51dd23f0c30d435e: No root crt list specified -- certificate will not be verified. 51dd23f0c30d435e: Sending ALPN list (1): hq-interop 51dd23f0c30d435e: Sending transport parameter TLS extension (85 bytes): 51dd23f0c30d435e: Extension list (85 bytes): 51dd23f0c30d435e: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 51dd23f0c30d435e: Extension type: 4 (initial_max_data), length 4, 80100000 51dd23f0c30d435e: Extension type: 8 (max_streams_bidi), length 2, 4200 51dd23f0c30d435e: Extension type: 1 (idle_timeout), length 4, 8002bf20 51dd23f0c30d435e: Extension type: 3 (max_packet_size), length 2, 45a0 51dd23f0c30d435e: Extension type: 9 (max_streams_uni), length 2, 4200 51dd23f0c30d435e: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 51dd23f0c30d435e: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 51dd23f0c30d435e: Extension type: 14 (active_connection_id_limit), length 1, 08 51dd23f0c30d435e: Extension type: 11 (max_ack_delay), length 1, 0a 51dd23f0c30d435e: Extension type: 15 (hcid), length 8, 12c2bb0f765cdd4c 51dd23f0c30d435e: Extension type: 2569 (unknown), length 4, 8000dd23 51dd23f0c30d435e: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 51dd23f0c30d435e: Extension type: 29016 (enable_time_stamp), length 1, 03 51dd23f0c30d435e: Extension type: 10930 (grease_quic_bit), length 0 51dd23f0c30d435e: Preparing GET on stream 0 for /tifpxmqcub 51dd23f0c30d435e: Sending packet type: 2 (initial), S0, Q1, Version 1, 51dd23f0c30d435e: <51dd23f0c30d435e>, <12c2bb0f765cdd4c>, Seq: 72133, pl: 553 51dd23f0c30d435e: Token length: 0 51dd23f0c30d435e: Prepared 533 bytes 51dd23f0c30d435e: ping, 1 bytes 51dd23f0c30d435e: crypto_hs, offset 0, length 528: 0100020c0303a5f8... 51dd23f0c30d435e: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 51dd23f0c30d435e: <51dd23f0c30d435e>, <12c2bb0f765cdd4c>, Seq: 0, pl: 648 51dd23f0c30d435e: Prepared 628 bytes 51dd23f0c30d435e: stream 0, offset 0, length 17, fin = 1: 474554202f746966... 51dd23f0c30d435e: padding, 608 bytes 51dd23f0c30d435e: Sending 1252 bytes to 193.167.100.100:443 at T=0.001909 (49090191) 51dd23f0c30d435e: T= 0.252209, Lost packet type 2, number 72133, size 563, DCID <>, reason: timer 51dd23f0c30d435e: Sending packet type: 2 (initial), S0, Q1, Version 1, 51dd23f0c30d435e: <51dd23f0c30d435e>, <12c2bb0f765cdd4c>, Seq: 72134, pl: 553 51dd23f0c30d435e: Token length: 0 51dd23f0c30d435e: Prepared 533 bytes 51dd23f0c30d435e: ping, 1 bytes 51dd23f0c30d435e: crypto_hs, offset 0, length 528: 0100020c0303a5f8... 51dd23f0c30d435e: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 51dd23f0c30d435e: <51dd23f0c30d435e>, <12c2bb0f765cdd4c>, Seq: 1, pl: 648 51dd23f0c30d435e: Prepared 628 bytes 51dd23f0c30d435e: padding, 628 bytes 51dd23f0c30d435e: Sending 1252 bytes to 193.167.100.100:443 at T=0.252209 (490cd34d) 51dd23f0c30d435e: T= 0.752760, Lost packet type 2, number 72134, size 563, DCID <>, reason: timer 51dd23f0c30d435e: Sending packet type: 2 (initial), S0, Q1, Version 1, 51dd23f0c30d435e: <51dd23f0c30d435e>, <12c2bb0f765cdd4c>, Seq: 72135, pl: 553 51dd23f0c30d435e: Token length: 0 51dd23f0c30d435e: Prepared 533 bytes 51dd23f0c30d435e: ping, 1 bytes 51dd23f0c30d435e: crypto_hs, offset 0, length 528: 0100020c0303a5f8... 51dd23f0c30d435e: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 51dd23f0c30d435e: <51dd23f0c30d435e>, <12c2bb0f765cdd4c>, Seq: 2, pl: 648 51dd23f0c30d435e: Prepared 628 bytes 51dd23f0c30d435e: padding, 628 bytes 51dd23f0c30d435e: Sending 1252 bytes to 193.167.100.100:443 at T=0.752760 (49147694) 51dd23f0c30d435e: T= 1.253310, Lost packet type 2, number 72135, size 563, DCID <>, reason: timer 51dd23f0c30d435e: Sending packet type: 2 (initial), S0, Q1, Version 1, 51dd23f0c30d435e: <51dd23f0c30d435e>, <12c2bb0f765cdd4c>, Seq: 72136, pl: 553 51dd23f0c30d435e: Token length: 0 51dd23f0c30d435e: Prepared 533 bytes 51dd23f0c30d435e: ping, 1 bytes 51dd23f0c30d435e: crypto_hs, offset 0, length 528: 0100020c0303a5f8... 51dd23f0c30d435e: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 51dd23f0c30d435e: <51dd23f0c30d435e>, <12c2bb0f765cdd4c>, Seq: 3, pl: 648 51dd23f0c30d435e: Prepared 628 bytes 51dd23f0c30d435e: padding, 628 bytes 51dd23f0c30d435e: Sending 1252 bytes to 193.167.100.100:443 at T=1.253310 (491c19da) 51dd23f0c30d435e: Receiving 1232 bytes from 193.167.100.100:443 at T=1.286676 (491c9c30) 51dd23f0c30d435e: Receiving packet type: 2 (initial), S0, Q1, Version 1, 51dd23f0c30d435e: <12c2bb0f765cdd4c>, <4000008db79cdcd1>, Seq: 5640926, pl: 1206 51dd23f0c30d435e: Token length: 0 51dd23f0c30d435e: Decrypted 1187 bytes 51dd23f0c30d435e: crypto_hs, offset 0, length 96: 0200005c0303ce87... 51dd23f0c30d435e: ack (nb=0), 72136 51dd23f0c30d435e: padding, 1078 bytes 51dd23f0c30d435e: Receiving 48 bytes from 193.167.100.100:443 at T=1.287026 (491c9d8e) 51dd23f0c30d435e: T= 1.287026, Keys unavailable, buffered packet type 6. 51dd23f0c30d435e: Sending packet type: 4 (handshake), S0, Q1, Version 1, 51dd23f0c30d435e: <4000008db79cdcd1>, <12c2bb0f765cdd4c>, Seq: 0, pl: 21 51dd23f0c30d435e: Prepared 1 bytes 51dd23f0c30d435e: ping, 1 bytes 51dd23f0c30d435e: Sending 46 bytes to 193.167.100.100:443 at T=1.290910 (491cacba) 51dd23f0c30d435e: Sending packet type: 4 (handshake), S0, Q1, Version 1, 51dd23f0c30d435e: <4000008db79cdcd1>, <12c2bb0f765cdd4c>, Seq: 1, pl: 21 51dd23f0c30d435e: Prepared 1 bytes 51dd23f0c30d435e: ping, 1 bytes 51dd23f0c30d435e: Sending 46 bytes to 193.167.100.100:443 at T=1.374453 (491df311) 51dd23f0c30d435e: Receiving 49 bytes from 193.167.100.100:443 at T=1.495456 (491fcbbc) 51dd23f0c30d435e: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 51dd23f0c30d435e: <12c2bb0f765cdd4c>, <4000008db79cdcd1>, Seq: 5640930, pl: 25 51dd23f0c30d435e: Decrypted 6 bytes 51dd23f0c30d435e: ack (nb=0), 0-1 51dd23f0c30d435e: Receiving 216 bytes from 193.167.100.100:443 at T=1.695953 (4922daed) 51dd23f0c30d435e: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 51dd23f0c30d435e: <12c2bb0f765cdd4c>, <4000008db79cdcd1>, Seq: 5640932, pl: 191 51dd23f0c30d435e: Decrypted 172 bytes 51dd23f0c30d435e: crypto_hs, offset 0, length 168: 08000080007e0010... 51dd23f0c30d435e: Received transport parameter TLS extension (101 bytes): 51dd23f0c30d435e: Extension list (101 bytes): 51dd23f0c30d435e: Extension type: 0 (ocid), length 8, 51dd23f0c30d435e 51dd23f0c30d435e: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 51dd23f0c30d435e: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 51dd23f0c30d435e: Extension type: 7 (max_stream_data_uni), length 4, 86666666 51dd23f0c30d435e: Extension type: 4 (initial_max_data), length 4, 86666666 51dd23f0c30d435e: Extension type: 8 (max_streams_bidi), length 2, 4064 51dd23f0c30d435e: Extension type: 9 (max_streams_uni), length 2, 4064 51dd23f0c30d435e: Extension type: 1 (idle_timeout), length 4, 8000ea60 51dd23f0c30d435e: Extension type: 10 (ack_delay_exponent), length 1, 03 51dd23f0c30d435e: Extension type: 3 (max_packet_size), length 2, 45dc 51dd23f0c30d435e: Extension type: 2 (stateless_reset_token), length 16, a6ad2d639587d1138570677b884b8d55 51dd23f0c30d435e: Extension type: 15 (hcid), length 8, 4000008db79cdcd1 51dd23f0c30d435e: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff 51dd23f0c30d435e: Extension type: 267427841 (unknown), length 1, 00 51dd23f0c30d435e: Extension type: 20856 (unknown), length 1, 01 51dd23f0c30d435e: The session was properly resumed! 51dd23f0c30d435e: Zero RTT data is accepted! 51dd23f0c30d435e: Negotiated ALPN: hq-interop 51dd23f0c30d435e: Receiving 48 bytes from 193.167.100.100:443 at T=1.696208 (4922dbec) 51dd23f0c30d435e: Receiving packet type: 6 (1rtt protected), S0, Q1, 51dd23f0c30d435e: <12c2bb0f765cdd4c>, Seq: 5640926 (5640926), Phi: 0, 51dd23f0c30d435e: Decrypted 20 bytes 51dd23f0c30d435e: ack (nb=0), 3 51dd23f0c30d435e: padding, 14 bytes 51dd23f0c30d435e: T= 1.696208, cwin: 16640,flight: 2019,nb_ret: 3,rtt_min: 33366,rtt: 94142,rtt_var: 125460,max_ack_delay: 0,state: 10 51dd23f0c30d435e: Sending packet type: 4 (handshake), S0, Q1, Version 1, 51dd23f0c30d435e: <4000008db79cdcd1>, <12c2bb0f765cdd4c>, Seq: 2, pl: 69 51dd23f0c30d435e: Prepared 49 bytes 51dd23f0c30d435e: ack (nb=1), 5640932, 5640930 51dd23f0c30d435e: crypto_hs, offset 0, length 36: 14000020b3ebf59a... 51dd23f0c30d435e: T= 1.696208, Lost packet type 5, number 0, size 657, DCID <4000008db79cdcd1>, reason: repeat 51dd23f0c30d435e: T= 1.696208, Lost packet type 5, number 1, size 657, DCID <4000008db79cdcd1>, reason: repeat 51dd23f0c30d435e: T= 1.696208, Lost packet type 5, number 2, size 657, DCID <4000008db79cdcd1>, reason: repeat 51dd23f0c30d435e: Sending packet type: 6 (1rtt protected), S1, Q1, 51dd23f0c30d435e: <4000008db79cdcd1>, Seq: 4 (4), Phi: 0, 51dd23f0c30d435e: Prepared 157 bytes 51dd23f0c30d435e: ack (nb=0), 5640926 51dd23f0c30d435e: new_connection_id[1]: 0x50a239a314526232, ae2fae6506c68e7326523f16e101cc54 51dd23f0c30d435e: stream 0, offset 0, length 17, fin = 1: 474554202f746966... 51dd23f0c30d435e: padding, 98 bytes 51dd23f0c30d435e: T= 1.696208, cwin: 16640,flight: 277,nb_ret: 6,rtt_min: 33366,rtt: 94142,rtt_var: 125460,max_ack_delay: 0,state: 13 51dd23f0c30d435e: Sending 277 bytes to 193.167.100.100:443 at T=1.696208 (4922dbec) 51dd23f0c30d435e: Connection established. Version = 1, I-CID: 51dd23f0c30d435e, verified: 1 51dd23f0c30d435e: T= 2.192252, Lost packet type 4, number 2, size 78, DCID <4000008db79cdcd1>, reason: timer 51dd23f0c30d435e: Sending packet type: 4 (handshake), S0, Q1, Version 1, 51dd23f0c30d435e: <4000008db79cdcd1>, <12c2bb0f765cdd4c>, Seq: 3, pl: 158 51dd23f0c30d435e: Prepared 138 bytes 51dd23f0c30d435e: crypto_hs, offset 0, length 36: 14000020b3ebf59a... 51dd23f0c30d435e: ack (nb=1), 5640932, 5640930 51dd23f0c30d435e: padding, 86 bytes 51dd23f0c30d435e: T= 2.192252, cwin: 16640,flight: 366,nb_ret: 7,rtt_min: 33366,rtt: 94142,rtt_var: 125460,max_ack_delay: 0,state: 13 51dd23f0c30d435e: Sending 183 bytes to 193.167.100.100:443 at T=2.192252 (492a6d98) 51dd23f0c30d435e: T= 2.687796, Lost packet type 6, number 4, size 167, DCID <4000008db79cdcd1>, reason: timer 51dd23f0c30d435e: Sending packet type: 6 (1rtt protected), S1, Q1, 51dd23f0c30d435e: <4000008db79cdcd1>, Seq: 5 (5), Phi: 0, 51dd23f0c30d435e: Prepared 157 bytes 51dd23f0c30d435e: new_connection_id[1]: 0x50a239a314526232, ae2fae6506c68e7326523f16e101cc54 51dd23f0c30d435e: ack (nb=0), 5640926 51dd23f0c30d435e: stream 0, offset 0, length 17, fin = 1: 474554202f746966... 51dd23f0c30d435e: padding, 98 bytes 51dd23f0c30d435e: T= 2.687796, cwin: 16640,flight: 366,nb_ret: 8,rtt_min: 33366,rtt: 94142,rtt_var: 125460,max_ack_delay: 0,state: 13 51dd23f0c30d435e: Sending 183 bytes to 193.167.100.100:443 at T=2.687796 (4931fd50) 51dd23f0c30d435e: Receiving 48 bytes from 193.167.100.100:443 at T=2.718983 (49327723) 51dd23f0c30d435e: Receiving packet type: 6 (1rtt protected), S0, Q1, 51dd23f0c30d435e: <12c2bb0f765cdd4c>, Seq: 5640928 (5640928), Phi: 0, 51dd23f0c30d435e: Decrypted 20 bytes 51dd23f0c30d435e: ack (nb=1), 5, 3 51dd23f0c30d435e: padding, 13 bytes 51dd23f0c30d435e: T= 2.718983, cwin: 16807,flight: 0,nb_ret: 8,rtt_min: 31187,rtt: 86272,rtt_var: 109833,max_ack_delay: 0,state: 14 51dd23f0c30d435e: Receiving 396 bytes from 193.167.100.100:443 at T=4.790974 (495214da) 51dd23f0c30d435e: Receiving packet type: 6 (1rtt protected), S0, Q1, 51dd23f0c30d435e: <12c2bb0f765cdd4c>, Seq: 5640931 (5640931), Phi: 0, 51dd23f0c30d435e: Decrypted 368 bytes 51dd23f0c30d435e: crypto_hs, offset 0, length 250: 040000f600000e10... 51dd23f0c30d435e: handshake_done 51dd23f0c30d435e: new_connection_id[1]: 0x40000083a62f3ee8, ca0db3fc5385f7fa926e792c6bd8c7eb 51dd23f0c30d435e: new_connection_id[2]: 0x4000009c48a58101, 9c9079b1f7f174598ba84d842db33f82 51dd23f0c30d435e: new_connection_id[3]: 0x4000008c2c22d347, 8e643f6c330031e0ab1eef712551e63b 51dd23f0c30d435e: new_connection_id[4]: 0x400000824a9326c3, 1a6d08eeb255a307a1309ce2f6deea36 51dd23f0c30d435e: padding, 1 bytes 51dd23f0c30d435e: T= 4.790974, cwin: 16807,flight: 0,nb_ret: 8,rtt_min: 31187,rtt: 86272,rtt_var: 109833,max_ack_delay: 0,state: 14 51dd23f0c30d435e: Sending packet type: 6 (1rtt protected), S1, Q1, 51dd23f0c30d435e: <4000008db79cdcd1>, Seq: 6 (6), Phi: 0, 51dd23f0c30d435e: Prepared 29 bytes 51dd23f0c30d435e: ack (nb=2), 5640931, 5640928, 5640926 51dd23f0c30d435e: padding, 17 bytes 51dd23f0c30d435e: T= 4.791148, cwin: 16807,flight: 55,nb_ret: 8,rtt_min: 31187,rtt: 86272,rtt_var: 109833,max_ack_delay: 0,state: 14 51dd23f0c30d435e: Sending 55 bytes to 193.167.100.100:443 at T=4.791148 (49521588) 51dd23f0c30d435e: Receiving 396 bytes from 193.167.100.100:443 at T=4.791259 (495215f7) 51dd23f0c30d435e: Receiving packet type: 6 (1rtt protected), S0, Q1, 51dd23f0c30d435e: <12c2bb0f765cdd4c>, Seq: 5640932 (5640932), Phi: 0, 51dd23f0c30d435e: Decrypted 368 bytes 51dd23f0c30d435e: crypto_hs, offset 0, length 250: 040000f600000e10... 51dd23f0c30d435e: handshake_done 51dd23f0c30d435e: new_connection_id[1]: 0x40000083a62f3ee8, ca0db3fc5385f7fa926e792c6bd8c7eb 51dd23f0c30d435e: new_connection_id[2]: 0x4000009c48a58101, 9c9079b1f7f174598ba84d842db33f82 51dd23f0c30d435e: new_connection_id[3]: 0x4000008c2c22d347, 8e643f6c330031e0ab1eef712551e63b 51dd23f0c30d435e: new_connection_id[4]: 0x400000824a9326c3, 1a6d08eeb255a307a1309ce2f6deea36 51dd23f0c30d435e: padding, 1 bytes 51dd23f0c30d435e: T= 4.791259, cwin: 16807,flight: 55,nb_ret: 8,rtt_min: 31187,rtt: 86272,rtt_var: 109833,max_ack_delay: 0,state: 14 51dd23f0c30d435e: Sending packet type: 6 (1rtt protected), S1, Q1, 51dd23f0c30d435e: <4000008db79cdcd1>, Seq: 7 (7), Phi: 0, 51dd23f0c30d435e: Prepared 29 bytes 51dd23f0c30d435e: ack (nb=2), 5640931-5640932, 5640928, 5640926 51dd23f0c30d435e: padding, 16 bytes 51dd23f0c30d435e: T= 4.801352, cwin: 16807,flight: 110,nb_ret: 8,rtt_min: 31187,rtt: 86272,rtt_var: 109833,max_ack_delay: 0,state: 14 51dd23f0c30d435e: Sending 55 bytes to 193.167.100.100:443 at T=4.801352 (49523d64) 51dd23f0c30d435e: Receiving 396 bytes from 193.167.100.100:443 at T=8.956377 (4991a3f5) 51dd23f0c30d435e: Receiving packet type: 6 (1rtt protected), S0, Q1, 51dd23f0c30d435e: <12c2bb0f765cdd4c>, Seq: 5640934 (5640934), Phi: 0, 51dd23f0c30d435e: Decrypted 368 bytes 51dd23f0c30d435e: crypto_hs, offset 0, length 250: 040000f600000e10... 51dd23f0c30d435e: handshake_done 51dd23f0c30d435e: new_connection_id[1]: 0x40000083a62f3ee8, ca0db3fc5385f7fa926e792c6bd8c7eb 51dd23f0c30d435e: new_connection_id[2]: 0x4000009c48a58101, 9c9079b1f7f174598ba84d842db33f82 51dd23f0c30d435e: new_connection_id[3]: 0x4000008c2c22d347, 8e643f6c330031e0ab1eef712551e63b 51dd23f0c30d435e: new_connection_id[4]: 0x400000824a9326c3, 1a6d08eeb255a307a1309ce2f6deea36 51dd23f0c30d435e: padding, 1 bytes 51dd23f0c30d435e: T= 8.956377, cwin: 1362,flight: 0,nb_ret: 8,rtt_min: 31187,rtt: 86272,rtt_var: 109833,max_ack_delay: 0,state: 14 51dd23f0c30d435e: Sending packet type: 6 (1rtt protected), S1, Q1, 51dd23f0c30d435e: <4000008db79cdcd1>, Seq: 8 (8), Phi: 0, 51dd23f0c30d435e: Prepared 29 bytes 51dd23f0c30d435e: ack (nb=3), 5640934, 5640931-5640932, 5640928, 5640926 51dd23f0c30d435e: padding, 15 bytes 51dd23f0c30d435e: T= 8.956522, cwin: 1362,flight: 55,nb_ret: 8,rtt_min: 31187,rtt: 86272,rtt_var: 109833,max_ack_delay: 0,state: 14 51dd23f0c30d435e: Sending 55 bytes to 193.167.100.100:443 at T=8.956522 (4991a486) 51dd23f0c30d435e: Receiving 396 bytes from 193.167.100.100:443 at T=8.956664 (4991a514) 51dd23f0c30d435e: Receiving packet type: 6 (1rtt protected), S0, Q1, 51dd23f0c30d435e: <12c2bb0f765cdd4c>, Seq: 5640935 (5640935), Phi: 0, 51dd23f0c30d435e: Decrypted 368 bytes 51dd23f0c30d435e: crypto_hs, offset 0, length 250: 040000f600000e10... 51dd23f0c30d435e: handshake_done 51dd23f0c30d435e: new_connection_id[1]: 0x40000083a62f3ee8, ca0db3fc5385f7fa926e792c6bd8c7eb 51dd23f0c30d435e: new_connection_id[2]: 0x4000009c48a58101, 9c9079b1f7f174598ba84d842db33f82 51dd23f0c30d435e: new_connection_id[3]: 0x4000008c2c22d347, 8e643f6c330031e0ab1eef712551e63b 51dd23f0c30d435e: new_connection_id[4]: 0x400000824a9326c3, 1a6d08eeb255a307a1309ce2f6deea36 51dd23f0c30d435e: padding, 1 bytes 51dd23f0c30d435e: T= 8.956664, cwin: 1362,flight: 55,nb_ret: 8,rtt_min: 31187,rtt: 86272,rtt_var: 109833,max_ack_delay: 0,state: 14 51dd23f0c30d435e: Sending packet type: 6 (1rtt protected), S1, Q1, 51dd23f0c30d435e: <4000008db79cdcd1>, Seq: 9 (9), Phi: 0, 51dd23f0c30d435e: Prepared 29 bytes 51dd23f0c30d435e: ack (nb=2), 5640934-5640935, 5640931-5640932, 5640928 51dd23f0c30d435e: padding, 16 bytes 51dd23f0c30d435e: T= 8.966756, cwin: 1362,flight: 110,nb_ret: 8,rtt_min: 31187,rtt: 86272,rtt_var: 109833,max_ack_delay: 0,state: 14 51dd23f0c30d435e: Sending 55 bytes to 193.167.100.100:443 at T=8.966756 (4991cc80) 51dd23f0c30d435e: Receiving 1072 bytes from 193.167.100.100:443 at T=8.988201 (49922045) 51dd23f0c30d435e: Receiving packet type: 6 (1rtt protected), S0, Q1, 51dd23f0c30d435e: <12c2bb0f765cdd4c>, Seq: 232 (5640936), Phi: 0, 51dd23f0c30d435e: Decrypted 1046 bytes 51dd23f0c30d435e: ack (nb=2), 8, 5, 3 51dd23f0c30d435e: stream 0, offset 0, length 1024, fin = 1: 4c77ce36da49d5a8... 51dd23f0c30d435e: padding, 9 bytes 51dd23f0c30d435e: T= 8.988201, cwin: 16846,flight: 55,nb_ret: 8,rtt_min: 31187,rtt: 79421,rtt_var: 96075,max_ack_delay: 0,state: 14 51dd23f0c30d435e: All done, Closing the connection. 51dd23f0c30d435e: Sending packet type: 6 (1rtt protected), S1, Q1, 51dd23f0c30d435e: <4000008db79cdcd1>, Seq: 10 (10), Phi: 0, 51dd23f0c30d435e: Prepared 11 bytes 51dd23f0c30d435e: ack (nb=0), 5640935-5640936 51dd23f0c30d435e: application_close, Error 0x0000, Reason length 0 51dd23f0c30d435e: Sending 37 bytes to 193.167.100.100:443 at T=8.988428 (49922128) 51dd23f0c30d435e: Receiving 41 bytes from 193.167.100.100:443 at T=9.019087 (499298eb) 51dd23f0c30d435e: Receiving packet type: 6 (1rtt protected), S0, Q1, 51dd23f0c30d435e: <12c2bb0f765cdd4c>, Seq: 233 (5640937), Phi: 0, 51dd23f0c30d435e: Decrypted 15 bytes 51dd23f0c30d435e: connection_close, Error 0x0000, Offending frame 0x1c, Reason length 11 51dd23f0c30d435e: Reason: Peer closed 51dd23f0c30d435e: Out of 4 zero RTT packets, 1 were acked by the server. 51dd23f0c30d435e: Received 1024 bytes in 9.019206 seconds, 0.000908 Mbps. 51dd23f0c30d435e: Sent 17 bytes in 9.019206 seconds, 0.000015 Mbps.