dd64f44df5ad9e35: No root crt list specified -- certificate will not be verified. dd64f44df5ad9e35: Sending ALPN list (1): hq-interop dd64f44df5ad9e35: Sending transport parameter TLS extension (85 bytes): dd64f44df5ad9e35: Extension list (85 bytes): dd64f44df5ad9e35: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 dd64f44df5ad9e35: Extension type: 4 (initial_max_data), length 4, 80100000 dd64f44df5ad9e35: Extension type: 8 (max_streams_bidi), length 2, 4200 dd64f44df5ad9e35: Extension type: 1 (idle_timeout), length 4, 8002bf20 dd64f44df5ad9e35: Extension type: 3 (max_packet_size), length 2, 45a0 dd64f44df5ad9e35: Extension type: 9 (max_streams_uni), length 2, 4200 dd64f44df5ad9e35: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 dd64f44df5ad9e35: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff dd64f44df5ad9e35: Extension type: 14 (active_connection_id_limit), length 1, 08 dd64f44df5ad9e35: Extension type: 11 (max_ack_delay), length 1, 0a dd64f44df5ad9e35: Extension type: 15 (hcid), length 8, e7bd9644284f58e6 dd64f44df5ad9e35: Extension type: 6909 (unknown), length 4, 800064f4 dd64f44df5ad9e35: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 dd64f44df5ad9e35: Extension type: 29016 (enable_time_stamp), length 1, 03 dd64f44df5ad9e35: Extension type: 10930 (grease_quic_bit), length 0 dd64f44df5ad9e35: Preparing GET on stream 0 for /sour-cyan-lawyer dd64f44df5ad9e35: Sending packet type: 2 (initial), S0, Q1, Version 1, dd64f44df5ad9e35: , , Seq: 128187, pl: 635 dd64f44df5ad9e35: Token length: 0 dd64f44df5ad9e35: Prepared 615 bytes dd64f44df5ad9e35: ping, 1 bytes dd64f44df5ad9e35: crypto_hs, offset 0, length 610: 0100025e03035a79... dd64f44df5ad9e35: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, dd64f44df5ad9e35: , , Seq: 0, pl: 566 dd64f44df5ad9e35: Prepared 546 bytes dd64f44df5ad9e35: stream 0, offset 0, length 23, fin = 1: 474554202f736f75... dd64f44df5ad9e35: padding, 520 bytes dd64f44df5ad9e35: Sending 1252 bytes to 193.167.100.100:443 at T=0.001858 (244c3e4d) dd64f44df5ad9e35: T= 0.252161, Lost packet type 2, number 128187, size 645, DCID <>, reason: timer dd64f44df5ad9e35: Sending packet type: 2 (initial), S0, Q1, Version 1, dd64f44df5ad9e35: , , Seq: 128188, pl: 635 dd64f44df5ad9e35: Token length: 0 dd64f44df5ad9e35: Prepared 615 bytes dd64f44df5ad9e35: ping, 1 bytes dd64f44df5ad9e35: crypto_hs, offset 0, length 610: 0100025e03035a79... dd64f44df5ad9e35: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, dd64f44df5ad9e35: , , Seq: 1, pl: 566 dd64f44df5ad9e35: Prepared 546 bytes dd64f44df5ad9e35: padding, 546 bytes dd64f44df5ad9e35: Sending 1252 bytes to 193.167.100.100:443 at T=0.252161 (2450100c) dd64f44df5ad9e35: Receiving 1232 bytes from 193.167.100.100:443 at T=0.586593 (24552a6c) dd64f44df5ad9e35: Receiving packet type: 2 (initial), S0, Q1, Version 1, dd64f44df5ad9e35: , <5e0d5089eea7c685e19c>, Seq: 5, pl: 164 dd64f44df5ad9e35: Token length: 0 dd64f44df5ad9e35: Decrypted 147 bytes dd64f44df5ad9e35: ack_ecn (nb=0), 128188, ect0=0, ect1=1, ce=0 dd64f44df5ad9e35: crypto_hs, offset 0, length 129: 0200007d0303c2df... dd64f44df5ad9e35: Receiving packet type: 4 (handshake), S0, Q0, Version 1, dd64f44df5ad9e35: , <5e0d5089eea7c685e19c>, Seq: 1, pl: 196 dd64f44df5ad9e35: Decrypted 179 bytes dd64f44df5ad9e35: crypto_hs, offset 0, length 175: 0800008700850010... dd64f44df5ad9e35: Received transport parameter TLS extension (98 bytes): dd64f44df5ad9e35: Extension list (98 bytes): dd64f44df5ad9e35: Extension type: 0 (ocid), length 8, dd64f44df5ad9e35 dd64f44df5ad9e35: Extension type: 1 (idle_timeout), length 4, 80007530 dd64f44df5ad9e35: Extension type: 4 (initial_max_data), length 4, 80200000 dd64f44df5ad9e35: Extension type: 5 (max_stream_data_bidi_local), length 4, 80100000 dd64f44df5ad9e35: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80100000 dd64f44df5ad9e35: Extension type: 7 (max_stream_data_uni), length 4, 80100000 dd64f44df5ad9e35: Extension type: 8 (max_streams_bidi), length 1, 10 dd64f44df5ad9e35: Extension type: 9 (max_streams_uni), length 1, 10 dd64f44df5ad9e35: Extension type: 11 (max_ack_delay), length 1, 14 dd64f44df5ad9e35: Extension type: 14 (active_connection_id_limit), length 1, 08 dd64f44df5ad9e35: Extension type: 15 (hcid), length 10, 5e0d5089eea7c685e19c dd64f44df5ad9e35: Extension type: 17 (version_negotiation), length 12, 00000001eaaa6aea00000001 dd64f44df5ad9e35: Extension type: 10930 (grease_quic_bit), length 0 dd64f44df5ad9e35: Extension type: 4278378010 (unknown), length 2, 43e8 dd64f44df5ad9e35: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff dd64f44df5ad9e35: Receiving packet type: 6 (1rtt protected), S0, Q1, dd64f44df5ad9e35: <0000000000000000>, Seq: 0 (0), Phi: 0, dd64f44df5ad9e35: Header or encryption error: 420. dd64f44df5ad9e35: The session was properly resumed! dd64f44df5ad9e35: Zero RTT data is accepted! dd64f44df5ad9e35: Negotiated ALPN: hq-interop dd64f44df5ad9e35: Sending packet type: 4 (handshake), S0, Q0, Version 1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, , Seq: 0, pl: 64 dd64f44df5ad9e35: Prepared 44 bytes dd64f44df5ad9e35: ack (nb=0), 1 dd64f44df5ad9e35: crypto_hs, offset 0, length 36: 14000020b1cd658c... dd64f44df5ad9e35: Sending packet type: 6 (1rtt protected), S0, Q0, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, Seq: 2 (2), Phi: 0, dd64f44df5ad9e35: Prepared 283 bytes dd64f44df5ad9e35: new_connection_id[1]: 0x9168c4c6b4254382, a1fc8aaf93b14e79e673fd0e359031bd dd64f44df5ad9e35: new_connection_id[2]: 0xacd82314e89a4fe6, 495a5d7ce62b51263e8a5896fe68ecfd dd64f44df5ad9e35: new_connection_id[3]: 0x6419457d85490a02, 26999dade8c51f2df57c8092d9b62e80 dd64f44df5ad9e35: new_connection_id[4]: 0xd8d414179aa32759, 860f83113a415a475125fcacd60a5ea5 dd64f44df5ad9e35: new_connection_id[5]: 0x5932d07f80a0c648, 74f31547836cefdb2b355525fe621387 dd64f44df5ad9e35: new_connection_id[6]: 0x714f191b9c42f171, ee2c74c4311af3c2baec2edd3fc481d9 dd64f44df5ad9e35: new_connection_id[7]: 0x8807c2b1113fb4e7, da77d82e189546ca1eda59c2300a4dd4 dd64f44df5ad9e35: padding, 87 bytes dd64f44df5ad9e35: T= 0.586986, cwin: 51368,flight: 1584,nb_ret: 1,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 402 bytes to 193.167.100.100:443 at T=0.586986 (24552bf5) dd64f44df5ad9e35: Connection established. Version = 1, I-CID: dd64f44df5ad9e35, verified: 1 dd64f44df5ad9e35: Receiving 1232 bytes from 193.167.100.100:443 at T=1.187573 (245e5600) dd64f44df5ad9e35: Receiving packet type: 2 (initial), S0, Q1, Version 1, dd64f44df5ad9e35: , <5e0d5089eea7c685e19c>, Seq: -1, pl: 164 dd64f44df5ad9e35: Token length: 0 dd64f44df5ad9e35: Header or encryption error: 429. dd64f44df5ad9e35: Receiving packet type: 4 (handshake), S0, Q0, Version 1, dd64f44df5ad9e35: , <5e0d5089eea7c685e19c>, Seq: 2, pl: 196 dd64f44df5ad9e35: Decrypted 179 bytes dd64f44df5ad9e35: crypto_hs, offset 0, length 175: 0800008700850010... dd64f44df5ad9e35: Receiving packet type: 6 (1rtt protected), S0, Q1, dd64f44df5ad9e35: <0000000000000000>, Seq: 0 (0), Phi: 0, dd64f44df5ad9e35: Header or encryption error: 420. dd64f44df5ad9e35: Sending packet type: 4 (handshake), S0, Q0, Version 1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, , Seq: 1, pl: 28 dd64f44df5ad9e35: Prepared 8 bytes dd64f44df5ad9e35: ack (nb=0), 1-2 dd64f44df5ad9e35: padding, 3 bytes dd64f44df5ad9e35: T= 1.187677, cwin: 51368,flight: 1639,nb_ret: 1,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 55 bytes to 193.167.100.100:443 at T=1.187677 (245e5668) dd64f44df5ad9e35: T= 1.423358, Lost packet type 5, number 0, size 575, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: Sending packet type: 6 (1rtt protected), S0, Q1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, Seq: 3 (3), Phi: 0, dd64f44df5ad9e35: Prepared 27 bytes dd64f44df5ad9e35: stream 0, offset 0, length 23, fin = 1: 474554202f736f75... dd64f44df5ad9e35: padding, 1 bytes dd64f44df5ad9e35: T= 1.423358, cwin: 51368,flight: 1103,nb_ret: 2,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 55 bytes to 193.167.100.100:443 at T=1.423358 (2461ef09) dd64f44df5ad9e35: T= 2.024426, Lost packet type 4, number 0, size 75, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: Sending packet type: 4 (handshake), S0, Q0, Version 1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, , Seq: 2, pl: 156 dd64f44df5ad9e35: Prepared 136 bytes dd64f44df5ad9e35: crypto_hs, offset 0, length 36: 14000020b1cd658c... dd64f44df5ad9e35: ack (nb=0), 1-2 dd64f44df5ad9e35: padding, 89 bytes dd64f44df5ad9e35: T= 2.024426, cwin: 51368,flight: 1195,nb_ret: 3,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 183 bytes to 193.167.100.100:443 at T=2.024426 (246b1af5) dd64f44df5ad9e35: T= 3.096641, Lost packet type 5, number 1, size 575, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: T= 3.096641, Lost packet type 6, number 2, size 295, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: Sending packet type: 6 (1rtt protected), S0, Q0, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, Seq: 4 (4), Phi: 0, dd64f44df5ad9e35: Prepared 283 bytes dd64f44df5ad9e35: new_connection_id[1]: 0x9168c4c6b4254382, a1fc8aaf93b14e79e673fd0e359031bd dd64f44df5ad9e35: new_connection_id[2]: 0xacd82314e89a4fe6, 495a5d7ce62b51263e8a5896fe68ecfd dd64f44df5ad9e35: new_connection_id[3]: 0x6419457d85490a02, 26999dade8c51f2df57c8092d9b62e80 dd64f44df5ad9e35: new_connection_id[4]: 0xd8d414179aa32759, 860f83113a415a475125fcacd60a5ea5 dd64f44df5ad9e35: new_connection_id[5]: 0x5932d07f80a0c648, 74f31547836cefdb2b355525fe621387 dd64f44df5ad9e35: new_connection_id[6]: 0x714f191b9c42f171, ee2c74c4311af3c2baec2edd3fc481d9 dd64f44df5ad9e35: new_connection_id[7]: 0x8807c2b1113fb4e7, da77d82e189546ca1eda59c2300a4dd4 dd64f44df5ad9e35: padding, 87 bytes dd64f44df5ad9e35: T= 3.096641, cwin: 51368,flight: 604,nb_ret: 5,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 311 bytes to 193.167.100.100:443 at T=3.096641 (247b774c) dd64f44df5ad9e35: T= 3.697238, Lost packet type 4, number 1, size 39, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: T= 3.697238, Lost packet type 4, number 2, size 167, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: Sending packet type: 4 (handshake), S0, Q0, Version 1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, , Seq: 3, pl: 156 dd64f44df5ad9e35: Prepared 136 bytes dd64f44df5ad9e35: crypto_hs, offset 0, length 36: 14000020b1cd658c... dd64f44df5ad9e35: ack (nb=0), 1-2 dd64f44df5ad9e35: padding, 89 bytes dd64f44df5ad9e35: T= 3.697238, cwin: 51368,flight: 549,nb_ret: 7,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 183 bytes to 193.167.100.100:443 at T=3.697238 (2484a161) dd64f44df5ad9e35: Receiving 47 bytes from 193.167.100.100:443 at T=4.313362 (248e081d) dd64f44df5ad9e35: Receiving packet type: 4 (handshake), S0, Q0, Version 1, dd64f44df5ad9e35: , <5e0d5089eea7c685e19c>, Seq: 3, pl: 20 dd64f44df5ad9e35: Decrypted 3 bytes dd64f44df5ad9e35: ping, 1 bytes dd64f44df5ad9e35: padding, 2 bytes dd64f44df5ad9e35: Sending packet type: 4 (handshake), S0, Q0, Version 1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, , Seq: 4, pl: 28 dd64f44df5ad9e35: Prepared 8 bytes dd64f44df5ad9e35: ack (nb=0), 1-3 dd64f44df5ad9e35: padding, 3 bytes dd64f44df5ad9e35: T= 4.313467, cwin: 51368,flight: 604,nb_ret: 7,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 55 bytes to 193.167.100.100:443 at T=4.313467 (248e0886) dd64f44df5ad9e35: T= 4.769306, Lost packet type 6, number 3, size 39, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: Sending packet type: 6 (1rtt protected), S0, Q1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, Seq: 5 (5), Phi: 0, dd64f44df5ad9e35: Prepared 27 bytes dd64f44df5ad9e35: stream 0, offset 0, length 23, fin = 1: 474554202f736f75... dd64f44df5ad9e35: padding, 1 bytes dd64f44df5ad9e35: T= 4.769306, cwin: 51368,flight: 604,nb_ret: 8,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 55 bytes to 193.167.100.100:443 at T=4.769306 (2494fd25) dd64f44df5ad9e35: T= 5.986895, Lost packet type 4, number 3, size 167, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: Sending packet type: 4 (handshake), S0, Q0, Version 1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, , Seq: 5, pl: 156 dd64f44df5ad9e35: Prepared 136 bytes dd64f44df5ad9e35: crypto_hs, offset 0, length 36: 14000020b1cd658c... dd64f44df5ad9e35: ack (nb=0), 1-3 dd64f44df5ad9e35: padding, 89 bytes dd64f44df5ad9e35: T= 5.986895, cwin: 51368,flight: 604,nb_ret: 9,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 183 bytes to 193.167.100.100:443 at T=5.986895 (24a7915a) dd64f44df5ad9e35: T= 6.645016, Lost packet type 6, number 4, size 295, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: Sending packet type: 6 (1rtt protected), S0, Q1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, Seq: 6 (6), Phi: 0, dd64f44df5ad9e35: Prepared 283 bytes dd64f44df5ad9e35: new_connection_id[1]: 0x9168c4c6b4254382, a1fc8aaf93b14e79e673fd0e359031bd dd64f44df5ad9e35: new_connection_id[2]: 0xacd82314e89a4fe6, 495a5d7ce62b51263e8a5896fe68ecfd dd64f44df5ad9e35: new_connection_id[3]: 0x6419457d85490a02, 26999dade8c51f2df57c8092d9b62e80 dd64f44df5ad9e35: new_connection_id[4]: 0xd8d414179aa32759, 860f83113a415a475125fcacd60a5ea5 dd64f44df5ad9e35: new_connection_id[5]: 0x5932d07f80a0c648, 74f31547836cefdb2b355525fe621387 dd64f44df5ad9e35: new_connection_id[6]: 0x714f191b9c42f171, ee2c74c4311af3c2baec2edd3fc481d9 dd64f44df5ad9e35: new_connection_id[7]: 0x8807c2b1113fb4e7, da77d82e189546ca1eda59c2300a4dd4 dd64f44df5ad9e35: padding, 87 bytes dd64f44df5ad9e35: T= 6.645016, cwin: 51368,flight: 604,nb_ret: 10,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 311 bytes to 193.167.100.100:443 at T=6.645016 (24b19c23) dd64f44df5ad9e35: Receiving 47 bytes from 193.167.100.100:443 at T=7.555729 (24bf819c) dd64f44df5ad9e35: Receiving packet type: 4 (handshake), S0, Q1, Version 1, dd64f44df5ad9e35: , <5e0d5089eea7c685e19c>, Seq: 4, pl: 20 dd64f44df5ad9e35: Decrypted 3 bytes dd64f44df5ad9e35: ping, 1 bytes dd64f44df5ad9e35: padding, 2 bytes dd64f44df5ad9e35: Sending packet type: 4 (handshake), S0, Q0, Version 1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, , Seq: 6, pl: 28 dd64f44df5ad9e35: Prepared 8 bytes dd64f44df5ad9e35: ack (nb=0), 1-4 dd64f44df5ad9e35: padding, 3 bytes dd64f44df5ad9e35: T= 7.555814, cwin: 51368,flight: 659,nb_ret: 10,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 55 bytes to 193.167.100.100:443 at T=7.555814 (24bf81f1) dd64f44df5ad9e35: T= 8.521035, Lost packet type 6, number 5, size 39, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: Sending packet type: 6 (1rtt protected), S0, Q1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, Seq: 7 (7), Phi: 0, dd64f44df5ad9e35: Prepared 27 bytes dd64f44df5ad9e35: stream 0, offset 0, length 23, fin = 1: 474554202f736f75... dd64f44df5ad9e35: padding, 1 bytes dd64f44df5ad9e35: T= 8.521035, cwin: 51368,flight: 659,nb_ret: 11,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 55 bytes to 193.167.100.100:443 at T=8.521035 (24ce3c56) dd64f44df5ad9e35: T= 9.431776, Lost packet type 4, number 4, size 39, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: T= 9.431776, Lost packet type 4, number 5, size 167, DCID <5e0d5089eea7c685e19c>, reason: timer dd64f44df5ad9e35: Sending packet type: 4 (handshake), S0, Q0, Version 1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, , Seq: 7, pl: 156 dd64f44df5ad9e35: Prepared 136 bytes dd64f44df5ad9e35: crypto_hs, offset 0, length 36: 14000020b1cd658c... dd64f44df5ad9e35: ack (nb=0), 1-4 dd64f44df5ad9e35: padding, 89 bytes dd64f44df5ad9e35: T= 9.431776, cwin: 51368,flight: 604,nb_ret: 13,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: Sending 183 bytes to 193.167.100.100:443 at T=9.431776 (24dc21eb) dd64f44df5ad9e35: Receiving 1332 bytes from 193.167.100.100:443 at T=9.466904 (24dcab23) dd64f44df5ad9e35: Receiving packet type: 6 (1rtt protected), S1, Q1, dd64f44df5ad9e35: , Seq: 1 (1), Phi: 0, dd64f44df5ad9e35: Decrypted 1306 bytes dd64f44df5ad9e35: ping, 1 bytes dd64f44df5ad9e35: stream 0, offset 0, length 1024, fin = 1: 477c113d49cb4db0... dd64f44df5ad9e35: crypto_hs, offset 0, length 273: 0400012d0002a300... dd64f44df5ad9e35: T= 9.466904, cwin: 51368,flight: 604,nb_ret: 13,rtt_min: 334432,rtt: 334432,rtt_var: 167216,max_ack_delay: 0,state: 13 dd64f44df5ad9e35: All done, Closing the connection. dd64f44df5ad9e35: Sending packet type: 6 (1rtt protected), S0, Q1, dd64f44df5ad9e35: <5e0d5089eea7c685e19c>, Seq: 8 (8), Phi: 0, dd64f44df5ad9e35: Prepared 11 bytes dd64f44df5ad9e35: ack_ecn (nb=0), 1, ect0=1, ect1=0, ce=0 dd64f44df5ad9e35: application_close, Error 0x0000, Reason length 0 dd64f44df5ad9e35: Sending 39 bytes to 193.167.100.100:443 at T=9.467115 (24dcabf6) dd64f44df5ad9e35: Receiving 42 bytes from 193.167.100.100:443 at T=9.497935 (24dd245a) dd64f44df5ad9e35: Receiving packet type: 6 (1rtt protected), S1, Q0, dd64f44df5ad9e35: , Seq: 2 (2), Phi: 0, dd64f44df5ad9e35: Decrypted 16 bytes dd64f44df5ad9e35: ack_ecn (nb=2), 8, 3-6, 1, ect0=0, ect1=6, ce=0 dd64f44df5ad9e35: connection_close, Error 0x0000, Offending frame 0x1d, Reason length 0 dd64f44df5ad9e35: Out of 2 zero RTT packets, 0 were acked by the server. dd64f44df5ad9e35: Received 1024 bytes in 9.498062 seconds, 0.000862 Mbps. dd64f44df5ad9e35: Sent 23 bytes in 9.498062 seconds, 0.000019 Mbps.