bbe795cc966d8648: No root crt list specified -- certificate will not be verified. bbe795cc966d8648: Sending ALPN list (1): hq-interop bbe795cc966d8648: Sending transport parameter TLS extension (85 bytes): bbe795cc966d8648: Extension list (85 bytes): bbe795cc966d8648: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 bbe795cc966d8648: Extension type: 4 (initial_max_data), length 4, 80100000 bbe795cc966d8648: Extension type: 8 (max_streams_bidi), length 2, 4200 bbe795cc966d8648: Extension type: 1 (idle_timeout), length 4, 8002bf20 bbe795cc966d8648: Extension type: 3 (max_packet_size), length 2, 45a0 bbe795cc966d8648: Extension type: 9 (max_streams_uni), length 2, 4200 bbe795cc966d8648: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 bbe795cc966d8648: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff bbe795cc966d8648: Extension type: 14 (active_connection_id_limit), length 1, 08 bbe795cc966d8648: Extension type: 11 (max_ack_delay), length 1, 0a bbe795cc966d8648: Extension type: 15 (hcid), length 8, 005f5f346ebe5971 bbe795cc966d8648: Extension type: 5855 (unknown), length 4, 8000e795 bbe795cc966d8648: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 bbe795cc966d8648: Extension type: 29016 (enable_time_stamp), length 1, 03 bbe795cc966d8648: Extension type: 10930 (grease_quic_bit), length 0 bbe795cc966d8648: Preparing GET on stream 0 for /jmxaqjdvoy bbe795cc966d8648: Sending packet type: 2 (initial), S0, Q1, Version 1, bbe795cc966d8648: , <005f5f346ebe5971>, Seq: 103914, pl: 635 bbe795cc966d8648: Token length: 43, Token: ad9a8b8d8601003c5be46e5d85493208... bbe795cc966d8648: Prepared 615 bytes bbe795cc966d8648: ping, 1 bytes bbe795cc966d8648: crypto_hs, offset 0, length 610: 0100025e0303e772... bbe795cc966d8648: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, bbe795cc966d8648: , <005f5f346ebe5971>, Seq: 0, pl: 523 bbe795cc966d8648: Prepared 503 bytes bbe795cc966d8648: stream 0, offset 0, length 17, fin = 1: 474554202f6a6d78... bbe795cc966d8648: padding, 483 bytes bbe795cc966d8648: Sending 1252 bytes to 193.167.100.100:443 at T=0.001862 (1ad128dc) bbe795cc966d8648: T= 0.252158, Lost packet type 2, number 103914, size 688, DCID <>, reason: timer bbe795cc966d8648: Sending packet type: 2 (initial), S0, Q1, Version 1, bbe795cc966d8648: , <005f5f346ebe5971>, Seq: 103915, pl: 635 bbe795cc966d8648: Token length: 43, Token: ad9a8b8d8601003c5be46e5d85493208... bbe795cc966d8648: Prepared 615 bytes bbe795cc966d8648: ping, 1 bytes bbe795cc966d8648: crypto_hs, offset 0, length 610: 0100025e0303e772... bbe795cc966d8648: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, bbe795cc966d8648: , <005f5f346ebe5971>, Seq: 1, pl: 523 bbe795cc966d8648: Prepared 503 bytes bbe795cc966d8648: padding, 503 bytes bbe795cc966d8648: Sending 1252 bytes to 193.167.100.100:443 at T=0.252158 (1ad4fa94) bbe795cc966d8648: Receiving 1232 bytes from 193.167.100.100:443 at T=0.287705 (1ad5856f) bbe795cc966d8648: Receiving packet type: 2 (initial), S0, Q1, Version 1, bbe795cc966d8648: <005f5f346ebe5971>, <10800227df0a586acde8>, Seq: 0, pl: 161 bbe795cc966d8648: Token length: 0 bbe795cc966d8648: Decrypted 144 bytes bbe795cc966d8648: ack_ecn (nb=0), 103915, ect0=0, ect1=1, ce=0 bbe795cc966d8648: crypto_hs, offset 0, length 129: 0200007d030383d5... bbe795cc966d8648: Receiving packet type: 4 (handshake), S0, Q1, Version 1, bbe795cc966d8648: <005f5f346ebe5971>, <10800227df0a586acde8>, Seq: 0, pl: 197 bbe795cc966d8648: Decrypted 180 bytes bbe795cc966d8648: crypto_hs, offset 0, length 176: 0800008800860010... bbe795cc966d8648: Received transport parameter TLS extension (99 bytes): bbe795cc966d8648: Extension list (99 bytes): bbe795cc966d8648: Extension type: 0 (ocid), length 8, bbe795cc966d8648 bbe795cc966d8648: Extension type: 1 (idle_timeout), length 4, 80007530 bbe795cc966d8648: Extension type: 4 (initial_max_data), length 8, ffffffffffffffff bbe795cc966d8648: Extension type: 5 (max_stream_data_bidi_local), length 4, 80100000 bbe795cc966d8648: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80100000 bbe795cc966d8648: Extension type: 7 (max_stream_data_uni), length 4, 80100000 bbe795cc966d8648: Extension type: 8 (max_streams_bidi), length 1, 10 bbe795cc966d8648: Extension type: 9 (max_streams_uni), length 1, 10 bbe795cc966d8648: Extension type: 11 (max_ack_delay), length 1, 14 bbe795cc966d8648: Extension type: 14 (active_connection_id_limit), length 1, 08 bbe795cc966d8648: Extension type: 15 (hcid), length 10, 10800227df0a586acde8 bbe795cc966d8648: Extension type: 17 (version_negotiation), length 12, 000000018a4abaaa00000001 bbe795cc966d8648: Extension type: 10930 (grease_quic_bit), length 0 bbe795cc966d8648: Extension type: 4278378010 (unknown), length 2, 43e8 bbe795cc966d8648: Extension type: 32 (max_datagram_frame_size), length 1, 00 bbe795cc966d8648: Receiving packet type: 6 (1rtt protected), S0, Q1, bbe795cc966d8648: <0000000000000000>, Seq: 0 (0), Phi: 0, bbe795cc966d8648: Header or encryption error: 420. bbe795cc966d8648: The session was properly resumed! bbe795cc966d8648: Zero RTT data is accepted! bbe795cc966d8648: Negotiated ALPN: hq-interop bbe795cc966d8648: Sending packet type: 4 (handshake), S0, Q0, Version 1, bbe795cc966d8648: <10800227df0a586acde8>, <005f5f346ebe5971>, Seq: 0, pl: 67 bbe795cc966d8648: Prepared 47 bytes bbe795cc966d8648: ack_ecn (nb=0), 0, ect0=1, ect1=0, ce=0 bbe795cc966d8648: crypto_hs, offset 0, length 36: 14000020f5c55a31... bbe795cc966d8648: T= 0.288011, Lost packet type 5, number 0, size 532, DCID <10800227df0a586acde8>, reason: timer bbe795cc966d8648: Sending packet type: 6 (1rtt protected), S0, Q1, bbe795cc966d8648: <10800227df0a586acde8>, Seq: 2 (2), Phi: 0, bbe795cc966d8648: Prepared 283 bytes bbe795cc966d8648: new_connection_id[1]: 0xae6404af2e2d26c5, 656f41271313098ee6bc91decd1ff15d bbe795cc966d8648: new_connection_id[2]: 0xbea7d45bbb3508aa, 69bcfe4411e72ef53562fb24d63b1bcd bbe795cc966d8648: new_connection_id[3]: 0xe1e2906e3772f7b2, 452587507a605c433dbcd48dd7d5be49 bbe795cc966d8648: new_connection_id[4]: 0x8c6b550e05d600ea, 44941e40e2941f4b1c28dd4c3ea827f5 bbe795cc966d8648: new_connection_id[5]: 0x41875d6d2ab69075, 488c5e88b23f829b51d18a7c0e966c56 bbe795cc966d8648: new_connection_id[6]: 0x28fa0e8aca8ade5d, a441e75f9a633fb40a84aff18b78e396 bbe795cc966d8648: new_connection_id[7]: 0xaf910204e7bd9739, 939ef523c63090771bdfa71c0942751a bbe795cc966d8648: stream 0, offset 0, length 17, fin = 1: 474554202f6a6d78... bbe795cc966d8648: padding, 67 bytes bbe795cc966d8648: T= 0.288011, cwin: 16048,flight: 953,nb_ret: 2,rtt_min: 35547,rtt: 35547,rtt_var: 17773,max_ack_delay: 0,state: 13 bbe795cc966d8648: Sending 405 bytes to 193.167.100.100:443 at T=0.288011 (1ad586a1) bbe795cc966d8648: Connection established. Version = 1, I-CID: bbe795cc966d8648, verified: 1 bbe795cc966d8648: Receiving 1332 bytes from 193.167.100.100:443 at T=0.320500 (1ad6058a) bbe795cc966d8648: Receiving packet type: 4 (handshake), S0, Q0, Version 1, bbe795cc966d8648: <005f5f346ebe5971>, <10800227df0a586acde8>, Seq: 1, pl: 25 bbe795cc966d8648: Decrypted 8 bytes bbe795cc966d8648: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 bbe795cc966d8648: Receiving packet type: 6 (1rtt protected), S0, Q1, bbe795cc966d8648: <005f5f346ebe5971>, Seq: 0 (0), Phi: 0, bbe795cc966d8648: Decrypted 1254 bytes bbe795cc966d8648: handshake_done bbe795cc966d8648: new_connection_id[1]: 0x0ecd481e277933434d5a, 19b990244495fc66e2823d56392e4a21 bbe795cc966d8648: new_connection_id[2]: 0x3d67374f71e38d7b5e76, 7dabad16b22fcf515ab1699f836d237b bbe795cc966d8648: new_connection_id[3]: 0x44424cf406cf2aab3f5b, 695cc26e41e5dbafdabce2bf7abe3f33 bbe795cc966d8648: new_connection_id[4]: 0xaba7185bc3b7966a2c71, 027a727101e78e659e04b895e3d6500b bbe795cc966d8648: new_connection_id[5]: 0x39718f4282e463526c6b, 409f29fc5ac9324a2d420e322d658b85 bbe795cc966d8648: new_connection_id[6]: 0x349d7c64f9901ca9c3fe, b9f8cb9afc456e25b69633f2e7e8d6fc bbe795cc966d8648: new_connection_id[7]: 0xb1f0aaf531165376c752, 3f2008a34af6d94bd734837360aa6cf2 bbe795cc966d8648: padding, 1043 bytes bbe795cc966d8648: T= 0.320500, cwin: 16126,flight: 859,nb_ret: 2,rtt_min: 32489,rtt: 35164,rtt_var: 14094,max_ack_delay: 0,state: 14 bbe795cc966d8648: Receiving 1232 bytes from 193.167.100.100:443 at T=0.322784 (1ad60e76) bbe795cc966d8648: Receiving packet type: 6 (1rtt protected), S1, Q0, bbe795cc966d8648: <005f5f346ebe5971>, Seq: 2 (2), Phi: 0, bbe795cc966d8648: Decrypted 1206 bytes bbe795cc966d8648: stream 0, offset 0, length 1024, fin = 1: 9d62a7ef2cc7353c... bbe795cc966d8648: crypto_hs, offset 0, length 174: 0400012d0002a300... bbe795cc966d8648: T= 0.322784, cwin: 16126,flight: 859,nb_ret: 2,rtt_min: 32489,rtt: 35164,rtt_var: 14094,max_ack_delay: 0,state: 14 bbe795cc966d8648: All done, Closing the connection. bbe795cc966d8648: Sending packet type: 6 (1rtt protected), S0, Q1, bbe795cc966d8648: <10800227df0a586acde8>, Seq: 3 (3), Phi: 0, bbe795cc966d8648: Prepared 13 bytes bbe795cc966d8648: ack_ecn (nb=1), 2, 0, ect0=2, ect1=0, ce=0 bbe795cc966d8648: application_close, Error 0x0000, Reason length 0 bbe795cc966d8648: Sending 41 bytes to 193.167.100.100:443 at T=0.322919 (1ad60efd) bbe795cc966d8648: Receiving 35 bytes from 193.167.100.100:443 at T=0.340174 (1ad65264) bbe795cc966d8648: Receiving packet type: 6 (1rtt protected), S1, Q1, bbe795cc966d8648: <005f5f346ebe5971>, Seq: 4 (4), Phi: 0, bbe795cc966d8648: Decrypted 9 bytes bbe795cc966d8648: ack_ecn (nb=0), 1-2, ect0=0, ect1=2, ce=0 bbe795cc966d8648: Receiving 38 bytes from 193.167.100.100:443 at T=0.353596 (1ad686d2) bbe795cc966d8648: Receiving packet type: 6 (1rtt protected), S0, Q1, bbe795cc966d8648: <005f5f346ebe5971>, Seq: 5 (5), Phi: 0, bbe795cc966d8648: Decrypted 12 bytes bbe795cc966d8648: ack_ecn (nb=0), 1-3, ect0=0, ect1=3, ce=0 bbe795cc966d8648: connection_close, Error 0x0000, Offending frame 0x1d, Reason length 0 bbe795cc966d8648: Out of 2 zero RTT packets, 0 were acked by the server. bbe795cc966d8648: Received 1024 bytes in 0.353699 seconds, 0.023161 Mbps. bbe795cc966d8648: Sent 17 bytes in 0.353699 seconds, 0.000385 Mbps.