c30faaea59b74ff5: No root crt list specified -- certificate will not be verified. c30faaea59b74ff5: Sending ALPN list (1): hq-interop c30faaea59b74ff5: Sending transport parameter TLS extension (83 bytes): c30faaea59b74ff5: Extension list (83 bytes): c30faaea59b74ff5: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 c30faaea59b74ff5: Extension type: 4 (initial_max_data), length 4, 80100000 c30faaea59b74ff5: Extension type: 8 (max_streams_bidi), length 2, 4200 c30faaea59b74ff5: Extension type: 1 (idle_timeout), length 4, 8002bf20 c30faaea59b74ff5: Extension type: 3 (max_packet_size), length 2, 45a0 c30faaea59b74ff5: Extension type: 9 (max_streams_uni), length 2, 4200 c30faaea59b74ff5: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 c30faaea59b74ff5: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff c30faaea59b74ff5: Extension type: 14 (active_connection_id_limit), length 1, 08 c30faaea59b74ff5: Extension type: 11 (max_ack_delay), length 1, 0a c30faaea59b74ff5: Extension type: 15 (hcid), length 8, a2251e862a94afbb c30faaea59b74ff5: Extension type: 6103 (unknown), length 2, 4faa c30faaea59b74ff5: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 c30faaea59b74ff5: Extension type: 29016 (enable_time_stamp), length 1, 03 c30faaea59b74ff5: Extension type: 10930 (grease_quic_bit), length 0 c30faaea59b74ff5: Preparing GET on stream 0 for /surplus-minuscule-spaceship c30faaea59b74ff5: Sending packet type: 2 (initial), S0, Q1, Version 1, c30faaea59b74ff5: , , Seq: 86615, pl: 551 c30faaea59b74ff5: Token length: 0 c30faaea59b74ff5: Prepared 531 bytes c30faaea59b74ff5: ping, 1 bytes c30faaea59b74ff5: crypto_hs, offset 0, length 526: 0100020a03039eaf... c30faaea59b74ff5: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, c30faaea59b74ff5: , , Seq: 0, pl: 650 c30faaea59b74ff5: Prepared 630 bytes c30faaea59b74ff5: stream 0, offset 0, length 34, fin = 1: 474554202f737572... c30faaea59b74ff5: padding, 593 bytes c30faaea59b74ff5: Sending 1252 bytes to 193.167.100.100:443 at T=0.001933 (2a019a90) c30faaea59b74ff5: Receiving 1232 bytes from 193.167.100.100:443 at T=0.035263 (2a021cc2) c30faaea59b74ff5: Receiving packet type: 2 (initial), S0, Q1, Version 1, c30faaea59b74ff5: , <4000000c420d1754>, Seq: 1154133, pl: 1206 c30faaea59b74ff5: Token length: 0 c30faaea59b74ff5: Decrypted 1187 bytes c30faaea59b74ff5: crypto_hs, offset 0, length 96: 0200005c03037783... c30faaea59b74ff5: ack (nb=0), 86615 c30faaea59b74ff5: padding, 1078 bytes c30faaea59b74ff5: Receiving 48 bytes from 193.167.100.100:443 at T=0.035595 (2a021e0e) c30faaea59b74ff5: T= 0.035595, Keys unavailable, buffered packet type 6. c30faaea59b74ff5: Receiving 1072 bytes from 193.167.100.100:443 at T=0.036373 (2a022118) c30faaea59b74ff5: T= 0.036373, Keys unavailable, buffered packet type 6. c30faaea59b74ff5: Sending packet type: 4 (handshake), S0, Q1, Version 1, c30faaea59b74ff5: <4000000c420d1754>, , Seq: 0, pl: 21 c30faaea59b74ff5: Prepared 1 bytes c30faaea59b74ff5: ping, 1 bytes c30faaea59b74ff5: Sending 46 bytes to 193.167.100.100:443 at T=0.039495 (2a022d4a) c30faaea59b74ff5: Sending packet type: 4 (handshake), S0, Q1, Version 1, c30faaea59b74ff5: <4000000c420d1754>, , Seq: 1, pl: 21 c30faaea59b74ff5: Prepared 1 bytes c30faaea59b74ff5: ping, 1 bytes c30faaea59b74ff5: Sending 46 bytes to 193.167.100.100:443 at T=0.122960 (2a037353) c30faaea59b74ff5: Receiving 49 bytes from 193.167.100.100:443 at T=0.140371 (2a03b756) c30faaea59b74ff5: Receiving packet type: 4 (handshake), S0, Q1, Version 1, c30faaea59b74ff5: , <4000000c420d1754>, Seq: 1154135, pl: 25 c30faaea59b74ff5: Decrypted 6 bytes c30faaea59b74ff5: ack (nb=0), 0 c30faaea59b74ff5: Sending packet type: 4 (handshake), S0, Q1, Version 1, c30faaea59b74ff5: <4000000c420d1754>, , Seq: 2, pl: 30 c30faaea59b74ff5: Prepared 10 bytes c30faaea59b74ff5: ping, 1 bytes c30faaea59b74ff5: ack (nb=0), 1154135 c30faaea59b74ff5: Sending 55 bytes to 193.167.100.100:443 at T=0.253047 (2a056f7a) c30faaea59b74ff5: Receiving 49 bytes from 193.167.100.100:443 at T=0.344171 (2a06d36e) c30faaea59b74ff5: Receiving packet type: 4 (handshake), S0, Q1, Version 1, c30faaea59b74ff5: , <4000000c420d1754>, Seq: 1154137, pl: 25 c30faaea59b74ff5: Decrypted 6 bytes c30faaea59b74ff5: ack (nb=0), 0-2 c30faaea59b74ff5: Receiving 216 bytes from 193.167.100.100:443 at T=0.764064 (2a0d3ba3) c30faaea59b74ff5: Receiving packet type: 4 (handshake), S0, Q1, Version 1, c30faaea59b74ff5: , <4000000c420d1754>, Seq: 1154139, pl: 191 c30faaea59b74ff5: Decrypted 172 bytes c30faaea59b74ff5: crypto_hs, offset 0, length 168: 08000080007e0010... c30faaea59b74ff5: Received transport parameter TLS extension (101 bytes): c30faaea59b74ff5: Extension list (101 bytes): c30faaea59b74ff5: Extension type: 0 (ocid), length 8, c30faaea59b74ff5 c30faaea59b74ff5: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 c30faaea59b74ff5: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 c30faaea59b74ff5: Extension type: 7 (max_stream_data_uni), length 4, 86666666 c30faaea59b74ff5: Extension type: 4 (initial_max_data), length 4, 86666666 c30faaea59b74ff5: Extension type: 8 (max_streams_bidi), length 2, 4064 c30faaea59b74ff5: Extension type: 9 (max_streams_uni), length 2, 4064 c30faaea59b74ff5: Extension type: 1 (idle_timeout), length 4, 8000ea60 c30faaea59b74ff5: Extension type: 10 (ack_delay_exponent), length 1, 03 c30faaea59b74ff5: Extension type: 3 (max_packet_size), length 2, 45dc c30faaea59b74ff5: Extension type: 2 (stateless_reset_token), length 16, 30993a6eb35185526208a5c7b1b3fb2c c30faaea59b74ff5: Extension type: 15 (hcid), length 8, 4000000c420d1754 c30faaea59b74ff5: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff c30faaea59b74ff5: Extension type: 267427841 (unknown), length 1, 00 c30faaea59b74ff5: Extension type: 20856 (unknown), length 1, 01 c30faaea59b74ff5: The session was properly resumed! c30faaea59b74ff5: Zero RTT data is accepted! c30faaea59b74ff5: Negotiated ALPN: hq-interop c30faaea59b74ff5: Receiving 1072 bytes from 193.167.100.100:443 at T=0.764307 (2a0d3c96) c30faaea59b74ff5: Receiving packet type: 6 (1rtt protected), S0, Q1, c30faaea59b74ff5: , Seq: 1154134 (1154134), Phi: 0, c30faaea59b74ff5: Decrypted 1044 bytes c30faaea59b74ff5: stream 0, offset 0, length 1024, fin = 1: 87cd526a1fca0750... c30faaea59b74ff5: padding, 16 bytes c30faaea59b74ff5: T= 0.764307, cwin: 16020,flight: 675,nb_ret: 0,rtt_min: 33330,rtt: 47941,rtt_var: 34376,max_ack_delay: 0,state: 10 c30faaea59b74ff5: Receiving 48 bytes from 193.167.100.100:443 at T=0.764307 (2a0d3c96) c30faaea59b74ff5: Receiving packet type: 6 (1rtt protected), S0, Q1, c30faaea59b74ff5: , Seq: 1154133 (1154133), Phi: 0, c30faaea59b74ff5: Decrypted 20 bytes c30faaea59b74ff5: ack (nb=0), 0 c30faaea59b74ff5: padding, 14 bytes c30faaea59b74ff5: T= 0.764307, cwin: 16679,flight: 0,nb_ret: 0,rtt_min: 33330,rtt: 47941,rtt_var: 34376,max_ack_delay: 0,state: 10 c30faaea59b74ff5: Sending packet type: 4 (handshake), S0, Q1, Version 1, c30faaea59b74ff5: <4000000c420d1754>, , Seq: 3, pl: 71 c30faaea59b74ff5: Prepared 51 bytes c30faaea59b74ff5: ack (nb=2), 1154139, 1154137, 1154135 c30faaea59b74ff5: crypto_hs, offset 0, length 36: 14000020c6fee5c7... c30faaea59b74ff5: Sending packet type: 6 (1rtt protected), S1, Q1, c30faaea59b74ff5: <4000000c420d1754>, Seq: 1 (1), Phi: 0, c30faaea59b74ff5: Prepared 157 bytes c30faaea59b74ff5: ack (nb=0), 1154133-1154134 c30faaea59b74ff5: new_connection_id[1]: 0xd36396f012898e08, f269960ff94fd8627f927902e3472377 c30faaea59b74ff5: padding, 118 bytes c30faaea59b74ff5: T= 0.764307, cwin: 16679,flight: 279,nb_ret: 0,rtt_min: 33330,rtt: 47941,rtt_var: 34376,max_ack_delay: 0,state: 13 c30faaea59b74ff5: Sending 279 bytes to 193.167.100.100:443 at T=0.764307 (2a0d3c96) c30faaea59b74ff5: Connection established. Version = 1, I-CID: c30faaea59b74ff5, verified: 1 c30faaea59b74ff5: Receiving 1057 bytes from 193.167.100.100:443 at T=0.764864 (2a0d3ec3) c30faaea59b74ff5: Receiving packet type: 6 (1rtt protected), S0, Q1, c30faaea59b74ff5: , Seq: 1154140 (1154140), Phi: 0, c30faaea59b74ff5: Decrypted 1029 bytes c30faaea59b74ff5: stream 0, offset 0, length 1024, fin = 1: 87cd526a1fca0750... c30faaea59b74ff5: padding, 1 bytes c30faaea59b74ff5: T= 0.764864, cwin: 16679,flight: 279,nb_ret: 0,rtt_min: 33330,rtt: 47941,rtt_var: 34376,max_ack_delay: 0,state: 13 c30faaea59b74ff5: All done, Closing the connection. c30faaea59b74ff5: Sending packet type: 6 (1rtt protected), S1, Q1, c30faaea59b74ff5: <4000000c420d1754>, Seq: 2 (2), Phi: 0, c30faaea59b74ff5: Prepared 13 bytes c30faaea59b74ff5: ack (nb=1), 1154140, 1154133-1154134 c30faaea59b74ff5: application_close, Error 0x0000, Reason length 0 c30faaea59b74ff5: Sending 39 bytes to 193.167.100.100:443 at T=0.764922 (2a0d3efd) c30faaea59b74ff5: Receiving 46 bytes from 193.167.100.100:443 at T=0.795735 (2a0db75a) c30faaea59b74ff5: Receiving packet type: 4 (handshake), S0, Q1, Version 1, c30faaea59b74ff5: , <4000000c420d1754>, Seq: 92, pl: 22 c30faaea59b74ff5: Decrypted 5 bytes c30faaea59b74ff5: ack (nb=0), 0-3 c30faaea59b74ff5: Receiving 400 bytes from 193.167.100.100:443 at T=0.796055 (2a0db89a) c30faaea59b74ff5: Receiving packet type: 6 (1rtt protected), S0, Q1, c30faaea59b74ff5: , Seq: 93 (1154141), Phi: 0, c30faaea59b74ff5: Decrypted 374 bytes c30faaea59b74ff5: crypto_hs, offset 0, length 250: 040000f600000e10... c30faaea59b74ff5: ack (nb=0), 0-1 c30faaea59b74ff5: handshake_done c30faaea59b74ff5: new_connection_id[1]: 0x4000001f50e5a9b9, 8ffa9edb4a7055b41ec868d77150a947 c30faaea59b74ff5: new_connection_id[2]: 0x400000155821d64c, ae82b7a1a5d3e6e9863138be0884de70 c30faaea59b74ff5: new_connection_id[3]: 0x4000000a96bfde0a, 4694813a5f14cc7dbed83ae89b27716d c30faaea59b74ff5: new_connection_id[4]: 0x4000001cee13271a, 3b769f7fc63ca75fb70aa3cb45c88009 c30faaea59b74ff5: padding, 2 bytes c30faaea59b74ff5: Receiving 41 bytes from 193.167.100.100:443 at T=0.796118 (2a0db8d9) c30faaea59b74ff5: Receiving packet type: 6 (1rtt protected), S0, Q1, c30faaea59b74ff5: , Seq: 94 (1154142), Phi: 0, c30faaea59b74ff5: Decrypted 15 bytes c30faaea59b74ff5: connection_close, Error 0x0000, Offending frame 0x1c, Reason length 11 c30faaea59b74ff5: Reason: Peer closed c30faaea59b74ff5: Out of 1 zero RTT packets, 1 were acked by the server. c30faaea59b74ff5: Received 1024 bytes in 0.796231 seconds, 0.010288 Mbps. c30faaea59b74ff5: Sent 34 bytes in 0.796231 seconds, 0.000342 Mbps.