d69fa8758bece236: No root crt list specified -- certificate will not be verified. d69fa8758bece236: Sending ALPN list (1): hq-interop d69fa8758bece236: Sending transport parameter TLS extension (85 bytes): d69fa8758bece236: Extension list (85 bytes): d69fa8758bece236: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 d69fa8758bece236: Extension type: 4 (initial_max_data), length 4, 80100000 d69fa8758bece236: Extension type: 8 (max_streams_bidi), length 2, 4200 d69fa8758bece236: Extension type: 1 (idle_timeout), length 4, 8002bf20 d69fa8758bece236: Extension type: 3 (max_packet_size), length 2, 45a0 d69fa8758bece236: Extension type: 9 (max_streams_uni), length 2, 4200 d69fa8758bece236: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 d69fa8758bece236: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff d69fa8758bece236: Extension type: 14 (active_connection_id_limit), length 1, 08 d69fa8758bece236: Extension type: 11 (max_ack_delay), length 1, 0a d69fa8758bece236: Extension type: 15 (hcid), length 8, 5f7e340c44367bad d69fa8758bece236: Extension type: 6692 (unknown), length 4, 80009fa8 d69fa8758bece236: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 d69fa8758bece236: Extension type: 29016 (enable_time_stamp), length 1, 03 d69fa8758bece236: Extension type: 10930 (grease_quic_bit), length 0 d69fa8758bece236: Preparing GET on stream 0 for /few-zesty-shirt d69fa8758bece236: Sending packet type: 2 (initial), S0, Q1, Version 1, d69fa8758bece236: , <5f7e340c44367bad>, Seq: 117253, pl: 553 d69fa8758bece236: Token length: 0 d69fa8758bece236: Prepared 533 bytes d69fa8758bece236: ping, 1 bytes d69fa8758bece236: crypto_hs, offset 0, length 528: 0100020c0303434a... d69fa8758bece236: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, d69fa8758bece236: , <5f7e340c44367bad>, Seq: 0, pl: 648 d69fa8758bece236: Prepared 628 bytes d69fa8758bece236: stream 0, offset 0, length 22, fin = 1: 474554202f666577... d69fa8758bece236: padding, 603 bytes d69fa8758bece236: Sending 1252 bytes to 193.167.100.100:443 at T=0.001924 (2a7636e3) d69fa8758bece236: Receiving 217 bytes from 193.167.100.100:443 at T=0.035511 (2a76ba16) d69fa8758bece236: T= 0.035511, Keys unavailable, buffered packet type 4. d69fa8758bece236: Receiving 1072 bytes from 193.167.100.100:443 at T=0.036415 (2a76bd9e) d69fa8758bece236: T= 0.036415, Keys unavailable, buffered packet type 6. d69fa8758bece236: T= 0.090801, Lost packet type 2, number 117253, size 563, DCID <>, reason: timer d69fa8758bece236: Sending packet type: 2 (initial), S0, Q1, Version 1, d69fa8758bece236: , <5f7e340c44367bad>, Seq: 117254, pl: 553 d69fa8758bece236: Token length: 0 d69fa8758bece236: Prepared 533 bytes d69fa8758bece236: ping, 1 bytes d69fa8758bece236: crypto_hs, offset 0, length 528: 0100020c0303434a... d69fa8758bece236: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, d69fa8758bece236: , <5f7e340c44367bad>, Seq: 1, pl: 648 d69fa8758bece236: Prepared 628 bytes d69fa8758bece236: padding, 628 bytes d69fa8758bece236: Sending 1252 bytes to 193.167.100.100:443 at T=0.090801 (2a779210) d69fa8758bece236: Receiving 217 bytes from 193.167.100.100:443 at T=0.145043 (2a7865f2) d69fa8758bece236: T= 0.145043, Keys unavailable, buffered packet type 4. d69fa8758bece236: Receiving 1058 bytes from 193.167.100.100:443 at T=0.145861 (2a786924) d69fa8758bece236: T= 0.145861, Keys unavailable, buffered packet type 6. d69fa8758bece236: T= 0.268528, Lost packet type 2, number 117254, size 563, DCID <>, reason: timer d69fa8758bece236: Sending packet type: 2 (initial), S0, Q1, Version 1, d69fa8758bece236: , <5f7e340c44367bad>, Seq: 117255, pl: 553 d69fa8758bece236: Token length: 0 d69fa8758bece236: Prepared 533 bytes d69fa8758bece236: ping, 1 bytes d69fa8758bece236: crypto_hs, offset 0, length 528: 0100020c0303434a... d69fa8758bece236: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, d69fa8758bece236: , <5f7e340c44367bad>, Seq: 2, pl: 648 d69fa8758bece236: Prepared 628 bytes d69fa8758bece236: padding, 628 bytes d69fa8758bece236: Sending 1252 bytes to 193.167.100.100:443 at T=0.268528 (2a7a484f) d69fa8758bece236: Receiving 48 bytes from 193.167.100.100:443 at T=0.301463 (2a7ac8f6) d69fa8758bece236: T= 0.301463, Keys unavailable, buffered packet type 6. d69fa8758bece236: Receiving 1232 bytes from 193.167.100.100:443 at T=0.364749 (2a7bc02c) d69fa8758bece236: Receiving packet type: 2 (initial), S0, Q1, Version 1, d69fa8758bece236: <5f7e340c44367bad>, <40000081bdc121e5>, Seq: 14259783, pl: 1206 d69fa8758bece236: Token length: 0 d69fa8758bece236: Decrypted 1186 bytes d69fa8758bece236: crypto_hs, offset 0, length 96: 0200005c0303900c... d69fa8758bece236: padding, 1 bytes d69fa8758bece236: ack (nb=1), 117255, 117253 d69fa8758bece236: padding, 1074 bytes d69fa8758bece236: Receiving 217 bytes from 193.167.100.100:443 at T=0.365104 (2a7bc18f) d69fa8758bece236: Receiving packet type: 4 (handshake), S0, Q1, Version 1, d69fa8758bece236: <5f7e340c44367bad>, <40000081bdc121e5>, Seq: 14259780, pl: 192 d69fa8758bece236: Decrypted 172 bytes d69fa8758bece236: crypto_hs, offset 0, length 168: 08000080007e0010... d69fa8758bece236: Received transport parameter TLS extension (101 bytes): d69fa8758bece236: Extension list (101 bytes): d69fa8758bece236: Extension type: 0 (ocid), length 8, d69fa8758bece236 d69fa8758bece236: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 d69fa8758bece236: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 d69fa8758bece236: Extension type: 7 (max_stream_data_uni), length 4, 86666666 d69fa8758bece236: Extension type: 4 (initial_max_data), length 4, 86666666 d69fa8758bece236: Extension type: 8 (max_streams_bidi), length 2, 4064 d69fa8758bece236: Extension type: 9 (max_streams_uni), length 2, 4064 d69fa8758bece236: Extension type: 1 (idle_timeout), length 4, 8000ea60 d69fa8758bece236: Extension type: 10 (ack_delay_exponent), length 1, 03 d69fa8758bece236: Extension type: 3 (max_packet_size), length 2, 45dc d69fa8758bece236: Extension type: 2 (stateless_reset_token), length 16, 759c5fba81ec578bb08ec99037103f4a d69fa8758bece236: Extension type: 15 (hcid), length 8, 40000081bdc121e5 d69fa8758bece236: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff d69fa8758bece236: Extension type: 267427841 (unknown), length 1, 00 d69fa8758bece236: Extension type: 20856 (unknown), length 1, 01 d69fa8758bece236: Receiving 1072 bytes from 193.167.100.100:443 at T=0.365104 (2a7bc18f) d69fa8758bece236: Receiving packet type: 6 (1rtt protected), S0, Q1, d69fa8758bece236: <5f7e340c44367bad>, Seq: 14259779 (14259779), Phi: 0, d69fa8758bece236: Decrypted 1043 bytes d69fa8758bece236: stream 0, offset 0, length 1024, fin = 1: 9f4897bc84216135... d69fa8758bece236: padding, 15 bytes d69fa8758bece236: T= 0.365104, cwin: 16486,flight: 2019,nb_ret: 2,rtt_min: 35511,rtt: 43099,rtt_var: 28493,max_ack_delay: 0,state: 10 d69fa8758bece236: Receiving 217 bytes from 193.167.100.100:443 at T=0.365104 (2a7bc18f) d69fa8758bece236: Receiving packet type: 4 (handshake), S0, Q1, Version 1, d69fa8758bece236: <5f7e340c44367bad>, <40000081bdc121e5>, Seq: 14259778, pl: 192 d69fa8758bece236: Decrypted 172 bytes d69fa8758bece236: crypto_hs, offset 0, length 168: 08000080007e0010... d69fa8758bece236: Sending packet type: 4 (handshake), S0, Q1, Version 1, d69fa8758bece236: <40000081bdc121e5>, <5f7e340c44367bad>, Seq: 0, pl: 72 d69fa8758bece236: Prepared 52 bytes d69fa8758bece236: ack (nb=1), 14259780, 14259778 d69fa8758bece236: crypto_hs, offset 0, length 36: 14000020c2df91ef... d69fa8758bece236: T= 0.365104, Lost packet type 5, number 0, size 657, DCID <40000081bdc121e5>, reason: timer d69fa8758bece236: Sending packet type: 6 (1rtt protected), S1, Q1, d69fa8758bece236: <40000081bdc121e5>, Seq: 3 (3), Phi: 0, d69fa8758bece236: Prepared 157 bytes d69fa8758bece236: ack (nb=0), 14259779 d69fa8758bece236: new_connection_id[1]: 0x02beb618b6edfd57, e87236e438149349aa35ff38816dbe3f d69fa8758bece236: stream 0, offset 0, length 22, fin = 1: 474554202f666577... d69fa8758bece236: padding, 93 bytes d69fa8758bece236: T= 0.365104, cwin: 16486,flight: 1626,nb_ret: 3,rtt_min: 35511,rtt: 43099,rtt_var: 28493,max_ack_delay: 0,state: 13 d69fa8758bece236: Sending 280 bytes to 193.167.100.100:443 at T=0.365104 (2a7bc18f) d69fa8758bece236: Receiving 48 bytes from 193.167.100.100:443 at T=0.365104 (2a7bc18f) d69fa8758bece236: Receiving packet type: 6 (1rtt protected), S0, Q1, d69fa8758bece236: <5f7e340c44367bad>, Seq: 14259782 (14259782), Phi: 0, d69fa8758bece236: Decrypted 19 bytes d69fa8758bece236: ack (nb=1), 2, 0 d69fa8758bece236: padding, 12 bytes d69fa8758bece236: T= 0.365104, Lost packet type 5, number 1, size 657, DCID <40000081bdc121e5>, reason: repeat d69fa8758bece236: T= 0.365104, cwin: 17143,flight: 280,nb_ret: 4,rtt_min: 35511,rtt: 49783,rtt_var: 34739,max_ack_delay: 0,state: 13 d69fa8758bece236: Receiving 1058 bytes from 193.167.100.100:443 at T=0.365104 (2a7bc18f) d69fa8758bece236: Receiving packet type: 6 (1rtt protected), S0, Q1, d69fa8758bece236: <5f7e340c44367bad>, Seq: 14259781 (14259781), Phi: 0, d69fa8758bece236: Decrypted 1029 bytes d69fa8758bece236: stream 0, offset 0, length 1024, fin = 1: 9f4897bc84216135... d69fa8758bece236: padding, 1 bytes d69fa8758bece236: T= 0.365104, cwin: 17143,flight: 280,nb_ret: 4,rtt_min: 35511,rtt: 49783,rtt_var: 34739,max_ack_delay: 0,state: 13 d69fa8758bece236: Sending packet type: 6 (1rtt protected), S1, Q1, d69fa8758bece236: <40000081bdc121e5>, Seq: 4 (4), Phi: 0, d69fa8758bece236: Prepared 29 bytes d69fa8758bece236: ack (nb=1), 14259781-14259782, 14259779 d69fa8758bece236: padding, 18 bytes d69fa8758bece236: T= 0.365104, cwin: 17143,flight: 335,nb_ret: 4,rtt_min: 35511,rtt: 49783,rtt_var: 34739,max_ack_delay: 0,state: 13 d69fa8758bece236: Sending 55 bytes to 193.167.100.100:443 at T=0.365104 (2a7bc18f) d69fa8758bece236: Connection established. Version = 1, I-CID: d69fa8758bece236, verified: 1 d69fa8758bece236: Receiving 1058 bytes from 193.167.100.100:443 at T=0.365733 (2a7bc404) d69fa8758bece236: Receiving packet type: 6 (1rtt protected), S0, Q1, d69fa8758bece236: <5f7e340c44367bad>, Seq: 14259784 (14259784), Phi: 0, d69fa8758bece236: Decrypted 1029 bytes d69fa8758bece236: stream 0, offset 0, length 1024, fin = 1: 9f4897bc84216135... d69fa8758bece236: padding, 1 bytes d69fa8758bece236: T= 0.365733, cwin: 17143,flight: 335,nb_ret: 4,rtt_min: 35511,rtt: 49783,rtt_var: 34739,max_ack_delay: 0,state: 13 d69fa8758bece236: All done, Closing the connection. d69fa8758bece236: Sending packet type: 6 (1rtt protected), S1, Q1, d69fa8758bece236: <40000081bdc121e5>, Seq: 5 (5), Phi: 0, d69fa8758bece236: Prepared 15 bytes d69fa8758bece236: ack (nb=2), 14259784, 14259781-14259782, 14259779 d69fa8758bece236: application_close, Error 0x0000, Reason length 0 d69fa8758bece236: Sending 41 bytes to 193.167.100.100:443 at T=0.365779 (2a7bc432) d69fa8758bece236: Receiving 46 bytes from 193.167.100.100:443 at T=0.396490 (2a7c3c29) d69fa8758bece236: Receiving packet type: 4 (handshake), S0, Q1, Version 1, d69fa8758bece236: <5f7e340c44367bad>, <40000081bdc121e5>, Seq: 71, pl: 22 d69fa8758bece236: Decrypted 5 bytes d69fa8758bece236: ack (nb=0), 0 d69fa8758bece236: Receiving 400 bytes from 193.167.100.100:443 at T=0.396797 (2a7c3d5c) d69fa8758bece236: Receiving packet type: 6 (1rtt protected), S0, Q1, d69fa8758bece236: <5f7e340c44367bad>, Seq: 73 (14259785), Phi: 0, d69fa8758bece236: Decrypted 374 bytes d69fa8758bece236: crypto_hs, offset 0, length 250: 040000f600000e10... d69fa8758bece236: ack (nb=1), 2-3, 0 d69fa8758bece236: handshake_done d69fa8758bece236: new_connection_id[1]: 0x4000009b209bad21, 67a7dae08b19d3de060f2f0dd77a0080 d69fa8758bece236: new_connection_id[2]: 0x40000097b8169d54, 4ad6b685d6ec0275fd8761e35464d5df d69fa8758bece236: new_connection_id[3]: 0x4000009b55b11dc7, 7ad535f54deb6a03007689e2fba7ccb7 d69fa8758bece236: new_connection_id[4]: 0x40000092ea4a552e, 3dcebcfbff0137c81329974ee838e4fa d69fa8758bece236: Receiving 41 bytes from 193.167.100.100:443 at T=0.396867 (2a7c3da2) d69fa8758bece236: Receiving packet type: 6 (1rtt protected), S0, Q1, d69fa8758bece236: <5f7e340c44367bad>, Seq: 74 (14259786), Phi: 0, d69fa8758bece236: Decrypted 15 bytes d69fa8758bece236: connection_close, Error 0x0000, Offending frame 0x1c, Reason length 11 d69fa8758bece236: Reason: Peer closed d69fa8758bece236: Out of 3 zero RTT packets, 2 were acked by the server. d69fa8758bece236: Received 1024 bytes in 0.396956 seconds, 0.020637 Mbps. d69fa8758bece236: Sent 22 bytes in 0.396956 seconds, 0.000443 Mbps.