efc233460ccd4780: No root crt list specified -- certificate will not be verified. efc233460ccd4780: Sending ALPN list (1): hq-interop efc233460ccd4780: Sending transport parameter TLS extension (85 bytes): efc233460ccd4780: Extension list (85 bytes): efc233460ccd4780: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 efc233460ccd4780: Extension type: 4 (initial_max_data), length 4, 80100000 efc233460ccd4780: Extension type: 8 (max_streams_bidi), length 2, 4200 efc233460ccd4780: Extension type: 1 (idle_timeout), length 4, 8002bf20 efc233460ccd4780: Extension type: 3 (max_packet_size), length 2, 45a0 efc233460ccd4780: Extension type: 9 (max_streams_uni), length 2, 4200 efc233460ccd4780: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 efc233460ccd4780: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff efc233460ccd4780: Extension type: 14 (active_connection_id_limit), length 1, 08 efc233460ccd4780: Extension type: 11 (max_ack_delay), length 1, 0a efc233460ccd4780: Extension type: 15 (hcid), length 8, 47c9bde373ce8b12 efc233460ccd4780: Extension type: 7467 (unknown), length 4, 8000c233 efc233460ccd4780: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 efc233460ccd4780: Extension type: 29016 (enable_time_stamp), length 1, 03 efc233460ccd4780: Extension type: 10930 (grease_quic_bit), length 0 efc233460ccd4780: Preparing GET on stream 0 for /jiehaqvehx efc233460ccd4780: Sending packet type: 2 (initial), S0, Q1, Version 1, efc233460ccd4780: , <47c9bde373ce8b12>, Seq: 109237, pl: 553 efc233460ccd4780: Token length: 0 efc233460ccd4780: Prepared 533 bytes efc233460ccd4780: ping, 1 bytes efc233460ccd4780: crypto_hs, offset 0, length 528: 0100020c030395e5... efc233460ccd4780: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, efc233460ccd4780: , <47c9bde373ce8b12>, Seq: 0, pl: 648 efc233460ccd4780: Prepared 628 bytes efc233460ccd4780: stream 0, offset 0, length 17, fin = 1: 474554202f6a6965... efc233460ccd4780: padding, 608 bytes efc233460ccd4780: Sending 1252 bytes to 193.167.100.100:443 at T=0.001944 (48cd92ef) efc233460ccd4780: T= 0.252248, Lost packet type 2, number 109237, size 563, DCID <>, reason: timer efc233460ccd4780: Sending packet type: 2 (initial), S0, Q1, Version 1, efc233460ccd4780: , <47c9bde373ce8b12>, Seq: 109238, pl: 553 efc233460ccd4780: Token length: 0 efc233460ccd4780: Prepared 533 bytes efc233460ccd4780: ping, 1 bytes efc233460ccd4780: crypto_hs, offset 0, length 528: 0100020c030395e5... efc233460ccd4780: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, efc233460ccd4780: , <47c9bde373ce8b12>, Seq: 1, pl: 648 efc233460ccd4780: Prepared 628 bytes efc233460ccd4780: padding, 628 bytes efc233460ccd4780: Sending 1252 bytes to 193.167.100.100:443 at T=0.252248 (48d164af) efc233460ccd4780: Receiving 217 bytes from 193.167.100.100:443 at T=0.285805 (48d1e7c4) efc233460ccd4780: T= 0.285805, Keys unavailable, buffered packet type 4. efc233460ccd4780: Receiving 48 bytes from 193.167.100.100:443 at T=0.285840 (48d1e7e7) efc233460ccd4780: T= 0.285840, Keys unavailable, buffered packet type 6. efc233460ccd4780: Receiving 217 bytes from 193.167.100.100:443 at T=0.396262 (48d3973d) efc233460ccd4780: T= 0.396262, Keys unavailable, buffered packet type 4. efc233460ccd4780: Receiving 1232 bytes from 193.167.100.100:443 at T=0.606845 (48d6cdd4) efc233460ccd4780: Receiving packet type: 2 (initial), S0, Q1, Version 1, efc233460ccd4780: <47c9bde373ce8b12>, <4000001f33283fab>, Seq: 11175824, pl: 1206 efc233460ccd4780: Token length: 0 efc233460ccd4780: Decrypted 1186 bytes efc233460ccd4780: crypto_hs, offset 0, length 96: 0200005c0303c21f... efc233460ccd4780: padding, 1 bytes efc233460ccd4780: ack (nb=0), 109238 efc233460ccd4780: padding, 1074 bytes efc233460ccd4780: Receiving 217 bytes from 193.167.100.100:443 at T=0.607248 (48d6cf67) efc233460ccd4780: Receiving packet type: 4 (handshake), S0, Q1, Version 1, efc233460ccd4780: <47c9bde373ce8b12>, <4000001f33283fab>, Seq: 11175824, pl: 192 efc233460ccd4780: Decrypted 172 bytes efc233460ccd4780: crypto_hs, offset 0, length 168: 08000080007e0010... efc233460ccd4780: Received transport parameter TLS extension (101 bytes): efc233460ccd4780: Extension list (101 bytes): efc233460ccd4780: Extension type: 0 (ocid), length 8, efc233460ccd4780 efc233460ccd4780: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 efc233460ccd4780: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 efc233460ccd4780: Extension type: 7 (max_stream_data_uni), length 4, 86666666 efc233460ccd4780: Extension type: 4 (initial_max_data), length 4, 86666666 efc233460ccd4780: Extension type: 8 (max_streams_bidi), length 2, 4064 efc233460ccd4780: Extension type: 9 (max_streams_uni), length 2, 4064 efc233460ccd4780: Extension type: 1 (idle_timeout), length 4, 8000ea60 efc233460ccd4780: Extension type: 10 (ack_delay_exponent), length 1, 03 efc233460ccd4780: Extension type: 3 (max_packet_size), length 2, 45dc efc233460ccd4780: Extension type: 2 (stateless_reset_token), length 16, 7c465b858f84cb6ec599f36cc7a4c605 efc233460ccd4780: Extension type: 15 (hcid), length 8, 4000001f33283fab efc233460ccd4780: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff efc233460ccd4780: Extension type: 267427841 (unknown), length 1, 00 efc233460ccd4780: Extension type: 20856 (unknown), length 1, 01 efc233460ccd4780: The session was properly resumed! efc233460ccd4780: Zero RTT data is accepted! efc233460ccd4780: Negotiated ALPN: hq-interop efc233460ccd4780: Receiving 217 bytes from 193.167.100.100:443 at T=0.607464 (48d6d03f) efc233460ccd4780: Receiving packet type: 4 (handshake), S0, Q1, Version 1, efc233460ccd4780: <47c9bde373ce8b12>, <4000001f33283fab>, Seq: 11175822, pl: 192 efc233460ccd4780: Decrypted 172 bytes efc233460ccd4780: crypto_hs, offset 0, length 168: 08000080007e0010... efc233460ccd4780: Receiving 48 bytes from 193.167.100.100:443 at T=0.607464 (48d6d03f) efc233460ccd4780: Receiving packet type: 6 (1rtt protected), S0, Q1, efc233460ccd4780: <47c9bde373ce8b12>, Seq: 11175820 (11175820), Phi: 0, efc233460ccd4780: Decrypted 19 bytes efc233460ccd4780: ack (nb=0), 1 efc233460ccd4780: padding, 13 bytes efc233460ccd4780: T= 0.607464, cwin: 43899,flight: 673,nb_ret: 1,rtt_min: 285805,rtt: 302005,rtt_var: 108483,max_ack_delay: 0,state: 10 efc233460ccd4780: Receiving 217 bytes from 193.167.100.100:443 at T=0.607464 (48d6d03f) efc233460ccd4780: Receiving packet type: 4 (handshake), S0, Q1, Version 1, efc233460ccd4780: <47c9bde373ce8b12>, <4000001f33283fab>, Seq: 11175820, pl: 192 efc233460ccd4780: Decrypted 172 bytes efc233460ccd4780: crypto_hs, offset 0, length 168: 08000080007e0010... efc233460ccd4780: Sending packet type: 4 (handshake), S0, Q1, Version 1, efc233460ccd4780: <4000001f33283fab>, <47c9bde373ce8b12>, Seq: 0, pl: 71 efc233460ccd4780: Prepared 51 bytes efc233460ccd4780: ack (nb=2), 11175824, 11175822, 11175820 efc233460ccd4780: crypto_hs, offset 0, length 36: 140000209ed62a50... efc233460ccd4780: T= 0.607464, Lost packet type 5, number 0, size 657, DCID <4000001f33283fab>, reason: repeat efc233460ccd4780: Sending packet type: 6 (1rtt protected), S1, Q1, efc233460ccd4780: <4000001f33283fab>, Seq: 2 (2), Phi: 0, efc233460ccd4780: Prepared 157 bytes efc233460ccd4780: ack (nb=0), 11175820 efc233460ccd4780: new_connection_id[1]: 0x2d1463416330a196, aa4c3fe50692b284fc41f913e308f50d efc233460ccd4780: stream 0, offset 0, length 17, fin = 1: 474554202f6a6965... efc233460ccd4780: padding, 98 bytes efc233460ccd4780: T= 0.607464, cwin: 43899,flight: 279,nb_ret: 2,rtt_min: 285805,rtt: 302005,rtt_var: 108483,max_ack_delay: 0,state: 13 efc233460ccd4780: Sending 279 bytes to 193.167.100.100:443 at T=0.607464 (48d6d03f) efc233460ccd4780: Connection established. Version = 1, I-CID: efc233460ccd4780, verified: 1 efc233460ccd4780: Receiving 217 bytes from 193.167.100.100:443 at T=1.018064 (48dd1427) efc233460ccd4780: Receiving packet type: 4 (handshake), S0, Q1, Version 1, efc233460ccd4780: <47c9bde373ce8b12>, <4000001f33283fab>, Seq: 11175826, pl: 192 efc233460ccd4780: Decrypted 172 bytes efc233460ccd4780: crypto_hs, offset 0, length 168: 08000080007e0010... efc233460ccd4780: Sending packet type: 4 (handshake), S0, Q1, Version 1, efc233460ccd4780: <4000001f33283fab>, <47c9bde373ce8b12>, Seq: 1, pl: 158 efc233460ccd4780: Prepared 138 bytes efc233460ccd4780: ack (nb=3), 11175826, 11175824, 11175822, 11175820 efc233460ccd4780: padding, 124 bytes efc233460ccd4780: T= 1.018178, cwin: 43899,flight: 462,nb_ret: 2,rtt_min: 285805,rtt: 302005,rtt_var: 108483,max_ack_delay: 0,state: 13 efc233460ccd4780: Sending 183 bytes to 193.167.100.100:443 at T=1.018178 (48dd1499) efc233460ccd4780: T= 1.260211, Lost packet type 6, number 2, size 167, DCID <4000001f33283fab>, reason: timer efc233460ccd4780: Sending packet type: 6 (1rtt protected), S1, Q1, efc233460ccd4780: <4000001f33283fab>, Seq: 3 (3), Phi: 0, efc233460ccd4780: Prepared 157 bytes efc233460ccd4780: new_connection_id[1]: 0x2d1463416330a196, aa4c3fe50692b284fc41f913e308f50d efc233460ccd4780: ack (nb=0), 11175820 efc233460ccd4780: stream 0, offset 0, length 17, fin = 1: 474554202f6a6965... efc233460ccd4780: padding, 98 bytes efc233460ccd4780: T= 1.260211, cwin: 43899,flight: 462,nb_ret: 3,rtt_min: 285805,rtt: 302005,rtt_var: 108483,max_ack_delay: 0,state: 13 efc233460ccd4780: Sending 183 bytes to 193.167.100.100:443 at T=1.260211 (48e0c60a) efc233460ccd4780: Receiving 217 bytes from 193.167.100.100:443 at T=1.819188 (48e94d8b) efc233460ccd4780: Receiving packet type: 4 (handshake), S0, Q1, Version 1, efc233460ccd4780: <47c9bde373ce8b12>, <4000001f33283fab>, Seq: 11175828, pl: 192 efc233460ccd4780: Decrypted 172 bytes efc233460ccd4780: crypto_hs, offset 0, length 168: 08000080007e0010... efc233460ccd4780: Sending packet type: 4 (handshake), S0, Q1, Version 1, efc233460ccd4780: <4000001f33283fab>, <47c9bde373ce8b12>, Seq: 2, pl: 158 efc233460ccd4780: Prepared 138 bytes efc233460ccd4780: ack (nb=4), 11175828, 11175826, 11175824, 11175822, 11175820 efc233460ccd4780: padding, 122 bytes efc233460ccd4780: T= 1.819278, cwin: 43899,flight: 645,nb_ret: 3,rtt_min: 285805,rtt: 302005,rtt_var: 108483,max_ack_delay: 0,state: 13 efc233460ccd4780: Sending 183 bytes to 193.167.100.100:443 at T=1.819278 (48e94de5) efc233460ccd4780: T= 2.565924, Lost packet type 6, number 3, size 167, DCID <4000001f33283fab>, reason: timer efc233460ccd4780: Sending packet type: 6 (1rtt protected), S1, Q1, efc233460ccd4780: <4000001f33283fab>, Seq: 4 (4), Phi: 0, efc233460ccd4780: Prepared 157 bytes efc233460ccd4780: new_connection_id[1]: 0x2d1463416330a196, aa4c3fe50692b284fc41f913e308f50d efc233460ccd4780: ack (nb=0), 11175820 efc233460ccd4780: stream 0, offset 0, length 17, fin = 1: 474554202f6a6965... efc233460ccd4780: padding, 98 bytes efc233460ccd4780: T= 2.565924, cwin: 43899,flight: 645,nb_ret: 4,rtt_min: 285805,rtt: 302005,rtt_var: 108483,max_ack_delay: 0,state: 13 efc233460ccd4780: Sending 183 bytes to 193.167.100.100:443 at T=2.565924 (48f4b27b) efc233460ccd4780: T= 3.124799, Lost packet type 4, number 0, size 80, DCID <4000001f33283fab>, reason: timer efc233460ccd4780: Sending packet type: 4 (handshake), S0, Q1, Version 1, efc233460ccd4780: <4000001f33283fab>, <47c9bde373ce8b12>, Seq: 3, pl: 158 efc233460ccd4780: Prepared 138 bytes efc233460ccd4780: crypto_hs, offset 0, length 36: 140000209ed62a50... efc233460ccd4780: ack (nb=4), 11175828, 11175826, 11175824, 11175822, 11175820 efc233460ccd4780: padding, 80 bytes efc233460ccd4780: T= 3.124799, cwin: 43899,flight: 732,nb_ret: 5,rtt_min: 285805,rtt: 302005,rtt_var: 108483,max_ack_delay: 0,state: 13 efc233460ccd4780: Sending 183 bytes to 193.167.100.100:443 at T=3.124799 (48fd3996) efc233460ccd4780: Receiving 46 bytes from 193.167.100.100:443 at T=3.156078 (48fdb3c5) efc233460ccd4780: Receiving packet type: 4 (handshake), S0, Q1, Version 1, efc233460ccd4780: <47c9bde373ce8b12>, <4000001f33283fab>, Seq: 149, pl: 22 efc233460ccd4780: Decrypted 5 bytes efc233460ccd4780: ack (nb=0), 2-3 efc233460ccd4780: T= 3.156150, Lost packet type 4, number 1, size 167, DCID <4000001f33283fab>, reason: repeat efc233460ccd4780: Receiving 432 bytes from 193.167.100.100:443 at T=3.156402 (48fdb509) efc233460ccd4780: Receiving packet type: 6 (1rtt protected), S0, Q1, efc233460ccd4780: <47c9bde373ce8b12>, Seq: 11175821 (11175821), Phi: 0, efc233460ccd4780: Decrypted 403 bytes efc233460ccd4780: crypto_hs, offset 0, length 250: 040000f600000e10... efc233460ccd4780: ack (nb=1), 3-4, 1 efc233460ccd4780: handshake_done efc233460ccd4780: new_connection_id[1]: 0x4000001e5bb079f5, 753ea5e0326c1af8b2712298cb762d19 efc233460ccd4780: new_connection_id[2]: 0x40000015a31a3399, 8fa7bc137bdadee000073e1c84d10d76 efc233460ccd4780: new_connection_id[3]: 0x40000000a9715640, 4628e2a9ee8c07799b5ee1ed680b9fdc efc233460ccd4780: new_connection_id[4]: 0x40000017eb357527, 5308e36c09332ddf7a7de57272df4a9a efc233460ccd4780: padding, 26 bytes efc233460ccd4780: T= 3.156402, cwin: 43899,flight: 0,nb_ret: 6,rtt_min: 31279,rtt: 307203,rtt_var: 189860,max_ack_delay: 0,state: 14 efc233460ccd4780: Receiving 1072 bytes from 193.167.100.100:443 at T=3.157275 (48fdb872) efc233460ccd4780: Receiving packet type: 6 (1rtt protected), S0, Q1, efc233460ccd4780: <47c9bde373ce8b12>, Seq: 11175822 (11175822), Phi: 0, efc233460ccd4780: Decrypted 1043 bytes efc233460ccd4780: stream 0, offset 0, length 1024, fin = 1: 1a9e5cf490180a57... efc233460ccd4780: padding, 15 bytes efc233460ccd4780: T= 3.157275, cwin: 43899,flight: 0,nb_ret: 6,rtt_min: 31279,rtt: 307203,rtt_var: 189860,max_ack_delay: 0,state: 14 efc233460ccd4780: All done, Closing the connection. efc233460ccd4780: Sending packet type: 6 (1rtt protected), S1, Q1, efc233460ccd4780: <4000001f33283fab>, Seq: 5 (5), Phi: 0, efc233460ccd4780: Prepared 11 bytes efc233460ccd4780: ack (nb=0), 11175820-11175822 efc233460ccd4780: application_close, Error 0x0000, Reason length 0 efc233460ccd4780: Sending 37 bytes to 193.167.100.100:443 at T=3.157436 (48fdb913) efc233460ccd4780: Receiving 407 bytes from 193.167.100.100:443 at T=3.257026 (48ff3e19) efc233460ccd4780: Receiving packet type: 6 (1rtt protected), S0, Q1, efc233460ccd4780: <47c9bde373ce8b12>, Seq: 11175824 (11175824), Phi: 0, efc233460ccd4780: Decrypted 378 bytes efc233460ccd4780: crypto_hs, offset 0, length 250: 040000f600000e10... efc233460ccd4780: handshake_done efc233460ccd4780: new_connection_id[1]: 0x4000001e5bb079f5, 753ea5e0326c1af8b2712298cb762d19 efc233460ccd4780: new_connection_id[2]: 0x40000015a31a3399, 8fa7bc137bdadee000073e1c84d10d76 efc233460ccd4780: new_connection_id[3]: 0x40000000a9715640, 4628e2a9ee8c07799b5ee1ed680b9fdc efc233460ccd4780: new_connection_id[4]: 0x40000017eb357527, 5308e36c09332ddf7a7de57272df4a9a efc233460ccd4780: padding, 1 bytes efc233460ccd4780: ack (nb=1), 3-4, 1 efc233460ccd4780: Receiving 407 bytes from 193.167.100.100:443 at T=3.257289 (48ff3f20) efc233460ccd4780: Receiving packet type: 6 (1rtt protected), S0, Q1, efc233460ccd4780: <47c9bde373ce8b12>, Seq: 11175825 (11175825), Phi: 0, efc233460ccd4780: Decrypted 378 bytes efc233460ccd4780: crypto_hs, offset 0, length 250: 040000f600000e10... efc233460ccd4780: handshake_done efc233460ccd4780: new_connection_id[1]: 0x4000001e5bb079f5, 753ea5e0326c1af8b2712298cb762d19 efc233460ccd4780: new_connection_id[2]: 0x40000015a31a3399, 8fa7bc137bdadee000073e1c84d10d76 efc233460ccd4780: new_connection_id[3]: 0x40000000a9715640, 4628e2a9ee8c07799b5ee1ed680b9fdc efc233460ccd4780: new_connection_id[4]: 0x40000017eb357527, 5308e36c09332ddf7a7de57272df4a9a efc233460ccd4780: padding, 1 bytes efc233460ccd4780: ack (nb=1), 3-4, 1 efc233460ccd4780: Receiving 407 bytes from 193.167.100.100:443 at T=3.457453 (49024d04) efc233460ccd4780: Receiving packet type: 6 (1rtt protected), S0, Q1, efc233460ccd4780: <47c9bde373ce8b12>, Seq: 11175827 (11175827), Phi: 0, efc233460ccd4780: Decrypted 378 bytes efc233460ccd4780: crypto_hs, offset 0, length 250: 040000f600000e10... efc233460ccd4780: handshake_done efc233460ccd4780: new_connection_id[1]: 0x4000001e5bb079f5, 753ea5e0326c1af8b2712298cb762d19 efc233460ccd4780: new_connection_id[2]: 0x40000015a31a3399, 8fa7bc137bdadee000073e1c84d10d76 efc233460ccd4780: new_connection_id[3]: 0x40000000a9715640, 4628e2a9ee8c07799b5ee1ed680b9fdc efc233460ccd4780: new_connection_id[4]: 0x40000017eb357527, 5308e36c09332ddf7a7de57272df4a9a efc233460ccd4780: padding, 1 bytes efc233460ccd4780: ack (nb=1), 3-4, 1 efc233460ccd4780: Receiving 407 bytes from 193.167.100.100:443 at T=3.457745 (49024e28) efc233460ccd4780: Receiving packet type: 6 (1rtt protected), S0, Q1, efc233460ccd4780: <47c9bde373ce8b12>, Seq: 11175828 (11175828), Phi: 0, efc233460ccd4780: Decrypted 378 bytes efc233460ccd4780: crypto_hs, offset 0, length 250: 040000f600000e10... efc233460ccd4780: handshake_done efc233460ccd4780: new_connection_id[1]: 0x4000001e5bb079f5, 753ea5e0326c1af8b2712298cb762d19 efc233460ccd4780: new_connection_id[2]: 0x40000015a31a3399, 8fa7bc137bdadee000073e1c84d10d76 efc233460ccd4780: new_connection_id[3]: 0x40000000a9715640, 4628e2a9ee8c07799b5ee1ed680b9fdc efc233460ccd4780: new_connection_id[4]: 0x40000017eb357527, 5308e36c09332ddf7a7de57272df4a9a efc233460ccd4780: padding, 1 bytes efc233460ccd4780: ack (nb=1), 3-4, 1 efc233460ccd4780: Receiving 407 bytes from 193.167.100.100:443 at T=3.858084 (490869fb) efc233460ccd4780: Receiving packet type: 6 (1rtt protected), S0, Q1, efc233460ccd4780: <47c9bde373ce8b12>, Seq: 11175830 (11175830), Phi: 0, efc233460ccd4780: Decrypted 378 bytes efc233460ccd4780: crypto_hs, offset 0, length 250: 040000f600000e10... efc233460ccd4780: handshake_done efc233460ccd4780: new_connection_id[1]: 0x4000001e5bb079f5, 753ea5e0326c1af8b2712298cb762d19 efc233460ccd4780: new_connection_id[2]: 0x40000015a31a3399, 8fa7bc137bdadee000073e1c84d10d76 efc233460ccd4780: new_connection_id[3]: 0x40000000a9715640, 4628e2a9ee8c07799b5ee1ed680b9fdc efc233460ccd4780: new_connection_id[4]: 0x40000017eb357527, 5308e36c09332ddf7a7de57272df4a9a efc233460ccd4780: padding, 1 bytes efc233460ccd4780: ack (nb=1), 3-4, 1 efc233460ccd4780: Sending packet type: 6 (1rtt protected), S1, Q1, efc233460ccd4780: <4000001f33283fab>, Seq: 6 (6), Phi: 0, efc233460ccd4780: Prepared 3 bytes efc233460ccd4780: application_close, Error 0x0000, Reason length 0 efc233460ccd4780: Sending 29 bytes to 193.167.100.100:443 at T=3.858198 (49086a6d) efc233460ccd4780: Receiving 407 bytes from 193.167.100.100:443 at T=3.858415 (49086b46) efc233460ccd4780: Receiving packet type: 6 (1rtt protected), S0, Q1, efc233460ccd4780: <47c9bde373ce8b12>, Seq: 11175831 (11175831), Phi: 0, efc233460ccd4780: Decrypted 378 bytes efc233460ccd4780: crypto_hs, offset 0, length 250: 040000f600000e10... efc233460ccd4780: handshake_done efc233460ccd4780: new_connection_id[1]: 0x4000001e5bb079f5, 753ea5e0326c1af8b2712298cb762d19 efc233460ccd4780: new_connection_id[2]: 0x40000015a31a3399, 8fa7bc137bdadee000073e1c84d10d76 efc233460ccd4780: new_connection_id[3]: 0x40000000a9715640, 4628e2a9ee8c07799b5ee1ed680b9fdc efc233460ccd4780: new_connection_id[4]: 0x40000017eb357527, 5308e36c09332ddf7a7de57272df4a9a efc233460ccd4780: padding, 1 bytes efc233460ccd4780: ack (nb=1), 3-4, 1 efc233460ccd4780: Receiving 44 bytes from 193.167.100.100:443 at T=3.888983 (4908e2ae) efc233460ccd4780: Receiving packet type: 6 (1rtt protected), S0, Q1, efc233460ccd4780: <47c9bde373ce8b12>, Seq: 11175832 (11175832), Phi: 0, efc233460ccd4780: Decrypted 15 bytes efc233460ccd4780: connection_close, Error 0x0000, Offending frame 0x1c, Reason length 11 efc233460ccd4780: Reason: Peer closed efc233460ccd4780: Out of 2 zero RTT packets, 1 were acked by the server. efc233460ccd4780: Received 1024 bytes in 3.889117 seconds, 0.002106 Mbps. efc233460ccd4780: Sent 17 bytes in 3.889117 seconds, 0.000035 Mbps.