d7f26eb34433e9e5: No root crt list specified -- certificate will not be verified. d7f26eb34433e9e5: Sending ALPN list (1): hq-interop d7f26eb34433e9e5: Sending transport parameter TLS extension (85 bytes): d7f26eb34433e9e5: Extension list (85 bytes): d7f26eb34433e9e5: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 d7f26eb34433e9e5: Extension type: 4 (initial_max_data), length 4, 80100000 d7f26eb34433e9e5: Extension type: 8 (max_streams_bidi), length 2, 4200 d7f26eb34433e9e5: Extension type: 1 (idle_timeout), length 4, 8002bf20 d7f26eb34433e9e5: Extension type: 3 (max_packet_size), length 2, 45a0 d7f26eb34433e9e5: Extension type: 9 (max_streams_uni), length 2, 4200 d7f26eb34433e9e5: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 d7f26eb34433e9e5: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff d7f26eb34433e9e5: Extension type: 14 (active_connection_id_limit), length 1, 08 d7f26eb34433e9e5: Extension type: 11 (max_ack_delay), length 1, 0a d7f26eb34433e9e5: Extension type: 15 (hcid), length 8, 62e34e1d482b54a2 d7f26eb34433e9e5: Extension type: 6723 (unknown), length 4, 8000f26e d7f26eb34433e9e5: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 d7f26eb34433e9e5: Extension type: 29016 (enable_time_stamp), length 1, 03 d7f26eb34433e9e5: Extension type: 10930 (grease_quic_bit), length 0 d7f26eb34433e9e5: Preparing GET on stream 0 for /overjoyed-thick-moltres d7f26eb34433e9e5: Sending packet type: 2 (initial), S0, Q1, Version 1, d7f26eb34433e9e5: , <62e34e1d482b54a2>, Seq: 113633, pl: 553 d7f26eb34433e9e5: Token length: 0 d7f26eb34433e9e5: Prepared 533 bytes d7f26eb34433e9e5: ping, 1 bytes d7f26eb34433e9e5: crypto_hs, offset 0, length 528: 0100020c03031ac7... d7f26eb34433e9e5: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, d7f26eb34433e9e5: , <62e34e1d482b54a2>, Seq: 0, pl: 648 d7f26eb34433e9e5: Prepared 628 bytes d7f26eb34433e9e5: stream 0, offset 0, length 30, fin = 1: 474554202f6f7665... d7f26eb34433e9e5: padding, 595 bytes d7f26eb34433e9e5: Sending 1252 bytes to 193.167.100.100:443 at T=0.001930 (2b70e304) d7f26eb34433e9e5: T= 0.252234, Lost packet type 2, number 113633, size 563, DCID <>, reason: timer d7f26eb34433e9e5: Sending packet type: 2 (initial), S0, Q1, Version 1, d7f26eb34433e9e5: , <62e34e1d482b54a2>, Seq: 113634, pl: 553 d7f26eb34433e9e5: Token length: 0 d7f26eb34433e9e5: Prepared 533 bytes d7f26eb34433e9e5: ping, 1 bytes d7f26eb34433e9e5: crypto_hs, offset 0, length 528: 0100020c03031ac7... d7f26eb34433e9e5: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, d7f26eb34433e9e5: , <62e34e1d482b54a2>, Seq: 1, pl: 648 d7f26eb34433e9e5: Prepared 628 bytes d7f26eb34433e9e5: padding, 628 bytes d7f26eb34433e9e5: Sending 1252 bytes to 193.167.100.100:443 at T=0.252234 (2b74b4c4) d7f26eb34433e9e5: Receiving 1232 bytes from 193.167.100.100:443 at T=0.285559 (2b7536f1) d7f26eb34433e9e5: Receiving packet type: 2 (initial), S0, Q1, Version 1, d7f26eb34433e9e5: <62e34e1d482b54a2>, <400000009b5d2c6d>, Seq: 1205710, pl: 1206 d7f26eb34433e9e5: Token length: 0 d7f26eb34433e9e5: Decrypted 1187 bytes d7f26eb34433e9e5: crypto_hs, offset 0, length 96: 0200005c030388a8... d7f26eb34433e9e5: ack (nb=0), 113634 d7f26eb34433e9e5: padding, 1078 bytes d7f26eb34433e9e5: Receiving 216 bytes from 193.167.100.100:443 at T=0.285890 (2b75383c) d7f26eb34433e9e5: Receiving packet type: 4 (handshake), S0, Q1, Version 1, d7f26eb34433e9e5: <62e34e1d482b54a2>, <400000009b5d2c6d>, Seq: 1205710, pl: 191 d7f26eb34433e9e5: Decrypted 172 bytes d7f26eb34433e9e5: crypto_hs, offset 0, length 168: 08000080007e0010... d7f26eb34433e9e5: Received transport parameter TLS extension (101 bytes): d7f26eb34433e9e5: Extension list (101 bytes): d7f26eb34433e9e5: Extension type: 0 (ocid), length 8, d7f26eb34433e9e5 d7f26eb34433e9e5: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 d7f26eb34433e9e5: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 d7f26eb34433e9e5: Extension type: 7 (max_stream_data_uni), length 4, 86666666 d7f26eb34433e9e5: Extension type: 4 (initial_max_data), length 4, 86666666 d7f26eb34433e9e5: Extension type: 8 (max_streams_bidi), length 2, 4064 d7f26eb34433e9e5: Extension type: 9 (max_streams_uni), length 2, 4064 d7f26eb34433e9e5: Extension type: 1 (idle_timeout), length 4, 8000ea60 d7f26eb34433e9e5: Extension type: 10 (ack_delay_exponent), length 1, 03 d7f26eb34433e9e5: Extension type: 3 (max_packet_size), length 2, 45dc d7f26eb34433e9e5: Extension type: 2 (stateless_reset_token), length 16, 73c03d659a0fcb64b01a3fb6ad35ef8f d7f26eb34433e9e5: Extension type: 15 (hcid), length 8, 400000009b5d2c6d d7f26eb34433e9e5: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff d7f26eb34433e9e5: Extension type: 267427841 (unknown), length 1, 00 d7f26eb34433e9e5: Extension type: 20856 (unknown), length 1, 01 d7f26eb34433e9e5: The session was properly resumed! d7f26eb34433e9e5: Zero RTT data is accepted! d7f26eb34433e9e5: Negotiated ALPN: hq-interop d7f26eb34433e9e5: Receiving 48 bytes from 193.167.100.100:443 at T=0.286082 (2b7538fc) d7f26eb34433e9e5: Receiving packet type: 6 (1rtt protected), S0, Q1, d7f26eb34433e9e5: <62e34e1d482b54a2>, Seq: 1205710 (1205710), Phi: 0, d7f26eb34433e9e5: Decrypted 20 bytes d7f26eb34433e9e5: ack (nb=0), 1 d7f26eb34433e9e5: padding, 14 bytes d7f26eb34433e9e5: T= 0.286082, cwin: 16580,flight: 673,nb_ret: 1,rtt_min: 33325,rtt: 33390,rtt_var: 12627,max_ack_delay: 0,state: 10 d7f26eb34433e9e5: Sending packet type: 4 (handshake), S0, Q1, Version 1, d7f26eb34433e9e5: <400000009b5d2c6d>, <62e34e1d482b54a2>, Seq: 0, pl: 67 d7f26eb34433e9e5: Prepared 47 bytes d7f26eb34433e9e5: ack (nb=0), 1205710 d7f26eb34433e9e5: crypto_hs, offset 0, length 36: 140000200a6937b7... d7f26eb34433e9e5: T= 0.286123, Lost packet type 5, number 0, size 657, DCID <400000009b5d2c6d>, reason: repeat d7f26eb34433e9e5: Sending packet type: 6 (1rtt protected), S1, Q1, d7f26eb34433e9e5: <400000009b5d2c6d>, Seq: 2 (2), Phi: 0, d7f26eb34433e9e5: Prepared 157 bytes d7f26eb34433e9e5: ack (nb=0), 1205710 d7f26eb34433e9e5: new_connection_id[1]: 0x3479cb6c58977e51, 21d571a414e85629ea22ca086d6c46c3 d7f26eb34433e9e5: stream 0, offset 0, length 30, fin = 1: 474554202f6f7665... d7f26eb34433e9e5: padding, 88 bytes d7f26eb34433e9e5: T= 0.286123, cwin: 16580,flight: 275,nb_ret: 2,rtt_min: 33325,rtt: 33390,rtt_var: 12627,max_ack_delay: 0,state: 13 d7f26eb34433e9e5: Sending 275 bytes to 193.167.100.100:443 at T=0.286123 (2b753925) d7f26eb34433e9e5: Connection established. Version = 1, I-CID: d7f26eb34433e9e5, verified: 1 d7f26eb34433e9e5: Receiving 46 bytes from 193.167.100.100:443 at T=0.317264 (2b75b2ca) d7f26eb34433e9e5: Receiving packet type: 4 (handshake), S0, Q1, Version 1, d7f26eb34433e9e5: <62e34e1d482b54a2>, <400000009b5d2c6d>, Seq: 207, pl: 22 d7f26eb34433e9e5: Decrypted 5 bytes d7f26eb34433e9e5: ack (nb=0), 0 d7f26eb34433e9e5: Receiving 400 bytes from 193.167.100.100:443 at T=0.317607 (2b75b421) d7f26eb34433e9e5: Receiving packet type: 6 (1rtt protected), S0, Q1, d7f26eb34433e9e5: <62e34e1d482b54a2>, Seq: 1205711 (1205711), Phi: 0, d7f26eb34433e9e5: Decrypted 372 bytes d7f26eb34433e9e5: crypto_hs, offset 0, length 250: 040000f600000e10... d7f26eb34433e9e5: ack (nb=0), 1-2 d7f26eb34433e9e5: handshake_done d7f26eb34433e9e5: new_connection_id[1]: 0x400000004b375543, d8a5449953d3799febb915bec7be1893 d7f26eb34433e9e5: new_connection_id[2]: 0x40000003d0d4fdf8, b991ea308e698f51db8b1897dddf58fd d7f26eb34433e9e5: new_connection_id[3]: 0x40000018361d19f3, ea2b23f64d9b4192df5696b2a0dd0d41 d7f26eb34433e9e5: new_connection_id[4]: 0x4000000e8166646c, 4302460b54301b51ac4aafabea3a342e d7f26eb34433e9e5: T= 0.317607, cwin: 16823,flight: 0,nb_ret: 2,rtt_min: 31141,rtt: 32905,rtt_var: 7930,max_ack_delay: 0,state: 14 d7f26eb34433e9e5: Receiving 1072 bytes from 193.167.100.100:443 at T=0.318482 (2b75b78c) d7f26eb34433e9e5: Receiving packet type: 6 (1rtt protected), S0, Q1, d7f26eb34433e9e5: <62e34e1d482b54a2>, Seq: 1205712 (1205712), Phi: 0, d7f26eb34433e9e5: Decrypted 1044 bytes d7f26eb34433e9e5: stream 0, offset 0, length 1024, fin = 1: 1bd79b02c2736734... d7f26eb34433e9e5: padding, 16 bytes d7f26eb34433e9e5: T= 0.318482, cwin: 16823,flight: 0,nb_ret: 2,rtt_min: 31141,rtt: 32905,rtt_var: 7930,max_ack_delay: 0,state: 14 d7f26eb34433e9e5: All done, Closing the connection. d7f26eb34433e9e5: Sending packet type: 6 (1rtt protected), S1, Q1, d7f26eb34433e9e5: <400000009b5d2c6d>, Seq: 3 (3), Phi: 0, d7f26eb34433e9e5: Prepared 11 bytes d7f26eb34433e9e5: ack (nb=0), 1205710-1205712 d7f26eb34433e9e5: application_close, Error 0x0000, Reason length 0 d7f26eb34433e9e5: Sending 37 bytes to 193.167.100.100:443 at T=0.318651 (2b75b835) d7f26eb34433e9e5: Receiving 401 bytes from 193.167.100.100:443 at T=0.419197 (2b7740f7) d7f26eb34433e9e5: Receiving packet type: 6 (1rtt protected), S0, Q1, d7f26eb34433e9e5: <62e34e1d482b54a2>, Seq: 1205714 (1205714), Phi: 0, d7f26eb34433e9e5: Decrypted 373 bytes d7f26eb34433e9e5: crypto_hs, offset 0, length 250: 040000f600000e10... d7f26eb34433e9e5: handshake_done d7f26eb34433e9e5: new_connection_id[1]: 0x400000004b375543, d8a5449953d3799febb915bec7be1893 d7f26eb34433e9e5: new_connection_id[2]: 0x40000003d0d4fdf8, b991ea308e698f51db8b1897dddf58fd d7f26eb34433e9e5: new_connection_id[3]: 0x40000018361d19f3, ea2b23f64d9b4192df5696b2a0dd0d41 d7f26eb34433e9e5: new_connection_id[4]: 0x4000000e8166646c, 4302460b54301b51ac4aafabea3a342e d7f26eb34433e9e5: ack (nb=0), 1-2 d7f26eb34433e9e5: Sending packet type: 6 (1rtt protected), S1, Q1, d7f26eb34433e9e5: <400000009b5d2c6d>, Seq: 4 (4), Phi: 0, d7f26eb34433e9e5: Prepared 3 bytes d7f26eb34433e9e5: application_close, Error 0x0000, Reason length 0 d7f26eb34433e9e5: Sending 29 bytes to 193.167.100.100:443 at T=0.419306 (2b774164) d7f26eb34433e9e5: Receiving 401 bytes from 193.167.100.100:443 at T=0.419522 (2b77423c) d7f26eb34433e9e5: Receiving packet type: 6 (1rtt protected), S0, Q1, d7f26eb34433e9e5: <62e34e1d482b54a2>, Seq: 1205715 (1205715), Phi: 0, d7f26eb34433e9e5: Decrypted 373 bytes d7f26eb34433e9e5: crypto_hs, offset 0, length 250: 040000f600000e10... d7f26eb34433e9e5: handshake_done d7f26eb34433e9e5: new_connection_id[1]: 0x400000004b375543, d8a5449953d3799febb915bec7be1893 d7f26eb34433e9e5: new_connection_id[2]: 0x40000003d0d4fdf8, b991ea308e698f51db8b1897dddf58fd d7f26eb34433e9e5: new_connection_id[3]: 0x40000018361d19f3, ea2b23f64d9b4192df5696b2a0dd0d41 d7f26eb34433e9e5: new_connection_id[4]: 0x4000000e8166646c, 4302460b54301b51ac4aafabea3a342e d7f26eb34433e9e5: ack (nb=0), 1-2 d7f26eb34433e9e5: Receiving 43 bytes from 193.167.100.100:443 at T=0.450067 (2b77b98d) d7f26eb34433e9e5: Receiving packet type: 6 (1rtt protected), S0, Q1, d7f26eb34433e9e5: <62e34e1d482b54a2>, Seq: 1205716 (1205716), Phi: 0, d7f26eb34433e9e5: Decrypted 15 bytes d7f26eb34433e9e5: connection_close, Error 0x0000, Offending frame 0x1c, Reason length 11 d7f26eb34433e9e5: Reason: Peer closed d7f26eb34433e9e5: Out of 2 zero RTT packets, 1 were acked by the server. d7f26eb34433e9e5: Received 1024 bytes in 0.450189 seconds, 0.018197 Mbps. d7f26eb34433e9e5: Sent 30 bytes in 0.450189 seconds, 0.000533 Mbps.