211f9b0e44957e22: No root crt list specified -- certificate will not be verified. 211f9b0e44957e22: Sending ALPN list (1): hq-interop 211f9b0e44957e22: Sending transport parameter TLS extension (83 bytes): 211f9b0e44957e22: Extension list (83 bytes): 211f9b0e44957e22: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 211f9b0e44957e22: Extension type: 4 (initial_max_data), length 4, 80100000 211f9b0e44957e22: Extension type: 8 (max_streams_bidi), length 2, 4200 211f9b0e44957e22: Extension type: 1 (idle_timeout), length 4, 8002bf20 211f9b0e44957e22: Extension type: 3 (max_packet_size), length 2, 45a0 211f9b0e44957e22: Extension type: 9 (max_streams_uni), length 2, 4200 211f9b0e44957e22: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 211f9b0e44957e22: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 211f9b0e44957e22: Extension type: 14 (active_connection_id_limit), length 1, 08 211f9b0e44957e22: Extension type: 11 (max_ack_delay), length 1, 0a 211f9b0e44957e22: Extension type: 15 (hcid), length 8, 5ca4b18ca1855ce8 211f9b0e44957e22: Extension type: 1081 (unknown), length 2, 5f9b 211f9b0e44957e22: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 211f9b0e44957e22: Extension type: 29016 (enable_time_stamp), length 1, 03 211f9b0e44957e22: Extension type: 10930 (grease_quic_bit), length 0 211f9b0e44957e22: Preparing GET on stream 0 for /wgmvqhkaln 211f9b0e44957e22: Sending packet type: 2 (initial), S0, Q1, Version 1, 211f9b0e44957e22: <211f9b0e44957e22>, <5ca4b18ca1855ce8>, Seq: 70514, pl: 633 211f9b0e44957e22: Token length: 0 211f9b0e44957e22: Prepared 613 bytes 211f9b0e44957e22: ping, 1 bytes 211f9b0e44957e22: crypto_hs, offset 0, length 608: 0100025c0303fad9... 211f9b0e44957e22: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 211f9b0e44957e22: <211f9b0e44957e22>, <5ca4b18ca1855ce8>, Seq: 0, pl: 568 211f9b0e44957e22: Prepared 548 bytes 211f9b0e44957e22: stream 0, offset 0, length 17, fin = 1: 474554202f77676d... 211f9b0e44957e22: padding, 528 bytes 211f9b0e44957e22: Sending 1252 bytes to 193.167.100.100:443 at T=0.001933 (1f85e322) 211f9b0e44957e22: Receiving 1232 bytes from 193.167.100.100:443 at T=0.037309 (1f866d52) 211f9b0e44957e22: Receiving packet type: 2 (initial), S0, Q1, Version 1, 211f9b0e44957e22: <5ca4b18ca1855ce8>, <1292470555b301faedcf>, Seq: 0, pl: 161 211f9b0e44957e22: Token length: 0 211f9b0e44957e22: Decrypted 144 bytes 211f9b0e44957e22: ack_ecn (nb=0), 70514, ect0=0, ect1=1, ce=0 211f9b0e44957e22: crypto_hs, offset 0, length 129: 0200007d0303fdd0... 211f9b0e44957e22: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 211f9b0e44957e22: <5ca4b18ca1855ce8>, <1292470555b301faedcf>, Seq: 0, pl: 197 211f9b0e44957e22: Decrypted 180 bytes 211f9b0e44957e22: crypto_hs, offset 0, length 176: 0800008800860010... 211f9b0e44957e22: Received transport parameter TLS extension (99 bytes): 211f9b0e44957e22: Extension list (99 bytes): 211f9b0e44957e22: Extension type: 0 (ocid), length 8, 211f9b0e44957e22 211f9b0e44957e22: Extension type: 1 (idle_timeout), length 4, 80007530 211f9b0e44957e22: Extension type: 4 (initial_max_data), length 8, ffffffffffffffff 211f9b0e44957e22: Extension type: 5 (max_stream_data_bidi_local), length 4, 80100000 211f9b0e44957e22: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80100000 211f9b0e44957e22: Extension type: 7 (max_stream_data_uni), length 4, 80100000 211f9b0e44957e22: Extension type: 8 (max_streams_bidi), length 1, 10 211f9b0e44957e22: Extension type: 9 (max_streams_uni), length 1, 10 211f9b0e44957e22: Extension type: 11 (max_ack_delay), length 1, 14 211f9b0e44957e22: Extension type: 14 (active_connection_id_limit), length 1, 08 211f9b0e44957e22: Extension type: 15 (hcid), length 10, 1292470555b301faedcf 211f9b0e44957e22: Extension type: 17 (version_negotiation), length 12, 00000001ca7aca7a00000001 211f9b0e44957e22: Extension type: 10930 (grease_quic_bit), length 0 211f9b0e44957e22: Extension type: 4278378010 (unknown), length 2, 43e8 211f9b0e44957e22: Extension type: 32 (max_datagram_frame_size), length 1, 00 211f9b0e44957e22: Receiving packet type: 6 (1rtt protected), S0, Q1, 211f9b0e44957e22: <0000000000000000>, Seq: 0 (0), Phi: 0, 211f9b0e44957e22: Header or encryption error: 420. 211f9b0e44957e22: The session was properly resumed! 211f9b0e44957e22: Zero RTT data is accepted! 211f9b0e44957e22: Negotiated ALPN: hq-interop 211f9b0e44957e22: Sending packet type: 4 (handshake), S0, Q0, Version 1, 211f9b0e44957e22: <1292470555b301faedcf>, <5ca4b18ca1855ce8>, Seq: 0, pl: 67 211f9b0e44957e22: Prepared 47 bytes 211f9b0e44957e22: ack_ecn (nb=0), 0, ect0=1, ect1=0, ce=0 211f9b0e44957e22: crypto_hs, offset 0, length 36: 14000020e92e86e5... 211f9b0e44957e22: Sending packet type: 6 (1rtt protected), S0, Q0, 211f9b0e44957e22: <1292470555b301faedcf>, Seq: 1 (1), Phi: 0, 211f9b0e44957e22: Prepared 283 bytes 211f9b0e44957e22: new_connection_id[1]: 0x789bc75fd2e458af, 757cf44633576c1e0ebcd409efdd8212 211f9b0e44957e22: new_connection_id[2]: 0x2a5cb454dd1ce393, 2268978825332ef6af396e9b28d2a7b2 211f9b0e44957e22: new_connection_id[3]: 0x59d5b073be0682f8, f598f2e7409c540cdced8dd6f9aa11fc 211f9b0e44957e22: new_connection_id[4]: 0x8b18db7f658e557b, 2830e1bfb1ab3bd8009837d087d214cd 211f9b0e44957e22: new_connection_id[5]: 0x0e68ad4ea6a01ab3, 81df8ca14e6afbaedb6b7fde617b7ff4 211f9b0e44957e22: new_connection_id[6]: 0xd717182e789df78a, fab190572e75497e036749a5865afcc2 211f9b0e44957e22: new_connection_id[7]: 0xb012f399cdb528c2, 852b7111a30f4c7ccf9f17f6684cb9e2 211f9b0e44957e22: padding, 87 bytes 211f9b0e44957e22: T= 0.037658, cwin: 16003,flight: 998,nb_ret: 0,rtt_min: 35376,rtt: 35376,rtt_var: 17688,max_ack_delay: 0,state: 13 211f9b0e44957e22: Sending 405 bytes to 193.167.100.100:443 at T=0.037658 (1f866eaf) 211f9b0e44957e22: Connection established. Version = 1, I-CID: 211f9b0e44957e22, verified: 1 211f9b0e44957e22: Receiving 35 bytes from 193.167.100.100:443 at T=0.054888 (1f86b1fd) 211f9b0e44957e22: Receiving packet type: 6 (1rtt protected), S0, Q1, 211f9b0e44957e22: <5ca4b18ca1855ce8>, Seq: 1 (1), Phi: 0, 211f9b0e44957e22: Decrypted 9 bytes 211f9b0e44957e22: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 211f9b0e44957e22: T= 0.054888, cwin: 16580,flight: 405,nb_ret: 0,rtt_min: 35376,rtt: 35376,rtt_var: 17688,max_ack_delay: 0,state: 13 211f9b0e44957e22: Receiving 1332 bytes from 193.167.100.100:443 at T=0.070340 (1f86ee59) 211f9b0e44957e22: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 211f9b0e44957e22: <5ca4b18ca1855ce8>, <1292470555b301faedcf>, Seq: 1, pl: 25 211f9b0e44957e22: Decrypted 8 bytes 211f9b0e44957e22: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 211f9b0e44957e22: Receiving packet type: 6 (1rtt protected), S0, Q1, 211f9b0e44957e22: <5ca4b18ca1855ce8>, Seq: 2 (2), Phi: 0, 211f9b0e44957e22: Decrypted 1254 bytes 211f9b0e44957e22: handshake_done 211f9b0e44957e22: new_connection_id[1]: 0x39210fc9ad00f5e3835c, d4281b3f21ca6426d670666afb97d94f 211f9b0e44957e22: new_connection_id[2]: 0x509e92354597455669e1, b1cdc14dbbd10fbc4c760391966ab569 211f9b0e44957e22: new_connection_id[3]: 0x8c641a7219bfce89ad67, b5c9d4e15de43dd803d8b932d65e8e46 211f9b0e44957e22: new_connection_id[4]: 0x95217bc1b0594099fcb0, c0921c09971c6b975bbdc0fb31ea7e7f 211f9b0e44957e22: new_connection_id[5]: 0x78ab2c6c5d0805e6b9b2, 4741ff090c06e9c2c1f31425cff8c6f1 211f9b0e44957e22: new_connection_id[6]: 0x145bc4410c0609a8897b, ea605cedbfa47935caccc2dbe6c47ac4 211f9b0e44957e22: new_connection_id[7]: 0xd6e24bf58df7567bcd3d, ba019b5875578940cfa4bbab782baf26 211f9b0e44957e22: padding, 1043 bytes 211f9b0e44957e22: T= 0.070340, cwin: 16658,flight: 311,nb_ret: 0,rtt_min: 32682,rtt: 36306,rtt_var: 17660,max_ack_delay: 0,state: 14 211f9b0e44957e22: Sending packet type: 6 (1rtt protected), S1, Q0, 211f9b0e44957e22: <1292470555b301faedcf>, Seq: 2 (2), Phi: 0, 211f9b0e44957e22: Prepared 27 bytes 211f9b0e44957e22: ack_ecn (nb=0), 1-2, ect0=2, ect1=0, ce=0 211f9b0e44957e22: padding, 19 bytes 211f9b0e44957e22: T= 0.070465, cwin: 16658,flight: 366,nb_ret: 0,rtt_min: 32682,rtt: 36306,rtt_var: 17660,max_ack_delay: 0,state: 14 211f9b0e44957e22: Sending 55 bytes to 193.167.100.100:443 at T=0.070465 (1f86eed6) 211f9b0e44957e22: Receiving 1332 bytes from 193.167.100.100:443 at T=0.071406 (1f86f283) 211f9b0e44957e22: Receiving packet type: 6 (1rtt protected), S1, Q1, 211f9b0e44957e22: <5ca4b18ca1855ce8>, Seq: 3 (3), Phi: 0, 211f9b0e44957e22: Decrypted 1306 bytes 211f9b0e44957e22: ping, 1 bytes 211f9b0e44957e22: padding, 1305 bytes 211f9b0e44957e22: T= 0.071406, cwin: 16658,flight: 366,nb_ret: 0,rtt_min: 32682,rtt: 36306,rtt_var: 17660,max_ack_delay: 0,state: 14 211f9b0e44957e22: Receiving 380 bytes from 193.167.100.100:443 at T=0.072874 (1f86f83f) 211f9b0e44957e22: Receiving packet type: 6 (1rtt protected), S0, Q0, 211f9b0e44957e22: <5ca4b18ca1855ce8>, Seq: 4 (4), Phi: 0, 211f9b0e44957e22: Decrypted 354 bytes 211f9b0e44957e22: crypto_hs, offset 0, length 305: 0400012d0002a300... 211f9b0e44957e22: new_token[43]: 0xad9a8b8d860100575502ced4d6cf4df1... 211f9b0e44957e22: T= 0.072874, cwin: 16658,flight: 366,nb_ret: 0,rtt_min: 32682,rtt: 36306,rtt_var: 17660,max_ack_delay: 0,state: 14 211f9b0e44957e22: Sending packet type: 6 (1rtt protected), S1, Q1, 211f9b0e44957e22: <1292470555b301faedcf>, Seq: 3 (3), Phi: 0, 211f9b0e44957e22: Prepared 27 bytes 211f9b0e44957e22: ack_ecn (nb=0), 1-4, ect0=4, ect1=0, ce=0 211f9b0e44957e22: padding, 19 bytes 211f9b0e44957e22: T= 0.072936, cwin: 16658,flight: 421,nb_ret: 0,rtt_min: 32682,rtt: 36306,rtt_var: 17660,max_ack_delay: 0,state: 14 211f9b0e44957e22: Sending 55 bytes to 193.167.100.100:443 at T=0.072936 (1f86f87d) 211f9b0e44957e22: Receiving 35 bytes from 193.167.100.100:443 at T=0.089918 (1f873ad3) 211f9b0e44957e22: Receiving packet type: 6 (1rtt protected), S1, Q0, 211f9b0e44957e22: <5ca4b18ca1855ce8>, Seq: 5 (5), Phi: 0, 211f9b0e44957e22: Decrypted 9 bytes 211f9b0e44957e22: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 211f9b0e44957e22: T= 0.089918, cwin: 16953,flight: 110,nb_ret: 0,rtt_min: 32682,rtt: 37050,rtt_var: 14733,max_ack_delay: 0,state: 14 211f9b0e44957e22: Receiving 1372 bytes from 193.167.100.100:443 at T=0.104672 (1f877475) 211f9b0e44957e22: Receiving packet type: 6 (1rtt protected), S0, Q1, 211f9b0e44957e22: <5ca4b18ca1855ce8>, Seq: 6 (6), Phi: 0, 211f9b0e44957e22: Decrypted 1346 bytes 211f9b0e44957e22: ping, 1 bytes 211f9b0e44957e22: stream 0, offset 0, length 1024, fin = 1: bcaff9292fc4a69b... 211f9b0e44957e22: padding, 317 bytes 211f9b0e44957e22: T= 0.104672, cwin: 16953,flight: 110,nb_ret: 0,rtt_min: 32682,rtt: 37050,rtt_var: 14733,max_ack_delay: 0,state: 14 211f9b0e44957e22: All done, Closing the connection. 211f9b0e44957e22: Sending packet type: 6 (1rtt protected), S1, Q1, 211f9b0e44957e22: <1292470555b301faedcf>, Seq: 4 (4), Phi: 0, 211f9b0e44957e22: Prepared 11 bytes 211f9b0e44957e22: ack_ecn (nb=0), 1-6, ect0=6, ect1=0, ce=0 211f9b0e44957e22: application_close, Error 0x0000, Reason length 0 211f9b0e44957e22: Sending 39 bytes to 193.167.100.100:443 at T=0.104826 (1f87750f) 211f9b0e44957e22: Receiving 1054 bytes from 193.167.100.100:443 at T=0.193057 (1f88cdb6) 211f9b0e44957e22: Receiving packet type: 6 (1rtt protected), S1, Q1, 211f9b0e44957e22: <5ca4b18ca1855ce8>, Seq: 7 (7), Phi: 0, 211f9b0e44957e22: Decrypted 1028 bytes 211f9b0e44957e22: stream 0, offset 0, length 1024, fin = 1: bcaff9292fc4a69b... 211f9b0e44957e22: Receiving 29 bytes from 193.167.100.100:443 at T=0.193111 (1f88cdec) 211f9b0e44957e22: Receiving packet type: 6 (1rtt protected), S1, Q0, 211f9b0e44957e22: <5ca4b18ca1855ce8>, Seq: 8 (8), Phi: 0, 211f9b0e44957e22: Decrypted 3 bytes 211f9b0e44957e22: ping, 1 bytes 211f9b0e44957e22: padding, 2 bytes 211f9b0e44957e22: Sending packet type: 6 (1rtt protected), S1, Q1, 211f9b0e44957e22: <1292470555b301faedcf>, Seq: 5 (5), Phi: 0, 211f9b0e44957e22: Prepared 3 bytes 211f9b0e44957e22: application_close, Error 0x0000, Reason length 0 211f9b0e44957e22: Sending 31 bytes to 193.167.100.100:443 at T=0.193155 (1f88ce18) 211f9b0e44957e22: Receiving 42 bytes from 193.167.100.100:443 at T=0.223743 (1f894594) 211f9b0e44957e22: Receiving packet type: 6 (1rtt protected), S0, Q1, 211f9b0e44957e22: <5ca4b18ca1855ce8>, Seq: 9 (9), Phi: 0, 211f9b0e44957e22: Decrypted 16 bytes 211f9b0e44957e22: ack_ecn (nb=2), 5, 3, 0-1, ect0=0, ect1=4, ce=0 211f9b0e44957e22: connection_close, Error 0x0000, Offending frame 0x1d, Reason length 0 211f9b0e44957e22: Out of 1 zero RTT packets, 1 were acked by the server. 211f9b0e44957e22: Received 1024 bytes in 0.223868 seconds, 0.036593 Mbps. 211f9b0e44957e22: Sent 17 bytes in 0.223868 seconds, 0.000608 Mbps.