0.000 Creating connection with server4:443 with v1 0.088 Setting up connection for downloading https://server4:443/lfxebnomzg at 36:06.213 on ClientConnection[0009e4c8a5180416/8e61700d65f45871(V1) with server4/193.167.100.100:443] 0.090 Original destination connection id: 0009e4c8a5180416 (scid: 8e61700d65f45871) >- CryptoStream[I|ClientHello] 0.272 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.473/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.267 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.473 loss detection timeout handler running Sending probe 0, because no ack since 0.267. Current RTT: 100/25. 0.474 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.476 (Probe is an initial retransmit) 0.478 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.879/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.478 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.512 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 0.527 probe count not reset on ack because handshake not yet confirmed 0.532 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.932/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.555 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 0.749/Handshake, because peerAwaitingAddressValidation | RTT:33/16 0.554 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 0.512 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 0.560 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 0.561 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 0.584 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 0.778/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.584 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.589 Starting downloading https://server4:443/lfxebnomzg at 36:06.728 on ClientConnection[0009e4c8a5180416/8e61700d65f45871(V1) with server4/193.167.100.100:443] 0.590 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 0.595 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.595 Discarding pn space Initial because first Handshake message is being sent 0.597 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 0.617 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 0.619 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 0.626 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 0.626 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 0.626 -> Packet A|0|S0|b3cc863425d87a897b88|49|1 StreamFrame[0(CIB),0,17] 0.617 <- (3) Packet A|0|S0|8e61700d65f45871|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5fc457c083e335f95aaf|e7445a6669968013628ede5f41265b2e] Padding(1226) 0.636 State is set to Confirmed reschedule loss detection timer for PTO over 91 millis, based on 0.727/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 90 millis, based on 0.727/App, because ackElicitingInFlight | RTT:33/12 0.636 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 100 millis, based on 0.738/App, because ackElicitingInFlight | RTT:33/12 0.637 -> Packet A|1|S0|b3cc863425d87a897b88|32|1 StreamFrame[0(CIB),17,0,fin] 0.623 <- (4) Packet A|2|S0|8e61700d65f45871|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d8601003ba2bbf8ae3dfb48fe97f2e9cc0d08562df1102b4c7216f87c799d6d86c9a9b3d5b2c19e] -< CryptoStream[A|NewSessionTicket] 0.640 -> Packet A|2|S0|b3cc863425d87a897b88|36|1 AckFrame[2,0|Δ3] 0.659 <- (5) Packet A|3|S0|8e61700d65f45871|1054|1 StreamFrame[0(CIB),0,1024,fin] 0.662 Finished downloading https://server4:443/lfxebnomzg at 36:06.801 on ClientConnection[0009e4c8a5180416/8e61700d65f45871(V1) with server4/193.167.100.100:443] 0.663 Closing ClientConnection[0009e4c8a5180416/8e61700d65f45871(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.666 Creating connection with server4:443 with v1 0.667 Setting up connection for downloading https://server4:443/kkrwxjtrii at 36:06.806 on ClientConnection[05ce54c94ffecdca/7052438d5b25e5bc(V1) with server4/193.167.100.100:443] 0.668 Original destination connection id: 05ce54c94ffecdca (scid: 7052438d5b25e5bc) 0.667 <- (6) Packet A|4|S0|8e61700d65f45871|31|1 AckFrame[1-0|Δ0] 0.666 -> Packet A|3|S0|b3cc863425d87a897b88|40|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ5] 0.671 -> Packet A|4|S0|b3cc863425d87a897b88|39|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] >- CryptoStream[I|ClientHello] 0.674 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.874/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.674 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.874 loss detection timeout handler running Sending probe 0, because no ack since 0.674. Current RTT: 100/25. 0.874 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.874 (Probe is an initial retransmit) 0.875 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.275/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.875 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.275 loss detection timeout handler running Sending probe 1, because no ack since 0.875. Current RTT: 100/25. 1.275 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.275 (Probe is an initial retransmit) 1.276 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.076/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.276 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.277 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.077/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.277 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.312 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 1.313 probe count not reset on ack because handshake not yet confirmed 1.315 Retransmitting CryptoFrame[0,257] on level Initial 1.316 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.116/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.315 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) 1.316 Cwnd(-): 6000; inflight: 2400 1.317 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.117/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 1.312 <- (1) Packet H|0|L|766|1 CryptoFrame[0,718] 1.322 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 1.735/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.322 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 1.323 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 1.323 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 1.327 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 1.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.327 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.329 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.329 Starting downloading https://server4:443/kkrwxjtrii at 36:07.469 on ClientConnection[05ce54c94ffecdca/7052438d5b25e5bc(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 1.432/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.330 Discarding pn space Initial because first Handshake message is being sent 1.331 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.434/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.331 -> [Packet H|1|L|48|1 AckFrame[0|Δ0], Packet A|0|S0|1eb9aeba9bdd0069df7e|49|1 StreamFrame[0(CIB),0,17,fin]] 1.348 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.433 loss detection timeout handler running Sending probe 0, because no ack since 1.327. Current RTT: 35/17. 1.434 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.434 (Probe is a handshake retransmit) 1.435 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 1.641/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.435 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 1.640 loss detection timeout handler running Sending probe 1, because no ack since 1.331. Current RTT: 35/17. 1.641 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.641 (Probe is a handshake retransmit) 1.642 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 2.054/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.641 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 1.642 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 2.055/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.642 -> Packet PH|4|L|82|1 CryptoFrame[0,36] 1.674 <- (3) Packet H|3|L|51|1 AckFrame[3,1|Δ0] 1.676 probe count not reset on ack because handshake not yet confirmed 1.677 Retransmitting CryptoFrame[0,36] on level Handshake 1.677 Cwnd(-): 3000; inflight: 131 1.677 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 377 millis, based on 2.054/Handshake, because ackElicitingInFlight | RTT:35/17 1.677 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 411 millis, based on 2.089/Handshake, because ackElicitingInFlight | RTT:35/14 1.677 -> Packet H|5|L|82|1 CryptoFrame[0,36] 1.674 <- (3) Packet A|0|S0|7052438d5b25e5bc|1281|4 AckFrame[0|Δ310] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|d497b18757a317a6ccb6|0a239fb9a11e38fde9e4bc52d431074b] Padding(1216) reschedule loss detection timer for PTO over 89 millis, based on 1.768/Handshake, because ackElicitingInFlight | RTT:35/14 1.679 State is set to Confirmed reschedule loss detection timer for PTO over 400 millis, based on 2.080/Handshake, because ackElicitingInFlight | RTT:71/83 1.679 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.679 Discarding pn space Handshake because HandshakeDone is received 1.678 <- (4) Packet A|2|S0|7052438d5b25e5bc|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 1.681 Finished downloading https://server4:443/kkrwxjtrii at 36:07.820 on ClientConnection[05ce54c94ffecdca/7052438d5b25e5bc(V1) with server4/193.167.100.100:443] 1.681 Closing ClientConnection[05ce54c94ffecdca/7052438d5b25e5bc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.678 <- (5) Packet A|3|S0|7052438d5b25e5bc|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d86010041f3217cac2492a0a3471e992e994345c97350872c171c2f1d9fec3d6f520e448d7ffa37] 1.681 -> Packet A|1|S0|1eb9aeba9bdd0069df7e|35|1 AckFrame[2,0|Δ0] 1.681 -> Packet A|2|S0|1eb9aeba9bdd0069df7e|43|3 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] ConnectionCloseFrame[0|0|] 1.682 Creating connection with server4:443 with v1 1.683 Setting up connection for downloading https://server4:443/godclzvlqp at 36:07.823 on ClientConnection[04d201a431843130/33f413419b8d3ccb(V1) with server4/193.167.100.100:443] 1.683 Original destination connection id: 04d201a431843130 (scid: 33f413419b8d3ccb) >- CryptoStream[I|ClientHello] 1.685 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.885/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.685 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.712 <- (6) Packet A|4|S0|7052438d5b25e5bc|29|2 MaxStreamsFrame[B,17] Padding(1) 1.715 -> Packet A|3|S0|1eb9aeba9bdd0069df7e|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 1.721 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 1.722 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.922/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.726 <- (7) Packet A|5|S0|7052438d5b25e5bc|1332|2 PingFrame[] Padding(1305) 1.721 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 1.728 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.728 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 1.728 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) reschedule loss detection timer for PTO over 102 millis, based on 1.831/Handshake, because peerAwaitingAddressValidation | RTT:35/17 1.727 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 1.732 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.835/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.732 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.836/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.733 Discarding pn space Initial because first Handshake message is being sent 1.734 Starting downloading https://server4:443/godclzvlqp at 36:07.873 on ClientConnection[04d201a431843130/33f413419b8d3ccb(V1) with server4/193.167.100.100:443] 1.734 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 1.735 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.838/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.735 -> Packet A|0|S0|45045ca53e05ec839711|49|1 StreamFrame[0(CIB),0,17,fin] 1.748 <- (8) Packet A|6|S0|7052438d5b25e5bc|37|2 AckFrame[3,1-0|Δ0] ConnectionCloseFrame[0|28|] 1.837 loss detection timeout handler running Sending probe 0, because no ack since 1.732. Current RTT: 35/17. 1.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.837 (Probe is a handshake retransmit) 1.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 2.044/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.838 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 1.886 <- (2) Packet A|3|S0|33f413419b8d3ccb|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601004747d499dc1550b8194faf64463314ddb2c66bf29c1c043b38f1b2406957ade2503f91cc] -< CryptoStream[A|] 1.908 -> Packet A|1|S0|45045ca53e05ec839711|34|1 AckFrame[3|Δ19] 1.939 <- (3) Packet A|4|S0|33f413419b8d3ccb|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c1776d702fd80bc3872f|1b8036a6ece2c3e05e0d8181a61df741] 1.940 State is set to Confirmed reschedule loss detection timer for PTO over 40 millis, based on 1.981/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -82 millis, based on 1.858/App, because ackElicitingInFlight | RTT:35/17 1.941 loss detection timeout handler running 1.941 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 1.735. Current RTT: 35/17. 1.941 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 2.188/App, because ackElicitingInFlight | RTT:35/17 1.942 -> Packet PA|2|S0|45045ca53e05ec839711|49|1 StreamFrame[0(CIB),0,17,fin] 1.961 -> Packet A|3|S0|45045ca53e05ec839711|34|1 AckFrame[4-3|Δ19] 2.025 <- (4) Packet A|6|S0|33f413419b8d3ccb|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|NewSessionTicket] 2.027 Finished downloading https://server4:443/godclzvlqp at 36:08.167 on ClientConnection[04d201a431843130/33f413419b8d3ccb(V1) with server4/193.167.100.100:443] 2.027 Closing ClientConnection[04d201a431843130/33f413419b8d3ccb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.028 Creating connection with server4:443 with v1 2.028 -> Packet A|4|S0|45045ca53e05ec839711|39|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-3|Δ0] 2.029 Setting up connection for downloading https://server4:443/ekuantrwwf at 36:08.168 on ClientConnection[6b3bae32c0ca0bdf/0cac114dbef6a1df(V1) with server4/193.167.100.100:443] 2.029 Original destination connection id: 6b3bae32c0ca0bdf (scid: 0cac114dbef6a1df) >- CryptoStream[I|ClientHello] 2.031 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.231/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.031 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.059 <- (5) Packet A|7|S0|33f413419b8d3ccb|37|2 AckFrame[4-3,1-0|Δ0] ConnectionCloseFrame[0|28|] 2.230 loss detection timeout handler running Sending probe 0, because no ack since 2.031. Current RTT: 100/25. 2.231 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.231 (Probe is an initial retransmit) 2.232 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.632/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.231 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.267 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 2.268 probe count not reset on ack because handshake not yet confirmed 2.268 Retransmitting CryptoFrame[0,257] on level Initial 2.268 Cwnd(-): 6000; inflight: 0 2.269 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.669/Initial, because peerAwaitingAddressValidation | RTT:100/25 2.269 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.669/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.269 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 2.267 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 2.272 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 2.479/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.272 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 2.273 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 2.273 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 2.277 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 2.483/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.276 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.277 Starting downloading https://server4:443/ekuantrwwf at 36:08.417 on ClientConnection[6b3bae32c0ca0bdf/0cac114dbef6a1df(V1) with server4/193.167.100.100:443] 2.278 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.381/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.278 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 2.278 Discarding pn space Initial because first Handshake message is being sent 2.278 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.381/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.278 -> Packet A|0|S0|e2fed980612d8149574e|49|1 StreamFrame[0(CIB),0,17,fin] 2.312 <- (2) Packet A|2|S0|0cac114dbef6a1df|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 2.314 Finished downloading https://server4:443/ekuantrwwf at 36:08.453 on ClientConnection[6b3bae32c0ca0bdf/0cac114dbef6a1df(V1) with server4/193.167.100.100:443] 2.314 Closing ClientConnection[6b3bae32c0ca0bdf/0cac114dbef6a1df(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.312 <- (3) Packet A|3|S0|0cac114dbef6a1df|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601004e74cb6d6be0f20dd87fb0ddd46ae438ab9ed13533b1dfc472843c40dcb48d7e0bf78bd6] -< CryptoStream[A|NewSessionTicket] 2.315 -> Packet A|1|S0|e2fed980612d8149574e|37|2 AckFrame[3-2|Δ0] ConnectionCloseFrame[0|0|] 2.315 Creating connection with server4:443 with v1 2.316 Setting up connection for downloading https://server4:443/rspniqoyqc at 36:08.456 on ClientConnection[8d6d01fdd388a9ef/c236ec65a81a3f14(V1) with server4/193.167.100.100:443] 2.316 Original destination connection id: 8d6d01fdd388a9ef (scid: c236ec65a81a3f14) >- CryptoStream[I|ClientHello] 2.318 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.518/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.318 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.331 <- (4) Packet A|4|S0|0cac114dbef6a1df|32|1 AckFrame[0|Δ21] 2.332 -> Packet A|2|S0|e2fed980612d8149574e|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 2.469 <- (5) Packet A|5|S0|0cac114dbef6a1df|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|3f073a2b1219105e9133|16a3b48b5ec5cda412f78acac8acbf80] 2.469 <- (6) Packet A|6|S0|0cac114dbef6a1df|29|2 PingFrame[] Padding(2) 2.470 -> Packet A|3|S0|e2fed980612d8149574e|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 2.502 <- (7) Packet A|7|S0|0cac114dbef6a1df|37|2 AckFrame[3,0|Δ0] ConnectionCloseFrame[0|28|] 2.517 loss detection timeout handler running Sending probe 0, because no ack since 2.318. Current RTT: 100/25. 2.517 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.517 (Probe is an initial retransmit) 2.518 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.918/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.518 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.554 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 2.554 probe count not reset on ack because handshake not yet confirmed 2.555 Retransmitting CryptoFrame[0,257] on level Initial 2.555 Cwnd(-): 6000; inflight: 0 2.555 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.955/Initial, because peerAwaitingAddressValidation | RTT:100/25 2.555 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 2.761/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.555 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 2.554 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 2.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 2.764/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.558 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 2.558 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 2.559 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 2.561 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 2.767/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.561 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.562 Starting downloading https://server4:443/rspniqoyqc at 36:08.702 on ClientConnection[8d6d01fdd388a9ef/c236ec65a81a3f14(V1) with server4/193.167.100.100:443] 2.562 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.665/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.562 Discarding pn space Initial because first Handshake message is being sent 2.562 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 2.563 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.666/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.563 -> Packet A|0|S0|a617b723ec0d395d5b5b|49|1 StreamFrame[0(CIB),0,17,fin] 2.588 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.593 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 2.594 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.594 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 2.593 <- (3) Packet A|0|S0|c236ec65a81a3f14|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|313f72be3f8317b570bb|6389f0efe8c87fc02c68a8337c515bd2] Padding(1226) 2.595 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 2.674/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 2.674/App, because ackElicitingInFlight | RTT:35/14 2.595 Discarding pn space Handshake because HandshakeDone is received 2.594 <- (4) Packet A|1|S0|c236ec65a81a3f14|1332|2 PingFrame[] Padding(1305) 2.596 -> Packet A|1|S0|a617b723ec0d395d5b5b|33|1 AckFrame[1-0|Δ0] 2.596 <- (5) Packet A|2|S0|c236ec65a81a3f14|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 2.597 Finished downloading https://server4:443/rspniqoyqc at 36:08.737 on ClientConnection[8d6d01fdd388a9ef/c236ec65a81a3f14(V1) with server4/193.167.100.100:443] 2.597 Closing ClientConnection[8d6d01fdd388a9ef/c236ec65a81a3f14(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.597 <- (6) Packet A|3|S0|c236ec65a81a3f14|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100c85c664f0927dbab405c2850fabd1fde917e47f00b3ec2c18bfad3a1d03e3fd9dea24972] -< CryptoStream[A|NewSessionTicket] 2.598 -> Packet A|2|S0|a617b723ec0d395d5b5b|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 2.599 Creating connection with server4:443 with v1 2.600 Setting up connection for downloading https://server4:443/totsfnzahv at 36:08.739 on ClientConnection[232971c28c2ee280/031f00f8e5f549da(V1) with server4/193.167.100.100:443] 2.600 Original destination connection id: 232971c28c2ee280 (scid: 031f00f8e5f549da) >- CryptoStream[I|ClientHello] 2.602 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.802/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.601 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.614 <- (7) Packet A|4|S0|c236ec65a81a3f14|32|1 AckFrame[0|Δ20] 2.615 -> Packet A|3|S0|a617b723ec0d395d5b5b|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 2.629 <- (8) Packet A|5|S0|c236ec65a81a3f14|37|2 AckFrame[2,0|Δ0] ConnectionCloseFrame[0|28|] 2.638 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.639 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.839/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.642 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.638 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] reschedule loss detection timer for PTO over 107 millis, based on 2.750/Handshake, because peerAwaitingAddressValidation | RTT:36/18 2.642 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 2.643 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 2.643 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 2.645 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 2.753/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 2.645 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.646 Starting downloading https://server4:443/totsfnzahv at 36:08.786 on ClientConnection[232971c28c2ee280/031f00f8e5f549da(V1) with server4/193.167.100.100:443] 2.646 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 2.754/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 2.646 Discarding pn space Initial because first Handshake message is being sent 2.646 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 2.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 2.755/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 2.647 -> Packet A|0|S0|6ee988d1625cfd31bd77|49|1 StreamFrame[0(CIB),0,17,fin] 2.678 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 2.680 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.680 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 2.678 <- (2) Packet A|0|S0|031f00f8e5f549da|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|11308d6cd57ffa623676|2c417a87f81ec4c19d6f85e8c721bc43] Padding(1226) 2.681 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 2.763/App, because ackElicitingInFlight | RTT:36/15 reschedule loss detection timer for PTO over 81 millis, based on 2.763/App, because ackElicitingInFlight | RTT:36/15 2.681 Discarding pn space Handshake because HandshakeDone is received 2.679 <- (3) Packet A|1|S0|031f00f8e5f549da|1332|2 PingFrame[] Padding(1305) 2.681 <- (4) Packet A|2|S0|031f00f8e5f549da|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] 2.682 -> Packet A|1|S0|6ee988d1625cfd31bd77|33|1 AckFrame[1-0|Δ0] -< CryptoStream[A|] 2.683 Finished downloading https://server4:443/totsfnzahv at 36:08.823 on ClientConnection[232971c28c2ee280/031f00f8e5f549da(V1) with server4/193.167.100.100:443] 2.684 Closing ClientConnection[232971c28c2ee280/031f00f8e5f549da(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.681 <- (5) Packet A|3|S0|031f00f8e5f549da|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100627ad654cd81679ed4b5510512aa53d23701748e0113a24889b80fcc0526600a90631a22] 2.684 -> Packet A|2|S0|6ee988d1625cfd31bd77|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 2.685 Creating connection with server4:443 with v1 2.685 -> Packet A|3|S0|6ee988d1625cfd31bd77|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 2.686 Setting up connection for downloading https://server4:443/gzvgkenxmf at 36:08.826 on ClientConnection[19832a4022a3debc/611cd938bca140ab(V1) with server4/193.167.100.100:443] 2.686 Original destination connection id: 19832a4022a3debc (scid: 611cd938bca140ab) >- CryptoStream[I|ClientHello] 2.689 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.889/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.688 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.699 <- (6) Packet A|4|S0|031f00f8e5f549da|32|1 AckFrame[0|Δ20] 2.700 -> Packet A|4|S0|6ee988d1625cfd31bd77|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 2.715 <- (7) Packet A|5|S0|031f00f8e5f549da|1372|2 PingFrame[] Padding(1345) 2.716 <- (8) Packet A|6|S0|031f00f8e5f549da|37|2 AckFrame[3,1-0|Δ0] ConnectionCloseFrame[0|28|] 2.888 loss detection timeout handler running Sending probe 0, because no ack since 2.688. Current RTT: 100/25. 2.888 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.888 (Probe is an initial retransmit) 2.889 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.289/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.889 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.222 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[1|Δ300] CryptoFrame[0,123] 3.223 probe count not reset on ack because handshake not yet confirmed 3.223 Retransmitting CryptoFrame[0,257] on level Initial 3.224 Cwnd(-): 6000; inflight: 0 3.224 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.624/Initial, because peerAwaitingAddressValidation | RTT:100/25 3.224 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1993 millis, based on 5.218/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 3.224 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 3.222 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 3.231 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 5.226/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 3.231 -> Packet I|3|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 3.232 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 3.232 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 3.235 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 5.229/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 3.235 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.235 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.235 Starting downloading https://server4:443/gzvgkenxmf at 36:09.375 on ClientConnection[19832a4022a3debc/611cd938bca140ab(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 996 millis, based on 4.232/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 3.236 Discarding pn space Initial because first Handshake message is being sent 3.235 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 3.236 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 996 millis, based on 4.233/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 3.236 -> Packet A|0|S0|398a70aee87f3165934c|49|1 StreamFrame[0(CIB),0,17,fin] 3.264 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.267 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 3.267 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.267 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.267 <- (3) Packet A|0|S0|611cd938bca140ab|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|974b900a8ff700fd289d|cc0752dbe0fbdc3969113ac0e98f8b62] Padding(1226) 3.268 State is set to Confirmed reschedule loss detection timer for PTO over 1083 millis, based on 4.351/App, because ackElicitingInFlight | RTT:295/200 reschedule loss detection timer for PTO over 1082 millis, based on 4.351/App, because ackElicitingInFlight | RTT:295/200 3.268 Discarding pn space Handshake because HandshakeDone is received 3.271 <- (4) Packet A|2|S0|611cd938bca140ab|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 3.272 Finished downloading https://server4:443/gzvgkenxmf at 36:09.411 on ClientConnection[19832a4022a3debc/611cd938bca140ab(V1) with server4/193.167.100.100:443] 3.272 Closing ClientConnection[19832a4022a3debc/611cd938bca140ab(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.272 -> Packet A|1|S0|398a70aee87f3165934c|36|1 AckFrame[2,0|Δ3] 3.272 -> Packet A|2|S0|398a70aee87f3165934c|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 3.272 Creating connection with server4:443 with v1 3.273 Setting up connection for downloading https://server4:443/xgpejipdkv at 36:09.413 on ClientConnection[3728d622b13814eb/acf1495f0e72cb7e(V1) with server4/193.167.100.100:443] 3.273 Original destination connection id: 3728d622b13814eb (scid: acf1495f0e72cb7e) >- CryptoStream[I|ClientHello] 3.275 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.476/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.275 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.302 <- (5) Packet A|5|S0|611cd938bca140ab|29|2 MaxStreamsFrame[B,17] Padding(1) 3.303 <- (6) Packet A|6|S0|611cd938bca140ab|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 3.303 -> Packet A|3|S0|398a70aee87f3165934c|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 3.311 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.311 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.511/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.311 <- (1) Packet H|0|L|766|1 CryptoFrame[0,718] 3.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 3.418/Handshake, because peerAwaitingAddressValidation | RTT:35/17 3.315 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 3.315 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 3.315 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 3.318 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 3.421/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 3.318 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.318 Starting downloading https://server4:443/xgpejipdkv at 36:09.458 on ClientConnection[3728d622b13814eb/acf1495f0e72cb7e(V1) with server4/193.167.100.100:443] 3.318 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 3.421/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 3.318 Discarding pn space Initial because first Handshake message is being sent 3.318 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 3.319 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 3.422/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 3.319 -> Packet A|0|S0|06719e2db491ac8ac5f0|49|1 StreamFrame[0(CIB),0,17,fin] 3.351 <- (2) Packet A|1|S0|acf1495f0e72cb7e|1332|2 PingFrame[] Padding(1305) 3.371 -> Packet A|1|S0|06719e2db491ac8ac5f0|34|1 AckFrame[1|Δ19] 3.421 loss detection timeout handler running Sending probe 0, because no ack since 3.318. Current RTT: 35/17. 3.421 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.422 (Probe is a handshake retransmit) 3.422 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 3.628/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 3.422 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 3.553 <- (3) Packet A|5|S0|acf1495f0e72cb7e|411|4 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|319d6999daeb8cf847fa|be9c8eacb3d4b5f8f35368aa3ba302ec] CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010002b607ce06f66e46cbbb2104a43375a628f8cd6988f81a8ea557bee6bfb01b3b3980c96f] 3.554 State is set to Confirmed reschedule loss detection timer for PTO over 11 millis, based on 3.565/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -112 millis, based on 3.442/App, because ackElicitingInFlight | RTT:35/17 3.554 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 3.553 <- (4) Packet A|6|S0|acf1495f0e72cb7e|29|2 PingFrame[] Padding(2) 3.555 loss detection timeout handler running Sending probe 0, because no ack since 3.319. Current RTT: 35/17. 3.555 (Probe is retransmit on level App) 3.555 -> Packet A|2|S0|06719e2db491ac8ac5f0|35|1 AckFrame[6-5,1|Δ0] reschedule loss detection timer for PTO over 245 millis, based on 3.802/App, because ackElicitingInFlight | RTT:35/17 3.556 -> Packet PA|3|S0|06719e2db491ac8ac5f0|49|1 StreamFrame[0(CIB),0,17,fin] 3.587 <- (5) Packet A|7|S0|acf1495f0e72cb7e|1372|4 PingFrame[] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|319d6999daeb8cf847fa|be9c8eacb3d4b5f8f35368aa3ba302ec] Padding(1314) 3.608 -> Packet A|4|S0|06719e2db491ac8ac5f0|36|1 AckFrame[7-5,1|Δ19] 3.718 <- (6) Packet A|8|S0|acf1495f0e72cb7e|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|319d6999daeb8cf847fa|be9c8eacb3d4b5f8f35368aa3ba302ec] 3.738 -> Packet A|5|S0|06719e2db491ac8ac5f0|36|1 AckFrame[8-5,1|Δ19] 3.770 <- (7) Packet A|10|S0|acf1495f0e72cb7e|1422|2 PingFrame[] Padding(1395) 3.790 -> Packet A|6|S0|06719e2db491ac8ac5f0|38|1 AckFrame[10,8-5,1|Δ19] 3.801 loss detection timeout handler running Sending probe 1, because no ack since 3.556. Current RTT: 35/17. 3.801 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 4.293/App, because ackElicitingInFlight | RTT:35/17 3.801 -> Packet PA|7|S0|06719e2db491ac8ac5f0|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 4.294/App, because ackElicitingInFlight | RTT:35/17 3.802 -> Packet PA|8|S0|06719e2db491ac8ac5f0|49|1 StreamFrame[0(CIB),0,17,fin] 3.833 <- (8) Packet A|12|S0|acf1495f0e72cb7e|1054|1 StreamFrame[0(CIB),0,1024,fin] 3.834 Finished downloading https://server4:443/xgpejipdkv at 36:09.974 on ClientConnection[3728d622b13814eb/acf1495f0e72cb7e(V1) with server4/193.167.100.100:443] 3.834 Closing ClientConnection[3728d622b13814eb/acf1495f0e72cb7e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.834 -> Packet A|9|S0|06719e2db491ac8ac5f0|43|2 ConnectionCloseFrame[0|0|] AckFrame[12,10,8-5,1|Δ0] 3.835 Creating connection with server4:443 with v1 3.835 Setting up connection for downloading https://server4:443/czypnfwtar at 36:09.975 on ClientConnection[1c2c92c9874dadbf/20fcc25c2ddca370(V1) with server4/193.167.100.100:443] 3.835 Original destination connection id: 1c2c92c9874dadbf (scid: 20fcc25c2ddca370) >- CryptoStream[I|ClientHello] 3.838 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.038/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.837 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.854 <- (9) Packet A|13|S0|acf1495f0e72cb7e|36|1 AckFrame[8-7,5,2-1|Δ21] 3.855 -> Packet A|10|S0|06719e2db491ac8ac5f0|43|2 ConnectionCloseFrame[0|0|] AckFrame[12,10,8-5,1|Δ0] 3.873 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.874 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.074/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.873 <- (1) Packet H|0|L|766|1 CryptoFrame[0,718] 3.877 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 3.980/Handshake, because peerAwaitingAddressValidation | RTT:35/17 3.877 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 3.877 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 3.877 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 3.881 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 3.984/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 3.880 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.881 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.881 Starting downloading https://server4:443/czypnfwtar at 36:10.021 on ClientConnection[1c2c92c9874dadbf/20fcc25c2ddca370(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 3.984/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 3.881 Discarding pn space Initial because first Handshake message is being sent 3.881 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 3.882 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 3.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 3.882 -> Packet A|0|S0|4b523c663b1ed297fb1b|49|1 StreamFrame[0(CIB),0,17,fin] 3.913 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 3.913 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.913 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.913 <- (2) Packet A|0|S0|20fcc25c2ddca370|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|aea4cc2b709abc82e09c|b95df1c520012efd5db4d30be351c7af] Padding(1226) 3.914 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 3.993/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 3.993/App, because ackElicitingInFlight | RTT:35/14 3.914 Discarding pn space Handshake because HandshakeDone is received 3.914 <- (3) Packet A|1|S0|20fcc25c2ddca370|1332|2 PingFrame[] Padding(1305) 3.915 -> Packet A|1|S0|4b523c663b1ed297fb1b|33|1 AckFrame[1-0|Δ0] 3.916 <- (4) Packet A|2|S0|20fcc25c2ddca370|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 3.916 Finished downloading https://server4:443/czypnfwtar at 36:10.056 on ClientConnection[1c2c92c9874dadbf/20fcc25c2ddca370(V1) with server4/193.167.100.100:443] 3.916 Closing ClientConnection[1c2c92c9874dadbf/20fcc25c2ddca370(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.917 Creating connection with server4:443 with v1 3.917 <- (5) Packet A|3|S0|20fcc25c2ddca370|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100866a5ddf315f9221c695c2a198a1a61d3d3ac637b06be197b4d0397bd944f72ace1095ce] 3.917 -> Packet A|2|S0|4b523c663b1ed297fb1b|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 3.918 -> Packet A|3|S0|4b523c663b1ed297fb1b|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 3.918 Setting up connection for downloading https://server4:443/zufqeothxg at 36:10.058 on ClientConnection[c8e30cab0c22fba9/d784d63d06ed0dfa(V1) with server4/193.167.100.100:443] 3.918 Original destination connection id: c8e30cab0c22fba9 (scid: d784d63d06ed0dfa) >- CryptoStream[I|ClientHello] 3.921 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.121/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.920 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.934 <- (6) Packet A|4|S0|20fcc25c2ddca370|32|1 AckFrame[0|Δ20] 3.934 -> Packet A|4|S0|4b523c663b1ed297fb1b|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 4.120 loss detection timeout handler running Sending probe 0, because no ack since 3.920. Current RTT: 100/25. 4.120 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.120 (Probe is an initial retransmit) 4.121 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.521/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.120 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.255 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[0|Δ301] CryptoFrame[0,123] 4.255 probe count not reset on ack because handshake not yet confirmed 4.256 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.656/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 4.255 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 4.259 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 6.263/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 4.259 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 4.259 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 4.259 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.263 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 6.267/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 4.262 -> Packet H|0|L|82|1 CryptoFrame[0,36] 4.263 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 4.264 Starting downloading https://server4:443/zufqeothxg at 36:10.403 on ClientConnection[c8e30cab0c22fba9/d784d63d06ed0dfa(V1) with server4/193.167.100.100:443] 4.264 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 5.266/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 4.264 Discarding pn space Initial because first Handshake message is being sent 4.264 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 5.267/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 4.264 -> Packet A|0|S0|69c3e1833c5829d9deae|49|1 StreamFrame[0(CIB),0,17,fin] 4.291 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.352 <- (3) Packet H|2|L|47|2 PingFrame[] Padding(2) 4.353 -> Packet H|2|L|48|1 AckFrame[2-1|Δ0] 4.966 <- (4) Packet H|5|L|47|2 PingFrame[] Padding(2) 4.967 -> Packet H|3|L|50|1 AckFrame[5,2-1|Δ0] 5.266 loss detection timeout handler running Sending probe 0, because no ack since 4.262. Current RTT: 334/167. 5.266 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.266 (Probe is a handshake retransmit) 5.267 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 7.271/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 5.266 -> Packet PH|4|L|82|1 CryptoFrame[0,36] 5.666 <- (5) Packet H|6|L|47|2 PingFrame[] Padding(2) 5.667 -> Packet H|5|L|50|1 AckFrame[6-5,2-1|Δ0] 7.270 loss detection timeout handler running Sending probe 1, because no ack since 4.264. Current RTT: 334/167. 7.270 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.270 (Probe is a handshake retransmit) 7.271 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 4007 millis, based on 11.279/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 7.270 -> Packet PH|6|L|82|1 CryptoFrame[0,36] 7.271 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 4007 millis, based on 11.279/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 7.271 -> Packet PH|7|L|82|1 CryptoFrame[0,36] 7.303 <- (6) Packet H|8|L|51|1 AckFrame[6,2-1|Δ0] 7.304 probe count not reset on ack because handshake not yet confirmed 7.304 Retransmitting CryptoFrame[0,36] on level Handshake 7.304 Cwnd(-): 6000; inflight: 131 7.305 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 3974 millis, based on 11.279/Handshake, because ackElicitingInFlight | RTT:334/167 7.305 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 4399 millis, based on 11.705/Handshake, because ackElicitingInFlight | RTT:296/201 7.305 -> Packet H|8|L|87|2 CryptoFrame[0,36] AckFrame[6-5|Δ0] 7.303 <- (6) Packet A|0|S0|d784d63d06ed0dfa|1281|4 AckFrame[0|Δ3006] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|8e11dd682ce64d08750c|bf96156624bb3b1201154ea397f680cc] Padding(1216) reschedule loss detection timer for PTO over 1098 millis, based on 8.405/Handshake, because ackElicitingInFlight | RTT:296/201 7.306 State is set to Confirmed reschedule loss detection timer for PTO over 3962 millis, based on 11.269/Handshake, because ackElicitingInFlight | RTT:636/832 7.306 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.306 Discarding pn space Handshake because HandshakeDone is received 7.304 <- (7) Packet A|1|S0|d784d63d06ed0dfa|1332|2 PingFrame[] Padding(1305) 7.306 <- (8) Packet A|2|S0|d784d63d06ed0dfa|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] 7.307 -> Packet A|1|S0|69c3e1833c5829d9deae|33|1 AckFrame[1-0|Δ0] -< CryptoStream[A|] 7.308 Finished downloading https://server4:443/zufqeothxg at 36:13.447 on ClientConnection[c8e30cab0c22fba9/d784d63d06ed0dfa(V1) with server4/193.167.100.100:443] 7.308 Closing ClientConnection[c8e30cab0c22fba9/d784d63d06ed0dfa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.308 -> Packet A|2|S0|69c3e1833c5829d9deae|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 7.309 Creating connection with server4:443 with v1 7.310 Setting up connection for downloading https://server4:443/mxkwqxbcap at 36:13.449 on ClientConnection[42e4b1d265bb64ec/d10f3eb26a0a4501(V1) with server4/193.167.100.100:443] 7.310 Original destination connection id: 42e4b1d265bb64ec (scid: d10f3eb26a0a4501) >- CryptoStream[I|ClientHello] 7.312 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.512/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.312 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.339 <- (9) Packet A|4|S0|d784d63d06ed0dfa|35|2 AckFrame[2|Δ0] ConnectionCloseFrame[0|28|] 7.511 loss detection timeout handler running Sending probe 0, because no ack since 7.312. Current RTT: 100/25. 7.511 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.511 (Probe is an initial retransmit) 7.512 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.912/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.512 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.911 loss detection timeout handler running Sending probe 1, because no ack since 7.512. Current RTT: 100/25. 7.912 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.912 (Probe is an initial retransmit) 7.912 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.712/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.912 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.913 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.713/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.913 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.945 <- (1) Packet I|3|L|177|2 Token=[] AckFrame[2-0|Δ0] CryptoFrame[0,123] 7.946 probe count not reset on ack because handshake not yet confirmed 7.946 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.746/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 7.945 <- (1) Packet H|3|L|768|1 CryptoFrame[0,720] 7.950 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.950 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) reschedule loss detection timer for PTO over 387 millis, based on 8.338/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.950 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 7.950 -> Packet I|4|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1151) >- CryptoStream[H|Finished] 7.953 Starting downloading https://server4:443/mxkwqxbcap at 36:14.093 on ClientConnection[42e4b1d265bb64ec/d10f3eb26a0a4501(V1) with server4/193.167.100.100:443] 7.953 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 8.341/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.953 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.954 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.051/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.954 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.954 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 96 millis, based on 8.051/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.954 -> Packet A|0|S0|b3edaee913db6f11ead1|49|1 StreamFrame[0(CIB),0,17,fin] 7.954 -> Packet H|1|L|48|1 AckFrame[3|Δ0] 7.986 <- (2) Packet H|4|L|49|1 AckFrame[0|Δ0] 7.987 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 7.987 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 7.986 <- (2) Packet A|0|S0|d10f3eb26a0a4501|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|fa162a8bcabc5fb7359c|f7dedf1055cf5315f9a710df01d444fd] Padding(1226) 7.987 State is set to Confirmed reschedule loss detection timer for PTO over 67 millis, based on 8.055/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 67 millis, based on 8.055/App, because ackElicitingInFlight | RTT:33/12 7.988 Discarding pn space Handshake because HandshakeDone is received 7.987 <- (3) Packet A|1|S0|d10f3eb26a0a4501|1332|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,273] -< CryptoStream[A|] 7.988 Finished downloading https://server4:443/mxkwqxbcap at 36:14.128 on ClientConnection[42e4b1d265bb64ec/d10f3eb26a0a4501(V1) with server4/193.167.100.100:443] 7.988 Closing ClientConnection[42e4b1d265bb64ec/d10f3eb26a0a4501(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.988 -> Packet A|1|S0|b3edaee913db6f11ead1|33|1 AckFrame[1-0|Δ0] 7.989 -> Packet A|2|S0|b3edaee913db6f11ead1|37|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 7.990 Creating connection with server4:443 with v1 7.990 Setting up connection for downloading https://server4:443/kixvtxgzui at 36:14.130 on ClientConnection[cda397a33639aea1/c45de3d0bb72526c(V1) with server4/193.167.100.100:443] 7.990 Original destination connection id: cda397a33639aea1 (scid: c45de3d0bb72526c) >- CryptoStream[I|ClientHello] 7.992 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.192/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.992 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.006 <- (4) Packet A|2|S0|d10f3eb26a0a4501|32|1 AckFrame[0|Δ21] 8.007 -> Packet A|3|S0|b3edaee913db6f11ead1|37|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 8.020 <- (5) Packet A|3|S0|d10f3eb26a0a4501|1372|5 PingFrame[] MaxStreamsFrame[B,17] CryptoFrame[273,32] NewTokenFrame[ad9a8b8d8601001ed568028f4e065b60d3faec55037c3e94b39b533045d3cfcf150878eceb1734c923c949] Padding(1262) 8.020 <- (6) Packet A|4|S0|d10f3eb26a0a4501|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 8.021 -> Packet A|4|S0|b3edaee913db6f11ead1|37|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 8.027 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.028 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.228/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.027 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 8.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.032 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) reschedule loss detection timer for PTO over 102 millis, based on 8.135/Handshake, because peerAwaitingAddressValidation | RTT:35/17 8.032 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 8.031 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 8.034 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.137/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.034 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.035 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.035 Starting downloading https://server4:443/kixvtxgzui at 36:14.174 on ClientConnection[cda397a33639aea1/c45de3d0bb72526c(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 8.138/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.035 Discarding pn space Initial because first Handshake message is being sent 8.035 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 8.035 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.138/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.035 -> Packet A|0|S0|e698d01a758886e0ba46|49|1 StreamFrame[0(CIB),0,17,fin] 8.066 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 8.067 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 8.067 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 8.066 <- (2) Packet A|0|S0|c45de3d0bb72526c|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|8ee87cb59aeade028a11|1f8f060a7795f87d8f4728b70c9726e1] Padding(1226) 8.068 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 8.146/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 8.146/App, because ackElicitingInFlight | RTT:35/14 8.068 Discarding pn space Handshake because HandshakeDone is received 8.067 <- (3) Packet A|1|S0|c45de3d0bb72526c|1332|2 PingFrame[] Padding(1305) 8.068 -> Packet A|1|S0|e698d01a758886e0ba46|33|1 AckFrame[1-0|Δ0] 8.069 <- (4) Packet A|2|S0|c45de3d0bb72526c|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 8.069 <- (5) Packet A|3|S0|c45de3d0bb72526c|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100e846a1a53875aa3defcd75efb65e0ed964db3870ebac669feaaa7a7788661d5623d258e2] 8.070 Finished downloading https://server4:443/kixvtxgzui at 36:14.210 on ClientConnection[cda397a33639aea1/c45de3d0bb72526c(V1) with server4/193.167.100.100:443] 8.070 Closing ClientConnection[cda397a33639aea1/c45de3d0bb72526c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) -< CryptoStream[A|NewSessionTicket] 8.070 -> Packet A|2|S0|e698d01a758886e0ba46|33|1 AckFrame[3-0|Δ0] 8.071 Creating connection with server4:443 with v1 8.071 -> Packet A|3|S0|e698d01a758886e0ba46|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 8.072 Setting up connection for downloading https://server4:443/uzpgqdcamy at 36:14.212 on ClientConnection[593c2b51911d8c5a/395af18cc6c5b04c(V1) with server4/193.167.100.100:443] 8.072 Original destination connection id: 593c2b51911d8c5a (scid: 395af18cc6c5b04c) >- CryptoStream[I|ClientHello] 8.074 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.274/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.074 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.101 <- (6) Packet A|5|S0|c45de3d0bb72526c|1372|2 PingFrame[] Padding(1345) 8.101 -> Packet A|4|S0|e698d01a758886e0ba46|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 8.102 <- (7) Packet A|7|S0|c45de3d0bb72526c|35|2 AckFrame[3-0|Δ0] ConnectionCloseFrame[0|28|] 8.109 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.110 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.310/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.109 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 8.113 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.216/Handshake, because peerAwaitingAddressValidation | RTT:35/17 8.114 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 8.113 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 8.114 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 8.116 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.116 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.116 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.116 Starting downloading https://server4:443/uzpgqdcamy at 36:14.256 on ClientConnection[593c2b51911d8c5a/395af18cc6c5b04c(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 8.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.116 Discarding pn space Initial because first Handshake message is being sent 8.117 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 8.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.220/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.117 -> Packet A|0|S0|5670d07e4c9ceca00bd8|49|1 StreamFrame[0(CIB),0,17,fin] 8.148 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 8.149 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 8.149 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 8.148 <- (2) Packet A|0|S0|395af18cc6c5b04c|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c7981e8ca8e717c5b77e|1eef0442387b2a120458c509ccacf7ae] Padding(1226) 8.149 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 8.228/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 8.228/App, because ackElicitingInFlight | RTT:35/14 8.150 Discarding pn space Handshake because HandshakeDone is received 8.151 <- (3) Packet A|2|S0|395af18cc6c5b04c|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100be6469a1ae4b425b923d9c7b481562631a81507e1e05f866f595c8684b50b8f9e072ed27] -< CryptoStream[A|NewSessionTicket] 8.152 -> Packet A|1|S0|5670d07e4c9ceca00bd8|36|1 AckFrame[2,0|Δ1] 8.193 <- (4) Packet A|3|S0|395af18cc6c5b04c|1332|2 PingFrame[] Padding(1305) 8.213 -> Packet A|2|S0|5670d07e4c9ceca00bd8|36|1 AckFrame[3-2,0|Δ19] 8.228 loss detection timeout handler running Sending probe 0, because no ack since 8.117. Current RTT: 35/14. 8.228 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 8.450/App, because ackElicitingInFlight | RTT:35/14 8.228 -> Packet PA|3|S0|5670d07e4c9ceca00bd8|49|1 StreamFrame[0(CIB),0,17,fin] 8.245 <- (5) Packet A|4|S0|395af18cc6c5b04c|1372|2 PingFrame[] Padding(1345) 8.265 -> Packet A|4|S0|5670d07e4c9ceca00bd8|36|1 AckFrame[4-2,0|Δ19] 8.280 <- (6) Packet A|6|S0|395af18cc6c5b04c|32|1 AckFrame[3-1|Δ21] 8.282 Cwnd(-): 6000; inflight: 0 8.282 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.282 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 98 millis, based on 8.381/App, because ackElicitingInFlight | RTT:35/11 8.282 -> Packet A|5|S0|5670d07e4c9ceca00bd8|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4|Δ0] 8.297 <- (7) Packet A|7|S0|395af18cc6c5b04c|1422|2 PingFrame[] Padding(1395) 8.317 -> Packet A|6|S0|5670d07e4c9ceca00bd8|36|1 AckFrame[7-6,4|Δ19] 8.334 <- (8) Packet A|8|S0|395af18cc6c5b04c|32|1 AckFrame[5-1|Δ21] 8.335 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.350 <- (9) Packet A|9|S0|395af18cc6c5b04c|1452|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(397) 8.350 Finished downloading https://server4:443/uzpgqdcamy at 36:14.490 on ClientConnection[593c2b51911d8c5a/395af18cc6c5b04c(V1) with server4/193.167.100.100:443] 8.350 Closing ClientConnection[593c2b51911d8c5a/395af18cc6c5b04c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.351 -> Packet A|7|S0|5670d07e4c9ceca00bd8|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-6|Δ0] 8.351 Creating connection with server4:443 with v1 8.352 Setting up connection for downloading https://server4:443/tqazerdosf at 36:14.492 on ClientConnection[fe42e8b8a91d6ecc/28fd3711240eb660(V1) with server4/193.167.100.100:443] 8.352 Original destination connection id: fe42e8b8a91d6ecc (scid: 28fd3711240eb660) >- CryptoStream[I|ClientHello] 8.354 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.554/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.353 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.382 <- (10) Packet A|10|S0|395af18cc6c5b04c|35|2 AckFrame[7-1|Δ0] ConnectionCloseFrame[0|28|] 8.389 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.390 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.590/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.389 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 8.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.495/Handshake, because peerAwaitingAddressValidation | RTT:35/17 8.393 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 8.392 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 8.393 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 8.395 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.498/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.395 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.395 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.395 Starting downloading https://server4:443/tqazerdosf at 36:14.535 on ClientConnection[fe42e8b8a91d6ecc/28fd3711240eb660(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 8.498/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.395 Discarding pn space Initial because first Handshake message is being sent 8.396 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 8.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 8.499/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.396 -> Packet A|0|S0|79ac75955f6c47dc36aa|49|1 StreamFrame[0(CIB),0,17,fin] 8.486 <- (2) Packet H|1|L|47|2 PingFrame[] Padding(2) 8.487 -> Packet H|2|L|48|1 AckFrame[1-0|Δ0] 8.498 loss detection timeout handler running Sending probe 0, because no ack since 8.395. Current RTT: 35/17. 8.498 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.498 (Probe is a handshake retransmit) 8.499 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 8.705/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 8.499 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 8.531 <- (3) Packet H|2|L|51|1 AckFrame[3,1|Δ0] 8.532 probe count not reset on ack because handshake not yet confirmed 8.532 Retransmitting CryptoFrame[0,36] on level Handshake 8.532 Cwnd(-): 6000; inflight: 49 8.532 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 8.532 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 8.532 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 181 millis, based on 8.714/Handshake, because ackElicitingInFlight | RTT:35/14 8.532 -> Packet H|4|L|87|2 CryptoFrame[0,36] AckFrame[1|Δ0] 8.531 <- (3) Packet A|0|S0|28fd3711240eb660|1281|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|cf5611130a72b12fb17b|cebfb84bde9f4810926de8d50ae56c33] Padding(1224) 8.533 State is set to Confirmed reschedule loss detection timer for PTO over 85 millis, based on 8.618/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over -26 millis, based on 8.507/App, because ackElicitingInFlight | RTT:35/14 8.533 Discarding pn space Handshake because HandshakeDone is received 8.533 loss detection timeout handler running Sending probe 0, because no ack since 8.396. Current RTT: 35/14. 8.533 (Probe is retransmit on level App) 8.532 <- (4) Packet A|1|S0|28fd3711240eb660|1332|2 PingFrame[] Padding(1305) reschedule loss detection timer for PTO over 221 millis, based on 8.755/App, because ackElicitingInFlight | RTT:35/14 8.533 -> Packet PA|1|S0|79ac75955f6c47dc36aa|49|1 StreamFrame[0(CIB),0,17,fin] 8.534 -> Packet A|2|S0|79ac75955f6c47dc36aa|33|1 AckFrame[1-0|Δ0] 8.566 <- (5) Packet A|3|S0|28fd3711240eb660|1372|2 PingFrame[] Padding(1345) 8.586 -> Packet A|3|S0|79ac75955f6c47dc36aa|36|1 AckFrame[3,1-0|Δ19] 8.618 <- (6) Packet A|4|S0|28fd3711240eb660|1422|4 PingFrame[] CryptoFrame[0,305] NewTokenFrame[ad9a8b8d8601004800196db749235d99578e3b6e1fe2134a72e96fbaf1b18e31cb5d895e117b37167f1912] Padding(1041) -< CryptoStream[A|NewSessionTicket] 8.638 -> Packet A|4|S0|79ac75955f6c47dc36aa|36|1 AckFrame[4-3,1-0|Δ19] 8.670 <- (7) Packet A|5|S0|28fd3711240eb660|1452|2 PingFrame[] Padding(1425) 8.691 -> Packet A|5|S0|79ac75955f6c47dc36aa|36|1 AckFrame[5-3,1-0|Δ19] 8.755 loss detection timeout handler running Sending probe 1, because no ack since 8.533. Current RTT: 35/14. 8.755 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 443 millis, based on 9.199/App, because ackElicitingInFlight | RTT:35/14 8.755 -> Packet PA|6|S0|79ac75955f6c47dc36aa|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 443 millis, based on 9.200/App, because ackElicitingInFlight | RTT:35/14 8.756 -> Packet PA|7|S0|79ac75955f6c47dc36aa|49|1 StreamFrame[0(CIB),0,17,fin] 8.907 <- (8) Packet A|8|S0|28fd3711240eb660|1054|1 StreamFrame[0(CIB),0,1024,fin] 8.907 <- (9) Packet A|9|S0|28fd3711240eb660|29|2 PingFrame[] Padding(2) 8.908 Finished downloading https://server4:443/tqazerdosf at 36:15.047 on ClientConnection[fe42e8b8a91d6ecc/28fd3711240eb660(V1) with server4/193.167.100.100:443] 8.908 Closing ClientConnection[fe42e8b8a91d6ecc/28fd3711240eb660(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.908 -> Packet A|8|S0|79ac75955f6c47dc36aa|37|1 AckFrame[9-8,5-3,1-0|Δ0] 8.908 -> Packet A|9|S0|79ac75955f6c47dc36aa|41|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,5-3,1-0|Δ0] 8.908 Creating connection with server4:443 with v1 8.909 Setting up connection for downloading https://server4:443/twckkmldot at 36:15.049 on ClientConnection[3de2303adab2eb1c/ae9a6092c1b893bd(V1) with server4/193.167.100.100:443] 8.909 Original destination connection id: 3de2303adab2eb1c (scid: ae9a6092c1b893bd) >- CryptoStream[I|ClientHello] 8.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.110/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.910 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.110 loss detection timeout handler running Sending probe 0, because no ack since 8.910. Current RTT: 100/25. 9.110 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.110 (Probe is an initial retransmit) 9.110 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.510/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.110 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.244 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[0|Δ301] CryptoFrame[0,123] 9.245 probe count not reset on ack because handshake not yet confirmed 9.245 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.645/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 9.244 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 9.248 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 11.252/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 9.248 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 9.248 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 9.248 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 9.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 11.255/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.251 -> Packet H|0|L|82|1 CryptoFrame[0,36] 9.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.251 Starting downloading https://server4:443/twckkmldot at 36:15.391 on ClientConnection[3de2303adab2eb1c/ae9a6092c1b893bd(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 1001 millis, based on 10.253/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 9.251 Discarding pn space Initial because first Handshake message is being sent 9.251 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 9.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 10.253/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 9.251 -> Packet A|0|S0|1a484092e82ad05f2bec|49|1 StreamFrame[0(CIB),0,17,fin] 9.280 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.284 <- (3) Packet A|1|S0|ae9a6092c1b893bd|1332|2 PingFrame[] Padding(1305) 9.286 <- (4) Packet A|2|S0|ae9a6092c1b893bd|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 9.287 Finished downloading https://server4:443/twckkmldot at 36:15.427 on ClientConnection[3de2303adab2eb1c/ae9a6092c1b893bd(V1) with server4/193.167.100.100:443] 9.287 Closing ClientConnection[3de2303adab2eb1c/ae9a6092c1b893bd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.287 -> Packet A|1|S0|1a484092e82ad05f2bec|34|1 AckFrame[2-1|Δ2] 9.287 -> Packet A|2|S0|1a484092e82ad05f2bec|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 9.287 Creating connection with server4:443 with v1 9.288 Setting up connection for downloading https://server4:443/geosnlwbea at 36:15.428 on ClientConnection[36fb6e260af329fb/86e06db097d08780(V1) with server4/193.167.100.100:443] 9.288 Original destination connection id: 36fb6e260af329fb (scid: 86e06db097d08780) 9.289 <- (5) Packet A|3|S0|ae9a6092c1b893bd|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100dca773564fb516f64edebbb69af8e453e8fcd76aecd626fe487024f86b3b8bc932fc4bb3] 9.289 -> Packet A|3|S0|1a484092e82ad05f2bec|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] >- CryptoStream[I|ClientHello] 9.290 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.490/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.290 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.303 <- (6) Packet A|4|S0|ae9a6092c1b893bd|32|1 AckFrame[0|Δ20] 9.303 -> Packet A|4|S0|1a484092e82ad05f2bec|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 9.319 <- (7) Packet A|5|S0|ae9a6092c1b893bd|1372|3 PingFrame[] MaxStreamsFrame[B,17] Padding(1343) 9.319 <- (8) Packet A|6|S0|ae9a6092c1b893bd|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 9.489 loss detection timeout handler running Sending probe 0, because no ack since 9.290. Current RTT: 100/25. 9.490 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.490 (Probe is an initial retransmit) 9.490 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.890/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.490 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.825 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[1|Δ301] CryptoFrame[0,123] 9.826 probe count not reset on ack because handshake not yet confirmed 9.826 Retransmitting CryptoFrame[0,257] on level Initial 9.826 Cwnd(-): 6000; inflight: 0 9.826 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.226/Initial, because peerAwaitingAddressValidation | RTT:100/25 9.826 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2003 millis, based on 11.830/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 9.826 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 9.825 <- (1) Packet H|1|L|766|1 CryptoFrame[0,718] 9.829 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 11.833/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 9.828 -> Packet I|3|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 9.829 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 9.829 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 9.831 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 11.835/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 9.831 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.831 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.831 Starting downloading https://server4:443/geosnlwbea at 36:15.971 on ClientConnection[36fb6e260af329fb/86e06db097d08780(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 1001 millis, based on 10.833/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 9.831 Discarding pn space Initial because first Handshake message is being sent 9.831 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 9.832 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 10.834/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 9.832 -> Packet A|0|S0|e6b8e1d26713629922fb|49|1 StreamFrame[0(CIB),0,17,fin] 9.859 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.860 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.953 <- (4) Packet H|3|L|47|2 PingFrame[] Padding(2) 9.953 -> Packet H|2|L|50|1 AckFrame[3,1|Δ0] 10.141 <- (5) Packet H|4|L|47|2 PingFrame[] Padding(2) 10.142 -> Packet H|3|L|50|1 AckFrame[4-3,1|Δ0] 10.516 <- (6) Packet H|5|L|47|2 PingFrame[] Padding(2) 10.517 -> Packet H|4|L|50|1 AckFrame[5-3,1|Δ0] 10.600 <- (7) Packet H|6|L|47|2 PingFrame[] Padding(2) 10.601 -> Packet H|5|L|50|1 AckFrame[6-3,1|Δ0] 10.828 <- (8) Packet H|8|L|47|2 PingFrame[] Padding(2) 10.829 -> Packet H|6|L|52|1 AckFrame[8,6-3,1|Δ0] 10.833 loss detection timeout handler running Sending probe 0, because no ack since 9.831. Current RTT: 334/167. 10.833 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.833 (Probe is a handshake retransmit) 10.833 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 12.837/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 10.833 -> Packet PH|7|L|82|1 CryptoFrame[0,36] 10.899 <- (9) Packet H|9|L|47|2 PingFrame[] Padding(2) 10.899 -> Packet H|8|L|52|1 AckFrame[9-8,6-3,1|Δ0] 10.963 <- (10) Packet H|10|L|47|2 PingFrame[] Padding(2) 10.964 -> Packet H|9|L|52|1 AckFrame[10-8,6-3,1|Δ0] 11.380 <- (11) Packet H|13|L|47|2 PingFrame[] Padding(2) 11.380 -> Packet H|10|L|54|1 AckFrame[13,10-8,6-3,1|Δ0] 11.853 <- (12) Packet H|14|L|47|2 PingFrame[] Padding(2) 11.854 -> Packet H|11|L|54|1 AckFrame[14-13,10-8,6-3,1|Δ0] 11.910 <- (13) Packet H|15|L|47|2 PingFrame[] Padding(2) 11.910 -> Packet H|12|L|54|1 AckFrame[15-13,10-8,6-3,1|Δ0] 11.963 <- (14) Packet H|16|L|47|2 PingFrame[] Padding(2) 11.963 -> Packet H|13|L|54|1 AckFrame[16-13,10-8,6-3,1|Δ0] 12.013 <- (15) Packet H|17|L|47|2 PingFrame[] Padding(2) 12.014 -> Packet H|14|L|54|1 AckFrame[17-13,10-8,6-3,1|Δ0] 12.061 <- (16) Packet H|18|L|47|2 PingFrame[] Padding(2) 12.062 -> Packet H|15|L|54|1 AckFrame[18-13,10-8,6-3,1|Δ0] 12.199 <- (17) Packet H|20|L|47|2 PingFrame[] Padding(2) 12.199 -> Packet H|16|L|56|1 AckFrame[20,18-13,10-8,6-3,1|Δ0] 12.380 <- (18) Packet H|21|L|47|2 PingFrame[] Padding(2) 12.381 -> Packet H|17|L|56|1 AckFrame[21-20,18-13,10-8,6-3,1|Δ0] 12.424 <- (19) Packet H|22|L|47|2 PingFrame[] Padding(2) 12.424 -> Packet H|18|L|56|1 AckFrame[22-20,18-13,10-8,6-3,1|Δ0] 12.467 <- (20) Packet H|23|L|47|2 PingFrame[] Padding(2) 12.468 -> Packet H|19|L|56|1 AckFrame[23-20,18-13,10-8,6-3,1|Δ0] 12.554 <- (21) Packet H|24|L|47|2 PingFrame[] Padding(2) 12.554 -> Packet H|20|L|56|1 AckFrame[24-20,18-13,10-8,6-3,1|Δ0] 12.596 <- (22) Packet H|25|L|47|2 PingFrame[] Padding(2) 12.596 -> Packet H|21|L|56|1 AckFrame[25-20,18-13,10-8,6-3,1|Δ0] 12.636 <- (23) Packet H|26|L|47|2 PingFrame[] Padding(2) 12.637 -> Packet H|22|L|56|1 AckFrame[26-20,18-13,10-8,6-3,1|Δ0] 12.755 <- (24) Packet H|28|L|47|2 PingFrame[] Padding(2) 12.755 -> Packet H|23|L|58|1 AckFrame[28,26-20,18-13,10-8,6-3,1|Δ0] 12.793 <- (25) Packet H|29|L|47|2 PingFrame[] Padding(2) 12.794 -> Packet H|24|L|58|1 AckFrame[29-28,26-20,18-13,10-8,6-3,1|Δ0] 12.836 loss detection timeout handler running Sending probe 1, because no ack since 9.832. Current RTT: 334/167. 12.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.837 (Probe is a handshake retransmit) 12.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 4007 millis, based on 16.845/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 12.837 -> Packet PH|25|L|82|1 CryptoFrame[0,36] 12.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 4007 millis, based on 16.846/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 12.838 -> Packet PH|26|L|82|1 CryptoFrame[0,36] 12.932 <- (26) Packet A|2|S0|86e06db097d08780|1332|6 PingFrame[] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|daf3ecc912b81a147786|861f7cc001b31860b49d851623a51ea1] CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100a70820ee661e30bbbb7d6bb4ab8f3f4115919c60a0b6f3e3837acc11c7f8c3c5fece1f65] Padding(920) 12.933 State is set to Confirmed reschedule loss detection timer for PTO over 986 millis, based on 13.920/App, because ackElicitingInFlight | RTT:334/167 reschedule loss detection timer for PTO over -2079 millis, based on 10.854/App, because ackElicitingInFlight | RTT:334/167 12.933 Discarding pn space Handshake because HandshakeDone is received 12.934 loss detection timeout handler running Sending probe 0, because no ack since 9.832. Current RTT: 334/167. 12.934 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] 12.932 <- (27) Packet A|3|S0|86e06db097d08780|29|2 PingFrame[] Padding(2) reschedule loss detection timer for PTO over 2043 millis, based on 14.978/App, because ackElicitingInFlight | RTT:334/167 12.934 -> Packet PA|1|S0|e6b8e1d26713629922fb|49|1 StreamFrame[0(CIB),0,17,fin] 12.934 -> Packet A|2|S0|e6b8e1d26713629922fb|33|1 AckFrame[3-2|Δ0] 13.057 <- (28) Packet A|6|S0|86e06db097d08780|238|2 CryptoFrame[143,162] NewTokenFrame[ad9a8b8d860100a70820ee661e30bbbb7d6bb4ab8f3f4115919c60a0b6f3e3837acc11c7f8c3c5fece1f65] -< CryptoStream[A|NewSessionTicket] 13.077 -> Packet A|3|S0|e6b8e1d26713629922fb|36|1 AckFrame[6,3-2|Δ19] 13.109 <- (29) Packet A|7|S0|86e06db097d08780|1372|6 PingFrame[] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|daf3ecc912b81a147786|861f7cc001b31860b49d851623a51ea1] NewConnectionIdFrame[1,<0|daf3ecc912b81a147786|861f7cc001b31860b49d851623a51ea1] StreamFrame[0(CIB),0,1024,fin] Padding(256) 13.110 Finished downloading https://server4:443/geosnlwbea at 36:19.250 on ClientConnection[36fb6e260af329fb/86e06db097d08780(V1) with server4/193.167.100.100:443] 13.110 Closing ClientConnection[36fb6e260af329fb/86e06db097d08780(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.111 Creating connection with server4:443 with v1 13.111 -> Packet A|4|S0|e6b8e1d26713629922fb|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,3-2|Δ0] 13.111 Setting up connection for downloading https://server4:443/dcujyisiab at 36:19.251 on ClientConnection[175c57e74f1121e4/22588e541da6fd11(V1) with server4/193.167.100.100:443] 13.111 Original destination connection id: 175c57e74f1121e4 (scid: 22588e541da6fd11) >- CryptoStream[I|ClientHello] 13.113 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.313/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.113 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.142 <- (30) Packet A|8|S0|86e06db097d08780|37|2 AckFrame[4-3,1|Δ0] ConnectionCloseFrame[0|28|] 13.312 loss detection timeout handler running Sending probe 0, because no ack since 13.113. Current RTT: 100/25. 13.313 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.313 (Probe is an initial retransmit) 13.313 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.713/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.313 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.712 loss detection timeout handler running Sending probe 1, because no ack since 13.313. Current RTT: 100/25. 13.713 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.713 (Probe is an initial retransmit) 13.713 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.513/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.713 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.714 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.514/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.714 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.749 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[3|Δ0] CryptoFrame[0,123] 13.750 probe count not reset on ack because handshake not yet confirmed 13.750 Retransmitting CryptoFrame[0,257] on level Initial 13.750 Cwnd(-): 6000; inflight: 1200 13.751 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 13.749 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 13.753 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 13.754 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 13.754 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 13.756 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.756 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.756 Starting downloading https://server4:443/dcujyisiab at 36:19.896 on ClientConnection[175c57e74f1121e4/22588e541da6fd11(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 13.859/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 13.756 Discarding pn space Initial because first Handshake message is being sent 13.756 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 13.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 13.860/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 13.757 -> Packet A|0|S0|3dd039ceb865a4fd600d|49|1 StreamFrame[0(CIB),0,17,fin] 13.784 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.788 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 13.789 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 13.789 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 13.788 <- (3) Packet A|0|S0|22588e541da6fd11|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0add08e7720adc1ed59a|bb6ac7efd5c7f2e0b3a9a2998bc48f93] Padding(1226) 13.789 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 13.868/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 13.868/App, because ackElicitingInFlight | RTT:35/14 13.789 Discarding pn space Handshake because HandshakeDone is received 13.789 <- (4) Packet A|1|S0|22588e541da6fd11|1332|2 PingFrame[] Padding(1305) 13.790 -> Packet A|1|S0|3dd039ceb865a4fd600d|33|1 AckFrame[1-0|Δ0] 13.790 <- (5) Packet A|2|S0|22588e541da6fd11|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d8601009a084c70e0f97817e54c4d05ea6e9dac627fa48d40edaf3c30c226b4fdcfbe321fea1361] -< CryptoStream[A|NewSessionTicket] 13.810 -> Packet A|2|S0|3dd039ceb865a4fd600d|34|1 AckFrame[2-0|Δ19] 13.822 <- (6) Packet A|3|S0|22588e541da6fd11|1372|2 PingFrame[] Padding(1345) 13.842 -> Packet A|3|S0|3dd039ceb865a4fd600d|34|1 AckFrame[3-0|Δ19] 13.867 loss detection timeout handler running Sending probe 0, because no ack since 13.757. Current RTT: 35/14. 13.868 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 14.090/App, because ackElicitingInFlight | RTT:35/14 13.868 -> Packet PA|4|S0|3dd039ceb865a4fd600d|49|1 StreamFrame[0(CIB),0,17,fin] 13.874 <- (7) Packet A|4|S0|22588e541da6fd11|1422|2 PingFrame[] Padding(1395) 13.894 -> Packet A|5|S0|3dd039ceb865a4fd600d|34|1 AckFrame[4-0|Δ19] 13.900 <- (8) Packet A|5|S0|22588e541da6fd11|1054|1 StreamFrame[0(CIB),0,1024,fin] 13.900 Finished downloading https://server4:443/dcujyisiab at 36:20.040 on ClientConnection[175c57e74f1121e4/22588e541da6fd11(V1) with server4/193.167.100.100:443] 13.901 Closing ClientConnection[175c57e74f1121e4/22588e541da6fd11(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.901 -> Packet A|6|S0|3dd039ceb865a4fd600d|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-0|Δ0] 13.901 Creating connection with server4:443 with v1 13.902 Setting up connection for downloading https://server4:443/lufbyujtmo at 36:20.042 on ClientConnection[9f705aca11c64ca0/2d7666ec56972522(V1) with server4/193.167.100.100:443] 13.902 Original destination connection id: 9f705aca11c64ca0 (scid: 2d7666ec56972522) >- CryptoStream[I|ClientHello] 13.903 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.103/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.903 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.103 loss detection timeout handler running Sending probe 0, because no ack since 13.903. Current RTT: 100/25. 14.103 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.103 (Probe is an initial retransmit) 14.103 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.503/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.103 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.237 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[0|Δ301] CryptoFrame[0,123] 14.238 probe count not reset on ack because handshake not yet confirmed 14.238 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.638/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 14.237 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 14.241 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 16.245/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 14.241 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 14.241 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 14.241 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 14.244 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 16.248/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 14.244 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.245 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.245 Starting downloading https://server4:443/lufbyujtmo at 36:20.384 on ClientConnection[9f705aca11c64ca0/2d7666ec56972522(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 1001 millis, based on 15.247/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 14.245 Discarding pn space Initial because first Handshake message is being sent 14.245 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 14.245 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 15.247/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 14.245 -> Packet A|0|S0|93445ed4f006dfbc9739|49|1 StreamFrame[0(CIB),0,17,fin] 14.273 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 14.348 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 14.567 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.004 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.246 loss detection timeout handler running Sending probe 0, because no ack since 14.244. Current RTT: 334/167. 15.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.246 (Probe is a handshake retransmit) 15.247 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 17.251/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 15.247 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 15.279 <- (6) Packet H|5|L|772|2 AckFrame[2|Δ0] CryptoFrame[0,719] 15.280 probe count not reset on ack because handshake not yet confirmed 15.280 Retransmitting CryptoFrame[0,36] on level Handshake 15.280 Cwnd(-): 6000; inflight: 49 15.280 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.280 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.280 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 2199 millis, based on 17.480/Handshake, because ackElicitingInFlight | RTT:296/201 15.280 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[1|Δ0] 15.281 -> Packet H|4|L|50|1 AckFrame[5,1|Δ0] 15.279 <- (6) Packet A|0|S0|2d7666ec56972522|560|4 AckFrame[0|Δ1001] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|38de8b3aed141bed2f58|254af01b9e33dce68ca35e58e5706f21] Padding(495) reschedule loss detection timer for PTO over 1099 millis, based on 16.380/Handshake, because ackElicitingInFlight | RTT:296/201 15.281 State is set to Confirmed reschedule loss detection timer for PTO over 1705 millis, based on 16.986/Handshake, because ackElicitingInFlight | RTT:386/330 15.281 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.281 Discarding pn space Handshake because HandshakeDone is received 15.280 <- (7) Packet A|1|S0|2d7666ec56972522|1332|2 PingFrame[] Padding(1305) 15.282 -> Packet A|1|S0|93445ed4f006dfbc9739|33|1 AckFrame[1-0|Δ0] 15.282 <- (8) Packet A|3|S0|2d7666ec56972522|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100439fd1d78bc08394b32378e718e9421bc5ad3ffcc564a5d6a3fb750823d113c45c18530b] -< CryptoStream[A|] 15.301 -> Packet A|2|S0|93445ed4f006dfbc9739|36|1 AckFrame[3,1-0|Δ19] 15.337 <- (9) Packet A|5|S0|2d7666ec56972522|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|NewSessionTicket] 15.338 Finished downloading https://server4:443/lufbyujtmo at 36:21.478 on ClientConnection[9f705aca11c64ca0/2d7666ec56972522(V1) with server4/193.167.100.100:443] 15.338 Closing ClientConnection[9f705aca11c64ca0/2d7666ec56972522(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.339 Creating connection with server4:443 with v1 15.339 -> Packet A|3|S0|93445ed4f006dfbc9739|41|2 ConnectionCloseFrame[0|0|] AckFrame[5,3,1-0|Δ0] 15.339 Setting up connection for downloading https://server4:443/elfvwmtxjh at 36:21.479 on ClientConnection[43411ab4f8eedbf2/87b81a827aac9776(V1) with server4/193.167.100.100:443] 15.340 Original destination connection id: 43411ab4f8eedbf2 (scid: 87b81a827aac9776) >- CryptoStream[I|ClientHello] 15.341 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.541/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.341 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.370 <- (10) Packet A|6|S0|2d7666ec56972522|35|2 AckFrame[3-0|Δ0] ConnectionCloseFrame[0|28|] 15.376 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.377 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.577/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.376 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 15.380 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 15.483/Handshake, because peerAwaitingAddressValidation | RTT:35/17 15.379 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 15.380 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 15.380 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 15.383 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 15.486/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 15.382 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.383 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.383 Starting downloading https://server4:443/elfvwmtxjh at 36:21.523 on ClientConnection[43411ab4f8eedbf2/87b81a827aac9776(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 15.486/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 15.383 Discarding pn space Initial because first Handshake message is being sent 15.383 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 15.383 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 15.486/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 15.383 -> Packet A|0|S0|3aff95a9fe41d904af81|49|1 StreamFrame[0(CIB),0,17,fin] 15.486 loss detection timeout handler running Sending probe 0, because no ack since 15.382. Current RTT: 35/17. 15.486 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.486 (Probe is a handshake retransmit) 15.486 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 15.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 15.486 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 15.518 <- (2) Packet H|2|L|49|1 AckFrame[2|Δ0] 15.519 probe count not reset on ack because handshake not yet confirmed 15.519 Retransmitting CryptoFrame[0,36] on level Handshake 15.519 Cwnd(-): 6000; inflight: 49 15.519 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.519 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 15.520 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 181 millis, based on 15.701/Handshake, because ackElicitingInFlight | RTT:35/14 15.519 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[0|Δ0] 15.518 <- (2) Packet A|0|S0|87b81a827aac9776|1283|4 AckFrame[0|Δ102] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1accb3162a6f141bc94b|525cd05516900c7173cff5c75c88cfa4] Padding(1220) reschedule loss detection timer for PTO over 90 millis, based on 15.610/Handshake, because ackElicitingInFlight | RTT:35/14 15.520 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 15.688/Handshake, because ackElicitingInFlight | RTT:45/31 15.520 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.520 Discarding pn space Handshake because HandshakeDone is received 15.520 <- (3) Packet A|1|S0|87b81a827aac9776|1332|2 PingFrame[] Padding(1305) 15.521 -> Packet A|1|S0|3aff95a9fe41d904af81|33|1 AckFrame[1-0|Δ0] 15.522 <- (4) Packet A|3|S0|87b81a827aac9776|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100f785c12a46b5cd45660b9fc6f97efb22175f39bdcf4288ff43cf4e6ef260529eeba30da6] -< CryptoStream[A|] 15.542 -> Packet A|2|S0|3aff95a9fe41d904af81|36|1 AckFrame[3,1-0|Δ19] 15.664 <- (5) Packet A|4|S0|87b81a827aac9776|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1accb3162a6f141bc94b|525cd05516900c7173cff5c75c88cfa4] 15.664 <- (6) Packet A|5|S0|87b81a827aac9776|29|2 PingFrame[] Padding(2) 15.665 -> Packet A|3|S0|3aff95a9fe41d904af81|35|1 AckFrame[5-3,1-0|Δ0] 15.697 <- (7) Packet A|6|S0|87b81a827aac9776|1372|4 PingFrame[] StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] Padding(139) -< CryptoStream[A|NewSessionTicket] 15.698 Finished downloading https://server4:443/elfvwmtxjh at 36:21.837 on ClientConnection[43411ab4f8eedbf2/87b81a827aac9776(V1) with server4/193.167.100.100:443] 15.698 Closing ClientConnection[43411ab4f8eedbf2/87b81a827aac9776(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.698 Creating connection with server4:443 with v1 15.698 -> Packet A|4|S0|3aff95a9fe41d904af81|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-3,1-0|Δ0] 15.699 Setting up connection for downloading https://server4:443/aztonfdkdk at 36:21.839 on ClientConnection[9f82e9d81798d6ec/266594a0085d8da3(V1) with server4/193.167.100.100:443] 15.699 Original destination connection id: 9f82e9d81798d6ec (scid: 266594a0085d8da3) >- CryptoStream[I|ClientHello] 15.701 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.901/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.701 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.736 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.737 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.937/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.736 <- (1) Packet H|0|L|766|1 CryptoFrame[0,718] 15.740 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 15.740 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 15.740 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 15.843/Handshake, because peerAwaitingAddressValidation | RTT:35/17 15.739 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 15.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 15.846/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 15.743 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 15.846/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 15.743 Discarding pn space Initial because first Handshake message is being sent 15.743 Starting downloading https://server4:443/aztonfdkdk at 36:21.883 on ClientConnection[9f82e9d81798d6ec/266594a0085d8da3(V1) with server4/193.167.100.100:443] 15.743 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 15.744 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 15.847/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 15.744 -> Packet A|0|S0|dede5e2f85960f6f69e3|49|1 StreamFrame[0(CIB),0,17,fin] 15.775 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 15.776 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.776 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 15.775 <- (2) Packet A|0|S0|266594a0085d8da3|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|07516ba31ca2ca89eb61|1eb949fe4596ec0a4e1f7c813462133e] Padding(1226) 15.776 State is set to Confirmed reschedule loss detection timer for PTO over 79 millis, based on 15.855/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 15.855/App, because ackElicitingInFlight | RTT:35/14 15.776 Discarding pn space Handshake because HandshakeDone is received 15.776 <- (3) Packet A|1|S0|266594a0085d8da3|1332|2 PingFrame[] Padding(1305) 15.777 -> Packet A|1|S0|dede5e2f85960f6f69e3|33|1 AckFrame[1-0|Δ0] 15.778 <- (4) Packet A|2|S0|266594a0085d8da3|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 15.779 <- (5) Packet A|3|S0|266594a0085d8da3|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100480908f99d788db6bccfeca8221442692c1feb86881ee36dd41a4cb1a28ec833bbcb2cc4] 15.779 Finished downloading https://server4:443/aztonfdkdk at 36:21.919 on ClientConnection[9f82e9d81798d6ec/266594a0085d8da3(V1) with server4/193.167.100.100:443] 15.779 Closing ClientConnection[9f82e9d81798d6ec/266594a0085d8da3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) -< CryptoStream[A|NewSessionTicket] 15.779 -> Packet A|2|S0|dede5e2f85960f6f69e3|33|1 AckFrame[3-0|Δ0] 15.780 -> Packet A|3|S0|dede5e2f85960f6f69e3|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 15.780 Creating connection with server4:443 with v1 15.781 Setting up connection for downloading https://server4:443/msvxjqfsfu at 36:21.920 on ClientConnection[be3b74683b737db1/49ee98e01d28373f(V1) with server4/193.167.100.100:443] 15.781 Original destination connection id: be3b74683b737db1 (scid: 49ee98e01d28373f) >- CryptoStream[I|ClientHello] 15.783 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.983/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.782 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.797 <- (6) Packet A|4|S0|266594a0085d8da3|32|1 AckFrame[0|Δ21] 15.797 -> Packet A|4|S0|dede5e2f85960f6f69e3|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 15.809 <- (7) Packet A|5|S0|266594a0085d8da3|1372|2 PingFrame[] Padding(1345) 15.809 -> Packet A|5|S0|dede5e2f85960f6f69e3|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 15.810 <- (8) Packet A|6|S0|266594a0085d8da3|29|2 MaxStreamsFrame[B,17] Padding(1) 15.827 <- (8) Packet A|7|S0|87b81a827aac9776|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] 15.827 <- (9) Packet A|8|S0|87b81a827aac9776|29|2 PingFrame[] Padding(2) 15.827 -> Packet A|5|S0|3aff95a9fe41d904af81|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-3,1-0|Δ0] 15.828 -> Packet A|6|S0|3aff95a9fe41d904af81|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-3,1-0|Δ0] 15.828 <- (9) Packet A|7|S0|266594a0085d8da3|37|2 AckFrame[4,2-0|Δ0] ConnectionCloseFrame[0|28|] 15.982 loss detection timeout handler running Sending probe 0, because no ack since 15.782. Current RTT: 100/25. 15.982 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.982 (Probe is an initial retransmit) 15.983 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.383/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.982 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.382 loss detection timeout handler running Sending probe 1, because no ack since 15.982. Current RTT: 100/25. 16.382 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.382 (Probe is an initial retransmit) 16.383 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.183/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.382 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.384 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.184/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.384 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.419 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 16.419 probe count not reset on ack because handshake not yet confirmed 16.420 Retransmitting CryptoFrame[0,257] on level Initial 16.420 Cwnd(-): 6000; inflight: 1200 16.420 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.220/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.420 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 431 millis, based on 16.852/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 16.420 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 16.419 <- (1) Packet H|0|L|766|1 CryptoFrame[0,718] 16.423 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 16.856/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 16.423 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 16.424 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 16.424 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 16.427 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 16.859/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 16.427 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.428 Starting downloading https://server4:443/msvxjqfsfu at 36:22.567 on ClientConnection[be3b74683b737db1/49ee98e01d28373f(V1) with server4/193.167.100.100:443] 16.428 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 16.428 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.428 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 16.536/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 reschedule loss detection timer for PTO over 107 millis, based on 16.536/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 16.428 Discarding pn space Initial because first Handshake message is being sent 16.428 -> Packet A|0|S0|1b14a7d68981f7813e22|49|1 StreamFrame[0(CIB),0,17,fin] 16.428 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.459 <- (3) Packet H|3|L|49|1 AckFrame[0|Δ0] 16.460 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 16.460 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 16.459 <- (3) Packet A|0|S0|49ee98e01d28373f|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|7dcd74e0a923ee688a61|bdfc18ed5d1d2528e3731327ee370f4f] Padding(1226) 16.460 State is set to Confirmed reschedule loss detection timer for PTO over 83 millis, based on 16.544/App, because ackElicitingInFlight | RTT:36/15 reschedule loss detection timer for PTO over 83 millis, based on 16.544/App, because ackElicitingInFlight | RTT:36/15 16.460 Discarding pn space Handshake because HandshakeDone is received 16.462 <- (4) Packet A|2|S0|49ee98e01d28373f|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d8601004407ec8ec13edc687b1467ade22e14404adf116b72ba98cacd60e6eac8fec4d1ae11f2ed] -< CryptoStream[A|NewSessionTicket] 16.462 -> Packet A|1|S0|1b14a7d68981f7813e22|36|1 AckFrame[2,0|Δ1] 16.543 loss detection timeout handler running Sending probe 0, because no ack since 16.428. Current RTT: 36/15. 16.544 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 16.776/App, because ackElicitingInFlight | RTT:36/15 16.544 -> Packet PA|2|S0|1b14a7d68981f7813e22|49|1 StreamFrame[0(CIB),0,17,fin] 16.575 <- (5) Packet A|3|S0|49ee98e01d28373f|31|1 AckFrame[2|Δ0] 16.576 Cwnd(-): 3000; inflight: 0 16.576 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.576 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 106 millis, based on 16.683/App, because ackElicitingInFlight | RTT:35/13 16.576 -> Packet A|3|S0|1b14a7d68981f7813e22|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2,0|Δ0] 16.683 loss detection timeout handler running Sending probe 0, because no ack since 16.576. Current RTT: 35/13. 16.683 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 16.897/App, because ackElicitingInFlight | RTT:35/13 16.683 -> Packet PA|4|S0|1b14a7d68981f7813e22|49|1 StreamFrame[0(CIB),0,17,fin] 16.723 <- (6) Packet A|6|S0|49ee98e01d28373f|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|7dcd74e0a923ee688a61|bdfc18ed5d1d2528e3731327ee370f4f] 16.723 <- (7) Packet A|7|S0|49ee98e01d28373f|29|2 PingFrame[] Padding(2) 16.724 -> Packet A|5|S0|1b14a7d68981f7813e22|37|1 AckFrame[7-6,3-2,0|Δ0] 16.891 <- (8) Packet A|9|S0|49ee98e01d28373f|1054|1 StreamFrame[0(CIB),0,1024,fin] 16.891 <- (9) Packet A|10|S0|49ee98e01d28373f|29|2 PingFrame[] Padding(2) 16.892 Finished downloading https://server4:443/msvxjqfsfu at 36:23.032 on ClientConnection[be3b74683b737db1/49ee98e01d28373f(V1) with server4/193.167.100.100:443] 16.892 Closing ClientConnection[be3b74683b737db1/49ee98e01d28373f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.892 -> Packet A|6|S0|1b14a7d68981f7813e22|39|1 AckFrame[10-9,7-6,3-2,0|Δ0] 16.892 -> Packet A|7|S0|1b14a7d68981f7813e22|43|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,7-6,3-2,0|Δ0] 16.893 Creating connection with server4:443 with v1 16.893 Setting up connection for downloading https://server4:443/fckzbhwmnm at 36:23.033 on ClientConnection[dafe65e95bd13e81/3f41273bb3c35de6(V1) with server4/193.167.100.100:443] 16.893 Original destination connection id: dafe65e95bd13e81 (scid: 3f41273bb3c35de6) >- CryptoStream[I|ClientHello] 16.895 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.095/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.895 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.924 <- (10) Packet A|11|S0|49ee98e01d28373f|1332|3 PingFrame[] MaxStreamsFrame[B,17] Padding(1303) 16.925 -> Packet A|8|S0|1b14a7d68981f7813e22|43|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,7-6,3-2,0|Δ0] 17.094 loss detection timeout handler running Sending probe 0, because no ack since 16.895. Current RTT: 100/25. 17.094 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.094 (Probe is an initial retransmit) 17.095 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.495/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.095 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.130 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 17.131 probe count not reset on ack because handshake not yet confirmed 17.131 Retransmitting CryptoFrame[0,257] on level Initial 17.131 Cwnd(-): 6000; inflight: 0 17.131 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.531/Initial, because peerAwaitingAddressValidation | RTT:100/25 17.132 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 17.338/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.132 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 17.135 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.130 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] reschedule loss detection timer for PTO over 205 millis, based on 17.341/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.134 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 17.135 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 17.135 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 17.137 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 17.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.137 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.138 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.138 Starting downloading https://server4:443/fckzbhwmnm at 36:23.277 on ClientConnection[dafe65e95bd13e81/3f41273bb3c35de6(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 17.241/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.138 Discarding pn space Initial because first Handshake message is being sent 17.138 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 17.138 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 17.241/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.138 -> Packet A|0|S0|673fdedbffc62fcae0f7|49|1 StreamFrame[0(CIB),0,17,fin] 17.165 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 17.240 loss detection timeout handler running Sending probe 0, because no ack since 17.137. Current RTT: 35/17. 17.240 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.240 (Probe is a handshake retransmit) 17.241 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 17.447/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.241 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 17.266 <- (3) Packet H|2|L|47|2 PingFrame[] Padding(2) 17.267 -> Packet H|3|L|50|1 AckFrame[2,0|Δ0] 17.274 <- (4) Packet A|1|S0|3f41273bb3c35de6|1332|2 PingFrame[] Padding(1305) 17.276 <- (5) Packet A|2|S0|3f41273bb3c35de6|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 17.277 <- (6) Packet A|3|S0|3f41273bb3c35de6|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100da2795cfb66e0bb815a98d8d006032078c313567c0fe14cf9c00038af7166c18d3eca90e] 17.277 -> Packet A|1|S0|673fdedbffc62fcae0f7|34|1 AckFrame[2-1|Δ2] 17.277 Finished downloading https://server4:443/fckzbhwmnm at 36:23.417 on ClientConnection[dafe65e95bd13e81/3f41273bb3c35de6(V1) with server4/193.167.100.100:443] 17.277 Closing ClientConnection[dafe65e95bd13e81/3f41273bb3c35de6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) -< CryptoStream[A|NewSessionTicket] 17.278 Creating connection with server4:443 with v1 17.278 -> Packet A|2|S0|673fdedbffc62fcae0f7|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 17.279 Setting up connection for downloading https://server4:443/mevqdzmzbi at 36:23.418 on ClientConnection[cdcc9f6a8fcdb237/cd89f7e9ca44a100(V1) with server4/193.167.100.100:443] 17.279 Original destination connection id: cdcc9f6a8fcdb237 (scid: cd89f7e9ca44a100) >- CryptoStream[I|ClientHello] 17.280 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.480/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.280 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.309 <- (7) Packet A|4|S0|3f41273bb3c35de6|1372|3 PingFrame[] MaxStreamsFrame[B,17] Padding(1343) 17.309 <- (8) Packet A|5|S0|3f41273bb3c35de6|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 17.310 -> Packet A|3|S0|673fdedbffc62fcae0f7|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 17.479 loss detection timeout handler running Sending probe 0, because no ack since 17.280. Current RTT: 100/25. 17.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.480 (Probe is an initial retransmit) 17.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.880/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.480 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.879 loss detection timeout handler running Sending probe 1, because no ack since 17.480. Current RTT: 100/25. 17.879 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.879 (Probe is an initial retransmit) 17.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.680/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.880 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.881 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.681/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.881 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.913 <- (1) Packet I|3|L|177|2 Token=[] AckFrame[2-0|Δ0] CryptoFrame[0,123] 17.914 probe count not reset on ack because handshake not yet confirmed 17.914 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.714/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 17.913 <- (1) Packet H|3|L|767|1 CryptoFrame[0,719] 17.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.305/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.917 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 17.917 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 17.916 -> Packet I|4|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1151) >- CryptoStream[H|Finished] 17.919 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.307/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.919 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.920 Starting downloading https://server4:443/mevqdzmzbi at 36:24.059 on ClientConnection[cdcc9f6a8fcdb237/cd89f7e9ca44a100(V1) with server4/193.167.100.100:443] 17.920 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.920 -> Packet H|1|L|48|1 AckFrame[3|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 18.017/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.920 Discarding pn space Initial because first Handshake message is being sent 17.920 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 17.920 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.017/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.920 -> Packet A|0|S0|3d6a74a8bb16531ce160|49|1 StreamFrame[0(CIB),0,17,fin] 18.016 loss detection timeout handler running Sending probe 0, because no ack since 17.919. Current RTT: 33/16. 18.016 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.017 (Probe is a handshake retransmit) 18.017 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.211/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.017 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 18.049 <- (3) Packet H|5|L|49|1 AckFrame[2-1|Δ0] 18.050 probe count not reset on ack because handshake not yet confirmed 18.050 Retransmitting CryptoFrame[0,36] on level Handshake 18.050 Cwnd(-): 6000; inflight: 49 18.050 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 18.050 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 18.050 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 161 millis, based on 18.212/Handshake, because ackElicitingInFlight | RTT:33/12 18.050 -> Packet H|3|L|82|1 CryptoFrame[0,36] 18.049 <- (3) Packet A|0|S0|cd89f7e9ca44a100|1283|4 AckFrame[0|Δ96] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e1a278c90b87f8551f0f|17740dda7deb5c8077ac35c19678fa2b] Padding(1220) reschedule loss detection timer for PTO over 80 millis, based on 18.131/Handshake, because ackElicitingInFlight | RTT:33/12 18.051 State is set to Confirmed reschedule loss detection timer for PTO over 154 millis, based on 18.205/Handshake, because ackElicitingInFlight | RTT:43/28 18.051 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.051 Discarding pn space Handshake because HandshakeDone is received 18.070 -> Packet A|1|S0|3d6a74a8bb16531ce160|34|1 AckFrame[0|Δ19] 18.092 <- (4) Packet A|2|S0|cd89f7e9ca44a100|107|2 CryptoFrame[273,32] NewTokenFrame[ad9a8b8d8601004c5050fb123e86737b75604b59c3b28bcbbddbf471043db5a6741a38710ff8fa17085b88] -< CryptoStream[A|] 18.111 -> Packet A|2|S0|3d6a74a8bb16531ce160|36|1 AckFrame[2,0|Δ19] 18.552 <- (5) Packet A|3|S0|cd89f7e9ca44a100|1332|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,273] -< CryptoStream[A|NewSessionTicket] 18.553 Finished downloading https://server4:443/mevqdzmzbi at 36:24.693 on ClientConnection[cdcc9f6a8fcdb237/cd89f7e9ca44a100(V1) with server4/193.167.100.100:443] 18.553 Closing ClientConnection[cdcc9f6a8fcdb237/cd89f7e9ca44a100(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.554 Creating connection with server4:443 with v1 18.554 -> Packet A|3|S0|3d6a74a8bb16531ce160|39|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 18.554 Setting up connection for downloading https://server4:443/trncskoami at 36:24.694 on ClientConnection[d3f60bffebe2bb96/5bac8985395a981a(V1) with server4/193.167.100.100:443] 18.554 Original destination connection id: d3f60bffebe2bb96 (scid: 5bac8985395a981a) >- CryptoStream[I|ClientHello] 18.556 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.756/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.556 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.585 <- (6) Packet A|4|S0|cd89f7e9ca44a100|35|2 AckFrame[3-0|Δ0] ConnectionCloseFrame[0|28|] 18.591 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18.592 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.792/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.591 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 18.595 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 18.698/Handshake, because peerAwaitingAddressValidation | RTT:35/17 18.595 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 18.595 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 18.595 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 18.598 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 18.701/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 18.597 -> Packet H|0|L|82|1 CryptoFrame[0,36] 18.598 Starting downloading https://server4:443/trncskoami at 36:24.738 on ClientConnection[d3f60bffebe2bb96/5bac8985395a981a(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.598 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 18.701/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 18.599 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 18.702/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 18.599 Discarding pn space Initial because first Handshake message is being sent 18.598 -> Packet A|0|S0|b92111095cba1ccb056c|49|1 StreamFrame[0(CIB),0,17,fin] 18.599 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 18.630 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 18.630 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 18.630 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 18.630 <- (2) Packet A|0|S0|5bac8985395a981a|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4aaeac7bcdb234de1cdb|14365fe497c6f9b7a952c2a50079e46b] Padding(1226) 18.631 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 18.709/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 18.709/App, because ackElicitingInFlight | RTT:35/14 18.631 Discarding pn space Handshake because HandshakeDone is received 18.631 <- (3) Packet A|1|S0|5bac8985395a981a|1332|2 PingFrame[] Padding(1305) 18.631 -> Packet A|1|S0|b92111095cba1ccb056c|33|1 AckFrame[1-0|Δ0] 18.633 <- (4) Packet A|2|S0|5bac8985395a981a|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 18.634 <- (5) Packet A|3|S0|5bac8985395a981a|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100a5206cf8f27c40cb8e2170f5c19a0f7a9eaa1930d392f941a87733aa7ae9167cc72bfe9b] 18.634 Finished downloading https://server4:443/trncskoami at 36:24.774 on ClientConnection[d3f60bffebe2bb96/5bac8985395a981a(V1) with server4/193.167.100.100:443] 18.634 Closing ClientConnection[d3f60bffebe2bb96/5bac8985395a981a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) -< CryptoStream[A|NewSessionTicket] 18.634 -> Packet A|2|S0|b92111095cba1ccb056c|33|1 AckFrame[3-0|Δ0] 18.635 Creating connection with server4:443 with v1 18.635 -> Packet A|3|S0|b92111095cba1ccb056c|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 18.636 Setting up connection for downloading https://server4:443/dnwihpjdsu at 36:24.775 on ClientConnection[7ce71c9702bc1c8d/180b93f0f0463c58(V1) with server4/193.167.100.100:443] 18.636 Original destination connection id: 7ce71c9702bc1c8d (scid: 180b93f0f0463c58) >- CryptoStream[I|ClientHello] 18.637 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.837/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.637 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.650 <- (6) Packet A|4|S0|5bac8985395a981a|32|1 AckFrame[0|Δ20] 18.650 -> Packet A|4|S0|b92111095cba1ccb056c|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 18.663 <- (7) Packet A|5|S0|5bac8985395a981a|1372|2 PingFrame[] Padding(1345) 18.663 -> Packet A|5|S0|b92111095cba1ccb056c|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 18.665 <- (8) Packet A|6|S0|5bac8985395a981a|29|2 MaxStreamsFrame[B,17] Padding(1) 18.666 <- (9) Packet A|7|S0|5bac8985395a981a|35|2 AckFrame[3-0|Δ0] ConnectionCloseFrame[0|28|] 18.836 loss detection timeout handler running Sending probe 0, because no ack since 18.637. Current RTT: 100/25. 18.836 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.836 (Probe is an initial retransmit) 18.837 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.237/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.837 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.870 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 18.870 probe count not reset on ack because handshake not yet confirmed 18.871 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.271/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.870 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 18.873 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.873 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 18.873 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) reschedule loss detection timer for PTO over 193 millis, based on 19.067/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.873 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) >- CryptoStream[H|Finished] 18.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.070/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.875 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.876 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.876 Starting downloading https://server4:443/dnwihpjdsu at 36:25.016 on ClientConnection[7ce71c9702bc1c8d/180b93f0f0463c58(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 18.973/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.876 Discarding pn space Initial because first Handshake message is being sent 18.876 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 18.876 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.973/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.876 -> Packet A|0|S0|4a7d5d800aec76d0951d|49|1 StreamFrame[0(CIB),0,17,fin] 18.908 <- (2) Packet H|2|L|49|1 AckFrame[0|Δ0] 18.908 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 18.908 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 18.908 <- (2) Packet A|0|S0|180b93f0f0463c58|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1f220b14b526719f734f|87c130ebe66f8d4e024dea9b57848990] Padding(1226) 18.909 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 18.977/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 68 millis, based on 18.977/App, because ackElicitingInFlight | RTT:33/12 18.909 Discarding pn space Handshake because HandshakeDone is received 18.909 <- (3) Packet A|1|S0|180b93f0f0463c58|1332|2 PingFrame[] Padding(1305) 18.909 -> Packet A|1|S0|4a7d5d800aec76d0951d|33|1 AckFrame[1-0|Δ0] 18.921 <- (4) Packet A|2|S0|180b93f0f0463c58|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 18.922 Finished downloading https://server4:443/dnwihpjdsu at 36:25.062 on ClientConnection[7ce71c9702bc1c8d/180b93f0f0463c58(V1) with server4/193.167.100.100:443] 18.922 Closing ClientConnection[7ce71c9702bc1c8d/180b93f0f0463c58(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.923 Creating connection with server4:443 with v1 18.922 -> Packet A|2|S0|4a7d5d800aec76d0951d|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 18.923 Setting up connection for downloading https://server4:443/zfgznusvec at 36:25.063 on ClientConnection[8182dbca781f6750/c412d8ecd2003ba4(V1) with server4/193.167.100.100:443] 18.923 Original destination connection id: 8182dbca781f6750 (scid: c412d8ecd2003ba4) >- CryptoStream[I|ClientHello] 18.924 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.124/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.924 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.928 <- (5) Packet A|3|S0|180b93f0f0463c58|32|1 AckFrame[0|Δ21] 18.929 -> Packet A|3|S0|4a7d5d800aec76d0951d|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 18.932 <- (6) Packet A|4|S0|180b93f0f0463c58|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100e15c33d2efdf81de4a4986b8c575dd76574d43ad3a35f1f7160aa4cb6b03e04706bff227] 18.932 -> Packet A|4|S0|4a7d5d800aec76d0951d|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 18.953 <- (7) Packet A|5|S0|180b93f0f0463c58|37|2 AckFrame[2,0|Δ0] ConnectionCloseFrame[0|28|] 19.124 loss detection timeout handler running Sending probe 0, because no ack since 18.924. Current RTT: 100/25. 19.124 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.124 (Probe is an initial retransmit) 19.124 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.524/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.124 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.157 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 19.158 probe count not reset on ack because handshake not yet confirmed 19.158 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.558/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.157 <- (1) Packet H|1|L|766|1 CryptoFrame[0,718] 19.160 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 19.352/Handshake, because peerAwaitingAddressValidation | RTT:32/16 19.160 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 19.160 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 19.160 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 19.163 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 19.355/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.163 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.163 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.163 Starting downloading https://server4:443/zfgznusvec at 36:25.303 on ClientConnection[8182dbca781f6750/c412d8ecd2003ba4(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 19.259/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.163 Discarding pn space Initial because first Handshake message is being sent 19.163 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 19.163 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 19.259/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.163 -> Packet A|0|S0|c31fe691839c5533e30e|49|1 StreamFrame[0(CIB),0,17,fin] 19.197 <- (2) Packet A|2|S0|c412d8ecd2003ba4|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d8601004d6204a443146e3c708bca702f60ea6ba9ebc160d16543eba585b4854f27e36377690614] -< CryptoStream[A|NewSessionTicket] 19.217 -> Packet A|1|S0|c31fe691839c5533e30e|34|1 AckFrame[2|Δ19] 19.259 loss detection timeout handler running Sending probe 0, because no ack since 19.163. Current RTT: 32/16. 19.259 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.259 (Probe is a handshake retransmit) 19.259 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 19.451/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.259 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 19.332 <- (3) Packet A|3|S0|c412d8ecd2003ba4|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|230c056a305418881a48|6869b2b6f036f1fc3bf54de2896ae3bc] 19.332 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 19.395/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -52 millis, based on 19.279/App, because ackElicitingInFlight | RTT:32/16 19.332 Discarding pn space Handshake because HandshakeDone is received 19.332 loss detection timeout handler running Sending probe 0, because no ack since 19.163. Current RTT: 32/16. 19.332 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 19.565/App, because ackElicitingInFlight | RTT:32/16 19.333 -> Packet PA|2|S0|c31fe691839c5533e30e|49|1 StreamFrame[0(CIB),0,17,fin] 19.352 -> Packet A|3|S0|c31fe691839c5533e30e|34|1 AckFrame[3-2|Δ19] 19.363 <- (4) Packet A|5|S0|c412d8ecd2003ba4|31|1 AckFrame[2|Δ0] 19.364 Cwnd(-): 6000; inflight: 0 19.364 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.364 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 103 millis, based on 19.468/App, because ackElicitingInFlight | RTT:32/13 19.364 -> Packet A|4|S0|c31fe691839c5533e30e|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-2|Δ0] 19.365 <- (5) Packet A|6|S0|c412d8ecd2003ba4|1054|1 StreamFrame[0(CIB),0,1024,fin] 19.365 Finished downloading https://server4:443/zfgznusvec at 36:25.505 on ClientConnection[8182dbca781f6750/c412d8ecd2003ba4(V1) with server4/193.167.100.100:443] 19.365 Closing ClientConnection[8182dbca781f6750/c412d8ecd2003ba4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.366 -> Packet A|5|S0|c31fe691839c5533e30e|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3-2|Δ0] 19.366 Creating connection with server4:443 with v1 19.366 Setting up connection for downloading https://server4:443/kvzdmjdflt at 36:25.506 on ClientConnection[da3e266db8ed8ca7/d99af9760ab66b56(V1) with server4/193.167.100.100:443] 19.366 Original destination connection id: da3e266db8ed8ca7 (scid: d99af9760ab66b56) >- CryptoStream[I|ClientHello] 19.368 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.568/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.368 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.384 <- (6) Packet A|7|S0|c412d8ecd2003ba4|1332|4 PingFrame[] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|230c056a305418881a48|6869b2b6f036f1fc3bf54de2896ae3bc] Padding(1274) 19.385 -> Packet A|6|S0|c31fe691839c5533e30e|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3-2|Δ0] 19.403 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.404 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.604/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.403 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 19.406 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 19.510/Handshake, because peerAwaitingAddressValidation | RTT:35/17 19.407 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 19.406 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 19.407 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 19.409 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 19.512/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 19.409 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.409 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.409 Starting downloading https://server4:443/kvzdmjdflt at 36:25.549 on ClientConnection[da3e266db8ed8ca7/d99af9760ab66b56(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 19.512/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 19.409 Discarding pn space Initial because first Handshake message is being sent 19.409 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 19.410 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 19.513/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 19.410 -> Packet A|0|S0|a38fb22e1b2c1d8402ef|49|1 StreamFrame[0(CIB),0,17,fin] 19.512 loss detection timeout handler running Sending probe 0, because no ack since 19.409. Current RTT: 35/17. 19.512 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.512 (Probe is a handshake retransmit) 19.512 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 19.718/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 19.512 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 19.519 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.546 <- (3) Packet A|1|S0|d99af9760ab66b56|1332|2 PingFrame[] Padding(1305) 19.547 <- (4) Packet A|2|S0|d99af9760ab66b56|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 19.547 -> Packet A|1|S0|a38fb22e1b2c1d8402ef|34|1 AckFrame[2-1|Δ1] 19.548 Finished downloading https://server4:443/kvzdmjdflt at 36:25.687 on ClientConnection[da3e266db8ed8ca7/d99af9760ab66b56(V1) with server4/193.167.100.100:443] 19.548 Closing ClientConnection[da3e266db8ed8ca7/d99af9760ab66b56(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.548 -> Packet A|2|S0|a38fb22e1b2c1d8402ef|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 19.548 <- (5) Packet A|3|S0|d99af9760ab66b56|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100d28b87f26f3382676d3e47c86a2c5e11169ca09bbab6494e7163a57ad014e53e82842ccd] 19.549 Creating connection with server4:443 with v1 19.549 -> Packet A|3|S0|a38fb22e1b2c1d8402ef|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 19.549 Setting up connection for downloading https://server4:443/eyckfkxvrb at 36:25.689 on ClientConnection[91e7b337e3d71a80/6c33f77cd416f142(V1) with server4/193.167.100.100:443] 19.549 Original destination connection id: 91e7b337e3d71a80 (scid: 6c33f77cd416f142) >- CryptoStream[I|ClientHello] 19.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.751/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.551 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.579 <- (6) Packet A|4|S0|d99af9760ab66b56|1372|3 PingFrame[] MaxStreamsFrame[B,17] Padding(1343) 19.580 <- (7) Packet A|5|S0|d99af9760ab66b56|37|2 AckFrame[3,1-0|Δ0] ConnectionCloseFrame[0|28|] 19.580 -> Packet A|4|S0|a38fb22e1b2c1d8402ef|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 19.750 loss detection timeout handler running Sending probe 0, because no ack since 19.551. Current RTT: 100/25. 19.750 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.750 (Probe is an initial retransmit) 19.750 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.151/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.750 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.150 loss detection timeout handler running Sending probe 1, because no ack since 19.750. Current RTT: 100/25. 20.150 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.150 (Probe is an initial retransmit) 20.150 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.950/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.150 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.151 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.951/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.151 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.186 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 20.187 probe count not reset on ack because handshake not yet confirmed 20.187 Retransmitting CryptoFrame[0,257] on level Initial 20.187 Cwnd(-): 6000; inflight: 1200 20.187 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.987/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.187 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 411 millis, based on 20.599/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 20.187 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 20.190 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.186 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] reschedule loss detection timer for PTO over 411 millis, based on 20.602/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 20.190 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 20.190 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 20.190 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 20.193 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 20.605/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 20.193 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.193 Starting downloading https://server4:443/eyckfkxvrb at 36:26.333 on ClientConnection[91e7b337e3d71a80/6c33f77cd416f142(V1) with server4/193.167.100.100:443] 20.193 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 20.296/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 20.193 Discarding pn space Initial because first Handshake message is being sent 20.193 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 20.194 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 20.297/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 20.193 -> Packet A|0|S0|504bfa12785bbe79e9f4|49|1 StreamFrame[0(CIB),0,17,fin] 20.220 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.225 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 20.225 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 20.225 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 20.225 <- (3) Packet A|0|S0|6c33f77cd416f142|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|62a48d8d5c0c821ec852|30343191c580b1f012c6d0efb4d37829] Padding(1226) 20.225 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 20.304/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 20.304/App, because ackElicitingInFlight | RTT:35/14 20.226 Discarding pn space Handshake because HandshakeDone is received 20.226 <- (4) Packet A|1|S0|6c33f77cd416f142|1332|2 PingFrame[] Padding(1305) 20.226 -> Packet A|1|S0|504bfa12785bbe79e9f4|33|1 AckFrame[1-0|Δ0] 20.228 <- (5) Packet A|2|S0|6c33f77cd416f142|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 20.229 <- (6) Packet A|3|S0|6c33f77cd416f142|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601006aa8b3ed273cdf60fdec0ada1e98456a8d431291c38d96e4ab30f67024938e3e1f0b14d7] 20.229 Finished downloading https://server4:443/eyckfkxvrb at 36:26.369 on ClientConnection[91e7b337e3d71a80/6c33f77cd416f142(V1) with server4/193.167.100.100:443] 20.229 Closing ClientConnection[91e7b337e3d71a80/6c33f77cd416f142(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) -< CryptoStream[A|NewSessionTicket] 20.229 -> Packet A|2|S0|504bfa12785bbe79e9f4|33|1 AckFrame[3-0|Δ0] 20.229 -> Packet A|3|S0|504bfa12785bbe79e9f4|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 20.230 Creating connection with server4:443 with v1 20.231 Setting up connection for downloading https://server4:443/iydkvycxzk at 36:26.371 on ClientConnection[006abf5bceac641b/c72aaa11034af389(V1) with server4/193.167.100.100:443] 20.231 Original destination connection id: 006abf5bceac641b (scid: c72aaa11034af389) >- CryptoStream[I|ClientHello] 20.233 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.433/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.232 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.245 <- (7) Packet A|4|S0|6c33f77cd416f142|32|1 AckFrame[0|Δ20] 20.246 -> Packet A|4|S0|504bfa12785bbe79e9f4|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 20.260 <- (8) Packet A|6|S0|6c33f77cd416f142|29|2 MaxStreamsFrame[B,17] Padding(1) 20.261 -> Packet A|5|S0|504bfa12785bbe79e9f4|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 20.261 <- (9) Packet A|7|S0|6c33f77cd416f142|35|2 AckFrame[3-0|Δ0] ConnectionCloseFrame[0|28|] 20.432 loss detection timeout handler running Sending probe 0, because no ack since 20.232. Current RTT: 100/25. 20.432 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.432 (Probe is an initial retransmit) 20.432 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.832/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.432 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.832 loss detection timeout handler running Sending probe 1, because no ack since 20.432. Current RTT: 100/25. 20.832 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.832 (Probe is an initial retransmit) 20.832 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.632/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.832 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.833 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.633/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.833 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.167 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[3|Δ301] CryptoFrame[0,123] 21.168 probe count not reset on ack because handshake not yet confirmed 21.168 Retransmitting CryptoFrame[0,257] on level Initial 21.168 Cwnd(-): 6000; inflight: 0 21.168 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.968/Initial, because peerAwaitingAddressValidation | RTT:100/25 21.168 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 4007 millis, based on 25.176/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 21.168 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 21.167 <- (1) Packet H|1|L|766|1 CryptoFrame[0,718] 21.171 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 4007 millis, based on 25.179/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 21.171 -> Packet I|5|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 21.171 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 21.171 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 21.174 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 4007 millis, based on 25.182/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 21.174 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.174 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 22.176/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 21.174 Starting downloading https://server4:443/iydkvycxzk at 36:27.314 on ClientConnection[006abf5bceac641b/c72aaa11034af389(V1) with server4/193.167.100.100:443] 21.174 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 21.174 Discarding pn space Initial because first Handshake message is being sent 21.175 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 22.177/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 21.174 -> Packet A|0|S0|3e2440dd234233a89567|49|1 StreamFrame[0(CIB),0,17,fin] 21.201 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.206 <- (3) Packet H|3|L|49|1 AckFrame[0|Δ0] 21.206 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 21.206 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.206 <- (3) Packet A|0|S0|c72aaa11034af389|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b373fe05d7e0b7536f69|ff123484fac7f00973fd679bb482bb9b] Padding(1226) 21.207 State is set to Confirmed reschedule loss detection timer for PTO over 1087 millis, based on 22.294/App, because ackElicitingInFlight | RTT:296/201 reschedule loss detection timer for PTO over 1087 millis, based on 22.294/App, because ackElicitingInFlight | RTT:296/201 21.207 Discarding pn space Handshake because HandshakeDone is received 21.210 <- (4) Packet A|1|S0|c72aaa11034af389|1332|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,273] -< CryptoStream[A|] 21.211 Finished downloading https://server4:443/iydkvycxzk at 36:27.351 on ClientConnection[006abf5bceac641b/c72aaa11034af389(V1) with server4/193.167.100.100:443] 21.211 -> Packet A|1|S0|3e2440dd234233a89567|34|1 AckFrame[1-0|Δ3] 21.211 Closing ClientConnection[006abf5bceac641b/c72aaa11034af389(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.211 -> Packet A|2|S0|3e2440dd234233a89567|37|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 21.212 Creating connection with server4:443 with v1 21.213 Setting up connection for downloading https://server4:443/jxziwxtfgq at 36:27.352 on ClientConnection[b4ffdc949561cee2/8c8d5f649bec068f(V1) with server4/193.167.100.100:443] 21.213 Original destination connection id: b4ffdc949561cee2 (scid: 8c8d5f649bec068f) >- CryptoStream[I|ClientHello] 21.214 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.414/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.214 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.227 <- (5) Packet A|2|S0|c72aaa11034af389|113|3 AckFrame[0|Δ21] CryptoFrame[273,32] NewTokenFrame[ad9a8b8d860100aba29c2a0d05919af938d800b35a804d67f3c884737731a6924fefaf74f9d0fff970925b] 21.228 -> Packet A|3|S0|3e2440dd234233a89567|37|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 21.243 <- (6) Packet A|3|S0|c72aaa11034af389|1372|3 PingFrame[] MaxStreamsFrame[B,17] Padding(1343) 21.243 <- (7) Packet A|4|S0|c72aaa11034af389|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 21.243 -> Packet A|4|S0|3e2440dd234233a89567|37|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 21.413 loss detection timeout handler running Sending probe 0, because no ack since 21.214. Current RTT: 100/25. 21.413 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.413 (Probe is an initial retransmit) 21.414 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.814/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.414 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.447 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 21.447 probe count not reset on ack because handshake not yet confirmed 21.447 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.847/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.447 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 21.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.450 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) reschedule loss detection timer for PTO over 191 millis, based on 21.642/Handshake, because peerAwaitingAddressValidation | RTT:32/16 21.450 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 21.449 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) >- CryptoStream[H|Finished] 21.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 21.644/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.452 -> Packet H|0|L|82|1 CryptoFrame[0,36] 21.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.452 Starting downloading https://server4:443/jxziwxtfgq at 36:27.592 on ClientConnection[b4ffdc949561cee2/8c8d5f649bec068f(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 21.548/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 21.452 Discarding pn space Initial because first Handshake message is being sent 21.452 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 21.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 21.548/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 21.452 -> Packet A|0|S0|c86c7671ac2371f7098f|49|1 StreamFrame[0(CIB),0,17,fin] 21.548 loss detection timeout handler running Sending probe 0, because no ack since 21.452. Current RTT: 32/16. 21.548 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.548 (Probe is a handshake retransmit) 21.548 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 21.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 21.548 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 21.580 <- (2) Packet H|3|L|49|1 AckFrame[2|Δ0] 21.581 probe count not reset on ack because handshake not yet confirmed 21.581 Retransmitting CryptoFrame[0,36] on level Handshake 21.581 Cwnd(-): 6000; inflight: 49 21.581 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 21.581 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.581 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 159 millis, based on 21.741/Handshake, because ackElicitingInFlight | RTT:32/12 21.581 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[1|Δ0] 21.580 <- (2) Packet A|0|S0|8c8d5f649bec068f|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c709b20e70019c2812dc|4805971513feb36f04dfe5ae246acb78] Padding(1226) 21.581 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 21.652/App, because ackElicitingInFlight | RTT:32/12 reschedule loss detection timer for PTO over -29 millis, based on 21.552/App, because ackElicitingInFlight | RTT:32/12 21.582 Discarding pn space Handshake because HandshakeDone is received 21.582 loss detection timeout handler running Sending probe 0, because no ack since 21.452. Current RTT: 32/12. 21.582 (Probe is retransmit on level App) 21.581 <- (3) Packet A|1|S0|8c8d5f649bec068f|1332|2 PingFrame[] Padding(1305) reschedule loss detection timer for PTO over 199 millis, based on 21.782/App, because ackElicitingInFlight | RTT:32/12 21.582 -> Packet PA|1|S0|c86c7671ac2371f7098f|49|1 StreamFrame[0(CIB),0,17,fin] 21.582 -> Packet A|2|S0|c86c7671ac2371f7098f|33|1 AckFrame[1-0|Δ0] 21.612 <- (4) Packet A|3|S0|8c8d5f649bec068f|31|1 AckFrame[1|Δ0] 21.613 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.613 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 91 millis, based on 21.705/App, because ackElicitingInFlight | RTT:32/10 21.613 -> Packet A|3|S0|c86c7671ac2371f7098f|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1-0|Δ0] 21.613 <- (5) Packet A|4|S0|8c8d5f649bec068f|1054|1 StreamFrame[0(CIB),0,1024,fin] 21.614 Finished downloading https://server4:443/jxziwxtfgq at 36:27.754 on ClientConnection[b4ffdc949561cee2/8c8d5f649bec068f(V1) with server4/193.167.100.100:443] 21.614 Closing ClientConnection[b4ffdc949561cee2/8c8d5f649bec068f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.615 Creating connection with server4:443 with v1 21.615 -> Packet A|4|S0|c86c7671ac2371f7098f|39|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1-0|Δ0] 21.615 <- (6) Packet A|5|S0|8c8d5f649bec068f|1372|2 PingFrame[] Padding(1345) 21.615 Setting up connection for downloading https://server4:443/lfuhpoixdn at 36:27.755 on ClientConnection[80874e47f464e926/9340e0b0397702ec(V1) with server4/193.167.100.100:443] 21.615 -> Packet A|5|S0|c86c7671ac2371f7098f|39|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1-0|Δ0] 21.615 Original destination connection id: 80874e47f464e926 (scid: 9340e0b0397702ec) >- CryptoStream[I|ClientHello] 21.617 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.817/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.617 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.652 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.652 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.852/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.652 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 21.655 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.655 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) reschedule loss detection timer for PTO over 102 millis, based on 21.758/Handshake, because peerAwaitingAddressValidation | RTT:35/17 21.655 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 21.655 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 21.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 21.760/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 21.657 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.657 Starting downloading https://server4:443/lfuhpoixdn at 36:27.797 on ClientConnection[80874e47f464e926/9340e0b0397702ec(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 21.760/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 21.657 Discarding pn space Initial because first Handshake message is being sent 21.657 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 21.658 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 21.761/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 21.658 -> Packet A|0|S0|6cf9c9a14ac4b1d59ee4|49|1 StreamFrame[0(CIB),0,17,fin] 21.689 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 21.689 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 21.690 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.689 <- (2) Packet A|0|S0|9340e0b0397702ec|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|3576c853f5ff7855ba76|ac257316c6c047204c0e79d6b53fcd2b] Padding(1226) 21.690 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 21.769/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 21.769/App, because ackElicitingInFlight | RTT:35/14 21.690 Discarding pn space Handshake because HandshakeDone is received 21.690 <- (3) Packet A|1|S0|9340e0b0397702ec|1332|2 PingFrame[] Padding(1305) 21.690 -> Packet A|1|S0|6cf9c9a14ac4b1d59ee4|33|1 AckFrame[1-0|Δ0] 21.691 <- (4) Packet A|2|S0|9340e0b0397702ec|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100e0a2b5362fc14fe3608c5369ab6a4bb4b2b71ad0fc498534ee72e1fa1edb2ec07a752ef4] -< CryptoStream[A|NewSessionTicket] 21.711 -> Packet A|2|S0|6cf9c9a14ac4b1d59ee4|34|1 AckFrame[2-0|Δ19] 21.743 <- (5) Packet A|3|S0|9340e0b0397702ec|1372|2 PingFrame[] Padding(1345) 21.763 -> Packet A|3|S0|6cf9c9a14ac4b1d59ee4|34|1 AckFrame[3-0|Δ19] 21.768 loss detection timeout handler running Sending probe 0, because no ack since 21.658. Current RTT: 35/14. 21.768 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 21.990/App, because ackElicitingInFlight | RTT:35/14 21.768 -> Packet PA|4|S0|6cf9c9a14ac4b1d59ee4|49|1 StreamFrame[0(CIB),0,17,fin] 21.879 <- (6) Packet A|4|S0|9340e0b0397702ec|29|2 PingFrame[] Padding(2) 21.879 <- (7) Packet A|5|S0|9340e0b0397702ec|29|2 PingFrame[] Padding(2) 21.879 -> Packet A|5|S0|6cf9c9a14ac4b1d59ee4|33|1 AckFrame[5-0|Δ0] 21.911 <- (8) Packet A|6|S0|9340e0b0397702ec|1422|2 PingFrame[] Padding(1395) 21.931 -> Packet A|6|S0|6cf9c9a14ac4b1d59ee4|34|1 AckFrame[6-0|Δ19] 21.990 loss detection timeout handler running Sending probe 1, because no ack since 21.768. Current RTT: 35/14. 21.990 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 443 millis, based on 22.434/App, because ackElicitingInFlight | RTT:35/14 21.990 -> Packet PA|7|S0|6cf9c9a14ac4b1d59ee4|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 443 millis, based on 22.435/App, because ackElicitingInFlight | RTT:35/14 21.991 -> Packet PA|8|S0|6cf9c9a14ac4b1d59ee4|49|1 StreamFrame[0(CIB),0,17,fin] 22.022 <- (9) Packet A|8|S0|9340e0b0397702ec|1054|1 StreamFrame[0(CIB),0,1024,fin] 22.023 Finished downloading https://server4:443/lfuhpoixdn at 36:28.162 on ClientConnection[80874e47f464e926/9340e0b0397702ec(V1) with server4/193.167.100.100:443] 22.023 Closing ClientConnection[80874e47f464e926/9340e0b0397702ec(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.023 -> Packet A|9|S0|6cf9c9a14ac4b1d59ee4|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-0|Δ0] 22.023 Creating connection with server4:443 with v1 22.024 Setting up connection for downloading https://server4:443/ypkzvidlpo at 36:28.164 on ClientConnection[a1d4eb5ab4500ed4/7355f3e5c0ad6903(V1) with server4/193.167.100.100:443] 22.024 Original destination connection id: a1d4eb5ab4500ed4 (scid: 7355f3e5c0ad6903) >- CryptoStream[I|ClientHello] 22.025 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.225/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.025 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.139 <- (10) Packet A|10|S0|9340e0b0397702ec|1054|1 StreamFrame[0(CIB),0,1024,fin] 22.139 -> Packet A|10|S0|6cf9c9a14ac4b1d59ee4|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-0|Δ0] 22.225 loss detection timeout handler running Sending probe 0, because no ack since 22.025. Current RTT: 100/25. 22.225 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.225 (Probe is an initial retransmit) 22.225 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.625/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.225 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.261 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 22.261 probe count not reset on ack because handshake not yet confirmed 22.262 Retransmitting CryptoFrame[0,257] on level Initial 22.262 Cwnd(-): 6000; inflight: 0 22.262 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.662/Initial, because peerAwaitingAddressValidation | RTT:100/25 22.262 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 22.468/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.262 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 22.261 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 22.264 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 22.470/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.264 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 22.264 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 22.264 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 22.266 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 22.472/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.266 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.267 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.267 Starting downloading https://server4:443/ypkzvidlpo at 36:28.407 on ClientConnection[a1d4eb5ab4500ed4/7355f3e5c0ad6903(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 22.370/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.267 Discarding pn space Initial because first Handshake message is being sent 22.267 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 22.267 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 22.370/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.267 -> Packet A|0|S0|8789c11fc916ad6a4360|49|1 StreamFrame[0(CIB),0,17,fin] 22.295 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 22.369 loss detection timeout handler running Sending probe 0, because no ack since 22.266. Current RTT: 35/17. 22.370 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.370 (Probe is a handshake retransmit) 22.370 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 22.576/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.370 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 22.396 <- (3) Packet H|2|L|47|2 PingFrame[] Padding(2) 22.397 -> Packet H|3|L|50|1 AckFrame[2,0|Δ0] 22.403 <- (4) Packet A|1|S0|7355f3e5c0ad6903|1332|2 PingFrame[] Padding(1305) 22.423 -> Packet A|1|S0|8789c11fc916ad6a4360|34|1 AckFrame[1|Δ19] 22.460 <- (5) Packet A|5|S0|7355f3e5c0ad6903|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|3ced064ff9af16eec2e7|6d35870631dd17b9395789f81a4c7f8e] 22.460 State is set to Confirmed reschedule loss detection timer for PTO over 52 millis, based on 22.513/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -70 millis, based on 22.390/App, because ackElicitingInFlight | RTT:35/17 22.460 Discarding pn space Handshake because HandshakeDone is received 22.460 loss detection timeout handler running Sending probe 0, because no ack since 22.267. Current RTT: 35/17. 22.461 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 22.707/App, because ackElicitingInFlight | RTT:35/17 22.461 -> Packet PA|2|S0|8789c11fc916ad6a4360|49|1 StreamFrame[0(CIB),0,17,fin] 22.480 -> Packet A|3|S0|8789c11fc916ad6a4360|36|1 AckFrame[5,1|Δ19] 22.491 <- (6) Packet A|6|S0|7355f3e5c0ad6903|31|1 AckFrame[2-0|Δ0] 22.492 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.512 <- (7) Packet A|7|S0|7355f3e5c0ad6903|1372|4 PingFrame[] StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,305] Padding(8) -< CryptoStream[A|NewSessionTicket] 22.512 <- (8) Packet A|8|S0|7355f3e5c0ad6903|71|1 NewTokenFrame[ad9a8b8d860100a9fb62d879b58fd5a26ee61bf0d93717bca52b8e616ff8ac681648e211d1e9cb8594606a] 22.513 Finished downloading https://server4:443/ypkzvidlpo at 36:28.653 on ClientConnection[a1d4eb5ab4500ed4/7355f3e5c0ad6903(V1) with server4/193.167.100.100:443] 22.513 Closing ClientConnection[a1d4eb5ab4500ed4/7355f3e5c0ad6903(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.513 -> Packet A|4|S0|8789c11fc916ad6a4360|33|1 AckFrame[8-5|Δ0] 22.513 -> Packet A|5|S0|8789c11fc916ad6a4360|37|2 ConnectionCloseFrame[0|0|] AckFrame[8-5|Δ0] 22.514 Creating connection with server4:443 with v1 22.514 Setting up connection for downloading https://server4:443/upzcgugzig at 36:28.654 on ClientConnection[0cb091bc464548fe/497e7aa4d892a271(V1) with server4/193.167.100.100:443] 22.514 Original destination connection id: 0cb091bc464548fe (scid: 497e7aa4d892a271) >- CryptoStream[I|ClientHello] 22.516 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.716/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.516 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.715 loss detection timeout handler running Sending probe 0, because no ack since 22.516. Current RTT: 100/25. 22.715 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.715 (Probe is an initial retransmit) 22.716 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.116/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.715 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.115 loss detection timeout handler running Sending probe 1, because no ack since 22.715. Current RTT: 100/25. 23.115 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.115 (Probe is an initial retransmit) 23.115 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.915/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.115 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.116 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.916/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.116 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.152 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 23.152 probe count not reset on ack because handshake not yet confirmed 23.152 Retransmitting CryptoFrame[0,257] on level Initial 23.153 Cwnd(-): 6000; inflight: 0 23.153 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.953/Initial, because peerAwaitingAddressValidation | RTT:100/25 23.153 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 411 millis, based on 23.565/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.153 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 23.152 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 23.155 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 23.567/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.155 -> Packet I|5|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 23.155 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 23.155 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 23.157 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 23.569/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.157 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.157 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.260/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.157 Discarding pn space Initial because first Handshake message is being sent 23.157 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 23.158 Starting downloading https://server4:443/upzcgugzig at 36:29.298 on ClientConnection[0cb091bc464548fe/497e7aa4d892a271(V1) with server4/193.167.100.100:443] 23.158 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 23.261/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.158 -> Packet A|0|S0|7c6cac0153c1a47a0aa3|49|1 StreamFrame[0(CIB),0,17,fin] 23.186 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 23.260 loss detection timeout handler running Sending probe 0, because no ack since 23.157. Current RTT: 35/17. 23.260 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.260 (Probe is a handshake retransmit) 23.261 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 23.467/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.261 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 23.279 <- (3) Packet H|3|L|47|2 PingFrame[] Padding(2) 23.280 -> Packet H|3|L|50|1 AckFrame[3,1|Δ0] 23.466 loss detection timeout handler running Sending probe 1, because no ack since 23.158. Current RTT: 35/17. 23.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.466 <- (4) Packet H|4|L|47|2 PingFrame[] Padding(2) 23.466 (Probe is a handshake retransmit) 23.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 23.878/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.466 -> Packet PH|4|L|89|2 AckFrame[4-3,1|Δ0] CryptoFrame[0,36] 23.467 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 23.879/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 23.467 -> Packet PH|5|L|82|1 CryptoFrame[0,36] 23.500 <- (5) Packet A|1|S0|497e7aa4d892a271|1332|2 PingFrame[] Padding(1305) 23.504 <- (6) Packet A|3|S0|497e7aa4d892a271|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100800f6da553b54101a155c67f53fc44e149f14809c3eb3425ca68aac7f160a6c9cb7ddbcb] -< CryptoStream[A|] 23.505 -> Packet A|1|S0|7c6cac0153c1a47a0aa3|36|1 AckFrame[3,1|Δ4] 23.537 <- (7) Packet A|4|S0|497e7aa4d892a271|1372|4 PingFrame[] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a2a70c645ed2bbcc67ee|fe6e043b671162d98bd62e47fd435595] Padding(1314) 23.537 State is set to Confirmed reschedule loss detection timer for PTO over 113 millis, based on 23.650/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -256 millis, based on 23.281/App, because ackElicitingInFlight | RTT:35/17 23.537 Discarding pn space Handshake because HandshakeDone is received 23.537 loss detection timeout handler running Sending probe 0, because no ack since 23.158. Current RTT: 35/17. 23.537 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 23.783/App, because ackElicitingInFlight | RTT:35/17 23.537 -> Packet PA|2|S0|7c6cac0153c1a47a0aa3|49|1 StreamFrame[0(CIB),0,17,fin] 23.543 <- (8) Packet A|5|S0|497e7aa4d892a271|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|NewSessionTicket] 23.543 Finished downloading https://server4:443/upzcgugzig at 36:29.683 on ClientConnection[0cb091bc464548fe/497e7aa4d892a271(V1) with server4/193.167.100.100:443] 23.544 Closing ClientConnection[0cb091bc464548fe/497e7aa4d892a271(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.543 -> Packet A|3|S0|7c6cac0153c1a47a0aa3|36|1 AckFrame[5-3,1|Δ6] 23.544 -> Packet A|4|S0|7c6cac0153c1a47a0aa3|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1|Δ0] 23.544 Creating connection with server4:443 with v1 23.545 Setting up connection for downloading https://server4:443/mfbesxrnxo at 36:29.685 on ClientConnection[3cfc4cc073575e1b/2ef375e3f595c513(V1) with server4/193.167.100.100:443] 23.545 Original destination connection id: 3cfc4cc073575e1b (scid: 2ef375e3f595c513) >- CryptoStream[I|ClientHello] 23.546 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.746/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.546 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.575 <- (9) Packet A|7|S0|497e7aa4d892a271|1422|3 PingFrame[] MaxStreamsFrame[B,17] Padding(1393) 23.575 <- (10) Packet A|8|S0|497e7aa4d892a271|35|2 AckFrame[4-0|Δ0] ConnectionCloseFrame[0|28|] 23.576 -> Packet A|5|S0|7c6cac0153c1a47a0aa3|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1|Δ0] 23.745 loss detection timeout handler running Sending probe 0, because no ack since 23.546. Current RTT: 100/25. 23.745 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.745 (Probe is an initial retransmit) 23.746 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.146/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.745 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.880 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[0|Δ301] CryptoFrame[0,123] 23.880 probe count not reset on ack because handshake not yet confirmed 23.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.280/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 23.880 <- (1) Packet H|1|L|766|1 CryptoFrame[0,718] 23.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.883 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) reschedule loss detection timer for PTO over 1993 millis, based on 25.877/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 23.883 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 23.883 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) >- CryptoStream[H|Finished] 23.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 25.879/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 23.885 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.886 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 996 millis, based on 24.883/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 23.886 Discarding pn space Initial because first Handshake message is being sent 23.886 Starting downloading https://server4:443/mfbesxrnxo at 36:30.025 on ClientConnection[3cfc4cc073575e1b/2ef375e3f595c513(V1) with server4/193.167.100.100:443] 23.886 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 23.886 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 996 millis, based on 24.883/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 23.886 -> Packet A|0|S0|df4cac969a179092082d|49|1 StreamFrame[0(CIB),0,17,fin] 23.972 <- (2) Packet H|2|L|47|2 PingFrame[] Padding(2) 23.973 -> Packet H|2|L|48|1 AckFrame[2-1|Δ0] 24.057 <- (3) Packet H|3|L|47|2 PingFrame[] Padding(2) 24.057 -> Packet H|3|L|48|1 AckFrame[3-1|Δ0] 24.223 <- (4) Packet H|4|L|47|2 PingFrame[] Padding(2) 24.224 -> Packet H|4|L|48|1 AckFrame[4-1|Δ0] 24.299 <- (5) Packet H|5|L|47|2 PingFrame[] Padding(2) 24.300 -> Packet H|5|L|48|1 AckFrame[5-1|Δ0] 24.450 <- (6) Packet H|6|L|47|2 PingFrame[] Padding(2) 24.450 -> Packet H|6|L|48|1 AckFrame[6-1|Δ0] 24.882 loss detection timeout handler running Sending probe 0, because no ack since 23.885. Current RTT: 333/166. 24.882 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.882 (Probe is a handshake retransmit) 24.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 26.877/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 24.883 -> Packet PH|7|L|82|1 CryptoFrame[0,36] 24.915 <- (7) Packet H|9|L|53|1 AckFrame[7-6,4,2-1|Δ0] 24.915 probe count not reset on ack because handshake not yet confirmed 24.916 Retransmitting CryptoFrame[0,36] on level Handshake 24.916 Cwnd(-): 6000; inflight: 49 24.916 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 24.916 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 24.916 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 2189 millis, based on 27.106/Handshake, because ackElicitingInFlight | RTT:295/200 24.916 -> Packet H|8|L|82|1 CryptoFrame[0,36] 24.915 <- (7) Packet A|0|S0|2ef375e3f595c513|1279|4 AckFrame[0|Δ996] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|425a147c885aff217fdb|244cc0d63b45bc64d6cbf2ca46975cad] Padding(1214) reschedule loss detection timer for PTO over 1094 millis, based on 26.011/Handshake, because ackElicitingInFlight | RTT:295/200 24.916 State is set to Confirmed reschedule loss detection timer for PTO over 1699 millis, based on 26.616/Handshake, because ackElicitingInFlight | RTT:384/329 24.916 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.916 Discarding pn space Handshake because HandshakeDone is received 24.918 <- (8) Packet A|2|S0|2ef375e3f595c513|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 24.919 -> Packet A|1|S0|df4cac969a179092082d|36|1 AckFrame[2,0|Δ2] 24.919 Finished downloading https://server4:443/mfbesxrnxo at 36:31.059 on ClientConnection[3cfc4cc073575e1b/2ef375e3f595c513(V1) with server4/193.167.100.100:443] 24.919 Closing ClientConnection[3cfc4cc073575e1b/2ef375e3f595c513(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.919 -> Packet A|2|S0|df4cac969a179092082d|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 24.920 Creating connection with server4:443 with v1 24.920 Setting up connection for downloading https://server4:443/rzwwuuosdk at 36:31.060 on ClientConnection[0fc3621ae8d62991/b94721745c419442(V1) with server4/193.167.100.100:443] 24.920 Original destination connection id: 0fc3621ae8d62991 (scid: b94721745c419442) 24.921 <- (9) Packet A|3|S0|2ef375e3f595c513|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100ca7187f7920cf405b0e3ff21281f6fa3a7a286a7a5671718bcbca508c71ab2702de56f94] 24.921 -> Packet A|3|S0|df4cac969a179092082d|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] >- CryptoStream[I|ClientHello] 24.921 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.121/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.921 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.949 <- (10) Packet A|4|S0|2ef375e3f595c513|29|2 MaxStreamsFrame[B,17] Padding(1) 24.950 -> Packet A|4|S0|df4cac969a179092082d|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 25.121 loss detection timeout handler running Sending probe 0, because no ack since 24.921. Current RTT: 100/25. 25.121 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.121 (Probe is an initial retransmit) 25.121 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.521/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.121 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.520 loss detection timeout handler running Sending probe 1, because no ack since 25.121. Current RTT: 100/25. 25.520 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.520 (Probe is an initial retransmit) 25.521 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.321/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.521 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.522 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.322/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.522 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.558 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 25.558 probe count not reset on ack because handshake not yet confirmed 25.559 Retransmitting CryptoFrame[0,257] on level Initial 25.559 Cwnd(-): 6000; inflight: 0 25.559 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.359/Initial, because peerAwaitingAddressValidation | RTT:100/25 25.559 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 431 millis, based on 25.991/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 25.559 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 25.558 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 25.561 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 25.993/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 25.561 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 25.561 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 25.561 -> Packet I|5|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) >- CryptoStream[H|Finished] 25.563 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 25.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 25.563 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 25.673/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 25.566 Discarding pn space Initial because first Handshake message is being sent 25.566 Starting downloading https://server4:443/rzwwuuosdk at 36:31.705 on ClientConnection[0fc3621ae8d62991/b94721745c419442(V1) with server4/193.167.100.100:443] 25.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 25.674/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 25.566 -> [Packet H|1|L|48|1 AckFrame[1|Δ0], Packet A|0|S0|a88d82ca215c96a6f0c8|49|1 StreamFrame[0(CIB),0,17,fin]] 25.592 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 25.595 <- (3) Packet H|3|L|49|1 AckFrame[0|Δ0] 25.596 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 25.596 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 25.595 <- (3) Packet A|0|S0|b94721745c419442|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4bb66a442470c8bf7dc8|2867c939df67c1a21904077b580bf5a3] Padding(1226) 25.596 State is set to Confirmed reschedule loss detection timer for PTO over 86 millis, based on 25.682/App, because ackElicitingInFlight | RTT:36/15 reschedule loss detection timer for PTO over 86 millis, based on 25.682/App, because ackElicitingInFlight | RTT:36/15 25.596 Discarding pn space Handshake because HandshakeDone is received 25.596 <- (4) Packet A|1|S0|b94721745c419442|1332|2 PingFrame[] Padding(1305) 25.596 -> Packet A|1|S0|a88d82ca215c96a6f0c8|33|1 AckFrame[1-0|Δ0] 25.598 <- (5) Packet A|2|S0|b94721745c419442|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010019ac5b732d1eee69e2e57fecb6dd874b96c1fdd371923259560bed6f2044d015690c379a] -< CryptoStream[A|NewSessionTicket] 25.617 -> Packet A|2|S0|a88d82ca215c96a6f0c8|34|1 AckFrame[2-0|Δ19] 25.628 <- (6) Packet A|3|S0|b94721745c419442|1372|2 PingFrame[] Padding(1345) 25.648 -> Packet A|3|S0|a88d82ca215c96a6f0c8|34|1 AckFrame[3-0|Δ19] 25.680 <- (7) Packet A|4|S0|b94721745c419442|1422|2 PingFrame[] Padding(1395) 25.682 loss detection timeout handler running Sending probe 0, because no ack since 25.566. Current RTT: 36/15. 25.682 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 25.914/App, because ackElicitingInFlight | RTT:36/15 25.682 -> Packet PA|4|S0|a88d82ca215c96a6f0c8|49|1 StreamFrame[0(CIB),0,17,fin] 25.700 -> Packet A|5|S0|a88d82ca215c96a6f0c8|34|1 AckFrame[4-0|Δ19] 25.714 <- (8) Packet A|5|S0|b94721745c419442|1054|1 StreamFrame[0(CIB),0,1024,fin] 25.715 Finished downloading https://server4:443/rzwwuuosdk at 36:31.855 on ClientConnection[0fc3621ae8d62991/b94721745c419442(V1) with server4/193.167.100.100:443] 25.715 Closing ClientConnection[0fc3621ae8d62991/b94721745c419442(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.715 -> Packet A|6|S0|a88d82ca215c96a6f0c8|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-0|Δ0] 25.716 Creating connection with server4:443 with v1 25.716 Setting up connection for downloading https://server4:443/lqpadtxvqk at 36:31.856 on ClientConnection[391f138253d4ffed/0d2c8ab24f4830cb(V1) with server4/193.167.100.100:443] 25.716 Original destination connection id: 391f138253d4ffed (scid: 0d2c8ab24f4830cb) >- CryptoStream[I|ClientHello] 25.718 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.918/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.717 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.732 <- (9) Packet A|6|S0|b94721745c419442|1452|2 PingFrame[] Padding(1425) 25.732 -> Packet A|7|S0|a88d82ca215c96a6f0c8|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-0|Δ0] 25.734 <- (10) Packet A|7|S0|b94721745c419442|32|1 AckFrame[5-1|Δ3] 25.734 -> Packet A|8|S0|a88d82ca215c96a6f0c8|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-0|Δ0] 25.746 <- (11) Packet A|8|S0|b94721745c419442|35|2 AckFrame[6-1|Δ0] ConnectionCloseFrame[0|28|] 25.917 loss detection timeout handler running Sending probe 0, because no ack since 25.717. Current RTT: 100/25. 25.917 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.917 (Probe is an initial retransmit) 25.917 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.317/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.917 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.316 loss detection timeout handler running Sending probe 1, because no ack since 25.917. Current RTT: 100/25. 26.317 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.317 (Probe is an initial retransmit) 26.317 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.117/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.317 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.318 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.118/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.318 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.353 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 26.353 probe count not reset on ack because handshake not yet confirmed 26.354 Retransmitting CryptoFrame[0,257] on level Initial 26.354 Cwnd(-): 6000; inflight: 1200 26.354 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.154/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.354 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 431 millis, based on 26.786/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 26.354 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 26.353 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 26.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 26.788/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 26.356 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 26.356 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 26.357 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 26.359 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 26.791/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 26.358 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.359 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.359 Starting downloading https://server4:443/lqpadtxvqk at 36:32.499 on ClientConnection[391f138253d4ffed/0d2c8ab24f4830cb(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 107 millis, based on 26.467/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 26.359 Discarding pn space Initial because first Handshake message is being sent 26.359 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 26.359 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.359 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 26.467/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 26.359 -> Packet A|0|S0|eb31270995c5c6078193|49|1 StreamFrame[0(CIB),0,17,fin] 26.387 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.392 <- (4) Packet A|1|S0|0d2c8ab24f4830cb|1332|2 PingFrame[] Padding(1305) 26.393 <- (5) Packet A|2|S0|0d2c8ab24f4830cb|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 26.394 -> Packet A|1|S0|eb31270995c5c6078193|34|1 AckFrame[2-1|Δ1] 26.394 Finished downloading https://server4:443/lqpadtxvqk at 36:32.533 on ClientConnection[391f138253d4ffed/0d2c8ab24f4830cb(V1) with server4/193.167.100.100:443] 26.394 Closing ClientConnection[391f138253d4ffed/0d2c8ab24f4830cb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.394 -> Packet A|2|S0|eb31270995c5c6078193|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 26.394 Creating connection with server4:443 with v1 26.394 <- (6) Packet A|3|S0|0d2c8ab24f4830cb|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d86010025de8e55f3a34a35824caf0f769dfa38c2a16880f871ce0eec0611006e17915a3b18d756] 26.395 Setting up connection for downloading https://server4:443/dobgwtjwyy at 36:32.535 on ClientConnection[d3ca009a55aeb421/825f3b20d6f855ef(V1) with server4/193.167.100.100:443] 26.395 Original destination connection id: d3ca009a55aeb421 (scid: 825f3b20d6f855ef) 26.395 -> Packet A|3|S0|eb31270995c5c6078193|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] >- CryptoStream[I|ClientHello] 26.397 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.597/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.396 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.412 <- (7) Packet A|4|S0|0d2c8ab24f4830cb|32|1 AckFrame[0|Δ21] 26.412 -> Packet A|4|S0|eb31270995c5c6078193|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 26.596 loss detection timeout handler running Sending probe 0, because no ack since 26.396. Current RTT: 100/25. 26.596 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.596 (Probe is an initial retransmit) 26.596 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.996/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.596 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.629 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 26.630 probe count not reset on ack because handshake not yet confirmed 26.630 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.030/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 26.629 <- (1) Packet H|1|L|768|1 CryptoFrame[0,720] 26.633 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 26.633 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 26.633 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 26.827/Handshake, because peerAwaitingAddressValidation | RTT:33/16 26.633 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) >- CryptoStream[H|Finished] 26.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 26.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.636 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.636 Starting downloading https://server4:443/dobgwtjwyy at 36:32.776 on ClientConnection[d3ca009a55aeb421/825f3b20d6f855ef(V1) with server4/193.167.100.100:443] 26.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.733/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.637 Discarding pn space Initial because first Handshake message is being sent 26.636 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 26.637 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.637 -> Packet A|0|S0|95b3b151ccaa1e79a544|49|1 StreamFrame[0(CIB),0,17,fin] 26.733 loss detection timeout handler running Sending probe 0, because no ack since 26.636. Current RTT: 33/16. 26.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.733 (Probe is a handshake retransmit) 26.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 26.928/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.733 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 26.766 <- (2) Packet H|3|L|49|1 AckFrame[2|Δ0] 26.766 probe count not reset on ack because handshake not yet confirmed 26.766 Retransmitting CryptoFrame[0,36] on level Handshake 26.766 Cwnd(-): 6000; inflight: 49 26.766 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 26.766 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 26.766 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 161 millis, based on 26.928/Handshake, because ackElicitingInFlight | RTT:33/12 26.766 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[1|Δ0] 26.766 <- (2) Packet A|0|S0|825f3b20d6f855ef|1283|4 AckFrame[0|Δ96] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|18f37a51bbbfafeb2b91|feaf2cc862ce11fd0a83631779af58ff] Padding(1220) reschedule loss detection timer for PTO over 80 millis, based on 26.847/Handshake, because ackElicitingInFlight | RTT:33/12 26.767 State is set to Confirmed reschedule loss detection timer for PTO over 153 millis, based on 26.920/Handshake, because ackElicitingInFlight | RTT:42/28 26.767 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 26.767 Discarding pn space Handshake because HandshakeDone is received 26.767 <- (3) Packet A|1|S0|825f3b20d6f855ef|1332|2 PingFrame[] Padding(1305) 26.767 -> Packet A|1|S0|95b3b151ccaa1e79a544|33|1 AckFrame[1-0|Δ0] 26.771 <- (4) Packet A|3|S0|825f3b20d6f855ef|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601006b4c562f3f68cf3756e76ce20572f65dc15701869a31690c45be328e8923a617898c31f7] -< CryptoStream[A|] 26.791 -> Packet A|2|S0|95b3b151ccaa1e79a544|36|1 AckFrame[3,1-0|Δ19] 26.823 <- (5) Packet A|4|S0|825f3b20d6f855ef|1372|2 PingFrame[] Padding(1345) 26.827 <- (6) Packet A|5|S0|825f3b20d6f855ef|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|NewSessionTicket] 26.828 Finished downloading https://server4:443/dobgwtjwyy at 36:32.967 on ClientConnection[d3ca009a55aeb421/825f3b20d6f855ef(V1) with server4/193.167.100.100:443] 26.828 Closing ClientConnection[d3ca009a55aeb421/825f3b20d6f855ef(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.828 -> Packet A|3|S0|95b3b151ccaa1e79a544|36|1 AckFrame[5-3,1-0|Δ4] 26.828 -> Packet A|4|S0|95b3b151ccaa1e79a544|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1-0|Δ0] 26.828 Creating connection with server4:443 with v1 26.829 Setting up connection for downloading https://server4:443/hswbucshox at 36:32.969 on ClientConnection[0a58a1069c3df5a7/517212a6d9cee286(V1) with server4/193.167.100.100:443] 26.829 Original destination connection id: 0a58a1069c3df5a7 (scid: 517212a6d9cee286) >- CryptoStream[I|ClientHello] 26.830 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.030/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.830 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.860 <- (7) Packet A|6|S0|825f3b20d6f855ef|1422|3 PingFrame[] MaxStreamsFrame[B,17] Padding(1393) 26.860 -> Packet A|5|S0|95b3b151ccaa1e79a544|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1-0|Δ0] 26.980 <- (8) Packet A|7|S0|825f3b20d6f855ef|29|2 MaxStreamsFrame[B,17] Padding(1) 26.981 <- (9) Packet A|8|S0|825f3b20d6f855ef|29|2 PingFrame[] Padding(2) 26.981 -> Packet A|6|S0|95b3b151ccaa1e79a544|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1-0|Δ0] 27.012 <- (10) Packet A|9|S0|825f3b20d6f855ef|37|2 AckFrame[6,3-2|Δ0] ConnectionCloseFrame[0|28|] 27.029 loss detection timeout handler running Sending probe 0, because no ack since 26.830. Current RTT: 100/25. 27.029 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.029 (Probe is an initial retransmit) 27.030 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.430/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.030 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.065 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 27.066 probe count not reset on ack because handshake not yet confirmed 27.066 Retransmitting CryptoFrame[0,257] on level Initial 27.066 Cwnd(-): 6000; inflight: 0 27.066 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.466/Initial, because peerAwaitingAddressValidation | RTT:100/25 27.066 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 27.272/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.066 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 27.065 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 27.068 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 27.274/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.068 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 27.068 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 27.068 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 27.070 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 27.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.070 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.174/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.071 Discarding pn space Initial because first Handshake message is being sent 27.071 Starting downloading https://server4:443/hswbucshox at 36:33.210 on ClientConnection[0a58a1069c3df5a7/517212a6d9cee286(V1) with server4/193.167.100.100:443] 27.071 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 27.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.174/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.071 -> Packet A|0|S0|7510910461fe89c9ff5c|49|1 StreamFrame[0(CIB),0,17,fin] 27.102 <- (2) Packet H|2|L|49|1 AckFrame[0|Δ0] 27.103 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 27.103 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 27.102 <- (2) Packet A|0|S0|517212a6d9cee286|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e9e59cfb34f84c097f70|cf9b55af05f51dc398052897351d9d14] Padding(1226) 27.103 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 27.182/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 27.182/App, because ackElicitingInFlight | RTT:35/14 27.103 Discarding pn space Handshake because HandshakeDone is received 27.105 <- (3) Packet A|2|S0|517212a6d9cee286|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 27.105 Finished downloading https://server4:443/hswbucshox at 36:33.245 on ClientConnection[0a58a1069c3df5a7/517212a6d9cee286(V1) with server4/193.167.100.100:443] 27.105 -> Packet A|1|S0|7510910461fe89c9ff5c|36|1 AckFrame[2,0|Δ2] 27.105 Closing ClientConnection[0a58a1069c3df5a7/517212a6d9cee286(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.106 -> Packet A|2|S0|7510910461fe89c9ff5c|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 27.106 Creating connection with server4:443 with v1 27.106 <- (4) Packet A|3|S0|517212a6d9cee286|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100bef519e620a583b699a4dd1a158401a647c9dfea74785106d444a808b98bb8f49c9fab73] 27.106 -> Packet A|3|S0|7510910461fe89c9ff5c|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 27.107 Setting up connection for downloading https://server4:443/yiboiobdta at 36:33.247 on ClientConnection[bed552cc8aaba4c1/299ebe52091f5a81(V1) with server4/193.167.100.100:443] 27.107 Original destination connection id: bed552cc8aaba4c1 (scid: 299ebe52091f5a81) >- CryptoStream[I|ClientHello] 27.108 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.308/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.108 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.136 <- (5) Packet A|5|S0|517212a6d9cee286|29|2 MaxStreamsFrame[B,17] Padding(1) 27.136 -> Packet A|4|S0|7510910461fe89c9ff5c|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 27.137 <- (6) Packet A|6|S0|517212a6d9cee286|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 27.143 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 27.144 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.344/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.143 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 27.146 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.249/Handshake, because peerAwaitingAddressValidation | RTT:35/17 27.146 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 27.146 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 27.146 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 27.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.251/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.148 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.149 Starting downloading https://server4:443/yiboiobdta at 36:33.289 on ClientConnection[bed552cc8aaba4c1/299ebe52091f5a81(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 27.252/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.149 Discarding pn space Initial because first Handshake message is being sent 27.149 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 27.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.252/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.149 -> Packet A|0|S0|880b21c463dda9c14b3d|49|1 StreamFrame[0(CIB),0,17,fin] 27.240 <- (2) Packet H|1|L|47|2 PingFrame[] Padding(2) 27.240 -> Packet H|2|L|48|1 AckFrame[1-0|Δ0] 27.251 loss detection timeout handler running Sending probe 0, because no ack since 27.148. Current RTT: 35/17. 27.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.251 (Probe is a handshake retransmit) 27.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 27.458/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.252 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 27.284 <- (3) Packet H|2|L|49|1 AckFrame[3-1|Δ0] 27.284 probe count not reset on ack because handshake not yet confirmed 27.284 Retransmitting CryptoFrame[0,36] on level Handshake 27.284 Cwnd(-): 6000; inflight: 49 27.284 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 27.284 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 27.285 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 181 millis, based on 27.466/Handshake, because ackElicitingInFlight | RTT:35/14 27.284 <- (3) Packet A|0|S0|299ebe52091f5a81|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|15e97d3a029d777014ee|599b3d018069e642c5046e33f1debed9] Padding(1226) 27.285 State is set to Confirmed reschedule loss detection timer for PTO over 86 millis, based on 27.371/App, because ackElicitingInFlight | RTT:35/14 27.284 -> Packet H|4|L|82|1 CryptoFrame[0,36] reschedule loss detection timer for PTO over -24 millis, based on 27.260/App, because ackElicitingInFlight | RTT:35/14 27.285 Discarding pn space Handshake because HandshakeDone is received 27.285 loss detection timeout handler running Sending probe 0, because no ack since 27.149. Current RTT: 35/14. 27.285 (Probe is retransmit on level App) 27.285 <- (4) Packet A|1|S0|299ebe52091f5a81|1332|2 PingFrame[] Padding(1305) reschedule loss detection timer for PTO over 221 millis, based on 27.507/App, because ackElicitingInFlight | RTT:35/14 27.285 <- (5) Packet A|2|S0|299ebe52091f5a81|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d8601008663ed9dc305ff663cc6155ba8bf6169e33cb788fabfdc42a71dc5e90bf6c4fb192388bf] 27.285 -> Packet PA|1|S0|880b21c463dda9c14b3d|49|1 StreamFrame[0(CIB),0,17,fin] 27.286 -> Packet A|2|S0|880b21c463dda9c14b3d|33|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 27.305 -> Packet A|3|S0|880b21c463dda9c14b3d|34|1 AckFrame[2-0|Δ19] 27.318 <- (6) Packet A|3|S0|299ebe52091f5a81|1372|2 PingFrame[] Padding(1345) 27.337 -> Packet A|4|S0|880b21c463dda9c14b3d|34|1 AckFrame[3-0|Δ19] 27.471 <- (7) Packet A|5|S0|299ebe52091f5a81|29|2 PingFrame[] Padding(2) 27.471 <- (8) Packet A|6|S0|299ebe52091f5a81|29|2 PingFrame[] Padding(2) 27.472 -> Packet A|5|S0|880b21c463dda9c14b3d|35|1 AckFrame[6-5,3-0|Δ0] 27.506 loss detection timeout handler running Sending probe 1, because no ack since 27.285. Current RTT: 35/14. 27.507 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 443 millis, based on 27.951/App, because ackElicitingInFlight | RTT:35/14 27.507 -> Packet PA|6|S0|880b21c463dda9c14b3d|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 443 millis, based on 27.952/App, because ackElicitingInFlight | RTT:35/14 27.508 -> Packet PA|7|S0|880b21c463dda9c14b3d|49|1 StreamFrame[0(CIB),0,17,fin] 27.538 <- (9) Packet A|7|S0|299ebe52091f5a81|35|1 AckFrame[6,4,2|Δ0] 27.538 Cwnd(-): 3000; inflight: 49 27.538 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 80 millis, based on 27.619/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 101 millis, based on 27.640/App, because ackElicitingInFlight | RTT:34/12 27.538 -> Packet A|8|S0|880b21c463dda9c14b3d|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6-5|Δ0] 27.539 <- (10) Packet A|8|S0|299ebe52091f5a81|1054|1 StreamFrame[0(CIB),0,1024,fin] 27.539 Finished downloading https://server4:443/yiboiobdta at 36:33.679 on ClientConnection[bed552cc8aaba4c1/299ebe52091f5a81(V1) with server4/193.167.100.100:443] 27.539 Closing ClientConnection[bed552cc8aaba4c1/299ebe52091f5a81(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.540 -> Packet A|9|S0|880b21c463dda9c14b3d|37|2 ConnectionCloseFrame[0|0|] AckFrame[8-5|Δ0] 27.540 Creating connection with server4:443 with v1 27.540 Setting up connection for downloading https://server4:443/szxcwoiath at 36:33.680 on ClientConnection[31918f2944137c0f/59038775aaa6d355(V1) with server4/193.167.100.100:443] 27.540 Original destination connection id: 31918f2944137c0f (scid: 59038775aaa6d355) >- CryptoStream[I|ClientHello] 27.542 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.742/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.542 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.732 <- (11) Packet A|11|S0|299ebe52091f5a81|29|2 PingFrame[] Padding(2) 27.733 -> Packet A|10|S0|880b21c463dda9c14b3d|37|2 ConnectionCloseFrame[0|0|] AckFrame[8-5|Δ0] 27.741 loss detection timeout handler running Sending probe 0, because no ack since 27.542. Current RTT: 100/25. 27.741 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.741 (Probe is an initial retransmit) 27.741 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.141/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.741 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.140 loss detection timeout handler running Sending probe 1, because no ack since 27.741. Current RTT: 100/25. 28.140 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.141 (Probe is an initial retransmit) 28.141 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.941/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.141 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.142 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.942/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.142 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.175 <- (1) Packet I|3|L|179|2 Token=[] AckFrame[3-2,0|Δ0] CryptoFrame[0,123] 28.175 probe count not reset on ack because handshake not yet confirmed 28.176 Cwnd(-): 6000; inflight: 0 28.176 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.976/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 28.175 <- (1) Packet H|3|L|766|1 CryptoFrame[0,718] 28.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 28.562/Handshake, because peerAwaitingAddressValidation | RTT:32/16 28.178 -> Packet I|4|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1151) 28.178 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 28.178 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 28.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 28.564/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.180 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 28.277/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.181 -> Packet H|1|L|48|1 AckFrame[3|Δ0] 28.181 Starting downloading https://server4:443/szxcwoiath at 36:34.320 on ClientConnection[31918f2944137c0f/59038775aaa6d355(V1) with server4/193.167.100.100:443] 28.181 Discarding pn space Initial because first Handshake message is being sent 28.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 28.277/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.181 -> Packet A|0|S0|6cdc1ee81522446bfa78|49|1 StreamFrame[0(CIB),0,17,fin] 28.212 <- (2) Packet H|4|L|49|1 AckFrame[0|Δ0] 28.213 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 28.213 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 28.212 <- (2) Packet A|0|S0|59038775aaa6d355|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|fb02647b1868b17837f8|5f4c19d56371ad8efcc3b85a7b762bb1] Padding(1226) 28.213 State is set to Confirmed reschedule loss detection timer for PTO over 67 millis, based on 28.281/App, because ackElicitingInFlight | RTT:32/12 reschedule loss detection timer for PTO over 67 millis, based on 28.281/App, because ackElicitingInFlight | RTT:32/12 28.213 Discarding pn space Handshake because HandshakeDone is received 28.216 <- (3) Packet A|1|S0|59038775aaa6d355|1332|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,273] -< CryptoStream[A|] 28.217 -> Packet A|1|S0|6cdc1ee81522446bfa78|34|1 AckFrame[1-0|Δ3] 28.217 Finished downloading https://server4:443/szxcwoiath at 36:34.357 on ClientConnection[31918f2944137c0f/59038775aaa6d355(V1) with server4/193.167.100.100:443] 28.217 Closing ClientConnection[31918f2944137c0f/59038775aaa6d355(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.217 -> Packet A|2|S0|6cdc1ee81522446bfa78|37|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 28.218 Creating connection with server4:443 with v1 28.218 Setting up connection for downloading https://server4:443/zlgdpiolnd at 36:34.358 on ClientConnection[5c6f80631607edfb/a887c32dabd1e703(V1) with server4/193.167.100.100:443] 28.218 Original destination connection id: 5c6f80631607edfb (scid: a887c32dabd1e703) >- CryptoStream[I|ClientHello] 28.219 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.420/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.219 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.233 <- (4) Packet A|2|S0|59038775aaa6d355|32|1 AckFrame[0|Δ21] 28.234 -> Packet A|3|S0|6cdc1ee81522446bfa78|37|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 28.249 <- (5) Packet A|3|S0|59038775aaa6d355|1372|5 PingFrame[] MaxStreamsFrame[B,17] CryptoFrame[273,32] NewTokenFrame[ad9a8b8d860100f4973565f15ce0f39d20756ea4ce404d69186a6a87a9d6705df145b2b4773418a70cca46] Padding(1262) 28.249 <- (6) Packet A|4|S0|59038775aaa6d355|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 28.249 -> Packet A|4|S0|6cdc1ee81522446bfa78|37|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 28.419 loss detection timeout handler running Sending probe 0, because no ack since 28.219. Current RTT: 100/25. 28.419 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.419 (Probe is an initial retransmit) 28.419 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.819/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.419 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.455 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 28.455 probe count not reset on ack because handshake not yet confirmed 28.455 Retransmitting CryptoFrame[0,257] on level Initial 28.456 Cwnd(-): 6000; inflight: 0 28.456 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.856/Initial, because peerAwaitingAddressValidation | RTT:100/25 28.456 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 28.662/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.456 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 28.455 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 28.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 28.664/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.458 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 28.458 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 28.458 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 28.461 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 28.667/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.461 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.461 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 28.564/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.461 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 28.461 Starting downloading https://server4:443/zlgdpiolnd at 36:34.601 on ClientConnection[5c6f80631607edfb/a887c32dabd1e703(V1) with server4/193.167.100.100:443] 28.461 Discarding pn space Initial because first Handshake message is being sent 28.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 28.565/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.462 -> Packet A|0|S0|f557054917260751a0f9|49|1 StreamFrame[0(CIB),0,17,fin] 28.493 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 28.494 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 28.494 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 28.493 <- (2) Packet A|0|S0|a887c32dabd1e703|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|6aa0922d3cd082270623|f7cd67de822cb2ecc36d1c389e803743] Padding(1226) 28.494 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 28.573/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 28.573/App, because ackElicitingInFlight | RTT:35/14 28.494 Discarding pn space Handshake because HandshakeDone is received 28.494 <- (3) Packet A|1|S0|a887c32dabd1e703|1332|2 PingFrame[] Padding(1305) 28.494 -> Packet A|1|S0|f557054917260751a0f9|33|1 AckFrame[1-0|Δ0] 28.496 <- (4) Packet A|2|S0|a887c32dabd1e703|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100057bf72b6116bb6da26bf574f6c14507d145c9210fd003b8da932e5863f8607a6f9bb267] -< CryptoStream[A|NewSessionTicket] 28.515 -> Packet A|2|S0|f557054917260751a0f9|34|1 AckFrame[2-0|Δ19] 28.572 loss detection timeout handler running Sending probe 0, because no ack since 28.462. Current RTT: 35/14. 28.572 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 28.794/App, because ackElicitingInFlight | RTT:35/14 28.572 -> Packet PA|3|S0|f557054917260751a0f9|49|1 StreamFrame[0(CIB),0,17,fin] 28.654 <- (5) Packet A|4|S0|a887c32dabd1e703|29|2 PingFrame[] Padding(2) 28.655 <- (6) Packet A|5|S0|a887c32dabd1e703|29|2 PingFrame[] Padding(2) 28.655 -> Packet A|4|S0|f557054917260751a0f9|35|1 AckFrame[5-4,2-0|Δ0] 28.687 <- (7) Packet A|6|S0|a887c32dabd1e703|1372|2 PingFrame[] Padding(1345) 28.706 -> Packet A|5|S0|f557054917260751a0f9|36|1 AckFrame[6-4,2-0|Δ19] 28.738 <- (8) Packet A|7|S0|a887c32dabd1e703|1422|2 PingFrame[] Padding(1395) 28.758 -> Packet A|6|S0|f557054917260751a0f9|36|1 AckFrame[7-4,2-0|Δ19] 28.794 loss detection timeout handler running Sending probe 1, because no ack since 28.572. Current RTT: 35/14. 28.794 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 443 millis, based on 29.238/App, because ackElicitingInFlight | RTT:35/14 28.794 -> Packet PA|7|S0|f557054917260751a0f9|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 443 millis, based on 29.239/App, because ackElicitingInFlight | RTT:35/14 28.795 -> Packet PA|8|S0|f557054917260751a0f9|49|1 StreamFrame[0(CIB),0,17,fin] 28.825 <- (9) Packet A|8|S0|a887c32dabd1e703|35|1 AckFrame[7,5-4,2-1|Δ0] 28.826 Cwnd(-): 3000; inflight: 49 28.826 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 80 millis, based on 28.906/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 102 millis, based on 28.929/App, because ackElicitingInFlight | RTT:35/12 28.826 -> Packet A|9|S0|f557054917260751a0f9|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7|Δ0] 28.847 <- (10) Packet A|10|S0|a887c32dabd1e703|36|1 AckFrame[8-7,5-4,2-1|Δ21] reschedule loss detection timer for PTO over 81 millis, based on 28.929/App, because ackElicitingInFlight | RTT:35/12 28.858 <- (11) Packet A|11|S0|a887c32dabd1e703|1452|2 PingFrame[] Padding(1425) 28.877 -> Packet A|10|S0|f557054917260751a0f9|36|1 AckFrame[11-10,8-7|Δ19] 28.878 <- (12) Packet A|12|S0|a887c32dabd1e703|36|1 AckFrame[9-7,5-4,2-1|Δ21] 28.878 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.087 <- (13) Packet A|15|S0|a887c32dabd1e703|29|2 PingFrame[] Padding(2) 29.107 -> Packet A|11|S0|f557054917260751a0f9|38|1 AckFrame[15,12-10,8|Δ19] 29.139 <- (14) Packet A|16|S0|a887c32dabd1e703|1054|1 StreamFrame[0(CIB),0,1024,fin] 29.139 Finished downloading https://server4:443/zlgdpiolnd at 36:35.279 on ClientConnection[5c6f80631607edfb/a887c32dabd1e703(V1) with server4/193.167.100.100:443] 29.139 Closing ClientConnection[5c6f80631607edfb/a887c32dabd1e703(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.140 Creating connection with server4:443 with v1 29.140 -> Packet A|12|S0|f557054917260751a0f9|41|2 ConnectionCloseFrame[0|0|] AckFrame[16-15,12-10,8|Δ0] 29.141 Setting up connection for downloading https://server4:443/sbitciqoyp at 36:35.281 on ClientConnection[b61dec217ba49cf2/529b4f9d609d1c4f(V1) with server4/193.167.100.100:443] 29.141 Original destination connection id: b61dec217ba49cf2 (scid: 529b4f9d609d1c4f) >- CryptoStream[I|ClientHello] 29.142 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.342/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.142 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.171 <- (15) Packet A|17|S0|a887c32dabd1e703|35|2 AckFrame[12-7|Δ0] ConnectionCloseFrame[0|28|] 29.341 loss detection timeout handler running Sending probe 0, because no ack since 29.142. Current RTT: 100/25. 29.342 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.342 (Probe is an initial retransmit) 29.342 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.742/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.342 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.375 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 29.375 probe count not reset on ack because handshake not yet confirmed 29.376 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.776/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 29.375 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 29.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 29.572/Handshake, because peerAwaitingAddressValidation | RTT:33/16 29.378 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 29.378 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 29.378 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 29.380 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 29.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 29.380 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.380 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.380 Starting downloading https://server4:443/sbitciqoyp at 36:35.520 on ClientConnection[b61dec217ba49cf2/529b4f9d609d1c4f(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 29.477/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 29.380 Discarding pn space Initial because first Handshake message is being sent 29.380 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 29.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 29.478/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 29.381 -> Packet A|0|S0|dae463cd724168ce51af|49|1 StreamFrame[0(CIB),0,17,fin] 29.413 <- (2) Packet A|1|S0|529b4f9d609d1c4f|1332|2 PingFrame[] Padding(1305) 29.425 <- (3) Packet A|2|S0|529b4f9d609d1c4f|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100177ba62c3bb1e91c0a41258d8c3a54118e8f9ab8e2d22989e24236bd9f80fb191b44805a] -< CryptoStream[A|NewSessionTicket] 29.425 -> Packet A|1|S0|dae463cd724168ce51af|34|1 AckFrame[2-1|Δ11] 29.477 loss detection timeout handler running Sending probe 0, because no ack since 29.380. Current RTT: 33/16. 29.477 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.477 (Probe is a handshake retransmit) 29.477 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 29.671/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 29.477 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 29.671 loss detection timeout handler running Sending probe 1, because no ack since 29.381. Current RTT: 33/16. 29.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.671 (Probe is a handshake retransmit) 29.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 30.059/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 29.671 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 29.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 30.060/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 29.672 -> Packet PH|4|L|82|1 CryptoFrame[0,36] 30.059 loss detection timeout handler running Sending probe 2, because no ack since 29.381. Current RTT: 33/16. 30.059 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.059 (Probe is a handshake retransmit) 30.060 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 30.836/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.059 -> Packet PH|5|L|82|1 CryptoFrame[0,36] 30.061 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 30.837/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.061 -> Packet PH|6|L|82|1 CryptoFrame[0,36] 30.448 <- (4) Packet A|5|S0|529b4f9d609d1c4f|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|d941d08b63a16344b1ba|b8721ae2dd5a85bff90268bfd4264f65] 30.448 State is set to Confirmed reschedule loss detection timer for PTO over -131 millis, based on 30.317/App, because ackElicitingInFlight | RTT:33/16 30.449 loss detection timeout handler running Sending probe 3, because no ack since 29.381. Current RTT: 33/16. reschedule loss detection timer for PTO over -950 millis, based on 29.498/App, because ackElicitingInFlight | RTT:33/16 30.449 Discarding pn space Handshake because HandshakeDone is received 30.449 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 233 millis, based on 30.683/App, because ackElicitingInFlight | RTT:33/16 30.449 -> Packet PA|2|S0|dae463cd724168ce51af|49|1 StreamFrame[0(CIB),0,17,fin] 30.468 -> Packet A|3|S0|dae463cd724168ce51af|36|1 AckFrame[5,2-1|Δ19] 30.481 <- (5) Packet A|7|S0|529b4f9d609d1c4f|1054|1 StreamFrame[0(CIB),0,1024,fin] 30.482 Finished downloading https://server4:443/sbitciqoyp at 36:36.621 on ClientConnection[b61dec217ba49cf2/529b4f9d609d1c4f(V1) with server4/193.167.100.100:443] 30.482 Closing ClientConnection[b61dec217ba49cf2/529b4f9d609d1c4f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.482 -> Packet A|4|S0|dae463cd724168ce51af|41|2 ConnectionCloseFrame[0|0|] AckFrame[7,5,2-1|Δ0] 30.482 Creating connection with server4:443 with v1 30.483 Setting up connection for downloading https://server4:443/qrewxwedql at 36:36.623 on ClientConnection[43a007f6c7cef54c/e59ef81f00ae2c08(V1) with server4/193.167.100.100:443] 30.483 Original destination connection id: 43a007f6c7cef54c (scid: e59ef81f00ae2c08) >- CryptoStream[I|ClientHello] 30.485 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.685/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.484 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.501 <- (6) Packet A|9|S0|529b4f9d609d1c4f|32|1 AckFrame[3-1|Δ2] 30.502 -> Packet A|5|S0|dae463cd724168ce51af|41|2 ConnectionCloseFrame[0|0|] AckFrame[7,5,2-1|Δ0] 30.513 <- (7) Packet A|10|S0|529b4f9d609d1c4f|35|2 AckFrame[4-1|Δ0] ConnectionCloseFrame[0|28|] 30.684 loss detection timeout handler running Sending probe 0, because no ack since 30.484. Current RTT: 100/25. 30.684 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.684 (Probe is an initial retransmit) 30.685 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.085/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.684 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.018 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[1|Δ300] CryptoFrame[0,123] 31.019 probe count not reset on ack because handshake not yet confirmed 31.019 Retransmitting CryptoFrame[0,257] on level Initial 31.019 Cwnd(-): 6000; inflight: 0 31.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.419/Initial, because peerAwaitingAddressValidation | RTT:100/25 31.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1993 millis, based on 33.013/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 31.019 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 31.018 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 31.021 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 33.015/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 31.021 -> Packet I|3|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 31.021 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 31.021 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 31.024 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 33.018/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 31.024 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.024 Starting downloading https://server4:443/qrewxwedql at 36:37.164 on ClientConnection[43a007f6c7cef54c/e59ef81f00ae2c08(V1) with server4/193.167.100.100:443] 31.024 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 31.024 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 996 millis, based on 32.021/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 31.024 Discarding pn space Initial because first Handshake message is being sent 31.025 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 996 millis, based on 32.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 31.025 -> Packet A|0|S0|6cd470e36a528887587d|49|1 StreamFrame[0(CIB),0,17,fin] 31.052 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 31.053 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 31.056 <- (4) Packet H|3|L|49|1 AckFrame[0|Δ0] 31.056 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 31.056 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 31.056 <- (4) Packet A|0|S0|e59ef81f00ae2c08|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b2c4767ef58535d4b04b|531ca876ae6614e61d03934983c022cb] Padding(1226) 31.057 State is set to Confirmed reschedule loss detection timer for PTO over 1083 millis, based on 32.140/App, because ackElicitingInFlight | RTT:295/200 reschedule loss detection timer for PTO over 1083 millis, based on 32.140/App, because ackElicitingInFlight | RTT:295/200 31.057 Discarding pn space Handshake because HandshakeDone is received 31.057 <- (5) Packet A|1|S0|e59ef81f00ae2c08|1332|2 PingFrame[] Padding(1305) 31.057 -> Packet A|1|S0|6cd470e36a528887587d|33|1 AckFrame[1-0|Δ0] 31.059 <- (6) Packet A|2|S0|e59ef81f00ae2c08|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 31.059 Finished downloading https://server4:443/qrewxwedql at 36:37.199 on ClientConnection[43a007f6c7cef54c/e59ef81f00ae2c08(V1) with server4/193.167.100.100:443] 31.059 Closing ClientConnection[43a007f6c7cef54c/e59ef81f00ae2c08(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.060 -> Packet A|2|S0|6cd470e36a528887587d|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 31.060 Creating connection with server4:443 with v1 31.060 Setting up connection for downloading https://server4:443/ipjryiojus at 36:37.200 on ClientConnection[b62b84b6c9850c26/cf431ab764411dd5(V1) with server4/193.167.100.100:443] 31.060 Original destination connection id: b62b84b6c9850c26 (scid: cf431ab764411dd5) 31.061 <- (7) Packet A|3|S0|e59ef81f00ae2c08|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100d6cf7cf78cbd10aead6d34217c466f8e82766c9d466589d61286ff5fe1f6a8872fc3d099] 31.061 -> Packet A|3|S0|6cd470e36a528887587d|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] >- CryptoStream[I|ClientHello] 31.062 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.262/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.062 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.090 <- (8) Packet A|6|S0|e59ef81f00ae2c08|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 31.097 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 31.098 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.298/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 31.097 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 31.100 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 31.203/Handshake, because peerAwaitingAddressValidation | RTT:35/17 31.100 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 31.100 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 31.100 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 31.102 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 31.205/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 31.102 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.103 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 31.206/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 31.103 Starting downloading https://server4:443/ipjryiojus at 36:37.242 on ClientConnection[b62b84b6c9850c26/cf431ab764411dd5(V1) with server4/193.167.100.100:443] 31.103 Discarding pn space Initial because first Handshake message is being sent 31.103 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 31.103 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 31.206/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 31.103 -> Packet A|0|S0|0fb0549324a32ad8df19|49|1 StreamFrame[0(CIB),0,17,fin] 31.194 <- (2) Packet H|1|L|47|2 PingFrame[] Padding(2) 31.194 -> Packet H|2|L|48|1 AckFrame[1-0|Δ0] 31.205 loss detection timeout handler running Sending probe 0, because no ack since 31.102. Current RTT: 35/17. 31.205 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.205 (Probe is a handshake retransmit) 31.205 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 31.411/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 31.205 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 31.239 <- (3) Packet A|1|S0|cf431ab764411dd5|1332|2 PingFrame[] Padding(1305) 31.240 <- (4) Packet A|2|S0|cf431ab764411dd5|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 31.240 -> Packet A|1|S0|0fb0549324a32ad8df19|33|1 AckFrame[2-1|Δ0] 31.240 Finished downloading https://server4:443/ipjryiojus at 36:37.380 on ClientConnection[b62b84b6c9850c26/cf431ab764411dd5(V1) with server4/193.167.100.100:443] 31.240 Closing ClientConnection[b62b84b6c9850c26/cf431ab764411dd5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.241 -> Packet A|2|S0|0fb0549324a32ad8df19|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 31.241 Creating connection with server4:443 with v1 31.241 <- (5) Packet A|3|S0|cf431ab764411dd5|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100c3ec280ca5fc75bf24050516bfed1c179c7ea4e935a3af7def87b46cb9db959c0c295ae1] 31.242 -> Packet A|3|S0|0fb0549324a32ad8df19|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 31.242 Setting up connection for downloading https://server4:443/eygtvnnatk at 36:37.382 on ClientConnection[264d057982bd789f/80ffe6d466894635(V1) with server4/193.167.100.100:443] 31.242 Original destination connection id: 264d057982bd789f (scid: 80ffe6d466894635) >- CryptoStream[I|ClientHello] 31.243 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.443/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.243 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.272 <- (6) Packet A|5|S0|cf431ab764411dd5|37|2 AckFrame[3,1-0|Δ0] ConnectionCloseFrame[0|28|] 31.442 loss detection timeout handler running Sending probe 0, because no ack since 31.243. Current RTT: 100/25. 31.442 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 31.443 (Probe is an initial retransmit) 31.443 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.843/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.443 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.476 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 31.476 probe count not reset on ack because handshake not yet confirmed 31.476 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.876/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 31.476 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 31.479 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 31.671/Handshake, because peerAwaitingAddressValidation | RTT:32/16 31.479 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 31.479 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 31.479 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) >- CryptoStream[H|Finished] 31.481 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 31.674/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 31.481 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.482 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.482 Starting downloading https://server4:443/eygtvnnatk at 36:37.622 on ClientConnection[264d057982bd789f/80ffe6d466894635(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 31.578/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 31.482 Discarding pn space Initial because first Handshake message is being sent 31.482 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 31.482 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 31.578/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 31.482 -> Packet A|0|S0|7bc073bad0c399ceae59|49|1 StreamFrame[0(CIB),0,17,fin] 31.569 <- (2) Packet H|2|L|47|2 PingFrame[] Padding(2) 31.570 -> Packet H|2|L|48|1 AckFrame[2-1|Δ0] 31.577 loss detection timeout handler running Sending probe 0, because no ack since 31.481. Current RTT: 32/16. 31.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.578 (Probe is a handshake retransmit) 31.578 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 31.770/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 31.578 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 31.756 <- (3) Packet H|3|L|47|2 PingFrame[] Padding(2) 31.757 -> Packet H|4|L|48|1 AckFrame[3-1|Δ0] 31.769 loss detection timeout handler running Sending probe 1, because no ack since 31.482. Current RTT: 32/16. 31.769 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.769 (Probe is a handshake retransmit) 31.769 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 32.153/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 31.769 -> Packet PH|5|L|82|1 CryptoFrame[0,36] 31.770 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 32.154/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 31.770 -> Packet PH|6|L|82|1 CryptoFrame[0,36] 31.803 <- (4) Packet A|1|S0|80ffe6d466894635|1332|2 PingFrame[] Padding(1305) 31.823 -> Packet A|1|S0|7bc073bad0c399ceae59|34|1 AckFrame[1|Δ19] 31.954 <- (5) Packet A|4|S0|80ffe6d466894635|411|4 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f284cf80a0e3bc741698|fef8c1708cc62bfe8aebfc90bb00ee87] CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010056bfe86e1caf827cfc4ea8ad5797f684630babd1d0572be14e9ba2696b6ad7238a51db59] 31.955 State is set to Confirmed reschedule loss detection timer for PTO over -8 millis, based on 31.946/App, because ackElicitingInFlight | RTT:32/16 31.955 loss detection timeout handler running Sending probe 2, because no ack since 31.482. Current RTT: 32/16. reschedule loss detection timer for PTO over -356 millis, based on 31.598/App, because ackElicitingInFlight | RTT:32/16 31.955 Discarding pn space Handshake because HandshakeDone is received 31.955 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 32.187/App, because ackElicitingInFlight | RTT:32/16 -< CryptoStream[A|NewSessionTicket] 31.955 -> Packet PA|2|S0|7bc073bad0c399ceae59|49|1 StreamFrame[0(CIB),0,17,fin] 31.954 <- (6) Packet A|5|S0|80ffe6d466894635|29|2 PingFrame[] Padding(2) 31.956 -> Packet A|3|S0|7bc073bad0c399ceae59|35|1 AckFrame[5-4,1|Δ0] 31.987 <- (7) Packet A|6|S0|80ffe6d466894635|1054|1 StreamFrame[0(CIB),0,1024,fin] 31.988 Finished downloading https://server4:443/eygtvnnatk at 36:38.128 on ClientConnection[264d057982bd789f/80ffe6d466894635(V1) with server4/193.167.100.100:443] 31.988 Closing ClientConnection[264d057982bd789f/80ffe6d466894635(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.988 -> Packet A|4|S0|7bc073bad0c399ceae59|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,1|Δ0] 31.989 Creating connection with server4:443 with v1 31.989 Setting up connection for downloading https://server4:443/vacigwybnn at 36:38.129 on ClientConnection[64f1a56d0fee6ff1/666b601df0e86ccf(V1) with server4/193.167.100.100:443] 31.989 Original destination connection id: 64f1a56d0fee6ff1 (scid: 666b601df0e86ccf) >- CryptoStream[I|ClientHello] 31.990 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.190/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.990 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.026 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 32.026 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.226/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 32.026 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 32.029 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.029 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 32.029 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) reschedule loss detection timer for PTO over 102 millis, based on 32.132/Handshake, because peerAwaitingAddressValidation | RTT:35/17 32.028 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 32.031 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.134/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.031 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.031 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.031 Starting downloading https://server4:443/vacigwybnn at 36:38.171 on ClientConnection[64f1a56d0fee6ff1/666b601df0e86ccf(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 32.134/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.031 Discarding pn space Initial because first Handshake message is being sent 32.031 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 32.031 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.134/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.031 -> Packet A|0|S0|890b24781e32578ac393|49|1 StreamFrame[0(CIB),0,17,fin] 32.064 <- (2) Packet A|1|S0|666b601df0e86ccf|1332|2 PingFrame[] Padding(1305) 32.065 <- (3) Packet A|2|S0|666b601df0e86ccf|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 32.066 -> Packet A|1|S0|890b24781e32578ac393|34|1 AckFrame[2-1|Δ1] 32.066 Finished downloading https://server4:443/vacigwybnn at 36:38.206 on ClientConnection[64f1a56d0fee6ff1/666b601df0e86ccf(V1) with server4/193.167.100.100:443] 32.066 Closing ClientConnection[64f1a56d0fee6ff1/666b601df0e86ccf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.066 -> Packet A|2|S0|890b24781e32578ac393|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 32.066 Creating connection with server4:443 with v1 32.067 Setting up connection for downloading https://server4:443/zjlifxzfso at 36:38.207 on ClientConnection[718bb4dd9bf371ea/68fa06b7d3979f34(V1) with server4/193.167.100.100:443] 32.067 Original destination connection id: 718bb4dd9bf371ea (scid: 68fa06b7d3979f34) >- CryptoStream[I|ClientHello] 32.068 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.268/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.068 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.098 <- (4) Packet A|6|S0|666b601df0e86ccf|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 32.186 <- (8) Packet A|8|S0|80ffe6d466894635|1332|4 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f284cf80a0e3bc741698|fef8c1708cc62bfe8aebfc90bb00ee87] StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,243] 32.186 <- (9) Packet A|9|S0|80ffe6d466894635|137|2 CryptoFrame[243,62] NewTokenFrame[ad9a8b8d86010056bfe86e1caf827cfc4ea8ad5797f684630babd1d0572be14e9ba2696b6ad7238a51db59] 32.187 -> Packet A|5|S0|7bc073bad0c399ceae59|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,1|Δ0] 32.187 -> Packet A|6|S0|7bc073bad0c399ceae59|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,1|Δ0] 32.218 <- (10) Packet A|10|S0|80ffe6d466894635|37|2 AckFrame[5,2-1|Δ0] ConnectionCloseFrame[0|28|] 32.268 loss detection timeout handler running Sending probe 0, because no ack since 32.068. Current RTT: 100/25. 32.268 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.268 (Probe is an initial retransmit) 32.268 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.668/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.268 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.301 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 32.301 probe count not reset on ack because handshake not yet confirmed 32.302 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.702/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 32.301 <- (1) Packet H|1|L|766|1 CryptoFrame[0,718] 32.304 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 32.496/Handshake, because peerAwaitingAddressValidation | RTT:32/16 32.304 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 32.304 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 32.304 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 32.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 32.498/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 32.306 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.306 Starting downloading https://server4:443/zjlifxzfso at 36:38.446 on ClientConnection[718bb4dd9bf371ea/68fa06b7d3979f34(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 32.402/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 32.307 Discarding pn space Initial because first Handshake message is being sent 32.306 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 32.307 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 32.403/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 32.307 -> Packet A|0|S0|020e9df0c5fa068448ee|49|1 StreamFrame[0(CIB),0,17,fin] 32.336 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 32.338 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 32.338 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 32.338 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 32.338 <- (3) Packet A|0|S0|68fa06b7d3979f34|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0c502a3f047f7f980ca6|f0e2501aacd39e95e483bffa2565bef7] Padding(1226) 32.339 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 32.407/App, because ackElicitingInFlight | RTT:32/12 reschedule loss detection timer for PTO over 68 millis, based on 32.407/App, because ackElicitingInFlight | RTT:32/12 32.339 Discarding pn space Handshake because HandshakeDone is received 32.339 <- (4) Packet A|1|S0|68fa06b7d3979f34|1332|2 PingFrame[] Padding(1305) 32.339 -> Packet A|1|S0|020e9df0c5fa068448ee|33|1 AckFrame[1-0|Δ0] 32.342 <- (5) Packet A|2|S0|68fa06b7d3979f34|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 32.342 Finished downloading https://server4:443/zjlifxzfso at 36:38.482 on ClientConnection[718bb4dd9bf371ea/68fa06b7d3979f34(V1) with server4/193.167.100.100:443] 32.342 Closing ClientConnection[718bb4dd9bf371ea/68fa06b7d3979f34(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.343 -> Packet A|2|S0|020e9df0c5fa068448ee|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 32.343 Creating connection with server4:443 with v1 32.343 <- (6) Packet A|3|S0|68fa06b7d3979f34|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100f6cb1bfe6cc5679c66a249ebd6dbcff6aaf9b88b48921fb14582767863064e343acb458f] 32.343 Setting up connection for downloading https://server4:443/fzaqcvvxzp at 36:38.483 on ClientConnection[2110f8b7fd3dfa7a/20da14d1383e25d5(V1) with server4/193.167.100.100:443] 32.343 Original destination connection id: 2110f8b7fd3dfa7a (scid: 20da14d1383e25d5) 32.343 -> Packet A|3|S0|020e9df0c5fa068448ee|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] >- CryptoStream[I|ClientHello] 32.345 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.545/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.345 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.359 <- (7) Packet A|4|S0|68fa06b7d3979f34|32|1 AckFrame[0|Δ21] 32.360 -> Packet A|4|S0|020e9df0c5fa068448ee|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 32.373 <- (8) Packet A|6|S0|68fa06b7d3979f34|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 32.380 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 32.380 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.580/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 32.380 <- (1) Packet H|0|L|766|1 CryptoFrame[0,718] 32.383 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.486/Handshake, because peerAwaitingAddressValidation | RTT:35/17 32.383 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 32.382 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 32.383 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 32.385 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.488/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.384 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.385 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.488/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.385 Starting downloading https://server4:443/fzaqcvvxzp at 36:38.525 on ClientConnection[2110f8b7fd3dfa7a/20da14d1383e25d5(V1) with server4/193.167.100.100:443] 32.385 Discarding pn space Initial because first Handshake message is being sent 32.385 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 32.385 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.488/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.385 -> Packet A|0|S0|19acd0d57375bab4380e|49|1 StreamFrame[0(CIB),0,17,fin] 32.417 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 32.417 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 32.417 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 32.417 <- (2) Packet A|0|S0|20da14d1383e25d5|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|24038458587e66a38017|e0ee2c2f4e67045b392f8943d8873c5b] Padding(1226) 32.417 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 32.496/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 32.496/App, because ackElicitingInFlight | RTT:35/14 32.418 Discarding pn space Handshake because HandshakeDone is received 32.418 <- (3) Packet A|1|S0|20da14d1383e25d5|1332|2 PingFrame[] Padding(1305) 32.418 -> Packet A|1|S0|19acd0d57375bab4380e|33|1 AckFrame[1-0|Δ0] 32.419 <- (4) Packet A|2|S0|20da14d1383e25d5|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 32.419 <- (5) Packet A|3|S0|20da14d1383e25d5|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601002eaaa4f0a3007b33ac73818327efbeea49a75bc65978278dd593b69970f4723c333900df] 32.420 Finished downloading https://server4:443/fzaqcvvxzp at 36:38.560 on ClientConnection[2110f8b7fd3dfa7a/20da14d1383e25d5(V1) with server4/193.167.100.100:443] -< CryptoStream[A|NewSessionTicket] 32.420 Closing ClientConnection[2110f8b7fd3dfa7a/20da14d1383e25d5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.420 -> Packet A|2|S0|19acd0d57375bab4380e|33|1 AckFrame[3-0|Δ0] 32.420 -> Packet A|3|S0|19acd0d57375bab4380e|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 32.420 Creating connection with server4:443 with v1 32.421 Setting up connection for downloading https://server4:443/ohnovjsajt at 36:38.561 on ClientConnection[f128792b7cdce534/aa7a503152ff8a04(V1) with server4/193.167.100.100:443] 32.421 Original destination connection id: f128792b7cdce534 (scid: aa7a503152ff8a04) >- CryptoStream[I|ClientHello] 32.422 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.622/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.422 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.451 <- (6) Packet A|6|S0|20da14d1383e25d5|29|2 MaxStreamsFrame[B,17] Padding(1) 32.451 <- (7) Packet A|7|S0|20da14d1383e25d5|35|2 AckFrame[3-0|Δ0] ConnectionCloseFrame[0|28|] 32.452 -> Packet A|4|S0|19acd0d57375bab4380e|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 32.622 loss detection timeout handler running Sending probe 0, because no ack since 32.422. Current RTT: 100/25. 32.622 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.622 (Probe is an initial retransmit) 32.622 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 33.022/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.622 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.658 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 32.658 probe count not reset on ack because handshake not yet confirmed 32.658 Retransmitting CryptoFrame[0,257] on level Initial 32.659 Cwnd(-): 6000; inflight: 0 32.659 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 33.059/Initial, because peerAwaitingAddressValidation | RTT:100/25 32.659 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 32.865/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.659 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 32.658 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 32.661 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 32.867/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.661 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 32.661 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 32.661 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 32.663 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 32.869/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.663 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.663 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.766/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.663 Discarding pn space Initial because first Handshake message is being sent 32.663 Starting downloading https://server4:443/ohnovjsajt at 36:38.803 on ClientConnection[f128792b7cdce534/aa7a503152ff8a04(V1) with server4/193.167.100.100:443] 32.663 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 32.664 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.767/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.664 -> Packet A|0|S0|1e23f37cf4241aa8896a|49|1 StreamFrame[0(CIB),0,17,fin] 32.692 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 32.766 loss detection timeout handler running Sending probe 0, because no ack since 32.663. Current RTT: 35/17. 32.766 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.766 (Probe is a handshake retransmit) 32.766 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 32.972/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.766 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 32.798 <- (3) Packet H|2|L|49|1 AckFrame[2|Δ0] 32.799 probe count not reset on ack because handshake not yet confirmed 32.799 Retransmitting CryptoFrame[0,36] on level Handshake 32.799 Cwnd(-): 3000; inflight: 49 32.799 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 32.799 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 32.799 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 181 millis, based on 32.981/Handshake, because ackElicitingInFlight | RTT:35/14 32.799 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[0|Δ0] 32.798 <- (3) Packet A|0|S0|aa7a503152ff8a04|1283|4 AckFrame[0|Δ102] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|7e01571f6dd7288f3b14|b45adbe5e1fdc6779404ddeb49f5f9bd] Padding(1220) reschedule loss detection timer for PTO over 90 millis, based on 32.890/Handshake, because ackElicitingInFlight | RTT:35/14 32.800 State is set to Confirmed reschedule loss detection timer for PTO over 164 millis, based on 32.964/Handshake, because ackElicitingInFlight | RTT:45/30 32.800 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 32.800 Discarding pn space Handshake because HandshakeDone is received 32.800 <- (4) Packet A|1|S0|aa7a503152ff8a04|1332|2 PingFrame[] Padding(1305) 32.800 -> Packet A|1|S0|1e23f37cf4241aa8896a|33|1 AckFrame[1-0|Δ0] 32.807 <- (5) Packet A|2|S0|aa7a503152ff8a04|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 32.807 Finished downloading https://server4:443/ohnovjsajt at 36:38.947 on ClientConnection[f128792b7cdce534/aa7a503152ff8a04(V1) with server4/193.167.100.100:443] 32.807 Closing ClientConnection[f128792b7cdce534/aa7a503152ff8a04(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.808 -> Packet A|2|S0|1e23f37cf4241aa8896a|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 32.808 Creating connection with server4:443 with v1 32.808 Setting up connection for downloading https://server4:443/hatsnbliin at 36:38.948 on ClientConnection[57aad4b682209efd/455bb76121df7ca7(V1) with server4/193.167.100.100:443] 32.808 Original destination connection id: 57aad4b682209efd (scid: 455bb76121df7ca7) >- CryptoStream[I|ClientHello] 32.810 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.010/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.809 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.813 <- (6) Packet A|3|S0|aa7a503152ff8a04|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100d7cab056bf5975da33155327e831154a3ef464cb40615d6a79a541dba1105168b95a63f8] 32.814 -> Packet A|3|S0|1e23f37cf4241aa8896a|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 32.838 <- (7) Packet A|4|S0|aa7a503152ff8a04|35|2 AckFrame[2|Δ0] ConnectionCloseFrame[0|28|] 33.009 loss detection timeout handler running Sending probe 0, because no ack since 32.809. Current RTT: 100/25. 33.009 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 33.009 (Probe is an initial retransmit) 33.009 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 33.409/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.009 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.042 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 33.043 probe count not reset on ack because handshake not yet confirmed 33.043 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 33.443/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 33.042 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 33.046 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 33.240/Handshake, because peerAwaitingAddressValidation | RTT:33/16 33.046 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 33.046 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 33.046 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 33.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 33.243/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.049 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.049 Starting downloading https://server4:443/hatsnbliin at 36:39.189 on ClientConnection[57aad4b682209efd/455bb76121df7ca7(V1) with server4/193.167.100.100:443] 33.049 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 33.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 33.146/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.049 Discarding pn space Initial because first Handshake message is being sent 33.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 33.147/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.050 -> Packet A|0|S0|0aa8396bf66e2e582266|49|1 StreamFrame[0(CIB),0,17,fin] 33.146 loss detection timeout handler running Sending probe 0, because no ack since 33.049. Current RTT: 33/16. 33.146 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.146 (Probe is a handshake retransmit) 33.146 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 33.340/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.146 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 33.326 <- (2) Packet H|3|L|47|2 PingFrame[] Padding(2) 33.327 -> Packet H|3|L|50|1 AckFrame[3,1|Δ0] 33.339 loss detection timeout handler running Sending probe 1, because no ack since 33.050. Current RTT: 33/16. 33.340 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.340 (Probe is a handshake retransmit) 33.340 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 33.728/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.340 -> Packet PH|4|L|82|1 CryptoFrame[0,36] 33.341 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 33.729/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.341 -> Packet PH|5|L|82|1 CryptoFrame[0,36] 33.372 <- (3) Packet H|4|L|51|1 AckFrame[4-3,1|Δ0] 33.372 probe count not reset on ack because handshake not yet confirmed 33.372 Retransmitting CryptoFrame[0,36] on level Handshake 33.373 Cwnd(-): 6000; inflight: 131 33.373 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 356 millis, based on 33.729/Handshake, because ackElicitingInFlight | RTT:33/16 33.373 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 323 millis, based on 33.697/Handshake, because ackElicitingInFlight | RTT:33/12 33.373 -> Packet H|6|L|82|1 CryptoFrame[0,36] 33.372 <- (3) Packet A|0|S0|455bb76121df7ca7|1281|4 AckFrame[0|Δ290] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1084398f6fa7c5395e09|da520f3e9a4a6a6f98fc0bacb1941f63] Padding(1216) reschedule loss detection timer for PTO over 80 millis, based on 33.454/Handshake, because ackElicitingInFlight | RTT:33/12 33.373 State is set to Confirmed reschedule loss detection timer for PTO over 370 millis, based on 33.744/Handshake, because ackElicitingInFlight | RTT:67/76 33.373 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.373 Discarding pn space Handshake because HandshakeDone is received 33.373 <- (4) Packet A|1|S0|455bb76121df7ca7|1332|2 PingFrame[] Padding(1305) 33.373 -> Packet A|1|S0|0aa8396bf66e2e582266|33|1 AckFrame[1-0|Δ0] 33.377 <- (5) Packet A|2|S0|455bb76121df7ca7|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 33.378 Finished downloading https://server4:443/hatsnbliin at 36:39.518 on ClientConnection[57aad4b682209efd/455bb76121df7ca7(V1) with server4/193.167.100.100:443] 33.378 Closing ClientConnection[57aad4b682209efd/455bb76121df7ca7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.378 -> Packet A|2|S0|0aa8396bf66e2e582266|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0]