88aaacedfddec722: No root crt list specified -- certificate will not be verified. 88aaacedfddec722: Sending ALPN list (1): hq-interop 88aaacedfddec722: Sending transport parameter TLS extension (85 bytes): 88aaacedfddec722: Extension list (85 bytes): 88aaacedfddec722: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 88aaacedfddec722: Extension type: 4 (initial_max_data), length 4, 80100000 88aaacedfddec722: Extension type: 8 (max_streams_bidi), length 2, 4200 88aaacedfddec722: Extension type: 1 (idle_timeout), length 4, 8002bf20 88aaacedfddec722: Extension type: 3 (max_packet_size), length 2, 45a0 88aaacedfddec722: Extension type: 9 (max_streams_uni), length 2, 4200 88aaacedfddec722: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 88aaacedfddec722: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 88aaacedfddec722: Extension type: 14 (active_connection_id_limit), length 1, 08 88aaacedfddec722: Extension type: 11 (max_ack_delay), length 1, 0a 88aaacedfddec722: Extension type: 15 (hcid), length 8, 191b35c81942d1a8 88aaacedfddec722: Extension type: 4274 (unknown), length 4, 8000aaac 88aaacedfddec722: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 88aaacedfddec722: Extension type: 29016 (enable_time_stamp), length 1, 03 88aaacedfddec722: Extension type: 10930 (grease_quic_bit), length 0 88aaacedfddec722: Preparing GET on stream 0 for /ykzjqgktuk 88aaacedfddec722: Sending packet type: 2 (initial), S0, Q1, Version 1, 88aaacedfddec722: <88aaacedfddec722>, <191b35c81942d1a8>, Seq: 80700, pl: 553 88aaacedfddec722: Token length: 0 88aaacedfddec722: Prepared 533 bytes 88aaacedfddec722: ping, 1 bytes 88aaacedfddec722: crypto_hs, offset 0, length 528: 0100020c0303721b... 88aaacedfddec722: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 88aaacedfddec722: <88aaacedfddec722>, <191b35c81942d1a8>, Seq: 0, pl: 648 88aaacedfddec722: Prepared 628 bytes 88aaacedfddec722: stream 0, offset 0, length 17, fin = 1: 474554202f796b7a... 88aaacedfddec722: padding, 608 bytes 88aaacedfddec722: Sending 1252 bytes to 193.167.100.100:443 at T=0.001911 (29958f96) 88aaacedfddec722: Receiving 1232 bytes from 193.167.100.100:443 at T=0.035240 (299611c7) 88aaacedfddec722: Receiving packet type: 2 (initial), S0, Q1, Version 1, 88aaacedfddec722: <191b35c81942d1a8>, <400000de0daefcfb>, Seq: 13846808, pl: 1206 88aaacedfddec722: Token length: 0 88aaacedfddec722: Decrypted 1186 bytes 88aaacedfddec722: crypto_hs, offset 0, length 96: 0200005c0303806a... 88aaacedfddec722: ack (nb=0), 80700 88aaacedfddec722: padding, 1077 bytes 88aaacedfddec722: Receiving 48 bytes from 193.167.100.100:443 at T=0.035534 (299612ed) 88aaacedfddec722: T= 0.035534, Keys unavailable, buffered packet type 6. 88aaacedfddec722: Sending packet type: 4 (handshake), S0, Q1, Version 1, 88aaacedfddec722: <400000de0daefcfb>, <191b35c81942d1a8>, Seq: 0, pl: 21 88aaacedfddec722: Prepared 1 bytes 88aaacedfddec722: ping, 1 bytes 88aaacedfddec722: Sending 46 bytes to 193.167.100.100:443 at T=0.039477 (29962254) 88aaacedfddec722: Sending packet type: 4 (handshake), S0, Q1, Version 1, 88aaacedfddec722: <400000de0daefcfb>, <191b35c81942d1a8>, Seq: 1, pl: 21 88aaacedfddec722: Prepared 1 bytes 88aaacedfddec722: ping, 1 bytes 88aaacedfddec722: Sending 46 bytes to 193.167.100.100:443 at T=0.122931 (29976852) 88aaacedfddec722: Receiving 1058 bytes from 193.167.100.100:443 at T=0.141166 (2997af8d) 88aaacedfddec722: T= 0.141166, Keys unavailable, buffered packet type 6. 88aaacedfddec722: Sending packet type: 4 (handshake), S0, Q1, Version 1, 88aaacedfddec722: <400000de0daefcfb>, <191b35c81942d1a8>, Seq: 2, pl: 21 88aaacedfddec722: Prepared 1 bytes 88aaacedfddec722: ping, 1 bytes 88aaacedfddec722: Sending 46 bytes to 193.167.100.100:443 at T=0.289773 (2999f40c) 88aaacedfddec722: Receiving 1058 bytes from 193.167.100.100:443 at T=0.351598 (299ae58d) 88aaacedfddec722: T= 0.351598, Keys unavailable, buffered packet type 6. 88aaacedfddec722: Sending packet type: 4 (handshake), S0, Q1, Version 1, 88aaacedfddec722: <400000de0daefcfb>, <191b35c81942d1a8>, Seq: 3, pl: 21 88aaacedfddec722: Prepared 1 bytes 88aaacedfddec722: ping, 1 bytes 88aaacedfddec722: Sending 46 bytes to 193.167.100.100:443 at T=0.623383 (299f0b36) 88aaacedfddec722: Receiving 50 bytes from 193.167.100.100:443 at T=0.764567 (29a132b6) 88aaacedfddec722: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 88aaacedfddec722: <191b35c81942d1a8>, <400000de0daefcfb>, Seq: 13846814, pl: 26 88aaacedfddec722: Decrypted 6 bytes 88aaacedfddec722: ack (nb=0), 0-3 88aaacedfddec722: Receiving 1058 bytes from 193.167.100.100:443 at T=0.765422 (29a1360d) 88aaacedfddec722: T= 0.765422, Keys unavailable, buffered packet type 6. 88aaacedfddec722: Receiving 217 bytes from 193.167.100.100:443 at T=1.575688 (29ad9327) 88aaacedfddec722: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 88aaacedfddec722: <191b35c81942d1a8>, <400000de0daefcfb>, Seq: 13846816, pl: 192 88aaacedfddec722: Decrypted 172 bytes 88aaacedfddec722: crypto_hs, offset 0, length 168: 08000080007e0010... 88aaacedfddec722: Received transport parameter TLS extension (101 bytes): 88aaacedfddec722: Extension list (101 bytes): 88aaacedfddec722: Extension type: 0 (ocid), length 8, 88aaacedfddec722 88aaacedfddec722: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 88aaacedfddec722: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 88aaacedfddec722: Extension type: 7 (max_stream_data_uni), length 4, 86666666 88aaacedfddec722: Extension type: 4 (initial_max_data), length 4, 86666666 88aaacedfddec722: Extension type: 8 (max_streams_bidi), length 2, 4064 88aaacedfddec722: Extension type: 9 (max_streams_uni), length 2, 4064 88aaacedfddec722: Extension type: 1 (idle_timeout), length 4, 8000ea60 88aaacedfddec722: Extension type: 10 (ack_delay_exponent), length 1, 03 88aaacedfddec722: Extension type: 3 (max_packet_size), length 2, 45dc 88aaacedfddec722: Extension type: 2 (stateless_reset_token), length 16, 00a8ee195f3b6f567e1e18fbd182ef94 88aaacedfddec722: Extension type: 15 (hcid), length 8, 400000de0daefcfb 88aaacedfddec722: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff 88aaacedfddec722: Extension type: 267427841 (unknown), length 1, 00 88aaacedfddec722: Extension type: 20856 (unknown), length 1, 01 88aaacedfddec722: The session was properly resumed! 88aaacedfddec722: Zero RTT data is accepted! 88aaacedfddec722: Negotiated ALPN: hq-interop 88aaacedfddec722: Receiving 1058 bytes from 193.167.100.100:443 at T=1.576088 (29ad94b7) 88aaacedfddec722: Receiving packet type: 6 (1rtt protected), S0, Q1, 88aaacedfddec722: <191b35c81942d1a8>, Seq: 13846815 (13846815), Phi: 0, 88aaacedfddec722: Decrypted 1029 bytes 88aaacedfddec722: stream 0, offset 0, length 1024, fin = 1: b5b633f4f102f0a3... 88aaacedfddec722: padding, 1 bytes 88aaacedfddec722: T= 1.576088, cwin: 16043,flight: 673,nb_ret: 0,rtt_min: 33329,rtt: 46810,rtt_var: 39461,max_ack_delay: 0,state: 10 88aaacedfddec722: Receiving 1058 bytes from 193.167.100.100:443 at T=1.576088 (29ad94b7) 88aaacedfddec722: Receiving packet type: 6 (1rtt protected), S0, Q1, 88aaacedfddec722: <191b35c81942d1a8>, Seq: 13846813 (13846813), Phi: 0, 88aaacedfddec722: Decrypted 1029 bytes 88aaacedfddec722: stream 0, offset 0, length 1024, fin = 1: b5b633f4f102f0a3... 88aaacedfddec722: padding, 1 bytes 88aaacedfddec722: T= 1.576088, cwin: 16043,flight: 673,nb_ret: 0,rtt_min: 33329,rtt: 46810,rtt_var: 39461,max_ack_delay: 0,state: 10 88aaacedfddec722: Receiving 1058 bytes from 193.167.100.100:443 at T=1.576088 (29ad94b7) 88aaacedfddec722: Receiving packet type: 6 (1rtt protected), S0, Q1, 88aaacedfddec722: <191b35c81942d1a8>, Seq: 13846811 (13846811), Phi: 0, 88aaacedfddec722: Decrypted 1029 bytes 88aaacedfddec722: stream 0, offset 0, length 1024, fin = 1: b5b633f4f102f0a3... 88aaacedfddec722: padding, 1 bytes 88aaacedfddec722: T= 1.576088, cwin: 16043,flight: 673,nb_ret: 0,rtt_min: 33329,rtt: 46810,rtt_var: 39461,max_ack_delay: 0,state: 10 88aaacedfddec722: Receiving 48 bytes from 193.167.100.100:443 at T=1.576088 (29ad94b7) 88aaacedfddec722: Receiving packet type: 6 (1rtt protected), S0, Q1, 88aaacedfddec722: <191b35c81942d1a8>, Seq: 13846808 (13846808), Phi: 0, 88aaacedfddec722: Decrypted 19 bytes 88aaacedfddec722: ack (nb=0), 0 88aaacedfddec722: padding, 13 bytes 88aaacedfddec722: T= 1.576088, cwin: 16700,flight: 0,nb_ret: 0,rtt_min: 33329,rtt: 46810,rtt_var: 39461,max_ack_delay: 0,state: 10 88aaacedfddec722: Sending packet type: 4 (handshake), S0, Q1, Version 1, 88aaacedfddec722: <400000de0daefcfb>, <191b35c81942d1a8>, Seq: 4, pl: 69 88aaacedfddec722: Prepared 49 bytes 88aaacedfddec722: ack (nb=1), 13846816, 13846814 88aaacedfddec722: crypto_hs, offset 0, length 36: 14000020cd36be01... 88aaacedfddec722: Sending packet type: 6 (1rtt protected), S1, Q1, 88aaacedfddec722: <400000de0daefcfb>, Seq: 1 (1), Phi: 0, 88aaacedfddec722: Prepared 157 bytes 88aaacedfddec722: ack (nb=3), 13846815, 13846813, 13846811, 13846808 88aaacedfddec722: new_connection_id[1]: 0x80b5d0364da02e7e, ae25506196db784f8402e806f709ba19 88aaacedfddec722: padding, 112 bytes 88aaacedfddec722: T= 1.576088, cwin: 16700,flight: 277,nb_ret: 0,rtt_min: 33329,rtt: 46810,rtt_var: 39461,max_ack_delay: 0,state: 13 88aaacedfddec722: Sending 277 bytes to 193.167.100.100:443 at T=1.576088 (29ad94b7) 88aaacedfddec722: Connection established. Version = 1, I-CID: 88aaacedfddec722, verified: 1 88aaacedfddec722: Receiving 1058 bytes from 193.167.100.100:443 at T=1.576701 (29ad971c) 88aaacedfddec722: Receiving packet type: 6 (1rtt protected), S0, Q1, 88aaacedfddec722: <191b35c81942d1a8>, Seq: 13846817 (13846817), Phi: 0, 88aaacedfddec722: Decrypted 1029 bytes 88aaacedfddec722: stream 0, offset 0, length 1024, fin = 1: b5b633f4f102f0a3... 88aaacedfddec722: padding, 1 bytes 88aaacedfddec722: T= 1.576701, cwin: 16700,flight: 277,nb_ret: 0,rtt_min: 33329,rtt: 46810,rtt_var: 39461,max_ack_delay: 0,state: 13 88aaacedfddec722: All done, Closing the connection. 88aaacedfddec722: Sending packet type: 6 (1rtt protected), S1, Q1, 88aaacedfddec722: <400000de0daefcfb>, Seq: 2 (2), Phi: 0, 88aaacedfddec722: Prepared 19 bytes 88aaacedfddec722: ack (nb=4), 13846817, 13846815, 13846813, 13846811, 13846808 88aaacedfddec722: application_close, Error 0x0000, Reason length 0 88aaacedfddec722: Sending 45 bytes to 193.167.100.100:443 at T=1.576813 (29ad978c) 88aaacedfddec722: Receiving 46 bytes from 193.167.100.100:443 at T=1.607624 (29ae0fe7) 88aaacedfddec722: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 88aaacedfddec722: <191b35c81942d1a8>, <400000de0daefcfb>, Seq: 33, pl: 22 88aaacedfddec722: Decrypted 5 bytes 88aaacedfddec722: ack (nb=0), 0-4 88aaacedfddec722: Receiving 400 bytes from 193.167.100.100:443 at T=1.607961 (29ae1138) 88aaacedfddec722: Receiving packet type: 6 (1rtt protected), S0, Q1, 88aaacedfddec722: <191b35c81942d1a8>, Seq: 34 (13846818), Phi: 0, 88aaacedfddec722: Decrypted 374 bytes 88aaacedfddec722: crypto_hs, offset 0, length 250: 040000f600000e10... 88aaacedfddec722: ack (nb=0), 0-1 88aaacedfddec722: handshake_done 88aaacedfddec722: new_connection_id[1]: 0x400000cccc3e9282, 6a80e0c8fdda929fb485718050578f79 88aaacedfddec722: new_connection_id[2]: 0x400000da44ee8def, 16db2928637780a0ec330ba6fb3b22e4 88aaacedfddec722: new_connection_id[3]: 0x400000c21ee1cbf9, 2dfe7d5aecf8dd15f7a1280c03fe3af7 88aaacedfddec722: new_connection_id[4]: 0x400000c7b426c537, c9f132685ad574010dc3655a25fac07f 88aaacedfddec722: padding, 2 bytes 88aaacedfddec722: Receiving 57 bytes from 193.167.100.100:443 at T=1.608031 (29ae117e) 88aaacedfddec722: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 88aaacedfddec722: <191b35c81942d1a8>, <400000de0daefcfb>, Seq: 34, pl: 32 88aaacedfddec722: Decrypted 15 bytes 88aaacedfddec722: connection_close, Error 0x0000, Offending frame 0x1c, Reason length 11 88aaacedfddec722: Reason: Peer closed 88aaacedfddec722: Out of 1 zero RTT packets, 1 were acked by the server. 88aaacedfddec722: Received 1024 bytes in 6.303294 seconds, 0.001300 Mbps. 88aaacedfddec722: Sent 17 bytes in 6.303294 seconds, 0.000022 Mbps.