4e28922290e470fa: No root crt list specified -- certificate will not be verified. 4e28922290e470fa: Sending ALPN list (1): hq-interop 4e28922290e470fa: Sending transport parameter TLS extension (83 bytes): 4e28922290e470fa: Extension list (83 bytes): 4e28922290e470fa: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 4e28922290e470fa: Extension type: 4 (initial_max_data), length 4, 80100000 4e28922290e470fa: Extension type: 8 (max_streams_bidi), length 2, 4200 4e28922290e470fa: Extension type: 1 (idle_timeout), length 4, 8002bf20 4e28922290e470fa: Extension type: 3 (max_packet_size), length 2, 45a0 4e28922290e470fa: Extension type: 9 (max_streams_uni), length 2, 4200 4e28922290e470fa: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 4e28922290e470fa: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 4e28922290e470fa: Extension type: 14 (active_connection_id_limit), length 1, 08 4e28922290e470fa: Extension type: 11 (max_ack_delay), length 1, 0a 4e28922290e470fa: Extension type: 15 (hcid), length 8, 48bc22531db43daf 4e28922290e470fa: Extension type: 2476 (unknown), length 2, 6892 4e28922290e470fa: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 4e28922290e470fa: Extension type: 29016 (enable_time_stamp), length 1, 03 4e28922290e470fa: Extension type: 10930 (grease_quic_bit), length 0 4e28922290e470fa: Preparing GET on stream 0 for /bdhjvgnsln 4e28922290e470fa: Sending packet type: 2 (initial), S0, Q1, Version 1, 4e28922290e470fa: <4e28922290e470fa>, <48bc22531db43daf>, Seq: 112645, pl: 551 4e28922290e470fa: Token length: 0 4e28922290e470fa: Prepared 531 bytes 4e28922290e470fa: ping, 1 bytes 4e28922290e470fa: crypto_hs, offset 0, length 526: 0100020a03037a57... 4e28922290e470fa: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 4e28922290e470fa: <4e28922290e470fa>, <48bc22531db43daf>, Seq: 0, pl: 650 4e28922290e470fa: Prepared 630 bytes 4e28922290e470fa: stream 0, offset 0, length 17, fin = 1: 474554202f626468... 4e28922290e470fa: padding, 610 bytes 4e28922290e470fa: Sending 1252 bytes to 193.167.100.100:443 at T=0.001912 (38af0269) 4e28922290e470fa: Receiving 1232 bytes from 193.167.100.100:443 at T=0.035112 (38af8419) 4e28922290e470fa: Receiving packet type: 2 (initial), S0, Q1, Version 1, 4e28922290e470fa: <48bc22531db43daf>, <400000c57b06257f>, Seq: 12857337, pl: 1206 4e28922290e470fa: Token length: 0 4e28922290e470fa: Decrypted 1186 bytes 4e28922290e470fa: crypto_hs, offset 0, length 96: 0200005c0303c408... 4e28922290e470fa: ack (nb=0), 112645 4e28922290e470fa: padding, 1077 bytes 4e28922290e470fa: Receiving 217 bytes from 193.167.100.100:443 at T=0.035432 (38af8559) 4e28922290e470fa: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 4e28922290e470fa: <48bc22531db43daf>, <400000c57b06257f>, Seq: 12857337, pl: 192 4e28922290e470fa: Decrypted 172 bytes 4e28922290e470fa: crypto_hs, offset 0, length 168: 08000080007e0010... 4e28922290e470fa: Received transport parameter TLS extension (101 bytes): 4e28922290e470fa: Extension list (101 bytes): 4e28922290e470fa: Extension type: 0 (ocid), length 8, 4e28922290e470fa 4e28922290e470fa: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 4e28922290e470fa: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 4e28922290e470fa: Extension type: 7 (max_stream_data_uni), length 4, 86666666 4e28922290e470fa: Extension type: 4 (initial_max_data), length 4, 86666666 4e28922290e470fa: Extension type: 8 (max_streams_bidi), length 2, 4064 4e28922290e470fa: Extension type: 9 (max_streams_uni), length 2, 4064 4e28922290e470fa: Extension type: 1 (idle_timeout), length 4, 8000ea60 4e28922290e470fa: Extension type: 10 (ack_delay_exponent), length 1, 03 4e28922290e470fa: Extension type: 3 (max_packet_size), length 2, 45dc 4e28922290e470fa: Extension type: 2 (stateless_reset_token), length 16, 4aba32bea3c694fb5d4991bb8cfd8c3f 4e28922290e470fa: Extension type: 15 (hcid), length 8, 400000c57b06257f 4e28922290e470fa: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff 4e28922290e470fa: Extension type: 267427841 (unknown), length 1, 00 4e28922290e470fa: Extension type: 20856 (unknown), length 1, 01 4e28922290e470fa: The session was properly resumed! 4e28922290e470fa: Zero RTT data is accepted! 4e28922290e470fa: Negotiated ALPN: hq-interop 4e28922290e470fa: Sending packet type: 4 (handshake), S0, Q1, Version 1, 4e28922290e470fa: <400000c57b06257f>, <48bc22531db43daf>, Seq: 0, pl: 67 4e28922290e470fa: Prepared 47 bytes 4e28922290e470fa: ack (nb=0), 12857337 4e28922290e470fa: crypto_hs, offset 0, length 36: 140000208a70b0ac... 4e28922290e470fa: Sending packet type: 6 (1rtt protected), S0, Q1, 4e28922290e470fa: <400000c57b06257f>, Seq: 1 (1), Phi: 0, 4e28922290e470fa: Prepared 29 bytes 4e28922290e470fa: new_connection_id[1]: 0x4a92f760894ec5cb, c86c2a91615b9a952adb20ca67bab03b 4e28922290e470fa: padding, 1 bytes 4e28922290e470fa: T= 0.035613, cwin: 15921,flight: 822,nb_ret: 0,rtt_min: 33200,rtt: 33200,rtt_var: 16600,max_ack_delay: 0,state: 13 4e28922290e470fa: Sending 147 bytes to 193.167.100.100:443 at T=0.035613 (38af860e) 4e28922290e470fa: Connection established. Version = 1, I-CID: 4e28922290e470fa, verified: 1 4e28922290e470fa: Receiving 46 bytes from 193.167.100.100:443 at T=0.066550 (38affee7) 4e28922290e470fa: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 4e28922290e470fa: <48bc22531db43daf>, <400000c57b06257f>, Seq: 250, pl: 22 4e28922290e470fa: Decrypted 5 bytes 4e28922290e470fa: ack (nb=0), 0 4e28922290e470fa: Receiving 432 bytes from 193.167.100.100:443 at T=0.066913 (38b00052) 4e28922290e470fa: Receiving packet type: 6 (1rtt protected), S0, Q1, 4e28922290e470fa: <48bc22531db43daf>, Seq: 12857339 (12857339), Phi: 0, 4e28922290e470fa: Decrypted 403 bytes 4e28922290e470fa: crypto_hs, offset 0, length 250: 040000f600000e10... 4e28922290e470fa: ack (nb=0), 0-1 4e28922290e470fa: handshake_done 4e28922290e470fa: new_connection_id[1]: 0x400000c1d7a1080a, e70843abfaf11834a20fa6b06c0dff8b 4e28922290e470fa: new_connection_id[2]: 0x400000cd4d1ce53d, d230780de54d165d0d049c2ff697d525 4e28922290e470fa: new_connection_id[3]: 0x400000dcdd679472, 03f66e13e666267d8382a56ed391cc35 4e28922290e470fa: new_connection_id[4]: 0x400000dd587fb982, fe56534619646a0717fc813822377e3c 4e28922290e470fa: padding, 31 bytes 4e28922290e470fa: T= 0.066913, cwin: 16695,flight: 0,nb_ret: 0,rtt_min: 30937,rtt: 32674,rtt_var: 10245,max_ack_delay: 0,state: 14 4e28922290e470fa: Sending packet type: 6 (1rtt protected), S1, Q1, 4e28922290e470fa: <400000c57b06257f>, Seq: 2 (2), Phi: 0, 4e28922290e470fa: Prepared 29 bytes 4e28922290e470fa: ack (nb=0), 12857339 4e28922290e470fa: padding, 21 bytes 4e28922290e470fa: T= 0.067004, cwin: 16695,flight: 55,nb_ret: 0,rtt_min: 30937,rtt: 32674,rtt_var: 10245,max_ack_delay: 0,state: 14 4e28922290e470fa: Sending 55 bytes to 193.167.100.100:443 at T=0.067004 (38b000ad) 4e28922290e470fa: Receiving 1058 bytes from 193.167.100.100:443 at T=0.167769 (38b18a4a) 4e28922290e470fa: Receiving packet type: 6 (1rtt protected), S0, Q1, 4e28922290e470fa: <48bc22531db43daf>, Seq: 12857341 (12857341), Phi: 0, 4e28922290e470fa: Decrypted 1029 bytes 4e28922290e470fa: stream 0, offset 0, length 1024, fin = 1: a315c2e178016135... 4e28922290e470fa: padding, 1 bytes 4e28922290e470fa: T= 0.167769, cwin: 1307,flight: 0,nb_ret: 0,rtt_min: 30937,rtt: 32674,rtt_var: 10245,max_ack_delay: 0,state: 14 4e28922290e470fa: All done, Closing the connection. 4e28922290e470fa: Sending packet type: 6 (1rtt protected), S1, Q1, 4e28922290e470fa: <400000c57b06257f>, Seq: 3 (3), Phi: 0, 4e28922290e470fa: Prepared 13 bytes 4e28922290e470fa: ack (nb=1), 12857341, 12857339 4e28922290e470fa: application_close, Error 0x0000, Reason length 0 4e28922290e470fa: Sending 39 bytes to 193.167.100.100:443 at T=0.167945 (38b18afa) 4e28922290e470fa: Receiving 1058 bytes from 193.167.100.100:443 at T=0.168590 (38b18d7f) 4e28922290e470fa: Receiving packet type: 6 (1rtt protected), S0, Q1, 4e28922290e470fa: <48bc22531db43daf>, Seq: 12857342 (12857342), Phi: 0, 4e28922290e470fa: Decrypted 1029 bytes 4e28922290e470fa: stream 0, offset 0, length 1024, fin = 1: a315c2e178016135... 4e28922290e470fa: padding, 1 bytes 4e28922290e470fa: Receiving 41 bytes from 193.167.100.100:443 at T=0.198656 (38b202f1) 4e28922290e470fa: Receiving packet type: 6 (1rtt protected), S0, Q1, 4e28922290e470fa: <48bc22531db43daf>, Seq: 255 (12857343), Phi: 0, 4e28922290e470fa: Decrypted 15 bytes 4e28922290e470fa: connection_close, Error 0x0000, Offending frame 0x1c, Reason length 11 4e28922290e470fa: Reason: Peer closed 4e28922290e470fa: Out of 1 zero RTT packets, 1 were acked by the server. 4e28922290e470fa: Received 1024 bytes in 0.198802 seconds, 0.041207 Mbps. 4e28922290e470fa: Sent 17 bytes in 0.198802 seconds, 0.000684 Mbps.