4aad441ae1077153: No root crt list specified -- certificate will not be verified. 4aad441ae1077153: Sending ALPN list (1): hq-interop 4aad441ae1077153: Sending transport parameter TLS extension (85 bytes): 4aad441ae1077153: Extension list (85 bytes): 4aad441ae1077153: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 4aad441ae1077153: Extension type: 4 (initial_max_data), length 4, 80100000 4aad441ae1077153: Extension type: 8 (max_streams_bidi), length 2, 4200 4aad441ae1077153: Extension type: 1 (idle_timeout), length 4, 8002bf20 4aad441ae1077153: Extension type: 3 (max_packet_size), length 2, 45a0 4aad441ae1077153: Extension type: 9 (max_streams_uni), length 2, 4200 4aad441ae1077153: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 4aad441ae1077153: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 4aad441ae1077153: Extension type: 14 (active_connection_id_limit), length 1, 08 4aad441ae1077153: Extension type: 11 (max_ack_delay), length 1, 0a 4aad441ae1077153: Extension type: 15 (hcid), length 8, 66bb8ee5cdd5e09c 4aad441ae1077153: Extension type: 2352 (unknown), length 4, 8000ad44 4aad441ae1077153: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 4aad441ae1077153: Extension type: 29016 (enable_time_stamp), length 1, 03 4aad441ae1077153: Extension type: 10930 (grease_quic_bit), length 0 4aad441ae1077153: Preparing GET on stream 0 for /wdbxshxpax 4aad441ae1077153: Sending packet type: 2 (initial), S0, Q1, Version 1, 4aad441ae1077153: <4aad441ae1077153>, <66bb8ee5cdd5e09c>, Seq: 99394, pl: 635 4aad441ae1077153: Token length: 0 4aad441ae1077153: Prepared 615 bytes 4aad441ae1077153: ping, 1 bytes 4aad441ae1077153: crypto_hs, offset 0, length 610: 0100025e0303c96f... 4aad441ae1077153: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 4aad441ae1077153: <4aad441ae1077153>, <66bb8ee5cdd5e09c>, Seq: 0, pl: 566 4aad441ae1077153: Prepared 546 bytes 4aad441ae1077153: stream 0, offset 0, length 17, fin = 1: 474554202f776462... 4aad441ae1077153: padding, 526 bytes 4aad441ae1077153: Sending 1252 bytes to 193.167.100.100:443 at T=0.001831 (2372a75a) 4aad441ae1077153: T= 0.252106, Lost packet type 2, number 99394, size 645, DCID <>, reason: timer 4aad441ae1077153: Sending packet type: 2 (initial), S0, Q1, Version 1, 4aad441ae1077153: <4aad441ae1077153>, <66bb8ee5cdd5e09c>, Seq: 99395, pl: 635 4aad441ae1077153: Token length: 0 4aad441ae1077153: Prepared 615 bytes 4aad441ae1077153: ping, 1 bytes 4aad441ae1077153: crypto_hs, offset 0, length 610: 0100025e0303c96f... 4aad441ae1077153: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 4aad441ae1077153: <4aad441ae1077153>, <66bb8ee5cdd5e09c>, Seq: 1, pl: 566 4aad441ae1077153: Prepared 546 bytes 4aad441ae1077153: padding, 546 bytes 4aad441ae1077153: Sending 1252 bytes to 193.167.100.100:443 at T=0.252106 (237678fd) 4aad441ae1077153: Receiving 1232 bytes from 193.167.100.100:443 at T=0.287427 (237702f6) 4aad441ae1077153: Receiving packet type: 2 (initial), S0, Q1, Version 1, 4aad441ae1077153: <66bb8ee5cdd5e09c>, , Seq: 0, pl: 161 4aad441ae1077153: Token length: 0 4aad441ae1077153: Decrypted 144 bytes 4aad441ae1077153: ack_ecn (nb=0), 99395, ect0=0, ect1=1, ce=0 4aad441ae1077153: crypto_hs, offset 0, length 129: 0200007d03039da4... 4aad441ae1077153: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 4aad441ae1077153: <66bb8ee5cdd5e09c>, , Seq: 0, pl: 197 4aad441ae1077153: Decrypted 180 bytes 4aad441ae1077153: crypto_hs, offset 0, length 176: 0800008800860010... 4aad441ae1077153: Received transport parameter TLS extension (99 bytes): 4aad441ae1077153: Extension list (99 bytes): 4aad441ae1077153: Extension type: 0 (ocid), length 8, 4aad441ae1077153 4aad441ae1077153: Extension type: 1 (idle_timeout), length 4, 80007530 4aad441ae1077153: Extension type: 4 (initial_max_data), length 8, ffffffffffffffff 4aad441ae1077153: Extension type: 5 (max_stream_data_bidi_local), length 4, 80100000 4aad441ae1077153: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80100000 4aad441ae1077153: Extension type: 7 (max_stream_data_uni), length 4, 80100000 4aad441ae1077153: Extension type: 8 (max_streams_bidi), length 1, 10 4aad441ae1077153: Extension type: 9 (max_streams_uni), length 1, 10 4aad441ae1077153: Extension type: 11 (max_ack_delay), length 1, 14 4aad441ae1077153: Extension type: 14 (active_connection_id_limit), length 1, 08 4aad441ae1077153: Extension type: 15 (hcid), length 10, e5c56dd22edecef57fad 4aad441ae1077153: Extension type: 17 (version_negotiation), length 12, 000000017aea2aea00000001 4aad441ae1077153: Extension type: 10930 (grease_quic_bit), length 0 4aad441ae1077153: Extension type: 4278378010 (unknown), length 2, 43e8 4aad441ae1077153: Extension type: 32 (max_datagram_frame_size), length 1, 00 4aad441ae1077153: Receiving packet type: 6 (1rtt protected), S0, Q1, 4aad441ae1077153: <0000000000000000>, Seq: 0 (0), Phi: 0, 4aad441ae1077153: Header or encryption error: 420. 4aad441ae1077153: The session was properly resumed! 4aad441ae1077153: Zero RTT data is accepted! 4aad441ae1077153: Negotiated ALPN: hq-interop 4aad441ae1077153: Sending packet type: 4 (handshake), S0, Q0, Version 1, 4aad441ae1077153: , <66bb8ee5cdd5e09c>, Seq: 0, pl: 67 4aad441ae1077153: Prepared 47 bytes 4aad441ae1077153: ack_ecn (nb=0), 0, ect0=1, ect1=0, ce=0 4aad441ae1077153: crypto_hs, offset 0, length 36: 140000204b3d516f... 4aad441ae1077153: T= 0.287786, Lost packet type 5, number 0, size 575, DCID , reason: timer 4aad441ae1077153: Sending packet type: 6 (1rtt protected), S0, Q1, 4aad441ae1077153: , Seq: 2 (2), Phi: 0, 4aad441ae1077153: Prepared 283 bytes 4aad441ae1077153: new_connection_id[1]: 0x6539ce4de9ea7427, 2186ffa670affda8312243bfa2be2693 4aad441ae1077153: new_connection_id[2]: 0xf5ba9360ecf24312, 17adc5432e0f1dd9022bbfc165bf183f 4aad441ae1077153: new_connection_id[3]: 0xf49399c46e08be33, 9c6c9171b7c8422d09a74e9a277f7b6d 4aad441ae1077153: new_connection_id[4]: 0x72d2b63a325eecc8, 4af07dfd8dc2323c4e93f2e50c8fb4ce 4aad441ae1077153: new_connection_id[5]: 0x000e4061b4f278b0, bfb9022f147d67e1589d8ca9c28b4411 4aad441ae1077153: new_connection_id[6]: 0x12ca538a98a115bc, f21ebe23fee5510f838e7255c9bb9a70 4aad441ae1077153: new_connection_id[7]: 0x990d07a8d82873e5, 2fab3b508cbcea7f3143ebf432789211 4aad441ae1077153: stream 0, offset 0, length 17, fin = 1: 474554202f776462... 4aad441ae1077153: padding, 67 bytes 4aad441ae1077153: T= 0.287786, cwin: 16005,flight: 996,nb_ret: 2,rtt_min: 35321,rtt: 35321,rtt_var: 17660,max_ack_delay: 0,state: 13 4aad441ae1077153: Sending 405 bytes to 193.167.100.100:443 at T=0.287786 (2377045d) 4aad441ae1077153: Connection established. Version = 1, I-CID: 4aad441ae1077153, verified: 1 4aad441ae1077153: Receiving 1332 bytes from 193.167.100.100:443 at T=0.320803 (23778556) 4aad441ae1077153: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 4aad441ae1077153: <66bb8ee5cdd5e09c>, , Seq: 1, pl: 25 4aad441ae1077153: Decrypted 8 bytes 4aad441ae1077153: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 4aad441ae1077153: Receiving packet type: 6 (1rtt protected), S0, Q0, 4aad441ae1077153: <66bb8ee5cdd5e09c>, Seq: 0 (0), Phi: 0, 4aad441ae1077153: Decrypted 1254 bytes 4aad441ae1077153: handshake_done 4aad441ae1077153: new_connection_id[1]: 0x31077fba7a0aba4f443e, 5e80ce4c9e7b053e6b2a526bf746f0f5 4aad441ae1077153: new_connection_id[2]: 0x32d24eb09d7436182023, 8e3f7cb78c4c58b60f0ddc917b1d49c5 4aad441ae1077153: new_connection_id[3]: 0x19310b3852ba247fb9d2, 4f87d8a722a58ba2e444af2fe45dd4ee 4aad441ae1077153: new_connection_id[4]: 0x2483f4d21d7b4976ccc9, 8881d77f088dcacb895d7e7cc19bf732 4aad441ae1077153: new_connection_id[5]: 0x38de3a281e8fe47c8da4, 5f035aaf2f26be71b0f4fde3de235c32 4aad441ae1077153: new_connection_id[6]: 0x0656f6fbaebf9b1a0fe1, 8a2ece8d1e8b9061676037918870faf6 4aad441ae1077153: new_connection_id[7]: 0xe8087955296f0bbdb99c, 8c61771031fdbc517b9501fd6899ef01 4aad441ae1077153: padding, 1043 bytes 4aad441ae1077153: T= 0.320803, cwin: 16083,flight: 902,nb_ret: 2,rtt_min: 33017,rtt: 35033,rtt_var: 13821,max_ack_delay: 0,state: 14 4aad441ae1077153: Receiving 1332 bytes from 193.167.100.100:443 at T=0.321853 (23778970) 4aad441ae1077153: Receiving packet type: 6 (1rtt protected), S0, Q1, 4aad441ae1077153: <66bb8ee5cdd5e09c>, Seq: 1 (1), Phi: 0, 4aad441ae1077153: Decrypted 1306 bytes 4aad441ae1077153: ping, 1 bytes 4aad441ae1077153: padding, 1305 bytes 4aad441ae1077153: T= 0.321853, cwin: 16083,flight: 902,nb_ret: 2,rtt_min: 33017,rtt: 35033,rtt_var: 13821,max_ack_delay: 0,state: 14 4aad441ae1077153: Receiving 207 bytes from 193.167.100.100:443 at T=0.323132 (23778e6f) 4aad441ae1077153: Receiving packet type: 6 (1rtt protected), S1, Q1, 4aad441ae1077153: <66bb8ee5cdd5e09c>, Seq: 3 (3), Phi: 0, 4aad441ae1077153: Decrypted 181 bytes 4aad441ae1077153: crypto_hs, offset 174, length 131: a7abc855632f36ea... 4aad441ae1077153: new_token[43]: 0xad9a8b8d860100bcf870ca30ff2b5b94... 4aad441ae1077153: T= 0.323132, cwin: 16083,flight: 902,nb_ret: 2,rtt_min: 33017,rtt: 35033,rtt_var: 13821,max_ack_delay: 0,state: 14 4aad441ae1077153: Sending packet type: 6 (1rtt protected), S0, Q1, 4aad441ae1077153: , Seq: 3 (3), Phi: 0, 4aad441ae1077153: Prepared 27 bytes 4aad441ae1077153: ack_ecn (nb=1), 3, 0-1, ect0=3, ect1=0, ce=0 4aad441ae1077153: padding, 17 bytes 4aad441ae1077153: T= 0.323171, cwin: 16083,flight: 957,nb_ret: 2,rtt_min: 33017,rtt: 35033,rtt_var: 13821,max_ack_delay: 0,state: 14 4aad441ae1077153: Sending 55 bytes to 193.167.100.100:443 at T=0.323171 (23778e96) 4aad441ae1077153: Receiving 35 bytes from 193.167.100.100:443 at T=0.339619 (2377ced6) 4aad441ae1077153: Receiving packet type: 6 (1rtt protected), S1, Q0, 4aad441ae1077153: <66bb8ee5cdd5e09c>, Seq: 4 (4), Phi: 0, 4aad441ae1077153: Decrypted 9 bytes 4aad441ae1077153: ack_ecn (nb=0), 1-2, ect0=0, ect1=2, ce=0 4aad441ae1077153: T= 0.339619, cwin: 16953,flight: 55,nb_ret: 2,rtt_min: 33017,rtt: 35883,rtt_var: 12065,max_ack_delay: 0,state: 14 4aad441ae1077153: Receiving 237 bytes from 193.167.100.100:443 at T=0.421212 (23790d8f) 4aad441ae1077153: Receiving packet type: 6 (1rtt protected), S0, Q0, 4aad441ae1077153: <66bb8ee5cdd5e09c>, Seq: 5 (5), Phi: 0, 4aad441ae1077153: Decrypted 211 bytes 4aad441ae1077153: handshake_done 4aad441ae1077153: new_connection_id[7]: 0xe8087955296f0bbdb99c, 8c61771031fdbc517b9501fd6899ef01 4aad441ae1077153: new_connection_id[6]: 0x0656f6fbaebf9b1a0fe1, 8a2ece8d1e8b9061676037918870faf6 4aad441ae1077153: new_connection_id[5]: 0x38de3a281e8fe47c8da4, 5f035aaf2f26be71b0f4fde3de235c32 4aad441ae1077153: new_connection_id[4]: 0x2483f4d21d7b4976ccc9, 8881d77f088dcacb895d7e7cc19bf732 4aad441ae1077153: new_connection_id[3]: 0x19310b3852ba247fb9d2, 4f87d8a722a58ba2e444af2fe45dd4ee 4aad441ae1077153: new_connection_id[2]: 0x32d24eb09d7436182023, 8e3f7cb78c4c58b60f0ddc917b1d49c5 4aad441ae1077153: new_connection_id[1]: 0x31077fba7a0aba4f443e, 5e80ce4c9e7b053e6b2a526bf746f0f5 4aad441ae1077153: T= 0.421212, cwin: 1307,flight: 0,nb_ret: 2,rtt_min: 33017,rtt: 35883,rtt_var: 12065,max_ack_delay: 0,state: 14 4aad441ae1077153: Receiving 29 bytes from 193.167.100.100:443 at T=0.421297 (23790de4) 4aad441ae1077153: Receiving packet type: 6 (1rtt protected), S0, Q0, 4aad441ae1077153: <66bb8ee5cdd5e09c>, Seq: 6 (6), Phi: 0, 4aad441ae1077153: Decrypted 3 bytes 4aad441ae1077153: ping, 1 bytes 4aad441ae1077153: padding, 2 bytes 4aad441ae1077153: T= 0.421297, cwin: 1307,flight: 0,nb_ret: 2,rtt_min: 33017,rtt: 35883,rtt_var: 12065,max_ack_delay: 0,state: 14 4aad441ae1077153: Sending packet type: 6 (1rtt protected), S1, Q1, 4aad441ae1077153: , Seq: 4 (4), Phi: 0, 4aad441ae1077153: Prepared 27 bytes 4aad441ae1077153: ack_ecn (nb=1), 3-6, 0-1, ect0=6, ect1=0, ce=0 4aad441ae1077153: padding, 17 bytes 4aad441ae1077153: T= 0.421348, cwin: 1307,flight: 55,nb_ret: 2,rtt_min: 33017,rtt: 35883,rtt_var: 12065,max_ack_delay: 0,state: 14 4aad441ae1077153: Sending 55 bytes to 193.167.100.100:443 at T=0.421348 (23790e17) 4aad441ae1077153: Receiving 1372 bytes from 193.167.100.100:443 at T=0.453141 (23798a48) 4aad441ae1077153: Receiving packet type: 6 (1rtt protected), S1, Q0, 4aad441ae1077153: <66bb8ee5cdd5e09c>, Seq: 7 (7), Phi: 0, 4aad441ae1077153: Decrypted 1346 bytes 4aad441ae1077153: ping, 1 bytes 4aad441ae1077153: stream 0, offset 0, length 1024, fin = 1: 90d1a51f7011ac0f... 4aad441ae1077153: crypto_hs, offset 0, length 174: 0400012d0002a300... 4aad441ae1077153: padding, 139 bytes 4aad441ae1077153: T= 0.453141, cwin: 1307,flight: 55,nb_ret: 2,rtt_min: 33017,rtt: 35883,rtt_var: 12065,max_ack_delay: 0,state: 14 4aad441ae1077153: All done, Closing the connection. 4aad441ae1077153: Sending packet type: 6 (1rtt protected), S0, Q0, 4aad441ae1077153: , Seq: 5 (5), Phi: 0, 4aad441ae1077153: Prepared 13 bytes 4aad441ae1077153: ack_ecn (nb=1), 3-7, 0-1, ect0=7, ect1=0, ce=0 4aad441ae1077153: application_close, Error 0x0000, Reason length 0 4aad441ae1077153: Sending 41 bytes to 193.167.100.100:443 at T=0.453297 (23798ae4) 4aad441ae1077153: Receiving 38 bytes from 193.167.100.100:443 at T=0.484020 (237a02e7) 4aad441ae1077153: Receiving packet type: 6 (1rtt protected), S1, Q0, 4aad441ae1077153: <66bb8ee5cdd5e09c>, Seq: 8 (8), Phi: 0, 4aad441ae1077153: Decrypted 12 bytes 4aad441ae1077153: ack_ecn (nb=0), 4-5, ect0=0, ect1=4, ce=0 4aad441ae1077153: connection_close, Error 0x0000, Offending frame 0x1d, Reason length 0 4aad441ae1077153: Out of 2 zero RTT packets, 1 were acked by the server. 4aad441ae1077153: Received 1024 bytes in 0.484117 seconds, 0.016922 Mbps. 4aad441ae1077153: Sent 17 bytes in 0.484117 seconds, 0.000281 Mbps.