0.000 Creating connection with server4:443 with v1 0.087 Setting up connection for downloading https://server4:443/bujsdszvhg at 50:49.014 on ClientConnection[5acc035dbc448120/32a42e450f8ac299(V1) with server4/193.167.100.100:443] 0.089 Original destination connection id: 5acc035dbc448120 (scid: 32a42e450f8ac299) >- CryptoStream[I|ClientHello] 0.271 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.472/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.265 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.315 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.334 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.535/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.364 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 149 millis, based on 0.514/Handshake, because peerAwaitingAddressValidation | RTT:50/25 0.363 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 0.315 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 0.371 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 0.371 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 0.401 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 149 millis, based on 0.552/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:50/25 0.401 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.408 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 0.409 Starting downloading https://server4:443/bujsdszvhg at 50:49.352 on ClientConnection[5acc035dbc448120/32a42e450f8ac299(V1) with server4/193.167.100.100:443] 0.417 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 149 millis, based on 0.567/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:50/25 0.417 Discarding pn space Initial because first Handshake message is being sent 0.437 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 149 millis, based on 0.587/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:50/25 0.436 -> Packet A|0|S0|bd3cc53f0a3e22aacaf6|49|1 StreamFrame[0(CIB),0,17] 0.441 <- (2) Packet A|1|S0|32a42e450f8ac299|1332|2 PingFrame[] Padding(1305) 0.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 149 millis, based on 0.600/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:50/25 0.449 -> Packet A|1|S0|bd3cc53f0a3e22aacaf6|32|1 StreamFrame[0(CIB),17,0,fin] 0.441 <- (3) Packet A|2|S0|32a42e450f8ac299|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010083ceae0c7fd96e4bc1f46c67b006b9ff4d5d4cb2e8fde5daef301687488f7389ec561eba] -< CryptoStream[A|NewSessionTicket] 0.455 -> Packet A|2|S0|bd3cc53f0a3e22aacaf6|34|1 AckFrame[2-1|Δ5] 0.470 <- (4) Packet A|3|S0|32a42e450f8ac299|1054|1 StreamFrame[0(CIB),0,1024,fin] 0.475 Finished downloading https://server4:443/bujsdszvhg at 50:49.417 on ClientConnection[5acc035dbc448120/32a42e450f8ac299(V1) with server4/193.167.100.100:443] 0.477 Closing ClientConnection[5acc035dbc448120/32a42e450f8ac299(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.480 Creating connection with server4:443 with v1 0.481 Setting up connection for downloading https://server4:443/ipvitgghhp at 50:49.424 on ClientConnection[e4836dc200efe1f5/c5a5f6a9e3ab2bf6(V1) with server4/193.167.100.100:443] 0.482 Original destination connection id: e4836dc200efe1f5 (scid: c5a5f6a9e3ab2bf6) 0.486 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial >- CryptoStream[I|ClientHello] reschedule loss detection timer for PTO over 199 millis, based on 0.687/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.486 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.480 -> Packet A|3|S0|bd3cc53f0a3e22aacaf6|38|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ7] 0.488 <- (5) Packet A|4|S0|32a42e450f8ac299|1372|2 PingFrame[] Padding(1345) 0.490 -> Packet A|4|S0|bd3cc53f0a3e22aacaf6|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 0.512 <- (6) Packet A|6|S0|32a42e450f8ac299|37|2 AckFrame[3-2,0|Δ0] ConnectionCloseFrame[0|28|] 0.522 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.524 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.724/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.522 <- (1) Packet H|0|L|769|1 CryptoFrame[0,721] 0.530 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 0.638/Handshake, because peerAwaitingAddressValidation | RTT:36/18 0.530 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 0.530 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 0.531 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.536 Starting downloading https://server4:443/ipvitgghhp at 50:49.480 on ClientConnection[e4836dc200efe1f5/c5a5f6a9e3ab2bf6(V1) with server4/193.167.100.100:443] 0.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 0.645/Handshake, because peerAwaitingAddressValidation | RTT:36/18 0.537 Discarding pn space Initial because first Handshake message is being sent 0.538 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 0.646/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 0.537 -> Packet H|0|L|82|1 CryptoFrame[0,36] 0.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 0.647/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 0.539 -> [Packet H|1|L|48|1 AckFrame[0|Δ0], Packet A|0|S0|843a5e502e520088828d|49|1 StreamFrame[0(CIB),0,17,fin]] 0.638 <- (2) Packet H|1|L|47|2 PingFrame[] Padding(2) 0.639 -> Packet H|2|L|48|1 AckFrame[1-0|Δ0] 0.646 loss detection timeout handler running Sending probe 0, because no ack since 0.537. Current RTT: 36/18. 0.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.648 (Probe is a handshake retransmit) 0.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 215 millis, based on 0.866/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 0.650 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 0.751 <- (3) Packet H|2|L|47|2 PingFrame[] Padding(2) 0.752 -> Packet H|4|L|48|1 AckFrame[2-0|Δ0] 0.856 <- (4) Packet H|3|L|47|2 PingFrame[] Padding(2) 0.858 -> Packet H|5|L|48|1 AckFrame[3-0|Δ0] 0.865 loss detection timeout handler running Sending probe 1, because no ack since 0.539. Current RTT: 36/18. 0.866 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.866 (Probe is a handshake retransmit) 0.866 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 1.299/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 0.866 -> Packet PH|6|L|82|1 CryptoFrame[0,36] 0.867 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 1.299/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 0.867 -> Packet PH|7|L|82|1 CryptoFrame[0,36] 0.900 <- (5) Packet H|4|L|53|1 AckFrame[7,5-4,2-1|Δ0] 0.902 probe count not reset on ack because handshake not yet confirmed 0.903 Retransmitting CryptoFrame[0,36] on level Handshake 0.904 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 431 millis, based on 1.336/Handshake, because ackElicitingInFlight | RTT:36/18 0.904 -> Packet H|8|L|82|1 CryptoFrame[0,36] 0.905 Cwnd(-): 6000; inflight: 213 0.906 loss detection timeout handler running 0.907 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 381 millis, based on 1.288/Handshake, because ackElicitingInFlight | RTT:36/15 0.900 <- (5) Packet A|0|S0|c5a5f6a9e3ab2bf6|1279|4 AckFrame[0|Δ327] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|70263f9a84e3cec1c9b2|bc8a735c77561ebe780c571165637865] Padding(1214) reschedule loss detection timer for PTO over 88 millis, based on 1.000/Handshake, because ackElicitingInFlight | RTT:36/15 0.912 State is set to Confirmed reschedule loss detection timer for PTO over 417 millis, based on 1.330/Handshake, because ackElicitingInFlight | RTT:74/88 0.913 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 0.913 Discarding pn space Handshake because HandshakeDone is received 0.900 <- (6) Packet A|1|S0|c5a5f6a9e3ab2bf6|1332|2 PingFrame[] Padding(1305) 0.903 <- (7) Packet A|3|S0|c5a5f6a9e3ab2bf6|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100e5a8e8dd0845e46016232b7114ec09ca6143f274b71dd4f786b591ba57bef34e7d27a587] 0.914 -> Packet A|1|S0|843a5e502e520088828d|33|1 AckFrame[1-0|Δ0] -< CryptoStream[A|] 0.937 -> Packet A|2|S0|843a5e502e520088828d|36|1 AckFrame[3,1-0|Δ19] 0.947 <- (8) Packet A|4|S0|c5a5f6a9e3ab2bf6|1372|2 PingFrame[] Padding(1345) 0.968 -> Packet A|3|S0|843a5e502e520088828d|36|1 AckFrame[4-3,1-0|Δ19] 0.969 <- (9) Packet A|5|S0|c5a5f6a9e3ab2bf6|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|NewSessionTicket] 0.971 Finished downloading https://server4:443/ipvitgghhp at 50:49.914 on ClientConnection[e4836dc200efe1f5/c5a5f6a9e3ab2bf6(V1) with server4/193.167.100.100:443] 0.971 Closing ClientConnection[e4836dc200efe1f5/c5a5f6a9e3ab2bf6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.971 -> Packet A|4|S0|843a5e502e520088828d|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1-0|Δ0] 0.972 Creating connection with server4:443 with v1 0.973 Setting up connection for downloading https://server4:443/xmhkwktjwi at 50:49.916 on ClientConnection[5c33033ad64b2e61/ff3bdbe912dc5e8e(V1) with server4/193.167.100.100:443] 0.973 Original destination connection id: 5c33033ad64b2e61 (scid: ff3bdbe912dc5e8e) 0.977 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial >- CryptoStream[I|ClientHello] reschedule loss detection timer for PTO over 199 millis, based on 1.177/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.976 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.000 <- (10) Packet A|6|S0|c5a5f6a9e3ab2bf6|1422|2 PingFrame[] Padding(1395) 1.002 -> Packet A|5|S0|843a5e502e520088828d|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1-0|Δ0] 1.013 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 1.014 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.214/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.019 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 1.127/Handshake, because peerAwaitingAddressValidation | RTT:36/18 1.019 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 1.013 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 1.021 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 1.021 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 1.025 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 1.133/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 1.024 -> Packet H|0|L|82|1 CryptoFrame[0,36] 1.026 Starting downloading https://server4:443/xmhkwktjwi at 50:49.969 on ClientConnection[5c33033ad64b2e61/ff3bdbe912dc5e8e(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.027 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 1.135/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 1.027 Discarding pn space Initial because first Handshake message is being sent 1.028 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 1.136/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 1.027 -> Packet A|0|S0|7068fbce3c02afff0b8a|49|1 StreamFrame[0(CIB),0,17,fin] 1.028 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 1.058 <- (2) Packet A|1|S0|ff3bdbe912dc5e8e|1332|2 PingFrame[] Padding(1305) 1.079 -> Packet A|1|S0|7068fbce3c02afff0b8a|34|1 AckFrame[1|Δ19] 1.111 <- (3) Packet A|3|S0|ff3bdbe912dc5e8e|1372|2 PingFrame[] Padding(1345) 1.118 <- (4) Packet A|4|S0|ff3bdbe912dc5e8e|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b9127d48156fe7000063|0e8ae8d3df40799bcc8e43389e9dc076] 1.118 State is set to Confirmed reschedule loss detection timer for PTO over 13 millis, based on 1.132/Handshake, because ackElicitingInFlight | RTT:36/18 reschedule loss detection timer for PTO over 36 millis, based on 1.155/App, because ackElicitingInFlight | RTT:36/18 1.119 Discarding pn space Handshake because HandshakeDone is received 1.119 -> Packet A|2|S0|7068fbce3c02afff0b8a|36|1 AckFrame[4-3,1|Δ6] 1.155 loss detection timeout handler running Sending probe 0, because no ack since 1.027. Current RTT: 36/18. 1.156 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 255 millis, based on 1.413/App, because ackElicitingInFlight | RTT:36/18 1.157 -> Packet PA|3|S0|7068fbce3c02afff0b8a|49|1 StreamFrame[0(CIB),0,17,fin] 1.188 <- (5) Packet A|5|S0|ff3bdbe912dc5e8e|33|1 AckFrame[3,1|Δ0] 1.190 Cwnd(-): 6000; inflight: 0 1.190 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.190 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 1.189 <- (6) Packet A|6|S0|ff3bdbe912dc5e8e|1054|1 StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 114 millis, based on 1.305/App, because ackElicitingInFlight | RTT:35/15 1.190 -> Packet A|4|S0|7068fbce3c02afff0b8a|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4-3|Δ0] 1.191 Finished downloading https://server4:443/xmhkwktjwi at 50:50.134 on ClientConnection[5c33033ad64b2e61/ff3bdbe912dc5e8e(V1) with server4/193.167.100.100:443] 1.191 Closing ClientConnection[5c33033ad64b2e61/ff3bdbe912dc5e8e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.192 -> Packet A|5|S0|7068fbce3c02afff0b8a|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 1.192 Creating connection with server4:443 with v1 1.193 Setting up connection for downloading https://server4:443/zgsrjfraqc at 50:50.136 on ClientConnection[0f5a52a2e8918f88/1ab80eaf04b9330a(V1) with server4/193.167.100.100:443] 1.193 Original destination connection id: 0f5a52a2e8918f88 (scid: 1ab80eaf04b9330a) >- CryptoStream[I|ClientHello] 1.195 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.395/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.195 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.223 <- (7) Packet A|7|S0|ff3bdbe912dc5e8e|1422|4 PingFrame[] CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010033bdebd9e65312a1712577aed1bda275f77d2b2d903deb6abde16aefe269ee24cd7eaee9] Padding(1041) 1.224 -> Packet A|6|S0|7068fbce3c02afff0b8a|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 1.394 loss detection timeout handler running Sending probe 0, because no ack since 1.195. Current RTT: 100/25. 1.395 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.395 (Probe is an initial retransmit) 1.396 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.796/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.396 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.417 <- (8) Packet A|9|S0|ff3bdbe912dc5e8e|1363|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,305] 1.419 -> Packet A|7|S0|7068fbce3c02afff0b8a|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 1.529 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[0|Δ301] CryptoFrame[0,123] 1.530 probe count not reset on ack because handshake not yet confirmed 1.530 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.931/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 1.529 <- (1) Packet H|1|L|768|1 CryptoFrame[0,720] 1.535 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 3.539/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 1.535 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 1.536 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 1.536 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 1.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 3.543/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 1.539 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.540 Starting downloading https://server4:443/zgsrjfraqc at 50:50.483 on ClientConnection[0f5a52a2e8918f88/1ab80eaf04b9330a(V1) with server4/193.167.100.100:443] 1.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 2.542/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 1.541 Discarding pn space Initial because first Handshake message is being sent 1.541 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 1.541 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 2.543/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 1.541 -> Packet A|0|S0|5fe2e2f36ecdc0fca455|49|1 StreamFrame[0(CIB),0,17,fin] 1.569 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.576 <- (3) Packet A|2|S0|1ab80eaf04b9330a|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 1.578 Finished downloading https://server4:443/zgsrjfraqc at 50:50.521 on ClientConnection[0f5a52a2e8918f88/1ab80eaf04b9330a(V1) with server4/193.167.100.100:443] 1.578 Closing ClientConnection[0f5a52a2e8918f88/1ab80eaf04b9330a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.578 <- (4) Packet A|3|S0|1ab80eaf04b9330a|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601006bd8b49648ce7c4acf2e4455f9ff68f5792382edebdf862b1dd6f6eb2fc4540275881257] -< CryptoStream[A|NewSessionTicket] 1.579 Creating connection with server4:443 with v1 1.579 -> Packet A|1|S0|5fe2e2f36ecdc0fca455|38|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ1] 1.580 Setting up connection for downloading https://server4:443/rfpnfvwdym at 50:50.523 on ClientConnection[170e4ec975b98102/7a49c7d6fabbeba7(V1) with server4/193.167.100.100:443] 1.580 Original destination connection id: 170e4ec975b98102 (scid: 7a49c7d6fabbeba7) >- CryptoStream[I|ClientHello] 1.582 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.782/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.582 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.593 <- (5) Packet A|4|S0|1ab80eaf04b9330a|32|1 AckFrame[0|Δ20] 1.594 -> Packet A|2|S0|5fe2e2f36ecdc0fca455|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 1.617 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 1.619 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.819/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.617 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 1.622 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.725/Handshake, because peerAwaitingAddressValidation | RTT:35/17 1.622 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 1.622 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 1.623 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 1.626 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.729/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.625 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.626 Starting downloading https://server4:443/rfpnfvwdym at 50:50.570 on ClientConnection[170e4ec975b98102/7a49c7d6fabbeba7(V1) with server4/193.167.100.100:443] 1.626 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.729/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.627 Discarding pn space Initial because first Handshake message is being sent 1.627 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 1.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.731/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.627 -> Packet A|0|S0|47f5d1ab065e9d59b53a|49|1 StreamFrame[0(CIB),0,17,fin] 1.659 <- (2) Packet A|1|S0|7a49c7d6fabbeba7|1332|2 PingFrame[] Padding(1305) 1.660 <- (3) Packet A|2|S0|7a49c7d6fabbeba7|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 1.661 Finished downloading https://server4:443/rfpnfvwdym at 50:50.605 on ClientConnection[170e4ec975b98102/7a49c7d6fabbeba7(V1) with server4/193.167.100.100:443] 1.662 Closing ClientConnection[170e4ec975b98102/7a49c7d6fabbeba7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.661 -> Packet A|1|S0|47f5d1ab065e9d59b53a|34|1 AckFrame[2-1|Δ1] 1.662 <- (4) Packet A|3|S0|7a49c7d6fabbeba7|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601008b693c5247574b3401b7fc82e98553935f44e54e262078437c729943b82e4787d1806b94] 1.663 Creating connection with server4:443 with v1 1.663 -> Packet A|2|S0|47f5d1ab065e9d59b53a|41|3 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] ConnectionCloseFrame[0|0|] 1.663 Setting up connection for downloading https://server4:443/mrsodsdcoz at 50:50.607 on ClientConnection[d8cfb032afac0216/946f3ffa92250b10(V1) with server4/193.167.100.100:443] 1.663 Original destination connection id: d8cfb032afac0216 (scid: 946f3ffa92250b10) >- CryptoStream[I|ClientHello] 1.666 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.866/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.666 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.702 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 1.703 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.903/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.702 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 1.708 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.811/Handshake, because peerAwaitingAddressValidation | RTT:35/17 1.708 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 1.708 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 1.707 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 1.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.815/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.711 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.712 Starting downloading https://server4:443/mrsodsdcoz at 50:50.655 on ClientConnection[d8cfb032afac0216/946f3ffa92250b10(V1) with server4/193.167.100.100:443] 1.712 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.815/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.712 Discarding pn space Initial because first Handshake message is being sent 1.712 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 1.713 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 1.816/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.713 -> Packet A|0|S0|4a7dd7e5ce33cb9a80a7|49|1 StreamFrame[0(CIB),0,17,fin] 1.807 <- (2) Packet H|1|L|47|2 PingFrame[] Padding(2) 1.808 -> Packet H|2|L|48|1 AckFrame[1-0|Δ0] 1.815 loss detection timeout handler running Sending probe 0, because no ack since 1.711. Current RTT: 35/17. 1.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.816 (Probe is a handshake retransmit) 1.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 2.023/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 1.816 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 1.851 <- (3) Packet A|2|S0|946f3ffa92250b10|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010004f03cdf57aff1a92e6378ce17634bd90d78bff613d32568d0dba524e52424fc37bce4a0] -< CryptoStream[A|NewSessionTicket] 1.872 -> Packet A|1|S0|4a7dd7e5ce33cb9a80a7|34|1 AckFrame[2|Δ19] 1.978 <- (4) Packet A|4|S0|946f3ffa92250b10|29|2 PingFrame[] Padding(2) 1.998 -> Packet A|2|S0|4a7dd7e5ce33cb9a80a7|36|1 AckFrame[4,2|Δ19] 2.022 loss detection timeout handler running Sending probe 1, because no ack since 1.713. Current RTT: 35/17. 2.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.022 (Probe is a handshake retransmit) 2.023 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 2.435/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.022 -> Packet PH|4|L|82|1 CryptoFrame[0,36] 2.023 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 2.436/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.023 -> Packet PH|5|L|82|1 CryptoFrame[0,36] 2.030 <- (5) Packet A|5|S0|946f3ffa92250b10|1332|5 PingFrame[] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a0d19bd68904a508b756|f197e6be45dc7aabe09269c2872ba837] NewConnectionIdFrame[1,<0|a0d19bd68904a508b756|f197e6be45dc7aabe09269c2872ba837] Padding(1244) 2.031 State is set to Confirmed reschedule loss detection timer for PTO over 173 millis, based on 2.205/App, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over -195 millis, based on 1.836/App, because ackElicitingInFlight | RTT:35/17 2.032 loss detection timeout handler running 2.032 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 1.713. Current RTT: 35/17. 2.032 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 2.278/App, because ackElicitingInFlight | RTT:35/17 2.032 -> Packet PA|3|S0|4a7dd7e5ce33cb9a80a7|49|1 StreamFrame[0(CIB),0,17,fin] 2.052 -> Packet A|4|S0|4a7dd7e5ce33cb9a80a7|36|1 AckFrame[5-4,2|Δ19] 2.064 <- (6) Packet A|6|S0|946f3ffa92250b10|1054|1 StreamFrame[0(CIB),0,1024,fin] 2.065 Finished downloading https://server4:443/mrsodsdcoz at 50:51.009 on ClientConnection[d8cfb032afac0216/946f3ffa92250b10(V1) with server4/193.167.100.100:443] 2.066 Closing ClientConnection[d8cfb032afac0216/946f3ffa92250b10(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.066 -> Packet A|5|S0|4a7dd7e5ce33cb9a80a7|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,2|Δ0] 2.066 Creating connection with server4:443 with v1 2.067 Setting up connection for downloading https://server4:443/whciucfnab at 50:51.010 on ClientConnection[72aa20f4f37705c5/b34d802fd2c581fc(V1) with server4/193.167.100.100:443] 2.067 Original destination connection id: 72aa20f4f37705c5 (scid: b34d802fd2c581fc) >- CryptoStream[I|ClientHello] 2.070 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.270/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.070 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.084 <- (7) Packet A|7|S0|946f3ffa92250b10|1372|2 PingFrame[] Padding(1345) 2.084 <- (8) Packet A|8|S0|946f3ffa92250b10|32|1 AckFrame[4-2|Δ1] 2.085 -> Packet A|6|S0|4a7dd7e5ce33cb9a80a7|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,2|Δ0] 2.086 -> Packet A|7|S0|4a7dd7e5ce33cb9a80a7|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,2|Δ0] 2.106 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.107 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.307/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.106 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 2.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.214/Handshake, because peerAwaitingAddressValidation | RTT:35/17 2.111 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 2.111 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 2.111 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 2.114 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.218/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.114 -> Packet H|0|L|82|1 CryptoFrame[0,36] 2.115 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.218/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.115 Discarding pn space Initial because first Handshake message is being sent 2.115 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 2.115 Starting downloading https://server4:443/whciucfnab at 50:51.059 on ClientConnection[72aa20f4f37705c5/b34d802fd2c581fc(V1) with server4/193.167.100.100:443] 2.116 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.116 -> Packet A|0|S0|f39aa4eb7be2645285b1|49|1 StreamFrame[0(CIB),0,17,fin] 2.210 <- (2) Packet H|1|L|47|2 PingFrame[] Padding(2) 2.210 -> Packet H|2|L|48|1 AckFrame[1-0|Δ0] 2.218 loss detection timeout handler running Sending probe 0, because no ack since 2.114. Current RTT: 35/17. 2.219 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.219 (Probe is a handshake retransmit) 2.219 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 2.425/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.219 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 2.425 loss detection timeout handler running Sending probe 1, because no ack since 2.116. Current RTT: 35/17. 2.425 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.425 (Probe is a handshake retransmit) 2.426 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 2.838/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.426 -> Packet PH|4|L|82|1 CryptoFrame[0,36] 2.427 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 2.839/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.426 -> Packet PH|5|L|82|1 CryptoFrame[0,36] 2.460 <- (3) Packet A|1|S0|b34d802fd2c581fc|1332|2 PingFrame[] Padding(1305) 2.461 <- (4) Packet A|2|S0|b34d802fd2c581fc|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 2.462 Finished downloading https://server4:443/whciucfnab at 50:51.405 on ClientConnection[72aa20f4f37705c5/b34d802fd2c581fc(V1) with server4/193.167.100.100:443] 2.462 Closing ClientConnection[72aa20f4f37705c5/b34d802fd2c581fc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.462 -> Packet A|1|S0|f39aa4eb7be2645285b1|33|1 AckFrame[2-1|Δ0] 2.462 -> Packet A|2|S0|f39aa4eb7be2645285b1|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 2.463 Creating connection with server4:443 with v1 2.464 Setting up connection for downloading https://server4:443/awdzntfkfz at 50:51.407 on ClientConnection[b10a8ba706e0f042/30c3c491c78e95c4(V1) with server4/193.167.100.100:443] 2.464 Original destination connection id: b10a8ba706e0f042 (scid: 30c3c491c78e95c4) >- CryptoStream[I|ClientHello] 2.465 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.665/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.465 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.494 <- (5) Packet A|4|S0|b34d802fd2c581fc|1372|3 PingFrame[] MaxStreamsFrame[B,17] Padding(1343) 2.494 <- (6) Packet A|5|S0|b34d802fd2c581fc|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 2.496 -> Packet A|3|S0|f39aa4eb7be2645285b1|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 2.500 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.701/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.500 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 2.505 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.608/Handshake, because peerAwaitingAddressValidation | RTT:35/17 2.505 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 2.505 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 2.505 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 2.509 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.509 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.509 Starting downloading https://server4:443/awdzntfkfz at 50:51.453 on ClientConnection[b10a8ba706e0f042/30c3c491c78e95c4(V1) with server4/193.167.100.100:443] 2.509 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.510 Discarding pn space Initial because first Handshake message is being sent 2.509 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 2.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 2.613/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.510 -> Packet A|0|S0|76169d060d875b30d8ce|49|1 StreamFrame[0(CIB),0,17,fin] 2.541 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 2.542 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 2.542 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 2.541 <- (2) Packet A|0|S0|30c3c491c78e95c4|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|31212f1dc9962519f93b|30727b618f62bda23e750d135ba3a9a7] Padding(1226) 2.543 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 2.621/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 2.621/App, because ackElicitingInFlight | RTT:35/14 2.543 Discarding pn space Handshake because HandshakeDone is received 2.543 <- (3) Packet A|2|S0|30c3c491c78e95c4|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d8601001ae8b335696f2a8d374c0e1d00002a3f1d274a58aaa5ca9036c80edd2dc3c251abd61b3d] -< CryptoStream[A|NewSessionTicket] 2.544 -> Packet A|1|S0|76169d060d875b30d8ce|35|1 AckFrame[2,0|Δ0] 2.585 <- (4) Packet A|3|S0|30c3c491c78e95c4|1332|2 PingFrame[] Padding(1305) 2.606 -> Packet A|2|S0|76169d060d875b30d8ce|36|1 AckFrame[3-2,0|Δ19] 2.621 loss detection timeout handler running Sending probe 0, because no ack since 2.510. Current RTT: 35/14. 2.621 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 2.844/App, because ackElicitingInFlight | RTT:35/14 2.622 -> Packet PA|3|S0|76169d060d875b30d8ce|49|1 StreamFrame[0(CIB),0,17,fin] 2.717 <- (5) Packet A|4|S0|30c3c491c78e95c4|29|2 PingFrame[] Padding(2) 2.737 -> Packet A|4|S0|76169d060d875b30d8ce|36|1 AckFrame[4-2,0|Δ19] 2.843 loss detection timeout handler running Sending probe 1, because no ack since 2.622. Current RTT: 35/14. 2.843 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 443 millis, based on 3.288/App, because ackElicitingInFlight | RTT:35/14 2.844 -> Packet PA|5|S0|76169d060d875b30d8ce|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 443 millis, based on 3.289/App, because ackElicitingInFlight | RTT:35/14 2.845 -> Packet PA|6|S0|76169d060d875b30d8ce|49|1 StreamFrame[0(CIB),0,17,fin] 2.875 <- (6) Packet A|6|S0|30c3c491c78e95c4|33|1 AckFrame[5,1|Δ0] 2.876 Cwnd(-): 6000; inflight: 49 2.876 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 79 millis, based on 2.956/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 102 millis, based on 2.979/App, because ackElicitingInFlight | RTT:35/12 2.876 <- (7) Packet A|7|S0|30c3c491c78e95c4|1054|1 StreamFrame[0(CIB),0,1024,fin] 2.876 -> Packet A|7|S0|76169d060d875b30d8ce|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4-3|Δ0] 2.877 Finished downloading https://server4:443/awdzntfkfz at 50:51.820 on ClientConnection[b10a8ba706e0f042/30c3c491c78e95c4(V1) with server4/193.167.100.100:443] 2.877 Closing ClientConnection[b10a8ba706e0f042/30c3c491c78e95c4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.878 Creating connection with server4:443 with v1 2.878 -> Packet A|8|S0|76169d060d875b30d8ce|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4-3|Δ0] 2.878 Setting up connection for downloading https://server4:443/gupnujdgim at 50:51.822 on ClientConnection[6e80c96c35122bbd/a4b3b62fc83b31a2(V1) with server4/193.167.100.100:443] 2.878 Original destination connection id: 6e80c96c35122bbd (scid: a4b3b62fc83b31a2) >- CryptoStream[I|ClientHello] 2.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.080/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.880 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.897 <- (8) Packet A|8|S0|30c3c491c78e95c4|34|1 AckFrame[6-5,1|Δ21] 2.898 -> Packet A|9|S0|76169d060d875b30d8ce|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4-3|Δ0] 2.908 <- (9) Packet A|9|S0|30c3c491c78e95c4|1372|2 PingFrame[] Padding(1345) 2.908 <- (10) Packet A|10|S0|30c3c491c78e95c4|35|2 AckFrame[8-5|Δ0] ConnectionCloseFrame[0|28|] 2.909 -> Packet A|10|S0|76169d060d875b30d8ce|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4-3|Δ0] 2.915 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.916 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.116/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.915 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 2.919 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 3.022/Handshake, because peerAwaitingAddressValidation | RTT:35/17 2.919 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 2.919 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 2.919 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 2.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 3.025/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.922 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.923 Starting downloading https://server4:443/gupnujdgim at 50:51.866 on ClientConnection[6e80c96c35122bbd/a4b3b62fc83b31a2(V1) with server4/193.167.100.100:443] 2.923 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 2.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 3.026/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.923 Discarding pn space Initial because first Handshake message is being sent 2.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 3.027/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 2.923 -> Packet A|0|S0|06fac180dbc7046b9c0d|49|1 StreamFrame[0(CIB),0,17,fin] 3.026 loss detection timeout handler running Sending probe 0, because no ack since 2.922. Current RTT: 35/17. 3.026 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.026 (Probe is a handshake retransmit) 3.026 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 3.233/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 3.026 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 3.032 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.059 <- (3) Packet H|2|L|49|1 AckFrame[2|Δ0] 3.060 probe count not reset on ack because handshake not yet confirmed 3.060 Retransmitting CryptoFrame[0,36] on level Handshake 3.060 Cwnd(-): 6000; inflight: 49 3.060 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.060 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.060 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 181 millis, based on 3.242/Handshake, because ackElicitingInFlight | RTT:35/14 3.060 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[0|Δ0] 3.059 <- (3) Packet A|0|S0|a4b3b62fc83b31a2|1283|4 AckFrame[0|Δ103] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e2bd9cfa7a784246b8cb|c52eab607562ca754da858f74998bbd4] Padding(1220) reschedule loss detection timer for PTO over 90 millis, based on 3.151/Handshake, because ackElicitingInFlight | RTT:35/14 3.061 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 3.229/Handshake, because ackElicitingInFlight | RTT:45/31 3.061 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.061 Discarding pn space Handshake because HandshakeDone is received 3.060 <- (4) Packet A|1|S0|a4b3b62fc83b31a2|1332|2 PingFrame[] Padding(1305) 3.062 -> Packet A|1|S0|06fac180dbc7046b9c0d|33|1 AckFrame[1-0|Δ0] 3.205 <- (5) Packet A|4|S0|a4b3b62fc83b31a2|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e2bd9cfa7a784246b8cb|c52eab607562ca754da858f74998bbd4] 3.205 <- (6) Packet A|5|S0|a4b3b62fc83b31a2|29|2 PingFrame[] Padding(2) 3.206 -> Packet A|2|S0|06fac180dbc7046b9c0d|35|1 AckFrame[5-4,1-0|Δ0] 3.493 <- (7) Packet A|6|S0|a4b3b62fc83b31a2|1232|4 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|e2bd9cfa7a784246b8cb|c52eab607562ca754da858f74998bbd4] StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,143] -< CryptoStream[A|] 3.494 Finished downloading https://server4:443/gupnujdgim at 50:52.437 on ClientConnection[6e80c96c35122bbd/a4b3b62fc83b31a2(V1) with server4/193.167.100.100:443] 3.494 Closing ClientConnection[6e80c96c35122bbd/a4b3b62fc83b31a2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.493 <- (8) Packet A|7|S0|a4b3b62fc83b31a2|238|2 CryptoFrame[143,162] NewTokenFrame[ad9a8b8d860100cbfbe51406be2756fc07b93a83ebe8c8ddcbb8a52e4e51cf5463ed6c558417ddbeabe407] -< CryptoStream[A|NewSessionTicket] 3.495 Creating connection with server4:443 with v1 3.495 -> Packet A|3|S0|06fac180dbc7046b9c0d|39|2 AckFrame[7-4,1-0|Δ0] ConnectionCloseFrame[0|0|] 3.495 Setting up connection for downloading https://server4:443/fyldndcmpt at 50:52.439 on ClientConnection[4ea227fa52a0c178/0540677e23be0e27(V1) with server4/193.167.100.100:443] 3.495 Original destination connection id: 4ea227fa52a0c178 (scid: 0540677e23be0e27) >- CryptoStream[I|ClientHello] 3.497 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.698/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.497 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.697 loss detection timeout handler running Sending probe 0, because no ack since 3.497. Current RTT: 100/25. 3.697 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.697 (Probe is an initial retransmit) 3.698 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.098/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.698 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.097 loss detection timeout handler running Sending probe 1, because no ack since 3.698. Current RTT: 100/25. 4.097 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.098 (Probe is an initial retransmit) 4.098 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.898/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.098 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.099 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.899/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.099 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.733 <- (1) Packet I|4|L|182|2 Token=[] AckFrame[3-2,0|Δ601] CryptoFrame[0,123] 4.734 probe count not reset on ack because handshake not yet confirmed 4.735 Cwnd(-): 6000; inflight: 0 4.735 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.535/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.733 <- (1) Packet H|4|L|769|1 CryptoFrame[0,721] 4.738 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 7607 millis, based on 12.346/Handshake, because peerAwaitingAddressValidation | RTT:634/317 4.738 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 4.738 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 4.738 -> Packet I|4|L|1201|2 Token=[] AckFrame[4|Δ0] Padding(1151) >- CryptoStream[H|Finished] 4.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 7607 millis, based on 12.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 4.741 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.742 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.742 Starting downloading https://server4:443/fyldndcmpt at 50:53.685 on ClientConnection[4ea227fa52a0c178/0540677e23be0e27(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 1901 millis, based on 6.644/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 4.742 Discarding pn space Initial because first Handshake message is being sent 4.742 -> Packet H|1|L|48|1 AckFrame[4|Δ0] 4.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1901 millis, based on 6.645/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 4.743 -> Packet A|0|S0|5eec89defd9aff5a3cce|49|1 StreamFrame[0(CIB),0,17,fin] 4.774 <- (2) Packet H|5|L|49|1 AckFrame[0|Δ0] 4.775 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 4.775 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 4.774 <- (2) Packet A|0|S0|0540677e23be0e27|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|913b57a98c365a6d988a|ddef8f286004c33b84676f208c66b7c6] Padding(1226) 4.775 State is set to Confirmed reschedule loss detection timer for PTO over 2098 millis, based on 6.874/App, because ackElicitingInFlight | RTT:559/388 reschedule loss detection timer for PTO over 2098 millis, based on 6.874/App, because ackElicitingInFlight | RTT:559/388 4.776 Discarding pn space Handshake because HandshakeDone is received 4.778 <- (3) Packet A|3|S0|0540677e23be0e27|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601007bd51ac873ff412ff638740ca7d0a3297c3fd93f18d0ecd8749fa48c1a484a0ccdc68742] -< CryptoStream[A|] 4.779 -> Packet A|1|S0|5eec89defd9aff5a3cce|36|1 AckFrame[3,0|Δ2] 4.817 <- (4) Packet A|5|S0|0540677e23be0e27|1332|2 PingFrame[] Padding(1305) 4.820 <- (5) Packet A|6|S0|0540677e23be0e27|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|NewSessionTicket] 4.821 Finished downloading https://server4:443/fyldndcmpt at 50:53.764 on ClientConnection[4ea227fa52a0c178/0540677e23be0e27(V1) with server4/193.167.100.100:443] 4.821 Closing ClientConnection[4ea227fa52a0c178/0540677e23be0e27(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.821 -> Packet A|2|S0|5eec89defd9aff5a3cce|38|1 AckFrame[6-5,3,0|Δ3] 4.822 Creating connection with server4:443 with v1 4.822 -> Packet A|3|S0|5eec89defd9aff5a3cce|41|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3,0|Δ0] 4.823 Setting up connection for downloading https://server4:443/cnxaxzttxh at 50:53.766 on ClientConnection[c1c8633b9f5475c0/749dacc75cde1c72(V1) with server4/193.167.100.100:443] 4.823 Original destination connection id: c1c8633b9f5475c0 (scid: 749dacc75cde1c72) >- CryptoStream[I|ClientHello] 4.825 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.025/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.825 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.855 <- (6) Packet A|7|S0|0540677e23be0e27|1372|3 PingFrame[] MaxStreamsFrame[B,17] Padding(1343) 4.856 -> Packet A|4|S0|5eec89defd9aff5a3cce|41|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3,0|Δ0] 5.024 loss detection timeout handler running Sending probe 0, because no ack since 4.825. Current RTT: 100/25. 5.024 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.024 (Probe is an initial retransmit) 5.025 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.425/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.025 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.424 loss detection timeout handler running Sending probe 1, because no ack since 5.025. Current RTT: 100/25. 5.424 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.424 (Probe is an initial retransmit) 5.425 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.225/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.425 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.426 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.226/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.426 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.458 <- (1) Packet I|2|L|177|2 Token=[] AckFrame[2-1|Δ0] CryptoFrame[0,123] 5.459 probe count not reset on ack because handshake not yet confirmed 5.459 Retransmitting CryptoFrame[0,257] on level Initial 5.459 Cwnd(-): 6000; inflight: 1200 5.459 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.259/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.459 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 5.847/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.459 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 5.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.458 <- (1) Packet H|2|L|767|1 CryptoFrame[0,719] reschedule loss detection timer for PTO over 387 millis, based on 5.851/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.463 -> Packet I|5|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1151) 5.463 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 5.463 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.563/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.466 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 96 millis, based on 5.563/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.466 -> Packet H|0|L|82|1 CryptoFrame[0,36] 5.466 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.466 -> Packet H|1|L|48|1 AckFrame[2|Δ0] 5.466 Starting downloading https://server4:443/cnxaxzttxh at 50:54.410 on ClientConnection[c1c8633b9f5475c0/749dacc75cde1c72(V1) with server4/193.167.100.100:443] 5.467 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.564/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.467 -> Packet A|0|S0|f73f7ff6c55fbf51867f|49|1 StreamFrame[0(CIB),0,17,fin] 5.499 <- (3) Packet H|4|L|49|1 AckFrame[0|Δ0] 5.500 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 5.500 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 5.499 <- (3) Packet A|0|S0|749dacc75cde1c72|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|cdaf0ecee697b9a106c4|f54f36921621beb8f6093b2342f5edbc] Padding(1226) 5.500 State is set to Confirmed reschedule loss detection timer for PTO over 67 millis, based on 5.568/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 67 millis, based on 5.568/App, because ackElicitingInFlight | RTT:33/12 5.501 Discarding pn space Handshake because HandshakeDone is received 5.500 <- (4) Packet A|1|S0|749dacc75cde1c72|1332|2 PingFrame[] Padding(1305) 5.501 -> Packet A|1|S0|f73f7ff6c55fbf51867f|33|1 AckFrame[1-0|Δ0] 5.518 <- (5) Packet A|2|S0|749dacc75cde1c72|32|1 AckFrame[0|Δ20] 5.519 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.523 <- (6) Packet A|3|S0|749dacc75cde1c72|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 5.523 Finished downloading https://server4:443/cnxaxzttxh at 50:54.467 on ClientConnection[c1c8633b9f5475c0/749dacc75cde1c72(V1) with server4/193.167.100.100:443] 5.523 Closing ClientConnection[c1c8633b9f5475c0/749dacc75cde1c72(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.524 -> Packet A|2|S0|f73f7ff6c55fbf51867f|32|1 ConnectionCloseFrame[0|0|] 5.524 Creating connection with server4:443 with v1 5.525 Setting up connection for downloading https://server4:443/kcrkeglmyh at 50:54.468 on ClientConnection[b2581342f3bae4e7/78e2bcc5a35710fa(V1) with server4/193.167.100.100:443] 5.525 Original destination connection id: b2581342f3bae4e7 (scid: 78e2bcc5a35710fa) >- CryptoStream[I|ClientHello] 5.526 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.726/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.526 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.543 <- (7) Packet A|4|S0|749dacc75cde1c72|1372|4 PingFrame[] CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601009bfbba06375dd3f3ffbbb34db8dfd08baed1307d4989311bb64f57a2f8bf60eef590e5ac] Padding(1164) 5.544 -> Packet A|3|S0|f73f7ff6c55fbf51867f|38|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ21] 5.725 loss detection timeout handler running Sending probe 0, because no ack since 5.526. Current RTT: 100/25. 5.726 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.726 (Probe is an initial retransmit) 5.726 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.126/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.726 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.126 loss detection timeout handler running Sending probe 1, because no ack since 5.726. Current RTT: 100/25. 6.126 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.126 (Probe is an initial retransmit) 6.126 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.926/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.126 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.127 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.927/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.127 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.159 <- (1) Packet I|2|L|179|2 Token=[] AckFrame[2,0|Δ0] CryptoFrame[0,123] 6.160 probe count not reset on ack because handshake not yet confirmed 6.161 Cwnd(-): 6000; inflight: 1200 6.161 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.961/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 6.159 <- (1) Packet H|2|L|768|1 CryptoFrame[0,720] 6.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.552/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.164 -> Packet I|4|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1151) 6.165 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 6.165 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 6.168 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.556/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.168 -> Packet H|0|L|82|1 CryptoFrame[0,36] 6.168 Starting downloading https://server4:443/kcrkeglmyh at 50:55.112 on ClientConnection[b2581342f3bae4e7/78e2bcc5a35710fa(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.169 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.169 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.557/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 6.266/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.169 Discarding pn space Initial because first Handshake message is being sent 6.169 -> Packet A|0|S0|556bad1577d161235553|49|1 StreamFrame[0(CIB),0,17,fin] 6.169 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.169 -> Packet H|1|L|48|1 AckFrame[2|Δ0] 6.203 <- (3) Packet A|1|S0|78e2bcc5a35710fa|1332|4 PingFrame[] CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100b561d9d92b8c888b6c437d060a5236e2fbfbc6ca5d61e66d7a54555e3f1a880a0f689aa3] Padding(951) -< CryptoStream[A|NewSessionTicket] 6.223 -> Packet A|1|S0|556bad1577d161235553|34|1 AckFrame[1|Δ19] 6.255 <- (4) Packet A|2|S0|78e2bcc5a35710fa|1372|2 PingFrame[] Padding(1345) 6.265 loss detection timeout handler running Sending probe 0, because no ack since 6.168. Current RTT: 33/16. 6.265 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.266 (Probe is a handshake retransmit) 6.266 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.460/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.266 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 6.276 -> Packet A|2|S0|556bad1577d161235553|34|1 AckFrame[2-1|Δ19] 6.459 loss detection timeout handler running Sending probe 1, because no ack since 6.169. Current RTT: 33/16. 6.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.460 (Probe is a handshake retransmit) 6.460 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.460 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 6.461 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.849/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.461 -> Packet PH|4|L|82|1 CryptoFrame[0,36] 6.838 <- (5) Packet A|3|S0|78e2bcc5a35710fa|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|8a7d2cfeb2e8adaba82a|d0c820bfc6f5f7444460c6e52bb388dc] 6.838 State is set to Confirmed reschedule loss detection timer for PTO over -201 millis, based on 6.637/App, because ackElicitingInFlight | RTT:33/16 6.838 loss detection timeout handler running Sending probe 2, because no ack since 6.169. Current RTT: 33/16. 6.839 (Probe is retransmit on level App) reschedule loss detection timer for PTO over -552 millis, based on 6.286/App, because ackElicitingInFlight | RTT:33/16 6.839 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 116 millis, based on 6.956/App, because ackElicitingInFlight | RTT:33/16 6.839 -> Packet PA|3|S0|556bad1577d161235553|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 116 millis, based on 6.957/App, because ackElicitingInFlight | RTT:33/16 6.840 -> Packet PA|4|S0|556bad1577d161235553|49|1 StreamFrame[0(CIB),0,17,fin] 6.858 -> Packet A|5|S0|556bad1577d161235553|34|1 AckFrame[3-1|Δ19] 6.870 <- (6) Packet A|4|S0|78e2bcc5a35710fa|33|1 AckFrame[3,1|Δ0] 6.871 Cwnd(-): 3000; inflight: 49 6.871 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 86 millis, based on 6.957/App, because ackElicitingInFlight | RTT:33/16 6.871 <- (7) Packet A|5|S0|78e2bcc5a35710fa|1054|1 StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 104 millis, based on 6.976/App, because ackElicitingInFlight | RTT:33/13 6.871 -> Packet A|6|S0|556bad1577d161235553|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-2|Δ0] 6.871 Finished downloading https://server4:443/kcrkeglmyh at 50:55.815 on ClientConnection[b2581342f3bae4e7/78e2bcc5a35710fa(V1) with server4/193.167.100.100:443] 6.871 Closing ClientConnection[b2581342f3bae4e7/78e2bcc5a35710fa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.872 -> Packet A|7|S0|556bad1577d161235553|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 6.872 Creating connection with server4:443 with v1 6.873 Setting up connection for downloading https://server4:443/mplbkbmxyg at 50:55.816 on ClientConnection[94107f23ef5fce11/e10c3823f3796680(V1) with server4/193.167.100.100:443] 6.873 Original destination connection id: 94107f23ef5fce11 (scid: e10c3823f3796680) >- CryptoStream[I|ClientHello] 6.875 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.075/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.874 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.903 <- (8) Packet A|8|S0|78e2bcc5a35710fa|35|2 AckFrame[7-3|Δ0] ConnectionCloseFrame[0|28|] 7.074 loss detection timeout handler running Sending probe 0, because no ack since 6.874. Current RTT: 100/25. 7.074 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.074 (Probe is an initial retransmit) 7.075 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.475/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.074 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.107 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 7.108 probe count not reset on ack because handshake not yet confirmed 7.108 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.508/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.107 <- (1) Packet H|1|L|769|1 CryptoFrame[0,721] 7.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.111 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 7.111 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) reschedule loss detection timer for PTO over 193 millis, based on 7.305/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.111 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) >- CryptoStream[H|Finished] 7.114 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.308/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.114 -> Packet H|0|L|82|1 CryptoFrame[0,36] 7.114 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.115 Starting downloading https://server4:443/mplbkbmxyg at 50:56.058 on ClientConnection[94107f23ef5fce11/e10c3823f3796680(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 7.211/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.115 Discarding pn space Initial because first Handshake message is being sent 7.114 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 7.115 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.212/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.115 -> Packet A|0|S0|5d10095e0399455d1468|49|1 StreamFrame[0(CIB),0,17,fin] 7.211 loss detection timeout handler running Sending probe 0, because no ack since 7.114. Current RTT: 33/16. 7.211 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.211 (Probe is a handshake retransmit) 7.212 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.406/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.212 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 7.219 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.244 <- (3) Packet H|3|L|49|1 AckFrame[2|Δ0] 7.245 probe count not reset on ack because handshake not yet confirmed 7.245 Retransmitting CryptoFrame[0,36] on level Handshake 7.245 Cwnd(-): 6000; inflight: 49 7.245 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 7.245 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 7.245 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 161 millis, based on 7.407/Handshake, because ackElicitingInFlight | RTT:33/12 7.245 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[1|Δ0] 7.244 <- (3) Packet A|0|S0|e10c3823f3796680|1283|4 AckFrame[0|Δ96] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c9e7e9ed90dfac9f6050|23dea5ed5ff08ec587662bbe099e7c58] Padding(1220) reschedule loss detection timer for PTO over 80 millis, based on 7.326/Handshake, because ackElicitingInFlight | RTT:33/12 7.246 State is set to Confirmed reschedule loss detection timer for PTO over 154 millis, based on 7.400/Handshake, because ackElicitingInFlight | RTT:43/28 7.246 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.246 Discarding pn space Handshake because HandshakeDone is received 7.245 <- (4) Packet A|1|S0|e10c3823f3796680|1332|2 PingFrame[] Padding(1305) 7.247 -> Packet A|1|S0|5d10095e0399455d1468|33|1 AckFrame[1-0|Δ0] 7.247 <- (5) Packet A|2|S0|e10c3823f3796680|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 7.248 Finished downloading https://server4:443/mplbkbmxyg at 50:56.191 on ClientConnection[94107f23ef5fce11/e10c3823f3796680(V1) with server4/193.167.100.100:443] 7.248 Closing ClientConnection[94107f23ef5fce11/e10c3823f3796680(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.248 -> Packet A|2|S0|5d10095e0399455d1468|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 7.249 Creating connection with server4:443 with v1 7.249 <- (6) Packet A|3|S0|e10c3823f3796680|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d86010050f8de621bdb6251f8d881bba4586f3d80dc0cabeba5f1e7d6f937a3d2655c7ec75eb17b] 7.249 -> Packet A|3|S0|5d10095e0399455d1468|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 7.249 Setting up connection for downloading https://server4:443/mmbcuvuaie at 50:56.193 on ClientConnection[bb9b330e25c39835/c32838be1e245a2a(V1) with server4/193.167.100.100:443] 7.250 Original destination connection id: bb9b330e25c39835 (scid: c32838be1e245a2a) >- CryptoStream[I|ClientHello] 7.251 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.451/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.251 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.279 <- (7) Packet A|4|S0|e10c3823f3796680|1372|2 PingFrame[] Padding(1345) 7.279 -> Packet A|4|S0|5d10095e0399455d1468|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 7.280 <- (8) Packet A|5|S0|e10c3823f3796680|37|2 AckFrame[3,1-0|Δ0] ConnectionCloseFrame[0|28|] 7.450 loss detection timeout handler running Sending probe 0, because no ack since 7.251. Current RTT: 100/25. 7.451 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.451 (Probe is an initial retransmit) 7.451 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.851/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.451 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.487 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 7.488 probe count not reset on ack because handshake not yet confirmed 7.488 Retransmitting CryptoFrame[0,257] on level Initial 7.488 Cwnd(-): 6000; inflight: 0 7.488 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.888/Initial, because peerAwaitingAddressValidation | RTT:100/25 7.488 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 7.694/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 7.488 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 7.487 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 7.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 7.697/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 7.491 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 7.491 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 7.491 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 7.494 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 205 millis, based on 7.700/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 7.494 -> Packet H|0|L|82|1 CryptoFrame[0,36] 7.494 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.494 Starting downloading https://server4:443/mmbcuvuaie at 50:56.438 on ClientConnection[bb9b330e25c39835/c32838be1e245a2a(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 7.597/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 7.494 Discarding pn space Initial because first Handshake message is being sent 7.494 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 7.495 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 7.598/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 7.495 -> Packet A|0|S0|c08b1ad347060a00388e|49|1 StreamFrame[0(CIB),0,17,fin] 7.597 loss detection timeout handler running Sending probe 0, because no ack since 7.494. Current RTT: 35/17. 7.597 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.597 (Probe is a handshake retransmit) 7.598 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 7.804/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 7.597 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 7.630 <- (2) Packet H|2|L|49|1 AckFrame[2|Δ0] 7.631 probe count not reset on ack because handshake not yet confirmed 7.631 Retransmitting CryptoFrame[0,36] on level Handshake 7.631 Cwnd(-): 3000; inflight: 49 7.631 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 7.631 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 7.631 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 181 millis, based on 7.813/Handshake, because ackElicitingInFlight | RTT:35/14 7.631 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[0|Δ0] 7.630 <- (2) Packet A|0|S0|c32838be1e245a2a|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|ae3bf692ad3a5056327b|dcf106ade5048c62d7417b8fb32c3b13] Padding(1226) 7.632 State is set to Confirmed reschedule loss detection timer for PTO over 85 millis, based on 7.717/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over -26 millis, based on 7.606/App, because ackElicitingInFlight | RTT:35/14 7.632 Discarding pn space Handshake because HandshakeDone is received 7.632 loss detection timeout handler running Sending probe 0, because no ack since 7.495. Current RTT: 35/14. 7.632 (Probe is retransmit on level App) 7.631 <- (3) Packet A|1|S0|c32838be1e245a2a|1332|2 PingFrame[] Padding(1305) reschedule loss detection timer for PTO over 221 millis, based on 7.854/App, because ackElicitingInFlight | RTT:35/14 7.632 -> Packet PA|1|S0|c08b1ad347060a00388e|49|1 StreamFrame[0(CIB),0,17,fin] 7.632 <- (4) Packet A|2|S0|c32838be1e245a2a|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100af2374e5c4bd7190e9e870f0c161bab1115b0128f2ae827fcc8f63ed6eb1e96352d2339d] 7.632 -> Packet A|2|S0|c08b1ad347060a00388e|33|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 7.652 -> Packet A|3|S0|c08b1ad347060a00388e|34|1 AckFrame[2-0|Δ19] 7.663 <- (5) Packet A|3|S0|c32838be1e245a2a|31|1 AckFrame[1|Δ0] 7.664 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.664 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 101 millis, based on 7.766/App, because ackElicitingInFlight | RTT:34/12 7.664 -> Packet A|4|S0|c08b1ad347060a00388e|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2-0|Δ0] 7.716 <- (6) Packet A|6|S0|c32838be1e245a2a|34|1 AckFrame[4-3,1|Δ21] 7.717 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.823 <- (7) Packet A|7|S0|c32838be1e245a2a|1054|1 StreamFrame[0(CIB),0,1024,fin] 7.824 Finished downloading https://server4:443/mmbcuvuaie at 50:56.767 on ClientConnection[bb9b330e25c39835/c32838be1e245a2a(V1) with server4/193.167.100.100:443] 7.824 Closing ClientConnection[bb9b330e25c39835/c32838be1e245a2a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.824 -> Packet A|5|S0|c08b1ad347060a00388e|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,3|Δ0] 7.824 Creating connection with server4:443 with v1 7.825 Setting up connection for downloading https://server4:443/loqraigbfh at 50:56.768 on ClientConnection[eb4b8cdc86e162ea/1efbd722dcac74a4(V1) with server4/193.167.100.100:443] 7.825 Original destination connection id: eb4b8cdc86e162ea (scid: 1efbd722dcac74a4) >- CryptoStream[I|ClientHello] 7.827 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.027/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.826 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.026 loss detection timeout handler running Sending probe 0, because no ack since 7.826. Current RTT: 100/25. 8.026 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.026 (Probe is an initial retransmit) 8.027 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.427/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.026 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.060 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 8.060 probe count not reset on ack because handshake not yet confirmed 8.061 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.461/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.060 <- (1) Packet H|1|L|769|1 CryptoFrame[0,721] 8.064 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.064 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) reschedule loss detection timer for PTO over 193 millis, based on 8.258/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.064 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 8.064 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) >- CryptoStream[H|Finished] 8.067 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.261/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.067 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.067 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.067 Starting downloading https://server4:443/loqraigbfh at 50:57.010 on ClientConnection[eb4b8cdc86e162ea/1efbd722dcac74a4(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 8.164/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.067 Discarding pn space Initial because first Handshake message is being sent 8.067 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 8.068 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.165/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.068 -> Packet A|0|S0|87c6855ec787cbcace67|49|1 StreamFrame[0(CIB),0,17,fin] 8.099 <- (2) Packet H|2|L|49|1 AckFrame[0|Δ0] 8.100 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 8.100 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 8.100 <- (8) Packet A|9|S0|c32838be1e245a2a|1054|1 StreamFrame[0(CIB),0,1024,fin] 8.099 <- (2) Packet A|0|S0|1efbd722dcac74a4|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|1ac532531ea3edda2bd7|54fda5bf488dcb9000eb82851bdb67a3] Padding(1226) 8.100 <- (9) Packet A|10|S0|c32838be1e245a2a|29|2 PingFrame[] Padding(2) 8.100 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 8.169/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 68 millis, based on 8.169/App, because ackElicitingInFlight | RTT:33/12 8.101 Discarding pn space Handshake because HandshakeDone is received 8.101 -> Packet A|6|S0|c08b1ad347060a00388e|43|3 ConnectionCloseFrame[0|0|] AckFrame[7-6,3|Δ0] ConnectionCloseFrame[0|0|] 8.112 <- (3) Packet A|2|S0|1efbd722dcac74a4|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100ba6f4fbfeedb527544788f198a064df8a9151df4621b3327856469ec510c0134b612b50e] -< CryptoStream[A|NewSessionTicket] 8.113 -> Packet A|1|S0|87c6855ec787cbcace67|36|1 AckFrame[2,0|Δ12] 8.169 loss detection timeout handler running Sending probe 0, because no ack since 8.068. Current RTT: 33/12. 8.169 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 201 millis, based on 8.371/App, because ackElicitingInFlight | RTT:33/12 8.169 -> Packet PA|2|S0|87c6855ec787cbcace67|49|1 StreamFrame[0(CIB),0,17,fin] 8.221 <- (4) Packet A|4|S0|1efbd722dcac74a4|32|1 AckFrame[2-1|Δ20] 8.221 Cwnd(-): 6000; inflight: 0 8.222 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.222 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 110 millis, based on 8.333/App, because ackElicitingInFlight | RTT:35/14 8.222 -> Packet A|3|S0|87c6855ec787cbcace67|49|1 StreamFrame[0(CIB),0,17,fin] 8.332 loss detection timeout handler running Sending probe 0, because no ack since 8.222. Current RTT: 35/14. 8.332 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 8.555/App, because ackElicitingInFlight | RTT:35/14 8.333 -> Packet PA|4|S0|87c6855ec787cbcace67|49|1 StreamFrame[0(CIB),0,17,fin] 8.341 <- (5) Packet A|5|S0|1efbd722dcac74a4|1332|2 PingFrame[] Padding(1305) 8.361 -> Packet A|5|S0|87c6855ec787cbcace67|34|1 AckFrame[5-4|Δ19] 8.364 <- (6) Packet A|6|S0|1efbd722dcac74a4|33|1 AckFrame[4,2-1|Δ0] 8.364 Cwnd(-): 3000; inflight: 0 8.364 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.364 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 102 millis, based on 8.468/App, because ackElicitingInFlight | RTT:35/12 8.365 -> Packet A|6|S0|87c6855ec787cbcace67|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5-4|Δ0] 8.397 <- (7) Packet A|7|S0|1efbd722dcac74a4|1372|3 AckFrame[6,4|Δ0] PingFrame[] Padding(1338) 8.398 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.417 -> Packet A|7|S0|87c6855ec787cbcace67|34|1 AckFrame[7-6|Δ19] 9.246 <- (8) Packet A|10|S0|1efbd722dcac74a4|1054|1 StreamFrame[0(CIB),0,1024,fin] 9.246 <- (9) Packet A|11|S0|1efbd722dcac74a4|29|2 PingFrame[] Padding(2) 9.247 Finished downloading https://server4:443/loqraigbfh at 50:58.190 on ClientConnection[eb4b8cdc86e162ea/1efbd722dcac74a4(V1) with server4/193.167.100.100:443] 9.247 Closing ClientConnection[eb4b8cdc86e162ea/1efbd722dcac74a4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.247 -> Packet A|8|S0|87c6855ec787cbcace67|35|1 AckFrame[11-10,7-6|Δ0] 9.247 -> Packet A|9|S0|87c6855ec787cbcace67|39|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,7-6|Δ0] 9.248 Creating connection with server4:443 with v1 9.248 Setting up connection for downloading https://server4:443/zvhyghlpzj at 50:58.192 on ClientConnection[1d71059e98e68852/f8dddbfe90317e51(V1) with server4/193.167.100.100:443] 9.248 Original destination connection id: 1d71059e98e68852 (scid: f8dddbfe90317e51) >- CryptoStream[I|ClientHello] 9.250 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.450/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.250 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.450 loss detection timeout handler running Sending probe 0, because no ack since 9.250. Current RTT: 100/25. 9.450 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.450 (Probe is an initial retransmit) 9.451 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.851/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.451 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.484 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 9.485 probe count not reset on ack because handshake not yet confirmed 9.485 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.885/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.484 <- (1) Packet H|1|L|767|1 CryptoFrame[0,719] 9.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 9.682/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.488 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 9.488 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 9.488 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) >- CryptoStream[H|Finished] 9.490 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.491 Starting downloading https://server4:443/zvhyghlpzj at 50:58.434 on ClientConnection[1d71059e98e68852/f8dddbfe90317e51(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 193 millis, based on 9.685/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.490 -> Packet H|0|L|82|1 CryptoFrame[0,36] 9.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.588/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.491 Discarding pn space Initial because first Handshake message is being sent 9.491 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 9.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.588/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.491 -> Packet A|0|S0|4238ef193d471094913a|49|1 StreamFrame[0(CIB),0,17,fin] 9.522 <- (2) Packet H|2|L|49|1 AckFrame[0|Δ0] 9.523 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 9.523 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 9.522 <- (2) Packet A|0|S0|f8dddbfe90317e51|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|653555c14af3e2795bc0|b876a1b25470a2c5dc080656b31c624c] Padding(1226) 9.524 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 9.592/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 68 millis, based on 9.592/App, because ackElicitingInFlight | RTT:33/12 9.524 Discarding pn space Handshake because HandshakeDone is received 9.523 <- (3) Packet A|1|S0|f8dddbfe90317e51|1332|2 PingFrame[] Padding(1305) 9.525 -> Packet A|1|S0|4238ef193d471094913a|33|1 AckFrame[1-0|Δ0] 9.536 <- (4) Packet A|2|S0|f8dddbfe90317e51|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 9.537 Finished downloading https://server4:443/zvhyghlpzj at 50:58.480 on ClientConnection[1d71059e98e68852/f8dddbfe90317e51(V1) with server4/193.167.100.100:443] 9.537 Closing ClientConnection[1d71059e98e68852/f8dddbfe90317e51(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.538 Creating connection with server4:443 with v1 9.538 -> Packet A|2|S0|4238ef193d471094913a|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 9.538 Setting up connection for downloading https://server4:443/gqyrmtvzxs at 50:58.482 on ClientConnection[52a76e0707fb0ef5/a4e68182fd3d1df9(V1) with server4/193.167.100.100:443] 9.538 Original destination connection id: 52a76e0707fb0ef5 (scid: a4e68182fd3d1df9) >- CryptoStream[I|ClientHello] 9.540 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.740/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.540 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.547 <- (5) Packet A|4|S0|f8dddbfe90317e51|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601001c0db89e7fe3aecfe914073870615563c376a6a4a4d20441230ae34954fa6f2fff2d8091] 9.548 -> Packet A|3|S0|4238ef193d471094913a|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 9.569 <- (6) Packet A|5|S0|f8dddbfe90317e51|37|2 AckFrame[2,0|Δ0] ConnectionCloseFrame[0|28|] 9.739 loss detection timeout handler running Sending probe 0, because no ack since 9.540. Current RTT: 100/25. 9.739 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.739 (Probe is an initial retransmit) 9.740 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.140/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.740 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.139 loss detection timeout handler running Sending probe 1, because no ack since 9.740. Current RTT: 100/25. 10.139 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.140 (Probe is an initial retransmit) 10.140 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.940/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.140 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.141 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.941/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.141 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.177 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[3|Δ0] CryptoFrame[0,123] 10.177 probe count not reset on ack because handshake not yet confirmed 10.178 Retransmitting CryptoFrame[0,257] on level Initial 10.178 Cwnd(-): 6000; inflight: 1200 10.178 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 10.177 <- (1) Packet H|0|L|769|1 CryptoFrame[0,721] 10.180 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 10.181 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 10.181 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 10.183 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.183 Starting downloading https://server4:443/gqyrmtvzxs at 50:59.126 on ClientConnection[52a76e0707fb0ef5/a4e68182fd3d1df9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 10.286/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 10.183 Discarding pn space Initial because first Handshake message is being sent 10.184 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 10.287/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 10.184 -> [Packet H|1|L|48|1 AckFrame[0|Δ0], Packet A|0|S0|e24edb55f3915578ad13|49|1 StreamFrame[0(CIB),0,17,fin]] 10.211 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.215 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 10.216 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 10.216 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 10.215 <- (3) Packet A|0|S0|a4e68182fd3d1df9|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|86c1dfc4fe11538f2ec3|faac44090a3f48d3a374211ba059bb4d] Padding(1226) 10.216 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 10.295/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 10.295/App, because ackElicitingInFlight | RTT:35/14 10.217 Discarding pn space Handshake because HandshakeDone is received 10.216 <- (4) Packet A|1|S0|a4e68182fd3d1df9|1332|2 PingFrame[] Padding(1305) 10.217 -> Packet A|1|S0|e24edb55f3915578ad13|33|1 AckFrame[1-0|Δ0] 10.218 <- (5) Packet A|2|S0|a4e68182fd3d1df9|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 10.218 Finished downloading https://server4:443/gqyrmtvzxs at 50:59.162 on ClientConnection[52a76e0707fb0ef5/a4e68182fd3d1df9(V1) with server4/193.167.100.100:443] 10.218 Closing ClientConnection[52a76e0707fb0ef5/a4e68182fd3d1df9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.219 -> Packet A|2|S0|e24edb55f3915578ad13|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 10.219 Creating connection with server4:443 with v1 10.220 Setting up connection for downloading https://server4:443/cbjqyvqrlb at 50:59.163 on ClientConnection[b5b562c896f5f244/777b2bbb7f6d44f1(V1) with server4/193.167.100.100:443] 10.220 Original destination connection id: b5b562c896f5f244 (scid: 777b2bbb7f6d44f1) >- CryptoStream[I|ClientHello] 10.221 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.421/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.221 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.235 <- (6) Packet A|4|S0|a4e68182fd3d1df9|32|1 AckFrame[0|Δ20] 10.236 -> Packet A|3|S0|e24edb55f3915578ad13|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 10.249 <- (7) Packet A|5|S0|a4e68182fd3d1df9|1372|2 PingFrame[] Padding(1345) 10.250 -> Packet A|4|S0|e24edb55f3915578ad13|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 10.421 loss detection timeout handler running Sending probe 0, because no ack since 10.221. Current RTT: 100/25. 10.421 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.421 (Probe is an initial retransmit) 10.421 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.821/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.421 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.554 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[0|Δ300] CryptoFrame[0,123] 10.555 probe count not reset on ack because handshake not yet confirmed 10.555 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.955/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 10.554 <- (1) Packet H|1|L|769|1 CryptoFrame[0,721] 10.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 12.552/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 10.558 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 10.558 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 10.558 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 10.561 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 12.555/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 10.561 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.561 Starting downloading https://server4:443/cbjqyvqrlb at 50:59.505 on ClientConnection[b5b562c896f5f244/777b2bbb7f6d44f1(V1) with server4/193.167.100.100:443] 10.561 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 996 millis, based on 11.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 10.562 Discarding pn space Initial because first Handshake message is being sent 10.561 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 10.562 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 996 millis, based on 11.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 10.562 -> Packet A|0|S0|173fb320674193e0d700|49|1 StreamFrame[0(CIB),0,17,fin] 10.648 <- (2) Packet H|2|L|47|2 PingFrame[] Padding(2) 10.649 -> Packet H|2|L|48|1 AckFrame[2-1|Δ0] 11.213 <- (3) Packet H|4|L|47|2 PingFrame[] Padding(2) 11.214 -> Packet H|3|L|50|1 AckFrame[4,2-1|Δ0] 11.465 <- (4) Packet H|6|L|47|2 PingFrame[] Padding(2) 11.466 -> Packet H|4|L|52|1 AckFrame[6,4,2-1|Δ0] 11.541 <- (5) Packet H|7|L|47|2 PingFrame[] Padding(2) 11.542 -> Packet H|5|L|52|1 AckFrame[7-6,4,2-1|Δ0] 11.558 loss detection timeout handler running Sending probe 0, because no ack since 10.561. Current RTT: 333/166. 11.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.558 (Probe is a handshake retransmit) 11.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1993 millis, based on 13.553/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:333/166 11.559 -> Packet PH|6|L|82|1 CryptoFrame[0,36] 11.591 <- (6) Packet H|8|L|51|1 AckFrame[6-3,1|Δ0] 11.591 probe count not reset on ack because handshake not yet confirmed 11.592 Retransmitting CryptoFrame[0,36] on level Handshake 11.592 Cwnd(-): 6000; inflight: 49 11.592 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 11.592 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 11.592 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 2189 millis, based on 13.782/Handshake, because ackElicitingInFlight | RTT:295/200 11.592 -> Packet H|7|L|82|1 CryptoFrame[0,36] 11.591 <- (6) Packet A|0|S0|777b2bbb7f6d44f1|1281|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|30629d5129a6dd64e762|43f48ba7f9bfc21354f2479b048a3958] Padding(1224) 11.592 State is set to Confirmed reschedule loss detection timer for PTO over 1199 millis, based on 12.792/App, because ackElicitingInFlight | RTT:295/200 reschedule loss detection timer for PTO over 84 millis, based on 11.677/App, because ackElicitingInFlight | RTT:295/200 11.593 Discarding pn space Handshake because HandshakeDone is received 11.592 <- (7) Packet A|1|S0|777b2bbb7f6d44f1|1332|2 PingFrame[] Padding(1305) 11.593 -> Packet A|1|S0|173fb320674193e0d700|33|1 AckFrame[1-0|Δ0] 11.596 <- (8) Packet A|2|S0|777b2bbb7f6d44f1|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100d87bb860073b615039fdfd5033d16a6d4d7133e717e5b2d99200c88adb2deb4881ae939c] -< CryptoStream[A|NewSessionTicket] 11.616 -> Packet A|2|S0|173fb320674193e0d700|34|1 AckFrame[2-0|Δ19] 11.625 <- (9) Packet A|3|S0|777b2bbb7f6d44f1|1372|2 PingFrame[] Padding(1345) 11.646 -> Packet A|3|S0|173fb320674193e0d700|34|1 AckFrame[3-0|Δ19] 11.677 loss detection timeout handler running Sending probe 0, because no ack since 10.562. Current RTT: 295/200. 11.677 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 2229 millis, based on 13.907/App, because ackElicitingInFlight | RTT:295/200 11.677 -> Packet PA|4|S0|173fb320674193e0d700|49|1 StreamFrame[0(CIB),0,17,fin] 11.678 <- (10) Packet A|4|S0|777b2bbb7f6d44f1|1422|2 PingFrame[] Padding(1395) 11.698 -> Packet A|5|S0|173fb320674193e0d700|34|1 AckFrame[4-0|Δ19] 11.730 <- (11) Packet A|6|S0|777b2bbb7f6d44f1|32|1 AckFrame[4-1|Δ21] 11.731 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.731 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1145 millis, based on 12.877/App, because ackElicitingInFlight | RTT:262/216 11.731 -> Packet A|6|S0|173fb320674193e0d700|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4|Δ0] 11.763 <- (12) Packet A|7|S0|777b2bbb7f6d44f1|1452|3 AckFrame[6,4-1|Δ0] PingFrame[] Padding(1418) 11.764 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.783 -> Packet A|7|S0|173fb320674193e0d700|34|1 AckFrame[7-6|Δ19] 11.816 <- (13) Packet A|8|S0|777b2bbb7f6d44f1|1054|1 StreamFrame[0(CIB),0,1024,fin] 11.817 Finished downloading https://server4:443/cbjqyvqrlb at 51:00.760 on ClientConnection[b5b562c896f5f244/777b2bbb7f6d44f1(V1) with server4/193.167.100.100:443] 11.817 Closing ClientConnection[b5b562c896f5f244/777b2bbb7f6d44f1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.817 Creating connection with server4:443 with v1 11.817 -> Packet A|8|S0|173fb320674193e0d700|37|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ0] 11.818 Setting up connection for downloading https://server4:443/bbuqwnsvwa at 51:00.761 on ClientConnection[78ad24207de345f2/191d762f830308aa(V1) with server4/193.167.100.100:443] 11.818 Original destination connection id: 78ad24207de345f2 (scid: 191d762f830308aa) >- CryptoStream[I|ClientHello] 11.820 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.020/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.820 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.848 <- (14) Packet A|9|S0|777b2bbb7f6d44f1|35|2 AckFrame[8-6|Δ0] ConnectionCloseFrame[0|28|] 11.856 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 11.857 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.057/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.856 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 11.860 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.963/Handshake, because peerAwaitingAddressValidation | RTT:35/17 11.859 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 11.860 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 11.860 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 11.863 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.966/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.862 -> Packet H|0|L|82|1 CryptoFrame[0,36] 11.863 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.966/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.863 Discarding pn space Initial because first Handshake message is being sent 11.863 Starting downloading https://server4:443/bbuqwnsvwa at 51:00.806 on ClientConnection[78ad24207de345f2/191d762f830308aa(V1) with server4/193.167.100.100:443] 11.863 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 11.864 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 11.967/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.863 -> Packet A|0|S0|d68d6204d8fe7f877479|49|1 StreamFrame[0(CIB),0,17,fin] 11.966 loss detection timeout handler running Sending probe 0, because no ack since 11.862. Current RTT: 35/17. 11.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.966 (Probe is a handshake retransmit) 11.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 12.172/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 11.966 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 11.999 <- (2) Packet H|1|L|49|1 AckFrame[2|Δ0] 11.999 probe count not reset on ack because handshake not yet confirmed 12.000 Retransmitting CryptoFrame[0,36] on level Handshake 12.000 Cwnd(-): 6000; inflight: 49 12.000 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 12.000 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 12.000 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 181 millis, based on 12.182/Handshake, because ackElicitingInFlight | RTT:35/14 12.000 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[0|Δ0] 11.999 <- (2) Packet A|0|S0|191d762f830308aa|1283|4 AckFrame[0|Δ102] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|87db11036dc9825653cf|ff8f77e6ac1b0238befb2dcd6d1ad083] Padding(1220) reschedule loss detection timer for PTO over 90 millis, based on 12.091/Handshake, because ackElicitingInFlight | RTT:35/14 12.001 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 12.169/Handshake, because ackElicitingInFlight | RTT:45/31 12.001 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.001 Discarding pn space Handshake because HandshakeDone is received 12.007 <- (3) Packet A|2|S0|191d762f830308aa|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 12.008 Finished downloading https://server4:443/bbuqwnsvwa at 51:00.951 on ClientConnection[78ad24207de345f2/191d762f830308aa(V1) with server4/193.167.100.100:443] 12.008 Closing ClientConnection[78ad24207de345f2/191d762f830308aa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.008 -> Packet A|1|S0|d68d6204d8fe7f877479|36|1 AckFrame[2,0|Δ7] 12.009 -> Packet A|2|S0|d68d6204d8fe7f877479|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 12.009 Creating connection with server4:443 with v1 12.010 Setting up connection for downloading https://server4:443/hootbaxxph at 51:00.953 on ClientConnection[61040fb5fce0f11a/bfeb029c3c2a0b73(V1) with server4/193.167.100.100:443] 12.010 Original destination connection id: 61040fb5fce0f11a (scid: bfeb029c3c2a0b73) >- CryptoStream[I|ClientHello] 12.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.211/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.011 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.039 <- (4) Packet A|4|S0|191d762f830308aa|29|2 MaxStreamsFrame[B,17] Padding(1) 12.039 <- (5) Packet A|5|S0|191d762f830308aa|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 12.040 -> Packet A|3|S0|d68d6204d8fe7f877479|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 12.047 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.048 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.248/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.047 <- (1) Packet H|0|L|769|1 CryptoFrame[0,721] 12.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 12.154/Handshake, because peerAwaitingAddressValidation | RTT:35/17 12.050 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 12.051 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 12.051 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 12.054 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 12.157/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 12.054 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.054 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.054 Starting downloading https://server4:443/hootbaxxph at 51:00.998 on ClientConnection[61040fb5fce0f11a/bfeb029c3c2a0b73(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 12.157/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 12.054 Discarding pn space Initial because first Handshake message is being sent 12.054 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 12.055 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 12.158/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 12.055 -> Packet A|0|S0|3fd7fdbff0cc2d31bca7|49|1 StreamFrame[0(CIB),0,17,fin] 12.146 <- (2) Packet H|1|L|47|2 PingFrame[] Padding(2) 12.146 -> Packet H|2|L|48|1 AckFrame[1-0|Δ0] 12.157 loss detection timeout handler running Sending probe 0, because no ack since 12.054. Current RTT: 35/17. 12.157 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.157 (Probe is a handshake retransmit) 12.158 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 12.364/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 12.157 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 12.363 loss detection timeout handler running Sending probe 1, because no ack since 12.055. Current RTT: 35/17. 12.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.363 (Probe is a handshake retransmit) 12.364 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 12.776/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 12.363 -> Packet PH|4|L|82|1 CryptoFrame[0,36] 12.364 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 12.776/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 12.364 -> Packet PH|5|L|82|1 CryptoFrame[0,36] 12.397 <- (3) Packet A|1|S0|bfeb029c3c2a0b73|1332|2 PingFrame[] Padding(1305) 12.398 <- (4) Packet A|2|S0|bfeb029c3c2a0b73|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010002f8f681761390ee60d0387a99fe854159fedd5a82bf28cda5abfecf68e4872103530a97] -< CryptoStream[A|NewSessionTicket] 12.398 -> Packet A|1|S0|3fd7fdbff0cc2d31bca7|33|1 AckFrame[2-1|Δ0] 12.552 <- (5) Packet A|5|S0|bfeb029c3c2a0b73|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5427a318cf9f50ca970e|9c9ed31dc328b381254a8e5da025598e] 12.552 State is set to Confirmed reschedule loss detection timer for PTO over -5 millis, based on 12.547/App, because ackElicitingInFlight | RTT:35/17 12.553 loss detection timeout handler running Sending probe 2, because no ack since 12.055. Current RTT: 35/17. reschedule loss detection timer for PTO over -251 millis, based on 12.301/App, because ackElicitingInFlight | RTT:35/17 12.553 Discarding pn space Handshake because HandshakeDone is received 12.553 (Probe is retransmit on level App) 12.552 <- (6) Packet A|6|S0|bfeb029c3c2a0b73|29|2 PingFrame[] Padding(2) reschedule loss detection timer for PTO over 245 millis, based on 12.799/App, because ackElicitingInFlight | RTT:35/17 12.553 -> Packet PA|2|S0|3fd7fdbff0cc2d31bca7|49|1 StreamFrame[0(CIB),0,17,fin] 12.553 -> Packet A|3|S0|3fd7fdbff0cc2d31bca7|35|1 AckFrame[6-5,2-1|Δ0] 12.690 <- (7) Packet A|8|S0|bfeb029c3c2a0b73|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5427a318cf9f50ca970e|9c9ed31dc328b381254a8e5da025598e] 12.690 <- (8) Packet A|9|S0|bfeb029c3c2a0b73|29|2 PingFrame[] Padding(2) 12.691 -> Packet A|4|S0|3fd7fdbff0cc2d31bca7|37|1 AckFrame[9-8,6-5,2-1|Δ0] 12.722 <- (9) Packet A|10|S0|bfeb029c3c2a0b73|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|5427a318cf9f50ca970e|9c9ed31dc328b381254a8e5da025598e] 12.742 -> Packet A|5|S0|3fd7fdbff0cc2d31bca7|38|1 AckFrame[10-8,6-5,2-1|Δ19] 12.798 loss detection timeout handler running Sending probe 1, because no ack since 12.553. Current RTT: 35/17. 12.798 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 13.291/App, because ackElicitingInFlight | RTT:35/17 12.799 -> Packet PA|6|S0|3fd7fdbff0cc2d31bca7|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 13.292/App, because ackElicitingInFlight | RTT:35/17 12.800 -> Packet PA|7|S0|3fd7fdbff0cc2d31bca7|49|1 StreamFrame[0(CIB),0,17,fin] 12.831 <- (10) Packet A|11|S0|bfeb029c3c2a0b73|1054|1 StreamFrame[0(CIB),0,1024,fin] 12.832 Finished downloading https://server4:443/hootbaxxph at 51:01.775 on ClientConnection[61040fb5fce0f11a/bfeb029c3c2a0b73(V1) with server4/193.167.100.100:443] 12.832 Closing ClientConnection[61040fb5fce0f11a/bfeb029c3c2a0b73(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.832 -> Packet A|8|S0|3fd7fdbff0cc2d31bca7|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-8,6-5,2-1|Δ0] 12.833 Creating connection with server4:443 with v1 12.833 Setting up connection for downloading https://server4:443/wfypvgirpq at 51:01.776 on ClientConnection[cd28b0baf454978b/8958a5113cbe6d4e(V1) with server4/193.167.100.100:443] 12.833 Original destination connection id: cd28b0baf454978b (scid: 8958a5113cbe6d4e) >- CryptoStream[I|ClientHello] 12.835 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.035/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.835 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.864 <- (11) Packet A|13|S0|bfeb029c3c2a0b73|37|2 AckFrame[8-3,1|Δ0] ConnectionCloseFrame[0|28|] 13.034 loss detection timeout handler running Sending probe 0, because no ack since 12.835. Current RTT: 100/25. 13.034 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.034 (Probe is an initial retransmit) 13.035 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.435/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.034 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.434 loss detection timeout handler running Sending probe 1, because no ack since 13.034. Current RTT: 100/25. 13.434 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.434 (Probe is an initial retransmit) 13.435 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.235/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.434 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.435 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.235/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.435 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.471 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[3|Δ0] CryptoFrame[0,123] 13.472 probe count not reset on ack because handshake not yet confirmed 13.472 Retransmitting CryptoFrame[0,257] on level Initial 13.472 Cwnd(-): 6000; inflight: 1200 13.472 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 13.471 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 13.475 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 13.476 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 13.476 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.478 -> Packet H|0|L|82|1 CryptoFrame[0,36] 13.479 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.479 Starting downloading https://server4:443/wfypvgirpq at 51:02.422 on ClientConnection[cd28b0baf454978b/8958a5113cbe6d4e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 13.582/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 13.479 Discarding pn space Initial because first Handshake message is being sent 13.479 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 13.479 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 13.582/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 13.479 -> Packet A|0|S0|94f282cfa5f8c27efeee|49|1 StreamFrame[0(CIB),0,17,fin] 13.513 <- (2) Packet A|2|S0|8958a5113cbe6d4e|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 13.515 Finished downloading https://server4:443/wfypvgirpq at 51:02.458 on ClientConnection[cd28b0baf454978b/8958a5113cbe6d4e(V1) with server4/193.167.100.100:443] 13.515 Closing ClientConnection[cd28b0baf454978b/8958a5113cbe6d4e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.515 -> Packet A|1|S0|94f282cfa5f8c27efeee|37|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 13.516 Creating connection with server4:443 with v1 13.516 Setting up connection for downloading https://server4:443/mndjquzjng at 51:02.459 on ClientConnection[d5b080a525b9060c/5bfc2095a7e333d4(V1) with server4/193.167.100.100:443] 13.516 Original destination connection id: d5b080a525b9060c (scid: 5bfc2095a7e333d4) >- CryptoStream[I|ClientHello] 13.518 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.718/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.518 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.532 <- (3) Packet A|4|S0|8958a5113cbe6d4e|32|1 AckFrame[0|Δ21] 13.532 -> Packet A|2|S0|94f282cfa5f8c27efeee|37|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 13.553 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.554 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.754/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.553 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 13.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 13.660/Handshake, because peerAwaitingAddressValidation | RTT:35/17 13.557 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 13.557 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 13.557 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 13.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 13.662/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 13.559 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.560 Starting downloading https://server4:443/mndjquzjng at 51:02.503 on ClientConnection[d5b080a525b9060c/5bfc2095a7e333d4(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 13.663/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 13.560 Discarding pn space Initial because first Handshake message is being sent 13.560 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 13.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 13.663/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 13.560 -> Packet A|0|S0|5b14167ff25d9160b0fa|49|1 StreamFrame[0(CIB),0,17,fin] 13.662 loss detection timeout handler running Sending probe 0, because no ack since 13.559. Current RTT: 35/17. 13.662 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.663 (Probe is a handshake retransmit) 13.663 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 13.869/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 13.663 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 13.695 <- (2) Packet H|1|L|49|1 AckFrame[2|Δ0] 13.696 probe count not reset on ack because handshake not yet confirmed 13.696 Retransmitting CryptoFrame[0,36] on level Handshake 13.696 Cwnd(-): 6000; inflight: 49 13.696 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 13.696 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 13.697 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 181 millis, based on 13.878/Handshake, because ackElicitingInFlight | RTT:35/14 13.696 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[0|Δ0] 13.695 <- (2) Packet A|0|S0|5bfc2095a7e333d4|1283|4 AckFrame[0|Δ102] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|04f8e780b51abd7ef183|5b65ee429db98990e28281de75de8b02] Padding(1220) reschedule loss detection timer for PTO over 90 millis, based on 13.787/Handshake, because ackElicitingInFlight | RTT:35/14 13.697 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 13.865/Handshake, because ackElicitingInFlight | RTT:45/31 13.697 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.697 Discarding pn space Handshake because HandshakeDone is received 13.696 <- (3) Packet A|1|S0|5bfc2095a7e333d4|1332|2 PingFrame[] Padding(1305) 13.698 -> Packet A|1|S0|5b14167ff25d9160b0fa|33|1 AckFrame[1-0|Δ0] 13.711 <- (4) Packet A|3|S0|5bfc2095a7e333d4|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601004b112a18d4423d157bec5dab8d601dbdf8c30b41c348b0519aaca2fbc363d571dc2dbb08] -< CryptoStream[A|] 13.731 -> Packet A|2|S0|5b14167ff25d9160b0fa|36|1 AckFrame[3,1-0|Δ19] 14.170 <- (5) Packet A|4|S0|5bfc2095a7e333d4|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|04f8e780b51abd7ef183|5b65ee429db98990e28281de75de8b02] 14.190 -> Packet A|3|S0|5b14167ff25d9160b0fa|36|1 AckFrame[4-3,1-0|Δ19] 14.222 <- (6) Packet A|6|S0|5bfc2095a7e333d4|1372|4 PingFrame[] StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] Padding(139) -< CryptoStream[A|NewSessionTicket] 14.223 Finished downloading https://server4:443/mndjquzjng at 51:03.166 on ClientConnection[d5b080a525b9060c/5bfc2095a7e333d4(V1) with server4/193.167.100.100:443] 14.223 Closing ClientConnection[d5b080a525b9060c/5bfc2095a7e333d4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.223 -> Packet A|4|S0|5b14167ff25d9160b0fa|41|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-3,1-0|Δ0] 14.224 Creating connection with server4:443 with v1 14.224 Setting up connection for downloading https://server4:443/ugzkflmlqd at 51:03.168 on ClientConnection[70e953991e401f17/d6f36abafc1e91c1(V1) with server4/193.167.100.100:443] 14.224 Original destination connection id: 70e953991e401f17 (scid: d6f36abafc1e91c1) >- CryptoStream[I|ClientHello] 14.226 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.426/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.226 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.255 <- (7) Packet A|7|S0|5bfc2095a7e333d4|35|2 AckFrame[4-3|Δ0] ConnectionCloseFrame[0|28|] 14.425 loss detection timeout handler running Sending probe 0, because no ack since 14.226. Current RTT: 100/25. 14.425 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.425 (Probe is an initial retransmit) 14.426 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.826/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.425 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.760 <- (1) Packet I|2|L|180|2 Token=[] AckFrame[1-0|Δ300] CryptoFrame[0,123] 14.760 probe count not reset on ack because handshake not yet confirmed 14.761 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.161/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.760 <- (1) Packet H|2|L|768|1 CryptoFrame[0,720] 14.763 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 16.767/Handshake, because peerAwaitingAddressValidation | RTT:334/167 14.763 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 14.763 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 14.763 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1151) >- CryptoStream[H|Finished] 14.765 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 16.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 14.765 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.766 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.766 Starting downloading https://server4:443/ugzkflmlqd at 51:03.709 on ClientConnection[70e953991e401f17/d6f36abafc1e91c1(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 1001 millis, based on 15.768/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 14.766 Discarding pn space Initial because first Handshake message is being sent 14.766 -> Packet H|1|L|48|1 AckFrame[2|Δ0] 14.766 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 15.768/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 14.766 -> Packet A|0|S0|982f59ab7a7602a8eebe|49|1 StreamFrame[0(CIB),0,17,fin] 14.853 <- (2) Packet H|3|L|47|2 PingFrame[] Padding(2) 14.854 -> Packet H|2|L|48|1 AckFrame[3-2|Δ0] 15.105 <- (3) Packet H|5|L|47|2 PingFrame[] Padding(2) 15.106 -> Packet H|3|L|50|1 AckFrame[5,3-2|Δ0] 15.181 <- (4) Packet H|6|L|47|2 PingFrame[] Padding(2) 15.182 -> Packet H|4|L|50|1 AckFrame[6-5,3-2|Δ0] 15.332 <- (5) Packet H|7|L|47|2 PingFrame[] Padding(2) 15.333 -> Packet H|5|L|50|1 AckFrame[7-5,3-2|Δ0] 15.539 <- (6) Packet H|9|L|47|2 PingFrame[] Padding(2) 15.539 -> Packet H|6|L|52|1 AckFrame[9,7-5,3-2|Δ0] 15.603 <- (7) Packet H|10|L|47|2 PingFrame[] Padding(2) 15.604 -> Packet H|7|L|52|1 AckFrame[10-9,7-5,3-2|Δ0] 15.662 <- (8) Packet H|11|L|47|2 PingFrame[] Padding(2) 15.662 -> Packet H|8|L|52|1 AckFrame[11-9,7-5,3-2|Δ0] 15.717 <- (9) Packet H|12|L|47|2 PingFrame[] Padding(2) 15.718 -> Packet H|9|L|52|1 AckFrame[12-9,7-5,3-2|Δ0] 15.767 loss detection timeout handler running Sending probe 0, because no ack since 14.765. Current RTT: 334/167. 15.767 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.767 (Probe is a handshake retransmit) 15.768 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 17.772/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 15.768 -> Packet PH|10|L|82|1 CryptoFrame[0,36] 15.769 <- (10) Packet H|13|L|47|2 PingFrame[] Padding(2) 15.769 -> Packet H|11|L|52|1 AckFrame[13-9,7-5,3-2|Δ0] 15.807 <- (11) Packet A|2|S0|d6f36abafc1e91c1|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 15.808 Finished downloading https://server4:443/ugzkflmlqd at 51:04.751 on ClientConnection[70e953991e401f17/d6f36abafc1e91c1(V1) with server4/193.167.100.100:443] 15.808 Closing ClientConnection[70e953991e401f17/d6f36abafc1e91c1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.809 Creating connection with server4:443 with v1 15.809 -> Packet A|1|S0|982f59ab7a7602a8eebe|37|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 15.810 Setting up connection for downloading https://server4:443/lhpmrysedd at 51:04.753 on ClientConnection[628a55cdeb25e891/76be5a205ea30e17(V1) with server4/193.167.100.100:443] 15.810 Original destination connection id: 628a55cdeb25e891 (scid: 76be5a205ea30e17) >- CryptoStream[I|ClientHello] 15.811 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.011/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.811 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.840 <- (12) Packet A|4|S0|d6f36abafc1e91c1|35|2 AckFrame[1-0|Δ0] ConnectionCloseFrame[0|28|] 16.010 loss detection timeout handler running Sending probe 0, because no ack since 15.811. Current RTT: 100/25. 16.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.011 (Probe is an initial retransmit) 16.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.411/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.011 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.145 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[0|Δ301] CryptoFrame[0,123] 16.146 probe count not reset on ack because handshake not yet confirmed 16.146 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.546/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 16.145 <- (1) Packet H|1|L|768|1 CryptoFrame[0,720] 16.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 18.153/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 16.149 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 16.149 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 16.149 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) >- CryptoStream[H|Finished] 16.151 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 18.155/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 16.151 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.152 Starting downloading https://server4:443/lhpmrysedd at 51:05.095 on ClientConnection[628a55cdeb25e891/76be5a205ea30e17(V1) with server4/193.167.100.100:443] 16.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 17.154/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 16.152 Discarding pn space Initial because first Handshake message is being sent 16.152 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 16.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 17.154/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 16.152 -> Packet A|0|S0|f87b454b6297caa93fd7|49|1 StreamFrame[0(CIB),0,17,fin] 16.181 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 17.153 loss detection timeout handler running Sending probe 0, because no ack since 16.151. Current RTT: 334/167. 17.154 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.154 (Probe is a handshake retransmit) 17.154 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 19.158/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 17.154 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 17.187 <- (3) Packet H|5|L|49|1 AckFrame[2-1|Δ0] 17.187 probe count not reset on ack because handshake not yet confirmed 17.187 Retransmitting CryptoFrame[0,36] on level Handshake 17.187 Cwnd(-): 6000; inflight: 49 17.187 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 17.188 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 17.188 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 2199 millis, based on 19.388/Handshake, because ackElicitingInFlight | RTT:296/201 17.188 -> Packet H|3|L|82|1 CryptoFrame[0,36] 17.187 <- (3) Packet A|0|S0|76be5a205ea30e17|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|d9216b72730922c50e21|fdd020f3da7cf57c10e48f105199b0c1] Padding(1226) 17.188 State is set to Confirmed reschedule loss detection timer for PTO over 1204 millis, based on 18.392/App, because ackElicitingInFlight | RTT:296/201 reschedule loss detection timer for PTO over 84 millis, based on 17.272/App, because ackElicitingInFlight | RTT:296/201 17.188 Discarding pn space Handshake because HandshakeDone is received 17.208 -> Packet A|1|S0|f87b454b6297caa93fd7|34|1 AckFrame[0|Δ19] 17.272 loss detection timeout handler running Sending probe 0, because no ack since 16.152. Current RTT: 296/201. 17.273 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 2239 millis, based on 19.513/App, because ackElicitingInFlight | RTT:296/201 17.273 -> Packet PA|2|S0|f87b454b6297caa93fd7|49|1 StreamFrame[0(CIB),0,17,fin] 17.305 <- (4) Packet A|3|S0|76be5a205ea30e17|1054|1 StreamFrame[0(CIB),0,1024,fin] 17.306 Finished downloading https://server4:443/lhpmrysedd at 51:06.249 on ClientConnection[628a55cdeb25e891/76be5a205ea30e17(V1) with server4/193.167.100.100:443] 17.306 Closing ClientConnection[628a55cdeb25e891/76be5a205ea30e17(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.307 Creating connection with server4:443 with v1 17.307 -> Packet A|3|S0|f87b454b6297caa93fd7|39|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 17.307 Setting up connection for downloading https://server4:443/exzqaepdbu at 51:06.251 on ClientConnection[659b2b5094bf26f7/4b30345ad3feb749(V1) with server4/193.167.100.100:443] 17.307 Original destination connection id: 659b2b5094bf26f7 (scid: 4b30345ad3feb749) >- CryptoStream[I|ClientHello] 17.309 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.509/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.309 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.508 loss detection timeout handler running Sending probe 0, because no ack since 17.309. Current RTT: 100/25. 17.508 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.509 (Probe is an initial retransmit) 17.509 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.909/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.509 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.908 loss detection timeout handler running Sending probe 1, because no ack since 17.509. Current RTT: 100/25. 17.908 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.908 (Probe is an initial retransmit) 17.909 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.709/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.909 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.710/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.910 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.945 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[3|Δ0] CryptoFrame[0,123] 17.946 probe count not reset on ack because handshake not yet confirmed 17.946 Retransmitting CryptoFrame[0,257] on level Initial 17.946 Cwnd(-): 6000; inflight: 1200 17.946 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 17.945 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 17.948 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 17.949 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 17.949 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 17.951 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.951 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.951 Starting downloading https://server4:443/exzqaepdbu at 51:06.894 on ClientConnection[659b2b5094bf26f7/4b30345ad3feb749(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 18.054/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.951 Discarding pn space Initial because first Handshake message is being sent 17.951 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 17.952 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 18.055/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 17.952 -> Packet A|0|S0|952d15b428fe31b425b9|49|1 StreamFrame[0(CIB),0,17,fin] 17.986 <- (2) Packet A|2|S0|4b30345ad3feb749|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 17.986 <- (3) Packet A|3|S0|4b30345ad3feb749|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601005d1c1de3e09489f4d14976adfeac21e40e94e81781d65f7f80a631f1f6034e613bb64dfc] 17.987 Finished downloading https://server4:443/exzqaepdbu at 51:06.930 on ClientConnection[659b2b5094bf26f7/4b30345ad3feb749(V1) with server4/193.167.100.100:443] -< CryptoStream[A|NewSessionTicket] 17.987 Closing ClientConnection[659b2b5094bf26f7/4b30345ad3feb749(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.987 -> Packet A|1|S0|952d15b428fe31b425b9|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 17.987 Creating connection with server4:443 with v1 17.988 Setting up connection for downloading https://server4:443/tbcsclxdse at 51:06.931 on ClientConnection[6e9b5985fae0382a/066982a0158fe079(V1) with server4/193.167.100.100:443] 17.988 Original destination connection id: 6e9b5985fae0382a (scid: 066982a0158fe079) >- CryptoStream[I|ClientHello] 17.990 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.190/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.990 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.018 <- (4) Packet A|5|S0|4b30345ad3feb749|35|2 AckFrame[1-0|Δ0] ConnectionCloseFrame[0|28|] 18.025 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18.026 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.226/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.025 <- (1) Packet H|0|L|769|1 CryptoFrame[0,721] 18.029 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 18.132/Handshake, because peerAwaitingAddressValidation | RTT:35/17 18.029 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 18.029 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 18.028 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 18.031 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 18.134/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 18.031 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.032 Starting downloading https://server4:443/tbcsclxdse at 51:06.975 on ClientConnection[6e9b5985fae0382a/066982a0158fe079(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 18.135/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 18.032 Discarding pn space Initial because first Handshake message is being sent 18.032 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 18.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 18.135/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 18.032 -> Packet A|0|S0|971df82ff9869996d38d|49|1 StreamFrame[0(CIB),0,17,fin] 18.063 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 18.064 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 18.064 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 18.063 <- (2) Packet A|0|S0|066982a0158fe079|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|f3ff2c060d2ed542f662|ccbc58fafcf295d66fb65aea600b8ec4] Padding(1226) 18.064 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 18.143/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 18.143/App, because ackElicitingInFlight | RTT:35/14 18.064 Discarding pn space Handshake because HandshakeDone is received 18.066 <- (3) Packet A|2|S0|066982a0158fe079|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 18.066 <- (4) Packet A|3|S0|066982a0158fe079|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601007732c6f16edf15e02e7be4a440cf10e13d6b81867996c003be99bf32f1c84891b4e87b86] 18.067 Finished downloading https://server4:443/tbcsclxdse at 51:07.010 on ClientConnection[6e9b5985fae0382a/066982a0158fe079(V1) with server4/193.167.100.100:443] 18.067 Closing ClientConnection[6e9b5985fae0382a/066982a0158fe079(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) -< CryptoStream[A|NewSessionTicket] 18.067 -> Packet A|1|S0|971df82ff9869996d38d|36|1 AckFrame[2,0|Δ2] 18.068 Creating connection with server4:443 with v1 18.068 -> Packet A|2|S0|971df82ff9869996d38d|39|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 18.068 Setting up connection for downloading https://server4:443/sfdhcyoftg at 51:07.011 on ClientConnection[c9cf1aa90b45e150/9a91730a1086532c(V1) with server4/193.167.100.100:443] 18.068 Original destination connection id: c9cf1aa90b45e150 (scid: 9a91730a1086532c) >- CryptoStream[I|ClientHello] 18.070 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.270/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.070 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.084 <- (5) Packet A|4|S0|066982a0158fe079|32|1 AckFrame[0|Δ20] 18.084 -> Packet A|3|S0|971df82ff9869996d38d|39|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 18.098 <- (6) Packet A|5|S0|066982a0158fe079|29|2 MaxStreamsFrame[B,17] Padding(1) 18.098 -> Packet A|4|S0|971df82ff9869996d38d|39|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 18.107 <- (7) Packet A|6|S0|066982a0158fe079|1332|2 PingFrame[] Padding(1305) 18.269 loss detection timeout handler running Sending probe 0, because no ack since 18.070. Current RTT: 100/25. 18.269 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.269 (Probe is an initial retransmit) 18.270 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.670/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.270 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.604 <- (1) Packet I|2|L|180|2 Token=[] AckFrame[1-0|Δ300] CryptoFrame[0,123] 18.605 probe count not reset on ack because handshake not yet confirmed 18.605 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.005/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.604 <- (1) Packet H|2|L|768|1 CryptoFrame[0,720] 18.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 20.611/Handshake, because peerAwaitingAddressValidation | RTT:334/167 18.608 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 18.608 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 18.607 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1151) >- CryptoStream[H|Finished] 18.610 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 20.614/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.610 -> Packet H|0|L|82|1 CryptoFrame[0,36] 18.611 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 19.613/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 18.611 Discarding pn space Initial because first Handshake message is being sent 18.611 -> Packet H|1|L|48|1 AckFrame[2|Δ0] 18.611 Starting downloading https://server4:443/sfdhcyoftg at 51:07.554 on ClientConnection[c9cf1aa90b45e150/9a91730a1086532c(V1) with server4/193.167.100.100:443] 18.611 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 19.613/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 18.611 -> Packet A|0|S0|12b398a76a3b46404ccb|49|1 StreamFrame[0(CIB),0,17,fin] 19.374 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.613 loss detection timeout handler running Sending probe 0, because no ack since 18.610. Current RTT: 334/167. 19.613 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.613 (Probe is a handshake retransmit) 19.613 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 21.617/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 19.613 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 19.646 <- (3) Packet H|6|L|773|2 AckFrame[2|Δ0] CryptoFrame[0,720] 19.646 probe count not reset on ack because handshake not yet confirmed 19.646 Retransmitting CryptoFrame[0,36] on level Handshake 19.647 Cwnd(-): 6000; inflight: 49 19.647 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 19.647 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.647 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 2199 millis, based on 21.847/Handshake, because ackElicitingInFlight | RTT:296/201 19.646 <- (3) Packet A|0|S0|9a91730a1086532c|559|4 AckFrame[0|Δ1002] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|95f72712bf5eeffa1acb|33c6614311d886185dcf92c7a087feba] Padding(494) 19.647 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[2|Δ0] reschedule loss detection timer for PTO over 1099 millis, based on 20.747/Handshake, because ackElicitingInFlight | RTT:296/201 19.647 State is set to Confirmed reschedule loss detection timer for PTO over 1705 millis, based on 21.353/Handshake, because ackElicitingInFlight | RTT:386/330 19.648 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.648 Discarding pn space Handshake because HandshakeDone is received 19.647 -> Packet H|4|L|50|1 AckFrame[6,2|Δ0] 19.647 <- (4) Packet A|1|S0|9a91730a1086532c|1332|2 PingFrame[] Padding(1305) 19.648 -> Packet A|1|S0|12b398a76a3b46404ccb|33|1 AckFrame[1-0|Δ0] 19.784 <- (5) Packet A|4|S0|9a91730a1086532c|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|95f72712bf5eeffa1acb|33c6614311d886185dcf92c7a087feba] 19.784 <- (6) Packet A|5|S0|9a91730a1086532c|29|2 PingFrame[] Padding(2) 19.785 -> Packet A|2|S0|12b398a76a3b46404ccb|35|1 AckFrame[5-4,1-0|Δ0] 19.817 <- (7) Packet A|7|S0|9a91730a1086532c|71|1 NewTokenFrame[ad9a8b8d86010049c326a8c041141e4807effbaee0b3b05ff5f40f1a2996253cb8e3b6c97a7fc2f9aa529b] 19.837 -> Packet A|3|S0|12b398a76a3b46404ccb|38|1 AckFrame[7,5-4,1-0|Δ19] 20.196 <- (8) Packet A|11|S0|9a91730a1086532c|1332|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,274] -< CryptoStream[A|] 20.197 Finished downloading https://server4:443/sfdhcyoftg at 51:09.140 on ClientConnection[c9cf1aa90b45e150/9a91730a1086532c(V1) with server4/193.167.100.100:443] 20.197 Closing ClientConnection[c9cf1aa90b45e150/9a91730a1086532c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.197 Creating connection with server4:443 with v1 20.197 -> Packet A|4|S0|12b398a76a3b46404ccb|43|2 ConnectionCloseFrame[0|0|] AckFrame[11,7,5-4,1-0|Δ0] 20.198 Setting up connection for downloading https://server4:443/fhaanqbvvm at 51:09.141 on ClientConnection[e2980bad04e43ac9/47d818677a5031a4(V1) with server4/193.167.100.100:443] 20.198 Original destination connection id: e2980bad04e43ac9 (scid: 47d818677a5031a4) >- CryptoStream[I|ClientHello] 20.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.399/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.199 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.399 loss detection timeout handler running Sending probe 0, because no ack since 20.199. Current RTT: 100/25. 20.399 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.399 (Probe is an initial retransmit) 20.399 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.799/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.399 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.432 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 20.433 probe count not reset on ack because handshake not yet confirmed 20.433 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.833/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.432 <- (1) Packet H|1|L|768|1 CryptoFrame[0,720] 20.436 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.630/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.436 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 20.436 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 20.436 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 20.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.632/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.438 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.439 Starting downloading https://server4:443/fhaanqbvvm at 51:09.382 on ClientConnection[e2980bad04e43ac9/47d818677a5031a4(V1) with server4/193.167.100.100:443] 20.439 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.536/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.439 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 20.439 Discarding pn space Initial because first Handshake message is being sent 20.439 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.536/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.439 -> Packet A|0|S0|55f5660f0a164b47a5d7|49|1 StreamFrame[0(CIB),0,17,fin] 20.468 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.535 loss detection timeout handler running Sending probe 0, because no ack since 20.438. Current RTT: 33/16. 20.535 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.535 (Probe is a handshake retransmit) 20.536 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.730/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.536 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 20.568 <- (3) Packet H|3|L|49|1 AckFrame[2|Δ0] 20.569 probe count not reset on ack because handshake not yet confirmed 20.569 Retransmitting CryptoFrame[0,36] on level Handshake 20.569 Cwnd(-): 6000; inflight: 49 20.569 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 20.569 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 20.569 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 161 millis, based on 20.731/Handshake, because ackElicitingInFlight | RTT:33/12 20.569 -> Packet H|3|L|87|2 CryptoFrame[0,36] AckFrame[1|Δ0] 20.568 <- (3) Packet A|0|S0|47d818677a5031a4|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|ecd786e63160b0be52f6|a204f449a455a77deb621234624d0367] Padding(1226) 20.569 State is set to Confirmed reschedule loss detection timer for PTO over 71 millis, based on 20.641/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over -29 millis, based on 20.540/App, because ackElicitingInFlight | RTT:33/12 20.570 Discarding pn space Handshake because HandshakeDone is received 20.570 loss detection timeout handler running Sending probe 0, because no ack since 20.439. Current RTT: 33/12. 20.570 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 201 millis, based on 20.772/App, because ackElicitingInFlight | RTT:33/12 20.570 -> Packet PA|1|S0|55f5660f0a164b47a5d7|49|1 StreamFrame[0(CIB),0,17,fin] 20.571 <- (4) Packet A|2|S0|47d818677a5031a4|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010081cab2d586080ee80f5b5057ab9bcc32a0d391895a1a4a7c0965d3c0616c10827a44a860] -< CryptoStream[A|NewSessionTicket] 20.571 -> Packet A|2|S0|55f5660f0a164b47a5d7|36|1 AckFrame[2,0|Δ1] 20.601 <- (5) Packet A|3|S0|47d818677a5031a4|31|1 AckFrame[1|Δ0] 20.602 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.602 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 92 millis, based on 20.695/App, because ackElicitingInFlight | RTT:33/10 20.602 -> Packet A|3|S0|55f5660f0a164b47a5d7|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2,0|Δ0] 20.602 <- (6) Packet A|4|S0|47d818677a5031a4|1054|1 StreamFrame[0(CIB),0,1024,fin] 20.602 Finished downloading https://server4:443/fhaanqbvvm at 51:09.546 on ClientConnection[e2980bad04e43ac9/47d818677a5031a4(V1) with server4/193.167.100.100:443] 20.602 Closing ClientConnection[e2980bad04e43ac9/47d818677a5031a4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.603 -> Packet A|4|S0|55f5660f0a164b47a5d7|39|2 ConnectionCloseFrame[0|0|] AckFrame[4-2,0|Δ0] 20.603 Creating connection with server4:443 with v1 20.604 Setting up connection for downloading https://server4:443/wgawpgcfnq at 51:09.547 on ClientConnection[fe28d374be3b0682/82e3074c95c6018a(V1) with server4/193.167.100.100:443] 20.604 Original destination connection id: fe28d374be3b0682 (scid: 82e3074c95c6018a) >- CryptoStream[I|ClientHello] 20.605 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.805/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.605 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.629 <- (9) Packet A|13|S0|9a91730a1086532c|1332|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,274] 20.630 -> Packet A|5|S0|12b398a76a3b46404ccb|43|2 ConnectionCloseFrame[0|0|] AckFrame[11,7,5-4,1-0|Δ0] 20.634 <- (7) Packet A|5|S0|47d818677a5031a4|35|2 AckFrame[4|Δ0] ConnectionCloseFrame[0|28|] 20.805 loss detection timeout handler running Sending probe 0, because no ack since 20.605. Current RTT: 100/25. 20.805 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.805 (Probe is an initial retransmit) 20.805 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.205/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.805 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.838 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 20.839 probe count not reset on ack because handshake not yet confirmed 20.839 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.239/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.838 <- (1) Packet H|1|L|768|1 CryptoFrame[0,720] 20.842 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.036/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.842 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 20.843 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 20.843 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 20.845 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.039/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.845 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.845 Starting downloading https://server4:443/wgawpgcfnq at 51:09.788 on ClientConnection[fe28d374be3b0682/82e3074c95c6018a(V1) with server4/193.167.100.100:443] 20.845 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.942/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.845 Discarding pn space Initial because first Handshake message is being sent 20.845 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 20.846 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.943/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.846 -> Packet A|0|S0|642bf78b68f65b3a9c04|49|1 StreamFrame[0(CIB),0,17,fin] 20.942 loss detection timeout handler running Sending probe 0, because no ack since 20.845. Current RTT: 33/16. 20.942 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.942 (Probe is a handshake retransmit) 20.943 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.137/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.943 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 21.136 loss detection timeout handler running Sending probe 1, because no ack since 20.846. Current RTT: 33/16. 21.136 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.136 (Probe is a handshake retransmit) 21.137 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.525/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.136 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 21.137 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.525/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.137 -> Packet PH|4|L|82|1 CryptoFrame[0,36] 21.525 loss detection timeout handler running Sending probe 2, because no ack since 20.846. Current RTT: 33/16. 21.525 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.525 (Probe is a handshake retransmit) 21.525 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 22.301/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.525 -> Packet PH|5|L|82|1 CryptoFrame[0,36] 21.526 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 22.302/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.526 -> Packet PH|6|L|82|1 CryptoFrame[0,36] 21.558 <- (2) Packet H|2|L|51|1 AckFrame[5,1|Δ0] 21.559 probe count not reset on ack because handshake not yet confirmed 21.559 Retransmitting CryptoFrame[0,36] on level Handshake 21.559 Cwnd(-): 6000; inflight: 131 21.559 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 742 millis, based on 22.302/Handshake, because ackElicitingInFlight | RTT:33/16 21.559 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 647 millis, based on 22.207/Handshake, because ackElicitingInFlight | RTT:33/12 21.559 -> Packet H|7|L|82|1 CryptoFrame[0,36] 21.558 <- (2) Packet A|0|S0|82e3074c95c6018a|1281|4 AckFrame[0|Δ679] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c140aa4f6c52c6fd48a6|043f45eef0e43bbb07133ccd9388e505] Padding(1216) reschedule loss detection timer for PTO over 80 millis, based on 21.640/Handshake, because ackElicitingInFlight | RTT:33/12 21.560 State is set to Confirmed reschedule loss detection timer for PTO over 810 millis, based on 22.370/Handshake, because ackElicitingInFlight | RTT:115/174 21.560 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.560 Discarding pn space Handshake because HandshakeDone is received 21.559 <- (3) Packet A|1|S0|82e3074c95c6018a|1332|2 PingFrame[] Padding(1305) 21.560 -> Packet A|1|S0|642bf78b68f65b3a9c04|33|1 AckFrame[1-0|Δ0] 21.574 <- (4) Packet A|2|S0|82e3074c95c6018a|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 21.575 Finished downloading https://server4:443/wgawpgcfnq at 51:10.519 on ClientConnection[fe28d374be3b0682/82e3074c95c6018a(V1) with server4/193.167.100.100:443] 21.575 Closing ClientConnection[fe28d374be3b0682/82e3074c95c6018a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.576 -> Packet A|2|S0|642bf78b68f65b3a9c04|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 21.576 Creating connection with server4:443 with v1 21.577 Setting up connection for downloading https://server4:443/gqahcdofei at 51:10.520 on ClientConnection[38b799003efd6ef5/9a2d8f4f1c3e26fa(V1) with server4/193.167.100.100:443] 21.577 Original destination connection id: 38b799003efd6ef5 (scid: 9a2d8f4f1c3e26fa) >- CryptoStream[I|ClientHello] 21.578 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.778/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.578 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.607 <- (5) Packet A|5|S0|82e3074c95c6018a|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 21.778 loss detection timeout handler running Sending probe 0, because no ack since 21.578. Current RTT: 100/25. 21.778 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.778 (Probe is an initial retransmit) 21.778 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.178/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.778 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.811 <- (1) Packet I|1|L|177|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 21.812 probe count not reset on ack because handshake not yet confirmed 21.812 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.212/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.811 <- (1) Packet H|1|L|769|1 CryptoFrame[0,721] 21.815 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.009/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.815 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) 21.815 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 21.815 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 21.818 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.012/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.818 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.818 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.818 Starting downloading https://server4:443/gqahcdofei at 51:10.761 on ClientConnection[38b799003efd6ef5/9a2d8f4f1c3e26fa(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 21.915/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.818 Discarding pn space Initial because first Handshake message is being sent 21.818 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 21.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.818 -> Packet A|0|S0|a53ace691c2933945a63|49|1 StreamFrame[0(CIB),0,17,fin] 21.847 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.850 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 21.850 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 21.850 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.850 <- (3) Packet A|0|S0|9a2d8f4f1c3e26fa|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|6feae9a1fae5d3ab3d8e|62353bae911c042747ec036fd83f65f6] Padding(1226) 21.850 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 21.919/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 68 millis, based on 21.919/App, because ackElicitingInFlight | RTT:33/12 21.851 Discarding pn space Handshake because HandshakeDone is received 21.851 <- (4) Packet A|1|S0|9a2d8f4f1c3e26fa|1332|2 PingFrame[] Padding(1305) 21.851 -> Packet A|1|S0|a53ace691c2933945a63|33|1 AckFrame[1-0|Δ0] 21.854 <- (5) Packet A|2|S0|9a2d8f4f1c3e26fa|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 21.854 Finished downloading https://server4:443/gqahcdofei at 51:10.798 on ClientConnection[38b799003efd6ef5/9a2d8f4f1c3e26fa(V1) with server4/193.167.100.100:443] 21.854 Closing ClientConnection[38b799003efd6ef5/9a2d8f4f1c3e26fa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.855 -> Packet A|2|S0|a53ace691c2933945a63|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 21.855 Creating connection with server4:443 with v1 21.856 Setting up connection for downloading https://server4:443/sdbajzrmpm at 51:10.799 on ClientConnection[7243edb444d2083f/db11377a1c585f70(V1) with server4/193.167.100.100:443] 21.856 Original destination connection id: 7243edb444d2083f (scid: db11377a1c585f70) >- CryptoStream[I|ClientHello] 21.857 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.057/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.857 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.883 <- (6) Packet A|5|S0|9a2d8f4f1c3e26fa|1372|2 PingFrame[] Padding(1345) 21.884 -> Packet A|3|S0|a53ace691c2933945a63|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 21.886 <- (7) Packet A|6|S0|9a2d8f4f1c3e26fa|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 21.893 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.893 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.093/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.893 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 21.896 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.896 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 21.896 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) reschedule loss detection timer for PTO over 102 millis, based on 21.999/Handshake, because peerAwaitingAddressValidation | RTT:35/17 21.896 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 21.899 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 22.002/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 21.899 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.900 Starting downloading https://server4:443/sdbajzrmpm at 51:10.843 on ClientConnection[7243edb444d2083f/db11377a1c585f70(V1) with server4/193.167.100.100:443] 21.900 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 21.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 22.003/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 21.900 Discarding pn space Initial because first Handshake message is being sent 21.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 22.003/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 21.900 -> Packet A|0|S0|4d51b76baa270d3f3f43|49|1 StreamFrame[0(CIB),0,17,fin] 21.932 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 21.932 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 21.932 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 21.932 <- (2) Packet A|0|S0|db11377a1c585f70|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|9df698899476d4885a9b|6a7f738e5e43e908376105aaa07d5e9b] Padding(1226) 21.933 State is set to Confirmed reschedule loss detection timer for PTO over 77 millis, based on 22.011/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 77 millis, based on 22.011/App, because ackElicitingInFlight | RTT:35/14 21.933 Discarding pn space Handshake because HandshakeDone is received 21.933 <- (3) Packet A|1|S0|db11377a1c585f70|1332|2 PingFrame[] Padding(1305) 21.934 -> Packet A|1|S0|4d51b76baa270d3f3f43|33|1 AckFrame[1-0|Δ0] 21.934 <- (4) Packet A|2|S0|db11377a1c585f70|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 21.935 Finished downloading https://server4:443/sdbajzrmpm at 51:10.878 on ClientConnection[7243edb444d2083f/db11377a1c585f70(V1) with server4/193.167.100.100:443] 21.935 Closing ClientConnection[7243edb444d2083f/db11377a1c585f70(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.935 -> Packet A|2|S0|4d51b76baa270d3f3f43|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 21.935 Creating connection with server4:443 with v1 21.935 <- (5) Packet A|3|S0|db11377a1c585f70|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100fac394ed69d5b66439ee2cd54bd2e6ab5e6b4cf16fa385b7f01ca79d4b0ff589e9108907] 21.936 -> Packet A|3|S0|4d51b76baa270d3f3f43|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 21.936 Setting up connection for downloading https://server4:443/hwdtrkpifz at 51:10.879 on ClientConnection[df4d5d92b6f7a0c1/d840efbc0824fd64(V1) with server4/193.167.100.100:443] 21.936 Original destination connection id: df4d5d92b6f7a0c1 (scid: d840efbc0824fd64) >- CryptoStream[I|ClientHello] 21.938 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.138/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.938 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.966 <- (6) Packet A|5|S0|db11377a1c585f70|37|2 AckFrame[2,0|Δ0] ConnectionCloseFrame[0|28|] 21.973 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.974 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.174/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.973 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 21.976 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 21.976 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 21.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 22.080/Handshake, because peerAwaitingAddressValidation | RTT:35/17 21.976 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 21.979 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 22.082/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 21.979 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.979 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 22.082/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 21.979 Starting downloading https://server4:443/hwdtrkpifz at 51:10.922 on ClientConnection[df4d5d92b6f7a0c1/d840efbc0824fd64(V1) with server4/193.167.100.100:443] 21.979 Discarding pn space Initial because first Handshake message is being sent 21.979 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 21.980 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 22.083/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 21.980 -> Packet A|0|S0|afaf5e3ac3218da80d7c|49|1 StreamFrame[0(CIB),0,17,fin] 22.082 loss detection timeout handler running Sending probe 0, because no ack since 21.979. Current RTT: 35/17. 22.082 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.082 (Probe is a handshake retransmit) 22.082 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 22.288/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.082 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 22.267 <- (2) Packet H|2|L|47|2 PingFrame[] Padding(2) 22.268 -> Packet H|3|L|50|1 AckFrame[2,0|Δ0] 22.287 loss detection timeout handler running Sending probe 1, because no ack since 21.980. Current RTT: 35/17. 22.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.288 (Probe is a handshake retransmit) 22.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 22.700/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.288 -> Packet PH|4|L|82|1 CryptoFrame[0,36] 22.289 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 22.701/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 22.289 -> Packet PH|5|L|82|1 CryptoFrame[0,36] 22.320 <- (3) Packet H|3|L|51|1 AckFrame[4-3,1|Δ0] 22.321 probe count not reset on ack because handshake not yet confirmed 22.321 Retransmitting CryptoFrame[0,36] on level Handshake 22.321 Cwnd(-): 6000; inflight: 131 22.321 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 22.321 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 411 millis, based on 22.733/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 379 millis, based on 22.701/Handshake, because ackElicitingInFlight | RTT:35/17 22.321 -> Packet H|6|L|82|1 CryptoFrame[0,36] 22.320 <- (3) Packet A|0|S0|d840efbc0824fd64|1281|4 AckFrame[0|Δ308] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|020c5414155ddde87f41|be46b8aa5967863d8defb6fb02612180] Padding(1216) reschedule loss detection timer for PTO over 90 millis, based on 22.412/Handshake, because ackElicitingInFlight | RTT:35/14 22.322 State is set to Confirmed reschedule loss detection timer for PTO over 398 millis, based on 22.720/Handshake, because ackElicitingInFlight | RTT:71/82 22.322 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.322 Discarding pn space Handshake because HandshakeDone is received 22.321 <- (4) Packet A|1|S0|d840efbc0824fd64|1332|2 PingFrame[] Padding(1305) 22.323 -> Packet A|1|S0|afaf5e3ac3218da80d7c|33|1 AckFrame[1-0|Δ0] 22.326 <- (5) Packet A|3|S0|d840efbc0824fd64|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d8601005b1e53dc7e84e33e4ed5a44c2efac59e9db2c97198f89107126efd6441b0d778075f6de0] -< CryptoStream[A|] 22.346 -> Packet A|2|S0|afaf5e3ac3218da80d7c|36|1 AckFrame[3,1-0|Δ19] 22.355 <- (6) Packet A|4|S0|d840efbc0824fd64|1372|2 PingFrame[] Padding(1345) 22.374 -> Packet A|3|S0|afaf5e3ac3218da80d7c|36|1 AckFrame[4-3,1-0|Δ19] 22.493 <- (7) Packet A|6|S0|d840efbc0824fd64|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|NewSessionTicket] 22.493 <- (8) Packet A|7|S0|d840efbc0824fd64|29|2 PingFrame[] Padding(2) 22.494 Finished downloading https://server4:443/hwdtrkpifz at 51:11.438 on ClientConnection[df4d5d92b6f7a0c1/d840efbc0824fd64(V1) with server4/193.167.100.100:443] 22.494 Closing ClientConnection[df4d5d92b6f7a0c1/d840efbc0824fd64(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.494 -> Packet A|4|S0|afaf5e3ac3218da80d7c|37|1 AckFrame[7-6,4-3,1-0|Δ0] 22.495 -> Packet A|5|S0|afaf5e3ac3218da80d7c|41|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4-3,1-0|Δ0] 22.495 Creating connection with server4:443 with v1 22.496 Setting up connection for downloading https://server4:443/vehuxzztbu at 51:11.439 on ClientConnection[d2a4e717b9015c4d/d3cf6b840796b7ad(V1) with server4/193.167.100.100:443] 22.496 Original destination connection id: d2a4e717b9015c4d (scid: d3cf6b840796b7ad) >- CryptoStream[I|ClientHello] 22.497 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.697/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.497 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.527 <- (9) Packet A|8|S0|d840efbc0824fd64|1422|3 PingFrame[] MaxStreamsFrame[B,17] Padding(1393) 22.527 <- (10) Packet A|9|S0|d840efbc0824fd64|37|2 AckFrame[5-4,2-0|Δ0] ConnectionCloseFrame[0|28|] 22.527 -> Packet A|6|S0|afaf5e3ac3218da80d7c|41|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4-3,1-0|Δ0] 22.696 loss detection timeout handler running Sending probe 0, because no ack since 22.497. Current RTT: 100/25. 22.696 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.696 (Probe is an initial retransmit) 22.697 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.097/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.697 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.096 loss detection timeout handler running Sending probe 1, because no ack since 22.697. Current RTT: 100/25. 23.096 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.096 (Probe is an initial retransmit) 23.097 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.897/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.096 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.097 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.898/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.097 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.897 loss detection timeout handler running Sending probe 2, because no ack since 23.097. Current RTT: 100/25. 23.897 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.897 (Probe is an initial retransmit) 23.897 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 25.497/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.897 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.898 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 25.498/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.898 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.931 <- (1) Packet I|3|L|179|2 Token=[] AckFrame[5-4,0|Δ0] CryptoFrame[0,123] 23.932 probe count not reset on ack because handshake not yet confirmed 23.932 Cwnd(-): 6000; inflight: 0 23.932 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 25.532/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.931 <- (1) Packet H|3|L|768|1 CryptoFrame[0,720] 23.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 24.711/Handshake, because peerAwaitingAddressValidation | RTT:33/16 23.935 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 23.935 -> Packet I|6|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1151) 23.935 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 23.937 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 24.713/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.937 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.937 Starting downloading https://server4:443/vehuxzztbu at 51:12.881 on ClientConnection[d2a4e717b9015c4d/d3cf6b840796b7ad(V1) with server4/193.167.100.100:443] 23.937 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.034/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.937 -> Packet H|1|L|48|1 AckFrame[3|Δ0] 23.937 Discarding pn space Initial because first Handshake message is being sent 23.938 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.035/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.938 -> Packet A|0|S0|13d14f58bdbe3a02c385|49|1 StreamFrame[0(CIB),0,17,fin] 23.990 <- (2) Packet A|1|S0|d3cf6b840796b7ad|32|1 AckFrame[0|Δ21] 23.991 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.088/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.027 <- (3) Packet A|2|S0|d3cf6b840796b7ad|1332|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,273] -< CryptoStream[A|] 24.028 Finished downloading https://server4:443/vehuxzztbu at 51:12.972 on ClientConnection[d2a4e717b9015c4d/d3cf6b840796b7ad(V1) with server4/193.167.100.100:443] 24.028 Closing ClientConnection[d2a4e717b9015c4d/d3cf6b840796b7ad(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.029 -> Packet A|1|S0|13d14f58bdbe3a02c385|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 24.029 Creating connection with server4:443 with v1 24.030 Setting up connection for downloading https://server4:443/hcwhlmspva at 51:12.973 on ClientConnection[9fc06e3b5c9eac1e/ca9f3b96716cc6f5(V1) with server4/193.167.100.100:443] 24.030 Original destination connection id: 9fc06e3b5c9eac1e (scid: ca9f3b96716cc6f5) >- CryptoStream[I|ClientHello] 24.031 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.231/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.031 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.230 loss detection timeout handler running Sending probe 0, because no ack since 24.031. Current RTT: 100/25. 24.231 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.231 (Probe is an initial retransmit) 24.231 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.631/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.231 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.630 loss detection timeout handler running Sending probe 1, because no ack since 24.231. Current RTT: 100/25. 24.630 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.631 (Probe is an initial retransmit) 24.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 25.431/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.631 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.632 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 25.432/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.632 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.667 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 24.667 probe count not reset on ack because handshake not yet confirmed 24.667 Retransmitting CryptoFrame[0,257] on level Initial 24.667 Cwnd(-): 6000; inflight: 1200 24.667 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 25.467/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.668 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 411 millis, based on 25.080/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 24.668 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 24.667 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 24.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 25.082/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 24.670 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 24.670 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 24.670 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 24.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 25.084/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 24.672 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.673 Starting downloading https://server4:443/hcwhlmspva at 51:13.616 on ClientConnection[9fc06e3b5c9eac1e/ca9f3b96716cc6f5(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 24.776/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 24.673 Discarding pn space Initial because first Handshake message is being sent 24.673 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 24.776/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 24.673 -> [Packet H|1|L|48|1 AckFrame[0|Δ0], Packet A|0|S0|a51de61afeda44e4a640|49|1 StreamFrame[0(CIB),0,17,fin]] 24.701 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.704 <- (4) Packet H|3|L|49|1 AckFrame[0|Δ0] 24.705 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 24.705 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 24.704 <- (4) Packet A|0|S0|ca9f3b96716cc6f5|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|6cc87ebfd56cdab61d4c|f73afd751b9b29159c812767fcd22037] Padding(1226) 24.705 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 24.784/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 24.784/App, because ackElicitingInFlight | RTT:35/14 24.705 Discarding pn space Handshake because HandshakeDone is received 24.708 <- (5) Packet A|2|S0|ca9f3b96716cc6f5|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 24.708 <- (6) Packet A|3|S0|ca9f3b96716cc6f5|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d86010012fa6d425416182704eb2d2e83c766392d8fd0ceaa32ef6a700f5addeebc41dddc152512] 24.709 -> Packet A|1|S0|a51de61afeda44e4a640|36|1 AckFrame[2,0|Δ2] 24.709 Finished downloading https://server4:443/hcwhlmspva at 51:13.652 on ClientConnection[9fc06e3b5c9eac1e/ca9f3b96716cc6f5(V1) with server4/193.167.100.100:443] 24.709 Closing ClientConnection[9fc06e3b5c9eac1e/ca9f3b96716cc6f5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) -< CryptoStream[A|NewSessionTicket] 24.709 -> Packet A|2|S0|a51de61afeda44e4a640|39|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 24.710 Creating connection with server4:443 with v1 24.710 Setting up connection for downloading https://server4:443/ctsvlkjteo at 51:13.654 on ClientConnection[b96bf651a8d7ff07/5dc48278adfb8c8c(V1) with server4/193.167.100.100:443] 24.710 Original destination connection id: b96bf651a8d7ff07 (scid: 5dc48278adfb8c8c) >- CryptoStream[I|ClientHello] 24.712 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.912/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.712 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.725 <- (7) Packet A|4|S0|ca9f3b96716cc6f5|32|1 AckFrame[0|Δ20] 24.725 -> Packet A|3|S0|a51de61afeda44e4a640|39|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 24.740 <- (8) Packet A|5|S0|ca9f3b96716cc6f5|29|2 MaxStreamsFrame[B,17] Padding(1) 24.740 -> Packet A|4|S0|a51de61afeda44e4a640|39|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 24.749 <- (9) Packet A|6|S0|ca9f3b96716cc6f5|1332|2 PingFrame[] Padding(1305) 24.771 <- (10) Packet A|7|S0|ca9f3b96716cc6f5|37|2 AckFrame[4,1-0|Δ0] ConnectionCloseFrame[0|28|] 24.911 loss detection timeout handler running Sending probe 0, because no ack since 24.712. Current RTT: 100/25. 24.911 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.911 (Probe is an initial retransmit) 24.912 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.312/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.911 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.311 loss detection timeout handler running Sending probe 1, because no ack since 24.911. Current RTT: 100/25. 25.311 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.311 (Probe is an initial retransmit) 25.312 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.112/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.311 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.312 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.112/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.312 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.347 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 25.348 probe count not reset on ack because handshake not yet confirmed 25.348 Retransmitting CryptoFrame[0,257] on level Initial 25.348 Cwnd(-): 6000; inflight: 1200 25.348 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.148/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.348 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 411 millis, based on 25.760/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.348 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 25.347 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 25.350 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 25.350 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 25.350 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 25.762/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.350 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 25.352 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 25.764/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.352 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.353 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.353 Starting downloading https://server4:443/ctsvlkjteo at 51:14.296 on ClientConnection[b96bf651a8d7ff07/5dc48278adfb8c8c(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 25.456/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.353 Discarding pn space Initial because first Handshake message is being sent 25.353 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 25.353 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.456/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.353 -> Packet A|0|S0|89cb105aced8f5e307c1|49|1 StreamFrame[0(CIB),0,17,fin] 25.385 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 25.385 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 25.385 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 25.385 <- (2) Packet A|0|S0|5dc48278adfb8c8c|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|65a7fdfa21ed44cf4f00|cc2ae492bad4f06736e4b517364b8ef3] Padding(1226) 25.386 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 25.464/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 25.464/App, because ackElicitingInFlight | RTT:35/14 25.386 Discarding pn space Handshake because HandshakeDone is received 25.387 <- (3) Packet A|2|S0|5dc48278adfb8c8c|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d8601008ae6c645d528367b94de8ba9c880773e51ecb7d706b10cb68111cde8619208a12bd1b46a] -< CryptoStream[A|NewSessionTicket] 25.388 -> Packet A|1|S0|89cb105aced8f5e307c1|36|1 AckFrame[2,0|Δ1] 25.464 loss detection timeout handler running Sending probe 0, because no ack since 25.353. Current RTT: 35/14. 25.464 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 25.686/App, because ackElicitingInFlight | RTT:35/14 25.464 -> Packet PA|2|S0|89cb105aced8f5e307c1|49|1 StreamFrame[0(CIB),0,17,fin] 25.496 <- (4) Packet A|4|S0|5dc48278adfb8c8c|1054|1 StreamFrame[0(CIB),0,1024,fin] 25.497 Finished downloading https://server4:443/ctsvlkjteo at 51:14.440 on ClientConnection[b96bf651a8d7ff07/5dc48278adfb8c8c(V1) with server4/193.167.100.100:443] 25.497 Closing ClientConnection[b96bf651a8d7ff07/5dc48278adfb8c8c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.498 Creating connection with server4:443 with v1 25.498 -> Packet A|3|S0|89cb105aced8f5e307c1|41|2 ConnectionCloseFrame[0|0|] AckFrame[4,2,0|Δ0] 25.498 Setting up connection for downloading https://server4:443/opntmfhjrv at 51:14.442 on ClientConnection[69a738030d029d9d/7bef415e18483c03(V1) with server4/193.167.100.100:443] 25.499 Original destination connection id: 69a738030d029d9d (scid: 7bef415e18483c03) >- CryptoStream[I|ClientHello] 25.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.700/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.500 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.517 <- (5) Packet A|5|S0|5dc48278adfb8c8c|32|1 AckFrame[2-1|Δ21] 25.517 -> Packet A|4|S0|89cb105aced8f5e307c1|41|2 ConnectionCloseFrame[0|0|] AckFrame[4,2,0|Δ0] 25.529 <- (6) Packet A|6|S0|5dc48278adfb8c8c|35|2 AckFrame[3-1|Δ0] ConnectionCloseFrame[0|28|] 25.699 loss detection timeout handler running Sending probe 0, because no ack since 25.500. Current RTT: 100/25. 25.699 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.699 (Probe is an initial retransmit) 25.700 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.100/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.700 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.736 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 25.736 probe count not reset on ack because handshake not yet confirmed 25.736 Retransmitting CryptoFrame[0,257] on level Initial 25.736 Cwnd(-): 6000; inflight: 0 25.737 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.137/Initial, because peerAwaitingAddressValidation | RTT:100/25 25.737 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 25.943/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.737 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 25.736 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 25.739 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 25.945/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.739 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 25.739 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 25.739 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 25.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 25.947/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.741 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.742 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.742 Starting downloading https://server4:443/opntmfhjrv at 51:14.685 on ClientConnection[69a738030d029d9d/7bef415e18483c03(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 25.845/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.742 Discarding pn space Initial because first Handshake message is being sent 25.742 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 25.742 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 25.845/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.742 -> Packet A|0|S0|ac5ba2cffae42868b1cc|49|1 StreamFrame[0(CIB),0,17,fin] 25.770 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 25.844 loss detection timeout handler running Sending probe 0, because no ack since 25.741. Current RTT: 35/17. 25.845 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.845 (Probe is a handshake retransmit) 25.845 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 26.051/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 25.845 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 25.872 <- (3) Packet H|2|L|47|2 PingFrame[] Padding(2) 25.873 -> Packet H|3|L|50|1 AckFrame[2,0|Δ0] 25.878 <- (4) Packet A|1|S0|7bef415e18483c03|1332|2 PingFrame[] Padding(1305) 25.898 -> Packet A|1|S0|ac5ba2cffae42868b1cc|34|1 AckFrame[1|Δ19] 26.010 <- (5) Packet A|4|S0|7bef415e18483c03|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|733cdaa35b85a4132951|ae2c58bb62c7de219e719fe1adcd424d] 26.010 State is set to Confirmed reschedule loss detection timer for PTO over -21 millis, based on 25.988/App, because ackElicitingInFlight | RTT:35/17 26.010 loss detection timeout handler running Sending probe 1, because no ack since 25.742. Current RTT: 35/17. reschedule loss detection timer for PTO over -145 millis, based on 25.865/App, because ackElicitingInFlight | RTT:35/17 26.010 Discarding pn space Handshake because HandshakeDone is received 26.010 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 122 millis, based on 26.133/App, because ackElicitingInFlight | RTT:35/17 26.010 -> Packet PA|2|S0|ac5ba2cffae42868b1cc|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 122 millis, based on 26.134/App, because ackElicitingInFlight | RTT:35/17 26.011 -> Packet PA|3|S0|ac5ba2cffae42868b1cc|49|1 StreamFrame[0(CIB),0,17,fin] 26.030 -> Packet A|4|S0|ac5ba2cffae42868b1cc|36|1 AckFrame[4,1|Δ19] 26.042 <- (6) Packet A|6|S0|7bef415e18483c03|33|1 AckFrame[2,0|Δ0] reschedule loss detection timer for PTO over 92 millis, based on 26.134/App, because ackElicitingInFlight | RTT:35/17 26.062 <- (7) Packet A|7|S0|7bef415e18483c03|1372|5 PingFrame[] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|733cdaa35b85a4132951|ae2c58bb62c7de219e719fe1adcd424d] StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,282] -< CryptoStream[A|] 26.062 <- (8) Packet A|8|S0|7bef415e18483c03|98|2 CryptoFrame[282,23] NewTokenFrame[ad9a8b8d8601003bc2cc93064fe175eeacccf89af44d1590338192817b371d0e6e1e70b38b6533cefbc995] -< CryptoStream[A|NewSessionTicket] 26.063 Finished downloading https://server4:443/opntmfhjrv at 51:15.007 on ClientConnection[69a738030d029d9d/7bef415e18483c03(V1) with server4/193.167.100.100:443] 26.063 Closing ClientConnection[69a738030d029d9d/7bef415e18483c03(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.063 -> Packet A|5|S0|ac5ba2cffae42868b1cc|37|1 AckFrame[8-6,4,1|Δ0] 26.064 -> Packet A|6|S0|ac5ba2cffae42868b1cc|41|2 ConnectionCloseFrame[0|0|] AckFrame[8-6,4,1|Δ0] 26.064 <- (9) Packet A|9|S0|7bef415e18483c03|34|1 AckFrame[4-2,0|Δ2] 26.064 Creating connection with server4:443 with v1 26.064 -> Packet A|7|S0|ac5ba2cffae42868b1cc|41|2 ConnectionCloseFrame[0|0|] AckFrame[8-6,4,1|Δ0] 26.065 Setting up connection for downloading https://server4:443/pcdslyhiua at 51:15.008 on ClientConnection[8ddaf338d471144d/28c28f3d5e18b330(V1) with server4/193.167.100.100:443] 26.065 Original destination connection id: 8ddaf338d471144d (scid: 28c28f3d5e18b330) >- CryptoStream[I|ClientHello] 26.066 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.266/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.066 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.097 <- (10) Packet A|11|S0|7bef415e18483c03|35|2 AckFrame[6-2|Δ0] ConnectionCloseFrame[0|28|] 26.266 loss detection timeout handler running Sending probe 0, because no ack since 26.066. Current RTT: 100/25. 26.266 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.266 (Probe is an initial retransmit) 26.266 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.666/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.266 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.665 loss detection timeout handler running Sending probe 1, because no ack since 26.266. Current RTT: 100/25. 26.665 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.665 (Probe is an initial retransmit) 26.666 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.466/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.666 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.667 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.467/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.667 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.702 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 26.702 probe count not reset on ack because handshake not yet confirmed 26.702 Retransmitting CryptoFrame[0,257] on level Initial 26.703 Cwnd(-): 6000; inflight: 1200 26.703 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.503/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.703 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 411 millis, based on 27.115/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 26.703 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 26.702 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 26.706 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 27.118/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 26.706 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 26.706 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 26.706 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 26.709 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 27.121/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 26.709 -> Packet H|0|L|82|1 CryptoFrame[0,36] 26.709 Starting downloading https://server4:443/pcdslyhiua at 51:15.652 on ClientConnection[8ddaf338d471144d/28c28f3d5e18b330(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.710 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 27.122/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 26.710 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.710 -> Packet A|0|S0|92887d0cc0ad46eba532|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 102 millis, based on 26.813/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 26.710 Discarding pn space Initial because first Handshake message is being sent 26.710 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.710 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 26.736 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.812 loss detection timeout handler running Sending probe 0, because no ack since 26.709. Current RTT: 35/17. 26.812 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.812 (Probe is a handshake retransmit) 26.812 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 27.018/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 26.812 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 26.843 <- (4) Packet H|3|L|47|2 PingFrame[] Padding(2) 26.844 -> Packet H|3|L|50|1 AckFrame[3,0|Δ0] 26.946 <- (5) Packet H|4|L|47|2 PingFrame[] Padding(2) 26.947 -> Packet H|4|L|50|1 AckFrame[4-3,0|Δ0] 27.018 loss detection timeout handler running Sending probe 1, because no ack since 26.710. Current RTT: 35/17. 27.018 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.018 (Probe is a handshake retransmit) 27.018 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 27.430/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.018 -> Packet PH|5|L|82|1 CryptoFrame[0,36] 27.019 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 411 millis, based on 27.431/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.019 -> Packet PH|6|L|82|1 CryptoFrame[0,36] 27.043 <- (6) Packet H|5|L|47|2 PingFrame[] Padding(2) 27.043 -> Packet H|7|L|50|1 AckFrame[5-3,0|Δ0] 27.054 <- (7) Packet A|2|S0|28c28f3d5e18b330|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 27.054 Finished downloading https://server4:443/pcdslyhiua at 51:15.998 on ClientConnection[8ddaf338d471144d/28c28f3d5e18b330(V1) with server4/193.167.100.100:443] 27.054 Closing ClientConnection[8ddaf338d471144d/28c28f3d5e18b330(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.055 -> Packet A|1|S0|92887d0cc0ad46eba532|37|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 27.055 Creating connection with server4:443 with v1 27.056 Setting up connection for downloading https://server4:443/lnnjdyugsg at 51:15.999 on ClientConnection[5b23dcf393414398/49627f4d484b4376(V1) with server4/193.167.100.100:443] 27.056 Original destination connection id: 5b23dcf393414398 (scid: 49627f4d484b4376) 27.056 <- (8) Packet A|3|S0|28c28f3d5e18b330|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100cee8e4077242987583f87eaca9e6c11e2be87b09bedf44dd7ee3c781a7d2eeeaaf1527dd] 27.057 -> Packet A|2|S0|92887d0cc0ad46eba532|37|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] >- CryptoStream[I|ClientHello] 27.057 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.257/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.057 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.087 <- (9) Packet A|4|S0|28c28f3d5e18b330|37|2 AckFrame[2,0|Δ0] ConnectionCloseFrame[0|28|] 27.092 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 27.093 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.293/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.092 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 27.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.095 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) reschedule loss detection timer for PTO over 102 millis, based on 27.198/Handshake, because peerAwaitingAddressValidation | RTT:35/17 27.096 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 27.095 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 27.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.201/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.098 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.201/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.098 Discarding pn space Initial because first Handshake message is being sent 27.098 Starting downloading https://server4:443/lnnjdyugsg at 51:16.041 on ClientConnection[5b23dcf393414398/49627f4d484b4376(V1) with server4/193.167.100.100:443] 27.098 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 27.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.201/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.098 -> Packet A|0|S0|766e8226f45a21b12f82|49|1 StreamFrame[0(CIB),0,17,fin] 27.130 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 27.130 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 27.130 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 27.130 <- (2) Packet A|0|S0|49627f4d484b4376|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|cacb93b1d079f68fa5f9|8953bd091c28a90d3b945284e54f52f1] Padding(1226) 27.131 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 27.209/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 27.209/App, because ackElicitingInFlight | RTT:35/14 27.131 Discarding pn space Handshake because HandshakeDone is received 27.132 <- (3) Packet A|2|S0|49627f4d484b4376|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100a7aa20307caaf4292f671ee6be417183ae5a528c0888b00dd70c2605472a74a63502f8ec] -< CryptoStream[A|NewSessionTicket] 27.133 -> Packet A|1|S0|766e8226f45a21b12f82|36|1 AckFrame[2,0|Δ1] 27.209 loss detection timeout handler running Sending probe 0, because no ack since 27.098. Current RTT: 35/14. 27.209 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 27.431/App, because ackElicitingInFlight | RTT:35/14 27.209 -> Packet PA|2|S0|766e8226f45a21b12f82|49|1 StreamFrame[0(CIB),0,17,fin] 27.240 <- (4) Packet A|3|S0|49627f4d484b4376|31|1 AckFrame[2|Δ0] 27.241 Cwnd(-): 6000; inflight: 0 27.241 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.241 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 102 millis, based on 27.344/App, because ackElicitingInFlight | RTT:35/12 27.241 -> Packet A|3|S0|766e8226f45a21b12f82|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2,0|Δ0] 27.241 <- (5) Packet A|4|S0|49627f4d484b4376|1054|1 StreamFrame[0(CIB),0,1024,fin] 27.242 Finished downloading https://server4:443/lnnjdyugsg at 51:16.185 on ClientConnection[5b23dcf393414398/49627f4d484b4376(V1) with server4/193.167.100.100:443] 27.242 Closing ClientConnection[5b23dcf393414398/49627f4d484b4376(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.242 -> Packet A|4|S0|766e8226f45a21b12f82|39|2 ConnectionCloseFrame[0|0|] AckFrame[4-2,0|Δ0] 27.243 Creating connection with server4:443 with v1 27.243 Setting up connection for downloading https://server4:443/npuxxjrmfq at 51:16.186 on ClientConnection[082f1b3714e379c7/3f385a1d82d84048(V1) with server4/193.167.100.100:443] 27.243 Original destination connection id: 082f1b3714e379c7 (scid: 3f385a1d82d84048) >- CryptoStream[I|ClientHello] 27.244 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.444/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.244 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.273 <- (6) Packet A|5|S0|49627f4d484b4376|35|2 AckFrame[4-2|Δ0] ConnectionCloseFrame[0|28|] 27.280 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 27.280 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.480/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.280 <- (1) Packet H|0|L|769|1 CryptoFrame[0,721] 27.283 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.386/Handshake, because peerAwaitingAddressValidation | RTT:35/17 27.283 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 27.283 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 27.283 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 27.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.388/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.285 -> Packet H|0|L|82|1 CryptoFrame[0,36] 27.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.388/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.285 Discarding pn space Initial because first Handshake message is being sent 27.285 Starting downloading https://server4:443/npuxxjrmfq at 51:16.228 on ClientConnection[082f1b3714e379c7/3f385a1d82d84048(V1) with server4/193.167.100.100:443] 27.285 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 27.286 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.389/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.286 -> Packet A|0|S0|3f56acdc4ce2e4dd0e29|49|1 StreamFrame[0(CIB),0,17,fin] 27.318 <- (2) Packet A|1|S0|3f385a1d82d84048|1332|2 PingFrame[] Padding(1305) 27.338 -> Packet A|1|S0|3f56acdc4ce2e4dd0e29|34|1 AckFrame[1|Δ19] 27.370 <- (3) Packet A|3|S0|3f385a1d82d84048|1372|2 PingFrame[] Padding(1345) 27.375 <- (4) Packet A|4|S0|3f385a1d82d84048|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|240703350782e9721201|b4ab86ce12044d41dccd8efc01dcbbf2] 27.376 State is set to Confirmed reschedule loss detection timer for PTO over 12 millis, based on 27.388/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 32 millis, based on 27.409/App, because ackElicitingInFlight | RTT:35/17 27.376 Discarding pn space Handshake because HandshakeDone is received 27.376 -> Packet A|2|S0|3f56acdc4ce2e4dd0e29|36|1 AckFrame[4-3,1|Δ5] 27.408 loss detection timeout handler running Sending probe 0, because no ack since 27.286. Current RTT: 35/17. 27.408 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 27.654/App, because ackElicitingInFlight | RTT:35/17 27.408 -> Packet PA|3|S0|3f56acdc4ce2e4dd0e29|49|1 StreamFrame[0(CIB),0,17,fin] 27.439 <- (5) Packet A|5|S0|3f385a1d82d84048|33|1 AckFrame[3,1|Δ0] 27.440 Cwnd(-): 6000; inflight: 0 27.440 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.440 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 110 millis, based on 27.551/App, because ackElicitingInFlight | RTT:35/14 27.440 -> Packet A|4|S0|3f56acdc4ce2e4dd0e29|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4-3|Δ0] 27.473 <- (6) Packet A|7|S0|3f385a1d82d84048|1422|4 PingFrame[] CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010060f04bb4409b420cbaef3a6b009afc20de114a2f1acfac6446c6daf232019693b53901ec] Padding(1041) -< CryptoStream[A|NewSessionTicket] 27.493 -> Packet A|5|S0|3f56acdc4ce2e4dd0e29|36|1 AckFrame[7,5-3|Δ19] 27.525 <- (7) Packet A|9|S0|3f385a1d82d84048|1452|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(397) 27.526 Finished downloading https://server4:443/npuxxjrmfq at 51:16.469 on ClientConnection[082f1b3714e379c7/3f385a1d82d84048(V1) with server4/193.167.100.100:443] 27.526 Closing ClientConnection[082f1b3714e379c7/3f385a1d82d84048(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.526 -> Packet A|6|S0|3f56acdc4ce2e4dd0e29|41|2 ConnectionCloseFrame[0|0|] AckFrame[9,7,5-3|Δ0] 27.527 Creating connection with server4:443 with v1 27.527 Setting up connection for downloading https://server4:443/dnwnqmorar at 51:16.471 on ClientConnection[0a70988a23e19efb/67dfa8b2a8ee5f8c(V1) with server4/193.167.100.100:443] 27.527 Original destination connection id: 0a70988a23e19efb (scid: 67dfa8b2a8ee5f8c) >- CryptoStream[I|ClientHello] 27.529 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.729/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.529 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.686 <- (8) Packet A|10|S0|3f385a1d82d84048|1054|1 StreamFrame[0(CIB),0,1024,fin] 27.686 <- (9) Packet A|11|S0|3f385a1d82d84048|29|2 PingFrame[] Padding(2) 27.686 -> Packet A|7|S0|3f56acdc4ce2e4dd0e29|41|2 ConnectionCloseFrame[0|0|] AckFrame[9,7,5-3|Δ0] 27.686 -> Packet A|8|S0|3f56acdc4ce2e4dd0e29|41|2 ConnectionCloseFrame[0|0|] AckFrame[9,7,5-3|Δ0] 27.717 <- (10) Packet A|12|S0|3f385a1d82d84048|37|2 AckFrame[7,5-3|Δ0] ConnectionCloseFrame[0|28|] 27.728 loss detection timeout handler running Sending probe 0, because no ack since 27.529. Current RTT: 100/25. 27.728 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.728 (Probe is an initial retransmit) 27.728 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.128/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.728 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.764 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 27.764 probe count not reset on ack because handshake not yet confirmed 27.765 Retransmitting CryptoFrame[0,257] on level Initial 27.765 Cwnd(-): 6000; inflight: 0 27.765 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.165/Initial, because peerAwaitingAddressValidation | RTT:100/25 27.765 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 27.971/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.765 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 27.764 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 27.768 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 27.974/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.768 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 27.768 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 27.768 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 27.770 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 27.976/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.770 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.770 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.873/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.770 Starting downloading https://server4:443/dnwnqmorar at 51:16.713 on ClientConnection[0a70988a23e19efb/67dfa8b2a8ee5f8c(V1) with server4/193.167.100.100:443] 27.770 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 27.770 Discarding pn space Initial because first Handshake message is being sent 27.771 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 27.874/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 27.771 -> Packet A|0|S0|4d11580d4efd9b8414da|49|1 StreamFrame[0(CIB),0,17,fin] 27.798 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 27.802 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 27.802 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 27.802 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 27.802 <- (3) Packet A|0|S0|67dfa8b2a8ee5f8c|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|3be4470dbdecb3a999ed|beea4b46e0faacbdc36485cee9aa3687] Padding(1226) 27.803 State is set to Confirmed reschedule loss detection timer for PTO over 79 millis, based on 27.882/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 27.882/App, because ackElicitingInFlight | RTT:35/14 27.803 Discarding pn space Handshake because HandshakeDone is received 27.803 <- (4) Packet A|1|S0|67dfa8b2a8ee5f8c|1332|2 PingFrame[] Padding(1305) 27.803 -> Packet A|1|S0|4d11580d4efd9b8414da|33|1 AckFrame[1-0|Δ0] 27.805 <- (5) Packet A|2|S0|67dfa8b2a8ee5f8c|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 27.805 <- (6) Packet A|3|S0|67dfa8b2a8ee5f8c|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100d71a238bada2cad39aaab08ef8d68935bf9c1b35a70bd233bbde0a85a60788b7e6ec5813] -< CryptoStream[A|NewSessionTicket] 27.806 -> Packet A|2|S0|4d11580d4efd9b8414da|33|1 AckFrame[3-0|Δ0] 27.806 Finished downloading https://server4:443/dnwnqmorar at 51:16.749 on ClientConnection[0a70988a23e19efb/67dfa8b2a8ee5f8c(V1) with server4/193.167.100.100:443] 27.806 Closing ClientConnection[0a70988a23e19efb/67dfa8b2a8ee5f8c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.806 -> Packet A|3|S0|4d11580d4efd9b8414da|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 27.806 Creating connection with server4:443 with v1 27.807 Setting up connection for downloading https://server4:443/fyacidyrie at 51:16.750 on ClientConnection[0367eea48e8da74b/255c425104074ac5(V1) with server4/193.167.100.100:443] 27.807 Original destination connection id: 0367eea48e8da74b (scid: 255c425104074ac5) >- CryptoStream[I|ClientHello] 27.809 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.009/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.808 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.822 <- (7) Packet A|4|S0|67dfa8b2a8ee5f8c|32|1 AckFrame[0|Δ20] 27.823 -> Packet A|4|S0|4d11580d4efd9b8414da|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 27.838 <- (8) Packet A|5|S0|67dfa8b2a8ee5f8c|1372|3 PingFrame[] MaxStreamsFrame[B,17] Padding(1343) 27.838 <- (9) Packet A|6|S0|67dfa8b2a8ee5f8c|37|2 AckFrame[3-2,0|Δ0] ConnectionCloseFrame[0|28|] 27.838 -> Packet A|5|S0|4d11580d4efd9b8414da|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 28.008 loss detection timeout handler running Sending probe 0, because no ack since 27.808. Current RTT: 100/25. 28.008 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.008 (Probe is an initial retransmit) 28.008 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.408/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.008 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.044 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 28.045 probe count not reset on ack because handshake not yet confirmed 28.045 Retransmitting CryptoFrame[0,257] on level Initial 28.045 Cwnd(-): 6000; inflight: 0 28.045 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.445/Initial, because peerAwaitingAddressValidation | RTT:100/25 28.045 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 28.251/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.045 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 28.044 <- (1) Packet H|0|L|769|1 CryptoFrame[0,721] 28.047 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 28.253/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.047 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 28.048 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 28.048 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 28.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 28.256/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.050 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.050 Starting downloading https://server4:443/fyacidyrie at 51:16.994 on ClientConnection[0367eea48e8da74b/255c425104074ac5(V1) with server4/193.167.100.100:443] 28.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 28.153/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.050 Discarding pn space Initial because first Handshake message is being sent 28.051 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 28.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 28.154/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 28.051 -> Packet A|0|S0|99d1d80720be3d02856e|49|1 StreamFrame[0(CIB),0,17,fin] 28.078 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 28.083 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 28.083 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 28.083 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 28.083 <- (3) Packet A|0|S0|255c425104074ac5|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|756ea5b23be2f4c148ea|09b91bd0b106049393ed931574fc9896] Padding(1226) 28.084 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 28.162/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 28.162/App, because ackElicitingInFlight | RTT:35/14 28.084 Discarding pn space Handshake because HandshakeDone is received 28.085 <- (4) Packet A|2|S0|255c425104074ac5|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 28.085 Finished downloading https://server4:443/fyacidyrie at 51:17.028 on ClientConnection[0367eea48e8da74b/255c425104074ac5(V1) with server4/193.167.100.100:443] 28.085 -> Packet A|1|S0|99d1d80720be3d02856e|36|1 AckFrame[2,0|Δ1] 28.085 Closing ClientConnection[0367eea48e8da74b/255c425104074ac5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.086 -> Packet A|2|S0|99d1d80720be3d02856e|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 28.086 Creating connection with server4:443 with v1 28.086 <- (5) Packet A|3|S0|255c425104074ac5|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100e9ff65060b33dd73f926a93d12e1de38eb089577ad68e9ecb76e3a7dccb36f163f7e0aa6] 28.087 -> Packet A|3|S0|99d1d80720be3d02856e|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 28.087 Setting up connection for downloading https://server4:443/ehqepkolpp at 51:17.030 on ClientConnection[5538d3450d4ee614/14db0c2a6510a187(V1) with server4/193.167.100.100:443] 28.087 Original destination connection id: 5538d3450d4ee614 (scid: 14db0c2a6510a187) >- CryptoStream[I|ClientHello] 28.089 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.289/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.089 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.103 <- (6) Packet A|4|S0|255c425104074ac5|32|1 AckFrame[0|Δ21] 28.103 -> Packet A|4|S0|99d1d80720be3d02856e|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 28.116 <- (7) Packet A|5|S0|255c425104074ac5|29|2 MaxStreamsFrame[B,17] Padding(1) 28.126 <- (8) Packet A|6|S0|255c425104074ac5|1332|2 PingFrame[] Padding(1305) 28.127 -> Packet A|5|S0|99d1d80720be3d02856e|39|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 28.288 loss detection timeout handler running Sending probe 0, because no ack since 28.089. Current RTT: 100/25. 28.288 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.288 (Probe is an initial retransmit) 28.289 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.689/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.289 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.688 loss detection timeout handler running Sending probe 1, because no ack since 28.289. Current RTT: 100/25. 28.688 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.688 (Probe is an initial retransmit) 28.689 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.489/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.688 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.690 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.490/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.689 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.489 loss detection timeout handler running Sending probe 2, because no ack since 28.689. Current RTT: 100/25. 29.489 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.489 (Probe is an initial retransmit) 29.489 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 31.089/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.489 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.490 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 31.090/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.490 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.525 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[4|Δ0] CryptoFrame[0,123] 29.526 probe count not reset on ack because handshake not yet confirmed 29.526 Retransmitting CryptoFrame[0,257] on level Initial 29.526 Cwnd(-): 6000; inflight: 1200 29.526 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 31.126/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.526 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 863 millis, based on 30.390/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 29.526 -> Packet I|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 29.525 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 29.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 863 millis, based on 30.392/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 29.528 -> Packet I|7|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 29.529 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 29.529 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 29.531 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 863 millis, based on 30.395/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 29.531 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.531 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.531 Starting downloading https://server4:443/ehqepkolpp at 51:18.474 on ClientConnection[5538d3450d4ee614/14db0c2a6510a187(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 107 millis, based on 29.639/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 29.531 Discarding pn space Initial because first Handshake message is being sent 29.531 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 29.531 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 29.531 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 29.639/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 29.531 -> Packet A|0|S0|32010bb25f74bc3daccf|49|1 StreamFrame[0(CIB),0,17,fin] 29.563 <- (3) Packet H|3|L|49|1 AckFrame[0|Δ0] 29.563 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 29.563 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 29.563 <- (3) Packet A|0|S0|14db0c2a6510a187|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4fed6809ed1986cbbdcf|6e76389ca7dcce35f2ccaf4b13ebe176] Padding(1226) 29.564 State is set to Confirmed reschedule loss detection timer for PTO over 83 millis, based on 29.647/App, because ackElicitingInFlight | RTT:36/15 reschedule loss detection timer for PTO over 83 millis, based on 29.647/App, because ackElicitingInFlight | RTT:36/15 29.564 Discarding pn space Handshake because HandshakeDone is received 29.564 <- (4) Packet A|1|S0|14db0c2a6510a187|1332|2 PingFrame[] Padding(1305) 29.564 -> Packet A|1|S0|32010bb25f74bc3daccf|33|1 AckFrame[1-0|Δ0] 29.565 <- (5) Packet A|2|S0|14db0c2a6510a187|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010050c9ef7a8249a578c7c4f33d15bb8a30e2d071f85da80956a70dcd9fad2a62f46fa2dd6c] -< CryptoStream[A|NewSessionTicket] 29.585 -> Packet A|2|S0|32010bb25f74bc3daccf|34|1 AckFrame[2-0|Δ19] 29.596 <- (6) Packet A|3|S0|14db0c2a6510a187|1372|2 PingFrame[] Padding(1345) 29.616 -> Packet A|3|S0|32010bb25f74bc3daccf|34|1 AckFrame[3-0|Δ19] 29.647 loss detection timeout handler running Sending probe 0, because no ack since 29.531. Current RTT: 36/15. 29.647 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 29.879/App, because ackElicitingInFlight | RTT:36/15 29.647 -> Packet PA|4|S0|32010bb25f74bc3daccf|49|1 StreamFrame[0(CIB),0,17,fin] 29.724 <- (7) Packet A|4|S0|14db0c2a6510a187|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010050c9ef7a8249a578c7c4f33d15bb8a30e2d071f85da80956a70dcd9fad2a62f46fa2dd6c] -< CryptoStream[A|NewSessionTicket] 29.724 <- (8) Packet A|5|S0|14db0c2a6510a187|29|2 PingFrame[] Padding(2) 29.725 -> Packet A|5|S0|32010bb25f74bc3daccf|33|1 AckFrame[5-0|Δ0] 29.874 <- (9) Packet A|7|S0|14db0c2a6510a187|29|2 PingFrame[] Padding(2) 29.874 <- (10) Packet A|8|S0|14db0c2a6510a187|29|2 PingFrame[] Padding(2) 29.875 -> Packet A|6|S0|32010bb25f74bc3daccf|35|1 AckFrame[8-7,5-0|Δ0] 29.878 loss detection timeout handler running Sending probe 1, because no ack since 29.647. Current RTT: 36/15. 29.879 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 463 millis, based on 30.343/App, because ackElicitingInFlight | RTT:36/15 29.879 -> Packet PA|7|S0|32010bb25f74bc3daccf|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 463 millis, based on 30.344/App, because ackElicitingInFlight | RTT:36/15 29.880 -> Packet PA|8|S0|32010bb25f74bc3daccf|49|1 StreamFrame[0(CIB),0,17,fin] 29.907 <- (11) Packet A|9|S0|14db0c2a6510a187|1422|2 PingFrame[] Padding(1395) 29.910 <- (12) Packet A|10|S0|14db0c2a6510a187|1054|1 StreamFrame[0(CIB),0,1024,fin] 29.910 <- (13) Packet A|11|S0|14db0c2a6510a187|33|1 AckFrame[8-5,1|Δ0] 29.911 -> Packet A|9|S0|32010bb25f74bc3daccf|36|1 AckFrame[10-7,5-0|Δ3] 29.911 Finished downloading https://server4:443/ehqepkolpp at 51:18.854 on ClientConnection[5538d3450d4ee614/14db0c2a6510a187(V1) with server4/193.167.100.100:443] 29.911 Closing ClientConnection[5538d3450d4ee614/14db0c2a6510a187(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.911 Cwnd(-): 3000; inflight: 0 29.911 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.911 -> Packet A|10|S0|32010bb25f74bc3daccf|37|2 ConnectionCloseFrame[0|0|] AckFrame[11-9|Δ0] 29.912 Creating connection with server4:443 with v1 29.912 Setting up connection for downloading https://server4:443/pfagvhmbbt at 51:18.856 on ClientConnection[e5e316d7266251aa/fd08bbbee18cf14a(V1) with server4/193.167.100.100:443] 29.912 Original destination connection id: e5e316d7266251aa (scid: fd08bbbee18cf14a) >- CryptoStream[I|ClientHello] 29.914 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.114/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.914 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.943 <- (14) Packet A|13|S0|14db0c2a6510a187|35|2 AckFrame[10-5|Δ0] ConnectionCloseFrame[0|28|] 29.949 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 29.950 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.150/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 29.949 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 29.952 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.055/Handshake, because peerAwaitingAddressValidation | RTT:35/17 29.952 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 29.952 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 29.952 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 29.955 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.058/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 29.955 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.955 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.058/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 29.955 Discarding pn space Initial because first Handshake message is being sent 29.955 Starting downloading https://server4:443/pfagvhmbbt at 51:18.898 on ClientConnection[e5e316d7266251aa/fd08bbbee18cf14a(V1) with server4/193.167.100.100:443] 29.955 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 29.955 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.058/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 29.955 -> Packet A|0|S0|05adc1007c6d78850195|49|1 StreamFrame[0(CIB),0,17,fin] 29.987 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 29.988 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 29.988 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 29.987 <- (2) Packet A|0|S0|fd08bbbee18cf14a|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|240d789679e4e87d18c1|085375210a1e444f57e0f93b4e40653e] Padding(1226) 29.988 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 30.066/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 30.066/App, because ackElicitingInFlight | RTT:35/14 29.988 Discarding pn space Handshake because HandshakeDone is received 29.988 <- (3) Packet A|1|S0|fd08bbbee18cf14a|1332|2 PingFrame[] Padding(1305) 29.989 -> Packet A|1|S0|05adc1007c6d78850195|33|1 AckFrame[1-0|Δ0] 29.989 <- (4) Packet A|2|S0|fd08bbbee18cf14a|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 29.990 <- (5) Packet A|3|S0|fd08bbbee18cf14a|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d860100c9495bf4a798d63232e2f8783efc769c222a104af0c412b77d0c859d0447dd3a83ea1dbb] -< CryptoStream[A|NewSessionTicket] 29.990 Finished downloading https://server4:443/pfagvhmbbt at 51:18.933 on ClientConnection[e5e316d7266251aa/fd08bbbee18cf14a(V1) with server4/193.167.100.100:443] 29.990 Closing ClientConnection[e5e316d7266251aa/fd08bbbee18cf14a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.990 -> Packet A|2|S0|05adc1007c6d78850195|33|1 AckFrame[3-0|Δ0] 29.990 -> Packet A|3|S0|05adc1007c6d78850195|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 29.991 Creating connection with server4:443 with v1 29.991 Setting up connection for downloading https://server4:443/kinwmstqui at 51:18.935 on ClientConnection[87407f263d9d800a/8e1d2c1b8ed995b5(V1) with server4/193.167.100.100:443] 29.991 Original destination connection id: 87407f263d9d800a (scid: 8e1d2c1b8ed995b5) >- CryptoStream[I|ClientHello] 29.993 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.193/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.993 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.008 <- (6) Packet A|4|S0|fd08bbbee18cf14a|32|1 AckFrame[0|Δ21] 30.009 -> Packet A|4|S0|05adc1007c6d78850195|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 30.021 <- (7) Packet A|5|S0|fd08bbbee18cf14a|1372|2 PingFrame[] Padding(1345) 30.021 <- (8) Packet A|6|S0|fd08bbbee18cf14a|37|2 AckFrame[3,1-0|Δ0] ConnectionCloseFrame[0|28|] 30.021 -> Packet A|5|S0|05adc1007c6d78850195|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 30.193 loss detection timeout handler running Sending probe 0, because no ack since 29.993. Current RTT: 100/25. 30.193 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.193 (Probe is an initial retransmit) 30.193 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 30.593/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.193 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.229 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 30.230 probe count not reset on ack because handshake not yet confirmed 30.230 Retransmitting CryptoFrame[0,257] on level Initial 30.230 Cwnd(-): 6000; inflight: 0 30.230 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 30.630/Initial, because peerAwaitingAddressValidation | RTT:100/25 30.230 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 205 millis, based on 30.436/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.230 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 30.232 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.229 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] reschedule loss detection timer for PTO over 205 millis, based on 30.438/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.232 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 30.233 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 30.233 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 30.235 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 30.441/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.235 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.235 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.235 Starting downloading https://server4:443/kinwmstqui at 51:19.179 on ClientConnection[87407f263d9d800a/8e1d2c1b8ed995b5(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 30.338/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.236 Discarding pn space Initial because first Handshake message is being sent 30.235 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 30.236 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.339/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.236 -> Packet A|0|S0|b18dfcc8fe860d89f145|49|1 StreamFrame[0(CIB),0,17,fin] 30.263 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.267 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 30.268 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 30.268 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 30.267 <- (3) Packet A|0|S0|8e1d2c1b8ed995b5|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|854bae9985e249584612|36506f48f8bb4ad01dd7a27d66987650] Padding(1226) 30.268 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 30.347/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 30.347/App, because ackElicitingInFlight | RTT:35/14 30.268 Discarding pn space Handshake because HandshakeDone is received 30.268 <- (4) Packet A|1|S0|8e1d2c1b8ed995b5|1332|2 PingFrame[] Padding(1305) 30.269 -> Packet A|1|S0|b18dfcc8fe860d89f145|33|1 AckFrame[1-0|Δ0] 30.270 <- (5) Packet A|2|S0|8e1d2c1b8ed995b5|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 30.270 Finished downloading https://server4:443/kinwmstqui at 51:19.214 on ClientConnection[87407f263d9d800a/8e1d2c1b8ed995b5(V1) with server4/193.167.100.100:443] 30.270 Closing ClientConnection[87407f263d9d800a/8e1d2c1b8ed995b5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.271 -> Packet A|2|S0|b18dfcc8fe860d89f145|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 30.271 Creating connection with server4:443 with v1 30.272 Setting up connection for downloading https://server4:443/pvubuyuwsx at 51:19.215 on ClientConnection[da267ccc06e91c89/ed20757afd20a36e(V1) with server4/193.167.100.100:443] 30.272 Original destination connection id: da267ccc06e91c89 (scid: ed20757afd20a36e) >- CryptoStream[I|ClientHello] 30.274 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.474/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.274 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.302 <- (6) Packet A|6|S0|8e1d2c1b8ed995b5|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|28|] 30.309 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 30.310 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.510/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 30.309 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 30.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.417/Handshake, because peerAwaitingAddressValidation | RTT:35/17 30.313 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 30.314 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 30.314 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 30.317 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.420/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.316 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.317 Starting downloading https://server4:443/pvubuyuwsx at 51:19.260 on ClientConnection[da267ccc06e91c89/ed20757afd20a36e(V1) with server4/193.167.100.100:443] 30.317 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.420/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.317 Discarding pn space Initial because first Handshake message is being sent 30.317 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.420/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.317 -> [Packet H|1|L|48|1 AckFrame[0|Δ0], Packet A|0|S0|f41ec7a8cca1b7677209|49|1 StreamFrame[0(CIB),0,17,fin]] 30.414 <- (2) Packet H|1|L|47|2 PingFrame[] Padding(2) 30.415 -> Packet H|2|L|48|1 AckFrame[1-0|Δ0] 30.420 loss detection timeout handler running Sending probe 0, because no ack since 30.316. Current RTT: 35/17. 30.420 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.420 (Probe is a handshake retransmit) 30.420 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 205 millis, based on 30.626/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.420 -> Packet PH|3|L|82|1 CryptoFrame[0,36] 30.453 <- (3) Packet H|2|L|51|1 AckFrame[3,1|Δ0] 30.453 probe count not reset on ack because handshake not yet confirmed 30.453 Retransmitting CryptoFrame[0,36] on level Handshake 30.454 Cwnd(-): 6000; inflight: 49 30.454 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 30.454 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 30.454 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 181 millis, based on 30.636/Handshake, because ackElicitingInFlight | RTT:35/14 30.454 -> Packet H|4|L|87|2 CryptoFrame[0,36] AckFrame[1|Δ0] 30.453 <- (3) Packet A|0|S0|ed20757afd20a36e|1281|4 AckFrame[0|Δ102] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|87ce599b2b89bdca3c5c|6948242223020e407d535fa807be1e1d] Padding(1218) reschedule loss detection timer for PTO over 90 millis, based on 30.545/Handshake, because ackElicitingInFlight | RTT:35/14 30.454 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 30.623/Handshake, because ackElicitingInFlight | RTT:45/31 30.454 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 30.454 Discarding pn space Handshake because HandshakeDone is received 30.454 <- (4) Packet A|1|S0|ed20757afd20a36e|1332|2 PingFrame[] Padding(1305) 30.454 -> Packet A|1|S0|f41ec7a8cca1b7677209|33|1 AckFrame[1-0|Δ0] 30.455 <- (5) Packet A|2|S0|ed20757afd20a36e|1232|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,174] -< CryptoStream[A|] 30.455 Finished downloading https://server4:443/pvubuyuwsx at 51:19.399 on ClientConnection[da267ccc06e91c89/ed20757afd20a36e(V1) with server4/193.167.100.100:443] 30.456 Closing ClientConnection[da267ccc06e91c89/ed20757afd20a36e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.456 -> Packet A|2|S0|f41ec7a8cca1b7677209|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 30.456 Creating connection with server4:443 with v1 30.457 Setting up connection for downloading https://server4:443/slimiofvky at 51:19.400 on ClientConnection[011e1fa63cccfcb9/83587230383c0595(V1) with server4/193.167.100.100:443] 30.457 Original destination connection id: 011e1fa63cccfcb9 (scid: 83587230383c0595) 30.457 <- (6) Packet A|3|S0|ed20757afd20a36e|207|2 CryptoFrame[174,131] NewTokenFrame[ad9a8b8d86010094de6fb6f88d840079b923c992abf90d882c2641ddcda2a0fd8a466b488c3fef5d97f3ec] 30.458 -> Packet A|3|S0|f41ec7a8cca1b7677209|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] >- CryptoStream[I|ClientHello] 30.458 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.658/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.458 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.486 <- (7) Packet A|4|S0|ed20757afd20a36e|1372|2 PingFrame[] Padding(1345) 30.487 -> Packet A|4|S0|f41ec7a8cca1b7677209|37|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 30.493 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 30.494 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.694/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 30.493 <- (1) Packet H|0|L|767|1 CryptoFrame[0,719] 30.496 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.599/Handshake, because peerAwaitingAddressValidation | RTT:35/17 30.496 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 30.496 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 30.496 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 30.499 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.602/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.498 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.499 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.602/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.499 Discarding pn space Initial because first Handshake message is being sent 30.499 Starting downloading https://server4:443/slimiofvky at 51:19.442 on ClientConnection[011e1fa63cccfcb9/83587230383c0595(V1) with server4/193.167.100.100:443] 30.499 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 30.499 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 30.602/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 30.499 -> Packet A|0|S0|9ec75c3d40b0176acf90|49|1 StreamFrame[0(CIB),0,17,fin] 30.531 <- (2) Packet H|1|L|49|1 AckFrame[0|Δ0] 30.531 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 30.531 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 30.531 <- (2) Packet A|0|S0|83587230383c0595|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|402048a1f60df9a46ccb|7ef4e44e4a66ac92aa9dcc53f2d55af7] Padding(1226) 30.532 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 30.610/App, because ackElicitingInFlight | RTT:35/14 reschedule loss detection timer for PTO over 78 millis, based on 30.610/App, because ackElicitingInFlight | RTT:35/14 30.532 Discarding pn space Handshake because HandshakeDone is received 30.533 <- (3) Packet A|2|S0|83587230383c0595|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d86010042e2d5bc7fa6f728dae01247c195df6156cb86b2e90531991a3583626442272e4304a9ce] -< CryptoStream[A|NewSessionTicket] 30.534 -> Packet A|1|S0|9ec75c3d40b0176acf90|36|1 AckFrame[2,0|Δ1] 30.610 loss detection timeout handler running Sending probe 0, because no ack since 30.499. Current RTT: 35/14. 30.610 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 30.832/App, because ackElicitingInFlight | RTT:35/14 30.610 -> Packet PA|2|S0|9ec75c3d40b0176acf90|49|1 StreamFrame[0(CIB),0,17,fin] 30.642 <- (4) Packet A|4|S0|83587230383c0595|1054|1 StreamFrame[0(CIB),0,1024,fin] 30.643 Finished downloading https://server4:443/slimiofvky at 51:19.586 on ClientConnection[011e1fa63cccfcb9/83587230383c0595(V1) with server4/193.167.100.100:443] 30.643 Closing ClientConnection[011e1fa63cccfcb9/83587230383c0595(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.644 -> Packet A|3|S0|9ec75c3d40b0176acf90|41|2 ConnectionCloseFrame[0|0|] AckFrame[4,2,0|Δ0] 30.644 Creating connection with server4:443 with v1 30.644 Setting up connection for downloading https://server4:443/lsyvrpeiqb at 51:19.588 on ClientConnection[1501fe3ba9066ad5/a219396783b38225(V1) with server4/193.167.100.100:443] 30.644 Original destination connection id: 1501fe3ba9066ad5 (scid: a219396783b38225) >- CryptoStream[I|ClientHello] 30.646 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.846/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.645 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.662 <- (5) Packet A|5|S0|83587230383c0595|32|1 AckFrame[2-1|Δ20] 30.662 -> Packet A|4|S0|9ec75c3d40b0176acf90|41|2 ConnectionCloseFrame[0|0|] AckFrame[4,2,0|Δ0] 30.675 <- (6) Packet A|6|S0|83587230383c0595|35|2 AckFrame[3-1|Δ0] ConnectionCloseFrame[0|28|] 30.845 loss detection timeout handler running Sending probe 0, because no ack since 30.645. Current RTT: 100/25. 30.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.845 (Probe is an initial retransmit) 30.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.245/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.845 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.881 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 30.882 probe count not reset on ack because handshake not yet confirmed 30.882 Retransmitting CryptoFrame[0,257] on level Initial 30.882 Cwnd(-): 6000; inflight: 0 30.882 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.282/Initial, because peerAwaitingAddressValidation | RTT:100/25 30.882 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 215 millis, based on 31.098/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 30.882 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 30.881 <- (1) Packet H|0|L|769|1 CryptoFrame[0,721] 30.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 215 millis, based on 31.101/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 30.884 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 30.885 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 30.885 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 30.887 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 215 millis, based on 31.103/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 30.887 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.887 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 30.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 30.887 Starting downloading https://server4:443/lsyvrpeiqb at 51:19.830 on ClientConnection[1501fe3ba9066ad5/a219396783b38225(V1) with server4/193.167.100.100:443] 30.887 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 30.887 Discarding pn space Initial because first Handshake message is being sent 30.887 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 30.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 30.887 -> Packet A|0|S0|58df53c205e31d28e3b8|49|1 StreamFrame[0(CIB),0,17,fin] 30.915 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.919 <- (3) Packet H|2|L|49|1 AckFrame[0|Δ0] 30.919 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 30.919 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 30.919 <- (3) Packet A|0|S0|a219396783b38225|1283|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|487dc1f4793fa9329d88|084e2f83b43583f14bc297a7c6089893] Padding(1226) 30.919 State is set to Confirmed reschedule loss detection timer for PTO over 83 millis, based on 31.003/App, because ackElicitingInFlight | RTT:36/15 reschedule loss detection timer for PTO over 83 millis, based on 31.003/App, because ackElicitingInFlight | RTT:36/15 30.919 Discarding pn space Handshake because HandshakeDone is received 30.921 <- (4) Packet A|2|S0|a219396783b38225|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100e9e7a7482144b08b5d4be90d5b81f976a83c03bbf210a68d70f1b803295ac5294745fc47] -< CryptoStream[A|NewSessionTicket] 30.922 -> Packet A|1|S0|58df53c205e31d28e3b8|36|1 AckFrame[2,0|Δ2] 30.963 <- (5) Packet A|3|S0|a219396783b38225|1332|2 PingFrame[] Padding(1305) 30.983 -> Packet A|2|S0|58df53c205e31d28e3b8|36|1 AckFrame[3-2,0|Δ19] 31.002 loss detection timeout handler running Sending probe 0, because no ack since 30.887. Current RTT: 36/15. 31.003 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 31.235/App, because ackElicitingInFlight | RTT:36/15 31.003 -> Packet PA|3|S0|58df53c205e31d28e3b8|49|1 StreamFrame[0(CIB),0,17,fin] 31.133 <- (6) Packet A|6|S0|a219396783b38225|29|2 PingFrame[] Padding(2) 31.153 -> Packet A|4|S0|58df53c205e31d28e3b8|38|1 AckFrame[6,3-2,0|Δ19] 31.185 <- (7) Packet A|7|S0|a219396783b38225|1372|2 PingFrame[] Padding(1345) 31.205 -> Packet A|5|S0|58df53c205e31d28e3b8|38|1 AckFrame[7-6,3-2,0|Δ19] 31.234 loss detection timeout handler running Sending probe 1, because no ack since 31.003. Current RTT: 36/15. 31.234 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 463 millis, based on 31.698/App, because ackElicitingInFlight | RTT:36/15 31.234 -> Packet PA|6|S0|58df53c205e31d28e3b8|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 463 millis, based on 31.699/App, because ackElicitingInFlight | RTT:36/15 31.235 -> Packet PA|7|S0|58df53c205e31d28e3b8|49|1 StreamFrame[0(CIB),0,17,fin] 31.237 <- (8) Packet A|8|S0|a219396783b38225|1422|2 PingFrame[] Padding(1395) 31.259 -> Packet A|8|S0|58df53c205e31d28e3b8|38|1 AckFrame[8-6,3-2,0|Δ19] 31.367 <- (9) Packet A|12|S0|a219396783b38225|29|2 PingFrame[] Padding(2) 31.387 -> Packet A|9|S0|58df53c205e31d28e3b8|40|1 AckFrame[12,8-6,3-2,0|Δ19] 31.419 <- (10) Packet A|13|S0|a219396783b38225|1452|3 PingFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(397) 31.420 Finished downloading https://server4:443/lsyvrpeiqb at 51:20.363 on ClientConnection[1501fe3ba9066ad5/a219396783b38225(V1) with server4/193.167.100.100:443] 31.420 Closing ClientConnection[1501fe3ba9066ad5/a219396783b38225(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.421 -> Packet A|10|S0|58df53c205e31d28e3b8|43|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,8-6,3-2,0|Δ0] 31.421 Creating connection with server4:443 with v1 31.421 Setting up connection for downloading https://server4:443/dqenmmdjor at 51:20.365 on ClientConnection[958eb9d3dc2405ec/9d18127afd3666ba(V1) with server4/193.167.100.100:443] 31.421 Original destination connection id: 958eb9d3dc2405ec (scid: 9d18127afd3666ba) >- CryptoStream[I|ClientHello] 31.423 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.623/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.423 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.514 <- (11) Packet A|14|S0|a219396783b38225|1054|1 StreamFrame[0(CIB),0,1024,fin] 31.514 -> Packet A|11|S0|58df53c205e31d28e3b8|43|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,8-6,3-2,0|Δ0] 31.546 <- (12) Packet A|16|S0|a219396783b38225|41|2 AckFrame[11,9,6-4,2-1|Δ0] ConnectionCloseFrame[0|28|] 31.622 loss detection timeout handler running Sending probe 0, because no ack since 31.423. Current RTT: 100/25. 31.622 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 31.622 (Probe is an initial retransmit) 31.623 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.023/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.622 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.757 <- (1) Packet I|1|L|180|2 Token=[] AckFrame[0|Δ301] CryptoFrame[0,123] 31.758 probe count not reset on ack because handshake not yet confirmed 31.758 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.158/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 31.757 <- (1) Packet H|1|L|768|1 CryptoFrame[0,720] 31.760 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 33.764/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 31.760 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 31.760 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 31.760 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1151) >- CryptoStream[H|Finished] 31.762 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2003 millis, based on 33.766/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 31.762 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.763 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.763 Starting downloading https://server4:443/dqenmmdjor at 51:20.706 on ClientConnection[958eb9d3dc2405ec/9d18127afd3666ba(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 1001 millis, based on 32.765/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 31.763 Discarding pn space Initial because first Handshake message is being sent 31.762 -> Packet H|1|L|48|1 AckFrame[1|Δ0] 31.763 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 32.765/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 31.763 -> Packet A|0|S0|ab1fe6e9581770f57720|49|1 StreamFrame[0(CIB),0,17,fin] 31.792 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 31.795 <- (3) Packet A|1|S0|9d18127afd3666ba|1332|2 PingFrame[] Padding(1305) 31.815 <- (4) Packet A|4|S0|9d18127afd3666ba|32|1 AckFrame[0|Δ20] 31.815 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1001 millis, based on 32.817/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:334/167 31.815 -> Packet A|1|S0|ab1fe6e9581770f57720|34|1 AckFrame[1|Δ19] 31.847 <- (5) Packet A|5|S0|9d18127afd3666ba|1372|2 PingFrame[] Padding(1345) 31.852 <- (6) Packet A|6|S0|9d18127afd3666ba|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|8592760a458e8956ff1b|503fce0ed8831906a1e3e22f47e2143f] 31.853 State is set to Confirmed reschedule loss detection timer for PTO over 992 millis, based on 32.845/Handshake, because ackElicitingInFlight | RTT:299/196 31.853 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.853 Discarding pn space Handshake because HandshakeDone is received 31.853 -> Packet A|2|S0|ab1fe6e9581770f57720|36|1 AckFrame[6-4,1|Δ5] 31.988 <- (7) Packet A|7|S0|9d18127afd3666ba|1332|2 StreamFrame[0(CIB),0,1024,fin] CryptoFrame[0,274] -< CryptoStream[A|] 31.989 Finished downloading https://server4:443/dqenmmdjor at 51:20.932 on ClientConnection[958eb9d3dc2405ec/9d18127afd3666ba(V1) with server4/193.167.100.100:443] 31.989 Closing ClientConnection[958eb9d3dc2405ec/9d18127afd3666ba(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.989 -> Packet A|3|S0|ab1fe6e9581770f57720|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-4,1|Δ0] 31.990 Creating connection with server4:443 with v1 31.990 Setting up connection for downloading https://server4:443/lzakzkloui at 51:20.933 on ClientConnection[af5be3c9cc0f3770/da94c6a0ca0f53bd(V1) with server4/193.167.100.100:443] 31.990 Original destination connection id: af5be3c9cc0f3770 (scid: da94c6a0ca0f53bd) >- CryptoStream[I|ClientHello] 31.991 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.192/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.991 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.027 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 32.028 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.228/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 32.027 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 32.030 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.133/Handshake, because peerAwaitingAddressValidation | RTT:35/17 32.030 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 32.030 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) 32.030 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) >- CryptoStream[H|Finished] 32.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.135/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.032 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.033 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.033 Starting downloading https://server4:443/lzakzkloui at 51:20.976 on ClientConnection[af5be3c9cc0f3770/da94c6a0ca0f53bd(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 102 millis, based on 32.136/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.033 Discarding pn space Initial because first Handshake message is being sent 32.033 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 102 millis, based on 32.137/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:35/17 32.033 -> [Packet H|1|L|48|1 AckFrame[0|Δ0], Packet A|0|S0|d168825835835a04e684|49|1 StreamFrame[0(CIB),0,17,fin]] 32.066 <- (2) Packet A|1|S0|da94c6a0ca0f53bd|1332|2 PingFrame[] Padding(1305) 32.067 <- (3) Packet A|2|S0|da94c6a0ca0f53bd|380|2 CryptoFrame[0,305] NewTokenFrame[ad9a8b8d8601009331bc7ca29782cb78ab569c47ed2403fe50beda574ae8380f47205d68a2d1e19ae5a71d] -< CryptoStream[A|NewSessionTicket] 32.068 -> Packet A|1|S0|d168825835835a04e684|34|1 AckFrame[2-1|Δ1] 32.100 <- (4) Packet A|3|S0|da94c6a0ca0f53bd|1372|2 PingFrame[] Padding(1345) 32.107 <- (5) Packet A|4|S0|da94c6a0ca0f53bd|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|3f3b0fa1a193ffa08794|bbec5b8f090284a36548dd87ab47aa00] 32.107 State is set to Confirmed reschedule loss detection timer for PTO over 27 millis, based on 32.135/Handshake, because ackElicitingInFlight | RTT:35/17 reschedule loss detection timer for PTO over 48 millis, based on 32.156/App, because ackElicitingInFlight | RTT:35/17 32.107 Discarding pn space Handshake because HandshakeDone is received 32.108 -> Packet A|2|S0|d168825835835a04e684|34|1 AckFrame[4-1|Δ7] 32.156 loss detection timeout handler running Sending probe 0, because no ack since 32.033. Current RTT: 35/17. 32.156 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 32.402/App, because ackElicitingInFlight | RTT:35/17 32.156 -> Packet PA|3|S0|d168825835835a04e684|49|1 StreamFrame[0(CIB),0,17,fin] 32.187 <- (6) Packet A|5|S0|da94c6a0ca0f53bd|33|1 AckFrame[3,1|Δ0] 32.188 Cwnd(-): 6000; inflight: 0 32.188 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 32.188 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 32.299/App, because ackElicitingInFlight | RTT:35/14 32.188 -> Packet A|4|S0|d168825835835a04e684|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4-3|Δ0] 32.188 <- (7) Packet A|6|S0|da94c6a0ca0f53bd|1054|1 StreamFrame[0(CIB),0,1024,fin] 32.189 Finished downloading https://server4:443/lzakzkloui at 51:21.132 on ClientConnection[af5be3c9cc0f3770/da94c6a0ca0f53bd(V1) with server4/193.167.100.100:443] 32.189 Closing ClientConnection[af5be3c9cc0f3770/da94c6a0ca0f53bd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.189 -> Packet A|5|S0|d168825835835a04e684|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 32.189 Creating connection with server4:443 with v1 32.190 Setting up connection for downloading https://server4:443/ghmkybmflp at 51:21.133 on ClientConnection[6d444f8740f1b6b6/e017f673084ecd89(V1) with server4/193.167.100.100:443] 32.190 Original destination connection id: 6d444f8740f1b6b6 (scid: e017f673084ecd89) >- CryptoStream[I|ClientHello] 32.191 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.391/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.191 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.220 <- (8) Packet A|7|S0|da94c6a0ca0f53bd|1422|2 PingFrame[] Padding(1395) 32.221 -> Packet A|6|S0|d168825835835a04e684|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 32.240 <- (9) Packet A|8|S0|da94c6a0ca0f53bd|34|1 AckFrame[4-3,1|Δ21] 32.241 -> Packet A|7|S0|d168825835835a04e684|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 32.252 <- (10) Packet A|9|S0|da94c6a0ca0f53bd|37|2 AckFrame[6,4-3|Δ0] ConnectionCloseFrame[0|28|] 32.390 loss detection timeout handler running Sending probe 0, because no ack since 32.191. Current RTT: 100/25. 32.390 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.390 (Probe is an initial retransmit) 32.391 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.791/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.391 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.790 loss detection timeout handler running Sending probe 1, because no ack since 32.391. Current RTT: 100/25. 32.790 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.790 (Probe is an initial retransmit) 32.791 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 33.591/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.790 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.792 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 33.592/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.791 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.827 <- (1) Packet I|0|L|177|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 32.827 probe count not reset on ack because handshake not yet confirmed 32.828 Retransmitting CryptoFrame[0,257] on level Initial 32.828 Cwnd(-): 6000; inflight: 1200 32.828 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 33.628/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.828 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 431 millis, based on 33.260/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 32.828 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(894) -< CryptoStream[I|ServerHello] 32.827 <- (1) Packet H|0|L|768|1 CryptoFrame[0,720] 32.830 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 33.262/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 32.830 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1151) 32.830 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 32.830 - unsupported transport parameter 0xff02de1a, size 2 (delayed-ack) >- CryptoStream[H|Finished] 32.833 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 431 millis, based on 33.265/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 32.833 -> Packet H|0|L|82|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.833 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.833 Starting downloading https://server4:443/ghmkybmflp at 51:21.777 on ClientConnection[6d444f8740f1b6b6/e017f673084ecd89(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 107 millis, based on 32.941/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 32.833 Discarding pn space Initial because first Handshake message is being sent 32.833 -> Packet H|1|L|48|1 AckFrame[0|Δ0] 32.834 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 32.942/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 32.834 -> Packet A|0|S0|6e6219aa5207f6e6263c|49|1 StreamFrame[0(CIB),0,17,fin] 32.861 Discarding packet (1232 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 32.866 <- (3) Packet A|1|S0|e017f673084ecd89|1332|2 PingFrame[] Padding(1305) 32.886 -> Packet A|1|S0|6e6219aa5207f6e6263c|34|1 AckFrame[1|Δ19] 32.941 loss detection timeout handler running Sending probe 0, because no ack since 32.833. Current RTT: 36/18. 32.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.941 (Probe is a handshake retransmit) 32.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 215 millis, based on 33.157/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 32.941 -> Packet PH|2|L|82|1 CryptoFrame[0,36] 33.017 <- (4) Packet A|3|S0|e017f673084ecd89|57|2 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|799ce4f097ff206c0375|87d7f46a4cdb81a2f4fef14c784a0c48] 33.017 State is set to Confirmed reschedule loss detection timer for PTO over 72 millis, based on 33.090/App, because ackElicitingInFlight | RTT:36/18 reschedule loss detection timer for PTO over -55 millis, based on 32.962/App, because ackElicitingInFlight | RTT:36/18 33.017 Discarding pn space Handshake because HandshakeDone is received 33.017 loss detection timeout handler running Sending probe 0, because no ack since 32.834. Current RTT: 36/18. 33.017 (Probe is retransmit on level App) 33.017 <- (5) Packet A|4|S0|e017f673084ecd89|29|2 PingFrame[] Padding(2) reschedule loss detection timer for PTO over 255 millis, based on 33.274/App, because ackElicitingInFlight | RTT:36/18 33.018 -> Packet PA|2|S0|6e6219aa5207f6e6263c|49|1 StreamFrame[0(CIB),0,17,fin] 33.018 -> Packet A|3|S0|6e6219aa5207f6e6263c|35|1 AckFrame[4-3,1|Δ0] 33.050 <- (6) Packet A|5|S0|e017f673084ecd89|1372|6 PingFrame[] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|799ce4f097ff206c0375|87d7f46a4cdb81a2f4fef14c784a0c48] CryptoFrame[0,305] NewTokenFrame[ad9a8b8d860100f6a1c64a78c56698caa1267de0aedf9691a47fb574cec2c49e45214b3ae155c382bfb520] Padding(960) -< CryptoStream[A|NewSessionTicket] 33.070 -> Packet A|4|S0|6e6219aa5207f6e6263c|36|1 AckFrame[5-3,1|Δ19] 33.103 <- (7) Packet A|6|S0|e017f673084ecd89|1422|2 PingFrame[] Padding(1395) 33.122 -> Packet A|5|S0|6e6219aa5207f6e6263c|36|1 AckFrame[6-3,1|Δ19] 33.155 <- (8) Packet A|7|S0|e017f673084ecd89|1452|2 PingFrame[] Padding(1425) 33.175 -> Packet A|6|S0|6e6219aa5207f6e6263c|36|1 AckFrame[7-3,1|Δ19] 33.269 <- (9) Packet A|8|S0|e017f673084ecd89|29|2 PingFrame[] Padding(2) 33.269 <- (10) Packet A|9|S0|e017f673084ecd89|29|2 PingFrame[] Padding(2) 33.270 -> Packet A|7|S0|6e6219aa5207f6e6263c|35|1 AckFrame[9-3,1|Δ0] 33.273 loss detection timeout handler running Sending probe 1, because no ack since 33.018. Current RTT: 36/18. 33.273 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 511 millis, based on 33.785/App, because ackElicitingInFlight | RTT:36/18 33.273 -> Packet PA|8|S0|6e6219aa5207f6e6263c|49|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 511 millis, based on 33.786/App, because ackElicitingInFlight | RTT:36/18 33.274 -> Packet PA|9|S0|6e6219aa5207f6e6263c|49|1 StreamFrame[0(CIB),0,17,fin] 33.305 <- (11) Packet A|10|S0|e017f673084ecd89|1054|1 StreamFrame[0(CIB),0,1024,fin] 33.305 <- (12) Packet A|11|S0|e017f673084ecd89|33|1 AckFrame[9-7,5-3|Δ0] 33.306 Finished downloading https://server4:443/ghmkybmflp at 51:22.249 on ClientConnection[6d444f8740f1b6b6/e017f673084ecd89(V1) with server4/193.167.100.100:443] 33.306 Closing ClientConnection[6d444f8740f1b6b6/e017f673084ecd89(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.306 Cwnd(-): 3000; inflight: 0 33.306 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 33.306 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.306 -> Packet A|10|S0|6e6219aa5207f6e6263c|58|3 StreamFrame[0(CIB),0,17,fin] AckFrame[10|Δ0] ConnectionCloseFrame[0|0|]