c733c38c3996b392: No root crt list specified -- certificate will not be verified. c733c38c3996b392: Sending ALPN list (1): hq-interop c733c38c3996b392: Sending transport parameter TLS extension (83 bytes): c733c38c3996b392: Extension list (83 bytes): c733c38c3996b392: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 c733c38c3996b392: Extension type: 4 (initial_max_data), length 4, 80100000 c733c38c3996b392: Extension type: 8 (max_streams_bidi), length 2, 4200 c733c38c3996b392: Extension type: 1 (idle_timeout), length 4, 8002bf20 c733c38c3996b392: Extension type: 3 (max_packet_size), length 2, 45a0 c733c38c3996b392: Extension type: 9 (max_streams_uni), length 2, 4200 c733c38c3996b392: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 c733c38c3996b392: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff c733c38c3996b392: Extension type: 14 (active_connection_id_limit), length 1, 08 c733c38c3996b392: Extension type: 11 (max_ack_delay), length 1, 0a c733c38c3996b392: Extension type: 15 (hcid), length 8, 3dc1b01caad180da c733c38c3996b392: Extension type: 6227 (unknown), length 2, 73c3 c733c38c3996b392: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 c733c38c3996b392: Extension type: 29016 (enable_time_stamp), length 1, 03 c733c38c3996b392: Extension type: 10930 (grease_quic_bit), length 0 c733c38c3996b392: Preparing GET on stream 0 for /igngnohotd c733c38c3996b392: Sending packet type: 2 (initial), S0, Q1, Version 1, c733c38c3996b392: , <3dc1b01caad180da>, Seq: 89128, pl: 551 c733c38c3996b392: Token length: 0 c733c38c3996b392: Prepared 531 bytes c733c38c3996b392: ping, 1 bytes c733c38c3996b392: crypto_hs, offset 0, length 526: 0100020a03036b30... c733c38c3996b392: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, c733c38c3996b392: , <3dc1b01caad180da>, Seq: 0, pl: 650 c733c38c3996b392: Prepared 630 bytes c733c38c3996b392: stream 0, offset 0, length 17, fin = 1: 474554202f69676e... c733c38c3996b392: padding, 610 bytes c733c38c3996b392: Sending 1252 bytes to 193.167.100.100:443 at T=0.001901 (2857b893) c733c38c3996b392: Receiving 216 bytes from 193.167.100.100:443 at T=0.035535 (28583bf5) c733c38c3996b392: T= 0.035535, Keys unavailable, buffered packet type 4. c733c38c3996b392: Receiving 48 bytes from 193.167.100.100:443 at T=0.035560 (28583c0e) c733c38c3996b392: T= 0.035560, Keys unavailable, buffered packet type 6. c733c38c3996b392: Receiving 1072 bytes from 193.167.100.100:443 at T=0.036408 (28583f5e) c733c38c3996b392: T= 0.036408, Keys unavailable, buffered packet type 6. c733c38c3996b392: T= 0.090828, Lost packet type 2, number 89128, size 561, DCID <>, reason: timer c733c38c3996b392: Sending packet type: 2 (initial), S0, Q1, Version 1, c733c38c3996b392: , <3dc1b01caad180da>, Seq: 89129, pl: 551 c733c38c3996b392: Token length: 0 c733c38c3996b392: Prepared 531 bytes c733c38c3996b392: ping, 1 bytes c733c38c3996b392: crypto_hs, offset 0, length 526: 0100020a03036b30... c733c38c3996b392: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, c733c38c3996b392: , <3dc1b01caad180da>, Seq: 1, pl: 650 c733c38c3996b392: Prepared 630 bytes c733c38c3996b392: padding, 630 bytes c733c38c3996b392: Sending 1252 bytes to 193.167.100.100:443 at T=0.090828 (285913f2) c733c38c3996b392: Receiving 216 bytes from 193.167.100.100:443 at T=0.145972 (2859eb5a) c733c38c3996b392: T= 0.145972, Keys unavailable, buffered packet type 4. c733c38c3996b392: T= 0.268668, Lost packet type 2, number 89129, size 561, DCID <>, reason: timer c733c38c3996b392: Sending packet type: 2 (initial), S0, Q1, Version 1, c733c38c3996b392: , <3dc1b01caad180da>, Seq: 89130, pl: 551 c733c38c3996b392: Token length: 0 c733c38c3996b392: Prepared 531 bytes c733c38c3996b392: ping, 1 bytes c733c38c3996b392: crypto_hs, offset 0, length 526: 0100020a03036b30... c733c38c3996b392: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, c733c38c3996b392: , <3dc1b01caad180da>, Seq: 2, pl: 650 c733c38c3996b392: Prepared 630 bytes c733c38c3996b392: padding, 630 bytes c733c38c3996b392: Sending 1252 bytes to 193.167.100.100:443 at T=0.268668 (285bcaa2) c733c38c3996b392: Receiving 1232 bytes from 193.167.100.100:443 at T=0.301488 (285c4ad6) c733c38c3996b392: Receiving packet type: 2 (initial), S0, Q1, Version 1, c733c38c3996b392: <3dc1b01caad180da>, <4000001e7a8977f3>, Seq: 8371115, pl: 1206 c733c38c3996b392: Token length: 0 c733c38c3996b392: Decrypted 1187 bytes c733c38c3996b392: ack (nb=1), 89130, 89128 c733c38c3996b392: padding, 1177 bytes c733c38c3996b392: Receiving 48 bytes from 193.167.100.100:443 at T=0.301584 (285c4b36) c733c38c3996b392: T= 0.301584, Keys unavailable, buffered packet type 6. c733c38c3996b392: Sending packet type: 2 (initial), S0, Q1, Version 1, c733c38c3996b392: <4000001e7a8977f3>, <3dc1b01caad180da>, Seq: 89131, pl: 30 c733c38c3996b392: Token length: 0 c733c38c3996b392: Prepared 10 bytes c733c38c3996b392: ping, 1 bytes c733c38c3996b392: ack (nb=0), 8371115 c733c38c3996b392: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, c733c38c3996b392: <4000001e7a8977f3>, <3dc1b01caad180da>, Seq: 3, pl: 1171 c733c38c3996b392: Prepared 1151 bytes c733c38c3996b392: padding, 1151 bytes c733c38c3996b392: Sending 1252 bytes to 193.167.100.100:443 at T=0.345969 (285cf897) c733c38c3996b392: Receiving 1232 bytes from 193.167.100.100:443 at T=0.355693 (285d1e93) c733c38c3996b392: Receiving packet type: 2 (initial), S0, Q1, Version 1, c733c38c3996b392: <3dc1b01caad180da>, <4000001e7a8977f3>, Seq: 8371117, pl: 1206 c733c38c3996b392: Token length: 0 c733c38c3996b392: Decrypted 1187 bytes c733c38c3996b392: crypto_hs, offset 0, length 96: 0200005c0303b28a... c733c38c3996b392: padding, 1 bytes c733c38c3996b392: ack (nb=1), 89130, 89128 c733c38c3996b392: padding, 1075 bytes c733c38c3996b392: Receiving 216 bytes from 193.167.100.100:443 at T=0.355997 (285d1fc3) c733c38c3996b392: Receiving packet type: 4 (handshake), S0, Q1, Version 1, c733c38c3996b392: <3dc1b01caad180da>, <4000001e7a8977f3>, Seq: 8371116, pl: 191 c733c38c3996b392: Decrypted 172 bytes c733c38c3996b392: crypto_hs, offset 0, length 168: 08000080007e0010... c733c38c3996b392: Received transport parameter TLS extension (101 bytes): c733c38c3996b392: Extension list (101 bytes): c733c38c3996b392: Extension type: 0 (ocid), length 8, c733c38c3996b392 c733c38c3996b392: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 c733c38c3996b392: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 c733c38c3996b392: Extension type: 7 (max_stream_data_uni), length 4, 86666666 c733c38c3996b392: Extension type: 4 (initial_max_data), length 4, 86666666 c733c38c3996b392: Extension type: 8 (max_streams_bidi), length 2, 4064 c733c38c3996b392: Extension type: 9 (max_streams_uni), length 2, 4064 c733c38c3996b392: Extension type: 1 (idle_timeout), length 4, 8000ea60 c733c38c3996b392: Extension type: 10 (ack_delay_exponent), length 1, 03 c733c38c3996b392: Extension type: 3 (max_packet_size), length 2, 45dc c733c38c3996b392: Extension type: 2 (stateless_reset_token), length 16, 605a81fccd992c8ce3514e3672ea8f00 c733c38c3996b392: Extension type: 15 (hcid), length 8, 4000001e7a8977f3 c733c38c3996b392: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff c733c38c3996b392: Extension type: 267427841 (unknown), length 1, 00 c733c38c3996b392: Extension type: 20856 (unknown), length 1, 01 c733c38c3996b392: The session was properly resumed! c733c38c3996b392: Zero RTT data is accepted! c733c38c3996b392: Negotiated ALPN: hq-interop c733c38c3996b392: Receiving 48 bytes from 193.167.100.100:443 at T=0.356166 (285d206c) c733c38c3996b392: Receiving packet type: 6 (1rtt protected), S0, Q1, c733c38c3996b392: <3dc1b01caad180da>, Seq: 8371116 (8371116), Phi: 0, c733c38c3996b392: Decrypted 20 bytes c733c38c3996b392: ack (nb=1), 2, 0 c733c38c3996b392: padding, 13 bytes c733c38c3996b392: T= 0.356166, cwin: 17800,flight: 1927,nb_ret: 2,rtt_min: 32820,rtt: 41732,rtt_var: 23578,max_ack_delay: 0,state: 10 c733c38c3996b392: Receiving 216 bytes from 193.167.100.100:443 at T=0.356166 (285d206c) c733c38c3996b392: Receiving packet type: 4 (handshake), S0, Q1, Version 1, c733c38c3996b392: <3dc1b01caad180da>, <4000001e7a8977f3>, Seq: 8371114, pl: 191 c733c38c3996b392: Decrypted 172 bytes c733c38c3996b392: crypto_hs, offset 0, length 168: 08000080007e0010... c733c38c3996b392: Receiving 1072 bytes from 193.167.100.100:443 at T=0.356166 (285d206c) c733c38c3996b392: Receiving packet type: 6 (1rtt protected), S0, Q1, c733c38c3996b392: <3dc1b01caad180da>, Seq: 8371113 (8371113), Phi: 0, c733c38c3996b392: Decrypted 1044 bytes c733c38c3996b392: stream 0, offset 0, length 1024, fin = 1: bb52847f397dcd1b... c733c38c3996b392: padding, 16 bytes c733c38c3996b392: T= 0.356166, cwin: 17800,flight: 1927,nb_ret: 2,rtt_min: 32820,rtt: 41732,rtt_var: 23578,max_ack_delay: 0,state: 10 c733c38c3996b392: Receiving 48 bytes from 193.167.100.100:443 at T=0.356166 (285d206c) c733c38c3996b392: Receiving packet type: 6 (1rtt protected), S0, Q1, c733c38c3996b392: <3dc1b01caad180da>, Seq: 8371112 (8371112), Phi: 0, c733c38c3996b392: Decrypted 20 bytes c733c38c3996b392: ack (nb=0), 0 c733c38c3996b392: padding, 14 bytes c733c38c3996b392: T= 0.356166, cwin: 17800,flight: 1927,nb_ret: 2,rtt_min: 32820,rtt: 41732,rtt_var: 23578,max_ack_delay: 0,state: 10 c733c38c3996b392: Receiving 216 bytes from 193.167.100.100:443 at T=0.356166 (285d206c) c733c38c3996b392: Receiving packet type: 4 (handshake), S0, Q1, Version 1, c733c38c3996b392: <3dc1b01caad180da>, <4000001e7a8977f3>, Seq: 8371112, pl: 191 c733c38c3996b392: Decrypted 172 bytes c733c38c3996b392: crypto_hs, offset 0, length 168: 08000080007e0010... c733c38c3996b392: Sending packet type: 4 (handshake), S0, Q1, Version 1, c733c38c3996b392: <4000001e7a8977f3>, <3dc1b01caad180da>, Seq: 0, pl: 71 c733c38c3996b392: Prepared 51 bytes c733c38c3996b392: ack (nb=2), 8371116, 8371114, 8371112 c733c38c3996b392: crypto_hs, offset 0, length 36: 14000020f19d60a5... c733c38c3996b392: T= 0.356166, Lost packet type 5, number 1, size 659, DCID <4000001e7a8977f3>, reason: repeat c733c38c3996b392: Sending packet type: 6 (1rtt protected), S1, Q1, c733c38c3996b392: <4000001e7a8977f3>, Seq: 4 (4), Phi: 0, c733c38c3996b392: Prepared 157 bytes c733c38c3996b392: ack (nb=1), 8371116, 8371112-8371113 c733c38c3996b392: new_connection_id[1]: 0x5901bc135623599a, e2214c5628fa18805a9ff007150691ff c733c38c3996b392: padding, 118 bytes c733c38c3996b392: T= 0.356166, cwin: 17800,flight: 1475,nb_ret: 3,rtt_min: 32820,rtt: 41732,rtt_var: 23578,max_ack_delay: 0,state: 13 c733c38c3996b392: Sending 279 bytes to 193.167.100.100:443 at T=0.356166 (285d206c) c733c38c3996b392: Connection established. Version = 1, I-CID: c733c38c3996b392, verified: 1 c733c38c3996b392: Receiving 46 bytes from 193.167.100.100:443 at T=0.387535 (285d9af5) c733c38c3996b392: Receiving packet type: 4 (handshake), S0, Q1, Version 1, c733c38c3996b392: <3dc1b01caad180da>, <4000001e7a8977f3>, Seq: 173, pl: 22 c733c38c3996b392: Decrypted 5 bytes c733c38c3996b392: ack (nb=0), 0 c733c38c3996b392: All done, Closing the connection. c733c38c3996b392: Sending packet type: 6 (1rtt protected), S1, Q1, c733c38c3996b392: <4000001e7a8977f3>, Seq: 5 (5), Phi: 0, c733c38c3996b392: Prepared 14 bytes c733c38c3996b392: ack (nb=1), 8371116, 8371112-8371113 c733c38c3996b392: application_close, Error 0x0000, Reason length 0 c733c38c3996b392: Sending 40 bytes to 193.167.100.100:443 at T=0.387585 (285d9b27) c733c38c3996b392: Receiving 400 bytes from 193.167.100.100:443 at T=0.387859 (285d9c39) c733c38c3996b392: Receiving packet type: 6 (1rtt protected), S0, Q1, c733c38c3996b392: <3dc1b01caad180da>, Seq: 175 (8371119), Phi: 0, c733c38c3996b392: Decrypted 374 bytes c733c38c3996b392: crypto_hs, offset 0, length 250: 040000f600000e10... c733c38c3996b392: ack (nb=1), 2-4, 0 c733c38c3996b392: handshake_done c733c38c3996b392: new_connection_id[1]: 0x400000064237dd0c, 82621d630bee1c8192cbe1e9b6128403 c733c38c3996b392: new_connection_id[2]: 0x4000000b2fde6fb8, 220f3567cffb8ca89964ef691e540bb5 c733c38c3996b392: new_connection_id[3]: 0x40000006cd08c7ac, d4ce8f3c749d14f9c1321217ddc6def6 c733c38c3996b392: new_connection_id[4]: 0x4000000853922e4b, f65a451dc2fe7154ba52d82471ad6467 c733c38c3996b392: Receiving 41 bytes from 193.167.100.100:443 at T=0.418195 (285e12b9) c733c38c3996b392: Receiving packet type: 6 (1rtt protected), S0, Q1, c733c38c3996b392: <3dc1b01caad180da>, Seq: 176 (8371120), Phi: 0, c733c38c3996b392: Decrypted 15 bytes c733c38c3996b392: connection_close, Error 0x0000, Offending frame 0x1c, Reason length 11 c733c38c3996b392: Reason: Peer closed c733c38c3996b392: Out of 4 zero RTT packets, 2 were acked by the server. c733c38c3996b392: Received 1024 bytes in 0.418302 seconds, 0.019584 Mbps. c733c38c3996b392: Sent 17 bytes in 0.418302 seconds, 0.000325 Mbps.