800066e80e48e16b: No root crt list specified -- certificate will not be verified. 800066e80e48e16b: Sending ALPN list (1): hq-interop 800066e80e48e16b: Sending transport parameter TLS extension (83 bytes): 800066e80e48e16b: Extension list (83 bytes): 800066e80e48e16b: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 800066e80e48e16b: Extension type: 4 (initial_max_data), length 4, 80100000 800066e80e48e16b: Extension type: 8 (max_streams_bidi), length 2, 4200 800066e80e48e16b: Extension type: 1 (idle_timeout), length 4, 8002bf20 800066e80e48e16b: Extension type: 3 (max_packet_size), length 2, 45a0 800066e80e48e16b: Extension type: 9 (max_streams_uni), length 2, 4200 800066e80e48e16b: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 800066e80e48e16b: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 800066e80e48e16b: Extension type: 14 (active_connection_id_limit), length 1, 08 800066e80e48e16b: Extension type: 11 (max_ack_delay), length 1, 0a 800066e80e48e16b: Extension type: 15 (hcid), length 8, 51d44308ac50e94d 800066e80e48e16b: Extension type: 4026 (unknown), length 2, 4066 800066e80e48e16b: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 800066e80e48e16b: Extension type: 29016 (enable_time_stamp), length 1, 03 800066e80e48e16b: Extension type: 10930 (grease_quic_bit), length 0 800066e80e48e16b: Preparing GET on stream 0 for /massive-jubilant-diary 800066e80e48e16b: Sending packet type: 2 (initial), S0, Q1, Version 1, 800066e80e48e16b: <800066e80e48e16b>, <51d44308ac50e94d>, Seq: 128362, pl: 551 800066e80e48e16b: Token length: 0 800066e80e48e16b: Prepared 531 bytes 800066e80e48e16b: ping, 1 bytes 800066e80e48e16b: crypto_hs, offset 0, length 526: 0100020a0303518a... 800066e80e48e16b: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 800066e80e48e16b: <800066e80e48e16b>, <51d44308ac50e94d>, Seq: 0, pl: 650 800066e80e48e16b: Prepared 630 bytes 800066e80e48e16b: stream 0, offset 0, length 29, fin = 1: 474554202f6d6173... 800066e80e48e16b: padding, 598 bytes 800066e80e48e16b: Sending 1252 bytes to 193.167.100.100:443 at T=0.001981 (170577f8) 800066e80e48e16b: Receiving 1232 bytes from 193.167.100.100:443 at T=0.035277 (1705fa08) 800066e80e48e16b: Receiving packet type: 2 (initial), S0, Q1, Version 1, 800066e80e48e16b: <51d44308ac50e94d>, <400000d70dd6b753>, Seq: 12778506, pl: 1206 800066e80e48e16b: Token length: 0 800066e80e48e16b: Decrypted 1186 bytes 800066e80e48e16b: crypto_hs, offset 0, length 96: 0200005c030360d1... 800066e80e48e16b: ack (nb=0), 128362 800066e80e48e16b: padding, 1077 bytes 800066e80e48e16b: Receiving 217 bytes from 193.167.100.100:443 at T=0.035660 (1705fb87) 800066e80e48e16b: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 800066e80e48e16b: <51d44308ac50e94d>, <400000d70dd6b753>, Seq: 12778506, pl: 192 800066e80e48e16b: Decrypted 172 bytes 800066e80e48e16b: crypto_hs, offset 0, length 168: 08000080007e0010... 800066e80e48e16b: Received transport parameter TLS extension (101 bytes): 800066e80e48e16b: Extension list (101 bytes): 800066e80e48e16b: Extension type: 0 (ocid), length 8, 800066e80e48e16b 800066e80e48e16b: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 800066e80e48e16b: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 800066e80e48e16b: Extension type: 7 (max_stream_data_uni), length 4, 86666666 800066e80e48e16b: Extension type: 4 (initial_max_data), length 4, 86666666 800066e80e48e16b: Extension type: 8 (max_streams_bidi), length 2, 4064 800066e80e48e16b: Extension type: 9 (max_streams_uni), length 2, 4064 800066e80e48e16b: Extension type: 1 (idle_timeout), length 4, 8000ea60 800066e80e48e16b: Extension type: 10 (ack_delay_exponent), length 1, 03 800066e80e48e16b: Extension type: 3 (max_packet_size), length 2, 45dc 800066e80e48e16b: Extension type: 2 (stateless_reset_token), length 16, c55699322ae36357b767294ba64083cd 800066e80e48e16b: Extension type: 15 (hcid), length 8, 400000d70dd6b753 800066e80e48e16b: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff 800066e80e48e16b: Extension type: 267427841 (unknown), length 1, 00 800066e80e48e16b: Extension type: 20856 (unknown), length 1, 01 800066e80e48e16b: The session was properly resumed! 800066e80e48e16b: Zero RTT data is accepted! 800066e80e48e16b: Negotiated ALPN: hq-interop 800066e80e48e16b: Receiving 48 bytes from 193.167.100.100:443 at T=0.035890 (1705fc6d) 800066e80e48e16b: Receiving packet type: 6 (1rtt protected), S0, Q1, 800066e80e48e16b: <51d44308ac50e94d>, Seq: 12778506 (12778506), Phi: 0, 800066e80e48e16b: Decrypted 19 bytes 800066e80e48e16b: ack (nb=0), 0 800066e80e48e16b: padding, 13 bytes 800066e80e48e16b: T= 0.035890, cwin: 16580,flight: 0,nb_ret: 0,rtt_min: 33296,rtt: 33372,rtt_var: 12639,max_ack_delay: 0,state: 10 800066e80e48e16b: Sending packet type: 4 (handshake), S0, Q1, Version 1, 800066e80e48e16b: <400000d70dd6b753>, <51d44308ac50e94d>, Seq: 0, pl: 67 800066e80e48e16b: Prepared 47 bytes 800066e80e48e16b: ack (nb=0), 12778506 800066e80e48e16b: crypto_hs, offset 0, length 36: 140000207beb4622... 800066e80e48e16b: Sending packet type: 6 (1rtt protected), S1, Q1, 800066e80e48e16b: <400000d70dd6b753>, Seq: 1 (1), Phi: 0, 800066e80e48e16b: Prepared 157 bytes 800066e80e48e16b: ack (nb=0), 12778506 800066e80e48e16b: new_connection_id[1]: 0xdc12a29e00ad322d, 4bda35a51b1097c88d8d4f194448f2d6 800066e80e48e16b: padding, 121 bytes 800066e80e48e16b: T= 0.035932, cwin: 16580,flight: 275,nb_ret: 0,rtt_min: 33296,rtt: 33372,rtt_var: 12639,max_ack_delay: 0,state: 13 800066e80e48e16b: Sending 275 bytes to 193.167.100.100:443 at T=0.035932 (1705fc97) 800066e80e48e16b: Connection established. Version = 1, I-CID: 800066e80e48e16b, verified: 1 800066e80e48e16b: Receiving 432 bytes from 193.167.100.100:443 at T=0.067474 (170677cd) 800066e80e48e16b: Receiving packet type: 6 (1rtt protected), S0, Q1, 800066e80e48e16b: <51d44308ac50e94d>, Seq: 12778508 (12778508), Phi: 0, 800066e80e48e16b: Decrypted 403 bytes 800066e80e48e16b: crypto_hs, offset 0, length 250: 040000f600000e10... 800066e80e48e16b: ack (nb=0), 0-1 800066e80e48e16b: handshake_done 800066e80e48e16b: new_connection_id[1]: 0x400000d1b2b17820, 1a1f49c79fff4e6fef6dbe9c9a84e62d 800066e80e48e16b: new_connection_id[2]: 0x400000cea7648c7a, a759976fe201c4d8ed86fa02bf665275 800066e80e48e16b: new_connection_id[3]: 0x400000cf62ccfff3, ec9f6ddea8f38fe2e352a0c5e877b582 800066e80e48e16b: new_connection_id[4]: 0x400000d1fefa1869, a8064b6773156de8bfd6aaa4d4711c39 800066e80e48e16b: padding, 31 bytes 800066e80e48e16b: T= 0.067474, cwin: 16823,flight: 0,nb_ret: 0,rtt_min: 31542,rtt: 33143,rtt_var: 9936,max_ack_delay: 0,state: 14 800066e80e48e16b: Sending packet type: 6 (1rtt protected), S1, Q1, 800066e80e48e16b: <400000d70dd6b753>, Seq: 2 (2), Phi: 0, 800066e80e48e16b: Prepared 29 bytes 800066e80e48e16b: ack (nb=1), 12778508, 12778506 800066e80e48e16b: padding, 19 bytes 800066e80e48e16b: T= 0.067654, cwin: 16823,flight: 55,nb_ret: 0,rtt_min: 31542,rtt: 33143,rtt_var: 9936,max_ack_delay: 0,state: 14 800066e80e48e16b: Sending 55 bytes to 193.167.100.100:443 at T=0.067654 (17067881) 800066e80e48e16b: Receiving 1058 bytes from 193.167.100.100:443 at T=0.167402 (1707fe25) 800066e80e48e16b: Receiving packet type: 6 (1rtt protected), S0, Q1, 800066e80e48e16b: <51d44308ac50e94d>, Seq: 12778510 (12778510), Phi: 0, 800066e80e48e16b: Decrypted 1029 bytes 800066e80e48e16b: stream 0, offset 0, length 1024, fin = 1: 0e976b89e94a1e5d... 800066e80e48e16b: padding, 1 bytes 800066e80e48e16b: T= 0.167402, cwin: 1307,flight: 0,nb_ret: 0,rtt_min: 31542,rtt: 33143,rtt_var: 9936,max_ack_delay: 0,state: 14 800066e80e48e16b: All done, Closing the connection. 800066e80e48e16b: Sending packet type: 6 (1rtt protected), S1, Q1, 800066e80e48e16b: <400000d70dd6b753>, Seq: 3 (3), Phi: 0, 800066e80e48e16b: Prepared 15 bytes 800066e80e48e16b: ack (nb=2), 12778510, 12778508, 12778506 800066e80e48e16b: application_close, Error 0x0000, Reason length 0 800066e80e48e16b: Sending 41 bytes to 193.167.100.100:443 at T=0.167684 (1707ff3f) 800066e80e48e16b: Receiving 1058 bytes from 193.167.100.100:443 at T=0.168173 (17080128) 800066e80e48e16b: Receiving packet type: 6 (1rtt protected), S0, Q1, 800066e80e48e16b: <51d44308ac50e94d>, Seq: 12778511 (12778511), Phi: 0, 800066e80e48e16b: Decrypted 1029 bytes 800066e80e48e16b: stream 0, offset 0, length 1024, fin = 1: 0e976b89e94a1e5d... 800066e80e48e16b: padding, 1 bytes 800066e80e48e16b: Receiving 1058 bytes from 193.167.100.100:443 at T=0.368609 (170b101c) 800066e80e48e16b: Receiving packet type: 6 (1rtt protected), S0, Q1, 800066e80e48e16b: <51d44308ac50e94d>, Seq: 12778514 (12778514), Phi: 0, 800066e80e48e16b: Decrypted 1029 bytes 800066e80e48e16b: stream 0, offset 0, length 1024, fin = 1: 0e976b89e94a1e5d... 800066e80e48e16b: padding, 1 bytes 800066e80e48e16b: Sending packet type: 6 (1rtt protected), S1, Q1, 800066e80e48e16b: <400000d70dd6b753>, Seq: 4 (4), Phi: 0, 800066e80e48e16b: Prepared 3 bytes 800066e80e48e16b: application_close, Error 0x0000, Reason length 0 800066e80e48e16b: Sending 29 bytes to 193.167.100.100:443 at T=0.368725 (170b1090) 800066e80e48e16b: Receiving 44 bytes from 193.167.100.100:443 at T=0.399653 (170b8960) 800066e80e48e16b: Receiving packet type: 6 (1rtt protected), S0, Q1, 800066e80e48e16b: <51d44308ac50e94d>, Seq: 12778515 (12778515), Phi: 0, 800066e80e48e16b: Decrypted 15 bytes 800066e80e48e16b: connection_close, Error 0x0000, Offending frame 0x1c, Reason length 11 800066e80e48e16b: Reason: Peer closed 800066e80e48e16b: Out of 1 zero RTT packets, 1 were acked by the server. 800066e80e48e16b: Received 1024 bytes in 0.399801 seconds, 0.020490 Mbps. 800066e80e48e16b: Sent 29 bytes in 0.399801 seconds, 0.000580 Mbps.