0.000 Creating connection with server4:443 with v1 0.083 Setting up connection for downloading https://server4:443/uwrtxakndj at 45:34.499 on ClientConnection[7db49693da0c7efe/3e4464372a4bc168(V1) with server4/193.167.100.100:443] 0.084 Original destination connection id: 7db49693da0c7efe (scid: 3e4464372a4bc168) >- CryptoStream[I|ClientHello] 0.263 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.463/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.258 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.463 loss detection timeout handler running Sending probe 0, because no ack since 0.258. Current RTT: 100/25. 0.464 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.466 (Probe is an initial retransmit) 0.470 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.870/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.469 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.869 loss detection timeout handler running Sending probe 1, because no ack since 0.469. Current RTT: 100/25. 0.869 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.870 (Probe is an initial retransmit) 0.871 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 1.671/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.871 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.872 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 1.672/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.872 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.910 <- (1) Packet I|12857620|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[2|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 0.940 probe count not reset on ack because handshake not yet confirmed 0.944 Retransmitting CryptoFrame[0,257] on level Initial 0.946 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 1.746/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.946 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.950 Cwnd(-): 6000; inflight: 2400 0.952 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 1.752/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.960 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.960 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 1.075/Handshake, because peerAwaitingAddressValidation | RTT:38/19 reschedule loss detection timer for PTO over 113 millis, based on 1.075/Handshake, because peerAwaitingAddressValidation | RTT:38/19 0.957 -> Packet I|5|L|1201|2 Token=[] AckFrame[12857620|Δ0] Padding(1150) 0.961 Discarding pn space Initial because first Handshake message is being sent 0.910 <- (2) Packet H|12857620|L|762|1 CryptoFrame[0,713] 0.968 - unknown transport parameter 0xff0a001, size 1 0.968 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 0.991 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 1.105/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.991 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.995 -> Packet H|1|L|49|1 AckFrame[12857620|Δ0] 0.996 Starting downloading https://server4:443/uwrtxakndj at 45:35.427 on ClientConnection[7db49693da0c7efe/3e4464372a4bc168(V1) with server4/193.167.100.100:443] 1.018 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 1.133/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 1.023 <- (3) Packet H|12857621|L|49|1 AckFrame[0|Δ0] 1.024 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 1.024 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 1.018 -> Packet A|0|S0|40000041ac0533e0|47|1 StreamFrame[0(CIB),0,17,fin] 1.050 <- (4) Packet A|12857622|S0|3e4464372a4bc168|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 1.054 Finished downloading https://server4:443/uwrtxakndj at 45:35.486 on ClientConnection[7db49693da0c7efe/3e4464372a4bc168(V1) with server4/193.167.100.100:443] 1.056 Closing ClientConnection[7db49693da0c7efe/3e4464372a4bc168(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.059 Creating connection with server4:443 with v1 1.060 Setting up connection for downloading https://server4:443/yzrtqhsppv at 45:35.491 on ClientConnection[7cce2ba010cd843a/2ada1f0e8f58701c(V1) with server4/193.167.100.100:443] 1.060 Original destination connection id: 7cce2ba010cd843a (scid: 2ada1f0e8f58701c) >- CryptoStream[I|ClientHello] 1.063 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.263/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.063 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.059 -> Packet A|1|S0|40000041ac0533e0|39|2 ConnectionCloseFrame[0|0|] AckFrame[12857622|Δ5] 1.262 loss detection timeout handler running Sending probe 0, because no ack since 1.063. Current RTT: 100/25. 1.263 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.263 (Probe is an initial retransmit) 1.264 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.664/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.263 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.300 <- (5) Packet A|12857624|S0|3e4464372a4bc168|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000047941959ac|5ac15346f7f59b0f5e0bad6b77c3f8c0] Padding(1) 1.300 <- (6) Packet A|12857625|S0|3e4464372a4bc168|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000047941959ac|5ac15346f7f59b0f5e0bad6b77c3f8c0] Padding(1) 1.306 -> Packet A|2|S0|40000041ac0533e0|38|2 ConnectionCloseFrame[0|0|] AckFrame[12857622|Δ0] 1.307 -> Packet A|3|S0|40000041ac0533e0|38|2 ConnectionCloseFrame[0|0|] AckFrame[12857622|Δ0] 1.408 <- (1) Packet I|13804678|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[1|Δ111] Padding(1052) -< CryptoStream[I|ServerHello] 1.413 probe count not reset on ack because handshake not yet confirmed 1.413 Retransmitting CryptoFrame[0,257] on level Initial 1.413 Cwnd(-): 6000; inflight: 0 1.413 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.813/Handshake, because peerAwaitingAddressValidation | RTT:100/25 1.414 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.414 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 1.846/Handshake, because peerAwaitingAddressValidation | RTT:144/72 reschedule loss detection timer for PTO over 431 millis, based on 1.846/Handshake, because peerAwaitingAddressValidation | RTT:144/72 1.414 Discarding pn space Initial because first Handshake message is being sent 1.414 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.415 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[13804678|Δ0] Padding(1150) 1.619 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.618 <- (3) Packet H|13804680|L|762|1 CryptoFrame[0,713] 1.620 - unknown transport parameter 0xff0a001, size 1 1.620 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 1.623 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 2.055/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:144/72 1.623 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.624 Starting downloading https://server4:443/yzrtqhsppv at 45:36.056 on ClientConnection[7cce2ba010cd843a/2ada1f0e8f58701c(V1) with server4/193.167.100.100:443] 1.625 -> Packet H|1|L|49|1 AckFrame[13804680|Δ0] 1.625 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 2.057/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:144/72 1.625 -> Packet A|0|S0|400000119b1a474c|47|1 StreamFrame[0(CIB),0,17,fin] 1.656 <- (4) Packet A|13804677|S0|2ada1f0e8f58701c|48|2 AckFrame[0|Δ0] Padding(14) 1.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 2.089/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:144/72 1.657 <- (5) Packet A|13804678|S0|2ada1f0e8f58701c|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 1.658 Finished downloading https://server4:443/yzrtqhsppv at 45:36.090 on ClientConnection[7cce2ba010cd843a/2ada1f0e8f58701c(V1) with server4/193.167.100.100:443] 1.658 Closing ClientConnection[7cce2ba010cd843a/2ada1f0e8f58701c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.659 Creating connection with server4:443 with v1 1.660 -> Packet A|1|S0|400000119b1a474c|39|2 ConnectionCloseFrame[0|0|] AckFrame[13804678-13804677|Δ1] 1.660 Setting up connection for downloading https://server4:443/ekhrykvdtg at 45:36.092 on ClientConnection[563f040f2b927208/39be58a60384a383(V1) with server4/193.167.100.100:443] 1.660 Original destination connection id: 563f040f2b927208 (scid: 39be58a60384a383) >- CryptoStream[I|ClientHello] 1.662 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.862/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.662 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.691 <- (6) Packet H|13804682|L|57|1 ConnectionCloseFrame[0|28|Peer closed] 1.696 <- (1) Packet I|8407838|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 1.700 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.900/Handshake, because peerAwaitingAddressValidation | RTT:100/25 1.701 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.798/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.701 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.799/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.701 -> Packet I|1|L|1201|2 Token=[] AckFrame[8407838|Δ0] Padding(1150) 1.702 Discarding pn space Initial because first Handshake message is being sent 1.697 <- (2) Packet H|8407838|L|763|1 CryptoFrame[0,714] 1.703 - unknown transport parameter 0xff0a001, size 1 1.703 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 1.708 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.805/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.707 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.709 Starting downloading https://server4:443/ekhrykvdtg at 45:36.140 on ClientConnection[563f040f2b927208/39be58a60384a383(V1) with server4/193.167.100.100:443] 1.710 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.807/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.710 -> [Packet H|1|L|49|1 AckFrame[8407838|Δ0], Packet A|0|S0|400000079378ceaa|47|1 StreamFrame[0(CIB),0,17,fin]] 1.738 <- (3) Packet H|8407839|L|49|1 AckFrame[0|Δ0] 1.740 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 1.740 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 1.739 <- (4) Packet A|8407838|S0|39be58a60384a383|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000011666a6920|76b120ceb1b637d1d8aa45df43de009e] Padding(24) -< CryptoStream[A|NewSessionTicket] 1.742 State is set to Confirmed reschedule loss detection timer for PTO over 77 millis, based on 1.820/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 77 millis, based on 1.820/App, because ackElicitingInFlight | RTT:33/13 1.743 Discarding pn space Handshake because HandshakeDone is received 1.742 <- (5) Packet A|8407839|S0|39be58a60384a383|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 1.744 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.744 Finished downloading https://server4:443/ekhrykvdtg at 45:36.176 on ClientConnection[563f040f2b927208/39be58a60384a383(V1) with server4/193.167.100.100:443] 1.745 Closing ClientConnection[563f040f2b927208/39be58a60384a383(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.744 -> Packet A|1|S0|400000079378ceaa|34|1 AckFrame[8407839-8407838|Δ0] 1.746 Creating connection with server4:443 with v1 1.745 -> Packet A|2|S0|400000079378ceaa|38|2 ConnectionCloseFrame[0|0|] AckFrame[8407839-8407838|Δ0] 1.746 Setting up connection for downloading https://server4:443/lwbfkypscm at 45:36.178 on ClientConnection[15d944accbb3e678/2818ef88b670fb48(V1) with server4/193.167.100.100:443] 1.746 Original destination connection id: 15d944accbb3e678 (scid: 2818ef88b670fb48) >- CryptoStream[I|ClientHello] 1.750 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.950/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.750 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.784 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 1.892 <- (2) Packet I|5964945|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[0|Δ109] Padding(1053) -< CryptoStream[I|ServerHello] 1.897 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.097/Handshake, because peerAwaitingAddressValidation | RTT:100/25 1.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 2.324/Handshake, because peerAwaitingAddressValidation | RTT:142/71 1.898 Discarding pn space Initial because first Handshake message is being sent 1.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 2.324/Handshake, because peerAwaitingAddressValidation | RTT:142/71 1.893 <- (3) Packet H|5964945|L|761|1 CryptoFrame[0,713] 1.898 -> Packet I|1|L|1201|2 Token=[] AckFrame[5964945|Δ0] Padding(1150) 1.899 - unknown transport parameter 0xff0a001, size 1 1.899 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 1.902 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 2.328/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:142/71 1.901 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.902 Starting downloading https://server4:443/lwbfkypscm at 45:36.334 on ClientConnection[15d944accbb3e678/2818ef88b670fb48(V1) with server4/193.167.100.100:443] 1.903 -> Packet H|1|L|49|1 AckFrame[5964945|Δ0] 1.903 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 2.329/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:142/71 1.903 -> Packet A|0|S0|40000013b39f6d5c|47|1 StreamFrame[0(CIB),0,17,fin] 1.933 <- (4) Packet A|5964943|S0|2818ef88b670fb48|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000001507b3341b|58322c2294ca91a13bcd41b4fd19d3b6] Padding(25) -< CryptoStream[A|NewSessionTicket] 1.934 State is set to Confirmed reschedule loss detection timer for PTO over 393 millis, based on 2.327/Handshake, because ackElicitingInFlight | RTT:142/71 reschedule loss detection timer for PTO over 420 millis, based on 2.354/App, because ackElicitingInFlight | RTT:142/71 1.934 Discarding pn space Handshake because HandshakeDone is received 1.935 <- (5) Packet A|5964944|S0|2818ef88b670fb48|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 1.936 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.936 Finished downloading https://server4:443/lwbfkypscm at 45:36.368 on ClientConnection[15d944accbb3e678/2818ef88b670fb48(V1) with server4/193.167.100.100:443] 1.936 -> Packet A|1|S0|40000013b39f6d5c|35|1 AckFrame[5964944-5964943|Δ1] 1.936 Closing ClientConnection[15d944accbb3e678/2818ef88b670fb48(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.937 Creating connection with server4:443 with v1 1.937 -> Packet A|2|S0|40000013b39f6d5c|38|2 ConnectionCloseFrame[0|0|] AckFrame[5964944-5964943|Δ0] 1.938 Setting up connection for downloading https://server4:443/fkhwielkfb at 45:36.369 on ClientConnection[987d9f77ddd14a15/31e50c8340d48fcd(V1) with server4/193.167.100.100:443] 1.938 Original destination connection id: 987d9f77ddd14a15 (scid: 31e50c8340d48fcd) >- CryptoStream[I|ClientHello] 1.940 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.140/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.940 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.967 <- (6) Packet A|5964945|S0|2818ef88b670fb48|41|1 ConnectionCloseFrame[0|28|Peer closed] 1.973 <- (1) Packet I|10892363|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 1.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.177/Handshake, because peerAwaitingAddressValidation | RTT:100/25 1.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.074/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.977 Discarding pn space Initial because first Handshake message is being sent 1.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.074/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.977 -> Packet I|1|L|1201|2 Token=[] AckFrame[10892363|Δ0] Padding(1150) 2.074 loss detection timeout handler running 2.074 Sending probe 0. Current RTT: 33/16. 2.074 Sending probe because peer awaiting address validation 2.074 (Probe is a handshake ping) 2.075 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.269/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.075 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 2.084 <- (2) Packet H|10892365|L|762|1 CryptoFrame[0,713] 2.085 - unknown transport parameter 0xff0a001, size 1 2.085 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 2.088 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.282/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.088 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.089 Starting downloading https://server4:443/fkhwielkfb at 45:36.520 on ClientConnection[987d9f77ddd14a15/31e50c8340d48fcd(V1) with server4/193.167.100.100:443] 2.089 -> Packet H|2|L|49|1 AckFrame[10892365|Δ0] 2.089 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.283/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.089 -> Packet A|0|S0|4000004cbf16c91d|47|1 StreamFrame[0(CIB),0,17,fin] 2.185 <- (3) Packet H|10892367|L|50|1 AckFrame[0|Δ79] 2.186 probe count not reset on ack because handshake not yet confirmed 2.186 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 95 millis, based on 2.282/Handshake, because ackElicitingInFlight | RTT:33/16 2.281 loss detection timeout handler running Sending probe 1, because no ack since 2.088. Current RTT: 40/25. 2.282 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.282 (Probe is a handshake retransmit) 2.283 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 559 millis, based on 2.843/Handshake, because ackElicitingInFlight | RTT:40/25 2.283 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 2.284 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 559 millis, based on 2.843/Handshake, because ackElicitingInFlight | RTT:40/25 2.283 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 2.287 <- (4) Packet H|10892369|L|762|1 CryptoFrame[0,713] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.290 -> Packet H|5|L|53|1 AckFrame[10892369,10892367,10892365|Δ0] 2.314 <- (5) Packet A|10892363|S0|31e50c8340d48fcd|336|5 CryptoFrame[0,250] AckFrame[0|Δ193] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005b42bb5553|0e47be5cc3f90cf012a30d1c6d3d9fbb] Padding(16) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 107 millis, based on 2.423/Handshake, because ackElicitingInFlight | RTT:40/25 2.316 State is set to Confirmed reschedule loss detection timer for PTO over 263 millis, based on 2.579/Handshake, because ackElicitingInFlight | RTT:60/59 2.316 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.316 Discarding pn space Handshake because HandshakeDone is received 2.315 <- (6) Packet A|10892364|S0|31e50c8340d48fcd|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 2.317 Discarding packet (51 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 2.317 -> Packet A|1|S0|4000004cbf16c91d|34|1 AckFrame[10892364-10892363|Δ0] 2.317 Finished downloading https://server4:443/fkhwielkfb at 45:36.749 on ClientConnection[987d9f77ddd14a15/31e50c8340d48fcd(V1) with server4/193.167.100.100:443] 2.317 Closing ClientConnection[987d9f77ddd14a15/31e50c8340d48fcd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.318 Creating connection with server4:443 with v1 2.318 -> Packet A|2|S0|4000004cbf16c91d|38|2 ConnectionCloseFrame[0|0|] AckFrame[10892364-10892363|Δ0] 2.319 Setting up connection for downloading https://server4:443/izzshlskki at 45:36.750 on ClientConnection[6da3ea2e43042f0f/fb8cdba9920e89fe(V1) with server4/193.167.100.100:443] 2.319 Original destination connection id: 6da3ea2e43042f0f (scid: fb8cdba9920e89fe) >- CryptoStream[I|ClientHello] 2.321 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.521/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.321 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.354 <- (1) Packet I|15966440|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 2.359 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.559/Handshake, because peerAwaitingAddressValidation | RTT:100/25 2.359 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.456/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.359 Discarding pn space Initial because first Handshake message is being sent 2.360 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.457/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.355 <- (2) Packet H|15966440|L|763|1 CryptoFrame[0,714] 2.359 -> Packet I|1|L|1201|2 Token=[] AckFrame[15966440|Δ0] Padding(1150) 2.360 - unknown transport parameter 0xff0a001, size 1 2.360 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 2.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.460/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.363 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.364 Starting downloading https://server4:443/izzshlskki at 45:36.795 on ClientConnection[6da3ea2e43042f0f/fb8cdba9920e89fe(V1) with server4/193.167.100.100:443] 2.364 -> Packet H|1|L|49|1 AckFrame[15966440|Δ0] 2.364 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.462/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.364 -> Packet A|0|S0|4000009f358882d9|47|1 StreamFrame[0(CIB),0,17,fin] 2.461 loss detection timeout handler running Sending probe 0, because no ack since 2.363. Current RTT: 33/16. 2.461 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.461 (Probe is a handshake retransmit) 2.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.656/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.462 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 2.465 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.465 <- (4) Packet H|15966442|L|763|1 CryptoFrame[0,714] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.466 -> Packet H|3|L|51|1 AckFrame[15966442,15966440|Δ0] 2.655 loss detection timeout handler running Sending probe 1, because no ack since 2.364. Current RTT: 33/16. 2.655 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.655 (Probe is a handshake retransmit) 2.656 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.044/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.656 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 2.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.045/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.657 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 2.675 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.675 <- (6) Packet H|15966444|L|763|1 CryptoFrame[0,714] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.676 -> Packet H|6|L|53|1 AckFrame[15966444,15966442,15966440|Δ0] 2.687 <- (7) Packet H|15966445|L|49|1 AckFrame[4|Δ0] 2.688 probe count not reset on ack because handshake not yet confirmed 2.688 Retransmitting CryptoFrame[0,36] on level Handshake 2.688 Cwnd(-): 6000; inflight: 127 2.688 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 356 millis, based on 3.045/Handshake, because ackElicitingInFlight | RTT:33/16 2.688 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.687 <- (8) Packet A|15966440|S0|fb8cdba9920e89fe|336|5 CryptoFrame[0,250] AckFrame[0|Δ292] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000008b5c46bad0|94722f76dc123d99682294abfbc3b264] Padding(16) reschedule loss detection timer for PTO over 339 millis, based on 3.028/Handshake, because ackElicitingInFlight | RTT:33/13 2.688 -> Packet H|7|L|93|2 CryptoFrame[0,36] AckFrame[15966444,15966442,15966440|Δ0] -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 83 millis, based on 2.773/Handshake, because ackElicitingInFlight | RTT:33/13 2.690 State is set to Confirmed reschedule loss detection timer for PTO over 368 millis, based on 3.058/Handshake, because ackElicitingInFlight | RTT:66/76 2.690 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.690 Discarding pn space Handshake because HandshakeDone is received 2.690 Discarding packet (49 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 2.709 -> Packet A|1|S0|4000009f358882d9|35|1 AckFrame[15966440|Δ19] 3.011 <- (10) Packet A|15966446|S0|fb8cdba9920e89fe|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 3.012 Finished downloading https://server4:443/izzshlskki at 45:37.443 on ClientConnection[6da3ea2e43042f0f/fb8cdba9920e89fe(V1) with server4/193.167.100.100:443] 3.012 Closing ClientConnection[6da3ea2e43042f0f/fb8cdba9920e89fe(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.012 -> Packet A|2|S0|4000009f358882d9|40|2 ConnectionCloseFrame[0|0|] AckFrame[15966446,15966440|Δ0] 3.013 Creating connection with server4:443 with v1 3.013 Setting up connection for downloading https://server4:443/daswizafap at 45:37.445 on ClientConnection[5130a80155daf86e/6f4974ef7c3c4f9a(V1) with server4/193.167.100.100:443] 3.013 Original destination connection id: 5130a80155daf86e (scid: 6f4974ef7c3c4f9a) >- CryptoStream[I|ClientHello] 3.015 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.215/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.015 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.214 loss detection timeout handler running Sending probe 0, because no ack since 3.015. Current RTT: 100/25. 3.215 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.215 (Probe is an initial retransmit) 3.215 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.615/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.215 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.421 <- (11) Packet A|15966448|S0|fb8cdba9920e89fe|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 3.423 -> Packet A|3|S0|4000009f358882d9|40|2 ConnectionCloseFrame[0|0|] AckFrame[15966446,15966440|Δ0] 3.615 loss detection timeout handler running Sending probe 1, because no ack since 3.215. Current RTT: 100/25. 3.615 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.615 (Probe is an initial retransmit) 3.616 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.416/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.616 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.617 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.417/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.616 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.650 <- (1) Packet I|4269267|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[2|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 3.654 probe count not reset on ack because handshake not yet confirmed 3.654 Retransmitting CryptoFrame[0,257] on level Initial 3.655 Cwnd(-): 6000; inflight: 1200 3.655 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 4.455/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.655 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.655 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 4.043/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 3.752/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.655 Discarding pn space Initial because first Handshake message is being sent 3.655 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.655 Packet not sent because keys are discarded: Packet I|5|L|.|2 Token=[] AckFrame[4269267|Δ0] Padding(1150) 3.650 <- (2) Packet H|4269267|L|761|1 CryptoFrame[0,713] 3.656 - unknown transport parameter 0xff0a001, size 1 3.656 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 3.658 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.755/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.658 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.659 Starting downloading https://server4:443/daswizafap at 45:38.091 on ClientConnection[5130a80155daf86e/6f4974ef7c3c4f9a(V1) with server4/193.167.100.100:443] 3.659 -> Packet H|1|L|49|1 AckFrame[4269267|Δ0] 3.664 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.761/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.663 -> Packet A|0|S0|400000d69ae1aa87|47|1 StreamFrame[0(CIB),0,17,fin] 3.690 <- (3) Packet H|4269268|L|48|1 AckFrame[0|Δ0] 3.690 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.690 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.694 <- (4) Packet A|4269268|S0|6f4974ef7c3c4f9a|48|2 AckFrame[0|Δ0] Padding(15) 3.695 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.695 <- (5) Packet A|4269269|S0|6f4974ef7c3c4f9a|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 3.696 Finished downloading https://server4:443/daswizafap at 45:38.127 on ClientConnection[5130a80155daf86e/6f4974ef7c3c4f9a(V1) with server4/193.167.100.100:443] 3.696 Closing ClientConnection[5130a80155daf86e/6f4974ef7c3c4f9a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.696 -> Packet A|1|S0|400000d69ae1aa87|38|2 ConnectionCloseFrame[0|0|] AckFrame[4269269-4269268|Δ0] 3.697 Creating connection with server4:443 with v1 3.697 Setting up connection for downloading https://server4:443/qlncplzwpk at 45:38.129 on ClientConnection[39d95fac065e3102/a301b57f81ccf660(V1) with server4/193.167.100.100:443] 3.698 Original destination connection id: 39d95fac065e3102 (scid: a301b57f81ccf660) >- CryptoStream[I|ClientHello] 3.699 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.899/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.699 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.899 loss detection timeout handler running Sending probe 0, because no ack since 3.699. Current RTT: 100/25. 3.899 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.899 (Probe is an initial retransmit) 3.900 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.300/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.899 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.933 <- (1) Packet I|5140200|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[1|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 3.937 probe count not reset on ack because handshake not yet confirmed 3.937 Retransmitting CryptoFrame[0,257] on level Initial 3.937 Cwnd(-): 6000; inflight: 0 3.937 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.337/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.937 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.937 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.131/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 4.035/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.937 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.938 Discarding pn space Initial because first Handshake message is being sent 3.938 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[5140200|Δ0] Padding(1150) 3.934 <- (2) Packet H|5140200|L|760|1 CryptoFrame[0,712] 3.938 - unknown transport parameter 0xff0a001, size 1 3.938 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 3.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.038/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.941 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.941 Starting downloading https://server4:443/qlncplzwpk at 45:38.373 on ClientConnection[39d95fac065e3102/a301b57f81ccf660(V1) with server4/193.167.100.100:443] 3.941 -> Packet H|1|L|49|1 AckFrame[5140200|Δ0] 3.942 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.039/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.942 -> Packet A|0|S0|4000008ec0d3e535|47|1 StreamFrame[0(CIB),0,17,fin] 3.972 <- (3) Packet H|5140201|L|48|1 AckFrame[0|Δ0] 3.972 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.972 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.972 <- (4) Packet A|5140200|S0|a301b57f81ccf660|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000088ae1aaf37|8e05c9a18c92215b7b69ffff4fa8b99c] Padding(25) -< CryptoStream[A|NewSessionTicket] 3.973 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 4.052/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 4.052/App, because ackElicitingInFlight | RTT:33/13 3.973 Discarding pn space Handshake because HandshakeDone is received 3.993 -> Packet A|1|S0|4000008ec0d3e535|35|1 AckFrame[5140200|Δ19] 4.051 loss detection timeout handler running Sending probe 0, because no ack since 3.942. Current RTT: 33/13. 4.052 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 4.273/App, because ackElicitingInFlight | RTT:33/13 4.053 -> Packet PA|2|S0|4000008ec0d3e535|47|1 StreamFrame[0(CIB),0,17,fin] 4.084 <- (5) Packet A|5140201|S0|a301b57f81ccf660|1072|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 4.086 Cwnd(-): 3000; inflight: 0 4.086 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.086 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 97 millis, based on 4.185/App, because ackElicitingInFlight | RTT:33/10 4.087 -> Packet A|3|S0|4000008ec0d3e535|47|1 StreamFrame[0(CIB),0,17,fin] 4.087 Finished downloading https://server4:443/qlncplzwpk at 45:38.518 on ClientConnection[39d95fac065e3102/a301b57f81ccf660(V1) with server4/193.167.100.100:443] 4.087 Closing ClientConnection[39d95fac065e3102/a301b57f81ccf660(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.088 Creating connection with server4:443 with v1 4.087 -> Packet A|4|S0|4000008ec0d3e535|38|2 ConnectionCloseFrame[0|0|] AckFrame[5140201|Δ0] 4.088 Setting up connection for downloading https://server4:443/jufokflbho at 45:38.520 on ClientConnection[472b90e8c29a2d69/d19fa09621950de3(V1) with server4/193.167.100.100:443] 4.088 Original destination connection id: 472b90e8c29a2d69 (scid: d19fa09621950de3) >- CryptoStream[I|ClientHello] 4.090 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.290/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.090 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.118 <- (6) Packet A|5140202|S0|a301b57f81ccf660|41|1 ConnectionCloseFrame[0|28|Peer closed] 4.123 <- (1) Packet I|6236416|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 4.128 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.328/Handshake, because peerAwaitingAddressValidation | RTT:100/25 4.128 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.225/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.128 Discarding pn space Initial because first Handshake message is being sent 4.128 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.225/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.128 -> Packet I|1|L|1201|2 Token=[] AckFrame[6236416|Δ0] Padding(1150) 4.224 loss detection timeout handler running 4.225 Sending probe 0. Current RTT: 33/16. 4.225 Sending probe because peer awaiting address validation 4.225 (Probe is a handshake ping) 4.225 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.419/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.225 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 4.234 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.234 <- (3) Packet H|6236418|L|762|1 CryptoFrame[0,714] 4.235 - unknown transport parameter 0xff0a001, size 1 4.235 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 4.238 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.432/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.238 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.239 Starting downloading https://server4:443/jufokflbho at 45:38.670 on ClientConnection[472b90e8c29a2d69/d19fa09621950de3(V1) with server4/193.167.100.100:443] 4.239 -> Packet H|2|L|49|1 AckFrame[6236418|Δ0] 4.239 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.433/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.239 -> Packet A|0|S0|400000ce58f8b62b|47|1 StreamFrame[0(CIB),0,17,fin] 4.432 loss detection timeout handler running Sending probe 1, because no ack since 4.238. Current RTT: 33/16. 4.433 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.433 (Probe is a handshake retransmit) 4.433 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 4.822/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.433 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 4.434 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 4.822/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.434 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 4.821 loss detection timeout handler running Sending probe 2, because no ack since 4.239. Current RTT: 33/16. 4.822 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.822 (Probe is a handshake retransmit) 4.822 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 5.598/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.822 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 4.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 5.599/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.823 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 4.855 <- (4) Packet A|6236416|S0|d19fa09621950de3|336|5 CryptoFrame[0,250] AckFrame[0|Δ584] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000da9d47f4b1|817d43b6ca51fedf7af6447f90dbc490] Padding(17) -< CryptoStream[A|NewSessionTicket] 4.856 probe count not reset on ack because handshake not yet confirmed 4.856 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 5.632/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.856 State is set to Confirmed reschedule loss detection timer for PTO over 5623 millis, based on 10.479/Handshake, because ackElicitingInFlight | RTT:103/151 4.856 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.856 Discarding pn space Handshake because HandshakeDone is received 4.855 <- (5) Packet A|6236417|S0|d19fa09621950de3|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 4.857 Finished downloading https://server4:443/jufokflbho at 45:39.288 on ClientConnection[472b90e8c29a2d69/d19fa09621950de3(V1) with server4/193.167.100.100:443] 4.857 -> Packet A|1|S0|400000ce58f8b62b|34|1 AckFrame[6236417-6236416|Δ0] 4.857 Closing ClientConnection[472b90e8c29a2d69/d19fa09621950de3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.857 -> Packet A|2|S0|400000ce58f8b62b|38|2 ConnectionCloseFrame[0|0|] AckFrame[6236417-6236416|Δ0] 4.858 Creating connection with server4:443 with v1 4.858 Setting up connection for downloading https://server4:443/pdauyhhoba at 45:39.290 on ClientConnection[15d721811ca4a665/331f39972d1a8dfe(V1) with server4/193.167.100.100:443] 4.858 Original destination connection id: 15d721811ca4a665 (scid: 331f39972d1a8dfe) >- CryptoStream[I|ClientHello] 4.860 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.060/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.860 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.893 <- (1) Packet I|9230645|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 4.897 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 5.097/Handshake, because peerAwaitingAddressValidation | RTT:100/25 4.897 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.994/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.898 Discarding pn space Initial because first Handshake message is being sent 4.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.995/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.898 -> Packet I|1|L|1201|2 Token=[] AckFrame[9230645|Δ0] Padding(1150) 4.894 <- (2) Packet H|9230645|L|762|1 CryptoFrame[0,713] 4.898 - unknown transport parameter 0xff0a001, size 1 4.898 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 4.901 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.998/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.900 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.901 Starting downloading https://server4:443/pdauyhhoba at 45:39.333 on ClientConnection[15d721811ca4a665/331f39972d1a8dfe(V1) with server4/193.167.100.100:443] 4.901 -> Packet H|1|L|49|1 AckFrame[9230645|Δ0] 4.902 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.999/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.902 -> Packet A|0|S0|4000008d49e71573|47|1 StreamFrame[0(CIB),0,17,fin] 4.932 <- (3) Packet A|9230645|S0|331f39972d1a8dfe|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000087662e94e0|08e306feef664f374cd1dbc978321599] Padding(24) -< CryptoStream[A|NewSessionTicket] 4.933 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 4.997/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 5.024/App, because ackElicitingInFlight | RTT:33/16 4.933 Discarding pn space Handshake because HandshakeDone is received 4.933 <- (4) Packet A|9230646|S0|331f39972d1a8dfe|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 4.934 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.934 Finished downloading https://server4:443/pdauyhhoba at 45:39.366 on ClientConnection[15d721811ca4a665/331f39972d1a8dfe(V1) with server4/193.167.100.100:443] 4.934 -> Packet A|1|S0|4000008d49e71573|35|1 AckFrame[9230646-9230645|Δ1] 4.934 Closing ClientConnection[15d721811ca4a665/331f39972d1a8dfe(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.935 -> Packet A|2|S0|4000008d49e71573|38|2 ConnectionCloseFrame[0|0|] AckFrame[9230646-9230645|Δ0] 4.935 Creating connection with server4:443 with v1 4.936 Setting up connection for downloading https://server4:443/foegoqmouk at 45:39.367 on ClientConnection[2ccdd2c9dc89b043/154b51798cd4ea95(V1) with server4/193.167.100.100:443] 4.936 Original destination connection id: 2ccdd2c9dc89b043 (scid: 154b51798cd4ea95) >- CryptoStream[I|ClientHello] 4.937 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.137/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.937 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.971 Discarding packet (762 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 4.975 <- (6) Packet A|6236419|S0|d19fa09621950de3|320|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000da9d47f4b1|817d43b6ca51fedf7af6447f90dbc490] Padding(1) AckFrame[0|Δ704] 4.976 -> Packet A|3|S0|400000ce58f8b62b|38|2 ConnectionCloseFrame[0|0|] AckFrame[6236417-6236416|Δ0] 5.006 <- (7) Packet A|6236421|S0|d19fa09621950de3|43|1 ConnectionCloseFrame[0|28|Peer closed] 5.080 <- (2) Packet I|3125299|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[0|Δ110] Padding(1053) -< CryptoStream[I|ServerHello] 5.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 5.285/Handshake, because peerAwaitingAddressValidation | RTT:100/25 5.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 5.511/Handshake, because peerAwaitingAddressValidation | RTT:142/71 5.085 Discarding pn space Initial because first Handshake message is being sent 5.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.081 <- (3) Packet H|3125299|L|762|1 CryptoFrame[0,714] reschedule loss detection timer for PTO over 425 millis, based on 5.511/Handshake, because peerAwaitingAddressValidation | RTT:142/71 5.085 -> Packet I|1|L|1201|2 Token=[] AckFrame[3125299|Δ0] Padding(1150) 5.086 - unknown transport parameter 0xff0a001, size 1 5.086 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 5.089 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 425 millis, based on 5.515/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:142/71 5.089 -> Packet H|0|L|80|1 CryptoFrame[0,36] 5.090 Starting downloading https://server4:443/foegoqmouk at 45:39.521 on ClientConnection[2ccdd2c9dc89b043/154b51798cd4ea95(V1) with server4/193.167.100.100:443] 5.090 -> Packet H|1|L|49|1 AckFrame[3125299|Δ0] 5.090 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 5.516/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:142/71 5.090 -> Packet A|0|S0|400000189dc91598|47|1 StreamFrame[0(CIB),0,17,fin] 5.121 <- (4) Packet A|3125297|S0|154b51798cd4ea95|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000013a1e06968|6e29b6a606e2eeaac7c28541a2d54311] Padding(25) -< CryptoStream[A|NewSessionTicket] 5.121 State is set to Confirmed reschedule loss detection timer for PTO over 393 millis, based on 5.515/Handshake, because ackElicitingInFlight | RTT:142/71 reschedule loss detection timer for PTO over 419 millis, based on 5.541/App, because ackElicitingInFlight | RTT:142/71 5.122 Discarding pn space Handshake because HandshakeDone is received 5.141 -> Packet A|1|S0|400000189dc91598|35|1 AckFrame[3125297|Δ19] 5.541 loss detection timeout handler running Sending probe 0, because no ack since 5.090. Current RTT: 142/71. 5.541 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 901 millis, based on 6.443/App, because ackElicitingInFlight | RTT:142/71 5.541 -> Packet PA|2|S0|400000189dc91598|47|1 StreamFrame[0(CIB),0,17,fin] 6.443 loss detection timeout handler running Sending probe 1, because no ack since 5.541. Current RTT: 142/71. 6.443 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1803 millis, based on 8.247/App, because ackElicitingInFlight | RTT:142/71 6.443 -> Packet PA|3|S0|400000189dc91598|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1803 millis, based on 8.249/App, because ackElicitingInFlight | RTT:142/71 6.445 -> Packet PA|4|S0|400000189dc91598|47|1 StreamFrame[0(CIB),0,17,fin] 6.474 <- (5) Packet A|3125298|S0|154b51798cd4ea95|48|2 AckFrame[3,1|Δ0] Padding(15) 6.475 Cwnd(-): 6000; inflight: 47 6.475 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 420 millis, based on 6.896/App, because ackElicitingInFlight | RTT:142/71 reschedule loss detection timer for PTO over 476 millis, based on 6.952/App, because ackElicitingInFlight | RTT:128/81 6.475 -> Packet A|5|S0|400000189dc91598|47|1 StreamFrame[0(CIB),0,17,fin] 6.616 <- (6) Packet A|3125301|S0|154b51798cd4ea95|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 6.617 Finished downloading https://server4:443/foegoqmouk at 45:41.048 on ClientConnection[2ccdd2c9dc89b043/154b51798cd4ea95(V1) with server4/193.167.100.100:443] 6.617 Closing ClientConnection[2ccdd2c9dc89b043/154b51798cd4ea95(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.618 Creating connection with server4:443 with v1 6.617 -> Packet A|6|S0|400000189dc91598|40|2 ConnectionCloseFrame[0|0|] AckFrame[3125301,3125298|Δ0] 6.618 Setting up connection for downloading https://server4:443/bljcagmoqo at 45:41.050 on ClientConnection[ec92d89214e07135/9675fc622ab4595c(V1) with server4/193.167.100.100:443] 6.618 Original destination connection id: ec92d89214e07135 (scid: 9675fc622ab4595c) >- CryptoStream[I|ClientHello] 6.620 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.820/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.619 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.653 <- (1) Packet I|62595|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 6.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.857/Handshake, because peerAwaitingAddressValidation | RTT:100/25 6.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.754/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.657 Discarding pn space Initial because first Handshake message is being sent 6.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.654 <- (2) Packet H|62595|L|761|1 CryptoFrame[0,713] reschedule loss detection timer for PTO over 96 millis, based on 6.754/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.657 -> Packet I|1|L|1201|2 Token=[] AckFrame[62595|Δ0] Padding(1150) 6.658 - unknown transport parameter 0xff0a001, size 1 6.658 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 6.660 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.757/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.660 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.660 Starting downloading https://server4:443/bljcagmoqo at 45:41.092 on ClientConnection[ec92d89214e07135/9675fc622ab4595c(V1) with server4/193.167.100.100:443] 6.660 -> Packet H|1|L|49|1 AckFrame[62595|Δ0] 6.661 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.758/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.661 -> Packet A|0|S0|4000009c33575574|47|1 StreamFrame[0(CIB),0,17,fin] 6.691 <- (3) Packet H|62596|L|48|1 AckFrame[0|Δ0] 6.692 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 6.692 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 6.691 <- (4) Packet A|62595|S0|9675fc622ab4595c|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000855f811975|a2e9892b2a0bc999c78188f924709e10] Padding(25) -< CryptoStream[A|NewSessionTicket] 6.692 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 6.771/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 6.771/App, because ackElicitingInFlight | RTT:33/13 6.693 Discarding pn space Handshake because HandshakeDone is received 6.693 <- (5) Packet A|62596|S0|9675fc622ab4595c|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 6.693 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.693 -> Packet A|1|S0|4000009c33575574|34|1 AckFrame[62596-62595|Δ0] 6.693 Finished downloading https://server4:443/bljcagmoqo at 45:41.125 on ClientConnection[ec92d89214e07135/9675fc622ab4595c(V1) with server4/193.167.100.100:443] 6.694 Closing ClientConnection[ec92d89214e07135/9675fc622ab4595c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.694 -> Packet A|2|S0|4000009c33575574|38|2 ConnectionCloseFrame[0|0|] AckFrame[62596-62595|Δ0] 6.694 Creating connection with server4:443 with v1 6.695 Setting up connection for downloading https://server4:443/yxwsoqqyco at 45:41.126 on ClientConnection[a5d3f02cce67f56a/ffc0a163d9d6e6ed(V1) with server4/193.167.100.100:443] 6.695 Original destination connection id: a5d3f02cce67f56a (scid: ffc0a163d9d6e6ed) >- CryptoStream[I|ClientHello] 6.696 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.896/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.696 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.725 <- (6) Packet A|62597|S0|9675fc622ab4595c|43|1 ConnectionCloseFrame[0|28|Peer closed] 6.730 <- (1) Packet I|3623781|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 6.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.933/Handshake, because peerAwaitingAddressValidation | RTT:100/25 6.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.830/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.733 Discarding pn space Initial because first Handshake message is being sent 6.730 <- (2) Packet H|3623781|L|762|1 CryptoFrame[0,714] 6.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.830/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.733 -> Packet I|1|L|1201|2 Token=[] AckFrame[3623781|Δ0] Padding(1150) 6.734 - unknown transport parameter 0xff0a001, size 1 6.734 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 6.736 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.833/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.736 -> Packet H|0|L|80|1 CryptoFrame[0,36] 6.736 Starting downloading https://server4:443/yxwsoqqyco at 45:41.168 on ClientConnection[a5d3f02cce67f56a/ffc0a163d9d6e6ed(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.834/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.737 -> Packet A|0|S0|400000c35a69d4ab|47|1 StreamFrame[0(CIB),0,17,fin] 6.737 -> Packet H|1|L|49|1 AckFrame[3623781|Δ0] 6.833 loss detection timeout handler running Sending probe 0, because no ack since 6.736. Current RTT: 33/16. 6.833 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.833 (Probe is a handshake retransmit) 6.834 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.028/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.834 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 6.877 <- (7) Packet A|3125303|S0|154b51798cd4ea95|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 6.878 -> Packet A|7|S0|400000189dc91598|40|2 ConnectionCloseFrame[0|0|] AckFrame[3125301,3125298|Δ0] 7.027 loss detection timeout handler running Sending probe 1, because no ack since 6.737. Current RTT: 33/16. 7.027 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.027 (Probe is a handshake retransmit) 7.028 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.027 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 7.028 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.028 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 7.059 <- (3) Packet H|3623782|L|48|1 AckFrame[4,1|Δ0] 7.060 probe count not reset on ack because handshake not yet confirmed 7.060 Retransmitting CryptoFrame[0,36] on level Handshake 7.060 Cwnd(-): 6000; inflight: 127 7.060 -> Packet H|5|L|80|1 CryptoFrame[0,36] 7.064 loss detection timeout handler running 7.064 loss detection timeout handler running 7.065 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 335 millis, based on 7.400/Handshake, because ackElicitingInFlight | RTT:33/13 7.091 <- (4) Packet H|3623783|L|48|1 AckFrame[5-4,1|Δ0] 7.091 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 7.091 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 7.159 <- (5) Packet A|3623784|S0|ffc0a163d9d6e6ed|320|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c006c3457f|647291fb27aca6c6d7e0aa9c01721417] Padding(1) AckFrame[0|Δ391] -< CryptoStream[A|NewSessionTicket] 7.160 State is set to Confirmed reschedule loss detection timer for PTO over -321 millis, based on 6.839/App, because ackElicitingInFlight | RTT:33/11 7.160 loss detection timeout handler running Sending probe 0, because no ack since 6.737. Current RTT: 33/11. reschedule loss detection timer for PTO over -321 millis, based on 6.839/App, because ackElicitingInFlight | RTT:33/11 7.160 Discarding pn space Handshake because HandshakeDone is received 7.160 (Probe is retransmit on level App) 7.161 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 499 millis, based on 7.661/App, because ackElicitingInFlight | RTT:79/99 7.161 -> Packet PA|1|S0|400000c35a69d4ab|47|1 StreamFrame[0(CIB),0,17,fin] 7.160 <- (6) Packet A|3623785|S0|ffc0a163d9d6e6ed|320|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c006c3457f|647291fb27aca6c6d7e0aa9c01721417] Padding(1) AckFrame[0|Δ391] -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 499 millis, based on 7.661/App, because ackElicitingInFlight | RTT:79/99 7.161 -> Packet A|2|S0|400000c35a69d4ab|34|1 AckFrame[3623785-3623784|Δ0] 7.193 <- (7) Packet A|3623786|S0|ffc0a163d9d6e6ed|1072|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 7.193 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.194 Finished downloading https://server4:443/yxwsoqqyco at 45:41.625 on ClientConnection[a5d3f02cce67f56a/ffc0a163d9d6e6ed(V1) with server4/193.167.100.100:443] 7.194 Closing ClientConnection[a5d3f02cce67f56a/ffc0a163d9d6e6ed(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.195 -> Packet A|3|S0|400000c35a69d4ab|38|2 ConnectionCloseFrame[0|0|] AckFrame[3623786|Δ0] 7.195 Creating connection with server4:443 with v1 7.196 Setting up connection for downloading https://server4:443/xahjypxglu at 45:41.627 on ClientConnection[6ebbfc571f9cbbc4/eb2d70a93380ed01(V1) with server4/193.167.100.100:443] 7.196 Original destination connection id: 6ebbfc571f9cbbc4 (scid: eb2d70a93380ed01) >- CryptoStream[I|ClientHello] 7.198 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.398/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.197 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.232 Discarding packet (762 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 7.341 <- (2) Packet I|15977363|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[0|Δ110] Padding(1052) -< CryptoStream[I|ServerHello] 7.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.544/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 7.771/Handshake, because peerAwaitingAddressValidation | RTT:143/71 7.344 Discarding pn space Initial because first Handshake message is being sent 7.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 7.771/Handshake, because peerAwaitingAddressValidation | RTT:143/71 7.344 -> Packet I|1|L|1201|2 Token=[] AckFrame[15977363|Δ0] Padding(1150) 7.450 <- (8) Packet A|3623790|S0|ffc0a163d9d6e6ed|1063|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[2-1|Δ257] 7.451 <- (3) Packet H|15977365|L|762|1 CryptoFrame[0,713] 7.451 -> Packet A|4|S0|400000c35a69d4ab|38|2 ConnectionCloseFrame[0|0|] AckFrame[3623786|Δ0] 7.451 - unknown transport parameter 0xff0a001, size 1 7.451 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 7.454 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 7.881/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 7.454 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.455 Starting downloading https://server4:443/xahjypxglu at 45:41.886 on ClientConnection[6ebbfc571f9cbbc4/eb2d70a93380ed01(V1) with server4/193.167.100.100:443] 7.455 -> Packet H|1|L|49|1 AckFrame[15977365|Δ0] 7.455 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 7.882/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 7.455 -> Packet A|0|S0|400000c53d9dc93b|47|1 StreamFrame[0(CIB),0,17,fin] 7.482 <- (9) Packet A|3623791|S0|ffc0a163d9d6e6ed|41|1 ConnectionCloseFrame[0|28|Peer closed] 7.485 <- (4) Packet A|15977361|S0|eb2d70a93380ed01|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c9e204afd4|8a191656839f8f6d33e36457d0a01485] Padding(24) -< CryptoStream[A|NewSessionTicket] 7.486 State is set to Confirmed reschedule loss detection timer for PTO over 395 millis, based on 7.881/Handshake, because ackElicitingInFlight | RTT:143/71 reschedule loss detection timer for PTO over 421 millis, based on 7.907/App, because ackElicitingInFlight | RTT:143/71 7.486 Discarding pn space Handshake because HandshakeDone is received 7.505 -> Packet A|1|S0|400000c53d9dc93b|35|1 AckFrame[15977361|Δ19] 7.907 loss detection timeout handler running Sending probe 0, because no ack since 7.455. Current RTT: 143/71. 7.907 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 903 millis, based on 8.812/App, because ackElicitingInFlight | RTT:143/71 7.908 -> Packet PA|2|S0|400000c53d9dc93b|47|1 StreamFrame[0(CIB),0,17,fin] 8.811 loss detection timeout handler running Sending probe 1, because no ack since 7.908. Current RTT: 143/71. 8.811 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1807 millis, based on 10.620/App, because ackElicitingInFlight | RTT:143/71 8.812 -> Packet PA|3|S0|400000c53d9dc93b|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1807 millis, based on 10.621/App, because ackElicitingInFlight | RTT:143/71 8.813 -> Packet PA|4|S0|400000c53d9dc93b|47|1 StreamFrame[0(CIB),0,17,fin] 8.845 <- (5) Packet A|15977363|S0|eb2d70a93380ed01|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(18) 8.845 Finished downloading https://server4:443/xahjypxglu at 45:43.277 on ClientConnection[6ebbfc571f9cbbc4/eb2d70a93380ed01(V1) with server4/193.167.100.100:443] 8.845 Closing ClientConnection[6ebbfc571f9cbbc4/eb2d70a93380ed01(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.846 -> Packet A|5|S0|400000c53d9dc93b|40|2 ConnectionCloseFrame[0|0|] AckFrame[15977363,15977361|Δ0] 8.846 Creating connection with server4:443 with v1 8.847 Setting up connection for downloading https://server4:443/qiazfytbhh at 45:43.278 on ClientConnection[e8c782c6f5f2bbe2/87d422e6232a9a50(V1) with server4/193.167.100.100:443] 8.847 Original destination connection id: e8c782c6f5f2bbe2 (scid: 87d422e6232a9a50) >- CryptoStream[I|ClientHello] 8.848 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.048/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.848 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.882 <- (1) Packet I|2349730|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 8.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.085/Handshake, because peerAwaitingAddressValidation | RTT:100/25 8.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.982/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.885 Discarding pn space Initial because first Handshake message is being sent 8.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.982/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.885 -> Packet I|1|L|1201|2 Token=[] AckFrame[2349730|Δ0] Padding(1150) 8.965 <- (6) Packet A|15977365|S0|eb2d70a93380ed01|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 8.966 -> Packet A|6|S0|400000c53d9dc93b|40|2 ConnectionCloseFrame[0|0|] AckFrame[15977363,15977361|Δ0] 8.982 loss detection timeout handler running 8.982 Sending probe 0. Current RTT: 33/16. 8.982 Sending probe because peer awaiting address validation 8.982 (Probe is a handshake ping) 8.982 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 9.176/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.982 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 9.175 loss detection timeout handler running Sending probe 1, because no ack since 8.982. Current RTT: 33/16. 9.175 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.175 (Probe is a handshake ping) 9.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.564/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.176 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 9.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.565/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.177 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 9.203 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.409 <- (3) Packet H|2349738|L|761|1 CryptoFrame[0,713] 9.410 - unknown transport parameter 0xff0a001, size 1 9.410 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 9.412 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.800/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.412 -> Packet H|3|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.413 Starting downloading https://server4:443/qiazfytbhh at 45:43.844 on ClientConnection[e8c782c6f5f2bbe2/87d422e6232a9a50(V1) with server4/193.167.100.100:443] 9.412 -> Packet H|4|L|49|1 AckFrame[2349738|Δ0] 9.413 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.801/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.413 -> Packet A|0|S0|40000083e11c58f0|47|1 StreamFrame[0(CIB),0,17,fin] 9.443 <- (4) Packet A|2349730|S0|87d422e6232a9a50|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000999ad82fb5|eae200064d1e8fa480184ffb0c4b8c6e] Padding(25) -< CryptoStream[A|NewSessionTicket] 9.444 State is set to Confirmed reschedule loss detection timer for PTO over 356 millis, based on 9.800/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 9.535/App, because ackElicitingInFlight | RTT:33/16 9.444 Discarding pn space Handshake because HandshakeDone is received 9.444 <- (5) Packet A|2349731|S0|87d422e6232a9a50|48|2 AckFrame[0|Δ0] Padding(15) 9.444 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.445 <- (6) Packet A|2349732|S0|87d422e6232a9a50|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 9.445 Finished downloading https://server4:443/qiazfytbhh at 45:43.877 on ClientConnection[e8c782c6f5f2bbe2/87d422e6232a9a50(V1) with server4/193.167.100.100:443] 9.445 -> Packet A|1|S0|40000083e11c58f0|35|1 AckFrame[2349732-2349730|Δ1] 9.445 Closing ClientConnection[e8c782c6f5f2bbe2/87d422e6232a9a50(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.446 -> Packet A|2|S0|40000083e11c58f0|38|2 ConnectionCloseFrame[0|0|] AckFrame[2349732-2349730|Δ0] 9.446 Creating connection with server4:443 with v1 9.447 Setting up connection for downloading https://server4:443/yhcdhqowpt at 45:43.878 on ClientConnection[df2d45699c43bea3/7cfc13122fe99e7c(V1) with server4/193.167.100.100:443] 9.447 Original destination connection id: df2d45699c43bea3 (scid: 7cfc13122fe99e7c) >- CryptoStream[I|ClientHello] 9.448 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.648/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.448 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.481 <- (1) Packet I|12065203|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 9.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.684/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.581/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.484 Discarding pn space Initial because first Handshake message is being sent 9.485 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.482 <- (2) Packet H|12065203|L|763|1 CryptoFrame[0,714] reschedule loss detection timer for PTO over 96 millis, based on 9.582/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.484 -> Packet I|1|L|1201|2 Token=[] AckFrame[12065203|Δ0] Padding(1150) 9.485 - unknown transport parameter 0xff0a001, size 1 9.485 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 9.487 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.584/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.487 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.487 Starting downloading https://server4:443/yhcdhqowpt at 45:43.919 on ClientConnection[df2d45699c43bea3/7cfc13122fe99e7c(V1) with server4/193.167.100.100:443] 9.487 -> Packet H|1|L|49|1 AckFrame[12065203|Δ0] 9.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.585/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.488 -> Packet A|0|S0|40000058b71cf5b8|47|1 StreamFrame[0(CIB),0,17,fin] 9.517 <- (3) Packet H|12065204|L|49|1 AckFrame[0|Δ0] 9.518 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 9.518 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 9.518 <- (4) Packet A|12065203|S0|7cfc13122fe99e7c|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000045c3e44c23|532c958e950d2a70a7b0e6e5566835bc] Padding(24) -< CryptoStream[A|NewSessionTicket] 9.519 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 9.598/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 9.598/App, because ackElicitingInFlight | RTT:33/13 9.519 Discarding pn space Handshake because HandshakeDone is received 9.538 -> Packet A|1|S0|40000058b71cf5b8|35|1 AckFrame[12065203|Δ19] 9.597 loss detection timeout handler running Sending probe 0, because no ack since 9.488. Current RTT: 33/13. 9.597 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 9.817/App, because ackElicitingInFlight | RTT:33/13 9.597 -> Packet PA|2|S0|40000058b71cf5b8|47|1 StreamFrame[0(CIB),0,17,fin] 9.629 <- (5) Packet A|12065204|S0|7cfc13122fe99e7c|1072|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 9.630 Cwnd(-): 6000; inflight: 0 9.630 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.630 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 97 millis, based on 9.728/App, because ackElicitingInFlight | RTT:33/10 9.630 -> Packet A|3|S0|40000058b71cf5b8|47|1 StreamFrame[0(CIB),0,17,fin] 9.630 Finished downloading https://server4:443/yhcdhqowpt at 45:44.062 on ClientConnection[df2d45699c43bea3/7cfc13122fe99e7c(V1) with server4/193.167.100.100:443] 9.630 Closing ClientConnection[df2d45699c43bea3/7cfc13122fe99e7c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.631 -> Packet A|4|S0|40000058b71cf5b8|38|2 ConnectionCloseFrame[0|0|] AckFrame[12065204|Δ0] 9.631 Creating connection with server4:443 with v1 9.631 Setting up connection for downloading https://server4:443/hqzhsomhqo at 45:44.063 on ClientConnection[afc5028714deaa91/78bb22da74ad9e0e(V1) with server4/193.167.100.100:443] 9.631 Original destination connection id: afc5028714deaa91 (scid: 78bb22da74ad9e0e) >- CryptoStream[I|ClientHello] 9.633 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.833/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.633 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.662 <- (6) Packet A|12065205|S0|7cfc13122fe99e7c|41|1 ConnectionCloseFrame[0|28|Peer closed] 9.667 Discarding packet (762 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 9.776 <- (2) Packet I|4931262|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[0|Δ110] Padding(1053) -< CryptoStream[I|ServerHello] 9.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.979/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 10.205/Handshake, because peerAwaitingAddressValidation | RTT:142/71 9.780 Discarding pn space Initial because first Handshake message is being sent 9.780 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 10.206/Handshake, because peerAwaitingAddressValidation | RTT:142/71 9.776 <- (3) Packet H|4931262|L|762|1 CryptoFrame[0,714] 9.780 -> Packet I|1|L|1201|2 Token=[] AckFrame[4931262|Δ0] Padding(1150) 9.780 - unknown transport parameter 0xff0a001, size 1 9.780 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.783 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.783 Starting downloading https://server4:443/hqzhsomhqo at 45:44.215 on ClientConnection[afc5028714deaa91/78bb22da74ad9e0e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 425 millis, based on 10.209/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:142/71 9.783 -> Packet H|0|L|80|1 CryptoFrame[0,36] 9.783 -> Packet H|1|L|49|1 AckFrame[4931262|Δ0] 9.784 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 425 millis, based on 10.210/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:142/71 9.784 -> Packet A|0|S0|4000004f96146a0e|47|1 StreamFrame[0(CIB),0,17,fin] 9.814 <- (4) Packet H|4931263|L|48|1 AckFrame[0|Δ0] 9.815 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 9.815 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 9.814 <- (5) Packet A|4931260|S0|78bb22da74ad9e0e|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005713fa4134|420de3c792e4a419a49012276c73d9d8] Padding(25) -< CryptoStream[A|NewSessionTicket] 9.815 State is set to Confirmed reschedule loss detection timer for PTO over 445 millis, based on 10.261/App, because ackElicitingInFlight | RTT:128/81 reschedule loss detection timer for PTO over 445 millis, based on 10.261/App, because ackElicitingInFlight | RTT:128/81 9.815 Discarding pn space Handshake because HandshakeDone is received 9.835 -> Packet A|1|S0|4000004f96146a0e|35|1 AckFrame[4931260|Δ19] 9.945 <- (6) Packet A|4931263|S0|78bb22da74ad9e0e|1061|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[1-0|Δ79] 9.946 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.946 Finished downloading https://server4:443/hqzhsomhqo at 45:44.378 on ClientConnection[afc5028714deaa91/78bb22da74ad9e0e(V1) with server4/193.167.100.100:443] 9.946 Closing ClientConnection[afc5028714deaa91/78bb22da74ad9e0e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.947 -> Packet A|2|S0|4000004f96146a0e|38|2 ConnectionCloseFrame[0|0|] AckFrame[4931263|Δ0] 9.947 Creating connection with server4:443 with v1 9.948 Setting up connection for downloading https://server4:443/apswhpsdca at 45:44.379 on ClientConnection[96c691ae0df1121a/64a4c2c8518567b1(V1) with server4/193.167.100.100:443] 9.948 Original destination connection id: 96c691ae0df1121a (scid: 64a4c2c8518567b1) >- CryptoStream[I|ClientHello] 9.949 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.149/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.949 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.977 <- (7) Packet A|4931264|S0|78bb22da74ad9e0e|41|1 ConnectionCloseFrame[0|28|Peer closed] 9.982 <- (1) Packet I|12632029|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 9.986 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.186/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.986 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.083/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.986 Discarding pn space Initial because first Handshake message is being sent 9.986 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.083/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.983 <- (2) Packet H|12632029|L|762|1 CryptoFrame[0,713] 9.986 -> Packet I|1|L|1201|2 Token=[] AckFrame[12632029|Δ0] Padding(1150) 9.986 - unknown transport parameter 0xff0a001, size 1 9.986 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 9.989 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.086/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.988 -> Packet H|0|L|80|1 CryptoFrame[0,36] 9.989 Starting downloading https://server4:443/apswhpsdca at 45:44.420 on ClientConnection[96c691ae0df1121a/64a4c2c8518567b1(V1) with server4/193.167.100.100:443] 9.989 -> Packet H|1|L|49|1 AckFrame[12632029|Δ0] 9.989 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.086/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.989 -> Packet A|0|S0|4000008bbc670a18|47|1 StreamFrame[0(CIB),0,17,fin] 10.019 <- (3) Packet H|12632030|L|49|1 AckFrame[0|Δ0] 10.020 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 10.020 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 10.020 <- (4) Packet A|12632029|S0|64a4c2c8518567b1|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000970a064a24|7f1c9a5c0f8f4be0c5742dd43bef694c] Padding(24) -< CryptoStream[A|NewSessionTicket] 10.021 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 10.099/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 10.099/App, because ackElicitingInFlight | RTT:33/13 10.021 Discarding pn space Handshake because HandshakeDone is received 10.040 -> Packet A|1|S0|4000008bbc670a18|35|1 AckFrame[12632029|Δ19] 10.099 loss detection timeout handler running Sending probe 0, because no ack since 9.989. Current RTT: 33/13. 10.099 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 10.319/App, because ackElicitingInFlight | RTT:33/13 10.099 -> Packet PA|2|S0|4000008bbc670a18|47|1 StreamFrame[0(CIB),0,17,fin] 10.152 <- (5) Packet A|12632032|S0|64a4c2c8518567b1|1061|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[1-0|Δ80] reschedule loss detection timer for PTO over 56 millis, based on 10.209/App, because ackElicitingInFlight | RTT:33/13 10.153 Finished downloading https://server4:443/apswhpsdca at 45:44.584 on ClientConnection[96c691ae0df1121a/64a4c2c8518567b1(V1) with server4/193.167.100.100:443] 10.153 Closing ClientConnection[96c691ae0df1121a/64a4c2c8518567b1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.153 -> Packet A|3|S0|4000008bbc670a18|38|2 ConnectionCloseFrame[0|0|] AckFrame[12632032|Δ0] 10.153 Creating connection with server4:443 with v1 10.154 Setting up connection for downloading https://server4:443/rsbvgqhzpx at 45:44.586 on ClientConnection[4ea2d194848414eb/6ee07bfc63f3a54b(V1) with server4/193.167.100.100:443] 10.154 Original destination connection id: 4ea2d194848414eb (scid: 6ee07bfc63f3a54b) >- CryptoStream[I|ClientHello] 10.155 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.355/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.155 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.184 <- (6) Packet A|12632033|S0|64a4c2c8518567b1|41|1 ConnectionCloseFrame[0|28|Peer closed] 10.355 loss detection timeout handler running Sending probe 0, because no ack since 10.155. Current RTT: 100/25. 10.355 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.355 (Probe is an initial retransmit) 10.355 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.755/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.355 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.389 <- (1) Packet I|10894968|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[1|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 10.392 probe count not reset on ack because handshake not yet confirmed 10.392 Retransmitting CryptoFrame[0,257] on level Initial 10.392 Cwnd(-): 6000; inflight: 0 10.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 10.792/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.489/Handshake, because peerAwaitingAddressValidation | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 10.489/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.392 Discarding pn space Initial because first Handshake message is being sent 10.392 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.392 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[10894968|Δ0] Padding(1150) 10.389 <- (2) Packet H|10894968|L|762|1 CryptoFrame[0,713] 10.393 - unknown transport parameter 0xff0a001, size 1 10.393 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 10.395 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.492/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.395 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.395 Starting downloading https://server4:443/rsbvgqhzpx at 45:44.827 on ClientConnection[4ea2d194848414eb/6ee07bfc63f3a54b(V1) with server4/193.167.100.100:443] 10.395 -> Packet H|1|L|49|1 AckFrame[10894968|Δ0] 10.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.493/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.396 -> Packet A|0|S0|400000d7fc8f59e2|47|1 StreamFrame[0(CIB),0,17,fin] 10.492 loss detection timeout handler running Sending probe 0, because no ack since 10.395. Current RTT: 33/16. 10.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.492 (Probe is a handshake retransmit) 10.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.686/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.492 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.523 <- (3) Packet H|10894969|L|46|1 AckFrame[2-1|Δ0] 10.524 probe count not reset on ack because handshake not yet confirmed 10.524 Retransmitting CryptoFrame[0,36] on level Handshake 10.524 Cwnd(-): 3000; inflight: 47 10.524 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 10.524 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 10.524 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 169 millis, based on 10.694/Handshake, because ackElicitingInFlight | RTT:33/13 10.524 -> Packet H|3|L|80|1 CryptoFrame[0,36] 10.523 <- (4) Packet A|10894968|S0|6ee07bfc63f3a54b|336|5 CryptoFrame[0,250] AckFrame[0|Δ97] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c0580522e5|18e57336ac4b86aeb26da3fb1e013e4c] Padding(18) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 84 millis, based on 10.609/Handshake, because ackElicitingInFlight | RTT:33/13 10.525 State is set to Confirmed reschedule loss detection timer for PTO over 148 millis, based on 10.674/Handshake, because ackElicitingInFlight | RTT:42/27 10.525 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.525 Discarding pn space Handshake because HandshakeDone is received 10.524 <- (5) Packet A|10894969|S0|6ee07bfc63f3a54b|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 10.526 -> Packet A|1|S0|400000d7fc8f59e2|34|1 AckFrame[10894969-10894968|Δ0] 10.526 Finished downloading https://server4:443/rsbvgqhzpx at 45:44.957 on ClientConnection[4ea2d194848414eb/6ee07bfc63f3a54b(V1) with server4/193.167.100.100:443] 10.526 Closing ClientConnection[4ea2d194848414eb/6ee07bfc63f3a54b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.526 -> Packet A|2|S0|400000d7fc8f59e2|38|2 ConnectionCloseFrame[0|0|] AckFrame[10894969-10894968|Δ0] 10.527 Creating connection with server4:443 with v1 10.527 Setting up connection for downloading https://server4:443/vqowzeehum at 45:44.959 on ClientConnection[d6bdea22634162f3/b047e1a665bfede6(V1) with server4/193.167.100.100:443] 10.527 Original destination connection id: d6bdea22634162f3 (scid: b047e1a665bfede6) >- CryptoStream[I|ClientHello] 10.529 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.729/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.529 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.555 Discarding packet (46 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 10.562 <- (1) Packet I|879832|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 10.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.765/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.663/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.566 Discarding pn space Initial because first Handshake message is being sent 10.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.663/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.566 -> Packet I|1|L|1201|2 Token=[] AckFrame[879832|Δ0] Padding(1150) 10.563 <- (2) Packet H|879832|L|761|1 CryptoFrame[0,713] 10.566 - unknown transport parameter 0xff0a001, size 1 10.566 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 10.569 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.666/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.569 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.570 Starting downloading https://server4:443/vqowzeehum at 45:45.001 on ClientConnection[d6bdea22634162f3/b047e1a665bfede6(V1) with server4/193.167.100.100:443] 10.570 -> Packet H|1|L|49|1 AckFrame[879832|Δ0] 10.570 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.667/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.570 -> Packet A|0|S0|40000051dd667e05|47|1 StreamFrame[0(CIB),0,17,fin] 10.644 <- (7) Packet A|10894971|S0|6ee07bfc63f3a54b|321|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c0580522e5|18e57336ac4b86aeb26da3fb1e013e4c] Padding(1) AckFrame[0|Δ217] 10.645 <- (8) Packet A|10894972|S0|6ee07bfc63f3a54b|321|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c0580522e5|18e57336ac4b86aeb26da3fb1e013e4c] Padding(1) AckFrame[0|Δ217] 10.645 -> Packet A|3|S0|400000d7fc8f59e2|38|2 ConnectionCloseFrame[0|0|] AckFrame[10894969-10894968|Δ0] 10.646 -> Packet A|4|S0|400000d7fc8f59e2|38|2 ConnectionCloseFrame[0|0|] AckFrame[10894969-10894968|Δ0] 10.666 loss detection timeout handler running Sending probe 0, because no ack since 10.569. Current RTT: 33/16. 10.666 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.666 (Probe is a handshake retransmit) 10.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.861/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.667 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.676 <- (9) Packet A|10894973|S0|6ee07bfc63f3a54b|44|1 ConnectionCloseFrame[0|28|Peer closed] 10.701 <- (3) Packet A|879835|S0|b047e1a665bfede6|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005f9de49b2a|89d8eb3a090e69c4deb14ef1d917e083] Padding(1) -< CryptoStream[A|NewSessionTicket] 10.702 State is set to Confirmed reschedule loss detection timer for PTO over 111 millis, based on 10.814/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -10 millis, based on 10.692/App, because ackElicitingInFlight | RTT:33/16 10.702 Discarding pn space Handshake because HandshakeDone is received 10.702 loss detection timeout handler running Sending probe 0, because no ack since 10.570. Current RTT: 33/16. 10.702 (Probe is retransmit on level App) 10.702 <- (4) Packet A|879836|S0|b047e1a665bfede6|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005f9de49b2a|89d8eb3a090e69c4deb14ef1d917e083] Padding(1) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 10.947/App, because ackElicitingInFlight | RTT:33/16 10.703 -> Packet PA|1|S0|40000051dd667e05|55|2 AckFrame[879836-879835|Δ0] StreamFrame[0(CIB),0,17,fin] 10.735 <- (5) Packet A|879837|S0|b047e1a665bfede6|1072|3 AckFrame[1-0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 10.735 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.736 Finished downloading https://server4:443/vqowzeehum at 45:45.167 on ClientConnection[d6bdea22634162f3/b047e1a665bfede6(V1) with server4/193.167.100.100:443] 10.736 Closing ClientConnection[d6bdea22634162f3/b047e1a665bfede6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.736 -> Packet A|2|S0|40000051dd667e05|38|2 ConnectionCloseFrame[0|0|] AckFrame[879837|Δ0] 10.736 Creating connection with server4:443 with v1 10.737 Setting up connection for downloading https://server4:443/gvxgljqfgv at 45:45.169 on ClientConnection[93465c71bba87c9a/e08c1a4009790893(V1) with server4/193.167.100.100:443] 10.737 Original destination connection id: 93465c71bba87c9a (scid: e08c1a4009790893) >- CryptoStream[I|ClientHello] 10.739 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.939/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.739 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.767 <- (6) Packet A|879838|S0|b047e1a665bfede6|41|1 ConnectionCloseFrame[0|28|Peer closed] 10.772 <- (1) Packet I|12898135|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 10.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.975/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.872/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.775 Discarding pn space Initial because first Handshake message is being sent 10.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.872/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.773 <- (2) Packet H|12898135|L|763|1 CryptoFrame[0,714] 10.775 -> Packet I|1|L|1201|2 Token=[] AckFrame[12898135|Δ0] Padding(1150) 10.776 - unknown transport parameter 0xff0a001, size 1 10.776 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 10.778 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.875/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.778 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.778 Starting downloading https://server4:443/gvxgljqfgv at 45:45.210 on ClientConnection[93465c71bba87c9a/e08c1a4009790893(V1) with server4/193.167.100.100:443] 10.778 -> Packet H|1|L|49|1 AckFrame[12898135|Δ0] 10.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.876/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.779 -> Packet A|0|S0|4000005d8dd4f3db|47|1 StreamFrame[0(CIB),0,17,fin] 10.809 <- (3) Packet A|12898135|S0|e08c1a4009790893|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005eaca1bf99|b079c7f23cceccf8f3ee3aa39f9f9c17] Padding(24) -< CryptoStream[A|NewSessionTicket] 10.810 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 10.875/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 10.901/App, because ackElicitingInFlight | RTT:33/16 10.810 Discarding pn space Handshake because HandshakeDone is received 10.810 <- (4) Packet A|12898136|S0|e08c1a4009790893|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 10.811 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.811 Finished downloading https://server4:443/gvxgljqfgv at 45:45.243 on ClientConnection[93465c71bba87c9a/e08c1a4009790893(V1) with server4/193.167.100.100:443] 10.811 -> Packet A|1|S0|4000005d8dd4f3db|35|1 AckFrame[12898136-12898135|Δ1] 10.811 Closing ClientConnection[93465c71bba87c9a/e08c1a4009790893(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.812 Creating connection with server4:443 with v1 10.812 -> Packet A|2|S0|4000005d8dd4f3db|38|2 ConnectionCloseFrame[0|0|] AckFrame[12898136-12898135|Δ0] 10.813 Setting up connection for downloading https://server4:443/kjsnjlbkwm at 45:45.244 on ClientConnection[04b7294582bb60b2/b5fba049d193a90b(V1) with server4/193.167.100.100:443] 10.813 Original destination connection id: 04b7294582bb60b2 (scid: b5fba049d193a90b) >- CryptoStream[I|ClientHello] 10.814 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.014/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.814 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.848 <- (1) Packet I|10709302|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 10.851 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.051/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.852 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.949/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.852 Discarding pn space Initial because first Handshake message is being sent 10.852 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.949/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.852 -> Packet I|1|L|1201|2 Token=[] AckFrame[10709302|Δ0] Padding(1150) 10.848 <- (2) Packet H|10709302|L|763|1 CryptoFrame[0,714] 10.852 - unknown transport parameter 0xff0a001, size 1 10.852 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 10.855 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.952/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.855 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.855 Starting downloading https://server4:443/kjsnjlbkwm at 45:45.287 on ClientConnection[04b7294582bb60b2/b5fba049d193a90b(V1) with server4/193.167.100.100:443] 10.855 -> Packet H|1|L|49|1 AckFrame[10709302|Δ0] 10.856 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.953/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.855 -> Packet A|0|S0|40000092c995d973|47|1 StreamFrame[0(CIB),0,17,fin] 10.886 <- (3) Packet A|10709302|S0|b5fba049d193a90b|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000084be87fda3|49c272604af41feec23ea9f720a1514f] Padding(24) -< CryptoStream[A|NewSessionTicket] 10.886 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 10.952/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 10.977/App, because ackElicitingInFlight | RTT:33/16 10.887 Discarding pn space Handshake because HandshakeDone is received 10.887 <- (4) Packet A|10709303|S0|b5fba049d193a90b|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 10.887 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.888 -> Packet A|1|S0|40000092c995d973|34|1 AckFrame[10709303-10709302|Δ0] 10.888 Finished downloading https://server4:443/kjsnjlbkwm at 45:45.319 on ClientConnection[04b7294582bb60b2/b5fba049d193a90b(V1) with server4/193.167.100.100:443] 10.888 Closing ClientConnection[04b7294582bb60b2/b5fba049d193a90b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.888 -> Packet A|2|S0|40000092c995d973|38|2 ConnectionCloseFrame[0|0|] AckFrame[10709303-10709302|Δ0] 10.888 Creating connection with server4:443 with v1 10.889 Setting up connection for downloading https://server4:443/mappdviydd at 45:45.321 on ClientConnection[9d839e3a06eeef0b/cd39c85a4b53b6b3(V1) with server4/193.167.100.100:443] 10.889 Original destination connection id: 9d839e3a06eeef0b (scid: cd39c85a4b53b6b3) >- CryptoStream[I|ClientHello] 10.891 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.091/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.891 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.924 <- (1) Packet I|13826892|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 10.928 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.128/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.928 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.025/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.928 Discarding pn space Initial because first Handshake message is being sent 10.929 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.026/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.929 -> Packet I|1|L|1201|2 Token=[] AckFrame[13826892|Δ0] Padding(1150) 11.025 loss detection timeout handler running 11.025 Sending probe 0. Current RTT: 33/16. 11.025 Sending probe because peer awaiting address validation 11.025 (Probe is a handshake ping) 11.026 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.220/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.025 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 11.219 loss detection timeout handler running Sending probe 1, because no ack since 11.025. Current RTT: 33/16. 11.219 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.219 (Probe is a handshake ping) 11.219 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 11.607/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.219 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 11.220 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 11.608/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.220 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 11.276 <- (2) Packet H|13826896|L|50|1 AckFrame[2-0|Δ25] 11.277 probe count not reset on ack because handshake not yet confirmed 11.277 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.487 <- (3) Packet H|13826898|L|762|1 CryptoFrame[0,713] 11.488 - unknown transport parameter 0xff0a001, size 1 11.488 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 431 millis, based on 11.922/Handshake, because ackElicitingInFlight | RTT:36/18 11.490 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[13826896|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.490 Starting downloading https://server4:443/mappdviydd at 45:45.922 on ClientConnection[9d839e3a06eeef0b/cd39c85a4b53b6b3(V1) with server4/193.167.100.100:443] 11.490 -> Packet H|4|L|51|1 AckFrame[13826898,13826896|Δ0] 11.491 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 430 millis, based on 11.922/Handshake, because ackElicitingInFlight | RTT:36/18 11.491 -> Packet A|0|S0|400000cd4c9e61d0|47|1 StreamFrame[0(CIB),0,17,fin] 11.921 loss detection timeout handler running Sending probe 2, because no ack since 11.490. Current RTT: 36/18. 11.921 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 11.921 (Probe is a handshake retransmit) 11.922 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 863 millis, based on 12.786/Handshake, because ackElicitingInFlight | RTT:36/18 11.922 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 11.923 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 863 millis, based on 12.787/Handshake, because ackElicitingInFlight | RTT:36/18 11.923 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 11.954 <- (4) Packet H|13826899|L|51|1 AckFrame[6,2-0|Δ0] 11.954 Retransmitting CryptoFrame[0,36] on level Handshake 11.954 Cwnd(-): 6000; inflight: 127 11.955 -> Packet H|7|L|91|2 CryptoFrame[0,36] AckFrame[13826898,13826896|Δ0] 11.954 <- (5) Packet A|13826892|S0|cd39c85a4b53b6b3|336|5 CryptoFrame[0,250] AckFrame[0|Δ432] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000d9054fd4a6|c3049d6752cd97a6f56df7e691e17729] Padding(16) -< CryptoStream[A|NewSessionTicket] 11.955 State is set to Confirmed 11.955 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.955 Discarding pn space Handshake because HandshakeDone is received 11.975 -> Packet A|1|S0|400000cd4c9e61d0|35|1 AckFrame[13826892|Δ19] 11.986 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 12.578 <- (7) Packet A|13826896|S0|cd39c85a4b53b6b3|321|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000d9054fd4a6|c3049d6752cd97a6f56df7e691e17729] Padding(1) AckFrame[0|Δ1055] -< CryptoStream[A|NewSessionTicket] 12.579 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.598 -> Packet A|2|S0|400000cd4c9e61d0|37|1 AckFrame[13826896,13826892|Δ19] 13.799 <- (8) Packet A|13826898|S0|cd39c85a4b53b6b3|321|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000d9054fd4a6|c3049d6752cd97a6f56df7e691e17729] Padding(1) AckFrame[0|Δ2277] -< CryptoStream[A|NewSessionTicket] 13.800 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.799 <- (9) Packet A|13826899|S0|cd39c85a4b53b6b3|321|5 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000d9054fd4a6|c3049d6752cd97a6f56df7e691e17729] Padding(1) AckFrame[0|Δ2277] -< CryptoStream[A|NewSessionTicket] 13.801 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.801 -> Packet A|3|S0|400000cd4c9e61d0|38|1 AckFrame[13826899-13826898,13826896,13826892|Δ0] 13.832 <- (10) Packet A|13826900|S0|cd39c85a4b53b6b3|1072|3 AckFrame[3|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 13.833 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.833 Finished downloading https://server4:443/mappdviydd at 45:48.265 on ClientConnection[9d839e3a06eeef0b/cd39c85a4b53b6b3(V1) with server4/193.167.100.100:443] 13.833 Closing ClientConnection[9d839e3a06eeef0b/cd39c85a4b53b6b3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.834 -> Packet A|4|S0|400000cd4c9e61d0|38|2 ConnectionCloseFrame[0|0|] AckFrame[13826900|Δ0] 13.834 Creating connection with server4:443 with v1 13.834 Setting up connection for downloading https://server4:443/xwmuedeldp at 45:48.266 on ClientConnection[7d4e158d3ed24acf/74fc7cc7222ca158(V1) with server4/193.167.100.100:443] 13.835 Original destination connection id: 7d4e158d3ed24acf (scid: 74fc7cc7222ca158) >- CryptoStream[I|ClientHello] 13.836 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.036/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.836 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.035 loss detection timeout handler running Sending probe 0, because no ack since 13.836. Current RTT: 100/25. 14.035 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.036 (Probe is an initial retransmit) 14.036 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.436/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.036 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.435 loss detection timeout handler running Sending probe 1, because no ack since 14.036. Current RTT: 100/25. 14.435 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.435 (Probe is an initial retransmit) 14.436 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.236/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.436 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.437 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.237/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.437 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.579 <- (1) Packet I|10793036|L|1232|2 Token=[] AckFrame[3-2|Δ109] Padding(1180) 14.580 probe count not reset on ack because handshake not yet confirmed 14.580 Retransmitting CryptoFrame[0,257] on level Initial 14.580 Cwnd(-): 6000; inflight: 0 14.580 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.380/Initial, because peerAwaitingAddressValidation | RTT:100/25 14.580 Discarding packet (762 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 14.580 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1703 millis, based on 16.284/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:142/71 14.580 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.794 Discarding packet (762 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 15.204 <- (4) Packet I|10793040|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[4-2|Δ591] Padding(1050) -< CryptoStream[I|ServerHello] 15.207 probe count not reset on ack because handshake not yet confirmed 15.207 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1703 millis, based on 16.911/Handshake, because peerAwaitingAddressValidation | RTT:142/71 15.207 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 897 millis, based on 16.106/Handshake, because peerAwaitingAddressValidation | RTT:202/174 15.208 Discarding pn space Initial because first Handshake message is being sent 15.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 897 millis, based on 16.106/Handshake, because peerAwaitingAddressValidation | RTT:202/174 15.205 <- (5) Packet H|10793040|L|762|1 CryptoFrame[0,713] 15.208 -> Packet I|5|L|1201|2 Token=[] AckFrame[10793040,10793036|Δ0] Padding(1148) 15.208 - unknown transport parameter 0xff0a001, size 1 15.208 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 15.211 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 897 millis, based on 16.109/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:202/174 15.211 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.211 Starting downloading https://server4:443/xwmuedeldp at 45:49.643 on ClientConnection[7d4e158d3ed24acf/74fc7cc7222ca158(V1) with server4/193.167.100.100:443] 15.211 -> Packet H|1|L|49|1 AckFrame[10793040|Δ0] 15.212 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 897 millis, based on 16.110/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:202/174 15.211 -> Packet A|0|S0|4000009667e7e869|47|1 StreamFrame[0(CIB),0,17,fin] 15.242 <- (6) Packet A|10793034|S0|74fc7cc7222ca158|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000008a43d7814d|e2c71c0ab402de9cb38cb6b1413b72a7] Padding(24) -< CryptoStream[A|NewSessionTicket] 15.242 State is set to Confirmed reschedule loss detection timer for PTO over 866 millis, based on 16.109/Handshake, because ackElicitingInFlight | RTT:202/174 reschedule loss detection timer for PTO over 891 millis, based on 16.134/App, because ackElicitingInFlight | RTT:202/174 15.243 Discarding pn space Handshake because HandshakeDone is received 15.242 <- (7) Packet A|10793035|S0|74fc7cc7222ca158|48|2 AckFrame[0|Δ0] Padding(14) 15.243 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.243 <- (8) Packet A|10793036|S0|74fc7cc7222ca158|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 15.243 -> Packet A|1|S0|4000009667e7e869|34|1 AckFrame[10793036-10793034|Δ0] 15.244 Finished downloading https://server4:443/xwmuedeldp at 45:49.675 on ClientConnection[7d4e158d3ed24acf/74fc7cc7222ca158(V1) with server4/193.167.100.100:443] 15.244 Closing ClientConnection[7d4e158d3ed24acf/74fc7cc7222ca158(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.244 -> Packet A|2|S0|4000009667e7e869|38|2 ConnectionCloseFrame[0|0|] AckFrame[10793036-10793034|Δ0] 15.244 Creating connection with server4:443 with v1 15.245 Setting up connection for downloading https://server4:443/lllrekohoj at 45:49.676 on ClientConnection[dac8c93b7ee44988/ef101a8796a85a2b(V1) with server4/193.167.100.100:443] 15.245 Original destination connection id: dac8c93b7ee44988 (scid: ef101a8796a85a2b) >- CryptoStream[I|ClientHello] 15.246 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.446/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.246 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.275 <- (9) Packet A|10793037|S0|74fc7cc7222ca158|41|1 ConnectionCloseFrame[0|28|Peer closed] 15.279 <- (1) Packet I|4096784|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 15.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.482/Handshake, because peerAwaitingAddressValidation | RTT:100/25 15.283 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.380/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.283 Discarding pn space Initial because first Handshake message is being sent 15.283 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.380/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.283 -> Packet I|1|L|1201|2 Token=[] AckFrame[4096784|Δ0] Padding(1150) 15.379 loss detection timeout handler running 15.379 Sending probe 0. Current RTT: 33/16. 15.379 Sending probe because peer awaiting address validation 15.379 (Probe is a handshake ping) 15.380 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.379 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 15.390 <- (2) Packet H|4096786|L|762|1 CryptoFrame[0,714] 15.390 - unknown transport parameter 0xff0a001, size 1 15.390 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 15.393 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.587/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.393 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.393 Starting downloading https://server4:443/lllrekohoj at 45:49.825 on ClientConnection[dac8c93b7ee44988/ef101a8796a85a2b(V1) with server4/193.167.100.100:443] 15.393 -> Packet H|2|L|49|1 AckFrame[4096786|Δ0] 15.394 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.588/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.394 -> Packet A|0|S0|4000000cc4d5e537|47|1 StreamFrame[0(CIB),0,17,fin] 15.424 <- (3) Packet H|4096787|L|48|1 AckFrame[1|Δ0] 15.424 probe count not reset on ack because handshake not yet confirmed 15.424 Cwnd(-): 6000; inflight: 47 15.425 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.425 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 15.424 <- (4) Packet A|4096784|S0|ef101a8796a85a2b|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000000c9860d59e|0a131f65755c778b5795b7ebbd86dd41] Padding(25) -< CryptoStream[A|NewSessionTicket] 15.425 State is set to Confirmed reschedule loss detection timer for PTO over 188 millis, based on 15.614/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 15.504/App, because ackElicitingInFlight | RTT:33/13 15.425 Discarding pn space Handshake because HandshakeDone is received 15.425 <- (5) Packet A|4096785|S0|ef101a8796a85a2b|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 15.426 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.426 Finished downloading https://server4:443/lllrekohoj at 45:49.858 on ClientConnection[dac8c93b7ee44988/ef101a8796a85a2b(V1) with server4/193.167.100.100:443] 15.426 Closing ClientConnection[dac8c93b7ee44988/ef101a8796a85a2b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.426 -> Packet A|1|S0|4000000cc4d5e537|34|1 AckFrame[4096785-4096784|Δ0] 15.427 -> Packet A|2|S0|4000000cc4d5e537|38|2 ConnectionCloseFrame[0|0|] AckFrame[4096785-4096784|Δ0] 15.427 Creating connection with server4:443 with v1 15.427 Setting up connection for downloading https://server4:443/aawjjdigbz at 45:49.859 on ClientConnection[f8f5d4bee52e7b3b/8c2daf3337210d43(V1) with server4/193.167.100.100:443] 15.428 Original destination connection id: f8f5d4bee52e7b3b (scid: 8c2daf3337210d43) >- CryptoStream[I|ClientHello] 15.429 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.629/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.429 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.452 <- (11) Packet A|13826904|S0|cd39c85a4b53b6b3|1063|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[3|Δ1620] 15.453 -> Packet A|5|S0|400000cd4c9e61d0|38|2 ConnectionCloseFrame[0|0|] AckFrame[13826900|Δ0] 15.457 <- (6) Packet A|4096786|S0|ef101a8796a85a2b|41|1 ConnectionCloseFrame[0|28|Peer closed] 15.462 <- (1) Packet I|11553058|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 15.465 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.665/Handshake, because peerAwaitingAddressValidation | RTT:100/25 15.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.563/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.466 Discarding pn space Initial because first Handshake message is being sent 15.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.563/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.463 <- (2) Packet H|11553058|L|762|1 CryptoFrame[0,713] 15.466 -> Packet I|1|L|1201|2 Token=[] AckFrame[11553058|Δ0] Padding(1150) 15.466 - unknown transport parameter 0xff0a001, size 1 15.466 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 15.468 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 15.565/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.468 -> Packet H|0|L|80|1 CryptoFrame[0,36] 15.469 -> Packet H|1|L|49|1 AckFrame[11553058|Δ0] 15.469 Starting downloading https://server4:443/aawjjdigbz at 45:49.901 on ClientConnection[f8f5d4bee52e7b3b/8c2daf3337210d43(V1) with server4/193.167.100.100:443] 15.470 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.567/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.469 -> Packet A|0|S0|40000004794eb556|47|1 StreamFrame[0(CIB),0,17,fin] 15.566 loss detection timeout handler running Sending probe 0, because no ack since 15.468. Current RTT: 33/16. 15.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.566 (Probe is a handshake retransmit) 15.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.760/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.566 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 15.597 <- (3) Packet H|11553059|L|46|1 AckFrame[2-1|Δ0] 15.598 probe count not reset on ack because handshake not yet confirmed 15.598 Retransmitting CryptoFrame[0,36] on level Handshake 15.598 Cwnd(-): 6000; inflight: 47 15.598 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.598 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 15.598 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 169 millis, based on 15.768/Handshake, because ackElicitingInFlight | RTT:33/13 15.598 -> Packet H|3|L|80|1 CryptoFrame[0,36] 15.597 <- (4) Packet A|11553058|S0|8c2daf3337210d43|336|5 CryptoFrame[0,250] AckFrame[0|Δ97] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000003c21828cd|1156db3af2e7af4bc5c580eff88074c8] Padding(18) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 84 millis, based on 15.683/Handshake, because ackElicitingInFlight | RTT:33/13 15.599 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 15.748/Handshake, because ackElicitingInFlight | RTT:42/27 15.599 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.599 Discarding pn space Handshake because HandshakeDone is received 15.598 <- (5) Packet A|11553059|S0|8c2daf3337210d43|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 15.599 -> Packet A|1|S0|40000004794eb556|34|1 AckFrame[11553059-11553058|Δ0] 15.600 Finished downloading https://server4:443/aawjjdigbz at 45:50.031 on ClientConnection[f8f5d4bee52e7b3b/8c2daf3337210d43(V1) with server4/193.167.100.100:443] 15.600 Closing ClientConnection[f8f5d4bee52e7b3b/8c2daf3337210d43(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.600 -> Packet A|2|S0|40000004794eb556|38|2 ConnectionCloseFrame[0|0|] AckFrame[11553059-11553058|Δ0] 15.600 Creating connection with server4:443 with v1 15.601 Setting up connection for downloading https://server4:443/wbakrgmfjq at 45:50.032 on ClientConnection[caa676d62b580def/6208a948fd5636ed(V1) with server4/193.167.100.100:443] 15.601 Original destination connection id: caa676d62b580def (scid: 6208a948fd5636ed) >- CryptoStream[I|ClientHello] 15.602 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.802/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.602 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.631 <- (6) Packet A|11553060|S0|8c2daf3337210d43|41|1 ConnectionCloseFrame[0|28|Peer closed] 15.636 <- (1) Packet I|6666195|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 15.638 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.838/Handshake, because peerAwaitingAddressValidation | RTT:100/25 15.638 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.736/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.639 Discarding pn space Initial because first Handshake message is being sent 15.639 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.736/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.639 -> Packet I|1|L|1201|2 Token=[] AckFrame[6666195|Δ0] Padding(1150) 15.735 loss detection timeout handler running 15.735 Sending probe 0. Current RTT: 33/16. 15.735 Sending probe because peer awaiting address validation 15.735 (Probe is a handshake ping) 15.736 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.930/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.735 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 15.929 loss detection timeout handler running Sending probe 1, because no ack since 15.735. Current RTT: 33/16. 15.929 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.929 (Probe is a handshake ping) 15.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.318/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.929 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 15.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.318/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.930 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 15.977 <- (2) Packet H|6666199|L|49|1 AckFrame[2-0|Δ16] 15.978 probe count not reset on ack because handshake not yet confirmed 15.978 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.188 <- (3) Packet H|6666201|L|761|1 CryptoFrame[0,713] 16.189 - unknown transport parameter 0xff0a001, size 1 16.189 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 379 millis, based on 16.571/Handshake, because ackElicitingInFlight | RTT:35/15 16.191 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[6666199|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.192 Starting downloading https://server4:443/wbakrgmfjq at 45:50.624 on ClientConnection[caa676d62b580def/6208a948fd5636ed(V1) with server4/193.167.100.100:443] 16.192 -> Packet H|4|L|51|1 AckFrame[6666201,6666199|Δ0] 16.193 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 378 millis, based on 16.571/Handshake, because ackElicitingInFlight | RTT:35/15 16.193 -> Packet A|0|S0|400000df0fa4acf7|47|1 StreamFrame[0(CIB),0,17,fin] 16.223 <- (4) Packet A|6666195|S0|6208a948fd5636ed|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000ce68055627|e1a4f8b4f1a03df2d4ef21219d488cfc] Padding(25) -< CryptoStream[A|NewSessionTicket] 16.223 State is set to Confirmed reschedule loss detection timer for PTO over 347 millis, based on 16.571/Handshake, because ackElicitingInFlight | RTT:35/15 reschedule loss detection timer for PTO over 88 millis, based on 16.313/App, because ackElicitingInFlight | RTT:35/15 16.224 Discarding pn space Handshake because HandshakeDone is received 16.223 <- (5) Packet A|6666196|S0|6208a948fd5636ed|48|2 AckFrame[0|Δ0] Padding(15) 16.224 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.243 -> Packet A|1|S0|400000df0fa4acf7|35|1 AckFrame[6666196-6666195|Δ19] 16.497 <- (6) Packet A|6666202|S0|6208a948fd5636ed|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 16.498 Finished downloading https://server4:443/wbakrgmfjq at 45:50.930 on ClientConnection[caa676d62b580def/6208a948fd5636ed(V1) with server4/193.167.100.100:443] 16.498 Closing ClientConnection[caa676d62b580def/6208a948fd5636ed(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.498 -> Packet A|2|S0|400000df0fa4acf7|40|2 ConnectionCloseFrame[0|0|] AckFrame[6666202,6666196-6666195|Δ0] 16.499 Creating connection with server4:443 with v1 16.499 Setting up connection for downloading https://server4:443/ovyhcqmlum at 45:50.931 on ClientConnection[f3ec4ef9afbb17ee/3196900f0d64f1bc(V1) with server4/193.167.100.100:443] 16.499 Original destination connection id: f3ec4ef9afbb17ee (scid: 3196900f0d64f1bc) >- CryptoStream[I|ClientHello] 16.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.700/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.500 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.529 <- (7) Packet A|6666203|S0|6208a948fd5636ed|41|1 ConnectionCloseFrame[0|28|Peer closed] 16.534 <- (1) Packet I|12684419|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 16.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.737/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.634/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.537 Discarding pn space Initial because first Handshake message is being sent 16.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.634/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.534 <- (2) Packet H|12684419|L|761|1 CryptoFrame[0,712] 16.537 -> Packet I|1|L|1201|2 Token=[] AckFrame[12684419|Δ0] Padding(1150) 16.537 - unknown transport parameter 0xff0a001, size 1 16.537 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 16.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.637/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.539 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.540 Starting downloading https://server4:443/ovyhcqmlum at 45:50.971 on ClientConnection[f3ec4ef9afbb17ee/3196900f0d64f1bc(V1) with server4/193.167.100.100:443] 16.540 -> Packet H|1|L|49|1 AckFrame[12684419|Δ0] 16.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.637/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.540 -> Packet A|0|S0|4000009859dffe3f|47|1 StreamFrame[0(CIB),0,17,fin] 16.570 <- (3) Packet H|12684420|L|49|1 AckFrame[0|Δ0] 16.571 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 16.571 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 16.571 <- (4) Packet A|12684419|S0|3196900f0d64f1bc|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000947ebc0486|53c9dabf13cb6a965b0207ef2f238112] Padding(24) -< CryptoStream[A|NewSessionTicket] 16.571 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 16.650/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 16.650/App, because ackElicitingInFlight | RTT:33/13 16.572 Discarding pn space Handshake because HandshakeDone is received 16.591 -> Packet A|1|S0|4000009859dffe3f|35|1 AckFrame[12684419|Δ19] 16.650 loss detection timeout handler running Sending probe 0, because no ack since 16.540. Current RTT: 33/13. 16.650 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 16.870/App, because ackElicitingInFlight | RTT:33/13 16.650 -> Packet PA|2|S0|4000009859dffe3f|47|1 StreamFrame[0(CIB),0,17,fin] 16.682 <- (5) Packet A|12684420|S0|3196900f0d64f1bc|1072|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 16.683 Cwnd(-): 6000; inflight: 0 16.683 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.683 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 97 millis, based on 16.781/App, because ackElicitingInFlight | RTT:33/10 16.683 -> Packet A|3|S0|4000009859dffe3f|47|1 StreamFrame[0(CIB),0,17,fin] 16.683 Finished downloading https://server4:443/ovyhcqmlum at 45:51.115 on ClientConnection[f3ec4ef9afbb17ee/3196900f0d64f1bc(V1) with server4/193.167.100.100:443] 16.683 Closing ClientConnection[f3ec4ef9afbb17ee/3196900f0d64f1bc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.684 Creating connection with server4:443 with v1 16.684 -> Packet A|4|S0|4000009859dffe3f|38|2 ConnectionCloseFrame[0|0|] AckFrame[12684420|Δ0] 16.685 Setting up connection for downloading https://server4:443/eknjlaplrn at 45:51.116 on ClientConnection[7bb5b62c0879cc35/5c668794cfe0c6eb(V1) with server4/193.167.100.100:443] 16.685 Original destination connection id: 7bb5b62c0879cc35 (scid: 5c668794cfe0c6eb) >- CryptoStream[I|ClientHello] 16.686 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.886/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.686 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.720 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 16.734 <- (6) Packet A|12684421|S0|3196900f0d64f1bc|48|2 AckFrame[3-1|Δ20] Padding(16) 16.734 -> Packet A|5|S0|4000009859dffe3f|38|2 ConnectionCloseFrame[0|0|] AckFrame[12684420|Δ0] 16.830 <- (2) Packet I|3707775|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[0|Δ110] Padding(1053) -< CryptoStream[I|ServerHello] 16.833 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.033/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.833 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 17.260/Handshake, because peerAwaitingAddressValidation | RTT:143/71 16.833 Discarding pn space Initial because first Handshake message is being sent 16.833 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 17.260/Handshake, because peerAwaitingAddressValidation | RTT:143/71 16.833 -> Packet I|1|L|1201|2 Token=[] AckFrame[3707775|Δ0] Padding(1150) 17.166 <- (3) Packet H|3707779|L|761|1 CryptoFrame[0,713] 17.167 - unknown transport parameter 0xff0a001, size 1 17.167 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 17.169 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 17.596/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.169 -> Packet H|0|L|80|1 CryptoFrame[0,36] 17.170 Starting downloading https://server4:443/eknjlaplrn at 45:51.601 on ClientConnection[7bb5b62c0879cc35/5c668794cfe0c6eb(V1) with server4/193.167.100.100:443] 17.170 -> Packet H|1|L|49|1 AckFrame[3707779|Δ0] 17.170 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 17.597/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 17.170 -> Packet A|0|S0|400000c57dbd5782|47|1 StreamFrame[0(CIB),0,17,fin] 17.202 <- (4) Packet A|3707774|S0|5c668794cfe0c6eb|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 17.202 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 17.629/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 17.203 Finished downloading https://server4:443/eknjlaplrn at 45:51.634 on ClientConnection[7bb5b62c0879cc35/5c668794cfe0c6eb(V1) with server4/193.167.100.100:443] 17.203 Closing ClientConnection[7bb5b62c0879cc35/5c668794cfe0c6eb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.203 Creating connection with server4:443 with v1 17.203 -> Packet A|1|S0|400000c57dbd5782|38|2 ConnectionCloseFrame[0|0|] AckFrame[3707774|Δ0] 17.204 Setting up connection for downloading https://server4:443/jviiqmvlol at 45:51.636 on ClientConnection[bfd17f4a125b2f19/90392868a61adb3e(V1) with server4/193.167.100.100:443] 17.204 Original destination connection id: bfd17f4a125b2f19 (scid: 90392868a61adb3e) >- CryptoStream[I|ClientHello] 17.205 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.405/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.205 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.302 <- (5) Packet A|3707776|S0|5c668794cfe0c6eb|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c53fc79418|dd5114e920bc21c86c5edcc8f9c196ca] Padding(1) 17.302 <- (6) Packet A|3707777|S0|5c668794cfe0c6eb|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c53fc79418|dd5114e920bc21c86c5edcc8f9c196ca] Padding(1) 17.302 -> Packet A|2|S0|400000c57dbd5782|38|2 ConnectionCloseFrame[0|0|] AckFrame[3707774|Δ0] 17.303 -> Packet A|3|S0|400000c57dbd5782|38|2 ConnectionCloseFrame[0|0|] AckFrame[3707774|Δ0] 17.333 <- (7) Packet A|3707778|S0|5c668794cfe0c6eb|43|1 ConnectionCloseFrame[0|28|Peer closed] 17.333 <- (8) Packet H|3707781|L|57|1 ConnectionCloseFrame[0|28|Peer closed] 17.404 loss detection timeout handler running Sending probe 0, because no ack since 17.205. Current RTT: 100/25. 17.404 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.405 (Probe is an initial retransmit) 17.405 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.805/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.405 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.439 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 17.550 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 17.761 <- (3) Packet I|1915140|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[1|Δ323] Padding(1051) -< CryptoStream[I|ServerHello] 17.764 probe count not reset on ack because handshake not yet confirmed 17.764 Retransmitting CryptoFrame[0,257] on level Initial 17.764 Cwnd(-): 6000; inflight: 0 17.764 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 18.164/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.764 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.764 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1067 millis, based on 18.832/Handshake, because peerAwaitingAddressValidation | RTT:356/178 reschedule loss detection timer for PTO over 1067 millis, based on 18.832/Handshake, because peerAwaitingAddressValidation | RTT:356/178 17.764 Discarding pn space Initial because first Handshake message is being sent 17.764 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.761 <- (4) Packet H|1915140|L|761|1 CryptoFrame[0,713] 17.764 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[1915140|Δ0] Padding(1150) 17.764 - unknown transport parameter 0xff0a001, size 1 17.764 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 17.766 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1067 millis, based on 18.834/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:356/178 17.766 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.767 Starting downloading https://server4:443/jviiqmvlol at 45:52.198 on ClientConnection[bfd17f4a125b2f19/90392868a61adb3e(V1) with server4/193.167.100.100:443] 17.767 -> Packet H|1|L|49|1 AckFrame[1915140|Δ0] 17.767 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1067 millis, based on 18.835/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:356/178 17.767 -> Packet A|0|S0|4000009ac7020fad|47|1 StreamFrame[0(CIB),0,17,fin] 17.797 <- (5) Packet H|1915141|L|48|1 AckFrame[0|Δ0] 17.798 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 17.798 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 17.797 <- (6) Packet A|1915136|S0|90392868a61adb3e|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000090968c0ae2|5f2ccbf6cb0e2cd863ce89baba016c52] Padding(25) -< CryptoStream[A|NewSessionTicket] 17.798 State is set to Confirmed reschedule loss detection timer for PTO over 1168 millis, based on 18.967/App, because ackElicitingInFlight | RTT:315/215 reschedule loss detection timer for PTO over 1168 millis, based on 18.967/App, because ackElicitingInFlight | RTT:315/215 17.799 Discarding pn space Handshake because HandshakeDone is received 17.799 <- (7) Packet A|1915137|S0|90392868a61adb3e|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 17.799 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.799 Finished downloading https://server4:443/jviiqmvlol at 45:52.231 on ClientConnection[bfd17f4a125b2f19/90392868a61adb3e(V1) with server4/193.167.100.100:443] 17.800 Closing ClientConnection[bfd17f4a125b2f19/90392868a61adb3e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.800 -> Packet A|1|S0|4000009ac7020fad|34|1 AckFrame[1915137-1915136|Δ0] 17.800 -> Packet A|2|S0|4000009ac7020fad|38|2 ConnectionCloseFrame[0|0|] AckFrame[1915137-1915136|Δ0] 17.800 Creating connection with server4:443 with v1 17.801 Setting up connection for downloading https://server4:443/awpnbithnt at 45:52.232 on ClientConnection[5c9713c8aa13c5e7/809d5ac1f0ab0fb3(V1) with server4/193.167.100.100:443] 17.801 Original destination connection id: 5c9713c8aa13c5e7 (scid: 809d5ac1f0ab0fb3) >- CryptoStream[I|ClientHello] 17.802 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.002/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.802 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.831 <- (8) Packet A|1915138|S0|90392868a61adb3e|41|1 ConnectionCloseFrame[0|28|Peer closed] 17.835 <- (1) Packet I|348569|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 17.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.038/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.935/Handshake, because peerAwaitingAddressValidation | RTT:33/16 17.838 Discarding pn space Initial because first Handshake message is being sent 17.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.935/Handshake, because peerAwaitingAddressValidation | RTT:33/16 17.836 <- (2) Packet H|348569|L|762|1 CryptoFrame[0,714] 17.838 -> Packet I|1|L|1201|2 Token=[] AckFrame[348569|Δ0] Padding(1150) 17.838 - unknown transport parameter 0xff0a001, size 1 17.838 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 17.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.937/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.840 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.841 Starting downloading https://server4:443/awpnbithnt at 45:52.272 on ClientConnection[5c9713c8aa13c5e7/809d5ac1f0ab0fb3(V1) with server4/193.167.100.100:443] 17.841 -> Packet H|1|L|49|1 AckFrame[348569|Δ0] 17.841 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.938/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.841 -> Packet A|0|S0|40000008e60767ac|47|1 StreamFrame[0(CIB),0,17,fin] 17.871 <- (3) Packet A|348569|S0|809d5ac1f0ab0fb3|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000015fb04365|88529f18d51d620033916f9076b1c5fe] Padding(25) -< CryptoStream[A|NewSessionTicket] 17.872 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 17.937/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 17.963/App, because ackElicitingInFlight | RTT:33/16 17.872 Discarding pn space Handshake because HandshakeDone is received 17.891 -> Packet A|1|S0|40000008e60767ac|35|1 AckFrame[348569|Δ19] 17.962 loss detection timeout handler running Sending probe 0, because no ack since 17.841. Current RTT: 33/16. 17.962 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 18.206/App, because ackElicitingInFlight | RTT:33/16 17.962 -> Packet PA|2|S0|40000008e60767ac|47|1 StreamFrame[0(CIB),0,17,fin] 17.994 <- (4) Packet A|348570|S0|809d5ac1f0ab0fb3|1072|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 17.995 Cwnd(-): 6000; inflight: 0 17.995 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 17.995 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 18.105/App, because ackElicitingInFlight | RTT:33/13 17.995 -> Packet A|3|S0|40000008e60767ac|47|1 StreamFrame[0(CIB),0,17,fin] 17.996 Finished downloading https://server4:443/awpnbithnt at 45:52.427 on ClientConnection[5c9713c8aa13c5e7/809d5ac1f0ab0fb3(V1) with server4/193.167.100.100:443] 17.996 Closing ClientConnection[5c9713c8aa13c5e7/809d5ac1f0ab0fb3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.996 -> Packet A|4|S0|40000008e60767ac|38|2 ConnectionCloseFrame[0|0|] AckFrame[348570|Δ0] 17.996 Creating connection with server4:443 with v1 17.997 Setting up connection for downloading https://server4:443/wydmrifwrv at 45:52.429 on ClientConnection[aa527876753b9ea9/8b2f9631eabb4adf(V1) with server4/193.167.100.100:443] 17.997 Original destination connection id: aa527876753b9ea9 (scid: 8b2f9631eabb4adf) >- CryptoStream[I|ClientHello] 17.999 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.199/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.998 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.027 <- (5) Packet A|348571|S0|809d5ac1f0ab0fb3|41|1 ConnectionCloseFrame[0|28|Peer closed] 18.032 <- (1) Packet I|2014691|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 18.035 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.235/Handshake, because peerAwaitingAddressValidation | RTT:100/25 18.035 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.132/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.035 Discarding pn space Initial because first Handshake message is being sent 18.035 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.132/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.035 -> Packet I|1|L|1201|2 Token=[] AckFrame[2014691|Δ0] Padding(1150) 18.131 loss detection timeout handler running 18.131 Sending probe 0. Current RTT: 33/16. 18.131 Sending probe because peer awaiting address validation 18.131 (Probe is a handshake ping) 18.132 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.326/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.132 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 18.142 <- (2) Packet H|2014693|L|762|1 CryptoFrame[0,714] 18.143 - unknown transport parameter 0xff0a001, size 1 18.143 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 18.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.339/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.145 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.145 Starting downloading https://server4:443/wydmrifwrv at 45:52.577 on ClientConnection[aa527876753b9ea9/8b2f9631eabb4adf(V1) with server4/193.167.100.100:443] 18.146 -> Packet H|2|L|49|1 AckFrame[2014693|Δ0] 18.146 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.340/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.146 -> Packet A|0|S0|4000000133d5fe96|47|1 StreamFrame[0(CIB),0,17,fin] 18.339 loss detection timeout handler running Sending probe 1, because no ack since 18.145. Current RTT: 33/16. 18.339 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.339 (Probe is a handshake retransmit) 18.340 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.728/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.339 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 18.341 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.729/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.340 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 18.371 <- (3) Packet H|2014695|L|48|1 AckFrame[4-2,0|Δ0] 18.371 probe count not reset on ack because handshake not yet confirmed 18.372 Retransmitting CryptoFrame[0,36] on level Handshake 18.372 Cwnd(-): 6000; inflight: 47 18.372 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 18.372 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 18.372 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 339 millis, based on 18.712/Handshake, because ackElicitingInFlight | RTT:33/13 18.372 -> Packet H|5|L|80|1 CryptoFrame[0,36] 18.402 <- (4) Packet H|2014696|L|48|1 AckFrame[5-2,0|Δ0] 18.403 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 18.403 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 18.484 <- (5) Packet A|2014693|S0|8b2f9631eabb4adf|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000002fd45cd43|7b3b58ba7ffec4ee9282475d1982491b] Padding(1) -< CryptoStream[A|NewSessionTicket] 18.485 State is set to Confirmed reschedule loss detection timer for PTO over -237 millis, based on 18.248/App, because ackElicitingInFlight | RTT:33/11 18.485 loss detection timeout handler running Sending probe 0, because no ack since 18.146. Current RTT: 33/11. reschedule loss detection timer for PTO over -237 millis, based on 18.248/App, because ackElicitingInFlight | RTT:33/11 18.485 Discarding pn space Handshake because HandshakeDone is received 18.485 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 203 millis, based on 18.689/App, because ackElicitingInFlight | RTT:33/11 18.485 -> Packet PA|1|S0|4000000133d5fe96|47|1 StreamFrame[0(CIB),0,17,fin] 18.505 -> Packet A|2|S0|4000000133d5fe96|35|1 AckFrame[2014693|Δ19] 18.516 <- (6) Packet A|2014694|S0|8b2f9631eabb4adf|48|2 AckFrame[1|Δ0] Padding(15) 18.517 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.517 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 93 millis, based on 18.611/App, because ackElicitingInFlight | RTT:33/9 18.517 -> Packet A|3|S0|4000000133d5fe96|55|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2014693|Δ0] 18.547 <- (7) Packet A|2014696|S0|8b2f9631eabb4adf|48|2 AckFrame[3,1|Δ0] Padding(15) 18.548 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.649 <- (8) Packet A|2014698|S0|8b2f9631eabb4adf|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 18.650 Finished downloading https://server4:443/wydmrifwrv at 45:53.081 on ClientConnection[aa527876753b9ea9/8b2f9631eabb4adf(V1) with server4/193.167.100.100:443] 18.650 Closing ClientConnection[aa527876753b9ea9/8b2f9631eabb4adf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.650 -> Packet A|4|S0|4000000133d5fe96|42|2 ConnectionCloseFrame[0|0|] AckFrame[2014698,2014696,2014694|Δ0] 18.650 Creating connection with server4:443 with v1 18.651 Setting up connection for downloading https://server4:443/icchvflrpb at 45:53.082 on ClientConnection[be5816e4e65afd38/7dcbc58f5bc277b3(V1) with server4/193.167.100.100:443] 18.651 Original destination connection id: be5816e4e65afd38 (scid: 7dcbc58f5bc277b3) >- CryptoStream[I|ClientHello] 18.652 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.852/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.652 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.687 Discarding packet (763 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 18.795 <- (2) Packet I|10007743|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[0|Δ110] Padding(1052) -< CryptoStream[I|ServerHello] 18.798 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.998/Handshake, because peerAwaitingAddressValidation | RTT:100/25 18.798 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 19.225/Handshake, because peerAwaitingAddressValidation | RTT:143/71 18.798 Discarding pn space Initial because first Handshake message is being sent 18.799 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 19.226/Handshake, because peerAwaitingAddressValidation | RTT:143/71 18.798 -> Packet I|1|L|1201|2 Token=[] AckFrame[10007743|Δ0] Padding(1150) 18.899 <- (9) Packet A|2014700|S0|8b2f9631eabb4adf|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 18.900 -> Packet A|5|S0|4000000133d5fe96|42|2 ConnectionCloseFrame[0|0|] AckFrame[2014698,2014696,2014694|Δ0] 19.006 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.225 loss detection timeout handler running 19.225 Sending probe 0. Current RTT: 143/71. 19.225 Sending probe because peer awaiting address validation 19.225 (Probe is a handshake ping) 19.225 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 853 millis, based on 20.080/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 19.225 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 19.297 <- (4) Packet H|10007749|L|763|1 CryptoFrame[0,714] 19.298 - unknown transport parameter 0xff0a001, size 1 19.298 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 19.300 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 853 millis, based on 20.154/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 19.300 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.301 Starting downloading https://server4:443/icchvflrpb at 45:53.732 on ClientConnection[be5816e4e65afd38/7dcbc58f5bc277b3(V1) with server4/193.167.100.100:443] 19.301 -> Packet H|2|L|49|1 AckFrame[10007749|Δ0] 19.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 853 millis, based on 20.155/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 19.301 -> Packet A|0|S0|400000ddf03fd666|47|1 StreamFrame[0(CIB),0,17,fin] 19.331 <- (5) Packet H|10007750|L|49|1 AckFrame[1-0|Δ0] 19.332 probe count not reset on ack because handshake not yet confirmed 19.332 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 19.332 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 19.331 <- (6) Packet A|10007741|S0|7dcbc58f5bc277b3|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c47319c55a|5bd0ec7355aad3fba8aa79f88b78bc13] Padding(24) -< CryptoStream[A|NewSessionTicket] 19.332 State is set to Confirmed reschedule loss detection timer for PTO over 924 millis, based on 20.257/App, because ackElicitingInFlight | RTT:129/81 reschedule loss detection timer for PTO over 446 millis, based on 19.779/App, because ackElicitingInFlight | RTT:129/81 19.332 Discarding pn space Handshake because HandshakeDone is received 19.333 <- (7) Packet A|10007742|S0|7dcbc58f5bc277b3|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 19.333 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.333 Finished downloading https://server4:443/icchvflrpb at 45:53.765 on ClientConnection[be5816e4e65afd38/7dcbc58f5bc277b3(V1) with server4/193.167.100.100:443] 19.333 -> Packet A|1|S0|400000ddf03fd666|34|1 AckFrame[10007742-10007741|Δ0] 19.333 Closing ClientConnection[be5816e4e65afd38/7dcbc58f5bc277b3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.334 -> Packet A|2|S0|400000ddf03fd666|38|2 ConnectionCloseFrame[0|0|] AckFrame[10007742-10007741|Δ0] 19.334 Creating connection with server4:443 with v1 19.334 Setting up connection for downloading https://server4:443/qgwummurdk at 45:53.766 on ClientConnection[fc6933f82de628f6/1d133504e00af54e(V1) with server4/193.167.100.100:443] 19.335 Original destination connection id: fc6933f82de628f6 (scid: 1d133504e00af54e) >- CryptoStream[I|ClientHello] 19.336 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.536/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.336 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.364 <- (8) Packet A|10007743|S0|7dcbc58f5bc277b3|41|1 ConnectionCloseFrame[0|28|Peer closed] 19.369 <- (1) Packet I|7098677|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 19.372 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.572/Handshake, because peerAwaitingAddressValidation | RTT:100/25 19.372 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.469/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.372 Discarding pn space Initial because first Handshake message is being sent 19.372 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.469/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.372 -> Packet I|1|L|1201|2 Token=[] AckFrame[7098677|Δ0] Padding(1150) 19.468 loss detection timeout handler running 19.468 Sending probe 0. Current RTT: 33/16. 19.468 Sending probe because peer awaiting address validation 19.468 (Probe is a handshake ping) 19.469 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.663/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.469 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 19.478 <- (2) Packet H|7098679|L|761|1 CryptoFrame[0,713] 19.479 - unknown transport parameter 0xff0a001, size 1 19.479 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 19.481 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.675/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.481 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.482 Starting downloading https://server4:443/qgwummurdk at 45:53.913 on ClientConnection[fc6933f82de628f6/1d133504e00af54e(V1) with server4/193.167.100.100:443] 19.482 -> Packet H|2|L|49|1 AckFrame[7098679|Δ0] 19.482 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.676/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.482 -> Packet A|0|S0|400000568aef401e|47|1 StreamFrame[0(CIB),0,17,fin] 19.675 loss detection timeout handler running Sending probe 1, because no ack since 19.481. Current RTT: 33/16. 19.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.676 (Probe is a handshake retransmit) 19.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 20.064/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.676 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 19.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 20.065/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.677 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 19.707 <- (3) Packet H|7098680|L|48|1 AckFrame[3-2,0|Δ0] 19.708 probe count not reset on ack because handshake not yet confirmed 19.708 Retransmitting CryptoFrame[0,36] on level Handshake 19.708 Cwnd(-): 6000; inflight: 127 19.708 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 356 millis, based on 20.065/Handshake, because ackElicitingInFlight | RTT:33/16 19.708 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 339 millis, based on 20.048/Handshake, because ackElicitingInFlight | RTT:33/13 19.708 -> Packet H|5|L|80|1 CryptoFrame[0,36] 19.707 <- (4) Packet A|7098677|S0|1d133504e00af54e|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005934847564|161e23349a6e8c8f65d174f616d32628] Padding(25) -< CryptoStream[A|NewSessionTicket] 19.709 State is set to Confirmed reschedule loss detection timer for PTO over 213 millis, based on 19.922/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over -116 millis, based on 19.592/App, because ackElicitingInFlight | RTT:33/13 19.709 Discarding pn space Handshake because HandshakeDone is received 19.709 loss detection timeout handler running Sending probe 0, because no ack since 19.482. Current RTT: 33/13. 19.709 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 19.929/App, because ackElicitingInFlight | RTT:33/13 19.709 -> Packet PA|1|S0|400000568aef401e|47|1 StreamFrame[0(CIB),0,17,fin] 19.728 -> Packet A|2|S0|400000568aef401e|35|1 AckFrame[7098677|Δ19] 19.739 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 19.740 <- (6) Packet A|7098679|S0|1d133504e00af54e|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 19.741 Finished downloading https://server4:443/qgwummurdk at 45:54.173 on ClientConnection[fc6933f82de628f6/1d133504e00af54e(V1) with server4/193.167.100.100:443] 19.741 Closing ClientConnection[fc6933f82de628f6/1d133504e00af54e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.742 -> Packet A|3|S0|400000568aef401e|40|2 ConnectionCloseFrame[0|0|] AckFrame[7098679,7098677|Δ0] 19.742 Creating connection with server4:443 with v1 19.742 Setting up connection for downloading https://server4:443/iheolmzfwj at 45:54.174 on ClientConnection[74cdd8b803ad87ac/90b581f2a499252a(V1) with server4/193.167.100.100:443] 19.742 Original destination connection id: 74cdd8b803ad87ac (scid: 90b581f2a499252a) >- CryptoStream[I|ClientHello] 19.743 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.943/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.743 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.777 <- (1) Packet I|14380701|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 19.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.979/Handshake, because peerAwaitingAddressValidation | RTT:100/25 19.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.877/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.780 Discarding pn space Initial because first Handshake message is being sent 19.780 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.777 <- (2) Packet H|14380701|L|761|1 CryptoFrame[0,712] reschedule loss detection timer for PTO over 96 millis, based on 19.877/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.780 -> Packet I|1|L|1201|2 Token=[] AckFrame[14380701|Δ0] Padding(1150) 19.780 - unknown transport parameter 0xff0a001, size 1 19.780 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 19.782 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.879/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.782 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.782 Starting downloading https://server4:443/iheolmzfwj at 45:54.214 on ClientConnection[74cdd8b803ad87ac/90b581f2a499252a(V1) with server4/193.167.100.100:443] 19.782 -> Packet H|1|L|49|1 AckFrame[14380701|Δ0] 19.783 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.783 -> Packet A|0|S0|40000081ae788501|47|1 StreamFrame[0(CIB),0,17,fin] 19.837 <- (7) Packet A|7098681|S0|1d133504e00af54e|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005934847564|161e23349a6e8c8f65d174f616d32628] Padding(1) 19.837 <- (8) Packet A|7098682|S0|1d133504e00af54e|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005934847564|161e23349a6e8c8f65d174f616d32628] Padding(1) 19.838 -> Packet A|4|S0|400000568aef401e|40|2 ConnectionCloseFrame[0|0|] AckFrame[7098679,7098677|Δ0] 19.838 -> Packet A|5|S0|400000568aef401e|40|2 ConnectionCloseFrame[0|0|] AckFrame[7098679,7098677|Δ0] 19.879 loss detection timeout handler running Sending probe 0, because no ack since 19.782. Current RTT: 33/16. 19.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.879 (Probe is a handshake retransmit) 19.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.073/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.879 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 19.887 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.072 loss detection timeout handler running Sending probe 1, because no ack since 19.783. Current RTT: 33/16. 20.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.072 (Probe is a handshake retransmit) 20.073 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 20.461/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.073 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 20.074 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 20.462/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.074 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 20.098 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.098 <- (5) Packet H|14380705|L|761|1 CryptoFrame[0,712] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.099 -> Packet H|5|L|51|1 AckFrame[14380705,14380701|Δ0] 20.104 <- (6) Packet H|14380706|L|49|1 AckFrame[3|Δ0] 20.104 probe count not reset on ack because handshake not yet confirmed 20.104 Retransmitting CryptoFrame[0,36] on level Handshake 20.104 Cwnd(-): 6000; inflight: 127 20.104 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 357 millis, based on 20.462/Handshake, because ackElicitingInFlight | RTT:33/16 20.104 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 339 millis, based on 20.444/Handshake, because ackElicitingInFlight | RTT:33/13 20.104 -> Packet H|6|L|91|2 CryptoFrame[0,36] AckFrame[14380705,14380701|Δ0] 20.104 <- (7) Packet A|14380701|S0|90b581f2a499252a|336|5 CryptoFrame[0,250] AckFrame[0|Δ290] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000009df1261a56|31e7824a104d31417befe351d729b79e] Padding(16) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 84 millis, based on 20.189/Handshake, because ackElicitingInFlight | RTT:33/13 20.105 State is set to Confirmed reschedule loss detection timer for PTO over 369 millis, based on 20.474/Handshake, because ackElicitingInFlight | RTT:66/76 20.105 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.105 Discarding pn space Handshake because HandshakeDone is received 20.105 <- (8) Packet A|14380702|S0|90b581f2a499252a|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 20.105 Discarding packet (49 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 20.105 Finished downloading https://server4:443/iheolmzfwj at 45:54.537 on ClientConnection[74cdd8b803ad87ac/90b581f2a499252a(V1) with server4/193.167.100.100:443] 20.105 Closing ClientConnection[74cdd8b803ad87ac/90b581f2a499252a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.105 -> Packet A|1|S0|40000081ae788501|34|1 AckFrame[14380702-14380701|Δ0] 20.106 -> Packet A|2|S0|40000081ae788501|38|2 ConnectionCloseFrame[0|0|] AckFrame[14380702-14380701|Δ0] 20.106 Creating connection with server4:443 with v1 20.106 Setting up connection for downloading https://server4:443/mqmuftgswb at 45:54.538 on ClientConnection[cb57c3be2ead8dc0/b1e32f6a623e4c11(V1) with server4/193.167.100.100:443] 20.106 Original destination connection id: cb57c3be2ead8dc0 (scid: b1e32f6a623e4c11) >- CryptoStream[I|ClientHello] 20.108 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.308/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.108 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.135 Discarding packet (46 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 20.307 loss detection timeout handler running Sending probe 0, because no ack since 20.108. Current RTT: 100/25. 20.307 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.307 (Probe is an initial retransmit) 20.308 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.708/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.307 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.341 <- (1) Packet I|11209416|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[1|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 20.344 probe count not reset on ack because handshake not yet confirmed 20.344 Retransmitting CryptoFrame[0,257] on level Initial 20.344 Cwnd(-): 6000; inflight: 0 20.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.744/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.441/Handshake, because peerAwaitingAddressValidation | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 20.441/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.344 Discarding pn space Initial because first Handshake message is being sent 20.344 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.345 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[11209416|Δ0] Padding(1150) 20.441 loss detection timeout handler running 20.441 Sending probe 0. Current RTT: 33/16. 20.441 Sending probe because peer awaiting address validation 20.441 (Probe is a handshake ping) 20.441 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.635/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.441 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 20.452 <- (2) Packet H|11209418|L|763|1 CryptoFrame[0,714] 20.453 - unknown transport parameter 0xff0a001, size 1 20.453 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 20.455 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.649/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.455 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.455 Starting downloading https://server4:443/mqmuftgswb at 45:54.887 on ClientConnection[cb57c3be2ead8dc0/b1e32f6a623e4c11(V1) with server4/193.167.100.100:443] 20.455 -> Packet H|2|L|49|1 AckFrame[11209418|Δ0] 20.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.650/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.456 -> Packet A|0|S0|40000057717f1df2|47|1 StreamFrame[0(CIB),0,17,fin] 20.649 loss detection timeout handler running Sending probe 1, because no ack since 20.455. Current RTT: 33/16. 20.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.649 (Probe is a handshake retransmit) 20.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.037/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.649 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 20.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.038/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.650 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 20.681 <- (3) Packet H|11209419|L|48|1 AckFrame[4,2|Δ0] 20.681 probe count not reset on ack because handshake not yet confirmed 20.682 Retransmitting CryptoFrame[0,36] on level Handshake 20.682 Cwnd(-): 3000; inflight: 127 20.682 -> Packet H|5|L|80|1 CryptoFrame[0,36] 20.681 <- (4) Packet A|11209416|S0|b1e32f6a623e4c11|336|5 CryptoFrame[0,250] AckFrame[0|Δ194] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005accf1ff92|06b7a8451af57904cfa29cadd4a71f6c] Padding(16) -< CryptoStream[A|NewSessionTicket] 20.682 State is set to Confirmed 20.682 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.682 Discarding pn space Handshake because HandshakeDone is received 20.682 <- (5) Packet A|11209417|S0|b1e32f6a623e4c11|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 20.683 -> Packet A|1|S0|40000057717f1df2|34|1 AckFrame[11209417-11209416|Δ0] 20.683 Finished downloading https://server4:443/mqmuftgswb at 45:55.115 on ClientConnection[cb57c3be2ead8dc0/b1e32f6a623e4c11(V1) with server4/193.167.100.100:443] 20.683 Closing ClientConnection[cb57c3be2ead8dc0/b1e32f6a623e4c11(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.684 Creating connection with server4:443 with v1 20.684 -> Packet A|2|S0|40000057717f1df2|38|2 ConnectionCloseFrame[0|0|] AckFrame[11209417-11209416|Δ0] 20.685 Setting up connection for downloading https://server4:443/xqqzyxarku at 45:55.116 on ClientConnection[6ba7592a571bd988/c33e412a6d16b0e6(V1) with server4/193.167.100.100:443] 20.685 Original destination connection id: 6ba7592a571bd988 (scid: c33e412a6d16b0e6) >- CryptoStream[I|ClientHello] 20.686 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.886/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.686 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.713 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 20.715 <- (7) Packet A|11209418|S0|b1e32f6a623e4c11|41|1 ConnectionCloseFrame[0|28|Peer closed] 20.885 loss detection timeout handler running Sending probe 0, because no ack since 20.686. Current RTT: 100/25. 20.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.886 (Probe is an initial retransmit) 20.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.286/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.886 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.920 <- (1) Packet I|10175030|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[1|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 20.923 probe count not reset on ack because handshake not yet confirmed 20.923 Retransmitting CryptoFrame[0,257] on level Initial 20.923 Cwnd(-): 6000; inflight: 0 20.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.323/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.020/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.923 Discarding pn space Initial because first Handshake message is being sent 20.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.020/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.923 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.920 <- (2) Packet H|10175030|L|762|1 CryptoFrame[0,713] 20.923 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[10175030|Δ0] Padding(1150) 20.923 - unknown transport parameter 0xff0a001, size 1 20.923 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 20.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.925 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.926 Starting downloading https://server4:443/xqqzyxarku at 45:55.357 on ClientConnection[6ba7592a571bd988/c33e412a6d16b0e6(V1) with server4/193.167.100.100:443] 20.926 -> Packet H|1|L|49|1 AckFrame[10175030|Δ0] 20.926 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.023/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.926 -> Packet A|0|S0|400000c77181fa9c|47|1 StreamFrame[0(CIB),0,17,fin] 21.022 loss detection timeout handler running Sending probe 0, because no ack since 20.925. Current RTT: 33/16. 21.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.022 (Probe is a handshake retransmit) 21.023 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.217/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.022 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 21.053 <- (3) Packet H|10175031|L|46|1 AckFrame[2-1|Δ0] 21.054 probe count not reset on ack because handshake not yet confirmed 21.054 Retransmitting CryptoFrame[0,36] on level Handshake 21.054 Cwnd(-): 3000; inflight: 47 21.054 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 21.054 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.054 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 169 millis, based on 21.224/Handshake, because ackElicitingInFlight | RTT:33/13 21.054 -> Packet H|3|L|80|1 CryptoFrame[0,36] 21.054 <- (4) Packet A|10175030|S0|c33e412a6d16b0e6|336|5 CryptoFrame[0,250] AckFrame[0|Δ96] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000c2fecd7196|f4d53907c768d5ff92d34f7367c58af1] Padding(18) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 84 millis, based on 21.139/Handshake, because ackElicitingInFlight | RTT:33/13 21.055 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 21.204/Handshake, because ackElicitingInFlight | RTT:42/27 21.055 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.055 Discarding pn space Handshake because HandshakeDone is received 21.074 -> Packet A|1|S0|400000c77181fa9c|35|1 AckFrame[10175030|Δ19] 21.085 Discarding packet (46 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 21.185 <- (6) Packet A|10175034|S0|c33e412a6d16b0e6|48|2 AckFrame[1|Δ79] Padding(16) 21.185 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.968 <- (7) Packet A|10175038|S0|c33e412a6d16b0e6|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 21.969 Finished downloading https://server4:443/xqqzyxarku at 45:56.401 on ClientConnection[6ba7592a571bd988/c33e412a6d16b0e6(V1) with server4/193.167.100.100:443] 21.969 Closing ClientConnection[6ba7592a571bd988/c33e412a6d16b0e6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.969 -> Packet A|2|S0|400000c77181fa9c|40|2 ConnectionCloseFrame[0|0|] AckFrame[10175038,10175034|Δ0] 21.970 Creating connection with server4:443 with v1 21.970 Setting up connection for downloading https://server4:443/rggfxtuqem at 45:56.402 on ClientConnection[104a44c439f07f2f/4189093b3bc606ac(V1) with server4/193.167.100.100:443] 21.970 Original destination connection id: 104a44c439f07f2f (scid: 4189093b3bc606ac) >- CryptoStream[I|ClientHello] 21.971 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.171/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.971 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.000 <- (8) Packet A|10175039|S0|c33e412a6d16b0e6|41|1 ConnectionCloseFrame[0|28|Peer closed] 22.171 loss detection timeout handler running Sending probe 0, because no ack since 21.971. Current RTT: 100/25. 22.171 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.171 (Probe is an initial retransmit) 22.171 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.571/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.171 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.205 <- (1) Packet I|10989644|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[1|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 22.208 probe count not reset on ack because handshake not yet confirmed 22.208 Retransmitting CryptoFrame[0,257] on level Initial 22.208 Cwnd(-): 6000; inflight: 0 22.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 22.608/Handshake, because peerAwaitingAddressValidation | RTT:100/25 22.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.402/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.305/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.208 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.208 Discarding pn space Initial because first Handshake message is being sent 22.209 Packet not sent because keys are discarded: Packet I|3|L|.|2 Token=[] AckFrame[10989644|Δ0] Padding(1150) 22.205 <- (2) Packet H|10989644|L|762|1 CryptoFrame[0,713] 22.209 - unknown transport parameter 0xff0a001, size 1 22.209 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 22.212 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.309/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.212 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.212 Starting downloading https://server4:443/rggfxtuqem at 45:56.644 on ClientConnection[104a44c439f07f2f/4189093b3bc606ac(V1) with server4/193.167.100.100:443] 22.212 -> Packet H|1|L|49|1 AckFrame[10989644|Δ0] 22.212 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.309/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.212 -> Packet A|0|S0|40000053c406c76d|47|1 StreamFrame[0(CIB),0,17,fin] 22.243 <- (3) Packet H|10989645|L|49|1 AckFrame[0|Δ0] 22.243 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 22.243 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 22.243 <- (4) Packet A|10989644|S0|4189093b3bc606ac|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000005bc46a475b|9baefa2ae15bdfbff57e53494cac8c0d] Padding(24) -< CryptoStream[A|NewSessionTicket] 22.244 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 22.322/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 22.322/App, because ackElicitingInFlight | RTT:33/13 22.244 Discarding pn space Handshake because HandshakeDone is received 22.244 <- (5) Packet A|10989645|S0|4189093b3bc606ac|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 22.244 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.245 -> Packet A|1|S0|40000053c406c76d|34|1 AckFrame[10989645-10989644|Δ0] 22.245 Finished downloading https://server4:443/rggfxtuqem at 45:56.676 on ClientConnection[104a44c439f07f2f/4189093b3bc606ac(V1) with server4/193.167.100.100:443] 22.245 Closing ClientConnection[104a44c439f07f2f/4189093b3bc606ac(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.245 -> Packet A|2|S0|40000053c406c76d|38|2 ConnectionCloseFrame[0|0|] AckFrame[10989645-10989644|Δ0] 22.245 Creating connection with server4:443 with v1 22.246 Setting up connection for downloading https://server4:443/pdnptbapnx at 45:56.677 on ClientConnection[1bd99cc590e9da5c/422a522647826374(V1) with server4/193.167.100.100:443] 22.246 Original destination connection id: 1bd99cc590e9da5c (scid: 422a522647826374) >- CryptoStream[I|ClientHello] 22.247 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.447/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.247 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.281 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 22.391 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 22.446 loss detection timeout handler running Sending probe 0, because no ack since 22.247. Current RTT: 100/25. 22.446 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.447 (Probe is an initial retransmit) 22.447 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.847/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.447 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.846 loss detection timeout handler running Sending probe 1, because no ack since 22.447. Current RTT: 100/25. 22.846 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.846 (Probe is an initial retransmit) 22.847 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.647/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.847 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.848 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.648/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.848 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.880 <- (3) Packet I|4358497|L|1232|2 Token=[] AckFrame[2,0|Δ0] Padding(1180) 22.880 probe count not reset on ack because handshake not yet confirmed 22.880 Cwnd(-): 6000; inflight: 1200 22.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.680/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.011 <- (4) Packet I|4358499|L|1232|2 Token=[] AckFrame[3-2,0|Δ130] Padding(1179) 23.011 probe count not reset on ack because handshake not yet confirmed 23.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 23.395/Initial, because peerAwaitingAddressValidation | RTT:32/16 23.011 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 23.394 loss detection timeout handler running Sending probe 2, because no ack since 22.848. Current RTT: 48/45. 23.394 Sending probe because peer awaiting address validation 23.394 (Probe is Initial ping, because there is no Initial data to retransmit) 23.395 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1823 millis, based on 25.219/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:48/45 23.395 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 23.831 <- (6) Packet I|4358501|L|1232|2 Token=[] AckFrame[4-2,0|Δ402] Padding(1177) 23.831 probe count not reset on ack because handshake not yet confirmed 23.832 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1823 millis, based on 25.656/Initial, because peerAwaitingAddressValidation | RTT:48/45 25.443 <- (7) Packet I|4358503|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[4-2,0|Δ2014] Padding(1049) -< CryptoStream[I|ServerHello] 25.446 probe count not reset on ack because handshake not yet confirmed 25.446 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 4959 millis, based on 30.406/Handshake, because peerAwaitingAddressValidation | RTT:96/131 25.446 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 619 millis, based on 26.066/Handshake, because peerAwaitingAddressValidation | RTT:96/131 25.446 Discarding pn space Initial because first Handshake message is being sent 25.446 Packet not sent because keys are discarded: Packet I|5|L|.|2 Token=[] AckFrame[4358503,4358501,4358499,4358497|Δ0] Padding(1144) 26.065 loss detection timeout handler running 26.066 Sending probe 0. Current RTT: 96/131. 26.066 Sending probe because peer awaiting address validation 26.066 (Probe is a handshake ping) 26.066 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1239 millis, based on 27.306/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:96/131 26.066 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 27.305 loss detection timeout handler running Sending probe 1, because no ack since 26.066. Current RTT: 96/131. 27.305 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.305 (Probe is a handshake ping) 27.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2479 millis, based on 29.786/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:96/131 27.306 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 27.307 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2479 millis, based on 29.787/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:96/131 27.307 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 27.357 <- (8) Packet H|4358504|L|49|1 AckFrame[2-1|Δ20] 27.358 probe count not reset on ack because handshake not yet confirmed 27.358 Cwnd(-): 3000; inflight: 0 27.358 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.388 <- (9) Packet H|4358506|L|761|1 CryptoFrame[0,713] 27.389 - unknown transport parameter 0xff0a001, size 1 27.389 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 2119 millis, based on 29.511/Handshake, because ackElicitingInFlight | RTT:90/110 27.391 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[4358504|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.392 Starting downloading https://server4:443/pdnptbapnx at 46:01.823 on ClientConnection[1bd99cc590e9da5c/422a522647826374(V1) with server4/193.167.100.100:443] 27.392 -> Packet H|4|L|51|1 AckFrame[4358506,4358504|Δ0] 27.392 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 2118 millis, based on 29.511/Handshake, because ackElicitingInFlight | RTT:90/110 27.392 -> Packet A|0|S0|400000430637e96c|47|1 StreamFrame[0(CIB),0,17,fin] 27.422 <- (10) Packet H|4358507|L|48|1 AckFrame[3-1|Δ0] 27.423 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 27.423 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 27.743 <- (11) Packet A|4358496|S0|422a522647826374|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000429ab08ec0|a58b23780919703829e0cd93efb236ca] Padding(1) -< CryptoStream[A|NewSessionTicket] 27.744 State is set to Confirmed reschedule loss detection timer for PTO over 148 millis, based on 27.892/App, because ackElicitingInFlight | RTT:83/98 reschedule loss detection timer for PTO over 147 millis, based on 27.892/App, because ackElicitingInFlight | RTT:83/98 27.744 Discarding pn space Handshake because HandshakeDone is received 27.764 -> Packet A|1|S0|400000430637e96c|35|1 AckFrame[4358496|Δ19] 27.891 loss detection timeout handler running Sending probe 0, because no ack since 27.392. Current RTT: 83/98. 27.891 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 999 millis, based on 28.892/App, because ackElicitingInFlight | RTT:83/98 27.892 -> Packet PA|2|S0|400000430637e96c|47|1 StreamFrame[0(CIB),0,17,fin] 28.164 <- (12) Packet A|4358498|S0|422a522647826374|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000429ab08ec0|a58b23780919703829e0cd93efb236ca] Padding(1) -< CryptoStream[A|NewSessionTicket] 28.184 -> Packet A|3|S0|400000430637e96c|37|1 AckFrame[4358498,4358496|Δ19] 28.215 <- (13) Packet A|4358499|S0|422a522647826374|48|2 AckFrame[3|Δ0] Padding(17) 28.215 Cwnd(-): 2400; inflight: 0 28.215 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.215 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 499 millis, based on 28.715/App, because ackElicitingInFlight | RTT:83/98 28.215 -> Packet A|4|S0|400000430637e96c|55|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4358499|Δ0] 28.375 <- (14) Packet A|4358502|S0|422a522647826374|1061|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[4-3|Δ127] 28.375 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.375 Finished downloading https://server4:443/pdnptbapnx at 46:02.807 on ClientConnection[1bd99cc590e9da5c/422a522647826374(V1) with server4/193.167.100.100:443] 28.375 Closing ClientConnection[1bd99cc590e9da5c/422a522647826374(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.376 -> Packet A|5|S0|400000430637e96c|38|2 ConnectionCloseFrame[0|0|] AckFrame[4358502|Δ0] 28.376 Creating connection with server4:443 with v1 28.377 Setting up connection for downloading https://server4:443/xecckrkxnn at 46:02.808 on ClientConnection[33c700dda2bd17ad/80d10d3d24e8f3b3(V1) with server4/193.167.100.100:443] 28.377 Original destination connection id: 33c700dda2bd17ad (scid: 80d10d3d24e8f3b3) >- CryptoStream[I|ClientHello] 28.378 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.578/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.378 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.411 <- (1) Packet I|8623687|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 28.415 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 28.615/Handshake, because peerAwaitingAddressValidation | RTT:100/25 28.415 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.512/Handshake, because peerAwaitingAddressValidation | RTT:33/16 28.415 Discarding pn space Initial because first Handshake message is being sent 28.415 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.512/Handshake, because peerAwaitingAddressValidation | RTT:33/16 28.415 -> Packet I|1|L|1201|2 Token=[] AckFrame[8623687|Δ0] Padding(1150) 28.511 loss detection timeout handler running 28.512 Sending probe 0. Current RTT: 33/16. 28.512 Sending probe because peer awaiting address validation 28.512 (Probe is a handshake ping) 28.512 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 28.706/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.512 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 28.531 <- (2) Packet H|8623689|L|762|1 CryptoFrame[0,713] 28.531 - unknown transport parameter 0xff0a001, size 1 28.532 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 28.534 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 28.728/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.534 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.534 Starting downloading https://server4:443/xecckrkxnn at 46:02.966 on ClientConnection[33c700dda2bd17ad/80d10d3d24e8f3b3(V1) with server4/193.167.100.100:443] 28.534 -> Packet H|2|L|49|1 AckFrame[8623689|Δ0] 28.535 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 28.729/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.535 -> Packet A|0|S0|4000009c4f49fb85|47|1 StreamFrame[0(CIB),0,17,fin] 28.565 <- (3) Packet H|8623690|L|49|1 AckFrame[1-0|Δ0] 28.565 probe count not reset on ack because handshake not yet confirmed 28.566 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 28.566 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 28.565 <- (4) Packet A|8623687|S0|80d10d3d24e8f3b3|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000849e7400e1|0a5f0bb1853b11cf893b438a8f188abe] Padding(24) -< CryptoStream[A|NewSessionTicket] 28.566 State is set to Confirmed reschedule loss detection timer for PTO over 188 millis, based on 28.755/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 28.645/App, because ackElicitingInFlight | RTT:33/13 28.566 Discarding pn space Handshake because HandshakeDone is received 28.585 -> Packet A|1|S0|4000009c4f49fb85|35|1 AckFrame[8623687|Δ19] 28.625 <- (15) Packet A|4358504|S0|422a522647826374|1063|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[4-3|Δ377] 28.625 -> Packet A|6|S0|400000430637e96c|38|2 ConnectionCloseFrame[0|0|] AckFrame[4358502|Δ0] 28.644 loss detection timeout handler running Sending probe 0, because no ack since 28.535. Current RTT: 33/13. 28.644 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 28.864/App, because ackElicitingInFlight | RTT:33/13 28.644 -> Packet PA|2|S0|4000009c4f49fb85|47|1 StreamFrame[0(CIB),0,17,fin] 28.665 <- (5) Packet A|8623689|S0|80d10d3d24e8f3b3|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000849e7400e1|0a5f0bb1853b11cf893b438a8f188abe] Padding(1) -< CryptoStream[A|NewSessionTicket] 28.675 <- (6) Packet A|8623690|S0|80d10d3d24e8f3b3|48|2 AckFrame[2|Δ0] Padding(14) 28.676 Cwnd(-): 6000; inflight: 0 28.676 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 28.676 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 101 millis, based on 28.778/App, because ackElicitingInFlight | RTT:33/11 28.676 -> Packet A|3|S0|4000009c4f49fb85|58|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8623689,8623687|Δ9] 28.676 <- (7) Packet A|8623691|S0|80d10d3d24e8f3b3|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 28.677 Finished downloading https://server4:443/xecckrkxnn at 46:03.108 on ClientConnection[33c700dda2bd17ad/80d10d3d24e8f3b3(V1) with server4/193.167.100.100:443] 28.677 Closing ClientConnection[33c700dda2bd17ad/80d10d3d24e8f3b3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.677 -> Packet A|4|S0|4000009c4f49fb85|40|2 ConnectionCloseFrame[0|0|] AckFrame[8623691-8623689,8623687|Δ0] 28.677 Creating connection with server4:443 with v1 28.678 Setting up connection for downloading https://server4:443/ntnmspzktr at 46:03.110 on ClientConnection[954a9a6b6cbe7de9/26090a17aaa41c0b(V1) with server4/193.167.100.100:443] 28.678 Original destination connection id: 954a9a6b6cbe7de9 (scid: 26090a17aaa41c0b) >- CryptoStream[I|ClientHello] 28.679 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.879/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.679 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.712 <- (1) Packet I|7468619|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 28.715 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 28.915/Handshake, because peerAwaitingAddressValidation | RTT:100/25 28.715 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.812/Handshake, because peerAwaitingAddressValidation | RTT:33/16 28.715 Discarding pn space Initial because first Handshake message is being sent 28.715 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.812/Handshake, because peerAwaitingAddressValidation | RTT:33/16 28.713 <- (2) Packet H|7468619|L|762|1 CryptoFrame[0,714] 28.715 -> Packet I|1|L|1201|2 Token=[] AckFrame[7468619|Δ0] Padding(1150) 28.716 - unknown transport parameter 0xff0a001, size 1 28.716 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 28.718 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.815/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.718 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.718 Starting downloading https://server4:443/ntnmspzktr at 46:03.150 on ClientConnection[954a9a6b6cbe7de9/26090a17aaa41c0b(V1) with server4/193.167.100.100:443] 28.718 -> Packet H|1|L|49|1 AckFrame[7468619|Δ0] 28.719 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.816/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.719 -> Packet A|0|S0|400000c262cb08a0|47|1 StreamFrame[0(CIB),0,17,fin] 28.749 <- (3) Packet A|7468619|S0|26090a17aaa41c0b|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000d8e67afb9c|8743fb3858aacddaf95e0f5a0a93cd7a] Padding(25) -< CryptoStream[A|NewSessionTicket] 28.750 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 28.815/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 28.841/App, because ackElicitingInFlight | RTT:33/16 28.750 Discarding pn space Handshake because HandshakeDone is received 28.769 -> Packet A|1|S0|400000c262cb08a0|35|1 AckFrame[7468619|Δ19] 28.840 loss detection timeout handler running Sending probe 0, because no ack since 28.719. Current RTT: 33/16. 28.840 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 29.084/App, because ackElicitingInFlight | RTT:33/16 28.840 -> Packet PA|2|S0|400000c262cb08a0|47|1 StreamFrame[0(CIB),0,17,fin] 28.866 <- (8) Packet A|8623693|S0|80d10d3d24e8f3b3|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000849e7400e1|0a5f0bb1853b11cf893b438a8f188abe] Padding(1) 28.866 -> Packet A|5|S0|4000009c4f49fb85|40|2 ConnectionCloseFrame[0|0|] AckFrame[8623691-8623689,8623687|Δ0] 28.866 <- (9) Packet A|8623694|S0|80d10d3d24e8f3b3|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000849e7400e1|0a5f0bb1853b11cf893b438a8f188abe] Padding(1) 28.867 -> Packet A|6|S0|4000009c4f49fb85|40|2 ConnectionCloseFrame[0|0|] AckFrame[8623691-8623689,8623687|Δ0] 28.872 <- (4) Packet A|7468620|S0|26090a17aaa41c0b|1072|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(13) 28.873 Cwnd(-): 6000; inflight: 0 28.873 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 28.873 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 28.983/App, because ackElicitingInFlight | RTT:33/13 28.873 -> Packet A|3|S0|400000c262cb08a0|47|1 StreamFrame[0(CIB),0,17,fin] 28.873 Finished downloading https://server4:443/ntnmspzktr at 46:03.305 on ClientConnection[954a9a6b6cbe7de9/26090a17aaa41c0b(V1) with server4/193.167.100.100:443] 28.873 Closing ClientConnection[954a9a6b6cbe7de9/26090a17aaa41c0b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.874 Creating connection with server4:443 with v1 28.874 -> Packet A|4|S0|400000c262cb08a0|39|2 ConnectionCloseFrame[0|0|] AckFrame[7468620|Δ1] 28.875 Setting up connection for downloading https://server4:443/efjsilsnut at 46:03.306 on ClientConnection[7bdf9f4692c53b43/1001275ef662c490(V1) with server4/193.167.100.100:443] 28.875 Original destination connection id: 7bdf9f4692c53b43 (scid: 1001275ef662c490) >- CryptoStream[I|ClientHello] 28.876 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.076/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.876 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.897 <- (10) Packet A|8623695|S0|80d10d3d24e8f3b3|44|1 ConnectionCloseFrame[0|28|Peer closed] 28.898 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 28.910 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 29.019 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 29.075 loss detection timeout handler running Sending probe 0, because no ack since 28.876. Current RTT: 100/25. 29.075 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.075 (Probe is an initial retransmit) 29.076 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.476/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.075 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.127 <- (16) Packet A|4358506|S0|422a522647826374|1063|3 StreamFrame[0(CIB),0,1024,fin] Padding(1) AckFrame[4-3|Δ879] 29.127 -> Packet A|7|S0|400000430637e96c|38|2 ConnectionCloseFrame[0|0|] AckFrame[4358502|Δ0] 29.158 <- (17) Packet A|4358507|S0|422a522647826374|41|1 ConnectionCloseFrame[0|28|Peer closed] 29.231 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 29.475 loss detection timeout handler running Sending probe 1, because no ack since 29.075. Current RTT: 100/25. 29.475 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.475 (Probe is an initial retransmit) 29.475 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.275/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.475 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.476 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.276/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.476 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.639 <- (4) Packet I|3326956|L|1232|2 Token=[] AckFrame[3-0|Δ130] Padding(1181) 29.640 probe count not reset on ack because handshake not yet confirmed 29.640 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.440/Initial, because peerAwaitingAddressValidation | RTT:100/25 30.439 loss detection timeout handler running Sending probe 2, because no ack since 29.476. Current RTT: 163/81. 30.439 Sending probe because peer awaiting address validation 30.439 (Probe is Initial ping, because there is no Initial data to retransmit) 30.440 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3895 millis, based on 34.336/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:163/81 30.440 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 30.451 <- (5) Packet I|3326958|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[3-0|Δ942] Padding(1051) -< CryptoStream[I|ServerHello] 30.454 probe count not reset on ack because handshake not yet confirmed 30.454 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3895 millis, based on 34.350/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:163/81 30.454 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 486 millis, based on 30.941/Handshake, because peerAwaitingAddressValidation | RTT:163/81 30.454 Discarding pn space Initial because first Handshake message is being sent 30.454 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 486 millis, based on 30.941/Handshake, because peerAwaitingAddressValidation | RTT:163/81 30.454 -> Packet I|5|L|1201|2 Token=[] AckFrame[3326958,3326956|Δ0] Padding(1148) 30.452 <- (6) Packet H|3326958|L|761|1 CryptoFrame[0,713] 30.455 - unknown transport parameter 0xff0a001, size 1 30.455 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 30.457 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 486 millis, based on 30.944/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:163/81 30.457 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.458 Starting downloading https://server4:443/efjsilsnut at 46:04.889 on ClientConnection[7bdf9f4692c53b43/1001275ef662c490(V1) with server4/193.167.100.100:443] 30.458 -> Packet H|1|L|49|1 AckFrame[3326958|Δ0] 30.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 486 millis, based on 30.945/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:163/81 30.458 -> Packet A|0|S0|4000008d792f1774|47|1 StreamFrame[0(CIB),0,17,fin] 30.488 <- (7) Packet H|3326959|L|48|1 AckFrame[0|Δ0] 30.488 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 30.488 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 30.489 <- (8) Packet A|3326951|S0|1001275ef662c490|48|2 AckFrame[0|Δ0] Padding(15) 30.489 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 30.490 <- (9) Packet A|3326952|S0|1001275ef662c490|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 30.490 Finished downloading https://server4:443/efjsilsnut at 46:04.922 on ClientConnection[7bdf9f4692c53b43/1001275ef662c490(V1) with server4/193.167.100.100:443] 30.490 Closing ClientConnection[7bdf9f4692c53b43/1001275ef662c490(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.490 -> Packet A|1|S0|4000008d792f1774|38|2 ConnectionCloseFrame[0|0|] AckFrame[3326952-3326951|Δ0] 30.491 Creating connection with server4:443 with v1 30.491 Setting up connection for downloading https://server4:443/evwlepbida at 46:04.923 on ClientConnection[1282ed602e3d5a22/6fae262a1f8c4e98(V1) with server4/193.167.100.100:443] 30.491 Original destination connection id: 1282ed602e3d5a22 (scid: 6fae262a1f8c4e98) >- CryptoStream[I|ClientHello] 30.492 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.692/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.492 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.526 <- (1) Packet I|3662966|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 30.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 30.728/Handshake, because peerAwaitingAddressValidation | RTT:100/25 30.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.625/Handshake, because peerAwaitingAddressValidation | RTT:33/16 30.528 Discarding pn space Initial because first Handshake message is being sent 30.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.625/Handshake, because peerAwaitingAddressValidation | RTT:33/16 30.528 -> Packet I|1|L|1201|2 Token=[] AckFrame[3662966|Δ0] Padding(1150) 30.624 loss detection timeout handler running 30.625 Sending probe 0. Current RTT: 33/16. 30.625 Sending probe because peer awaiting address validation 30.625 (Probe is a handshake ping) 30.625 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 30.819/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.625 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 30.645 <- (2) Packet H|3662968|L|761|1 CryptoFrame[0,713] 30.646 - unknown transport parameter 0xff0a001, size 1 30.646 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 30.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 30.842/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.648 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.649 Starting downloading https://server4:443/evwlepbida at 46:05.080 on ClientConnection[1282ed602e3d5a22/6fae262a1f8c4e98(V1) with server4/193.167.100.100:443] 30.649 -> Packet H|2|L|49|1 AckFrame[3662968|Δ0] 30.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 30.843/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.649 -> Packet A|0|S0|400000459afb2929|47|1 StreamFrame[0(CIB),0,17,fin] 30.843 loss detection timeout handler running Sending probe 1, because no ack since 30.648. Current RTT: 33/16. 30.843 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.843 (Probe is a handshake retransmit) 30.843 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 31.231/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.843 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 30.844 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 31.232/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.844 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 30.874 <- (3) Packet H|3662969|L|48|1 AckFrame[3-2,0|Δ0] 30.875 probe count not reset on ack because handshake not yet confirmed 30.875 Retransmitting CryptoFrame[0,36] on level Handshake 30.875 Cwnd(-): 6000; inflight: 127 30.875 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 357 millis, based on 31.232/Handshake, because ackElicitingInFlight | RTT:33/16 30.875 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 339 millis, based on 31.215/Handshake, because ackElicitingInFlight | RTT:33/13 30.875 -> Packet H|5|L|80|1 CryptoFrame[0,36] 30.875 <- (4) Packet A|3662967|S0|6fae262a1f8c4e98|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 30.875 <- (5) Packet H|3662970|L|48|1 AckFrame[4-2,0|Δ0] 30.876 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 84 millis, based on 30.960/Handshake, because ackElicitingInFlight | RTT:33/13 30.876 Finished downloading https://server4:443/evwlepbida at 46:05.307 on ClientConnection[1282ed602e3d5a22/6fae262a1f8c4e98(V1) with server4/193.167.100.100:443] 30.876 Closing ClientConnection[1282ed602e3d5a22/6fae262a1f8c4e98(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.878 -> Packet A|1|S0|400000459afb2929|38|2 ConnectionCloseFrame[0|0|] AckFrame[3662967|Δ0] 30.878 Creating connection with server4:443 with v1 30.879 Setting up connection for downloading https://server4:443/wibnlumefb at 46:05.311 on ClientConnection[97ddfe6733bbe2f5/91736f73d5e2764d(V1) with server4/193.167.100.100:443] 30.879 Original destination connection id: 97ddfe6733bbe2f5 (scid: 91736f73d5e2764d) >- CryptoStream[I|ClientHello] 30.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.080/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.880 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.906 <- (6) Packet H|3662971|L|48|1 AckFrame[5-2,0|Δ0] 30.906 -> Packet H|6|L|53|2 ConnectionCloseFrame[0|0|] AckFrame[3662970-3662969|Δ0] 30.909 <- (7) Packet A|3662968|S0|6fae262a1f8c4e98|43|1 ConnectionCloseFrame[0|28|Peer closed] 30.914 <- (1) Packet I|10546478|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ1] Padding(1053) -< CryptoStream[I|ServerHello] 30.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 31.116/Handshake, because peerAwaitingAddressValidation | RTT:100/25 30.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.013/Handshake, because peerAwaitingAddressValidation | RTT:33/16 30.916 Discarding pn space Initial because first Handshake message is being sent 30.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.013/Handshake, because peerAwaitingAddressValidation | RTT:33/16 30.916 -> Packet I|1|L|1201|2 Token=[] AckFrame[10546478|Δ0] Padding(1150) 30.914 <- (2) Packet H|10546478|L|762|1 CryptoFrame[0,713] 30.917 - unknown transport parameter 0xff0a001, size 1 30.917 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 30.919 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.016/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.919 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.920 Starting downloading https://server4:443/wibnlumefb at 46:05.351 on ClientConnection[97ddfe6733bbe2f5/91736f73d5e2764d(V1) with server4/193.167.100.100:443] 30.920 -> Packet H|1|L|49|1 AckFrame[10546478|Δ0] 30.920 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.017/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.920 -> Packet A|0|S0|4000009eeae11588|47|1 StreamFrame[0(CIB),0,17,fin] 30.950 <- (3) Packet H|10546479|L|49|1 AckFrame[0|Δ0] 30.951 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 30.951 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 30.950 <- (4) Packet A|10546478|S0|91736f73d5e2764d|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000009f4c2a0e04|9809cd060a3229c155b2ea286ad41485] Padding(24) -< CryptoStream[A|NewSessionTicket] 30.951 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 31.030/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 31.030/App, because ackElicitingInFlight | RTT:33/13 30.951 Discarding pn space Handshake because HandshakeDone is received 30.952 <- (5) Packet A|10546479|S0|91736f73d5e2764d|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 30.952 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 30.952 -> Packet A|1|S0|4000009eeae11588|34|1 AckFrame[10546479-10546478|Δ0] 30.952 Finished downloading https://server4:443/wibnlumefb at 46:05.384 on ClientConnection[97ddfe6733bbe2f5/91736f73d5e2764d(V1) with server4/193.167.100.100:443] 30.952 Closing ClientConnection[97ddfe6733bbe2f5/91736f73d5e2764d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.953 -> Packet A|2|S0|4000009eeae11588|38|2 ConnectionCloseFrame[0|0|] AckFrame[10546479-10546478|Δ0] 30.953 Creating connection with server4:443 with v1 30.953 Setting up connection for downloading https://server4:443/cuzjktbtbt at 46:05.385 on ClientConnection[4e0464782ca83677/e4047b87a9614c26(V1) with server4/193.167.100.100:443] 30.954 Original destination connection id: 4e0464782ca83677 (scid: e4047b87a9614c26) >- CryptoStream[I|ClientHello] 30.955 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.155/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.955 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.983 <- (6) Packet A|10546480|S0|91736f73d5e2764d|41|1 ConnectionCloseFrame[0|28|Peer closed] 30.988 <- (1) Packet I|5162827|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1054) -< CryptoStream[I|ServerHello] 30.990 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 31.190/Handshake, because peerAwaitingAddressValidation | RTT:100/25 30.991 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.088/Handshake, because peerAwaitingAddressValidation | RTT:33/16 30.991 Discarding pn space Initial because first Handshake message is being sent 30.991 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.088/Handshake, because peerAwaitingAddressValidation | RTT:33/16 30.989 <- (2) Packet H|5162827|L|762|1 CryptoFrame[0,714] 30.991 -> Packet I|1|L|1201|2 Token=[] AckFrame[5162827|Δ0] Padding(1150) 30.991 - unknown transport parameter 0xff0a001, size 1 30.991 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 30.993 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.090/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.993 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.993 Starting downloading https://server4:443/cuzjktbtbt at 46:05.425 on ClientConnection[4e0464782ca83677/e4047b87a9614c26(V1) with server4/193.167.100.100:443] 30.993 -> Packet H|1|L|49|1 AckFrame[5162827|Δ0] 30.994 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.091/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.994 -> Packet A|0|S0|400000da9c6c5543|47|1 StreamFrame[0(CIB),0,17,fin] 31.090 loss detection timeout handler running Sending probe 0, because no ack since 30.993. Current RTT: 33/16. 31.090 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.090 (Probe is a handshake retransmit) 31.091 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 31.285/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 31.090 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 31.122 <- (3) Packet H|5162828|L|46|1 AckFrame[2-1|Δ0] 31.122 probe count not reset on ack because handshake not yet confirmed 31.122 Retransmitting CryptoFrame[0,36] on level Handshake 31.122 Cwnd(-): 6000; inflight: 47 31.122 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 31.122 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 31.122 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 169 millis, based on 31.292/Handshake, because ackElicitingInFlight | RTT:33/13 31.122 -> Packet H|3|L|80|1 CryptoFrame[0,36] 31.123 <- (4) Packet A|5162828|S0|e4047b87a9614c26|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(16) 31.123 Finished downloading https://server4:443/cuzjktbtbt at 46:05.555 on ClientConnection[4e0464782ca83677/e4047b87a9614c26(V1) with server4/193.167.100.100:443] 31.123 Closing ClientConnection[4e0464782ca83677/e4047b87a9614c26(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.124 -> Packet A|1|S0|400000da9c6c5543|38|2 ConnectionCloseFrame[0|0|] AckFrame[5162828|Δ0] 31.124 Creating connection with server4:443 with v1 31.124 Setting up connection for downloading https://server4:443/yfyxbxcrcc at 46:05.556 on ClientConnection[ec2ca02bc72fb77e/2b10a58285fbebde(V1) with server4/193.167.100.100:443] 31.124 Original destination connection id: ec2ca02bc72fb77e (scid: 2b10a58285fbebde) >- CryptoStream[I|ClientHello] 31.126 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.326/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.125 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.154 <- (5) Packet A|5162829|S0|e4047b87a9614c26|43|1 ConnectionCloseFrame[0|28|Peer closed] 31.154 <- (6) Packet H|5162830|L|57|1 ConnectionCloseFrame[0|28|Peer closed] 31.159 <- (1) Packet I|13289470|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 31.161 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 31.361/Handshake, because peerAwaitingAddressValidation | RTT:100/25 31.161 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.258/Handshake, because peerAwaitingAddressValidation | RTT:33/16 31.161 Discarding pn space Initial because first Handshake message is being sent 31.161 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.258/Handshake, because peerAwaitingAddressValidation | RTT:33/16 31.159 <- (2) Packet H|13289470|L|762|1 CryptoFrame[0,713] 31.161 -> Packet I|1|L|1201|2 Token=[] AckFrame[13289470|Δ0] Padding(1150) 31.161 - unknown transport parameter 0xff0a001, size 1 31.161 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 31.163 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.260/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 31.163 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.164 Starting downloading https://server4:443/yfyxbxcrcc at 46:05.595 on ClientConnection[ec2ca02bc72fb77e/2b10a58285fbebde(V1) with server4/193.167.100.100:443] 31.164 -> Packet H|1|L|49|1 AckFrame[13289470|Δ0] 31.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.261/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 31.164 -> Packet A|0|S0|40000098ea29e93c|47|1 StreamFrame[0(CIB),0,17,fin] 31.194 <- (3) Packet H|13289471|L|49|1 AckFrame[0|Δ0] 31.194 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 31.194 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 31.194 <- (4) Packet A|13289470|S0|2b10a58285fbebde|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000089881f8e2c|26d787c7d132f19577e32ef0df0628cf] Padding(24) -< CryptoStream[A|NewSessionTicket] 31.195 State is set to Confirmed reschedule loss detection timer for PTO over 79 millis, based on 31.274/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 78 millis, based on 31.274/App, because ackElicitingInFlight | RTT:33/13 31.195 Discarding pn space Handshake because HandshakeDone is received 31.195 <- (5) Packet A|13289471|S0|2b10a58285fbebde|1072|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(10) 31.196 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.196 -> Packet A|1|S0|40000098ea29e93c|34|1 AckFrame[13289471-13289470|Δ0] 31.196 Finished downloading https://server4:443/yfyxbxcrcc at 46:05.628 on ClientConnection[ec2ca02bc72fb77e/2b10a58285fbebde(V1) with server4/193.167.100.100:443] 31.196 Closing ClientConnection[ec2ca02bc72fb77e/2b10a58285fbebde(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.196 -> Packet A|2|S0|40000098ea29e93c|38|2 ConnectionCloseFrame[0|0|] AckFrame[13289471-13289470|Δ0] 31.196 Creating connection with server4:443 with v1 31.197 Setting up connection for downloading https://server4:443/hxodvrrdgn at 46:05.629 on ClientConnection[215028b515467c42/ea63f856ba2dacc7(V1) with server4/193.167.100.100:443] 31.197 Original destination connection id: 215028b515467c42 (scid: ea63f856ba2dacc7) >- CryptoStream[I|ClientHello] 31.198 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.398/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.198 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.227 <- (6) Packet A|13289472|S0|2b10a58285fbebde|41|1 ConnectionCloseFrame[0|28|Peer closed] 31.342 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 31.397 loss detection timeout handler running Sending probe 0, because no ack since 31.198. Current RTT: 100/25. 31.397 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 31.397 (Probe is an initial retransmit) 31.398 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.798/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.398 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.552 <- (2) Packet I|14957653|L|1232|2 Token=[] AckFrame[1-0|Δ121] Padding(1180) 31.552 probe count not reset on ack because handshake not yet confirmed 31.553 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.953/Initial, because peerAwaitingAddressValidation | RTT:100/25 31.553 Discarding packet (761 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 31.952 loss detection timeout handler running Sending probe 1, because no ack since 31.398. Current RTT: 154/77. 31.952 Sending probe because peer awaiting address validation 31.952 (Probe is Initial ping, because there is no Initial data to retransmit) 31.952 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1847 millis, based on 33.800/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:154/77 31.952 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 31.962 <- (4) Packet I|14957655|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[1-0|Δ532] Padding(1050) -< CryptoStream[I|ServerHello] 31.965 probe count not reset on ack because handshake not yet confirmed 31.965 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1847 millis, based on 33.813/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:154/77 31.965 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 461 millis, based on 32.427/Handshake, because peerAwaitingAddressValidation | RTT:154/77 31.965 Discarding pn space Initial because first Handshake message is being sent 31.965 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 461 millis, based on 32.427/Handshake, because peerAwaitingAddressValidation | RTT:154/77 31.965 -> Packet I|3|L|1201|2 Token=[] AckFrame[14957655,14957653|Δ0] Padding(1148) 32.426 loss detection timeout handler running 32.426 Sending probe 0. Current RTT: 154/77. 32.426 Sending probe because peer awaiting address validation 32.426 (Probe is a handshake ping) 32.427 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 923 millis, based on 33.351/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:154/77 32.427 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 32.499 <- (5) Packet H|14957659|L|761|1 CryptoFrame[0,712] 32.499 - unknown transport parameter 0xff0a001, size 1 32.499 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 32.501 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 923 millis, based on 33.425/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:154/77 32.501 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.502 Starting downloading https://server4:443/hxodvrrdgn at 46:06.933 on ClientConnection[215028b515467c42/ea63f856ba2dacc7(V1) with server4/193.167.100.100:443] 32.502 -> Packet H|2|L|49|1 AckFrame[14957659|Δ0] 32.502 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 923 millis, based on 33.426/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:154/77 32.502 -> Packet A|0|S0|4000001d4da84d95|47|1 StreamFrame[0(CIB),0,17,fin] 32.532 <- (6) Packet H|14957660|L|49|1 AckFrame[1-0|Δ0] 32.533 probe count not reset on ack because handshake not yet confirmed 32.533 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 32.533 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 32.533 <- (7) Packet A|14957650|S0|ea63f856ba2dacc7|48|2 AckFrame[0|Δ0] Padding(14) 32.533 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 32.534 <- (8) Packet A|14957651|S0|ea63f856ba2dacc7|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 32.534 Finished downloading https://server4:443/hxodvrrdgn at 46:06.966 on ClientConnection[215028b515467c42/ea63f856ba2dacc7(V1) with server4/193.167.100.100:443] 32.534 Closing ClientConnection[215028b515467c42/ea63f856ba2dacc7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.534 -> Packet A|1|S0|4000001d4da84d95|38|2 ConnectionCloseFrame[0|0|] AckFrame[14957651-14957650|Δ0] 32.535 Creating connection with server4:443 with v1 32.535 Setting up connection for downloading https://server4:443/rpvozehujj at 46:06.967 on ClientConnection[09ca6781e0185797/fdb7fbfc62e29470(V1) with server4/193.167.100.100:443] 32.535 Original destination connection id: 09ca6781e0185797 (scid: fdb7fbfc62e29470) >- CryptoStream[I|ClientHello] 32.536 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.736/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.536 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.570 Discarding packet (762 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 32.643 <- (9) Packet A|14957653|S0|ea63f856ba2dacc7|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000006bb384c9|9b8a83efda43253116993d5426de2d5f] Padding(1) 32.644 <- (10) Packet A|14957654|S0|ea63f856ba2dacc7|313|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|400000006bb384c9|9b8a83efda43253116993d5426de2d5f] Padding(1) 32.644 -> Packet A|2|S0|4000001d4da84d95|38|2 ConnectionCloseFrame[0|0|] AckFrame[14957651-14957650|Δ0] 32.644 -> Packet A|3|S0|4000001d4da84d95|38|2 ConnectionCloseFrame[0|0|] AckFrame[14957651-14957650|Δ0] 32.680 <- (2) Packet I|1543040|L|1232|4 Token=[] CryptoFrame[0,123] Padding(1) AckFrame[0|Δ111] Padding(1053) -< CryptoStream[I|ServerHello] 32.683 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 32.883/Handshake, because peerAwaitingAddressValidation | RTT:100/25 32.683 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 33.110/Handshake, because peerAwaitingAddressValidation | RTT:143/71 32.683 Discarding pn space Initial because first Handshake message is being sent 32.683 Packet not sent because keys are discarded: Packet I|1|L|.|2 Token=[] AckFrame[1543040|Δ0] Padding(1150) 32.681 <- (3) Packet H|1543040|L|762|1 CryptoFrame[0,714] 32.683 - unknown transport parameter 0xff0a001, size 1 32.683 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 32.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 33.112/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 32.685 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.685 Starting downloading https://server4:443/rpvozehujj at 46:07.117 on ClientConnection[09ca6781e0185797/fdb7fbfc62e29470(V1) with server4/193.167.100.100:443] 32.685 -> Packet H|1|L|49|1 AckFrame[1543040|Δ0] 32.686 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 426 millis, based on 33.113/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:143/71 32.686 -> Packet A|0|S0|4000004889445c93|47|1 StreamFrame[0(CIB),0,17,fin] 32.716 <- (4) Packet H|1543041|L|48|1 AckFrame[0|Δ0] 32.716 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 32.716 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 32.716 <- (5) Packet A|1543038|S0|fdb7fbfc62e29470|336|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000040381f838a|ea4f70ab61d60d808d08975b903aa394] Padding(25) -< CryptoStream[A|NewSessionTicket] 32.717 State is set to Confirmed reschedule loss detection timer for PTO over 450 millis, based on 33.168/App, because ackElicitingInFlight | RTT:129/82 reschedule loss detection timer for PTO over 450 millis, based on 33.168/App, because ackElicitingInFlight | RTT:129/82 32.717 Discarding pn space Handshake because HandshakeDone is received 32.736 -> Packet A|1|S0|4000004889445c93|35|1 AckFrame[1543038|Δ19] 33.067 <- (6) Packet A|1543044|S0|fdb7fbfc62e29470|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000040381f838a|ea4f70ab61d60d808d08975b903aa394] Padding(1) -< CryptoStream[A|NewSessionTicket] 33.068 <- (7) Packet A|1543045|S0|fdb7fbfc62e29470|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000040381f838a|ea4f70ab61d60d808d08975b903aa394] Padding(1) -< CryptoStream[A|NewSessionTicket] 33.068 -> Packet A|2|S0|4000004889445c93|36|1 AckFrame[1543045-1543044,1543038|Δ0] 33.167 loss detection timeout handler running Sending probe 0, because no ack since 32.686. Current RTT: 129/82. 33.167 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 963 millis, based on 34.131/App, because ackElicitingInFlight | RTT:129/82 33.167 -> Packet PA|3|S0|4000004889445c93|47|1 StreamFrame[0(CIB),0,17,fin] 33.198 <- (8) Packet A|1543046|S0|fdb7fbfc62e29470|48|2 AckFrame[3,0|Δ0] Padding(13) 33.198 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.518 <- (9) Packet A|1543048|S0|fdb7fbfc62e29470|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000040381f838a|ea4f70ab61d60d808d08975b903aa394] Padding(1) -< CryptoStream[A|NewSessionTicket] 33.518 <- (10) Packet A|1543049|S0|fdb7fbfc62e29470|312|4 CryptoFrame[0,250] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|40000040381f838a|ea4f70ab61d60d808d08975b903aa394] Padding(1) -< CryptoStream[A|NewSessionTicket] 33.519 -> Packet A|4|S0|4000004889445c93|38|1 AckFrame[1543049-1543048,1543046-1543044,1543038|Δ0] 33.550 <- (11) Packet A|1543050|S0|fdb7fbfc62e29470|1072|3 AckFrame[4-3,0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(11) 33.551 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.551 Finished downloading https://server4:443/rpvozehujj at 46:07.983 on ClientConnection[09ca6781e0185797/fdb7fbfc62e29470(V1) with server4/193.167.100.100:443] 33.551 Closing ClientConnection[09ca6781e0185797/fdb7fbfc62e29470(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.551 -> Packet A|5|S0|4000004889445c93|38|2 ConnectionCloseFrame[0|0|] AckFrame[1543050|Δ0] 33.552 Creating connection with server4:443 with v1 33.552 Setting up connection for downloading https://server4:443/bpomtbnchl at 46:07.984 on ClientConnection[cb69f0a27cd98f72/8dcb02a44b69be5d(V1) with server4/193.167.100.100:443] 33.552 Original destination connection id: cb69f0a27cd98f72 (scid: 8dcb02a44b69be5d) >- CryptoStream[I|ClientHello] 33.553 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.753/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.553 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.587 <- (1) Packet I|13153518|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[0|Δ0] Padding(1053) -< CryptoStream[I|ServerHello] 33.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.789/Handshake, because peerAwaitingAddressValidation | RTT:100/25 33.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 33.686/Handshake, because peerAwaitingAddressValidation | RTT:33/16 33.589 Discarding pn space Initial because first Handshake message is being sent 33.587 <- (2) Packet H|13153518|L|761|1 CryptoFrame[0,712] 33.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 33.687/Handshake, because peerAwaitingAddressValidation | RTT:33/16 33.589 -> Packet I|1|L|1201|2 Token=[] AckFrame[13153518|Δ0] Padding(1150) 33.590 - unknown transport parameter 0xff0a001, size 1 33.590 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 33.592 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 33.689/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.592 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.592 Starting downloading https://server4:443/bpomtbnchl at 46:08.024 on ClientConnection[cb69f0a27cd98f72/8dcb02a44b69be5d(V1) with server4/193.167.100.100:443] 33.592 -> Packet H|1|L|49|1 AckFrame[13153518|Δ0] 33.592 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 33.689/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.592 -> Packet A|0|S0|40000016ff6ded99|47|1 StreamFrame[0(CIB),0,17,fin] 33.688 loss detection timeout handler running Sending probe 0, because no ack since 33.592. Current RTT: 33/16. 33.689 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.689 (Probe is a handshake retransmit) 33.689 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 33.883/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.689 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 33.721 <- (3) Packet A|13153519|S0|8dcb02a44b69be5d|1072|2 StreamFrame[0(CIB),0,1024,fin] Padding(15) 33.722 Finished downloading https://server4:443/bpomtbnchl at 46:08.153 on ClientConnection[cb69f0a27cd98f72/8dcb02a44b69be5d(V1) with server4/193.167.100.100:443] 33.722 Closing ClientConnection[cb69f0a27cd98f72/8dcb02a44b69be5d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.722 -> Packet A|1|S0|40000016ff6ded99|38|2 ConnectionCloseFrame[0|0|] AckFrame[13153519|Δ0] 33.722 Creating connection with server4:443 with v1 33.723 Setting up connection for downloading https://server4:443/oolglqmyee at 46:08.155 on ClientConnection[71a38a45c5018d8b/17e9aa98efe890df(V1) with server4/193.167.100.100:443] 33.723 Original destination connection id: 71a38a45c5018d8b (scid: 17e9aa98efe890df) >- CryptoStream[I|ClientHello] 33.724 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.924/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.724 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.753 <- (4) Packet A|13153520|S0|8dcb02a44b69be5d|44|1 ConnectionCloseFrame[0|28|Peer closed] 33.753 <- (5) Packet H|13153520|L|57|1 ConnectionCloseFrame[0|28|Peer closed] 33.923 loss detection timeout handler running Sending probe 0, because no ack since 33.724. Current RTT: 100/25. 33.923 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 33.923 (Probe is an initial retransmit) 33.924 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 34.324/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.923 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.323 loss detection timeout handler running Sending probe 1, because no ack since 33.923. Current RTT: 100/25. 34.323 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 34.323 (Probe is an initial retransmit) 34.323 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 35.123/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.323 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.324 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 35.124/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.324 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.357 <- (1) Packet I|4707777|L|1232|3 Token=[] CryptoFrame[0,123] AckFrame[2|Δ1] Padding(1054) -< CryptoStream[I|ServerHello] 34.360 probe count not reset on ack because handshake not yet confirmed 34.360 Retransmitting CryptoFrame[0,257] on level Initial 34.360 Cwnd(-): 6000; inflight: 1200 34.360 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 35.160/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.360 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.457/Handshake, because peerAwaitingAddressValidation | RTT:33/16 34.360 Discarding pn space Initial because first Handshake message is being sent 34.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.458/Handshake, because peerAwaitingAddressValidation | RTT:33/16 34.360 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.357 <- (2) Packet H|4707777|L|761|1 CryptoFrame[0,713] 34.361 Packet not sent because keys are discarded: Packet I|5|L|.|2 Token=[] AckFrame[4707777|Δ0] Padding(1150) 34.361 - unknown transport parameter 0xff0a001, size 1 34.361 - unknown transport parameter 0x5178, size 1 >- CryptoStream[H|Finished] 34.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.460/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.363 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 34.364 Starting downloading https://server4:443/oolglqmyee at 46:08.795 on ClientConnection[71a38a45c5018d8b/17e9aa98efe890df(V1) with server4/193.167.100.100:443] 34.364 -> Packet H|1|L|49|1 AckFrame[4707777|Δ0] 34.364 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.461/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.364 -> Packet A|0|S0|40000041176a87aa|47|1 StreamFrame[0(CIB),0,17,fin] 34.460 loss detection timeout handler running Sending probe 0, because no ack since 34.363. Current RTT: 33/16. 34.460 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 34.460 (Probe is a handshake retransmit) 34.461 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 34.655/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.460 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 34.654 loss detection timeout handler running Sending probe 1, because no ack since 34.364. Current RTT: 33/16. 34.654 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 34.654 (Probe is a handshake retransmit) 34.654 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 35.042/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.654 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 34.655 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 35.043/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.655 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 34.686 <- (3) Packet A|4707777|S0|17e9aa98efe890df|336|5 CryptoFrame[0,250] AckFrame[0|Δ291] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4000004a45221977|66cbea618f897af7a18ed98bf366a69d] Padding(17) -< CryptoStream[A|NewSessionTicket] 34.687 probe count not reset on ack because handshake not yet confirmed 34.687 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 35.075/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.687 State is set to Confirmed reschedule loss detection timer for PTO over 1479 millis, based on 36.167/Handshake, because ackElicitingInFlight | RTT:66/78 34.687 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 34.687 Discarding pn space Handshake because HandshakeDone is received 34.707 -> Packet A|1|S0|40000041176a87aa|35|1 AckFrame[4707777|Δ19] 34.816 <- (4) Packet A|4707780|S0|17e9aa98efe890df|1055|2 StreamFrame[0(CIB),0,1024,fin] Padding(1) 34.816 <- (5) Packet A|4707781|S0|17e9aa98efe890df|48|2 AckFrame[1|Δ78] Padding(16) 34.817 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 34.817 Finished downloading https://server4:443/oolglqmyee at 46:09.249 on ClientConnection[71a38a45c5018d8b/17e9aa98efe890df(V1) with server4/193.167.100.100:443] 34.817 Closing ClientConnection[71a38a45c5018d8b/17e9aa98efe890df(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 34.818 -> Packet A|2|S0|40000041176a87aa|38|2 ConnectionCloseFrame[0|0|] AckFrame[4707781-4707780|Δ0]