4a70ebaaff77f771: No root crt list specified -- certificate will not be verified. 4a70ebaaff77f771: Sending ALPN list (1): hq-interop 4a70ebaaff77f771: Sending transport parameter TLS extension (85 bytes): 4a70ebaaff77f771: Extension list (85 bytes): 4a70ebaaff77f771: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 4a70ebaaff77f771: Extension type: 4 (initial_max_data), length 4, 80100000 4a70ebaaff77f771: Extension type: 8 (max_streams_bidi), length 2, 4200 4a70ebaaff77f771: Extension type: 1 (idle_timeout), length 4, 8002bf20 4a70ebaaff77f771: Extension type: 3 (max_packet_size), length 2, 45a0 4a70ebaaff77f771: Extension type: 9 (max_streams_uni), length 2, 4200 4a70ebaaff77f771: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 4a70ebaaff77f771: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 4a70ebaaff77f771: Extension type: 14 (active_connection_id_limit), length 1, 08 4a70ebaaff77f771: Extension type: 11 (max_ack_delay), length 1, 0a 4a70ebaaff77f771: Extension type: 15 (hcid), length 8, d9a2eff959879bb3 4a70ebaaff77f771: Extension type: 2352 (unknown), length 4, 800070eb 4a70ebaaff77f771: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 4a70ebaaff77f771: Extension type: 29016 (enable_time_stamp), length 1, 03 4a70ebaaff77f771: Extension type: 10930 (grease_quic_bit), length 0 4a70ebaaff77f771: Preparing GET on stream 0 for /zfmsvvewip 4a70ebaaff77f771: Sending packet type: 2 (initial), S0, Q1, Version 1, 4a70ebaaff77f771: <4a70ebaaff77f771>, , Seq: 77107, pl: 553 4a70ebaaff77f771: Token length: 0 4a70ebaaff77f771: Prepared 533 bytes 4a70ebaaff77f771: ping, 1 bytes 4a70ebaaff77f771: crypto_hs, offset 0, length 528: 0100020c0303fb01... 4a70ebaaff77f771: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 4a70ebaaff77f771: <4a70ebaaff77f771>, , Seq: 0, pl: 648 4a70ebaaff77f771: Prepared 628 bytes 4a70ebaaff77f771: stream 0, offset 0, length 17, fin = 1: 474554202f7a666d... 4a70ebaaff77f771: padding, 608 bytes 4a70ebaaff77f771: Sending 1252 bytes to 193.167.100.100:443 at T=0.001952 (38db264c) 4a70ebaaff77f771: Receiving 1232 bytes from 193.167.100.100:443 at T=0.035334 (38dba8b2) 4a70ebaaff77f771: Receiving packet type: 2 (initial), S0, Q1, Version 1, 4a70ebaaff77f771: , <4000004fd532124c>, Seq: 11548466, pl: 1206 4a70ebaaff77f771: Token length: 0 4a70ebaaff77f771: Decrypted 1186 bytes 4a70ebaaff77f771: crypto_hs, offset 0, length 96: 0200005c03036e42... 4a70ebaaff77f771: ack (nb=0), 77107 4a70ebaaff77f771: padding, 1077 bytes 4a70ebaaff77f771: Receiving 217 bytes from 193.167.100.100:443 at T=0.035642 (38dba9e6) 4a70ebaaff77f771: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 4a70ebaaff77f771: , <4000004fd532124c>, Seq: 11548466, pl: 192 4a70ebaaff77f771: Decrypted 172 bytes 4a70ebaaff77f771: crypto_hs, offset 0, length 168: 08000080007e0010... 4a70ebaaff77f771: Received transport parameter TLS extension (101 bytes): 4a70ebaaff77f771: Extension list (101 bytes): 4a70ebaaff77f771: Extension type: 0 (ocid), length 8, 4a70ebaaff77f771 4a70ebaaff77f771: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 4a70ebaaff77f771: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 4a70ebaaff77f771: Extension type: 7 (max_stream_data_uni), length 4, 86666666 4a70ebaaff77f771: Extension type: 4 (initial_max_data), length 4, 86666666 4a70ebaaff77f771: Extension type: 8 (max_streams_bidi), length 2, 4064 4a70ebaaff77f771: Extension type: 9 (max_streams_uni), length 2, 4064 4a70ebaaff77f771: Extension type: 1 (idle_timeout), length 4, 8000ea60 4a70ebaaff77f771: Extension type: 10 (ack_delay_exponent), length 1, 03 4a70ebaaff77f771: Extension type: 3 (max_packet_size), length 2, 45dc 4a70ebaaff77f771: Extension type: 2 (stateless_reset_token), length 16, a36f405f445991ed06464f5859504413 4a70ebaaff77f771: Extension type: 15 (hcid), length 8, 4000004fd532124c 4a70ebaaff77f771: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff 4a70ebaaff77f771: Extension type: 267427841 (unknown), length 1, 00 4a70ebaaff77f771: Extension type: 20856 (unknown), length 1, 01 4a70ebaaff77f771: The session was properly resumed! 4a70ebaaff77f771: Zero RTT data is accepted! 4a70ebaaff77f771: Negotiated ALPN: hq-interop 4a70ebaaff77f771: Receiving 48 bytes from 193.167.100.100:443 at T=0.035884 (38dbaad8) 4a70ebaaff77f771: Receiving packet type: 6 (1rtt protected), S0, Q1, 4a70ebaaff77f771: , Seq: 11548466 (11548466), Phi: 0, 4a70ebaaff77f771: Decrypted 19 bytes 4a70ebaaff77f771: ack (nb=0), 0 4a70ebaaff77f771: padding, 13 bytes 4a70ebaaff77f771: T= 0.035884, cwin: 16580,flight: 0,nb_ret: 0,rtt_min: 33382,rtt: 33450,rtt_var: 12655,max_ack_delay: 0,state: 10 4a70ebaaff77f771: Sending packet type: 4 (handshake), S0, Q1, Version 1, 4a70ebaaff77f771: <4000004fd532124c>, , Seq: 0, pl: 67 4a70ebaaff77f771: Prepared 47 bytes 4a70ebaaff77f771: ack (nb=0), 11548466 4a70ebaaff77f771: crypto_hs, offset 0, length 36: 140000209ef5e3f7... 4a70ebaaff77f771: Sending packet type: 6 (1rtt protected), S1, Q1, 4a70ebaaff77f771: <4000004fd532124c>, Seq: 1 (1), Phi: 0, 4a70ebaaff77f771: Prepared 157 bytes 4a70ebaaff77f771: ack (nb=0), 11548466 4a70ebaaff77f771: new_connection_id[1]: 0x13a8d759aa53c413, cfa9a57dc8b3d564dc94ad7d45141162 4a70ebaaff77f771: padding, 121 bytes 4a70ebaaff77f771: T= 0.035932, cwin: 16580,flight: 275,nb_ret: 0,rtt_min: 33382,rtt: 33450,rtt_var: 12655,max_ack_delay: 0,state: 13 4a70ebaaff77f771: Sending 275 bytes to 193.167.100.100:443 at T=0.035932 (38dbab08) 4a70ebaaff77f771: Connection established. Version = 1, I-CID: 4a70ebaaff77f771, verified: 1 4a70ebaaff77f771: Receiving 46 bytes from 193.167.100.100:443 at T=0.066981 (38dc2451) 4a70ebaaff77f771: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 4a70ebaaff77f771: , <4000004fd532124c>, Seq: 51, pl: 22 4a70ebaaff77f771: Decrypted 5 bytes 4a70ebaaff77f771: ack (nb=0), 0 4a70ebaaff77f771: Receiving 432 bytes from 193.167.100.100:443 at T=0.067359 (38dc25cb) 4a70ebaaff77f771: Receiving packet type: 6 (1rtt protected), S0, Q1, 4a70ebaaff77f771: , Seq: 11548468 (11548468), Phi: 0, 4a70ebaaff77f771: Decrypted 403 bytes 4a70ebaaff77f771: crypto_hs, offset 0, length 250: 040000f600000e10... 4a70ebaaff77f771: ack (nb=0), 0-1 4a70ebaaff77f771: handshake_done 4a70ebaaff77f771: new_connection_id[1]: 0x400000498ae127ee, f9efffa3b6808644a2d355cad487dc00 4a70ebaaff77f771: new_connection_id[2]: 0x4000005574563a81, a6450e62f9aa4fe51e9bb4c39fe9c1ef 4a70ebaaff77f771: new_connection_id[3]: 0x40000049b7b65654, 92c2a67d3e9bea3dede804771c0780f9 4a70ebaaff77f771: new_connection_id[4]: 0x400000569bd52f08, 8c95c71b6d8c662ec0627ec154b5aad4 4a70ebaaff77f771: padding, 31 bytes 4a70ebaaff77f771: T= 0.067359, cwin: 16823,flight: 0,nb_ret: 0,rtt_min: 31049,rtt: 32889,rtt_var: 8086,max_ack_delay: 0,state: 14 4a70ebaaff77f771: Sending packet type: 6 (1rtt protected), S1, Q1, 4a70ebaaff77f771: <4000004fd532124c>, Seq: 2 (2), Phi: 0, 4a70ebaaff77f771: Prepared 29 bytes 4a70ebaaff77f771: ack (nb=1), 11548468, 11548466 4a70ebaaff77f771: padding, 19 bytes 4a70ebaaff77f771: T= 0.067440, cwin: 16823,flight: 55,nb_ret: 0,rtt_min: 31049,rtt: 32889,rtt_var: 8086,max_ack_delay: 0,state: 14 4a70ebaaff77f771: Sending 55 bytes to 193.167.100.100:443 at T=0.067440 (38dc261c) 4a70ebaaff77f771: Receiving 1058 bytes from 193.167.100.100:443 at T=0.177289 (38ddd335) 4a70ebaaff77f771: Receiving packet type: 6 (1rtt protected), S0, Q1, 4a70ebaaff77f771: , Seq: 11548470 (11548470), Phi: 0, 4a70ebaaff77f771: Decrypted 1029 bytes 4a70ebaaff77f771: stream 0, offset 0, length 1024, fin = 1: c6d1c5baad84cabb... 4a70ebaaff77f771: padding, 1 bytes 4a70ebaaff77f771: T= 0.177289, cwin: 1307,flight: 0,nb_ret: 0,rtt_min: 31049,rtt: 32889,rtt_var: 8086,max_ack_delay: 0,state: 14 4a70ebaaff77f771: All done, Closing the connection. 4a70ebaaff77f771: Sending packet type: 6 (1rtt protected), S1, Q1, 4a70ebaaff77f771: <4000004fd532124c>, Seq: 3 (3), Phi: 0, 4a70ebaaff77f771: Prepared 15 bytes 4a70ebaaff77f771: ack (nb=2), 11548470, 11548468, 11548466 4a70ebaaff77f771: application_close, Error 0x0000, Reason length 0 4a70ebaaff77f771: Sending 41 bytes to 193.167.100.100:443 at T=0.177537 (38ddd42d) 4a70ebaaff77f771: Receiving 1058 bytes from 193.167.100.100:443 at T=0.178087 (38ddd653) 4a70ebaaff77f771: Receiving packet type: 6 (1rtt protected), S0, Q1, 4a70ebaaff77f771: , Seq: 11548471 (11548471), Phi: 0, 4a70ebaaff77f771: Decrypted 1029 bytes 4a70ebaaff77f771: stream 0, offset 0, length 1024, fin = 1: c6d1c5baad84cabb... 4a70ebaaff77f771: padding, 1 bytes 4a70ebaaff77f771: Receiving 41 bytes from 193.167.100.100:443 at T=0.208409 (38de4cc5) 4a70ebaaff77f771: Receiving packet type: 6 (1rtt protected), S0, Q1, 4a70ebaaff77f771: , Seq: 56 (11548472), Phi: 0, 4a70ebaaff77f771: Decrypted 15 bytes 4a70ebaaff77f771: connection_close, Error 0x0000, Offending frame 0x1c, Reason length 11 4a70ebaaff77f771: Reason: Peer closed 4a70ebaaff77f771: Out of 1 zero RTT packets, 1 were acked by the server. 4a70ebaaff77f771: Received 1024 bytes in 0.208561 seconds, 0.039279 Mbps. 4a70ebaaff77f771: Sent 17 bytes in 0.208561 seconds, 0.000652 Mbps.