packet A|2330910|S0|2f958b7342afd891|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000013d3099c6f|4fd1a1128ec81aeae59f619ee4a60736] Padding(1) -< CryptoStream[A|NewSessionTicket] 51.176 State is set to Confirmed reschedule loss detection timer for PTO over -586 millis, based on 50.590/App, because ackElicitingInFlight | RTT:33/13 51.176 loss detection timeout handler running reschedule loss detection timer for PTO over -586 millis, based on 50.590/App, because ackElicitingInFlight | RTT:33/13 Sending probe 0, because no ack since 50.480. Current RTT: 33/13. 51.176 Discarding pn space Handshake because HandshakeDone is received 51.176 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 51.396/App, because ackElicitingInFlight | RTT:33/13 51.176 -> Packet PA|1|S0|40000015c1811e4f|47|1 StreamFrame[0(CIB),0,17,fin] 51.195 -> Packet A|2|S0|40000015c1811e4f|35|1 AckFrame[2330910|Δ19] 51.395 loss detection timeout handler running Sending probe 1, because no ack since 51.176. Current RTT: 33/13. 51.396 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 439 millis, based on 51.836/App, because ackElicitingInFlight | RTT:33/13 51.396 -> Packet PA|3|S0|40000015c1811e4f|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 439 millis, based on 51.837/App, because ackElicitingInFlight | RTT:33/13 51.397 -> Packet PA|4|S0|40000015c1811e4f|47|1 StreamFrame[0(CIB),0,17,fin] 51.428 <- (5) Packet A|2330911|S0|2f958b7342afd891|1072|3 AckFrame[3|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 51.428 Cwnd(-): 6000; inflight: 47 51.428 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 78 millis, based on 51.507/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 97 millis, based on 51.526/App, because ackElicitingInFlight | RTT:33/10 51.428 -> Packet A|5|S0|40000015c1811e4f|55|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2330910|Δ0] 51.429 Finished downloading https://server4:443/gnecuaxkkw at 47:31.326 on ClientConnection[96d6996f338d4585/2f958b7342afd891(V1) with server4/193.167.100.100:443] 51.429 Closing ClientConnection[96d6996f338d4585/2f958b7342afd891(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 51.429 -> Packet A|6|S0|40000015c1811e4f|38|2 ConnectionCloseFrame[0|0|] AckFrame[2330911-2330910|Δ0] 51.429 Creating connection with server4:443 with v1 51.430 Setting up connection for downloading https://server4:443/bugnqblrwl at 47:31.327 on ClientConnection[be16095fd490adc9/dc0f65c2150f725f(V1) with server4/193.167.100.100:443] 51.430 Original destination connection id: be16095fd490adc9 (scid: dc0f65c2150f725f) >- CryptoStream[I|ClientHello] 51.431 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 51.631/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 51.431 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 51.447 <- (6) Packet A|2330912|S0|2f958b7342afd891|48|2 AckFrame[4-3|Δ20] Padding(14) 51.448 -> Packet A|7|S0|40000015c1811e4f|38|2 ConnectionCloseFrame[0|0|] AckFrame[2330911-2330910|Δ0] 51.479 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 51.575 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 51.630 loss detection timeout handler running Sending probe 0, because no ack since 51.431. Current RTT: 100/25. 51.630 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 51.630 (Probe is an initial retransmit) 51.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 52.031/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 51.631 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 51.784 <- (2) Packet I|15518452|L|1232|2 Token=[] AckFrame[1-0|Δ120] Padding(1180) 51.785 probe count not reset on ack because handshake not yet confirmed 51.785 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 52.185/Initial, because peerAwaitingAddressValidation | RTT:100/25 51.785 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 52.184 loss detection timeout handler running Sending probe 1, because no ack since 51.631. Current RTT: 153/76. 52.184 Sending probe because peer awaiting address validation 52.184 (Probe is Initial ping, because there is no Initial data to retransmit) 52.185 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1827 millis, based on 54.013/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 52.184 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 52.195 <- (4) Packet I|15518454|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[1-0|Δ531] Padding(1050) -< CryptoStream[I|ServerHello] 52.197 probe count not reset on ack because handshake not yet confirmed 52.197 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1827 millis, based on 54.026/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 52.198 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 456 millis, based on 52.655/Handshake, because peerAwaitingAddressValidation | RTT:153/76 52.198 Discarding pn space Initial because first Handshake message is being sent 52.198 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 456 millis, based on 52.655/Handshake, because peerAwaitingAddressValidation | RTT:153/76 52.198 -> Packet I|3|L|1201|2 Token=[] AckFrame[15518454,15518452|Δ0] Padding(1148) 52.195 <- (5) Packet H|15518454|L|761|1 CryptoFrame[0,712] 52.198 - unknown transport parameter 0xff0a001, size 1 52.198 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 52.201 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 456 millis, based on 52.658/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 52.201 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 52.202 Starting downloading https://server4:443/bugnqblrwl at 47:32.099 on ClientConnection[be16095fd490adc9/dc0f65c2150f725f(V1) with server4/193.167.100.100:443] 52.202 -> Packet H|1|L|49|1 AckFrame[15518454|Δ0] 52.202 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 456 millis, based on 52.659/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 52.202 -> Packet A|0|S0|400000df78e695cd|47|1 StreamFrame[0(CIB),0,17,fin] 52.658 loss detection timeout handler running Sending probe 0, because no ack since 52.201. Current RTT: 153/76. 52.659 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 52.659 (Probe is a handshake retransmit) 52.659 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 913 millis, based on 53.573/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 52.659 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 53.572 loss detection timeout handler running Sending probe 1, because no ack since 52.202. Current RTT: 153/76. 53.572 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 53.572 (Probe is a handshake retransmit) 53.573 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1827 millis, based on 55.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 53.573 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 53.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1827 millis, based on 55.402/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:153/76 53.574 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 53.604 <- (6) Packet H|15518455|L|48|1 AckFrame[3,1|Δ0] 53.604 probe count not reset on ack because handshake not yet confirmed 53.604 Retransmitting CryptoFrame[0,36] on level Handshake 53.604 Cwnd(-): 6000; inflight: 127 53.604 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 1797 millis, based on 55.402/Handshake, because ackElicitingInFlight | RTT:153/76 53.605 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 1959 millis, based on 55.564/Handshake, because ackElicitingInFlight | RTT:138/88 53.604 -> Packet H|5|L|80|1 CryptoFrame[0,36] 53.605 <- (7) Packet A|15518449|S0|dc0f65c2150f725f|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 53.606 Finished downloading https://server4:443/bugnqblrwl at 47:33.503 on ClientConnection[be16095fd490adc9/dc0f65c2150f725f(V1) with server4/193.167.100.100:443] 53.606 Closing ClientConnection[be16095fd490adc9/dc0f65c2150f725f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 53.606 -> Packet A|1|S0|400000df78e695cd|38|2 ConnectionCloseFrame[0|0|] AckFrame[15518449|Δ0] 53.607 Creating connection with server4:443 with v1 53.607 Setting up connection for downloading https://server4:443/sltaooraev at 47:33.504 on ClientConnection[2e06f33bda04a647/fdf6e565f8b74344(V1) with server4/193.167.100.100:443] 53.607 Original destination connection id: 2e06f33bda04a647 (scid: fdf6e565f8b74344) >- CryptoStream[I|ClientHello] 53.609 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 53.809/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 53.609 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 53.637 <- (8) Packet H|15518457|L|57|1 ConnectionCloseFrame[0|28|Peer closed] 53.642 <- (1) Packet I|14839913|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 53.645 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 53.845/Handshake, because peerAwaitingAddressValidation | RTT:100/25 53.645 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 53.742/Handshake, because peerAwaitingAddressValidation | RTT:33/16 53.645 Discarding pn space Initial because first Handshake message is being sent 53.645 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 53.742/Handshake, because peerAwaitingAddressValidation | RTT:33/16 53.643 <- (2) Packet H|14839913|L|761|1 CryptoFrame[0,712] 53.645 -> Packet I|1|L|1201|2 Token=[] AckFrame[14839913|Δ0] Padding(1150) 53.646 - unknown transport parameter 0xff0a001, size 1 53.646 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 53.648 Starting downloading https://server4:443/sltaooraev at 47:33.545 on ClientConnection[2e06f33bda04a647/fdf6e565f8b74344(V1) with server4/193.167.100.100:443] 53.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 53.745/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 53.648 -> Packet H|0|L|80|1 CryptoFrame[0,36] 53.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 53.746/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 53.648 -> [Packet H|1|L|49|1 AckFrame[14839913|Δ0], Packet A|0|S0|400000da4e642977|47|1 StreamFrame[0(CIB),0,17,fin]] 53.745 loss detection timeout handler running Sending probe 0, because no ack since 53.648. Current RTT: 33/16. 53.745 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 53.745 (Probe is a handshake retransmit) 53.745 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 53.939/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 53.745 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 53.762 <- (3) Packet H|14839915|L|761|1 CryptoFrame[0,712] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 53.762 -> Packet H|3|L|51|1 AckFrame[14839915,14839913|Δ0] 53.938 loss detection timeout handler running Sending probe 1, because no ack since 53.648. Current RTT: 33/16. 53.938 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 53.939 (Probe is a handshake retransmit) 53.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 54.327/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 53.939 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 53.940 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 54.328/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 53.940 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 53.970 <- (4) Packet H|14839916|L|46|1 AckFrame[4-3|Δ0] 53.970 probe count not reset on ack because handshake not yet confirmed 53.970 Retransmitting CryptoFrame[0,36] on level Handshake 53.971 Cwnd(-): 6000; inflight: 127 53.971 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 357 millis, based on 54.328/Handshake, because ackElicitingInFlight | RTT:33/16 53.971 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 387 millis, based on 54.359/Handshake, because ackElicitingInFlight | RTT:33/13 53.971 -> Packet H|6|L|80|1 CryptoFrame[0,36] 53.970 <- (5) Packet A|14839913|S0|fdf6e565f8b74344|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000d9c8351209|ec4cc0feb48c9a0cd7d8f79038660d43] Padding(24) -< CryptoStream[A|NewSessionTicket] 53.971 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 54.088/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over -212 millis, based on 53.758/App, because ackElicitingInFlight | RTT:33/13 53.971 Discarding pn space Handshake because HandshakeDone is received 53.971 loss detection timeout handler running Sending probe 0, because no ack since 53.648. Current RTT: 33/13. 53.971 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 54.192/App, because ackElicitingInFlight | RTT:33/13 53.972 -> Packet PA|1|S0|400000da4e642977|47|1 StreamFrame[0(CIB),0,17,fin] 53.991 -> Packet A|2|S0|400000da4e642977|35|1 AckFrame[14839913|Δ19] 54.001 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 54.191 loss detection timeout handler running Sending probe 1, because no ack since 53.972. Current RTT: 33/13. 54.191 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 439 millis, based on 54.631/App, because ackElicitingInFlight | RTT:33/13 54.191 -> Packet PA|3|S0|400000da4e642977|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 439 millis, based on 54.632/App, because ackElicitingInFlight | RTT:33/13 54.192 -> Packet PA|4|S0|400000da4e642977|47|1 StreamFrame[0(CIB),0,17,fin] 54.223 <- (7) Packet A|14839914|S0|fdf6e565f8b74344|48|2 AckFrame[4,2|Δ0] Padding(15) 54.224 Cwnd(-): 3000; inflight: 47 54.224 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 54.224 -> Packet A|5|S0|400000da4e642977|47|1 StreamFrame[0(CIB),0,17,fin] 54.224 <- (8) Packet A|14839915|S0|fdf6e565f8b74344|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(18) 54.225 Finished downloading https://server4:443/sltaooraev at 47:34.122 on ClientConnection[2e06f33bda04a647/fdf6e565f8b74344(V1) with server4/193.167.100.100:443] 54.225 Closing ClientConnection[2e06f33bda04a647/fdf6e565f8b74344(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 54.225 -> Packet A|6|S0|400000da4e642977|38|2 ConnectionCloseFrame[0|0|] AckFrame[14839915-14839914|Δ0] 54.225 Creating connection with server4:443 with v1 54.226 Setting up connection for downloading https://server4:443/iuxjigpwzl at 47:34.123 on ClientConnection[cac871ea2af9c8f7/dbf548c941aeab6e(V1) with server4/193.167.100.100:443] 54.226 Original destination connection id: cac871ea2af9c8f7 (scid: dbf548c941aeab6e) >- CryptoStream[I|ClientHello] 54.227 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 54.427/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 54.227 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 54.260 <- (1) Packet I|3012624|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 54.264 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 54.464/Handshake, because peerAwaitingAddressValidation | RTT:100/25 54.264 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 54.361/Handshake, because peerAwaitingAddressValidation | RTT:33/16 54.264 Discarding pn space Initial because first Handshake message is being sent 54.264 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 54.361/Handshake, because peerAwaitingAddressValidation | RTT:33/16 54.264 -> Packet I|1|L|1201|2 Token=[] AckFrame[3012624|Δ0] Padding(1150) 54.360 loss detection timeout handler running 54.360 Sending probe 0. Current RTT: 33/16. 54.361 Sending probe because peer awaiting address validation 54.361 (Probe is a handshake ping) 54.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 54.555/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.361 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 54.376 <- (2) Packet H|3012626|L|760|1 CryptoFrame[0,712] 54.376 - unknown transport parameter 0xff0a001, size 1 54.376 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 54.379 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 54.573/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.378 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 54.379 Starting downloading https://server4:443/iuxjigpwzl at 47:34.276 on ClientConnection[cac871ea2af9c8f7/dbf548c941aeab6e(V1) with server4/193.167.100.100:443] 54.379 -> Packet H|2|L|49|1 AckFrame[3012626|Δ0] 54.379 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 54.573/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.379 -> Packet A|0|S0|400000d685d5d828|47|1 StreamFrame[0(CIB),0,17,fin] 54.409 <- (3) Packet H|3012627|L|48|1 AckFrame[1-0|Δ0] 54.410 probe count not reset on ack because handshake not yet confirmed 54.410 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 54.410 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 54.411 <- (4) Packet A|3012625|S0|dbf548c941aeab6e|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 54.411 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 54.412 Finished downloading https://server4:443/iuxjigpwzl at 47:34.309 on ClientConnection[cac871ea2af9c8f7/dbf548c941aeab6e(V1) with server4/193.167.100.100:443] 54.412 Closing ClientConnection[cac871ea2af9c8f7/dbf548c941aeab6e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 54.412 -> Packet A|1|S0|400000d685d5d828|38|2 ConnectionCloseFrame[0|0|] AckFrame[3012625|Δ0] 54.412 Creating connection with server4:443 with v1 54.413 Setting up connection for downloading https://server4:443/lgralaftou at 47:34.310 on ClientConnection[614617339e5cf213/6674f6df6c754d9c(V1) with server4/193.167.100.100:443] 54.413 Original destination connection id: 614617339e5cf213 (scid: 6674f6df6c754d9c) >- CryptoStream[I|ClientHello] 54.414 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 54.614/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 54.414 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 54.614 loss detection timeout handler running Sending probe 0, because no ack since 54.414. Current RTT: 100/25. 54.614 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 54.614 (Probe is an initial retransmit) 54.614 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 55.014/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 54.614 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.013 loss detection timeout handler running Sending probe 1, because no ack since 54.614. Current RTT: 100/25. 55.014 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 55.014 (Probe is an initial retransmit) 55.014 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 55.814/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 55.014 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.015 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 55.815/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 55.015 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.048 <- (1) Packet I|16433178|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[2|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 55.050 probe count not reset on ack because handshake not yet confirmed 55.051 Retransmitting CryptoFrame[0,257] on level Initial 55.051 Cwnd(-): 6000; inflight: 1200 55.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 55.851/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 55.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 55.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 55.148/Handshake, because peerAwaitingAddressValidation | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 55.148/Handshake, because peerAwaitingAddressValidation | RTT:33/16 55.051 Discarding pn space Initial because first Handshake message is being sent 55.051 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.048 <- (2) Packet H|16433178|L|761|1 CryptoFrame[0,712] 55.051 Packet not sent because keys are discarded: Packet I|5|L|.|2 Token=[] AckFrame[16433178|Δ0] Padding(1150) 55.051 - unknown transport parameter 0xff0a001, size 1 55.051 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 55.053 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 55.150/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 55.053 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 55.054 Starting downloading https://server4:443/lgralaftou at 47:34.951 on ClientConnection[614617339e5cf213/6674f6df6c754d9c(V1) with server4/193.167.100.100:443] 55.054 -> Packet H|1|L|49|1 AckFrame[16433178|Δ0] 55.054 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 55.151/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 55.054 -> Packet A|0|S0|4000001f81134f05|47|1 StreamFrame[0(CIB),0,17,fin] 55.150 loss detection timeout handler running Sending probe 0, because no ack since 55.053. Current RTT: 33/16. 55.150 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 55.151 (Probe is a handshake retransmit) 55.151 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 55.345/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 55.151 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 55.182 <- (3) Packet A|16433178|S0|6674f6df6c754d9c|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000003a69b8699|e8b8a35f98d0b3792e8090a2eae1f3a4] Padding(24) -< CryptoStream[A|NewSessionTicket] 55.183 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 55.298/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 55.176/App, because ackElicitingInFlight | RTT:33/16 55.183 Discarding pn space Handshake because HandshakeDone is received 55.183 loss detection timeout handler running Sending probe 0, because no ack since 55.054. Current RTT: 33/16. 55.183 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 55.427/App, because ackElicitingInFlight | RTT:33/16 55.183 -> Packet PA|1|S0|4000001f81134f05|47|1 StreamFrame[0(CIB),0,17,fin] 55.203 -> Packet A|2|S0|4000001f81134f05|35|1 AckFrame[16433178|Δ19] 55.214 <- (4) Packet A|16433179|S0|6674f6df6c754d9c|48|2 AckFrame[1|Δ0] Padding(14) 55.215 Cwnd(-): 3000; inflight: 0 55.215 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 55.215 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 55.325/App, because ackElicitingInFlight | RTT:33/13 55.215 -> Packet A|3|S0|4000001f81134f05|55|2 StreamFrame[0(CIB),0,17,fin] AckFrame[16433178|Δ0] 55.215 <- (5) Packet A|16433180|S0|6674f6df6c754d9c|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 55.216 Finished downloading https://server4:443/lgralaftou at 47:35.113 on ClientConnection[614617339e5cf213/6674f6df6c754d9c(V1) with server4/193.167.100.100:443] 55.216 Closing ClientConnection[614617339e5cf213/6674f6df6c754d9c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 55.216 -> Packet A|4|S0|4000001f81134f05|38|2 ConnectionCloseFrame[0|0|] AckFrame[16433180-16433178|Δ0] 55.216 Creating connection with server4:443 with v1 55.217 Setting up connection for downloading https://server4:443/xaleymtsiz at 47:35.114 on ClientConnection[524d584bd58bab9d/42f818b540150384(V1) with server4/193.167.100.100:443] 55.217 Original destination connection id: 524d584bd58bab9d (scid: 42f818b540150384) >- CryptoStream[I|ClientHello] 55.218 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 55.418/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 55.218 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.246 <- (6) Packet A|16433181|S0|6674f6df6c754d9c|48|2 AckFrame[3,1|Δ0] Padding(15) 55.246 -> Packet A|5|S0|4000001f81134f05|38|2 ConnectionCloseFrame[0|0|] AckFrame[16433180-16433178|Δ0] 55.277 <- (7) Packet A|16433182|S0|6674f6df6c754d9c|41|1 ConnectionCloseFrame[0|28|Peer closed] 55.418 loss detection timeout handler running Sending probe 0, because no ack since 55.218. Current RTT: 100/25. 55.418 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 55.418 (Probe is an initial retransmit) 55.418 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 55.818/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 55.418 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.818 loss detection timeout handler running Sending probe 1, because no ack since 55.418. Current RTT: 100/25. 55.818 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 55.818 (Probe is an initial retransmit) 55.818 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 56.618/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 55.818 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.819 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 56.619/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 55.819 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.853 <- (1) Packet I|4126709|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[3|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 55.856 probe count not reset on ack because handshake not yet confirmed 55.856 Retransmitting CryptoFrame[0,257] on level Initial 55.856 Cwnd(-): 6000; inflight: 1200 55.856 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 55.856 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 55.953/Handshake, because peerAwaitingAddressValidation | RTT:33/16 55.856 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 96 millis, based on 55.953/Handshake, because peerAwaitingAddressValidation | RTT:33/16 55.856 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.856 Packet not sent because keys are discarded: Packet I|5|L|.|2 Token=[] AckFrame[4126709|Δ0] Padding(1150) 55.853 <- (2) Packet H|4126709|L|759|1 CryptoFrame[0,711] 55.856 - unknown transport parameter 0xff0a001, size 1 55.856 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 55.858 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 55.955/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 55.858 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 55.859 Starting downloading https://server4:443/xaleymtsiz at 47:35.756 on ClientConnection[524d584bd58bab9d/42f818b540150384(V1) with server4/193.167.100.100:443] 55.859 -> Packet H|1|L|49|1 AckFrame[4126709|Δ0] 55.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 55.956/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 55.859 -> Packet A|0|S0|4000005123378a96|47|1 StreamFrame[0(CIB),0,17,fin] 55.955 loss detection timeout handler running Sending probe 0, because no ack since 55.858. Current RTT: 33/16. 55.955 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 55.955 (Probe is a handshake retransmit) 55.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 56.150/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 55.956 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 56.149 loss detection timeout handler running Sending probe 1, because no ack since 55.859. Current RTT: 33/16. 56.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 56.149 (Probe is a handshake retransmit) 56.150 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 56.538/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 56.149 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 56.150 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 56.538/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 56.150 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 56.181 <- (3) Packet H|4126710|L|48|1 AckFrame[4,1|Δ0] 56.182 probe count not reset on ack because handshake not yet confirmed 56.182 Retransmitting CryptoFrame[0,36] on level Handshake 56.182 Cwnd(-): 3000; inflight: 127 56.182 -> Packet H|5|L|80|1 CryptoFrame[0,36] 56.186 loss detection timeout handler running 56.186 loss detection timeout handler running 56.186 loss detection timeout handler running 56.186 loss detection timeout handler running 56.186 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 335 millis, based on 56.522/Handshake, because ackElicitingInFlight | RTT:33/13 56.213 <- (4) Packet H|4126711|L|48|1 AckFrame[5-4,1|Δ0] 56.213 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 56.213 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 56.302 <- (5) Packet A|4126711|S0|42f818b540150384|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000436a0c549e|989b006e3c83d04c1a9817a6866396df] Padding(1) -< CryptoStream[A|NewSessionTicket] 56.303 State is set to Confirmed reschedule loss detection timer for PTO over -342 millis, based on 55.961/App, because ackElicitingInFlight | RTT:33/11 56.303 loss detection timeout handler running reschedule loss detection timer for PTO over -342 millis, based on 55.961/App, because ackElicitingInFlight | RTT:33/11 56.303 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 55.859. Current RTT: 33/11. 56.303 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 203 millis, based on 56.507/App, because ackElicitingInFlight | RTT:33/11 56.303 -> Packet PA|1|S0|4000005123378a96|47|1 StreamFrame[0(CIB),0,17,fin] 56.323 -> Packet A|2|S0|4000005123378a96|35|1 AckFrame[4126711|Δ19] 56.335 <- (6) Packet A|4126712|S0|42f818b540150384|1072|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 56.336 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 56.336 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 93 millis, based on 56.430/App, because ackElicitingInFlight | RTT:33/9 56.336 -> Packet A|3|S0|4000005123378a96|55|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4126711|Δ0] 56.336 Finished downloading https://server4:443/xaleymtsiz at 47:36.233 on ClientConnection[524d584bd58bab9d/42f818b540150384(V1) with server4/193.167.100.100:443] 56.336 Closing ClientConnection[524d584bd58bab9d/42f818b540150384(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 56.337 -> Packet A|4|S0|4000005123378a96|38|2 ConnectionCloseFrame[0|0|] AckFrame[4126712-4126711|Δ0] 56.337 Creating connection with server4:443 with v1 56.337 Setting up connection for downloading https://server4:443/dywyjbjdzb at 47:36.235 on ClientConnection[16567d61474e205b/445dba9e5da259bc(V1) with server4/193.167.100.100:443] 56.337 Original destination connection id: 16567d61474e205b (scid: 445dba9e5da259bc) >- CryptoStream[I|ClientHello] 56.339 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 56.539/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 56.339 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 56.367 <- (7) Packet A|4126713|S0|42f818b540150384|41|1 ConnectionCloseFrame[0|28|Peer closed] 56.538 loss detection timeout handler running Sending probe 0, because no ack since 56.339. Current RTT: 100/25. 56.538 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 56.538 (Probe is an initial retransmit) 56.539 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 56.939/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 56.538 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 56.572 <- (1) Packet I|16070482|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[1|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 56.575 probe count not reset on ack because handshake not yet confirmed 56.575 Retransmitting CryptoFrame[0,257] on level Initial 56.575 Cwnd(-): 6000; inflight: 0 56.575 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 56.975/Handshake, because peerAwaitingAddressValidation | RTT:100/25 56.575 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 56.672/Handshake, because peerAwaitingAddressValidation | RTT:33/16 56.575 Discarding pn space Initial because first Handshake message is being sent 56.575 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 56.672/Handshake, because peerAwaitingAddressValidation | RTT:33/16 56.575 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 56.575 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[16070482|Δ0] Padding(1150) 56.573 <- (2) Packet H|16070482|L|762|1 CryptoFrame[0,713] 56.576 - unknown transport parameter 0xff0a001, size 1 56.576 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 56.578 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 56.675/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 56.578 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 56.579 Starting downloading https://server4:443/dywyjbjdzb at 47:36.476 on ClientConnection[16567d61474e205b/445dba9e5da259bc(V1) with server4/193.167.100.100:443] 56.579 -> Packet H|1|L|49|1 AckFrame[16070482|Δ0] 56.579 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 56.676/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 56.579 -> Packet A|0|S0|40000091b5cacd5a|47|1 StreamFrame[0(CIB),0,17,fin] 56.609 <- (3) Packet H|16070483|L|49|1 AckFrame[0|Δ0] 56.610 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 56.610 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 56.611 <- (4) Packet A|16070483|S0|445dba9e5da259bc|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 56.611 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 56.612 Finished downloading https://server4:443/dywyjbjdzb at 47:36.509 on ClientConnection[16567d61474e205b/445dba9e5da259bc(V1) with server4/193.167.100.100:443] 56.612 Closing ClientConnection[16567d61474e205b/445dba9e5da259bc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 56.612 -> Packet A|1|S0|40000091b5cacd5a|38|2 ConnectionCloseFrame[0|0|] AckFrame[16070483|Δ0] 56.612 Creating connection with server4:443 with v1 56.613 Setting up connection for downloading https://server4:443/yysrlvoznm at 47:36.510 on ClientConnection[9e0def8d6f005aa6/383df74929d1ed78(V1) with server4/193.167.100.100:443] 56.613 Original destination connection id: 9e0def8d6f005aa6 (scid: 383df74929d1ed78) >- CryptoStream[I|ClientHello] 56.614 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 56.814/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 56.614 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 56.731 <- (5) Packet A|16070485|S0|445dba9e5da259bc|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000923d593d56|ddcc8383b9a47860145b1aae9f0a6336] Padding(1) 56.731 <- (6) Packet A|16070486|S0|445dba9e5da259bc|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000923d593d56|ddcc8383b9a47860145b1aae9f0a6336] Padding(1) 56.731 -> Packet A|2|S0|40000091b5cacd5a|38|2 ConnectionCloseFrame[0|0|] AckFrame[16070483|Δ0] 56.732 -> Packet A|3|S0|40000091b5cacd5a|38|2 ConnectionCloseFrame[0|0|] AckFrame[16070483|Δ0] 56.758 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 56.762 <- (7) Packet A|16070487|S0|445dba9e5da259bc|44|1 ConnectionCloseFrame[0|28|Peer closed] 56.762 <- (8) Packet H|16070484|L|57|1 ConnectionCloseFrame[0|28|Peer closed] 56.813 loss detection timeout handler running Sending probe 0, because no ack since 56.614. Current RTT: 100/25. 56.813 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 56.813 (Probe is an initial retransmit) 56.813 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 57.213/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 56.813 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 56.967 <- (2) Packet I|2194571|L|1232|2 Token=[] AckFrame[1-0|Δ121] Padding(1181) 56.968 probe count not reset on ack because handshake not yet confirmed 56.968 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 57.368/Initial, because peerAwaitingAddressValidation | RTT:100/25 56.968 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 57.367 loss detection timeout handler running Sending probe 1, because no ack since 56.813. Current RTT: 154/77. 57.368 Sending probe because peer awaiting address validation 57.368 (Probe is Initial ping, because there is no Initial data to retransmit) 57.368 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1847 millis, based on 59.216/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:154/77 57.368 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 57.378 <- (4) Packet I|2194573|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[1-0|Δ532] Padding(1051) -< CryptoStream[I|ServerHello] 57.381 probe count not reset on ack because handshake not yet confirmed 57.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1847 millis, based on 59.229/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:154/77 57.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 461 millis, based on 57.843/Handshake, because peerAwaitingAddressValidation | RTT:154/77 57.381 Discarding pn space Initial because first Handshake message is being sent 57.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 461 millis, based on 57.843/Handshake, because peerAwaitingAddressValidation | RTT:154/77 57.381 -> Packet I|3|L|1201|2 Token=[] AckFrame[2194573,2194571|Δ0] Padding(1148) 57.379 <- (5) Packet H|2194573|L|761|1 CryptoFrame[0,713] 57.382 - unknown transport parameter 0xff0a001, size 1 57.382 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 57.384 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 461 millis, based on 57.846/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:154/77 57.384 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 57.384 Starting downloading https://server4:443/yysrlvoznm at 47:37.281 on ClientConnection[9e0def8d6f005aa6/383df74929d1ed78(V1) with server4/193.167.100.100:443] 57.384 -> Packet H|1|L|49|1 AckFrame[2194573|Δ0] 57.385 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 461 millis, based on 57.847/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:154/77 57.385 -> Packet A|0|S0|40000040b0d3a03a|47|1 StreamFrame[0(CIB),0,17,fin] 57.510 <- (6) Packet A|2194569|S0|383df74929d1ed78|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000056cc620692|a50c8107a8b81b9351f0cce42afcde63] Padding(1) -< CryptoStream[A|NewSessionTicket] 57.510 State is set to Confirmed reschedule loss detection timer for PTO over 335 millis, based on 57.846/Handshake, because ackElicitingInFlight | RTT:154/77 reschedule loss detection timer for PTO over 361 millis, based on 57.872/App, because ackElicitingInFlight | RTT:154/77 57.510 Discarding pn space Handshake because HandshakeDone is received 57.530 -> Packet A|1|S0|40000040b0d3a03a|35|1 AckFrame[2194569|Δ19] 57.561 <- (7) Packet A|2194570|S0|383df74929d1ed78|48|2 AckFrame[1|Δ0] Padding(17) 57.561 Cwnd(-): 6000; inflight: 0 57.561 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 57.561 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 486 millis, based on 58.049/App, because ackElicitingInFlight | RTT:154/77 57.562 -> Packet A|2|S0|40000040b0d3a03a|47|1 StreamFrame[0(CIB),0,17,fin] 57.593 <- (8) Packet A|2194571|S0|383df74929d1ed78|1072|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 57.594 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 57.594 Finished downloading https://server4:443/yysrlvoznm at 47:37.491 on ClientConnection[9e0def8d6f005aa6/383df74929d1ed78(V1) with server4/193.167.100.100:443] 57.594 Closing ClientConnection[9e0def8d6f005aa6/383df74929d1ed78(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 57.595 -> Packet A|3|S0|40000040b0d3a03a|38|2 ConnectionCloseFrame[0|0|] AckFrame[2194571-2194570|Δ0] 57.595 Creating connection with server4:443 with v1 57.595 Setting up connection for downloading https://server4:443/kkkpyhcmnx at 47:37.493 on ClientConnection[00fc70df1f94889e/79fc86d5a6a42a4b(V1) with server4/193.167.100.100:443] 57.596 Original destination connection id: 00fc70df1f94889e (scid: 79fc86d5a6a42a4b) >- CryptoStream[I|ClientHello] 57.597 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 57.797/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 57.597 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 57.626 <- (9) Packet A|2194572|S0|383df74929d1ed78|41|1 ConnectionCloseFrame[0|28|Peer closed] 57.630 <- (1) Packet I|11635863|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 57.633 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 57.833/Handshake, because peerAwaitingAddressValidation | RTT:100/25 57.633 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 57.730/Handshake, because peerAwaitingAddressValidation | RTT:33/16 57.633 Discarding pn space Initial because first Handshake message is being sent 57.634 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 57.731/Handshake, because peerAwaitingAddressValidation | RTT:33/16 57.631 <- (2) Packet H|11635863|L|761|1 CryptoFrame[0,712] 57.633 -> Packet I|1|L|1201|2 Token=[] AckFrame[11635863|Δ0] Padding(1150) 57.634 - unknown transport parameter 0xff0a001, size 1 57.634 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 57.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 57.733/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 57.636 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 57.637 Starting downloading https://server4:443/kkkpyhcmnx at 47:37.534 on ClientConnection[00fc70df1f94889e/79fc86d5a6a42a4b(V1) with server4/193.167.100.100:443] 57.637 -> Packet H|1|L|49|1 AckFrame[11635863|Δ0] 57.637 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 57.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 57.637 -> Packet A|0|S0|400000007765afa9|47|1 StreamFrame[0(CIB),0,17,fin] 57.733 loss detection timeout handler running Sending probe 0, because no ack since 57.636. Current RTT: 33/16. 57.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 57.733 (Probe is a handshake retransmit) 57.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 57.928/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 57.734 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 57.765 <- (3) Packet H|11635864|L|46|1 AckFrame[2-1|Δ0] 57.766 probe count not reset on ack because handshake not yet confirmed 57.766 Retransmitting CryptoFrame[0,36] on level Handshake 57.766 Cwnd(-): 6000; inflight: 47 57.766 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 57.766 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 57.766 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 169 millis, based on 57.936/Handshake, because ackElicitingInFlight | RTT:33/13 57.766 -> Packet H|3|L|80|1 CryptoFrame[0,36] 57.766 <- (4) Packet A|11635864|S0|79fc86d5a6a42a4b|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 57.767 Finished downloading https://server4:443/kkkpyhcmnx at 47:37.664 on ClientConnection[00fc70df1f94889e/79fc86d5a6a42a4b(V1) with server4/193.167.100.100:443] 57.767 Closing ClientConnection[00fc70df1f94889e/79fc86d5a6a42a4b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 57.767 -> Packet A|1|S0|400000007765afa9|38|2 ConnectionCloseFrame[0|0|] AckFrame[11635864|Δ0] 57.768 Creating connection with server4:443 with v1 57.768 Setting up connection for downloading https://server4:443/oscbpoepad at 47:37.665 on ClientConnection[73ca304bdc1672c5/932184ca3468db7d(V1) with server4/193.167.100.100:443] 57.768 Original destination connection id: 73ca304bdc1672c5 (scid: 932184ca3468db7d) >- CryptoStream[I|ClientHello] 57.770 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 57.970/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 57.770 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 57.969 loss detection timeout handler running Sending probe 0, because no ack since 57.770. Current RTT: 100/25. 57.970 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 57.970 (Probe is an initial retransmit) 57.970 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 58.370/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 57.970 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 58.369 loss detection timeout handler running Sending probe 1, because no ack since 57.970. Current RTT: 100/25. 58.369 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 58.370 (Probe is an initial retransmit) 58.370 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 59.170/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 58.370 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 58.371 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 59.171/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 58.371 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 58.405 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 58.515 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 58.726 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 59.137 <- (4) Packet I|2535235|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[3-2|Δ733] Padding(1051) -< CryptoStream[I|ServerHello] 59.140 probe count not reset on ack because handshake not yet confirmed 59.140 Retransmitting CryptoFrame[0,257] on level Initial 59.140 Cwnd(-): 6000; inflight: 0 59.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 59.940/Handshake, because peerAwaitingAddressValidation | RTT:100/25 59.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 59.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2292 millis, based on 61.433/Handshake, because peerAwaitingAddressValidation | RTT:765/382 reschedule loss detection timer for PTO over 2292 millis, based on 61.433/Handshake, because peerAwaitingAddressValidation | RTT:765/382 59.140 Discarding pn space Initial because first Handshake message is being sent 59.140 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 59.140 Packet not sent because keys are discarded: Packet I|5|L|.|2 Token=[] AckFrame[2535235|Δ0] Padding(1150) 59.137 <- (5) Packet H|2535235|L|761|1 CryptoFrame[0,713] 59.140 - unknown transport parameter 0xff0a001, size 1 59.141 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 59.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2292 millis, based on 61.436/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:765/382 59.143 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 59.143 Starting downloading https://server4:443/oscbpoepad at 47:39.040 on ClientConnection[73ca304bdc1672c5/932184ca3468db7d(V1) with server4/193.167.100.100:443] 59.143 -> Packet H|1|L|49|1 AckFrame[2535235|Δ0] 59.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2292 millis, based on 61.436/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:765/382 59.143 -> Packet A|0|S0|400000586b1c3c0e|47|1 StreamFrame[0(CIB),0,17,fin] 61.436 loss detection timeout handler running Sending probe 0, because no ack since 59.143. Current RTT: 765/382. 61.436 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 61.436 (Probe is a handshake retransmit) 61.436 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 4585 millis, based on 66.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:765/382 61.436 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 61.562 <- (6) Packet H|2535239|L|761|1 CryptoFrame[0,713] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 61.563 -> Packet H|3|L|51|1 AckFrame[2535239,2535235|Δ0] 64.765 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 64.766 <- (8) Packet H|2535241|L|761|1 CryptoFrame[0,713] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 64.766 -> Packet H|4|L|53|1 AckFrame[2535241,2535239,2535235|Δ0] 66.021 loss detection timeout handler running Sending probe 1, because no ack since 59.143. Current RTT: 765/382. 66.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 66.022 (Probe is a handshake retransmit) 66.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 9171 millis, based on 75.194/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:765/382 66.022 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 66.023 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 9171 millis, based on 75.195/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:765/382 66.023 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 66.054 <- (9) Packet A|2535230|S0|932184ca3468db7d|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 66.055 Finished downloading https://server4:443/oscbpoepad at 47:45.952 on ClientConnection[73ca304bdc1672c5/932184ca3468db7d(V1) with server4/193.167.100.100:443] 66.055 Closing ClientConnection[73ca304bdc1672c5/932184ca3468db7d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 66.055 -> Packet A|1|S0|400000586b1c3c0e|38|2 ConnectionCloseFrame[0|0|] AckFrame[2535230|Δ0] 66.056 Creating connection with server4:443 with v1 66.056 Setting up connection for downloading https://server4:443/ghsgovznuw at 47:45.953 on ClientConnection[f553bbe84013cca0/ff2a38ca6c424bff(V1) with server4/193.167.100.100:443] 66.056 Original destination connection id: f553bbe84013cca0 (scid: ff2a38ca6c424bff) >- CryptoStream[I|ClientHello] 66.057 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 66.257/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 66.057 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 66.091 <- (1) Packet I|1786349|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 66.094 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 66.294/Handshake, because peerAwaitingAddressValidation | RTT:100/25 66.094 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 66.191/Handshake, because peerAwaitingAddressValidation | RTT:33/16 66.094 Discarding pn space Initial because first Handshake message is being sent 66.094 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 66.191/Handshake, because peerAwaitingAddressValidation | RTT:33/16 66.094 -> Packet I|1|L|1201|2 Token=[] AckFrame[1786349|Δ0] Padding(1150) 66.091 <- (2) Packet H|1786349|L|761|1 CryptoFrame[0,713] 66.095 - unknown transport parameter 0xff0a001, size 1 66.095 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 66.097 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 66.194/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 66.097 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 66.097 Starting downloading https://server4:443/ghsgovznuw at 47:45.994 on ClientConnection[f553bbe84013cca0/ff2a38ca6c424bff(V1) with server4/193.167.100.100:443] 66.097 -> Packet H|1|L|49|1 AckFrame[1786349|Δ0] 66.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 66.195/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 66.098 -> Packet A|0|S0|400000805f92c086|47|1 StreamFrame[0(CIB),0,17,fin] 66.128 <- (3) Packet A|1786349|S0|ff2a38ca6c424bff|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000008f53e3775d|1020f7b0900a8e2dd6a344319dd31fb6] Padding(25) -< CryptoStream[A|NewSessionTicket] 66.129 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 66.194/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 66.220/App, because ackElicitingInFlight | RTT:33/16 66.129 Discarding pn space Handshake because HandshakeDone is received 66.148 -> Packet A|1|S0|400000805f92c086|35|1 AckFrame[1786349|Δ19] 66.154 <- (10) Packet A|2535232|S0|932184ca3468db7d|320|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000004d91463c87|9dff7d6148203f433f67c5875348c338] Padding(1) AckFrame[0|Δ6979] 66.154 <- (11) Packet A|2535233|S0|932184ca3468db7d|320|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000004d91463c87|9dff7d6148203f433f67c5875348c338] Padding(1) AckFrame[0|Δ6979] 66.154 -> Packet A|2|S0|400000586b1c3c0e|38|2 ConnectionCloseFrame[0|0|] AckFrame[2535230|Δ0] 66.155 -> Packet A|3|S0|400000586b1c3c0e|38|2 ConnectionCloseFrame[0|0|] AckFrame[2535230|Δ0] 66.219 loss detection timeout handler running Sending probe 0, because no ack since 66.098. Current RTT: 33/16. 66.219 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 66.463/App, because ackElicitingInFlight | RTT:33/16 66.219 -> Packet PA|2|S0|400000805f92c086|47|1 StreamFrame[0(CIB),0,17,fin] 66.270 <- (4) Packet A|1786351|S0|ff2a38ca6c424bff|48|2 AckFrame[2-0|Δ20] Padding(16) 66.271 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 66.311 <- (5) Packet A|1786353|S0|ff2a38ca6c424bff|1061|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[2-0|Δ60] 66.312 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 66.312 Finished downloading https://server4:443/ghsgovznuw at 47:46.209 on ClientConnection[f553bbe84013cca0/ff2a38ca6c424bff(V1) with server4/193.167.100.100:443] 66.312 Closing ClientConnection[f553bbe84013cca0/ff2a38ca6c424bff(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 66.312 -> Packet A|3|S0|400000805f92c086|40|2 ConnectionCloseFrame[0|0|] AckFrame[1786353,1786351|Δ0] 66.313 Creating connection with server4:443 with v1 66.313 Setting up connection for downloading https://server4:443/rwblucjlyd at 47:46.210 on ClientConnection[ec501077ec29bb69/90f99dce9c199768(V1) with server4/193.167.100.100:443] 66.313 Original destination connection id: ec501077ec29bb69 (scid: 90f99dce9c199768) >- CryptoStream[I|ClientHello] 66.314 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 66.514/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 66.314 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 66.343 <- (6) Packet A|1786354|S0|ff2a38ca6c424bff|41|1 ConnectionCloseFrame[0|28|Peer closed] 66.514 loss detection timeout handler running Sending probe 0, because no ack since 66.314. Current RTT: 100/25. 66.514 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 66.514 (Probe is an initial retransmit) 66.514 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 66.914/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 66.514 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 66.548 <- (1) Packet I|11948458|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[1|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 66.550 probe count not reset on ack because handshake not yet confirmed 66.551 Retransmitting CryptoFrame[0,257] on level Initial 66.551 Cwnd(-): 6000; inflight: 0 66.551 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 66.951/Handshake, because peerAwaitingAddressValidation | RTT:100/25 66.551 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 66.745/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 66.551 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 66.648/Handshake, because peerAwaitingAddressValidation | RTT:33/16 66.551 Discarding pn space Initial because first Handshake message is being sent 66.551 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 66.551 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[11948458|Δ0] Padding(1150) 66.548 <- (2) Packet H|11948458|L|761|1 CryptoFrame[0,712] 66.551 - unknown transport parameter 0xff0a001, size 1 66.551 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 66.554 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 66.651/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 66.554 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 66.554 Starting downloading https://server4:443/rwblucjlyd at 47:46.451 on ClientConnection[ec501077ec29bb69/90f99dce9c199768(V1) with server4/193.167.100.100:443] 66.554 -> Packet H|1|L|49|1 AckFrame[11948458|Δ0] 66.554 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 66.651/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 66.554 -> Packet A|0|S0|400000d2acc56a7a|47|1 StreamFrame[0(CIB),0,17,fin] 66.651 loss detection timeout handler running Sending probe 0, because no ack since 66.554. Current RTT: 33/16. 66.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 66.651 (Probe is a handshake retransmit) 66.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 66.845/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 66.651 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 66.656 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 66.657 <- (4) Packet H|11948460|L|761|1 CryptoFrame[0,712] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 66.657 -> Packet H|3|L|51|1 AckFrame[11948460,11948458|Δ0] 66.682 <- (5) Packet H|11948461|L|49|1 AckFrame[2|Δ0] 66.682 probe count not reset on ack because handshake not yet confirmed 66.682 Retransmitting CryptoFrame[0,36] on level Handshake 66.682 Cwnd(-): 3000; inflight: 47 66.683 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 66.683 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 66.683 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 169 millis, based on 66.853/Handshake, because ackElicitingInFlight | RTT:33/13 66.683 -> Packet H|4|L|91|2 CryptoFrame[0,36] AckFrame[11948460,11948458|Δ0] 66.682 <- (6) Packet A|11948458|S0|90f99dce9c199768|336|5 CryptoFrame[0,250] AckFrame[0|Δ97] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000ce5ea646e4|d22fddd8496360fbf055b84027b2d1f5] Padding(18) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 84 millis, based on 66.768/Handshake, because ackElicitingInFlight | RTT:33/13 66.683 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 66.833/Handshake, because ackElicitingInFlight | RTT:42/27 66.683 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 66.683 Discarding pn space Handshake because HandshakeDone is received 66.683 <- (7) Packet A|11948459|S0|90f99dce9c199768|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 66.684 -> Packet A|1|S0|400000d2acc56a7a|34|1 AckFrame[11948459-11948458|Δ0] 66.684 Finished downloading https://server4:443/rwblucjlyd at 47:46.581 on ClientConnection[ec501077ec29bb69/90f99dce9c199768(V1) with server4/193.167.100.100:443] 66.684 Closing ClientConnection[ec501077ec29bb69/90f99dce9c199768(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 66.684 -> Packet A|2|S0|400000d2acc56a7a|38|2 ConnectionCloseFrame[0|0|] AckFrame[11948459-11948458|Δ0] 66.684 Creating connection with server4:443 with v1 66.685 Setting up connection for downloading https://server4:443/wbpghchkmo at 47:46.582 on ClientConnection[b3fa6c43b295fc10/c93412de5d4897b2(V1) with server4/193.167.100.100:443] 66.685 Original destination connection id: b3fa6c43b295fc10 (scid: c93412de5d4897b2) >- CryptoStream[I|ClientHello] 66.686 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 66.886/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 66.686 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 66.715 <- (8) Packet A|11948460|S0|90f99dce9c199768|41|1 ConnectionCloseFrame[0|28|Peer closed] 66.719 <- (1) Packet I|3420328|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 66.722 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 66.922/Handshake, because peerAwaitingAddressValidation | RTT:100/25 66.722 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 66.819/Handshake, because peerAwaitingAddressValidation | RTT:33/16 66.722 Discarding pn space Initial because first Handshake message is being sent 66.723 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 66.820/Handshake, because peerAwaitingAddressValidation | RTT:33/16 66.723 -> Packet I|1|L|1201|2 Token=[] AckFrame[3420328|Δ0] Padding(1150) 66.819 loss detection timeout handler running 66.819 Sending probe 0. Current RTT: 33/16. 66.819 Sending probe because peer awaiting address validation 66.819 (Probe is a handshake ping) 66.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 67.013/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 66.819 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 66.839 <- (2) Packet H|3420330|L|760|1 CryptoFrame[0,712] 66.840 - unknown transport parameter 0xff0a001, size 1 66.840 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 66.842 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 67.036/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 66.842 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 66.842 Starting downloading https://server4:443/wbpghchkmo at 47:46.739 on ClientConnection[b3fa6c43b295fc10/c93412de5d4897b2(V1) with server4/193.167.100.100:443] 66.842 -> Packet H|2|L|49|1 AckFrame[3420330|Δ0] 66.843 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 67.037/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 66.843 -> Packet A|0|S0|4000008805d78ce9|47|1 StreamFrame[0(CIB),0,17,fin] 67.036 loss detection timeout handler running Sending probe 1, because no ack since 66.842. Current RTT: 33/16. 67.036 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 67.036 (Probe is a handshake retransmit) 67.036 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 67.424/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 67.036 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 67.037 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 67.425/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 67.037 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 67.067 <- (3) Packet H|3420331|L|48|1 AckFrame[3-2,0|Δ0] 67.068 probe count not reset on ack because handshake not yet confirmed 67.068 Retransmitting CryptoFrame[0,36] on level Handshake 67.068 Cwnd(-): 6000; inflight: 127 67.068 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 357 millis, based on 67.425/Handshake, because ackElicitingInFlight | RTT:33/16 67.068 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 339 millis, based on 67.408/Handshake, because ackElicitingInFlight | RTT:33/13 67.068 -> Packet H|5|L|80|1 CryptoFrame[0,36] 67.067 <- (4) Packet A|3420328|S0|c93412de5d4897b2|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000087cbb2557c|07fa9e273b9a254485459316e343f334] Padding(25) -< CryptoStream[A|NewSessionTicket] 67.068 State is set to Confirmed reschedule loss detection timer for PTO over 214 millis, based on 67.283/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over -115 millis, based on 66.953/App, because ackElicitingInFlight | RTT:33/13 67.068 Discarding pn space Handshake because HandshakeDone is received 67.068 loss detection timeout handler running Sending probe 0, because no ack since 66.843. Current RTT: 33/13. 67.069 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 67.069 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 67.289/App, because ackElicitingInFlight | RTT:33/13 67.069 -> Packet PA|1|S0|4000008805d78ce9|47|1 StreamFrame[0(CIB),0,17,fin] 67.088 -> Packet A|2|S0|4000008805d78ce9|35|1 AckFrame[3420328|Δ19] 67.099 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 67.119 <- (7) Packet A|3420329|S0|c93412de5d4897b2|48|2 AckFrame[2|Δ0] Padding(17) 67.119 Cwnd(-): 3000; inflight: 0 67.119 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 67.119 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 67.229/App, because ackElicitingInFlight | RTT:33/13 67.119 -> Packet A|3|S0|4000008805d78ce9|47|1 StreamFrame[0(CIB),0,17,fin] 67.229 loss detection timeout handler running Sending probe 0, because no ack since 67.119. Current RTT: 33/13. 67.229 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 67.449/App, because ackElicitingInFlight | RTT:33/13 67.229 -> Packet PA|4|S0|4000008805d78ce9|47|1 StreamFrame[0(CIB),0,17,fin] 67.381 <- (8) Packet A|3420333|S0|c93412de5d4897b2|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 67.382 Finished downloading https://server4:443/wbpghchkmo at 47:47.279 on ClientConnection[b3fa6c43b295fc10/c93412de5d4897b2(V1) with server4/193.167.100.100:443] 67.382 Closing ClientConnection[b3fa6c43b295fc10/c93412de5d4897b2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 67.383 -> Packet A|5|S0|4000008805d78ce9|40|2 ConnectionCloseFrame[0|0|] AckFrame[3420333,3420329|Δ0] 67.383 Creating connection with server4:443 with v1 67.383 Setting up connection for downloading https://server4:443/wbgmdydoxx at 47:47.280 on ClientConnection[542681fe723cf4e3/6b0d66cbe8e19786(V1) with server4/193.167.100.100:443] 67.383 Original destination connection id: 542681fe723cf4e3 (scid: 6b0d66cbe8e19786) >- CryptoStream[I|ClientHello] 67.384 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 67.584/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 67.384 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 67.418 <- (1) Packet I|11550290|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 67.420 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 67.620/Handshake, because peerAwaitingAddressValidation | RTT:100/25 67.420 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 67.517/Handshake, because peerAwaitingAddressValidation | RTT:33/16 67.420 Discarding pn space Initial because first Handshake message is being sent 67.421 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 67.518/Handshake, because peerAwaitingAddressValidation | RTT:33/16 67.418 <- (2) Packet H|11550290|L|761|1 CryptoFrame[0,712] 67.420 -> Packet I|1|L|1201|2 Token=[] AckFrame[11550290|Δ0] Padding(1150) 67.421 - unknown transport parameter 0xff0a001, size 1 67.421 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 67.423 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 67.520/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 67.423 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 67.423 Starting downloading https://server4:443/wbgmdydoxx at 47:47.320 on ClientConnection[542681fe723cf4e3/6b0d66cbe8e19786(V1) with server4/193.167.100.100:443] 67.423 -> Packet H|1|L|49|1 AckFrame[11550290|Δ0] 67.423 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 67.520/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 67.423 -> Packet A|0|S0|4000005f85e42aec|47|1 StreamFrame[0(CIB),0,17,fin] 67.453 <- (3) Packet H|11550291|L|49|1 AckFrame[0|Δ0] 67.454 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 67.454 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 67.574 <- (4) Packet A|11550292|S0|6b0d66cbe8e19786|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000004ad18dad00|d4a64c3dc9764d0e08e0b9aa18f4498a] Padding(1) -< CryptoStream[A|NewSessionTicket] 67.575 State is set to Confirmed reschedule loss detection timer for PTO over -41 millis, based on 67.533/App, because ackElicitingInFlight | RTT:33/13 67.575 loss detection timeout handler running reschedule loss detection timer for PTO over -41 millis, based on 67.533/App, because ackElicitingInFlight | RTT:33/13 Sending probe 0, because no ack since 67.423. Current RTT: 33/13. 67.575 Discarding pn space Handshake because HandshakeDone is received 67.575 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 67.795/App, because ackElicitingInFlight | RTT:33/13 67.575 -> Packet PA|1|S0|4000005f85e42aec|47|1 StreamFrame[0(CIB),0,17,fin] 67.595 -> Packet A|2|S0|4000005f85e42aec|35|1 AckFrame[11550292|Δ19] 67.607 <- (5) Packet A|11550293|S0|6b0d66cbe8e19786|1072|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 67.608 Cwnd(-): 6000; inflight: 0 67.608 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 67.608 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 97 millis, based on 67.706/App, because ackElicitingInFlight | RTT:33/10 67.608 -> Packet A|3|S0|4000005f85e42aec|55|2 StreamFrame[0(CIB),0,17,fin] AckFrame[11550292|Δ0] 67.608 Finished downloading https://server4:443/wbgmdydoxx at 47:47.505 on ClientConnection[542681fe723cf4e3/6b0d66cbe8e19786(V1) with server4/193.167.100.100:443] 67.608 Closing ClientConnection[542681fe723cf4e3/6b0d66cbe8e19786(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 67.608 -> Packet A|4|S0|4000005f85e42aec|38|2 ConnectionCloseFrame[0|0|] AckFrame[11550293-11550292|Δ0] 67.609 Creating connection with server4:443 with v1 67.609 Setting up connection for downloading https://server4:443/fcvcnalhtx at 47:47.506 on ClientConnection[26786ebc60ae6322/3403f3cda22016ca(V1) with server4/193.167.100.100:443] 67.609 Original destination connection id: 26786ebc60ae6322 (scid: 3403f3cda22016ca) >- CryptoStream[I|ClientHello] 67.610 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 67.810/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 67.610 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 67.613 <- (9) Packet A|3420335|S0|c93412de5d4897b2|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 67.613 -> Packet A|6|S0|4000008805d78ce9|40|2 ConnectionCloseFrame[0|0|] AckFrame[3420333,3420329|Δ0] 67.639 <- (6) Packet A|11550294|S0|6b0d66cbe8e19786|44|1 ConnectionCloseFrame[0|28|Peer closed] 67.639 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 67.644 <- (1) Packet I|7840714|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 67.646 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 67.846/Handshake, because peerAwaitingAddressValidation | RTT:100/25 67.646 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 67.743/Handshake, because peerAwaitingAddressValidation | RTT:33/16 67.646 Discarding pn space Initial because first Handshake message is being sent 67.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 67.744/Handshake, because peerAwaitingAddressValidation | RTT:33/16 67.644 <- (2) Packet H|7840714|L|760|1 CryptoFrame[0,712] 67.647 -> Packet I|1|L|1201|2 Token=[] AckFrame[7840714|Δ0] Padding(1150) 67.647 - unknown transport parameter 0xff0a001, size 1 67.647 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 67.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 67.746/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 67.649 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 67.649 Starting downloading https://server4:443/fcvcnalhtx at 47:47.546 on ClientConnection[26786ebc60ae6322/3403f3cda22016ca(V1) with server4/193.167.100.100:443] 67.649 -> Packet H|1|L|49|1 AckFrame[7840714|Δ0] 67.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 67.747/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 67.650 -> Packet A|0|S0|40000086481e3909|47|1 StreamFrame[0(CIB),0,17,fin] 67.680 <- (3) Packet A|7840714|S0|3403f3cda22016ca|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000099fc0bfa37|ea0f0681b64cdfd6d67531933fef7421] Padding(25) -< CryptoStream[A|NewSessionTicket] 67.680 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 67.746/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 67.772/App, because ackElicitingInFlight | RTT:33/16 67.680 Discarding pn space Handshake because HandshakeDone is received 67.700 -> Packet A|1|S0|40000086481e3909|35|1 AckFrame[7840714|Δ19] 67.772 loss detection timeout handler running Sending probe 0, because no ack since 67.650. Current RTT: 33/16. 67.772 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 68.016/App, because ackElicitingInFlight | RTT:33/16 67.772 -> Packet PA|2|S0|40000086481e3909|47|1 StreamFrame[0(CIB),0,17,fin] 67.781 <- (4) Packet A|7840717|S0|3403f3cda22016ca|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000099fc0bfa37|ea0f0681b64cdfd6d67531933fef7421] Padding(1) -< CryptoStream[A|NewSessionTicket] 67.801 -> Packet A|3|S0|40000086481e3909|37|1 AckFrame[7840717,7840714|Δ19] 67.832 <- (5) Packet A|7840719|S0|3403f3cda22016ca|1072|3 AckFrame[3,0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 67.833 Cwnd(-): 6000; inflight: 0 67.833 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 67.833 Finished downloading https://server4:443/fcvcnalhtx at 47:47.730 on ClientConnection[26786ebc60ae6322/3403f3cda22016ca(V1) with server4/193.167.100.100:443] 67.833 Closing ClientConnection[26786ebc60ae6322/3403f3cda22016ca(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 67.833 -> Packet A|4|S0|40000086481e3909|38|2 ConnectionCloseFrame[0|0|] AckFrame[7840719|Δ0] 67.833 Creating connection with server4:443 with v1 67.834 Setting up connection for downloading https://server4:443/wqesljksth at 47:47.731 on ClientConnection[260ce73e4c791530/8b4496150e74efea(V1) with server4/193.167.100.100:443] 67.834 Original destination connection id: 260ce73e4c791530 (scid: 8b4496150e74efea) >- CryptoStream[I|ClientHello] 67.835 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 68.035/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 67.835 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 67.978 <- (1) Packet I|9099334|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[0|Δ110] Padding(1052) -< CryptoStream[I|ServerHello] 67.981 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 68.181/Handshake, because peerAwaitingAddressValidation | RTT:100/25 67.981 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 68.407/Handshake, because peerAwaitingAddressValidation | RTT:142/71 67.981 Discarding pn space Initial because first Handshake message is being sent 67.981 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 67.979 <- (2) Packet H|9099334|L|761|1 CryptoFrame[0,712] reschedule loss detection timer for PTO over 425 millis, based on 68.407/Handshake, because peerAwaitingAddressValidation | RTT:142/71 67.981 -> Packet I|1|L|1201|2 Token=[] AckFrame[9099334|Δ0] Padding(1150) 67.981 - unknown transport parameter 0xff0a001, size 1 67.981 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 67.983 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 68.409/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:142/71 67.983 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 67.984 Starting downloading https://server4:443/wqesljksth at 47:47.881 on ClientConnection[260ce73e4c791530/8b4496150e74efea(V1) with server4/193.167.100.100:443] 67.984 -> Packet H|1|L|49|1 AckFrame[9099334|Δ0] 67.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 68.410/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:142/71 67.984 -> Packet A|0|S0|400000c57ca0f946|47|1 StreamFrame[0(CIB),0,17,fin] 68.014 <- (3) Packet H|9099335|L|49|1 AckFrame[0|Δ0] 68.014 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 68.014 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 68.014 <- (4) Packet A|9099332|S0|8b4496150e74efea|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c83b0e4ef0|8f198dbf97e55da605b9953e3b4b1523] Padding(24) -< CryptoStream[A|NewSessionTicket] 68.015 State is set to Confirmed reschedule loss detection timer for PTO over 446 millis, based on 68.461/App, because ackElicitingInFlight | RTT:128/81 reschedule loss detection timer for PTO over 446 millis, based on 68.461/App, because ackElicitingInFlight | RTT:128/81 68.015 Discarding pn space Handshake because HandshakeDone is received 68.034 -> Packet A|1|S0|400000c57ca0f946|35|1 AckFrame[9099332|Δ19] 68.114 <- (5) Packet A|9099334|S0|8b4496150e74efea|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c83b0e4ef0|8f198dbf97e55da605b9953e3b4b1523] Padding(1) -< CryptoStream[A|NewSessionTicket] 68.133 -> Packet A|2|S0|400000c57ca0f946|37|1 AckFrame[9099334,9099332|Δ19] 68.304 <- (6) Packet A|9099336|S0|8b4496150e74efea|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c83b0e4ef0|8f198dbf97e55da605b9953e3b4b1523] Padding(1) -< CryptoStream[A|NewSessionTicket] 68.324 -> Packet A|3|S0|400000c57ca0f946|39|1 AckFrame[9099336,9099334,9099332|Δ19] 68.461 loss detection timeout handler running Sending probe 0, because no ack since 67.984. Current RTT: 128/81. 68.461 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 953 millis, based on 69.415/App, because ackElicitingInFlight | RTT:128/81 68.461 -> Packet PA|4|S0|400000c57ca0f946|47|1 StreamFrame[0(CIB),0,17,fin] 68.493 <- (7) Packet A|9099337|S0|8b4496150e74efea|1072|3 AckFrame[4-3|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 68.494 Cwnd(-): 6000; inflight: 0 68.494 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 68.494 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 480 millis, based on 68.975/App, because ackElicitingInFlight | RTT:116/85 68.494 -> Packet A|5|S0|400000c57ca0f946|47|1 StreamFrame[0(CIB),0,17,fin] 68.494 Finished downloading https://server4:443/wqesljksth at 47:48.392 on ClientConnection[260ce73e4c791530/8b4496150e74efea(V1) with server4/193.167.100.100:443] 68.495 Closing ClientConnection[260ce73e4c791530/8b4496150e74efea(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 68.495 -> Packet A|6|S0|400000c57ca0f946|38|2 ConnectionCloseFrame[0|0|] AckFrame[9099337|Δ0] 68.495 Creating connection with server4:443 with v1 68.496 Setting up connection for downloading https://server4:443/vexkywqlbm at 47:48.393 on ClientConnection[09c68407cae46157/6f9df037e2b8905c(V1) with server4/193.167.100.100:443] 68.496 Original destination connection id: 09c68407cae46157 (scid: 6f9df037e2b8905c) >- CryptoStream[I|ClientHello] 68.497 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 68.697/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 68.497 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 68.531 <- (1) Packet I|9023692|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 68.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 68.733/Handshake, because peerAwaitingAddressValidation | RTT:100/25 68.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 68.630/Handshake, because peerAwaitingAddressValidation | RTT:33/16 68.533 Discarding pn space Initial because first Handshake message is being sent 68.533 Packet not sent because keys are discarded: Packet I|1|L|.|2 Token=[] AckFrame[9023692|Δ0] Padding(1150) 68.531 <- (2) Packet H|9023692|L|761|1 CryptoFrame[0,712] 68.534 - unknown transport parameter 0xff0a001, size 1 68.534 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 68.536 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 68.633/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 68.536 -> Packet H|0|L|80|1 CryptoFrame[0,36] 68.536 Starting downloading https://server4:443/vexkywqlbm at 47:48.433 on ClientConnection[09c68407cae46157/6f9df037e2b8905c(V1) with server4/193.167.100.100:443] 68.536 -> Packet H|1|L|49|1 AckFrame[9023692|Δ0] 68.536 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 68.633/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 68.536 -> Packet A|0|S0|4000008765d9e828|47|1 StreamFrame[0(CIB),0,17,fin] 68.545 <- (8) Packet A|9099338|S0|8b4496150e74efea|48|2 AckFrame[5-3|Δ20] Padding(16) 68.545 -> Packet A|7|S0|400000c57ca0f946|38|2 ConnectionCloseFrame[0|0|] AckFrame[9099337|Δ0] 68.567 <- (3) Packet A|9023692|S0|6f9df037e2b8905c|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000009bd4d1fcb0|5ee8cf36ea0bdebe9e3e55fc0a034c8c] Padding(24) -< CryptoStream[A|NewSessionTicket] 68.567 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 68.633/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 68.658/App, because ackElicitingInFlight | RTT:33/16 68.567 Discarding pn space Handshake because HandshakeDone is received 68.587 -> Packet A|1|S0|4000008765d9e828|35|1 AckFrame[9023692|Δ19] 68.616 <- (9) Packet A|9099340|S0|8b4496150e74efea|1061|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[5-3|Δ90] 68.616 -> Packet A|8|S0|400000c57ca0f946|38|2 ConnectionCloseFrame[0|0|] AckFrame[9099337|Δ0] 68.658 loss detection timeout handler running Sending probe 0, because no ack since 68.536. Current RTT: 33/16. 68.658 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 68.902/App, because ackElicitingInFlight | RTT:33/16 68.658 -> Packet PA|2|S0|4000008765d9e828|47|1 StreamFrame[0(CIB),0,17,fin] 68.870 <- (4) Packet A|9023695|S0|6f9df037e2b8905c|1063|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[2-1|Δ180] 68.871 Cwnd(-): 6000; inflight: 0 68.871 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 68.871 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 68.871 Finished downloading https://server4:443/vexkywqlbm at 47:48.768 on ClientConnection[09c68407cae46157/6f9df037e2b8905c(V1) with server4/193.167.100.100:443] 68.871 Closing ClientConnection[09c68407cae46157/6f9df037e2b8905c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 68.871 -> Packet A|3|S0|4000008765d9e828|47|1 StreamFrame[0(CIB),0,17,fin] 68.871 -> Packet A|4|S0|4000008765d9e828|38|2 ConnectionCloseFrame[0|0|] AckFrame[9023695|Δ0] 68.872 Creating connection with server4:443 with v1 68.872 Setting up connection for downloading https://server4:443/fyjalggdfr at 47:48.769 on ClientConnection[7d4318e9bf4548da/1d197dd504303ec7(V1) with server4/193.167.100.100:443] 68.872 Original destination connection id: 7d4318e9bf4548da (scid: 1d197dd504303ec7) >- CryptoStream[I|ClientHello] 68.874 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 69.074/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 68.874 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 68.907 <- (1) Packet I|497218|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 68.910 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 69.110/Handshake, because peerAwaitingAddressValidation | RTT:100/25 68.910 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 69.007/Handshake, because peerAwaitingAddressValidation | RTT:33/16 68.910 Discarding pn space Initial because first Handshake message is being sent 68.911 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 69.008/Handshake, because peerAwaitingAddressValidation | RTT:33/16 68.910 -> Packet I|1|L|1201|2 Token=[] AckFrame[497218|Δ0] Padding(1150) 68.908 <- (2) Packet H|497218|L|760|1 CryptoFrame[0,712] 68.911 - unknown transport parameter 0xff0a001, size 1 68.911 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 68.913 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 69.010/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 68.913 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 68.913 Starting downloading https://server4:443/fyjalggdfr at 47:48.810 on ClientConnection[7d4318e9bf4548da/1d197dd504303ec7(V1) with server4/193.167.100.100:443] 68.914 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 69.011/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 68.914 -> [Packet H|1|L|49|1 AckFrame[497218|Δ0], Packet A|0|S0|4000009d543a649a|47|1 StreamFrame[0(CIB),0,17,fin]] 69.010 loss detection timeout handler running Sending probe 0, because no ack since 68.913. Current RTT: 33/16. 69.010 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 69.010 (Probe is a handshake retransmit) 69.010 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 69.204/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 69.010 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 69.204 loss detection timeout handler running Sending probe 1, because no ack since 68.914. Current RTT: 33/16. 69.204 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 69.204 (Probe is a handshake retransmit) 69.204 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 69.592/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 69.204 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 69.205 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 69.593/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 69.205 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 69.236 <- (3) Packet A|497219|S0|1d197dd504303ec7|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 69.236 <- (4) Packet H|497220|L|48|1 AckFrame[4-3,1|Δ0] 69.237 probe count not reset on ack because handshake not yet confirmed 69.237 Finished downloading https://server4:443/fyjalggdfr at 47:49.134 on ClientConnection[7d4318e9bf4548da/1d197dd504303ec7(V1) with server4/193.167.100.100:443] 69.237 Closing ClientConnection[7d4318e9bf4548da/1d197dd504303ec7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 69.237 Retransmitting CryptoFrame[0,36] on level Handshake 69.237 Cwnd(-): 6000; inflight: 47 69.237 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 69.237 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 69.237 -> Packet H|5|L|80|1 CryptoFrame[0,36] 69.237 -> Packet A|1|S0|4000009d543a649a|38|2 ConnectionCloseFrame[0|0|] AckFrame[497219|Δ0] 69.238 Creating connection with server4:443 with v1 69.238 Setting up connection for downloading https://server4:443/uwwsuumflb at 47:49.136 on ClientConnection[aacdfad4e70f7566/7d496de105fb4b00(V1) with server4/193.167.100.100:443] 69.239 Original destination connection id: aacdfad4e70f7566 (scid: 7d496de105fb4b00) >- CryptoStream[I|ClientHello] 69.240 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 69.440/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 69.240 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 69.268 <- (5) Packet H|497221|L|48|1 AckFrame[5-3,1|Δ0] 69.268 -> Packet H|6|L|53|2 ConnectionCloseFrame[0|0|] AckFrame[497220|Δ0] 69.268 <- (6) Packet A|497220|S0|1d197dd504303ec7|43|1 ConnectionCloseFrame[0|28|Peer closed] 69.268 <- (7) Packet H|497222|L|57|1 ConnectionCloseFrame[0|28|Peer closed] 69.273 <- (1) Packet I|7418879|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 69.276 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 69.476/Handshake, because peerAwaitingAddressValidation | RTT:100/25 69.276 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 69.373/Handshake, because peerAwaitingAddressValidation | RTT:33/16 69.276 Discarding pn space Initial because first Handshake message is being sent 69.276 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 69.373/Handshake, because peerAwaitingAddressValidation | RTT:33/16 69.276 -> Packet I|1|L|1201|2 Token=[] AckFrame[7418879|Δ0] Padding(1150) 69.274 <- (2) Packet H|7418879|L|760|1 CryptoFrame[0,712] 69.277 - unknown transport parameter 0xff0a001, size 1 69.277 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 69.279 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 69.376/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 69.279 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 69.279 Starting downloading https://server4:443/uwwsuumflb at 47:49.176 on ClientConnection[aacdfad4e70f7566/7d496de105fb4b00(V1) with server4/193.167.100.100:443] 69.279 -> Packet H|1|L|49|1 AckFrame[7418879|Δ0] 69.280 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 69.377/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 69.280 -> Packet A|0|S0|40000052e0c3c817|47|1 StreamFrame[0(CIB),0,17,fin] 69.307 <- (10) Packet A|9099344|S0|8b4496150e74efea|1063|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[5-3|Δ781] 69.376 loss detection timeout handler running Sending probe 0, because no ack since 69.279. Current RTT: 33/16. 69.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 69.376 (Probe is a handshake retransmit) 69.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 69.570/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 69.376 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 69.393 <- (3) Packet H|7418881|L|760|1 CryptoFrame[0,712] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 69.393 -> Packet H|3|L|51|1 AckFrame[7418881,7418879|Δ0] 69.569 loss detection timeout handler running Sending probe 1, because no ack since 69.280. Current RTT: 33/16. 69.569 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 69.569 (Probe is a handshake retransmit) 69.570 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 69.958/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 69.569 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 69.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 69.959/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 69.570 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 69.600 <- (4) Packet H|7418882|L|46|1 AckFrame[4-3|Δ0] 69.601 probe count not reset on ack because handshake not yet confirmed 69.601 Retransmitting CryptoFrame[0,36] on level Handshake 69.601 Cwnd(-): 6000; inflight: 127 69.601 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 357 millis, based on 69.958/Handshake, because ackElicitingInFlight | RTT:33/16 69.601 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 339 millis, based on 69.941/Handshake, because ackElicitingInFlight | RTT:33/13 69.601 -> Packet H|6|L|80|1 CryptoFrame[0,36] 69.601 <- (5) Packet A|7418879|S0|7d496de105fb4b00|336|5 CryptoFrame[0,250] AckFrame[0|Δ290] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000004caeea5d2d|e9d90d0163649186269065b79f6d185b] Padding(17) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 84 millis, based on 69.686/Handshake, because ackElicitingInFlight | RTT:33/13 69.602 State is set to Confirmed reschedule loss detection timer for PTO over 369 millis, based on 69.971/Handshake, because ackElicitingInFlight | RTT:66/76 69.602 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 69.602 Discarding pn space Handshake because HandshakeDone is received 69.621 -> Packet A|1|S0|40000052e0c3c817|35|1 AckFrame[7418879|Δ19] 69.632 Discarding packet (46 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 69.705 <- (7) Packet A|7418882|S0|7d496de105fb4b00|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 69.705 <- (8) Packet A|7418883|S0|7d496de105fb4b00|48|2 AckFrame[1|Δ52] Padding(16) 69.705 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 69.706 Finished downloading https://server4:443/uwwsuumflb at 47:49.603 on ClientConnection[aacdfad4e70f7566/7d496de105fb4b00(V1) with server4/193.167.100.100:443] 69.706 Closing ClientConnection[aacdfad4e70f7566/7d496de105fb4b00(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 69.706 -> Packet A|2|S0|40000052e0c3c817|38|2 ConnectionCloseFrame[0|0|] AckFrame[7418883-7418882|Δ0] 69.706 Creating connection with server4:443 with v1 69.707 Setting up connection for downloading https://server4:443/tzkjuajjtp at 47:49.604 on ClientConnection[8ecb972b746a65f2/5c17eca12e655e7d(V1) with server4/193.167.100.100:443] 69.707 Original destination connection id: 8ecb972b746a65f2 (scid: 5c17eca12e655e7d) >- CryptoStream[I|ClientHello] 69.708 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 69.908/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 69.708 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 69.907 loss detection timeout handler running Sending probe 0, because no ack since 69.708. Current RTT: 100/25. 69.907 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 69.907 (Probe is an initial retransmit) 69.907 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 70.307/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 69.907 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 70.306 loss detection timeout handler running Sending probe 1, because no ack since 69.907. Current RTT: 100/25. 70.307 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 70.307 (Probe is an initial retransmit) 70.307 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 71.107/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 70.307 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 70.308 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 71.108/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 70.308 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 70.341 <- (1) Packet I|1980130|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[2|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 70.343 probe count not reset on ack because handshake not yet confirmed 70.343 Retransmitting CryptoFrame[0,257] on level Initial 70.343 Cwnd(-): 6000; inflight: 1200 70.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 71.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 70.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 70.732/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 70.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 70.441/Handshake, because peerAwaitingAddressValidation | RTT:33/16 70.344 Discarding pn space Initial because first Handshake message is being sent 70.343 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 70.344 Packet not sent because keys are discarded: Packet I|5|L|.|2 Token=[] AckFrame[1980130|Δ0] Padding(1150) 70.341 <- (2) Packet H|1980130|L|759|1 CryptoFrame[0,711] 70.344 - unknown transport parameter 0xff0a001, size 1 70.344 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 70.346 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 70.443/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 70.346 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 70.346 Starting downloading https://server4:443/tzkjuajjtp at 47:50.243 on ClientConnection[8ecb972b746a65f2/5c17eca12e655e7d(V1) with server4/193.167.100.100:443] 70.346 -> Packet H|1|L|49|1 AckFrame[1980130|Δ0] 70.346 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 70.444/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 70.346 -> Packet A|0|S0|400000d0f4f15aab|47|1 StreamFrame[0(CIB),0,17,fin] 70.443 loss detection timeout handler running Sending probe 0, because no ack since 70.346. Current RTT: 33/16. 70.443 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 70.443 (Probe is a handshake retransmit) 70.443 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 70.637/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 70.443 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 70.475 <- (3) Packet A|1980131|S0|5c17eca12e655e7d|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 70.476 Finished downloading https://server4:443/tzkjuajjtp at 47:50.373 on ClientConnection[8ecb972b746a65f2/5c17eca12e655e7d(V1) with server4/193.167.100.100:443] 70.476 Closing ClientConnection[8ecb972b746a65f2/5c17eca12e655e7d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 70.476 -> Packet A|1|S0|400000d0f4f15aab|38|2 ConnectionCloseFrame[0|0|] AckFrame[1980131|Δ0] 70.477 Creating connection with server4:443 with v1 70.477 Setting up connection for downloading https://server4:443/pwdesjhdpb at 47:50.374 on ClientConnection[377f4660397c40a7/fdf7190bf549138d(V1) with server4/193.167.100.100:443] 70.477 Original destination connection id: 377f4660397c40a7 (scid: fdf7190bf549138d) >- CryptoStream[I|ClientHello] 70.478 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 70.678/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 70.478 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 70.512 <- (1) Packet I|15250843|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 70.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 70.714/Handshake, because peerAwaitingAddressValidation | RTT:100/25 70.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 70.611/Handshake, because peerAwaitingAddressValidation | RTT:33/16 70.514 Discarding pn space Initial because first Handshake message is being sent 70.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 70.611/Handshake, because peerAwaitingAddressValidation | RTT:33/16 70.514 -> Packet I|1|L|1201|2 Token=[] AckFrame[15250843|Δ0] Padding(1150) 70.512 <- (2) Packet H|15250843|L|760|1 CryptoFrame[0,711] 70.514 - unknown transport parameter 0xff0a001, size 1 70.514 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 70.516 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 70.613/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 70.516 -> Packet H|0|L|80|1 CryptoFrame[0,36] 70.517 Starting downloading https://server4:443/pwdesjhdpb at 47:50.414 on ClientConnection[377f4660397c40a7/fdf7190bf549138d(V1) with server4/193.167.100.100:443] 70.517 -> Packet H|1|L|49|1 AckFrame[15250843|Δ0] 70.517 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 70.614/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 70.517 -> Packet A|0|S0|400000558995079e|47|1 StreamFrame[0(CIB),0,17,fin] 70.547 <- (3) Packet A|15250843|S0|fdf7190bf549138d|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000004822a7b5b3|5a136ee40ea24d87f5f55b492d93072f] Padding(24) -< CryptoStream[A|NewSessionTicket] 70.548 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 70.613/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 70.639/App, because ackElicitingInFlight | RTT:33/16 70.548 Discarding pn space Handshake because HandshakeDone is received 70.567 -> Packet A|1|S0|400000558995079e|35|1 AckFrame[15250843|Δ19] 70.595 <- (4) Packet A|1980133|S0|5c17eca12e655e7d|320|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000d39f7505e8|03988bbbda3ad8c73fffdb609c319664] Padding(1) AckFrame[0|Δ217] 70.595 -> Packet A|2|S0|400000d0f4f15aab|38|2 ConnectionCloseFrame[0|0|] AckFrame[1980131|Δ0] 70.595 <- (5) Packet A|1980134|S0|5c17eca12e655e7d|320|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000d39f7505e8|03988bbbda3ad8c73fffdb609c319664] Padding(1) AckFrame[0|Δ217] 70.596 -> Packet A|3|S0|400000d0f4f15aab|38|2 ConnectionCloseFrame[0|0|] AckFrame[1980131|Δ0] 70.626 <- (6) Packet A|1980135|S0|5c17eca12e655e7d|43|1 ConnectionCloseFrame[0|28|Peer closed] 70.638 loss detection timeout handler running Sending probe 0, because no ack since 70.517. Current RTT: 33/16. 70.638 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 70.882/App, because ackElicitingInFlight | RTT:33/16 70.638 -> Packet PA|2|S0|400000558995079e|47|1 StreamFrame[0(CIB),0,17,fin] 70.679 <- (4) Packet A|15250846|S0|fdf7190bf549138d|1061|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[1-0|Δ80] reschedule loss detection timer for PTO over 80 millis, based on 70.760/App, because ackElicitingInFlight | RTT:33/16 70.679 Finished downloading https://server4:443/pwdesjhdpb at 47:50.577 on ClientConnection[377f4660397c40a7/fdf7190bf549138d(V1) with server4/193.167.100.100:443] 70.680 Closing ClientConnection[377f4660397c40a7/fdf7190bf549138d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 70.680 -> Packet A|3|S0|400000558995079e|38|2 ConnectionCloseFrame[0|0|] AckFrame[15250846|Δ0] 70.680 Creating connection with server4:443 with v1 70.681 Setting up connection for downloading https://server4:443/iuscqjipgx at 47:50.578 on ClientConnection[b7cd938bf5d89875/539b271a9de8afcc(V1) with server4/193.167.100.100:443] 70.681 Original destination connection id: b7cd938bf5d89875 (scid: 539b271a9de8afcc) >- CryptoStream[I|ClientHello] 70.682 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 70.882/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 70.682 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 70.716 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 70.827 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 70.881 loss detection timeout handler running Sending probe 0, because no ack since 70.682. Current RTT: 100/25. 70.881 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 70.881 (Probe is an initial retransmit) 70.881 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 71.282/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 70.881 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 70.916 <- (5) Packet A|15250848|S0|fdf7190bf549138d|1063|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[1-0|Δ317] 70.916 -> Packet A|4|S0|400000558995079e|38|2 ConnectionCloseFrame[0|0|] AckFrame[15250846|Δ0] 70.947 <- (6) Packet A|15250849|S0|fdf7190bf549138d|41|1 ConnectionCloseFrame[0|28|Peer closed] 71.037 <- (3) Packet I|10545888|L|1232|2 Token=[] AckFrame[1-0|Δ123] Padding(1180) 71.038 probe count not reset on ack because handshake not yet confirmed 71.038 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 71.438/Initial, because peerAwaitingAddressValidation | RTT:100/25 71.038 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 71.437 loss detection timeout handler running Sending probe 1, because no ack since 70.881. Current RTT: 155/77. 71.437 Sending probe because peer awaiting address validation 71.437 (Probe is Initial ping, because there is no Initial data to retransmit) 71.438 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1851 millis, based on 73.290/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:155/77 71.438 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 71.449 <- (5) Packet I|10545890|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[1-0|Δ534] Padding(1050) -< CryptoStream[I|ServerHello] 71.451 probe count not reset on ack because handshake not yet confirmed 71.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1851 millis, based on 73.303/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:155/77 71.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 462 millis, based on 71.914/Handshake, because peerAwaitingAddressValidation | RTT:155/77 71.451 Discarding pn space Initial because first Handshake message is being sent 71.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 462 millis, based on 71.914/Handshake, because peerAwaitingAddressValidation | RTT:155/77 71.451 -> Packet I|3|L|1201|2 Token=[] AckFrame[10545890,10545888|Δ0] Padding(1148) 71.779 <- (6) Packet H|10545894|L|761|1 CryptoFrame[0,712] 71.780 - unknown transport parameter 0xff0a001, size 1 71.780 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 71.783 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 462 millis, based on 72.247/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:155/77 71.782 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 71.785 Starting downloading https://server4:443/iuscqjipgx at 47:51.682 on ClientConnection[b7cd938bf5d89875/539b271a9de8afcc(V1) with server4/193.167.100.100:443] 71.785 -> Packet H|1|L|49|1 AckFrame[10545894|Δ0] 71.785 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 462 millis, based on 72.248/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:155/77 71.785 -> Packet A|0|S0|4000005d1a28fb63|47|1 StreamFrame[0(CIB),0,17,fin] 71.813 <- (7) Packet H|10545895|L|49|1 AckFrame[0|Δ0] 71.814 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 71.814 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 71.814 <- (8) Packet A|10545884|S0|539b271a9de8afcc|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000042a95b2032|e24b06dcdaedcd1eafd26b68dc828b8e] Padding(24) -< CryptoStream[A|NewSessionTicket] 71.814 State is set to Confirmed reschedule loss detection timer for PTO over 491 millis, based on 72.305/App, because ackElicitingInFlight | RTT:139/89 reschedule loss detection timer for PTO over 491 millis, based on 72.305/App, because ackElicitingInFlight | RTT:139/89 71.814 Discarding pn space Handshake because HandshakeDone is received 71.834 -> Packet A|1|S0|4000005d1a28fb63|35|1 AckFrame[10545884|Δ19] 71.936 <- (9) Packet A|10545888|S0|539b271a9de8afcc|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 71.936 <- (10) Packet A|10545889|S0|539b271a9de8afcc|48|2 AckFrame[1-0|Δ71] Padding(16) 71.937 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 71.937 Finished downloading https://server4:443/iuscqjipgx at 47:51.834 on ClientConnection[b7cd938bf5d89875/539b271a9de8afcc(V1) with server4/193.167.100.100:443] 71.937 Closing ClientConnection[b7cd938bf5d89875/539b271a9de8afcc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 71.937 -> Packet A|2|S0|4000005d1a28fb63|38|2 ConnectionCloseFrame[0|0|] AckFrame[10545889-10545888|Δ0] 71.937 Creating connection with server4:443 with v1 71.938 Setting up connection for downloading https://server4:443/ldlrshmnfc at 47:51.835 on ClientConnection[1e73f84b420b76f5/8f63000c313b86f5(V1) with server4/193.167.100.100:443] 71.938 Original destination connection id: 1e73f84b420b76f5 (scid: 8f63000c313b86f5) >- CryptoStream[I|ClientHello] 71.939 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 72.139/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 71.939 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 71.972 <- (1) Packet I|9907840|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 71.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 72.174/Handshake, because peerAwaitingAddressValidation | RTT:100/25 71.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.071/Handshake, because peerAwaitingAddressValidation | RTT:33/16 71.975 Discarding pn space Initial because first Handshake message is being sent 71.975 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.072/Handshake, because peerAwaitingAddressValidation | RTT:33/16 71.973 <- (2) Packet H|9907840|L|762|1 CryptoFrame[0,713] 71.975 -> Packet I|1|L|1201|2 Token=[] AckFrame[9907840|Δ0] Padding(1150) 71.975 - unknown transport parameter 0xff0a001, size 1 71.975 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 71.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.074/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 71.977 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 71.977 Starting downloading https://server4:443/ldlrshmnfc at 47:51.874 on ClientConnection[1e73f84b420b76f5/8f63000c313b86f5(V1) with server4/193.167.100.100:443] 71.977 -> Packet H|1|L|49|1 AckFrame[9907840|Δ0] 71.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.074/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 71.977 -> Packet A|0|S0|400000d8b4f7d357|47|1 StreamFrame[0(CIB),0,17,fin] 72.009 <- (3) Packet A|9907841|S0|8f63000c313b86f5|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 72.009 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.106/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 72.009 Finished downloading https://server4:443/ldlrshmnfc at 47:51.907 on ClientConnection[1e73f84b420b76f5/8f63000c313b86f5(V1) with server4/193.167.100.100:443] 72.009 Closing ClientConnection[1e73f84b420b76f5/8f63000c313b86f5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 72.010 -> Packet A|1|S0|400000d8b4f7d357|38|2 ConnectionCloseFrame[0|0|] AckFrame[9907841|Δ0] 72.010 Creating connection with server4:443 with v1 72.010 Setting up connection for downloading https://server4:443/vkwkusfopp at 47:51.907 on ClientConnection[f29e5187ddd71ecc/00b73a8ede59dd01(V1) with server4/193.167.100.100:443] 72.010 Original destination connection id: f29e5187ddd71ecc (scid: 00b73a8ede59dd01) >- CryptoStream[I|ClientHello] 72.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 72.211/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 72.011 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 72.040 <- (4) Packet A|9907842|S0|8f63000c313b86f5|44|1 ConnectionCloseFrame[0|28|Peer closed] 72.040 <- (5) Packet H|9907842|L|60|1 ConnectionCloseFrame[0|28|Peer closed] 72.044 <- (1) Packet I|13525622|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 72.047 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 72.247/Handshake, because peerAwaitingAddressValidation | RTT:100/25 72.047 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.144/Handshake, because peerAwaitingAddressValidation | RTT:33/16 72.047 Discarding pn space Initial because first Handshake message is being sent 72.047 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.144/Handshake, because peerAwaitingAddressValidation | RTT:33/16 72.045 <- (2) Packet H|13525622|L|760|1 CryptoFrame[0,711] 72.047 -> Packet I|1|L|1201|2 Token=[] AckFrame[13525622|Δ0] Padding(1150) 72.047 - unknown transport parameter 0xff0a001, size 1 72.047 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 72.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.146/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 72.049 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 72.050 Starting downloading https://server4:443/vkwkusfopp at 47:51.947 on ClientConnection[f29e5187ddd71ecc/00b73a8ede59dd01(V1) with server4/193.167.100.100:443] 72.050 -> Packet H|1|L|49|1 AckFrame[13525622|Δ0] 72.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.147/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 72.050 -> Packet A|0|S0|4000004558eb6213|47|1 StreamFrame[0(CIB),0,17,fin] 72.080 <- (3) Packet H|13525623|L|49|1 AckFrame[0|Δ0] 72.080 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 72.080 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 72.080 <- (4) Packet A|13525622|S0|00b73a8ede59dd01|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000596adaf673|45be11eb1ecd4ec981351e3b19cf27a0] Padding(24) -< CryptoStream[A|NewSessionTicket] 72.081 State is set to Confirmed reschedule loss detection timer for PTO over 79 millis, based on 72.160/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 79 millis, based on 72.160/App, because ackElicitingInFlight | RTT:33/13 72.081 Discarding pn space Handshake because HandshakeDone is received 72.081 <- (5) Packet A|13525623|S0|00b73a8ede59dd01|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 72.082 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 72.082 -> Packet A|1|S0|4000004558eb6213|34|1 AckFrame[13525623-13525622|Δ0] 72.082 Finished downloading https://server4:443/vkwkusfopp at 47:51.979 on ClientConnection[f29e5187ddd71ecc/00b73a8ede59dd01(V1) with server4/193.167.100.100:443] 72.082 Closing ClientConnection[f29e5187ddd71ecc/00b73a8ede59dd01(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 72.082 -> Packet A|2|S0|4000004558eb6213|38|2 ConnectionCloseFrame[0|0|] AckFrame[13525623-13525622|Δ0]