0.000 Creating connection with server4:443 with v1 0.080 Setting up connection for downloading https://server4:443/cfhdnjoivf at 32:16.079 on ClientConnection[5c8cdf2583e1de31/f25d1461ebcd031a(V1) with server4/193.167.100.100:443] 0.081 Original destination connection id: 5c8cdf2583e1de31 (scid: f25d1461ebcd031a) >- CryptoStream[I|ClientHello] 0.275 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.475/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.270 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.311 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.328 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.528/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.353 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 0.473/Handshake, because peerAwaitingAddressValidation | RTT:40/20 0.353 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) 0.311 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,717] Padding(238) >- CryptoStream[H|Finished] 0.382 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 0.502/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 0.382 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.388 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 0.388 Starting downloading https://server4:443/cfhdnjoivf at 32:16.402 on ClientConnection[5c8cdf2583e1de31/f25d1461ebcd031a(V1) with server4/193.167.100.100:443] 0.394 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 0.515/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 0.395 Discarding pn space Initial because first Handshake message is being sent 0.415 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 0.535/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 0.415 -> Packet A|0|S0|0000000000002003b85f466fc592c15c14412898|59|1 StreamFrame[0(CIB),0,17,fin] 0.534 loss detection timeout handler running Sending probe 0, because no ack since 0.382. Current RTT: 40/20. 0.535 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.536 (Probe is a handshake retransmit) 0.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 239 millis, based on 0.777/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 0.537 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 0.776 loss detection timeout handler running Sending probe 1, because no ack since 0.415. Current RTT: 40/20. 0.777 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.777 (Probe is a handshake retransmit) 0.778 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 479 millis, based on 1.258/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 0.777 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 0.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 479 millis, based on 1.259/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/20 0.779 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 0.810 <- (2) Packet A|0|S0|f25d1461ebcd031a|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020030fa196528d440428177aa067|e7bcb79fe5c379da8d18cc46ab09f24f] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 0.815 State is set to Confirmed reschedule loss detection timer for PTO over 179 millis, based on 0.995/App, because ackElicitingInFlight | RTT:40/20 0.816 loss detection timeout handler running reschedule loss detection timer for PTO over -256 millis, based on 0.560/App, because ackElicitingInFlight | RTT:40/20 0.816 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 0.415. Current RTT: 40/20. 0.816 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 289 millis, based on 1.107/App, because ackElicitingInFlight | RTT:40/20 0.817 -> Packet PA|1|S0|0000000000002003b85f466fc592c15c14412898|59|1 StreamFrame[0(CIB),0,17,fin] 0.836 -> Packet A|2|S0|0000000000002003b85f466fc592c15c14412898|44|1 AckFrame[0|Δ19] 1.106 loss detection timeout handler running Sending probe 1, because no ack since 0.817. Current RTT: 40/20. 1.107 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 579 millis, based on 1.687/App, because ackElicitingInFlight | RTT:40/20 1.107 -> Packet PA|3|S0|0000000000002003b85f466fc592c15c14412898|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 579 millis, based on 1.688/App, because ackElicitingInFlight | RTT:40/20 1.108 -> Packet PA|4|S0|0000000000002003b85f466fc592c15c14412898|59|1 StreamFrame[0(CIB),0,17,fin] 1.139 <- (3) Packet A|4|S0|f25d1461ebcd031a|31|1 AckFrame[4-1|Δ0] 1.143 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 144 millis, based on 1.288/App, because ackElicitingInFlight | RTT:40/20 1.143 -> Packet A|5|S0|0000000000002003b85f466fc592c15c14412898|59|1 StreamFrame[0(CIB),0,17,fin] 1.144 Cwnd(-): 6000; inflight: 59 reschedule loss detection timer for PTO over 143 millis, based on 1.288/App, because ackElicitingInFlight | RTT:40/20 1.154 <- (4) Packet A|5|S0|f25d1461ebcd031a|29|2 PingFrame[] Padding(2) 1.154 <- (5) Packet A|6|S0|f25d1461ebcd031a|29|2 PingFrame[] Padding(2) 1.155 -> Packet A|6|S0|0000000000002003b85f466fc592c15c14412898|43|1 AckFrame[6-4|Δ0] 1.156 <- (6) Packet A|7|S0|f25d1461ebcd031a|1350|2 PingFrame[] Padding(1323) 1.176 -> Packet A|7|S0|0000000000002003b85f466fc592c15c14412898|44|1 AckFrame[7-4|Δ19] 1.187 <- (7) Packet A|8|S0|f25d1461ebcd031a|1065|3 AckFrame[6-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 1.188 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.190 Finished downloading https://server4:443/cfhdnjoivf at 32:17.206 on ClientConnection[5c8cdf2583e1de31/f25d1461ebcd031a(V1) with server4/193.167.100.100:443] 1.192 Closing ClientConnection[5c8cdf2583e1de31/f25d1461ebcd031a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.194 Creating connection with server4:443 with v1 1.195 Setting up connection for downloading https://server4:443/tzrwxutsgs at 32:17.210 on ClientConnection[69ebfe150ae976bd/f4950d505adf3c2b(V1) with server4/193.167.100.100:443] 1.195 Original destination connection id: 69ebfe150ae976bd (scid: f4950d505adf3c2b) >- CryptoStream[I|ClientHello] 1.194 -> Packet A|8|S0|0000000000002003b85f466fc592c15c14412898|48|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ4] 1.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.399/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.198 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.225 <- (8) Packet A|9|S0|f25d1461ebcd031a|29|1 MaxStreamsFrame[B,129] 1.229 -> Packet A|9|S0|0000000000002003b85f466fc592c15c14412898|47|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 1.233 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 1.234 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.434/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.233 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 1.239 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.341/Handshake, because peerAwaitingAddressValidation | RTT:34/17 1.239 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.244 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.346/Handshake, because peerAwaitingAddressValidation | RTT:34/17 1.244 Discarding pn space Initial because first Handshake message is being sent 1.245 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.347/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.245 -> Packet H|0|L|97|2 AckFrame[0|Δ0] CryptoFrame[0,36] 1.245 Starting downloading https://server4:443/tzrwxutsgs at 32:17.261 on ClientConnection[69ebfe150ae976bd/f4950d505adf3c2b(V1) with server4/193.167.100.100:443] 1.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 1.348/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.246 -> Packet A|0|S0|00000000000020031442365ee046bb358122aa1e|59|1 StreamFrame[0(CIB),0,17,fin] 1.276 <- (2) Packet A|0|S0|f4950d505adf3c2b|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003b3022d6774edb25b736a2a06|085a3b9b09ed9671105aca56c7e759d2] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.278 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 1.347/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 94 millis, based on 1.373/App, because ackElicitingInFlight | RTT:34/17 1.279 Discarding pn space Handshake because HandshakeDone is received 1.279 <- (3) Packet A|1|S0|f4950d505adf3c2b|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 1.280 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.281 Finished downloading https://server4:443/tzrwxutsgs at 32:17.296 on ClientConnection[69ebfe150ae976bd/f4950d505adf3c2b(V1) with server4/193.167.100.100:443] 1.281 Closing ClientConnection[69ebfe150ae976bd/f4950d505adf3c2b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.282 Creating connection with server4:443 with v1 1.281 -> Packet A|1|S0|00000000000020031442365ee046bb358122aa1e|44|1 AckFrame[1-0|Δ2] 1.283 Setting up connection for downloading https://server4:443/xterorqmyh at 32:17.298 on ClientConnection[f12fb41802c3e75f/9b03160b987f4a80(V1) with server4/193.167.100.100:443] 1.283 Original destination connection id: f12fb41802c3e75f (scid: 9b03160b987f4a80) 1.283 -> Packet A|2|S0|00000000000020031442365ee046bb358122aa1e|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] >- CryptoStream[I|ClientHello] 1.287 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.487/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.287 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.313 <- (4) Packet A|2|S0|f4950d505adf3c2b|29|1 MaxStreamsFrame[B,129] 1.314 -> Packet A|3|S0|00000000000020031442365ee046bb358122aa1e|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 1.486 loss detection timeout handler running Sending probe 0, because no ack since 1.287. Current RTT: 100/25. 1.486 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.486 (Probe is an initial retransmit) 1.488 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.888/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.487 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.520 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 1.521 probe count not reset on ack because handshake not yet confirmed 1.521 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.921/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.526 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.520 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,719] Padding(236) reschedule loss detection timer for PTO over 191 millis, based on 1.718/Handshake, because peerAwaitingAddressValidation | RTT:32/16 1.526 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 1.530 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 1.722/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 1.530 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.531 Starting downloading https://server4:443/xterorqmyh at 32:17.547 on ClientConnection[f12fb41802c3e75f/9b03160b987f4a80(V1) with server4/193.167.100.100:443] 1.531 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 1.627/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 1.531 Discarding pn space Initial because first Handshake message is being sent 1.532 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 1.628/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 1.532 -> [Packet H|1|L|58|1 AckFrame[1|Δ0], Packet A|0|S0|00000000000020033d93a6a165c36d0948a43247|59|1 StreamFrame[0(CIB),0,17,fin]] 1.627 loss detection timeout handler running Sending probe 0, because no ack since 1.530. Current RTT: 32/16. 1.627 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.627 (Probe is a handshake retransmit) 1.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 1.820/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 1.628 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 1.819 loss detection timeout handler running Sending probe 1, because no ack since 1.532. Current RTT: 32/16. 1.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.820 (Probe is a handshake retransmit) 1.820 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 2.204/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 1.820 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 1.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 2.205/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 1.821 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 1.916 <- (2) Packet A|4|S0|9b03160b987f4a80|29|2 PingFrame[] Padding(2) 1.936 -> Packet A|1|S0|00000000000020033d93a6a165c36d0948a43247|44|1 AckFrame[4|Δ19] 1.968 <- (3) Packet A|6|S0|9b03160b987f4a80|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020034902555f1195626703c9cdb5|cd9d7b40fe398acb474f40f1f46364f6] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.968 State is set to Confirmed reschedule loss detection timer for PTO over 47 millis, based on 2.016/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -315 millis, based on 1.653/App, because ackElicitingInFlight | RTT:32/16 1.969 loss detection timeout handler running 1.969 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 1.532. Current RTT: 32/16. 1.969 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 2.211/App, because ackElicitingInFlight | RTT:32/16 1.969 -> Packet PA|2|S0|00000000000020033d93a6a165c36d0948a43247|59|1 StreamFrame[0(CIB),0,17,fin] 1.988 -> Packet A|3|S0|00000000000020033d93a6a165c36d0948a43247|46|1 AckFrame[6,4|Δ19] 2.002 <- (4) Packet A|7|S0|9b03160b987f4a80|1065|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 2.002 Cwnd(-): 6000; inflight: 0 2.002 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 2.002 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 104 millis, based on 2.108/App, because ackElicitingInFlight | RTT:32/12 2.003 Finished downloading https://server4:443/xterorqmyh at 32:18.019 on ClientConnection[f12fb41802c3e75f/9b03160b987f4a80(V1) with server4/193.167.100.100:443] 2.003 -> Packet A|4|S0|00000000000020033d93a6a165c36d0948a43247|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ0] 2.003 Closing ClientConnection[f12fb41802c3e75f/9b03160b987f4a80(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.004 Creating connection with server4:443 with v1 2.004 -> Packet A|5|S0|00000000000020033d93a6a165c36d0948a43247|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 2.005 Setting up connection for downloading https://server4:443/tzpkefkxuz at 32:18.020 on ClientConnection[45b249690496ed37/fcde32158fe345c2(V1) with server4/193.167.100.100:443] 2.005 Original destination connection id: 45b249690496ed37 (scid: fcde32158fe345c2) >- CryptoStream[I|ClientHello] 2.007 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.207/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.007 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.035 <- (5) Packet A|8|S0|9b03160b987f4a80|34|2 AckFrame[5-3|Δ0] MaxStreamsFrame[B,129] 2.035 -> Packet A|6|S0|00000000000020033d93a6a165c36d0948a43247|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 2.206 loss detection timeout handler running Sending probe 0, because no ack since 2.007. Current RTT: 100/25. 2.207 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.207 (Probe is an initial retransmit) 2.208 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.608/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.208 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.607 loss detection timeout handler running Sending probe 1, because no ack since 2.208. Current RTT: 100/25. 2.607 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.607 (Probe is an initial retransmit) 2.608 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.408/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.608 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.609 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.409/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.609 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.238 <- (1) Packet I|1|L|57|2 Token=[] PingFrame[] Padding(2) 3.238 <- (2) Packet I|2|L|57|2 Token=[] PingFrame[] Padding(2) 3.240 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.040/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.239 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) 3.241 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.041/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.240 -> Packet I|5|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1141) 3.241 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 3.272 <- (4) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1018) -< CryptoStream[I|ServerHello] 3.276 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.476/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.276 Discarding pn space Initial because first Handshake message is being sent 3.276 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.476/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.276 -> Packet I|6|L|1201|2 Token=[] AckFrame[3-1|Δ0] Padding(1141) 3.319 <- (5) Packet H|4|L|56|2 PingFrame[] Padding(2) 3.320 -> Packet H|0|L|58|1 AckFrame[4|Δ0] 3.434 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.475 loss detection timeout handler running 3.475 Sending probe 0. Current RTT: 100/25. 3.475 Sending probe because peer awaiting address validation 3.476 (Probe is a handshake ping) 3.476 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.876/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.476 -> Packet PH|1|L|56|2 PingFrame[] Padding(2) 3.507 <- (7) Packet H|5|L|56|2 PingFrame[] Padding(2) 3.507 <- (8) Packet H|6|L|56|2 PingFrame[] Padding(2) 3.508 -> Packet H|2|L|58|1 AckFrame[5-4|Δ0] 3.507 <- (9) Packet H|7|L|58|1 AckFrame[1|Δ0] 3.508 -> Packet H|3|L|58|1 AckFrame[6-4|Δ0] 3.508 probe count not reset on ack because handshake not yet confirmed 3.509 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.540 <- (10) Packet H|8|L|775|1 CryptoFrame[0,717] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 181 millis, based on 3.726/Handshake, because ackElicitingInFlight | RTT:31/15 3.544 -> Packet H|4|L|97|2 CryptoFrame[0,36] AckFrame[7-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.545 Starting downloading https://server4:443/tzpkefkxuz at 32:19.560 on ClientConnection[45b249690496ed37/fcde32158fe345c2(V1) with server4/193.167.100.100:443] 3.545 -> Packet H|5|L|58|1 AckFrame[8-4|Δ0] 3.546 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 179 millis, based on 3.726/Handshake, because ackElicitingInFlight | RTT:31/15 3.545 -> Packet A|0|S0|00000000000020035d230d729efbdddb4671b549|59|1 StreamFrame[0(CIB),0,17,fin] 3.576 <- (11) Packet A|0|S0|fcde32158fe345c2|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003a6c73453acbe79727f1b71e3|e38fd0223a360e5e79c33aa984f510d4] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.577 State is set to Confirmed reschedule loss detection timer for PTO over 148 millis, based on 3.726/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 84 millis, based on 3.661/App, because ackElicitingInFlight | RTT:31/15 3.577 Discarding pn space Handshake because HandshakeDone is received 3.578 <- (12) Packet A|1|S0|fcde32158fe345c2|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 3.578 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.579 Finished downloading https://server4:443/tzpkefkxuz at 32:19.594 on ClientConnection[45b249690496ed37/fcde32158fe345c2(V1) with server4/193.167.100.100:443] 3.579 -> Packet A|1|S0|00000000000020035d230d729efbdddb4671b549|44|1 AckFrame[1-0|Δ1] 3.579 Closing ClientConnection[45b249690496ed37/fcde32158fe345c2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.579 -> Packet A|2|S0|00000000000020035d230d729efbdddb4671b549|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 3.580 Creating connection with server4:443 with v1 3.580 Setting up connection for downloading https://server4:443/uaxuyjcuif at 32:19.596 on ClientConnection[2553313d19f5c29a/0bbfaedf3e2957d3(V1) with server4/193.167.100.100:443] 3.580 Original destination connection id: 2553313d19f5c29a (scid: 0bbfaedf3e2957d3) >- CryptoStream[I|ClientHello] 3.583 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.783/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.582 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.610 <- (13) Packet A|2|S0|fcde32158fe345c2|29|1 MaxStreamsFrame[B,129] 3.610 -> Packet A|3|S0|00000000000020035d230d729efbdddb4671b549|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 3.782 loss detection timeout handler running Sending probe 0, because no ack since 3.582. Current RTT: 100/25. 3.782 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.782 (Probe is an initial retransmit) 3.783 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.183/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.782 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.182 loss detection timeout handler running Sending probe 1, because no ack since 3.782. Current RTT: 100/25. 4.182 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.182 (Probe is an initial retransmit) 4.183 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.983/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.183 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.184 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.984/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.184 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.218 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 4.218 probe count not reset on ack because handshake not yet confirmed 4.219 Retransmitting CryptoFrame[0,257] on level Initial 4.219 Cwnd(-): 6000; inflight: 0 4.219 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.219 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.019/Initial, because peerAwaitingAddressValidation | RTT:100/25 reschedule loss detection timer for PTO over 799 millis, based on 5.020/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.219 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 4.218 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,717] Padding(238) 4.223 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 4.632/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.223 -> Packet I|5|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 4.227 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 4.635/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.227 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.228 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.228 Starting downloading https://server4:443/uaxuyjcuif at 32:20.244 on ClientConnection[2553313d19f5c29a/0bbfaedf3e2957d3(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 4.330/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.228 Discarding pn space Initial because first Handshake message is being sent 4.228 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 4.229 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.331/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.229 -> Packet A|0|S0|0000000000002003b6618cbfe8c7cf57a1aa2a51|59|1 StreamFrame[0(CIB),0,17,fin] 4.252 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.259 <- (3) Packet A|0|S0|0bbfaedf3e2957d3|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020031b7da954197ae72af91d717b|d1a3ddcb84fcbdbe876ddca378a9c1a9] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 4.260 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 4.329/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 4.356/App, because ackElicitingInFlight | RTT:34/17 4.260 Discarding pn space Handshake because HandshakeDone is received 4.279 -> Packet A|1|S0|0000000000002003b6618cbfe8c7cf57a1aa2a51|44|1 AckFrame[0|Δ19] 4.355 loss detection timeout handler running Sending probe 0, because no ack since 4.229. Current RTT: 34/17. 4.355 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 4.609/App, because ackElicitingInFlight | RTT:34/17 4.355 -> Packet PA|2|S0|0000000000002003b6618cbfe8c7cf57a1aa2a51|59|1 StreamFrame[0(CIB),0,17,fin] 4.359 <- (4) Packet A|3|S0|0bbfaedf3e2957d3|1350|2 PingFrame[] Padding(1323) 4.379 -> Packet A|3|S0|0000000000002003b6618cbfe8c7cf57a1aa2a51|46|1 AckFrame[3,0|Δ19] 4.540 <- (5) Packet A|5|S0|0bbfaedf3e2957d3|1425|2 PingFrame[] Padding(1398) 4.560 -> Packet A|4|S0|0000000000002003b6618cbfe8c7cf57a1aa2a51|48|1 AckFrame[5,3,0|Δ19] 4.592 <- (6) Packet A|6|S0|0bbfaedf3e2957d3|1065|3 AckFrame[4-0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 4.593 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.594 Finished downloading https://server4:443/uaxuyjcuif at 32:20.609 on ClientConnection[2553313d19f5c29a/0bbfaedf3e2957d3(V1) with server4/193.167.100.100:443] 4.594 Closing ClientConnection[2553313d19f5c29a/0bbfaedf3e2957d3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.594 -> Packet A|5|S0|0000000000002003b6618cbfe8c7cf57a1aa2a51|47|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 4.595 Creating connection with server4:443 with v1 4.595 Setting up connection for downloading https://server4:443/gudhodvsqk at 32:20.611 on ClientConnection[c1f109cace0b57bb/2633194af538ece7(V1) with server4/193.167.100.100:443] 4.595 Original destination connection id: c1f109cace0b57bb (scid: 2633194af538ece7) >- CryptoStream[I|ClientHello] 4.597 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.797/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.597 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.625 <- (7) Packet A|7|S0|0bbfaedf3e2957d3|29|1 MaxStreamsFrame[B,129] 4.625 -> Packet A|6|S0|0000000000002003b6618cbfe8c7cf57a1aa2a51|47|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 4.796 loss detection timeout handler running Sending probe 0, because no ack since 4.597. Current RTT: 100/25. 4.796 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.796 (Probe is an initial retransmit) 4.797 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.197/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.797 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.196 loss detection timeout handler running Sending probe 1, because no ack since 4.797. Current RTT: 100/25. 5.196 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.196 (Probe is an initial retransmit) 5.197 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.997/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.197 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.198 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.998/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.198 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.230 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[2-1|Δ0] CryptoFrame[0,123] 5.231 probe count not reset on ack because handshake not yet confirmed 5.231 Retransmitting CryptoFrame[0,257] on level Initial 5.231 Cwnd(-): 6000; inflight: 1200 5.231 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.031/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.231 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 5.619/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.231 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 5.234 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.230 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,718] Padding(237) reschedule loss detection timer for PTO over 387 millis, based on 5.622/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.234 -> Packet I|5|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 5.237 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 5.625/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.237 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.238 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.238 Starting downloading https://server4:443/gudhodvsqk at 32:21.254 on ClientConnection[c1f109cace0b57bb/2633194af538ece7(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 5.335/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.238 Discarding pn space Initial because first Handshake message is being sent 5.238 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 5.239 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.336/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.239 -> Packet A|0|S0|00000000000020033151b84279cc9b34132c3d7a|59|1 StreamFrame[0(CIB),0,17,fin] 5.269 <- (2) Packet A|0|S0|2633194af538ece7|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003c1bfd7ffea97894426db0ff9|d3edc4fbc4d4286b2c6de032fd482d26] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 5.270 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 5.334/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 5.361/App, because ackElicitingInFlight | RTT:33/16 5.271 Discarding pn space Handshake because HandshakeDone is received 5.271 <- (3) Packet A|1|S0|2633194af538ece7|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 5.271 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.272 Finished downloading https://server4:443/gudhodvsqk at 32:21.287 on ClientConnection[c1f109cace0b57bb/2633194af538ece7(V1) with server4/193.167.100.100:443] 5.272 -> Packet A|1|S0|00000000000020033151b84279cc9b34132c3d7a|43|1 AckFrame[1-0|Δ0] 5.272 Closing ClientConnection[c1f109cace0b57bb/2633194af538ece7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.272 Creating connection with server4:443 with v1 5.272 -> Packet A|2|S0|00000000000020033151b84279cc9b34132c3d7a|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 5.273 Setting up connection for downloading https://server4:443/zpqkazvmlk at 32:21.289 on ClientConnection[54d706352821e778/57de371f45d7970c(V1) with server4/193.167.100.100:443] 5.273 Original destination connection id: 54d706352821e778 (scid: 57de371f45d7970c) >- CryptoStream[I|ClientHello] 5.275 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.475/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.275 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.303 <- (4) Packet A|2|S0|2633194af538ece7|29|1 MaxStreamsFrame[B,129] 5.303 -> Packet A|3|S0|00000000000020033151b84279cc9b34132c3d7a|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 5.308 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 5.309 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.509/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.308 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,717] Padding(238) 5.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.409/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.312 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 5.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.412/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.315 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.316 Starting downloading https://server4:443/zpqkazvmlk at 32:21.331 on ClientConnection[54d706352821e778/57de371f45d7970c(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 5.413/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.316 Discarding pn space Initial because first Handshake message is being sent 5.316 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 5.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.413/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.316 -> Packet A|0|S0|000000000000200302d3b1992329752aa35ef9e9|59|1 StreamFrame[0(CIB),0,17,fin] 5.348 <- (2) Packet A|1|S0|57de371f45d7970c|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 5.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.447/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.350 Finished downloading https://server4:443/zpqkazvmlk at 32:21.366 on ClientConnection[54d706352821e778/57de371f45d7970c(V1) with server4/193.167.100.100:443] 5.350 Closing ClientConnection[54d706352821e778/57de371f45d7970c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.351 -> Packet A|1|S0|000000000000200302d3b1992329752aa35ef9e9|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 5.351 Creating connection with server4:443 with v1 5.352 Setting up connection for downloading https://server4:443/cynekpkzsn at 32:21.368 on ClientConnection[0cb35db10c405d62/3fb60db2f58c5664(V1) with server4/193.167.100.100:443] 5.352 Original destination connection id: 0cb35db10c405d62 (scid: 3fb60db2f58c5664) >- CryptoStream[I|ClientHello] 5.354 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.554/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.354 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.381 <- (3) Packet A|2|S0|57de371f45d7970c|29|1 MaxStreamsFrame[B,129] 5.382 -> Packet A|2|S0|000000000000200302d3b1992329752aa35ef9e9|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 5.387 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 5.388 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.588/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.387 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,717] Padding(238) 5.393 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.490/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.392 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 5.395 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.492/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.395 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.396 Starting downloading https://server4:443/cynekpkzsn at 32:21.412 on ClientConnection[0cb35db10c405d62/3fb60db2f58c5664(V1) with server4/193.167.100.100:443] 5.396 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 5.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.397 Discarding pn space Initial because first Handshake message is being sent 5.397 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.397 -> Packet A|0|S0|000000000000200342b94cc6e75c54d70edc10bd|59|1 StreamFrame[0(CIB),0,17,fin] 5.427 <- (2) Packet A|0|S0|3fb60db2f58c5664|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003b0c8499b83794b445065a895|b5c47d5eef6a89e65cbb3e529638c9dd] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 5.428 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 5.492/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 5.519/App, because ackElicitingInFlight | RTT:33/16 5.428 Discarding pn space Handshake because HandshakeDone is received 5.429 <- (3) Packet A|1|S0|3fb60db2f58c5664|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 5.429 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.430 -> Packet A|1|S0|000000000000200342b94cc6e75c54d70edc10bd|44|1 AckFrame[1-0|Δ1] 5.430 Finished downloading https://server4:443/cynekpkzsn at 32:21.446 on ClientConnection[0cb35db10c405d62/3fb60db2f58c5664(V1) with server4/193.167.100.100:443] 5.431 Closing ClientConnection[0cb35db10c405d62/3fb60db2f58c5664(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.431 Creating connection with server4:443 with v1 5.432 Setting up connection for downloading https://server4:443/mzuqjvkuxy at 32:21.448 on ClientConnection[f8ea3dd622fc329c/8565e55812571611(V1) with server4/193.167.100.100:443] 5.432 -> Packet A|2|S0|000000000000200342b94cc6e75c54d70edc10bd|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 5.433 Original destination connection id: f8ea3dd622fc329c (scid: 8565e55812571611) >- CryptoStream[I|ClientHello] 5.435 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.635/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.435 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.461 <- (4) Packet A|2|S0|3fb60db2f58c5664|29|1 MaxStreamsFrame[B,129] 5.462 -> Packet A|3|S0|000000000000200342b94cc6e75c54d70edc10bd|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 5.634 loss detection timeout handler running Sending probe 0, because no ack since 5.435. Current RTT: 100/25. 5.635 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.635 (Probe is an initial retransmit) 5.635 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.035/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.635 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.669 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 5.670 probe count not reset on ack because handshake not yet confirmed 5.670 Retransmitting CryptoFrame[0,257] on level Initial 5.670 Cwnd(-): 6000; inflight: 0 5.670 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.070/Initial, because peerAwaitingAddressValidation | RTT:100/25 5.670 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 5.864/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.670 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 5.669 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 5.674 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 5.868/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.674 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 5.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 5.871/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.677 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.678 Starting downloading https://server4:443/mzuqjvkuxy at 32:21.693 on ClientConnection[f8ea3dd622fc329c/8565e55812571611(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 5.775/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.678 Discarding pn space Initial because first Handshake message is being sent 5.678 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 5.678 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.775/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.678 -> Packet A|0|S0|00000000000020035a2cb1ef16f2b3457c3c1e8e|59|1 StreamFrame[0(CIB),0,17,fin] 5.703 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.710 <- (3) Packet A|1|S0|8565e55812571611|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 5.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.808/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.711 Finished downloading https://server4:443/mzuqjvkuxy at 32:21.727 on ClientConnection[f8ea3dd622fc329c/8565e55812571611(V1) with server4/193.167.100.100:443] 5.712 Closing ClientConnection[f8ea3dd622fc329c/8565e55812571611(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.712 -> Packet A|1|S0|00000000000020035a2cb1ef16f2b3457c3c1e8e|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 5.712 Creating connection with server4:443 with v1 5.713 Setting up connection for downloading https://server4:443/ywghxiphyu at 32:21.728 on ClientConnection[aeb138689bc3448e/6ed42974d00cd687(V1) with server4/193.167.100.100:443] 5.713 Original destination connection id: aeb138689bc3448e (scid: 6ed42974d00cd687) >- CryptoStream[I|ClientHello] 5.714 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.914/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.714 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.743 <- (4) Packet A|2|S0|8565e55812571611|29|1 MaxStreamsFrame[B,129] 5.743 -> Packet A|2|S0|00000000000020035a2cb1ef16f2b3457c3c1e8e|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 5.913 loss detection timeout handler running Sending probe 0, because no ack since 5.714. Current RTT: 100/25. 5.914 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.914 (Probe is an initial retransmit) 5.914 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.314/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.914 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.313 loss detection timeout handler running Sending probe 1, because no ack since 5.914. Current RTT: 100/25. 6.314 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.314 (Probe is an initial retransmit) 6.314 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.114/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.314 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.315 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.115/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.315 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.348 <- (1) Packet I|1|L|189|2 Token=[] AckFrame[3,1|Δ0] CryptoFrame[0,123] 6.349 probe count not reset on ack because handshake not yet confirmed 6.349 Retransmitting CryptoFrame[0,257] on level Initial 6.349 Cwnd(-): 6000; inflight: 1200 6.349 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 6.348 <- (1) Packet H|1|L|1011|2 CryptoFrame[0,719] Padding(234) 6.351 -> Packet I|5|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 6.354 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.355 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.355 Starting downloading https://server4:443/ywghxiphyu at 32:22.370 on ClientConnection[aeb138689bc3448e/6ed42974d00cd687(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 6.451/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 6.355 Discarding pn space Initial because first Handshake message is being sent 6.355 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 6.355 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 6.451/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 6.355 -> Packet A|0|S0|0000000000002003d22f009e9eb3dce875070582|59|1 StreamFrame[0(CIB),0,17,fin] 6.451 loss detection timeout handler running Sending probe 0, because no ack since 6.354. Current RTT: 32/16. 6.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.451 (Probe is a handshake retransmit) 6.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 6.643/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 6.451 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 6.455 <- (2) Packet H|3|L|56|2 PingFrame[] Padding(2) 6.456 -> Packet H|3|L|60|1 AckFrame[3,1|Δ0] 6.482 <- (3) Packet A|0|S0|6ed42974d00cd687|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020030d85758a7b461594409e6512|b2a8dbad9eda8aa126fdd22de295e996] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.483 State is set to Confirmed reschedule loss detection timer for PTO over 113 millis, based on 6.597/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -7 millis, based on 6.476/App, because ackElicitingInFlight | RTT:32/16 6.483 loss detection timeout handler running 6.484 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 6.355. Current RTT: 32/16. 6.484 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 6.726/App, because ackElicitingInFlight | RTT:32/16 6.484 -> Packet PA|1|S0|0000000000002003d22f009e9eb3dce875070582|59|1 StreamFrame[0(CIB),0,17,fin] 6.503 -> Packet A|2|S0|0000000000002003d22f009e9eb3dce875070582|44|1 AckFrame[0|Δ19] 6.582 <- (4) Packet A|3|S0|6ed42974d00cd687|1350|2 PingFrame[] Padding(1323) 6.602 -> Packet A|3|S0|0000000000002003d22f009e9eb3dce875070582|46|1 AckFrame[3,0|Δ19] 6.725 loss detection timeout handler running Sending probe 1, because no ack since 6.484. Current RTT: 32/16. 6.725 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 7.209/App, because ackElicitingInFlight | RTT:32/16 6.725 -> Packet PA|4|S0|0000000000002003d22f009e9eb3dce875070582|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 7.210/App, because ackElicitingInFlight | RTT:32/16 6.726 -> Packet PA|5|S0|0000000000002003d22f009e9eb3dce875070582|59|1 StreamFrame[0(CIB),0,17,fin] 6.757 <- (5) Packet A|6|S0|6ed42974d00cd687|31|1 AckFrame[5-1|Δ0] 6.758 Cwnd(-): 3000; inflight: 0 6.758 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.758 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 108 millis, based on 6.867/App, because ackElicitingInFlight | RTT:32/13 6.758 -> Packet A|6|S0|0000000000002003d22f009e9eb3dce875070582|59|1 StreamFrame[0(CIB),0,17,fin] 6.814 <- (6) Packet A|7|S0|6ed42974d00cd687|32|1 AckFrame[6-1|Δ26] 6.814 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.866 <- (7) Packet A|8|S0|6ed42974d00cd687|29|2 PingFrame[] Padding(2) 6.866 <- (8) Packet A|9|S0|6ed42974d00cd687|29|2 PingFrame[] Padding(2) 6.867 -> Packet A|7|S0|0000000000002003d22f009e9eb3dce875070582|43|1 AckFrame[9-6|Δ0] 6.867 <- (9) Packet A|10|S0|6ed42974d00cd687|1425|2 PingFrame[] Padding(1398) 6.887 -> Packet A|8|S0|0000000000002003d22f009e9eb3dce875070582|44|1 AckFrame[10-6|Δ19] 6.898 <- (10) Packet A|11|S0|6ed42974d00cd687|1065|3 AckFrame[7-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 6.899 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.899 Finished downloading https://server4:443/ywghxiphyu at 32:22.915 on ClientConnection[aeb138689bc3448e/6ed42974d00cd687(V1) with server4/193.167.100.100:443] 6.899 Closing ClientConnection[aeb138689bc3448e/6ed42974d00cd687(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.900 -> Packet A|9|S0|0000000000002003d22f009e9eb3dce875070582|47|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 6.900 Creating connection with server4:443 with v1 6.901 Setting up connection for downloading https://server4:443/wofhbzveac at 32:22.916 on ClientConnection[7ebe7c224879e63c/b2a033ddb51c8439(V1) with server4/193.167.100.100:443] 6.901 Original destination connection id: 7ebe7c224879e63c (scid: b2a033ddb51c8439) 6.903 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial >- CryptoStream[I|ClientHello] reschedule loss detection timer for PTO over 199 millis, based on 7.103/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.903 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.936 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.937 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.137/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.936 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 6.940 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.037/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.940 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 6.943 Starting downloading https://server4:443/wofhbzveac at 32:22.959 on ClientConnection[7ebe7c224879e63c/b2a033ddb51c8439(V1) with server4/193.167.100.100:443] 6.943 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.040/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.943 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.943 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.041/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.944 Discarding pn space Initial because first Handshake message is being sent 6.944 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.041/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.944 -> Packet A|0|S0|0000000000002003782dc8f43f166b251149f585|59|1 StreamFrame[0(CIB),0,17,fin] 6.944 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 7.040 loss detection timeout handler running Sending probe 0, because no ack since 6.943. Current RTT: 33/16. 7.040 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.040 (Probe is a handshake retransmit) 7.040 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.234/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.040 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 7.075 <- (2) Packet A|3|S0|b2a033ddb51c8439|1350|2 PingFrame[] Padding(1323) 7.094 -> Packet A|1|S0|0000000000002003782dc8f43f166b251149f585|44|1 AckFrame[3|Δ19] 7.127 <- (3) Packet A|4|S0|b2a033ddb51c8439|1350|5 AckFrame[1-0|Δ0] CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020033a81c0fe376629d5cda1a900|00c1b3f2dd8c572666294128d57dac5b] StreamFrame[0(CIB),0,697] 7.127 probe count not reset on ack because handshake not yet confirmed 7.127 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.321/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.128 State is set to Confirmed reschedule loss detection timer for PTO over 106 millis, based on 7.234/Handshake, because ackElicitingInFlight | RTT:33/16 7.128 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.128 Discarding pn space Handshake because HandshakeDone is received 7.127 <- (4) Packet A|5|S0|b2a033ddb51c8439|364|2 StreamFrame[0(CIB),697,327] StreamFrame[0(CIB),1024,0,fin] 7.128 -> Packet A|2|S0|0000000000002003782dc8f43f166b251149f585|43|1 AckFrame[5-4|Δ0] 7.129 Finished downloading https://server4:443/wofhbzveac at 32:23.144 on ClientConnection[7ebe7c224879e63c/b2a033ddb51c8439(V1) with server4/193.167.100.100:443] 7.129 Closing ClientConnection[7ebe7c224879e63c/b2a033ddb51c8439(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.129 -> Packet A|3|S0|0000000000002003782dc8f43f166b251149f585|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 7.129 Creating connection with server4:443 with v1 7.130 Setting up connection for downloading https://server4:443/lxhgazpimi at 32:23.146 on ClientConnection[5450155968093cd7/1a05412fc3608f9c(V1) with server4/193.167.100.100:443] 7.130 Original destination connection id: 5450155968093cd7 (scid: 1a05412fc3608f9c) >- CryptoStream[I|ClientHello] 7.132 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.332/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.132 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.159 <- (5) Packet A|6|S0|b2a033ddb51c8439|29|1 MaxStreamsFrame[B,129] 7.160 -> Packet A|4|S0|0000000000002003782dc8f43f166b251149f585|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 7.165 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.166 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.366/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.165 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 7.169 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.266/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.169 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 7.172 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.269/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.172 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.172 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.269/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.172 Discarding pn space Initial because first Handshake message is being sent 7.172 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 7.173 Starting downloading https://server4:443/lxhgazpimi at 32:23.188 on ClientConnection[5450155968093cd7/1a05412fc3608f9c(V1) with server4/193.167.100.100:443] 7.173 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.270/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.173 -> Packet A|0|S0|00000000000020034e9635f4ea18a5f5834e15a8|59|1 StreamFrame[0(CIB),0,17,fin] 7.206 <- (2) Packet A|1|S0|1a05412fc3608f9c|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 7.206 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.303/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.207 Finished downloading https://server4:443/lxhgazpimi at 32:23.222 on ClientConnection[5450155968093cd7/1a05412fc3608f9c(V1) with server4/193.167.100.100:443] 7.207 Closing ClientConnection[5450155968093cd7/1a05412fc3608f9c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.207 -> Packet A|1|S0|00000000000020034e9635f4ea18a5f5834e15a8|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 7.207 Creating connection with server4:443 with v1 7.208 Setting up connection for downloading https://server4:443/bowunushzt at 32:23.223 on ClientConnection[0bee82c7066d125a/e9fc8f9e4e1e63b1(V1) with server4/193.167.100.100:443] 7.208 Original destination connection id: 0bee82c7066d125a (scid: e9fc8f9e4e1e63b1) >- CryptoStream[I|ClientHello] 7.210 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.410/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.209 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.238 <- (3) Packet A|2|S0|1a05412fc3608f9c|29|1 MaxStreamsFrame[B,129] 7.238 -> Packet A|2|S0|00000000000020034e9635f4ea18a5f5834e15a8|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 7.243 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.243 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.443/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.243 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 7.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.343/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.245 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 7.248 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.345/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.248 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.248 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.345/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.248 Discarding pn space Initial because first Handshake message is being sent 7.248 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 7.249 Starting downloading https://server4:443/bowunushzt at 32:23.264 on ClientConnection[0bee82c7066d125a/e9fc8f9e4e1e63b1(V1) with server4/193.167.100.100:443] 7.249 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.346/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.249 -> Packet A|0|S0|00000000000020039b2c5036a07aca33b0dbc9ac|59|1 StreamFrame[0(CIB),0,17,fin] 7.345 loss detection timeout handler running Sending probe 0, because no ack since 7.248. Current RTT: 33/16. 7.345 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.345 (Probe is a handshake retransmit) 7.346 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.540/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.346 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 7.478 <- (2) Packet A|2|S0|e9fc8f9e4e1e63b1|1350|2 PingFrame[] Padding(1323) 7.498 -> Packet A|1|S0|00000000000020039b2c5036a07aca33b0dbc9ac|44|1 AckFrame[2|Δ19] 7.530 <- (3) Packet A|3|S0|e9fc8f9e4e1e63b1|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003aefde8fe534447ccf1176947|aaa9ce5022c3881af6aad7981803a11a] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.530 State is set to Confirmed reschedule loss detection timer for PTO over -37 millis, based on 7.493/App, because ackElicitingInFlight | RTT:33/16 7.530 loss detection timeout handler running Sending probe 1, because no ack since 7.249. Current RTT: 33/16. reschedule loss detection timer for PTO over -159 millis, based on 7.371/App, because ackElicitingInFlight | RTT:33/16 7.531 (Probe is retransmit on level App) 7.531 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 121 millis, based on 7.653/App, because ackElicitingInFlight | RTT:33/16 7.531 -> Packet PA|2|S0|00000000000020039b2c5036a07aca33b0dbc9ac|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 121 millis, based on 7.654/App, because ackElicitingInFlight | RTT:33/16 7.532 -> Packet PA|3|S0|00000000000020039b2c5036a07aca33b0dbc9ac|59|1 StreamFrame[0(CIB),0,17,fin] 7.550 -> Packet A|4|S0|00000000000020039b2c5036a07aca33b0dbc9ac|44|1 AckFrame[3-2|Δ19] 7.563 <- (4) Packet A|4|S0|e9fc8f9e4e1e63b1|1065|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 7.563 Cwnd(-): 6000; inflight: 59 7.563 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 7.654/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 109 millis, based on 7.673/App, because ackElicitingInFlight | RTT:33/13 7.563 -> Packet A|5|S0|00000000000020039b2c5036a07aca33b0dbc9ac|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 7.564 Finished downloading https://server4:443/bowunushzt at 32:23.579 on ClientConnection[0bee82c7066d125a/e9fc8f9e4e1e63b1(V1) with server4/193.167.100.100:443] 7.564 Closing ClientConnection[0bee82c7066d125a/e9fc8f9e4e1e63b1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.564 Creating connection with server4:443 with v1 7.564 -> Packet A|6|S0|00000000000020039b2c5036a07aca33b0dbc9ac|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 7.565 Setting up connection for downloading https://server4:443/onwanxjatj at 32:23.581 on ClientConnection[077e306afa8709d6/ea84ebdc6dd668d6(V1) with server4/193.167.100.100:443] 7.565 Original destination connection id: 077e306afa8709d6 (scid: ea84ebdc6dd668d6) >- CryptoStream[I|ClientHello] 7.566 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.766/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.566 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.587 <- (5) Packet A|5|S0|e9fc8f9e4e1e63b1|32|1 AckFrame[4-1|Δ6] 7.587 -> Packet A|7|S0|00000000000020039b2c5036a07aca33b0dbc9ac|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 7.595 <- (6) Packet A|6|S0|e9fc8f9e4e1e63b1|34|2 AckFrame[6-3|Δ0] MaxStreamsFrame[B,129] 7.595 -> Packet A|8|S0|00000000000020039b2c5036a07aca33b0dbc9ac|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 7.600 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.601 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.801/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.600 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,717] Padding(238) 7.604 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.701/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.604 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 7.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.704/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.606 -> Packet H|0|L|92|1 CryptoFrame[0,36] 7.607 Starting downloading https://server4:443/onwanxjatj at 32:23.622 on ClientConnection[077e306afa8709d6/ea84ebdc6dd668d6(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.704/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.607 Discarding pn space Initial because first Handshake message is being sent 7.607 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 7.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.704/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.607 -> Packet A|0|S0|0000000000002003ee2a9927f82e4950a02f2078|59|1 StreamFrame[0(CIB),0,17,fin] 7.703 loss detection timeout handler running Sending probe 0, because no ack since 7.606. Current RTT: 33/16. 7.704 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.704 (Probe is a handshake retransmit) 7.704 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.898/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.704 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 7.736 <- (2) Packet A|0|S0|ea84ebdc6dd668d6|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003716529b90c256db0e06a8058|26b877bbb8f00ffcd4cb6b836b5d1203] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.736 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 7.851/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 7.729/App, because ackElicitingInFlight | RTT:33/16 7.736 Discarding pn space Handshake because HandshakeDone is received 7.736 loss detection timeout handler running Sending probe 0, because no ack since 7.607. Current RTT: 33/16. 7.736 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 7.981/App, because ackElicitingInFlight | RTT:33/16 7.737 -> Packet PA|1|S0|0000000000002003ee2a9927f82e4950a02f2078|59|1 StreamFrame[0(CIB),0,17,fin] 7.756 -> Packet A|2|S0|0000000000002003ee2a9927f82e4950a02f2078|44|1 AckFrame[0|Δ19] 7.769 <- (3) Packet A|1|S0|ea84ebdc6dd668d6|1065|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 7.770 Cwnd(-): 6000; inflight: 0 7.770 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.770 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 7.876/App, because ackElicitingInFlight | RTT:33/12 7.770 -> Packet A|3|S0|0000000000002003ee2a9927f82e4950a02f2078|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 7.770 Finished downloading https://server4:443/onwanxjatj at 32:23.786 on ClientConnection[077e306afa8709d6/ea84ebdc6dd668d6(V1) with server4/193.167.100.100:443] 7.770 Closing ClientConnection[077e306afa8709d6/ea84ebdc6dd668d6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.770 -> Packet A|4|S0|0000000000002003ee2a9927f82e4950a02f2078|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 7.771 Creating connection with server4:443 with v1 7.771 Setting up connection for downloading https://server4:443/yzsqbzaajs at 32:23.787 on ClientConnection[c8bd4e5098d91f1c/918b0cbbde98ab60(V1) with server4/193.167.100.100:443] 7.771 Original destination connection id: c8bd4e5098d91f1c (scid: 918b0cbbde98ab60) >- CryptoStream[I|ClientHello] 7.773 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.973/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.773 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.801 <- (4) Packet A|2|S0|ea84ebdc6dd668d6|34|2 AckFrame[4-2|Δ0] MaxStreamsFrame[B,129] 7.802 -> Packet A|5|S0|0000000000002003ee2a9927f82e4950a02f2078|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 7.806 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.807 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.007/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.809 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.906/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.806 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 7.809 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 7.811 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.908/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.811 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.812 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.812 Starting downloading https://server4:443/yzsqbzaajs at 32:23.827 on ClientConnection[c8bd4e5098d91f1c/918b0cbbde98ab60(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 7.909/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.812 Discarding pn space Initial because first Handshake message is being sent 7.812 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 7.812 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.909/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.812 -> Packet A|0|S0|00000000000020038c6728214ce5d368c8ca4149|59|1 StreamFrame[0(CIB),0,17,fin] 7.843 <- (2) Packet A|0|S0|918b0cbbde98ab60|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003d0546a347be2490cf896c802|edcc48bab7c52ef20e1c974b4c9ee403] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.844 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 7.908/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 7.934/App, because ackElicitingInFlight | RTT:33/16 7.844 Discarding pn space Handshake because HandshakeDone is received 7.863 -> Packet A|1|S0|00000000000020038c6728214ce5d368c8ca4149|44|1 AckFrame[0|Δ19] 7.934 loss detection timeout handler running Sending probe 0, because no ack since 7.812. Current RTT: 33/16. 7.934 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 8.178/App, because ackElicitingInFlight | RTT:33/16 7.934 -> Packet PA|2|S0|00000000000020038c6728214ce5d368c8ca4149|59|1 StreamFrame[0(CIB),0,17,fin] 7.944 <- (3) Packet A|3|S0|918b0cbbde98ab60|1350|2 PingFrame[] Padding(1323) 7.964 -> Packet A|3|S0|00000000000020038c6728214ce5d368c8ca4149|46|1 AckFrame[3,0|Δ19] 7.990 <- (4) Packet A|4|S0|918b0cbbde98ab60|32|1 AckFrame[2-0|Δ25] 7.991 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.120 <- (5) Packet A|6|S0|918b0cbbde98ab60|1425|2 PingFrame[] Padding(1398) 8.140 -> Packet A|4|S0|00000000000020038c6728214ce5d368c8ca4149|46|1 AckFrame[6,4-3|Δ19] 8.273 <- (6) Packet A|8|S0|918b0cbbde98ab60|1462|2 PingFrame[] Padding(1435) 8.293 -> Packet A|5|S0|00000000000020038c6728214ce5d368c8ca4149|48|1 AckFrame[8,6,4-3|Δ19] 8.325 <- (7) Packet A|9|S0|918b0cbbde98ab60|1065|3 AckFrame[5-0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 8.325 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.326 Finished downloading https://server4:443/yzsqbzaajs at 32:24.341 on ClientConnection[c8bd4e5098d91f1c/918b0cbbde98ab60(V1) with server4/193.167.100.100:443] 8.326 Closing ClientConnection[c8bd4e5098d91f1c/918b0cbbde98ab60(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.326 -> Packet A|6|S0|00000000000020038c6728214ce5d368c8ca4149|47|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 8.326 Creating connection with server4:443 with v1 8.327 Setting up connection for downloading https://server4:443/lflkadzezh at 32:24.342 on ClientConnection[96ffc68a505abbaf/60eb19c1ea89ac44(V1) with server4/193.167.100.100:443] 8.327 Original destination connection id: 96ffc68a505abbaf (scid: 60eb19c1ea89ac44) >- CryptoStream[I|ClientHello] 8.328 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.528/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.328 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.357 <- (8) Packet A|10|S0|918b0cbbde98ab60|29|1 MaxStreamsFrame[B,129] 8.357 -> Packet A|7|S0|00000000000020038c6728214ce5d368c8ca4149|47|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 8.362 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.362 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.562/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.362 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 8.365 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.462/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.365 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 8.367 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.464/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.367 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.368 Starting downloading https://server4:443/lflkadzezh at 32:24.383 on ClientConnection[96ffc68a505abbaf/60eb19c1ea89ac44(V1) with server4/193.167.100.100:443] 8.368 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.465/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.368 Discarding pn space Initial because first Handshake message is being sent 8.368 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 8.368 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.465/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.368 -> Packet A|0|S0|0000000000002003e40c41b8d691f37e3a3b2914|59|1 StreamFrame[0(CIB),0,17,fin] 8.399 <- (2) Packet A|0|S0|60eb19c1ea89ac44|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003c95a1562886765a88e210c93|422aa52d997ce9932dbd0ed2320390ea] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 8.399 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 8.464/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 8.490/App, because ackElicitingInFlight | RTT:33/16 8.400 Discarding pn space Handshake because HandshakeDone is received 8.400 <- (3) Packet A|1|S0|60eb19c1ea89ac44|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 8.401 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.401 Finished downloading https://server4:443/lflkadzezh at 32:24.417 on ClientConnection[96ffc68a505abbaf/60eb19c1ea89ac44(V1) with server4/193.167.100.100:443] 8.401 -> Packet A|1|S0|0000000000002003e40c41b8d691f37e3a3b2914|44|1 AckFrame[1-0|Δ1] 8.401 Closing ClientConnection[96ffc68a505abbaf/60eb19c1ea89ac44(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.402 -> Packet A|2|S0|0000000000002003e40c41b8d691f37e3a3b2914|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 8.402 Creating connection with server4:443 with v1 8.402 Setting up connection for downloading https://server4:443/wlxqboyycm at 32:24.418 on ClientConnection[86ab98ddcbdcf28d/e414a70b615be4a3(V1) with server4/193.167.100.100:443] 8.402 Original destination connection id: 86ab98ddcbdcf28d (scid: e414a70b615be4a3) >- CryptoStream[I|ClientHello] 8.404 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.604/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.404 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.603 loss detection timeout handler running Sending probe 0, because no ack since 8.404. Current RTT: 100/25. 8.603 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.603 (Probe is an initial retransmit) 8.604 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.004/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.604 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.003 loss detection timeout handler running Sending probe 1, because no ack since 8.604. Current RTT: 100/25. 9.003 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.003 (Probe is an initial retransmit) 9.003 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.803/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.003 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.004 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.804/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.004 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.037 <- (1) Packet I|1|L|189|2 Token=[] AckFrame[3,1|Δ0] CryptoFrame[0,123] 9.038 probe count not reset on ack because handshake not yet confirmed 9.038 Retransmitting CryptoFrame[0,257] on level Initial 9.038 Cwnd(-): 6000; inflight: 1200 9.038 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 9.037 <- (1) Packet H|1|L|1011|2 CryptoFrame[0,718] Padding(235) 9.040 -> Packet I|5|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 9.042 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.043 Starting downloading https://server4:443/wlxqboyycm at 32:25.059 on ClientConnection[86ab98ddcbdcf28d/e414a70b615be4a3(V1) with server4/193.167.100.100:443] 9.043 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 9.139/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.043 Discarding pn space Initial because first Handshake message is being sent 9.043 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 9.043 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 9.140/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.043 -> Packet A|0|S0|0000000000002003336f8851e7461be44d40124d|59|1 StreamFrame[0(CIB),0,17,fin] 9.139 loss detection timeout handler running Sending probe 0, because no ack since 9.042. Current RTT: 32/16. 9.139 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.139 (Probe is a handshake retransmit) 9.139 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 9.331/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.139 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 9.272 <- (2) Packet A|2|S0|e414a70b615be4a3|1350|2 PingFrame[] Padding(1323) 9.292 -> Packet A|1|S0|0000000000002003336f8851e7461be44d40124d|44|1 AckFrame[2|Δ19] 9.330 loss detection timeout handler running Sending probe 1, because no ack since 9.043. Current RTT: 32/16. 9.330 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.330 (Probe is a handshake retransmit) 9.331 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 9.715/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.331 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 9.332 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 9.716/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.332 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 9.424 <- (3) Packet A|4|S0|e414a70b615be4a3|1425|2 PingFrame[] Padding(1398) 9.443 -> Packet A|2|S0|0000000000002003336f8851e7461be44d40124d|46|1 AckFrame[4,2|Δ19] 9.475 <- (4) Packet A|5|S0|e414a70b615be4a3|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003e9364fe967263e9e53d42305|403823983566d42ce7b94fd5a3338322] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.475 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 9.527/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -311 millis, based on 9.164/App, because ackElicitingInFlight | RTT:32/16 9.476 loss detection timeout handler running Sending probe 0, because no ack since 9.043. Current RTT: 32/16. 9.476 Discarding pn space Handshake because HandshakeDone is received 9.476 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 9.718/App, because ackElicitingInFlight | RTT:32/16 9.476 -> Packet PA|3|S0|0000000000002003336f8851e7461be44d40124d|59|1 StreamFrame[0(CIB),0,17,fin] 9.495 -> Packet A|4|S0|0000000000002003336f8851e7461be44d40124d|46|1 AckFrame[5-4,2|Δ19] 9.701 <- (5) Packet A|8|S0|e414a70b615be4a3|29|2 PingFrame[] Padding(2) 9.701 <- (6) Packet A|9|S0|e414a70b615be4a3|29|2 PingFrame[] Padding(2) 9.701 -> Packet A|5|S0|0000000000002003336f8851e7461be44d40124d|47|1 AckFrame[9-8,5-4,2|Δ0] 9.717 loss detection timeout handler running Sending probe 1, because no ack since 9.476. Current RTT: 32/16. 9.717 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 10.201/App, because ackElicitingInFlight | RTT:32/16 9.717 -> Packet PA|6|S0|0000000000002003336f8851e7461be44d40124d|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 10.202/App, because ackElicitingInFlight | RTT:32/16 9.718 -> Packet PA|7|S0|0000000000002003336f8851e7461be44d40124d|59|1 StreamFrame[0(CIB),0,17,fin] 9.733 <- (7) Packet A|11|S0|e414a70b615be4a3|1065|3 AckFrame[5-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 9.733 Cwnd(-): 3000; inflight: 118 9.733 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 105 millis, based on 9.839/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 120 millis, based on 9.854/App, because ackElicitingInFlight | RTT:32/16 9.733 -> Packet A|8|S0|0000000000002003336f8851e7461be44d40124d|59|1 StreamFrame[0(CIB),0,17,fin] 9.734 Finished downloading https://server4:443/wlxqboyycm at 32:25.750 on ClientConnection[86ab98ddcbdcf28d/e414a70b615be4a3(V1) with server4/193.167.100.100:443] 9.734 Closing ClientConnection[86ab98ddcbdcf28d/e414a70b615be4a3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.735 -> Packet A|9|S0|0000000000002003336f8851e7461be44d40124d|47|2 ConnectionCloseFrame[0|0|] AckFrame[11|Δ0] 9.735 Creating connection with server4:443 with v1 9.735 Setting up connection for downloading https://server4:443/vcaapbsoxu at 32:25.751 on ClientConnection[259cbe96d77ad8ab/870a551e66d5130a(V1) with server4/193.167.100.100:443] 9.735 Original destination connection id: 259cbe96d77ad8ab (scid: 870a551e66d5130a) >- CryptoStream[I|ClientHello] 9.737 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.937/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.737 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.749 <- (8) Packet A|12|S0|e414a70b615be4a3|31|1 AckFrame[7-1|Δ0] 9.750 -> Packet A|10|S0|0000000000002003336f8851e7461be44d40124d|47|2 ConnectionCloseFrame[0|0|] AckFrame[11|Δ0] 9.765 <- (9) Packet A|13|S0|e414a70b615be4a3|34|2 AckFrame[9-6|Δ0] MaxStreamsFrame[B,129] 9.766 -> Packet A|11|S0|0000000000002003336f8851e7461be44d40124d|47|2 ConnectionCloseFrame[0|0|] AckFrame[11|Δ0] 9.770 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.771 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.971/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.770 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 9.773 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.870/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.773 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 9.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.872/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.775 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.775 Starting downloading https://server4:443/vcaapbsoxu at 32:25.791 on ClientConnection[259cbe96d77ad8ab/870a551e66d5130a(V1) with server4/193.167.100.100:443] 9.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.872/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.775 Discarding pn space Initial because first Handshake message is being sent 9.776 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.873/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.776 -> [Packet H|1|L|58|1 AckFrame[0|Δ0], Packet A|0|S0|00000000000020033caf712b2577cbe090f792b0|59|1 StreamFrame[0(CIB),0,17,fin]] 9.808 <- (2) Packet A|1|S0|870a551e66d5130a|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 9.809 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.906/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.809 Finished downloading https://server4:443/vcaapbsoxu at 32:25.825 on ClientConnection[259cbe96d77ad8ab/870a551e66d5130a(V1) with server4/193.167.100.100:443] 9.809 Closing ClientConnection[259cbe96d77ad8ab/870a551e66d5130a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.809 Creating connection with server4:443 with v1 9.809 -> Packet A|1|S0|00000000000020033caf712b2577cbe090f792b0|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 9.810 Setting up connection for downloading https://server4:443/cblonlxhgl at 32:25.826 on ClientConnection[91c1f1350556c9a6/b700bbd5b0bf8b96(V1) with server4/193.167.100.100:443] 9.810 Original destination connection id: 91c1f1350556c9a6 (scid: b700bbd5b0bf8b96) >- CryptoStream[I|ClientHello] 9.811 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.011/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.811 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.840 <- (3) Packet A|2|S0|870a551e66d5130a|29|1 MaxStreamsFrame[B,129] 9.841 -> Packet A|2|S0|00000000000020033caf712b2577cbe090f792b0|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 9.844 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.045/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.844 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 9.847 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.944/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.847 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 9.850 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.947/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.850 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.850 Starting downloading https://server4:443/cblonlxhgl at 32:25.866 on ClientConnection[91c1f1350556c9a6/b700bbd5b0bf8b96(V1) with server4/193.167.100.100:443] 9.851 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 9.851 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.850 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.948/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 9.948/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.851 -> Packet A|0|S0|00000000000020033896ab14de804791cfd314c2|59|1 StreamFrame[0(CIB),0,17,fin] 9.851 Discarding pn space Initial because first Handshake message is being sent 9.881 <- (2) Packet A|0|S0|b700bbd5b0bf8b96|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003a85aed3435b1fad34121aa78|f8ab18a020269771e602505e3aef9287] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.882 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 9.947/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 9.973/App, because ackElicitingInFlight | RTT:33/16 9.882 Discarding pn space Handshake because HandshakeDone is received 9.883 <- (3) Packet A|1|S0|b700bbd5b0bf8b96|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 9.883 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.884 Finished downloading https://server4:443/cblonlxhgl at 32:25.899 on ClientConnection[91c1f1350556c9a6/b700bbd5b0bf8b96(V1) with server4/193.167.100.100:443] 9.884 -> Packet A|1|S0|00000000000020033896ab14de804791cfd314c2|44|1 AckFrame[1-0|Δ1] 9.884 Closing ClientConnection[91c1f1350556c9a6/b700bbd5b0bf8b96(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.884 -> Packet A|2|S0|00000000000020033896ab14de804791cfd314c2|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 9.884 Creating connection with server4:443 with v1 9.885 Setting up connection for downloading https://server4:443/aqlbdbkboi at 32:25.900 on ClientConnection[8a539a20a6cfa46f/91e62af67c6ea38f(V1) with server4/193.167.100.100:443] 9.885 Original destination connection id: 8a539a20a6cfa46f (scid: 91e62af67c6ea38f) >- CryptoStream[I|ClientHello] 9.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.086/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.886 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.915 <- (4) Packet A|2|S0|b700bbd5b0bf8b96|29|1 MaxStreamsFrame[B,129] 9.915 -> Packet A|3|S0|00000000000020033896ab14de804791cfd314c2|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 9.920 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.920 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.120/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.920 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 9.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.019/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.922 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 9.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.925 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.925 Starting downloading https://server4:443/aqlbdbkboi at 32:25.941 on ClientConnection[8a539a20a6cfa46f/91e62af67c6ea38f(V1) with server4/193.167.100.100:443] 9.926 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 9.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.023/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.926 Discarding pn space Initial because first Handshake message is being sent 9.926 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.023/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.926 -> Packet A|0|S0|000000000000200335ce14f729fdcd0a3bebeaef|59|1 StreamFrame[0(CIB),0,17,fin] 9.958 <- (2) Packet A|1|S0|91e62af67c6ea38f|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 9.958 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.055/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.959 Finished downloading https://server4:443/aqlbdbkboi at 32:25.974 on ClientConnection[8a539a20a6cfa46f/91e62af67c6ea38f(V1) with server4/193.167.100.100:443] 9.959 Closing ClientConnection[8a539a20a6cfa46f/91e62af67c6ea38f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.959 Creating connection with server4:443 with v1 9.959 -> Packet A|1|S0|000000000000200335ce14f729fdcd0a3bebeaef|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 9.960 Setting up connection for downloading https://server4:443/wnqguonwpn at 32:25.976 on ClientConnection[08626cbab167ac81/fbe8a27236f9047e(V1) with server4/193.167.100.100:443] 9.960 Original destination connection id: 08626cbab167ac81 (scid: fbe8a27236f9047e) >- CryptoStream[I|ClientHello] 9.961 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.161/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.961 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.990 <- (3) Packet A|2|S0|91e62af67c6ea38f|29|1 MaxStreamsFrame[B,129] 9.991 -> Packet A|2|S0|000000000000200335ce14f729fdcd0a3bebeaef|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 10.161 loss detection timeout handler running Sending probe 0, because no ack since 9.961. Current RTT: 100/25. 10.161 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.161 (Probe is an initial retransmit) 10.161 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.561/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.161 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.195 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 10.195 probe count not reset on ack because handshake not yet confirmed 10.195 Retransmitting CryptoFrame[0,257] on level Initial 10.195 Cwnd(-): 6000; inflight: 0 10.195 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.595/Initial, because peerAwaitingAddressValidation | RTT:100/25 10.196 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 10.390/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.195 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 10.195 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 10.199 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.393/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.199 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 10.202 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 193 millis, based on 10.396/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.201 -> Packet H|0|L|92|1 CryptoFrame[0,36] 10.202 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.299/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.202 Starting downloading https://server4:443/wnqguonwpn at 32:26.217 on ClientConnection[08626cbab167ac81/fbe8a27236f9047e(V1) with server4/193.167.100.100:443] 10.202 Discarding pn space Initial because first Handshake message is being sent 10.202 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 10.202 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.299/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.202 -> Packet A|0|S0|0000000000002003550d43960dde4073394d9b90|59|1 StreamFrame[0(CIB),0,17,fin] 10.228 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.298 loss detection timeout handler running Sending probe 0, because no ack since 10.201. Current RTT: 33/16. 10.298 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.298 (Probe is a handshake retransmit) 10.299 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.493/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.299 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 10.492 loss detection timeout handler running Sending probe 1, because no ack since 10.202. Current RTT: 33/16. 10.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.492 (Probe is a handshake retransmit) 10.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 10.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.492 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 10.493 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 10.881/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.493 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 10.625 <- (3) Packet A|2|S0|fbe8a27236f9047e|1350|2 PingFrame[] Padding(1323) 10.645 -> Packet A|1|S0|0000000000002003550d43960dde4073394d9b90|44|1 AckFrame[2|Δ19] 10.677 <- (4) Packet A|3|S0|fbe8a27236f9047e|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020038ffb7f5364a4325684f8f30f|a42dae16d80cf3a6819ece18bad8bd17] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.677 State is set to Confirmed reschedule loss detection timer for PTO over 13 millis, based on 10.690/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -353 millis, based on 10.324/App, because ackElicitingInFlight | RTT:33/16 10.677 loss detection timeout handler running 10.677 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 10.202. Current RTT: 33/16. 10.677 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 10.922/App, because ackElicitingInFlight | RTT:33/16 10.678 -> Packet PA|2|S0|0000000000002003550d43960dde4073394d9b90|59|1 StreamFrame[0(CIB),0,17,fin] 10.697 -> Packet A|3|S0|0000000000002003550d43960dde4073394d9b90|44|1 AckFrame[3-2|Δ19] 10.710 <- (5) Packet A|4|S0|fbe8a27236f9047e|1065|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 10.710 Cwnd(-): 3000; inflight: 0 10.710 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.710 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 105 millis, based on 10.817/App, because ackElicitingInFlight | RTT:33/12 10.711 -> Packet A|4|S0|0000000000002003550d43960dde4073394d9b90|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 10.711 Finished downloading https://server4:443/wnqguonwpn at 32:26.726 on ClientConnection[08626cbab167ac81/fbe8a27236f9047e(V1) with server4/193.167.100.100:443] 10.711 Closing ClientConnection[08626cbab167ac81/fbe8a27236f9047e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.711 -> Packet A|5|S0|0000000000002003550d43960dde4073394d9b90|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 10.711 Creating connection with server4:443 with v1 10.712 Setting up connection for downloading https://server4:443/oohckppvpv at 32:26.728 on ClientConnection[e089fab523f8c340/3fc9f86281d85ac7(V1) with server4/193.167.100.100:443] 10.712 Original destination connection id: e089fab523f8c340 (scid: 3fc9f86281d85ac7) >- CryptoStream[I|ClientHello] 10.714 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.914/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.714 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.742 <- (6) Packet A|5|S0|fbe8a27236f9047e|34|2 AckFrame[5-3|Δ0] MaxStreamsFrame[B,129] 10.742 -> Packet A|6|S0|0000000000002003550d43960dde4073394d9b90|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 10.747 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 10.748 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.948/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.751 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.747 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) reschedule loss detection timer for PTO over 96 millis, based on 10.848/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.751 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 10.753 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.850/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.753 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.753 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.850/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.753 Starting downloading https://server4:443/oohckppvpv at 32:26.769 on ClientConnection[e089fab523f8c340/3fc9f86281d85ac7(V1) with server4/193.167.100.100:443] 10.753 Discarding pn space Initial because first Handshake message is being sent 10.753 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 10.754 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.851/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.754 -> Packet A|0|S0|00000000000020030c36a9982d45e2e9fc1209c7|59|1 StreamFrame[0(CIB),0,17,fin] 10.784 <- (2) Packet A|0|S0|3fc9f86281d85ac7|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020039ad5db78d3cd2f9122b9ee8e|b10cde6989a9bee64dfb13661758ba5a] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.785 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 10.850/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 10.876/App, because ackElicitingInFlight | RTT:33/16 10.785 Discarding pn space Handshake because HandshakeDone is received 10.804 -> Packet A|1|S0|00000000000020030c36a9982d45e2e9fc1209c7|44|1 AckFrame[0|Δ19] 10.875 loss detection timeout handler running Sending probe 0, because no ack since 10.754. Current RTT: 33/16. 10.875 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 11.120/App, because ackElicitingInFlight | RTT:33/16 10.876 -> Packet PA|2|S0|00000000000020030c36a9982d45e2e9fc1209c7|59|1 StreamFrame[0(CIB),0,17,fin] 10.885 <- (3) Packet A|3|S0|3fc9f86281d85ac7|1350|2 PingFrame[] Padding(1323) 10.904 -> Packet A|3|S0|00000000000020030c36a9982d45e2e9fc1209c7|46|1 AckFrame[3,0|Δ19] 10.931 <- (4) Packet A|4|S0|3fc9f86281d85ac7|32|1 AckFrame[2-0|Δ25] 10.932 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.936 <- (5) Packet A|5|S0|3fc9f86281d85ac7|1065|3 AckFrame[3-0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 10.936 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.937 Finished downloading https://server4:443/oohckppvpv at 32:26.952 on ClientConnection[e089fab523f8c340/3fc9f86281d85ac7(V1) with server4/193.167.100.100:443] 10.937 Closing ClientConnection[e089fab523f8c340/3fc9f86281d85ac7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.937 Creating connection with server4:443 with v1 10.937 -> Packet A|4|S0|00000000000020030c36a9982d45e2e9fc1209c7|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 10.938 Setting up connection for downloading https://server4:443/hvrhummket at 32:26.953 on ClientConnection[b60cb688aba53eaf/c22e3ddb67b70254(V1) with server4/193.167.100.100:443] 10.938 Original destination connection id: b60cb688aba53eaf (scid: c22e3ddb67b70254) >- CryptoStream[I|ClientHello] 10.939 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.139/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.939 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.138 loss detection timeout handler running Sending probe 0, because no ack since 10.939. Current RTT: 100/25. 11.138 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.139 (Probe is an initial retransmit) 11.139 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.539/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.139 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.173 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 11.173 probe count not reset on ack because handshake not yet confirmed 11.173 Retransmitting CryptoFrame[0,257] on level Initial 11.173 Cwnd(-): 6000; inflight: 0 11.173 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.573/Initial, because peerAwaitingAddressValidation | RTT:100/25 11.173 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 11.367/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.173 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 11.173 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 11.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.370/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.176 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 11.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.372/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.178 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.178 Starting downloading https://server4:443/hvrhummket at 32:27.194 on ClientConnection[b60cb688aba53eaf/c22e3ddb67b70254(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 11.275/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.179 Discarding pn space Initial because first Handshake message is being sent 11.178 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 11.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.179 -> Packet A|0|S0|00000000000020036bd4b496365e4bafc3935ae8|59|1 StreamFrame[0(CIB),0,17,fin] 11.210 <- (2) Packet A|0|S0|c22e3ddb67b70254|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000200304a5f88de836555c8db36f3a|14aace4a341a2da537fed1227d9bb908] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 11.210 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 11.275/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 11.301/App, because ackElicitingInFlight | RTT:33/16 11.210 Discarding pn space Handshake because HandshakeDone is received 11.211 <- (3) Packet A|1|S0|c22e3ddb67b70254|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 11.211 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.211 Finished downloading https://server4:443/hvrhummket at 32:27.227 on ClientConnection[b60cb688aba53eaf/c22e3ddb67b70254(V1) with server4/193.167.100.100:443] 11.211 -> Packet A|1|S0|00000000000020036bd4b496365e4bafc3935ae8|44|1 AckFrame[1-0|Δ1] 11.211 Closing ClientConnection[b60cb688aba53eaf/c22e3ddb67b70254(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.212 -> Packet A|2|S0|00000000000020036bd4b496365e4bafc3935ae8|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 11.212 Creating connection with server4:443 with v1 11.213 Setting up connection for downloading https://server4:443/ixdxefvytv at 32:27.228 on ClientConnection[2d78c3444bf97bdf/c302c062396b5b66(V1) with server4/193.167.100.100:443] 11.213 Original destination connection id: 2d78c3444bf97bdf (scid: c302c062396b5b66) >- CryptoStream[I|ClientHello] 11.214 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.414/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.214 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.247 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 11.248 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.448/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.250 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.247 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) reschedule loss detection timer for PTO over 96 millis, based on 11.347/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.250 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 11.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.252 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.252 Starting downloading https://server4:443/ixdxefvytv at 32:27.268 on ClientConnection[2d78c3444bf97bdf/c302c062396b5b66(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 11.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.252 Discarding pn space Initial because first Handshake message is being sent 11.253 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 11.254 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.351/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.254 -> Packet A|0|S0|00000000000020035121f924d208f3ff1c07c2c3|59|1 StreamFrame[0(CIB),0,17,fin] 11.284 <- (2) Packet A|0|S0|c302c062396b5b66|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020033f93bba95510cbf3b07a5bae|53309e5f855a2475f831d196a7b68d69] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 11.284 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 11.349/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 11.376/App, because ackElicitingInFlight | RTT:33/16 11.285 Discarding pn space Handshake because HandshakeDone is received 11.304 -> Packet A|1|S0|00000000000020035121f924d208f3ff1c07c2c3|44|1 AckFrame[0|Δ19] 11.376 loss detection timeout handler running Sending probe 0, because no ack since 11.254. Current RTT: 33/16. 11.376 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 11.620/App, because ackElicitingInFlight | RTT:33/16 11.376 -> Packet PA|2|S0|00000000000020035121f924d208f3ff1c07c2c3|59|1 StreamFrame[0(CIB),0,17,fin] 11.384 <- (3) Packet A|3|S0|c302c062396b5b66|1350|2 PingFrame[] Padding(1323) 11.403 -> Packet A|3|S0|00000000000020035121f924d208f3ff1c07c2c3|46|1 AckFrame[3,0|Δ19] 11.435 <- (4) Packet A|5|S0|c302c062396b5b66|1065|3 AckFrame[3-0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 11.436 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.436 Finished downloading https://server4:443/ixdxefvytv at 32:27.452 on ClientConnection[2d78c3444bf97bdf/c302c062396b5b66(V1) with server4/193.167.100.100:443] 11.436 Closing ClientConnection[2d78c3444bf97bdf/c302c062396b5b66(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.436 -> Packet A|4|S0|00000000000020035121f924d208f3ff1c07c2c3|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 11.436 Creating connection with server4:443 with v1 11.437 Setting up connection for downloading https://server4:443/fhdotrzmop at 32:27.453 on ClientConnection[cbf5c3df6360b405/a1c7250cd1745412(V1) with server4/193.167.100.100:443] 11.437 Original destination connection id: cbf5c3df6360b405 (scid: a1c7250cd1745412) >- CryptoStream[I|ClientHello] 11.438 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.638/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.438 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.472 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 11.472 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.672/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.472 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,717] Padding(238) 11.474 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.571/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.474 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 11.476 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.573/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.476 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.477 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.477 Starting downloading https://server4:443/fhdotrzmop at 32:27.492 on ClientConnection[cbf5c3df6360b405/a1c7250cd1745412(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 11.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.477 Discarding pn space Initial because first Handshake message is being sent 11.477 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 11.477 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.477 -> Packet A|0|S0|0000000000002003b74c91d2bc80c41e8674a185|59|1 StreamFrame[0(CIB),0,17,fin] 11.508 <- (2) Packet A|0|S0|a1c7250cd1745412|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003bcc5b07a665e02f6f023231e|0bdea972fa7494ae6135af0c7447fd1c] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 11.508 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 11.573/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 11.599/App, because ackElicitingInFlight | RTT:33/16 11.509 Discarding pn space Handshake because HandshakeDone is received 11.528 -> Packet A|1|S0|0000000000002003b74c91d2bc80c41e8674a185|44|1 AckFrame[0|Δ19] 11.599 loss detection timeout handler running Sending probe 0, because no ack since 11.477. Current RTT: 33/16. 11.599 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 11.843/App, because ackElicitingInFlight | RTT:33/16 11.599 -> Packet PA|2|S0|0000000000002003b74c91d2bc80c41e8674a185|59|1 StreamFrame[0(CIB),0,17,fin] 11.609 <- (3) Packet A|3|S0|a1c7250cd1745412|1350|2 PingFrame[] Padding(1323) 11.628 -> Packet A|3|S0|0000000000002003b74c91d2bc80c41e8674a185|46|1 AckFrame[3,0|Δ19] 11.655 <- (4) Packet A|4|S0|a1c7250cd1745412|32|1 AckFrame[2-0|Δ26] 11.655 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.660 <- (5) Packet A|5|S0|a1c7250cd1745412|1065|3 AckFrame[3-0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 11.660 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.661 Finished downloading https://server4:443/fhdotrzmop at 32:27.676 on ClientConnection[cbf5c3df6360b405/a1c7250cd1745412(V1) with server4/193.167.100.100:443] 11.661 Closing ClientConnection[cbf5c3df6360b405/a1c7250cd1745412(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.661 -> Packet A|4|S0|0000000000002003b74c91d2bc80c41e8674a185|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 11.661 Creating connection with server4:443 with v1 11.662 Setting up connection for downloading https://server4:443/xatpwkjujw at 32:27.677 on ClientConnection[af97efa96a33c949/846671aee6fa016a(V1) with server4/193.167.100.100:443] 11.662 Original destination connection id: af97efa96a33c949 (scid: 846671aee6fa016a) >- CryptoStream[I|ClientHello] 11.663 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.863/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.663 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.692 <- (6) Packet A|6|S0|a1c7250cd1745412|29|1 MaxStreamsFrame[B,129] 11.692 -> Packet A|5|S0|0000000000002003b74c91d2bc80c41e8674a185|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 11.862 loss detection timeout handler running Sending probe 0, because no ack since 11.663. Current RTT: 100/25. 11.862 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.862 (Probe is an initial retransmit) 11.862 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.262/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.862 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.895 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 11.896 probe count not reset on ack because handshake not yet confirmed 11.896 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.296/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.895 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,718] Padding(237) reschedule loss detection timer for PTO over 191 millis, based on 12.090/Handshake, because peerAwaitingAddressValidation | RTT:32/16 11.898 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 11.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 12.092/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 11.900 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.900 Starting downloading https://server4:443/xatpwkjujw at 32:27.916 on ClientConnection[af97efa96a33c949/846671aee6fa016a(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 11.996/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 11.900 Discarding pn space Initial because first Handshake message is being sent 11.900 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 11.901 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 11.997/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 11.901 -> Packet A|0|S0|0000000000002003d5db4063d29a2f936da12454|59|1 StreamFrame[0(CIB),0,17,fin] 11.996 loss detection timeout handler running Sending probe 0, because no ack since 11.900. Current RTT: 32/16. 11.996 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.996 (Probe is a handshake retransmit) 11.996 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 12.188/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 11.996 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 12.031 <- (2) Packet A|3|S0|846671aee6fa016a|1350|2 PingFrame[] Padding(1323) 12.051 -> Packet A|1|S0|0000000000002003d5db4063d29a2f936da12454|44|1 AckFrame[3|Δ19] 12.083 <- (3) Packet A|4|S0|846671aee6fa016a|1350|5 AckFrame[1-0|Δ0] CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020031a73e3cf08dede29b5896aa5|dd109d05c8c7485119691cfc5521fd5c] StreamFrame[0(CIB),0,697] 12.084 probe count not reset on ack because handshake not yet confirmed 12.084 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 12.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.084 State is set to Confirmed reschedule loss detection timer for PTO over 104 millis, based on 12.188/Handshake, because ackElicitingInFlight | RTT:32/16 12.084 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.084 Discarding pn space Handshake because HandshakeDone is received 12.083 <- (4) Packet A|5|S0|846671aee6fa016a|364|2 StreamFrame[0(CIB),697,327] StreamFrame[0(CIB),1024,0,fin] 12.084 Finished downloading https://server4:443/xatpwkjujw at 32:28.100 on ClientConnection[af97efa96a33c949/846671aee6fa016a(V1) with server4/193.167.100.100:443] 12.084 -> Packet A|2|S0|0000000000002003d5db4063d29a2f936da12454|43|1 AckFrame[5-4|Δ0] 12.085 Closing ClientConnection[af97efa96a33c949/846671aee6fa016a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.085 Creating connection with server4:443 with v1 12.085 -> Packet A|3|S0|0000000000002003d5db4063d29a2f936da12454|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 12.085 Setting up connection for downloading https://server4:443/sknkzxjcgo at 32:28.101 on ClientConnection[9d24e714237ee7fe/1c74008ca710e8fc(V1) with server4/193.167.100.100:443] 12.086 Original destination connection id: 9d24e714237ee7fe (scid: 1c74008ca710e8fc) >- CryptoStream[I|ClientHello] 12.087 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.287/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.086 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.115 <- (5) Packet A|6|S0|846671aee6fa016a|29|1 MaxStreamsFrame[B,129] 12.116 -> Packet A|4|S0|0000000000002003d5db4063d29a2f936da12454|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 12.120 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.120 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.320/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.120 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 12.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.219/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.122 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 12.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 12.222/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.125 Starting downloading https://server4:443/sknkzxjcgo at 32:28.140 on ClientConnection[9d24e714237ee7fe/1c74008ca710e8fc(V1) with server4/193.167.100.100:443] 12.125 -> Packet H|0|L|92|1 CryptoFrame[0,36] 12.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.222/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.125 Discarding pn space Initial because first Handshake message is being sent 12.125 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 12.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.222/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.125 -> Packet A|0|S0|0000000000002003162ac61c8c58712eb26d3c3a|59|1 StreamFrame[0(CIB),0,17,fin] 12.156 <- (2) Packet A|0|S0|1c74008ca710e8fc|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003c62bdfb2b5587cba27f287e1|1eb9e3336669ed7484906969e26cfc51] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.157 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 12.222/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 12.247/App, because ackElicitingInFlight | RTT:33/16 12.157 Discarding pn space Handshake because HandshakeDone is received 12.157 <- (3) Packet A|1|S0|1c74008ca710e8fc|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 12.158 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.158 Finished downloading https://server4:443/sknkzxjcgo at 32:28.174 on ClientConnection[9d24e714237ee7fe/1c74008ca710e8fc(V1) with server4/193.167.100.100:443] 12.158 -> Packet A|1|S0|0000000000002003162ac61c8c58712eb26d3c3a|44|1 AckFrame[1-0|Δ1] 12.158 Closing ClientConnection[9d24e714237ee7fe/1c74008ca710e8fc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.159 -> Packet A|2|S0|0000000000002003162ac61c8c58712eb26d3c3a|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 12.159 Creating connection with server4:443 with v1 12.159 Setting up connection for downloading https://server4:443/fnxozuwtng at 32:28.175 on ClientConnection[783089a1c13c695e/dad8d9196e79c627(V1) with server4/193.167.100.100:443] 12.159 Original destination connection id: 783089a1c13c695e (scid: dad8d9196e79c627) >- CryptoStream[I|ClientHello] 12.161 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.361/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.160 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.189 <- (4) Packet A|2|S0|1c74008ca710e8fc|29|1 MaxStreamsFrame[B,129] 12.189 -> Packet A|3|S0|0000000000002003162ac61c8c58712eb26d3c3a|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 12.194 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.194 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.394/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.194 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 12.196 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.293/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.196 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 12.199 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.296/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.198 -> Packet H|0|L|92|1 CryptoFrame[0,36] 12.199 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.199 Starting downloading https://server4:443/fnxozuwtng at 32:28.214 on ClientConnection[783089a1c13c695e/dad8d9196e79c627(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 12.296/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.199 Discarding pn space Initial because first Handshake message is being sent 12.199 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 12.199 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.296/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.199 -> Packet A|0|S0|0000000000002003380f887be8214b9a1021432f|59|1 StreamFrame[0(CIB),0,17,fin] 12.230 <- (2) Packet A|0|S0|dad8d9196e79c627|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003a82f1459ab9b8f8febeacf52|336e96b4f9aebcee317bdaaaf7d55845] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.231 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 12.295/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 12.321/App, because ackElicitingInFlight | RTT:33/16 12.231 Discarding pn space Handshake because HandshakeDone is received 12.232 <- (3) Packet A|1|S0|dad8d9196e79c627|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 12.232 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.232 Finished downloading https://server4:443/fnxozuwtng at 32:28.248 on ClientConnection[783089a1c13c695e/dad8d9196e79c627(V1) with server4/193.167.100.100:443] 12.232 Closing ClientConnection[783089a1c13c695e/dad8d9196e79c627(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.232 -> Packet A|1|S0|0000000000002003380f887be8214b9a1021432f|44|1 AckFrame[1-0|Δ1] 12.233 Creating connection with server4:443 with v1 12.233 -> Packet A|2|S0|0000000000002003380f887be8214b9a1021432f|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 12.233 Setting up connection for downloading https://server4:443/zctijkkrxe at 32:28.249 on ClientConnection[1c4f616bcacc3888/3291ccd6db537371(V1) with server4/193.167.100.100:443] 12.233 Original destination connection id: 1c4f616bcacc3888 (scid: 3291ccd6db537371) >- CryptoStream[I|ClientHello] 12.235 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.435/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.235 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.263 <- (4) Packet A|2|S0|dad8d9196e79c627|29|1 MaxStreamsFrame[B,129] 12.263 -> Packet A|3|S0|0000000000002003380f887be8214b9a1021432f|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 12.434 loss detection timeout handler running Sending probe 0, because no ack since 12.235. Current RTT: 100/25. 12.434 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.434 (Probe is an initial retransmit) 12.434 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.834/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.434 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.833 loss detection timeout handler running Sending probe 1, because no ack since 12.434. Current RTT: 100/25. 12.834 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.834 (Probe is an initial retransmit) 12.834 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.634/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.834 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.835 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.635/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.835 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.867 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 12.868 probe count not reset on ack because handshake not yet confirmed 12.868 Retransmitting CryptoFrame[0,257] on level Initial 12.868 Cwnd(-): 6000; inflight: 1200 12.868 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.668/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.868 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 13.256/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.868 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 12.867 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 12.871 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 13.259/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.871 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 12.874 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 13.262/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.873 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.874 Starting downloading https://server4:443/zctijkkrxe at 32:28.890 on ClientConnection[1c4f616bcacc3888/3291ccd6db537371(V1) with server4/193.167.100.100:443] 12.874 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 12.874 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.971/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.874 Discarding pn space Initial because first Handshake message is being sent 12.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.972/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.874 -> Packet A|0|S0|000000000000200332964e983781555eeac25744|59|1 StreamFrame[0(CIB),0,17,fin] 12.901 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 12.907 <- (3) Packet A|1|S0|3291ccd6db537371|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 12.907 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.004/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.908 Finished downloading https://server4:443/zctijkkrxe at 32:28.923 on ClientConnection[1c4f616bcacc3888/3291ccd6db537371(V1) with server4/193.167.100.100:443] 12.908 Closing ClientConnection[1c4f616bcacc3888/3291ccd6db537371(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.908 -> Packet A|1|S0|000000000000200332964e983781555eeac25744|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 12.908 Creating connection with server4:443 with v1 12.909 Setting up connection for downloading https://server4:443/wpbbhvfyfe at 32:28.925 on ClientConnection[fd7b63378345a725/5f72adad1064a46b(V1) with server4/193.167.100.100:443] 12.909 Original destination connection id: fd7b63378345a725 (scid: 5f72adad1064a46b) >- CryptoStream[I|ClientHello] 12.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.110/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.910 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.939 <- (4) Packet A|2|S0|3291ccd6db537371|29|1 MaxStreamsFrame[B,129] 12.939 -> Packet A|2|S0|000000000000200332964e983781555eeac25744|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 13.109 loss detection timeout handler running Sending probe 0, because no ack since 12.910. Current RTT: 100/25. 13.109 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.110 (Probe is an initial retransmit) 13.110 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.510/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.110 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.509 loss detection timeout handler running Sending probe 1, because no ack since 13.110. Current RTT: 100/25. 13.509 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.509 (Probe is an initial retransmit) 13.509 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.309/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.509 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.510 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.310/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.510 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.542 <- (1) Packet I|2|L|187|2 Token=[] AckFrame[2-0|Δ0] CryptoFrame[0,123] 13.543 probe count not reset on ack because handshake not yet confirmed 13.543 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.343/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 13.542 <- (1) Packet H|2|L|1013|2 CryptoFrame[0,718] Padding(237) 13.545 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 13.929/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.545 -> Packet I|4|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1141) >- CryptoStream[H|Finished] 13.548 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.548 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 13.644/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.548 Discarding pn space Initial because first Handshake message is being sent 13.548 Starting downloading https://server4:443/wpbbhvfyfe at 32:29.564 on ClientConnection[fd7b63378345a725/5f72adad1064a46b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 383 millis, based on 13.932/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.548 -> Packet H|0|L|92|1 CryptoFrame[0,36] 13.548 -> Packet H|1|L|58|1 AckFrame[2|Δ0] 13.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 13.645/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.549 -> Packet A|0|S0|00000000000020037501dbd99dabe12f8846c24a|59|1 StreamFrame[0(CIB),0,17,fin] 13.644 loss detection timeout handler running Sending probe 0, because no ack since 13.548. Current RTT: 32/16. 13.644 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.644 (Probe is a handshake retransmit) 13.644 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 13.836/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.644 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 13.835 loss detection timeout handler running Sending probe 1, because no ack since 13.549. Current RTT: 32/16. 13.835 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.835 (Probe is a handshake retransmit) 13.836 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 14.220/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.836 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 13.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 14.221/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.837 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 13.867 <- (2) Packet A|0|S0|5f72adad1064a46b|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020035321c78f7d6b4719a932cda1|4f6cfc9d8c7c7792fbedcd9a847e6d61] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.868 State is set to Confirmed reschedule loss detection timer for PTO over 164 millis, based on 14.033/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -198 millis, based on 13.670/App, because ackElicitingInFlight | RTT:32/16 13.868 Discarding pn space Handshake because HandshakeDone is received 13.868 loss detection timeout handler running Sending probe 0, because no ack since 13.549. Current RTT: 32/16. 13.868 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 14.111/App, because ackElicitingInFlight | RTT:32/16 13.869 -> Packet PA|1|S0|00000000000020037501dbd99dabe12f8846c24a|59|1 StreamFrame[0(CIB),0,17,fin] 13.888 -> Packet A|2|S0|00000000000020037501dbd99dabe12f8846c24a|44|1 AckFrame[0|Δ19] 13.900 <- (3) Packet A|1|S0|5f72adad1064a46b|1065|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 13.901 Cwnd(-): 6000; inflight: 0 13.901 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.901 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 104 millis, based on 14.006/App, because ackElicitingInFlight | RTT:32/12 13.901 -> Packet A|3|S0|00000000000020037501dbd99dabe12f8846c24a|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 13.901 Finished downloading https://server4:443/wpbbhvfyfe at 32:29.917 on ClientConnection[fd7b63378345a725/5f72adad1064a46b(V1) with server4/193.167.100.100:443] 13.901 Closing ClientConnection[fd7b63378345a725/5f72adad1064a46b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.902 -> Packet A|4|S0|00000000000020037501dbd99dabe12f8846c24a|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 13.902 Creating connection with server4:443 with v1 13.902 Setting up connection for downloading https://server4:443/jlytgiybuh at 32:29.918 on ClientConnection[41fd262c01c61f4f/d42dab0c05237222(V1) with server4/193.167.100.100:443] 13.902 Original destination connection id: 41fd262c01c61f4f (scid: d42dab0c05237222) >- CryptoStream[I|ClientHello] 13.904 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.104/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.904 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.933 <- (4) Packet A|2|S0|5f72adad1064a46b|34|2 AckFrame[4-2|Δ0] MaxStreamsFrame[B,129] 13.933 -> Packet A|5|S0|00000000000020037501dbd99dabe12f8846c24a|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 13.937 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.938 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.138/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.937 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 13.940 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.037/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.940 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 13.942 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.039/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.942 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.942 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.942 Starting downloading https://server4:443/jlytgiybuh at 32:29.958 on ClientConnection[41fd262c01c61f4f/d42dab0c05237222(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 14.039/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.942 Discarding pn space Initial because first Handshake message is being sent 13.942 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 13.943 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.040/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.942 -> Packet A|0|S0|0000000000002003848c45c991750c2eb5b73feb|59|1 StreamFrame[0(CIB),0,17,fin] 14.039 loss detection timeout handler running Sending probe 0, because no ack since 13.942. Current RTT: 33/16. 14.039 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.039 (Probe is a handshake retransmit) 14.039 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.233/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.039 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 14.232 loss detection timeout handler running Sending probe 1, because no ack since 13.942. Current RTT: 33/16. 14.232 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.232 (Probe is a handshake retransmit) 14.233 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 14.621/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.232 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 14.233 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 14.622/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.233 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 14.366 <- (2) Packet A|2|S0|d42dab0c05237222|1350|2 PingFrame[] Padding(1323) 14.386 -> Packet A|1|S0|0000000000002003848c45c991750c2eb5b73feb|44|1 AckFrame[2|Δ19] 14.417 <- (3) Packet A|3|S0|d42dab0c05237222|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020031bffd0304592d17f21de8dff|19d5c9f6b7754c94bba8ad84c70baead] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.418 State is set to Confirmed reschedule loss detection timer for PTO over 12 millis, based on 14.430/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -353 millis, based on 14.064/App, because ackElicitingInFlight | RTT:33/16 14.418 Discarding pn space Handshake because HandshakeDone is received 14.418 loss detection timeout handler running Sending probe 0, because no ack since 13.942. Current RTT: 33/16. 14.418 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 14.662/App, because ackElicitingInFlight | RTT:33/16 14.418 -> Packet PA|2|S0|0000000000002003848c45c991750c2eb5b73feb|59|1 StreamFrame[0(CIB),0,17,fin] 14.437 -> Packet A|3|S0|0000000000002003848c45c991750c2eb5b73feb|44|1 AckFrame[3-2|Δ19] 14.517 <- (4) Packet A|5|S0|d42dab0c05237222|1425|2 PingFrame[] Padding(1398) 14.537 -> Packet A|4|S0|0000000000002003848c45c991750c2eb5b73feb|46|1 AckFrame[5,3-2|Δ19] 14.569 <- (5) Packet A|6|S0|d42dab0c05237222|1065|3 AckFrame[4-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 14.569 Cwnd(-): 6000; inflight: 0 14.569 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 14.569 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 14.691/App, because ackElicitingInFlight | RTT:33/16 14.569 -> Packet A|5|S0|0000000000002003848c45c991750c2eb5b73feb|59|1 StreamFrame[0(CIB),0,17,fin] 14.570 Finished downloading https://server4:443/jlytgiybuh at 32:30.586 on ClientConnection[41fd262c01c61f4f/d42dab0c05237222(V1) with server4/193.167.100.100:443] 14.570 Closing ClientConnection[41fd262c01c61f4f/d42dab0c05237222(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.570 -> Packet A|6|S0|0000000000002003848c45c991750c2eb5b73feb|47|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 14.571 Creating connection with server4:443 with v1 14.571 Setting up connection for downloading https://server4:443/bybjpqbpqv at 32:30.587 on ClientConnection[e6941c4422124b99/353949d1330d019e(V1) with server4/193.167.100.100:443] 14.571 Original destination connection id: e6941c4422124b99 (scid: 353949d1330d019e) >- CryptoStream[I|ClientHello] 14.573 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.773/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.573 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.601 <- (6) Packet A|7|S0|d42dab0c05237222|34|2 AckFrame[6-5|Δ0] MaxStreamsFrame[B,129] 14.601 -> Packet A|7|S0|0000000000002003848c45c991750c2eb5b73feb|47|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 14.772 loss detection timeout handler running Sending probe 0, because no ack since 14.573. Current RTT: 100/25. 14.772 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.772 (Probe is an initial retransmit) 14.772 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.172/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.772 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.805 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 14.806 probe count not reset on ack because handshake not yet confirmed 14.806 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.206/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.805 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,717] Padding(238) 14.808 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 15.000/Handshake, because peerAwaitingAddressValidation | RTT:32/16 14.808 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 14.811 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 15.003/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.810 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.811 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.811 Starting downloading https://server4:443/bybjpqbpqv at 32:30.827 on ClientConnection[e6941c4422124b99/353949d1330d019e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 14.907/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.811 Discarding pn space Initial because first Handshake message is being sent 14.811 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 14.811 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.908/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.811 -> Packet A|0|S0|00000000000020033c9935ca55dadc112b45255f|59|1 StreamFrame[0(CIB),0,17,fin] 14.842 <- (2) Packet A|0|S0|353949d1330d019e|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020035ddb34524991790837c87e7b|ad051eb2a8e39d003dd8a93c361034ca] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.843 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 14.906/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 14.932/App, because ackElicitingInFlight | RTT:32/16 14.843 Discarding pn space Handshake because HandshakeDone is received 14.844 <- (3) Packet A|1|S0|353949d1330d019e|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 14.844 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.844 Finished downloading https://server4:443/bybjpqbpqv at 32:30.860 on ClientConnection[e6941c4422124b99/353949d1330d019e(V1) with server4/193.167.100.100:443] 14.844 -> Packet A|1|S0|00000000000020033c9935ca55dadc112b45255f|44|1 AckFrame[1-0|Δ1] 14.844 Closing ClientConnection[e6941c4422124b99/353949d1330d019e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.845 -> Packet A|2|S0|00000000000020033c9935ca55dadc112b45255f|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 14.845 Creating connection with server4:443 with v1 14.845 Setting up connection for downloading https://server4:443/fhqikjamho at 32:30.861 on ClientConnection[20fb6035f3384954/3a7a8dd4382bb4c3(V1) with server4/193.167.100.100:443] 14.845 Original destination connection id: 20fb6035f3384954 (scid: 3a7a8dd4382bb4c3) >- CryptoStream[I|ClientHello] 14.847 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.047/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.847 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.875 <- (4) Packet A|2|S0|353949d1330d019e|29|1 MaxStreamsFrame[B,129] 14.875 -> Packet A|3|S0|00000000000020033c9935ca55dadc112b45255f|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 15.046 loss detection timeout handler running Sending probe 0, because no ack since 14.847. Current RTT: 100/25. 15.046 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.046 (Probe is an initial retransmit) 15.046 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.446/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.046 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.079 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 15.079 probe count not reset on ack because handshake not yet confirmed 15.079 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.479/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.079 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,717] Padding(238) 15.082 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 15.274/Handshake, because peerAwaitingAddressValidation | RTT:32/16 15.081 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 15.084 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 15.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.084 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.084 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.084 Starting downloading https://server4:443/fhqikjamho at 32:31.100 on ClientConnection[20fb6035f3384954/3a7a8dd4382bb4c3(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 15.180/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.084 Discarding pn space Initial because first Handshake message is being sent 15.084 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 15.084 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 15.180/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.084 -> Packet A|0|S0|0000000000002003660912e38a1f3a4c2f452a8a|59|1 StreamFrame[0(CIB),0,17,fin] 15.179 loss detection timeout handler running Sending probe 0, because no ack since 15.084. Current RTT: 32/16. 15.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.179 (Probe is a handshake retransmit) 15.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 15.372/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.180 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 15.211 <- (2) Packet A|0|S0|3a7a8dd4382bb4c3|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003c7d3931ee76d001362df54b4|8a0ae458b1cc98b0aac19963a05cf091] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.212 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 15.326/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -6 millis, based on 15.205/App, because ackElicitingInFlight | RTT:32/16 15.212 Discarding pn space Handshake because HandshakeDone is received 15.212 loss detection timeout handler running Sending probe 0, because no ack since 15.084. Current RTT: 32/16. 15.212 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 15.454/App, because ackElicitingInFlight | RTT:32/16 15.212 -> Packet PA|1|S0|0000000000002003660912e38a1f3a4c2f452a8a|59|1 StreamFrame[0(CIB),0,17,fin] 15.231 -> Packet A|2|S0|0000000000002003660912e38a1f3a4c2f452a8a|44|1 AckFrame[0|Δ19] 15.244 <- (3) Packet A|1|S0|3a7a8dd4382bb4c3|1065|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 15.245 Cwnd(-): 6000; inflight: 0 15.245 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.245 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 104 millis, based on 15.350/App, because ackElicitingInFlight | RTT:32/12 15.245 -> Packet A|3|S0|0000000000002003660912e38a1f3a4c2f452a8a|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 15.245 Finished downloading https://server4:443/fhqikjamho at 32:31.261 on ClientConnection[20fb6035f3384954/3a7a8dd4382bb4c3(V1) with server4/193.167.100.100:443] 15.245 Closing ClientConnection[20fb6035f3384954/3a7a8dd4382bb4c3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.245 -> Packet A|4|S0|0000000000002003660912e38a1f3a4c2f452a8a|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 15.246 Creating connection with server4:443 with v1 15.246 Setting up connection for downloading https://server4:443/djlxywhhse at 32:31.262 on ClientConnection[c073021d467abd0e/c9bdd9a60a63930d(V1) with server4/193.167.100.100:443] 15.246 Original destination connection id: c073021d467abd0e (scid: c9bdd9a60a63930d) >- CryptoStream[I|ClientHello] 15.248 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.448/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.248 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.276 <- (4) Packet A|2|S0|3a7a8dd4382bb4c3|34|2 AckFrame[4-2|Δ0] MaxStreamsFrame[B,129] 15.277 -> Packet A|5|S0|0000000000002003660912e38a1f3a4c2f452a8a|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 15.447 loss detection timeout handler running Sending probe 0, because no ack since 15.248. Current RTT: 100/25. 15.447 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.447 (Probe is an initial retransmit) 15.447 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.847/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.447 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.481 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 15.481 probe count not reset on ack because handshake not yet confirmed 15.482 Retransmitting CryptoFrame[0,257] on level Initial 15.482 Cwnd(-): 6000; inflight: 0 15.482 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.882/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.482 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 15.676/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.482 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 15.481 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 15.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.678/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.484 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 15.486 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.680/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.486 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.487 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.584/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.487 Discarding pn space Initial because first Handshake message is being sent 15.487 Starting downloading https://server4:443/djlxywhhse at 32:31.502 on ClientConnection[c073021d467abd0e/c9bdd9a60a63930d(V1) with server4/193.167.100.100:443] 15.487 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 15.487 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.584/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.487 -> Packet A|0|S0|00000000000020034b5a4a4a0ef91974ca24279f|59|1 StreamFrame[0(CIB),0,17,fin] 15.515 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.583 loss detection timeout handler running Sending probe 0, because no ack since 15.486. Current RTT: 33/16. 15.583 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.583 (Probe is a handshake retransmit) 15.584 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.778/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.584 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 15.716 <- (3) Packet A|2|S0|c9bdd9a60a63930d|1350|2 PingFrame[] Padding(1323) 15.736 -> Packet A|1|S0|00000000000020034b5a4a4a0ef91974ca24279f|44|1 AckFrame[2|Δ19] 15.767 <- (4) Packet A|3|S0|c9bdd9a60a63930d|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003f981bc674e46c54b1c954342|3bd0b22d6ef6d775ec3d014d22a079f9] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.768 State is set to Confirmed reschedule loss detection timer for PTO over -36 millis, based on 15.731/App, because ackElicitingInFlight | RTT:33/16 15.768 loss detection timeout handler running Sending probe 1, because no ack since 15.487. Current RTT: 33/16. reschedule loss detection timer for PTO over -158 millis, based on 15.609/App, because ackElicitingInFlight | RTT:33/16 15.768 Discarding pn space Handshake because HandshakeDone is received 15.768 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 16.012/App, because ackElicitingInFlight | RTT:33/16 15.768 -> Packet PA|2|S0|00000000000020034b5a4a4a0ef91974ca24279f|59|1 StreamFrame[0(CIB),0,17,fin] 15.787 -> Packet A|3|S0|00000000000020034b5a4a4a0ef91974ca24279f|44|1 AckFrame[3-2|Δ19] 15.800 <- (5) Packet A|4|S0|c9bdd9a60a63930d|1065|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 15.801 Cwnd(-): 3000; inflight: 0 15.801 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.801 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 15.907/App, because ackElicitingInFlight | RTT:33/12 15.801 -> Packet A|4|S0|00000000000020034b5a4a4a0ef91974ca24279f|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 15.801 Finished downloading https://server4:443/djlxywhhse at 32:31.817 on ClientConnection[c073021d467abd0e/c9bdd9a60a63930d(V1) with server4/193.167.100.100:443] 15.801 Closing ClientConnection[c073021d467abd0e/c9bdd9a60a63930d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.801 -> Packet A|5|S0|00000000000020034b5a4a4a0ef91974ca24279f|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 15.802 Creating connection with server4:443 with v1 15.802 Setting up connection for downloading https://server4:443/qrzmyiqorf at 32:31.818 on ClientConnection[7c6e7a8920b495ef/fe60222813fccf8c(V1) with server4/193.167.100.100:443] 15.802 Original destination connection id: 7c6e7a8920b495ef (scid: fe60222813fccf8c) >- CryptoStream[I|ClientHello] 15.804 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.004/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.804 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.832 <- (6) Packet A|5|S0|c9bdd9a60a63930d|34|2 AckFrame[5-3|Δ0] MaxStreamsFrame[B,129] 15.833 -> Packet A|6|S0|00000000000020034b5a4a4a0ef91974ca24279f|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 15.837 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.838 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.038/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.837 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 15.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.937/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.840 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 15.842 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.939/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.842 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.843 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.940/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.843 Starting downloading https://server4:443/qrzmyiqorf at 32:31.858 on ClientConnection[7c6e7a8920b495ef/fe60222813fccf8c(V1) with server4/193.167.100.100:443] 15.843 Discarding pn space Initial because first Handshake message is being sent 15.843 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.940/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.843 -> [Packet H|1|L|58|1 AckFrame[0|Δ0], Packet A|0|S0|0000000000002003c3fe255ba1a1c967b06465ed|59|1 StreamFrame[0(CIB),0,17,fin]] 15.939 loss detection timeout handler running Sending probe 0, because no ack since 15.842. Current RTT: 33/16. 15.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.939 (Probe is a handshake retransmit) 15.940 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 16.134/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.939 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 16.133 loss detection timeout handler running Sending probe 1, because no ack since 15.843. Current RTT: 33/16. 16.133 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.133 (Probe is a handshake retransmit) 16.133 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.521/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.133 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 16.134 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.522/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.134 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 16.381 <- (2) Packet A|3|S0|fe60222813fccf8c|29|2 PingFrame[] Padding(2) 16.382 <- (3) Packet A|5|S0|fe60222813fccf8c|1350|2 PingFrame[] Padding(1323) 16.383 -> Packet A|1|S0|0000000000002003c3fe255ba1a1c967b06465ed|46|1 AckFrame[5,3|Δ1] 16.414 <- (4) Packet A|6|S0|fe60222813fccf8c|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003d312323c91f9c37fea44ed36|0380c3a032c843da362a2cba59c32d66] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 16.415 State is set to Confirmed reschedule loss detection timer for PTO over -84 millis, based on 16.331/App, because ackElicitingInFlight | RTT:33/16 16.415 loss detection timeout handler running Sending probe 2, because no ack since 15.843. Current RTT: 33/16. reschedule loss detection timer for PTO over -450 millis, based on 15.965/App, because ackElicitingInFlight | RTT:33/16 16.415 (Probe is retransmit on level App) 16.415 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 121 millis, based on 16.537/App, because ackElicitingInFlight | RTT:33/16 16.415 -> Packet PA|2|S0|0000000000002003c3fe255ba1a1c967b06465ed|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 121 millis, based on 16.538/App, because ackElicitingInFlight | RTT:33/16 16.416 -> Packet PA|3|S0|0000000000002003c3fe255ba1a1c967b06465ed|59|1 StreamFrame[0(CIB),0,17,fin] 16.435 -> Packet A|4|S0|0000000000002003c3fe255ba1a1c967b06465ed|46|1 AckFrame[6-5,3|Δ19] 16.447 <- (5) Packet A|7|S0|fe60222813fccf8c|1065|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 16.448 Cwnd(-): 6000; inflight: 59 16.448 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 16.538/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 105 millis, based on 16.554/App, because ackElicitingInFlight | RTT:33/12 16.448 -> Packet A|5|S0|0000000000002003c3fe255ba1a1c967b06465ed|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ0] 16.448 Finished downloading https://server4:443/qrzmyiqorf at 32:32.464 on ClientConnection[7c6e7a8920b495ef/fe60222813fccf8c(V1) with server4/193.167.100.100:443] 16.448 Closing ClientConnection[7c6e7a8920b495ef/fe60222813fccf8c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.448 -> Packet A|6|S0|0000000000002003c3fe255ba1a1c967b06465ed|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 16.449 Creating connection with server4:443 with v1 16.449 Setting up connection for downloading https://server4:443/gwpjjcalcb at 32:32.465 on ClientConnection[d4fde0b6d8465b7f/aa2406a6c074bcda(V1) with server4/193.167.100.100:443] 16.449 Original destination connection id: d4fde0b6d8465b7f (scid: aa2406a6c074bcda) >- CryptoStream[I|ClientHello] 16.451 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.651/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.451 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.479 <- (6) Packet A|9|S0|fe60222813fccf8c|34|2 AckFrame[6-3|Δ0] MaxStreamsFrame[B,129] 16.480 -> Packet A|7|S0|0000000000002003c3fe255ba1a1c967b06465ed|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 16.650 loss detection timeout handler running Sending probe 0, because no ack since 16.451. Current RTT: 100/25. 16.650 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.650 (Probe is an initial retransmit) 16.651 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.051/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.651 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.683 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 16.684 probe count not reset on ack because handshake not yet confirmed 16.684 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.084/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.686 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.683 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,719] Padding(236) reschedule loss detection timer for PTO over 191 millis, based on 16.878/Handshake, because peerAwaitingAddressValidation | RTT:32/16 16.686 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 16.689 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 16.881/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.688 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.689 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 16.785/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.689 Starting downloading https://server4:443/gwpjjcalcb at 32:32.705 on ClientConnection[d4fde0b6d8465b7f/aa2406a6c074bcda(V1) with server4/193.167.100.100:443] 16.689 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 16.689 Discarding pn space Initial because first Handshake message is being sent 16.689 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 16.785/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.689 -> Packet A|0|S0|0000000000002003cc392e339761160a3a5b811d|59|1 StreamFrame[0(CIB),0,17,fin] 16.720 <- (2) Packet A|0|S0|aa2406a6c074bcda|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000200309a3b7a5b5b0d12baba0b467|91205ffd5561d8999e19eb1944330681] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 16.721 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 16.784/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 16.810/App, because ackElicitingInFlight | RTT:32/16 16.721 Discarding pn space Handshake because HandshakeDone is received 16.721 <- (3) Packet A|1|S0|aa2406a6c074bcda|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 16.722 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.722 -> Packet A|1|S0|0000000000002003cc392e339761160a3a5b811d|44|1 AckFrame[1-0|Δ1] 16.722 Finished downloading https://server4:443/gwpjjcalcb at 32:32.738 on ClientConnection[d4fde0b6d8465b7f/aa2406a6c074bcda(V1) with server4/193.167.100.100:443] 16.722 Closing ClientConnection[d4fde0b6d8465b7f/aa2406a6c074bcda(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.722 -> Packet A|2|S0|0000000000002003cc392e339761160a3a5b811d|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 16.723 Creating connection with server4:443 with v1 16.723 Setting up connection for downloading https://server4:443/umlaxtmuoz at 32:32.739 on ClientConnection[9ba91e06a22649c1/ea95673a342a9778(V1) with server4/193.167.100.100:443] 16.723 Original destination connection id: 9ba91e06a22649c1 (scid: ea95673a342a9778) >- CryptoStream[I|ClientHello] 16.724 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.924/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.724 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.753 <- (4) Packet A|2|S0|aa2406a6c074bcda|29|1 MaxStreamsFrame[B,129] 16.753 -> Packet A|3|S0|0000000000002003cc392e339761160a3a5b811d|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 16.757 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.758 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.958/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.757 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 16.760 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.857/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.760 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 16.762 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.859/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.762 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.762 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.762 Starting downloading https://server4:443/umlaxtmuoz at 32:32.778 on ClientConnection[9ba91e06a22649c1/ea95673a342a9778(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 16.859/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.762 Discarding pn space Initial because first Handshake message is being sent 16.763 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.860/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.763 -> [Packet H|1|L|58|1 AckFrame[0|Δ0], Packet A|0|S0|00000000000020039f67622b35e1adef18b6f0b9|59|1 StreamFrame[0(CIB),0,17,fin]] 16.859 loss detection timeout handler running Sending probe 0, because no ack since 16.762. Current RTT: 33/16. 16.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.859 (Probe is a handshake retransmit) 16.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.053/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.859 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 17.052 loss detection timeout handler running Sending probe 1, because no ack since 16.763. Current RTT: 33/16. 17.052 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.052 (Probe is a handshake retransmit) 17.053 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 17.441/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.052 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 17.054 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 17.442/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.053 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 17.084 <- (2) Packet A|0|S0|ea95673a342a9778|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003d78690fb6fdfc5f5120df8df|a3ad801c8afd9213fa19bcec1e602a33] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.085 State is set to Confirmed reschedule loss detection timer for PTO over 165 millis, based on 17.251/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -200 millis, based on 16.885/App, because ackElicitingInFlight | RTT:33/16 17.085 Discarding pn space Handshake because HandshakeDone is received 17.085 loss detection timeout handler running Sending probe 0, because no ack since 16.763. Current RTT: 33/16. 17.085 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 17.329/App, because ackElicitingInFlight | RTT:33/16 17.085 -> Packet PA|1|S0|00000000000020039f67622b35e1adef18b6f0b9|59|1 StreamFrame[0(CIB),0,17,fin] 17.104 -> Packet A|2|S0|00000000000020039f67622b35e1adef18b6f0b9|44|1 AckFrame[0|Δ19] 17.307 <- (3) Packet A|4|S0|ea95673a342a9778|29|2 PingFrame[] Padding(2) 17.307 <- (4) Packet A|5|S0|ea95673a342a9778|29|2 PingFrame[] Padding(2) 17.307 -> Packet A|3|S0|00000000000020039f67622b35e1adef18b6f0b9|45|1 AckFrame[5-4,0|Δ0] 17.308 <- (5) Packet A|6|S0|ea95673a342a9778|1350|2 PingFrame[] Padding(1323) 17.327 -> Packet A|4|S0|00000000000020039f67622b35e1adef18b6f0b9|46|1 AckFrame[6-4,0|Δ19] 17.328 loss detection timeout handler running Sending probe 1, because no ack since 17.085. Current RTT: 33/16. 17.328 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 17.816/App, because ackElicitingInFlight | RTT:33/16 17.328 -> Packet PA|5|S0|00000000000020039f67622b35e1adef18b6f0b9|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 17.817/App, because ackElicitingInFlight | RTT:33/16 17.329 -> Packet PA|6|S0|00000000000020039f67622b35e1adef18b6f0b9|59|1 StreamFrame[0(CIB),0,17,fin] 17.339 <- (6) Packet A|7|S0|ea95673a342a9778|1065|3 AckFrame[3-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 17.340 Cwnd(-): 6000; inflight: 118 17.340 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 111 millis, based on 17.451/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 121 millis, based on 17.462/App, because ackElicitingInFlight | RTT:33/16 17.340 -> Packet A|7|S0|00000000000020039f67622b35e1adef18b6f0b9|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ0] 17.340 Finished downloading https://server4:443/umlaxtmuoz at 32:33.356 on ClientConnection[9ba91e06a22649c1/ea95673a342a9778(V1) with server4/193.167.100.100:443] 17.340 Closing ClientConnection[9ba91e06a22649c1/ea95673a342a9778(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.340 -> Packet A|8|S0|00000000000020039f67622b35e1adef18b6f0b9|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 17.341 Creating connection with server4:443 with v1 17.341 Setting up connection for downloading https://server4:443/mukexiakpj at 32:33.357 on ClientConnection[134c6df9747396c9/604b56152d1e13aa(V1) with server4/193.167.100.100:443] 17.341 Original destination connection id: 134c6df9747396c9 (scid: 604b56152d1e13aa) >- CryptoStream[I|ClientHello] 17.342 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.542/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.342 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.371 <- (7) Packet A|9|S0|ea95673a342a9778|34|2 AckFrame[8-4|Δ0] MaxStreamsFrame[B,129] 17.372 -> Packet A|9|S0|00000000000020039f67622b35e1adef18b6f0b9|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 17.375 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 17.376 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.576/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.375 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) reschedule loss detection timer for PTO over 96 millis, based on 17.475/Handshake, because peerAwaitingAddressValidation | RTT:33/16 17.378 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 17.380 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.477/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.380 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.380 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.477/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.380 Discarding pn space Initial because first Handshake message is being sent 17.380 Starting downloading https://server4:443/mukexiakpj at 32:33.396 on ClientConnection[134c6df9747396c9/604b56152d1e13aa(V1) with server4/193.167.100.100:443] 17.380 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 17.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.478/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.381 -> Packet A|0|S0|0000000000002003e1a268549875bd9c369fd863|59|1 StreamFrame[0(CIB),0,17,fin] 17.413 <- (2) Packet A|1|S0|604b56152d1e13aa|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 17.413 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.510/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.413 Finished downloading https://server4:443/mukexiakpj at 32:33.429 on ClientConnection[134c6df9747396c9/604b56152d1e13aa(V1) with server4/193.167.100.100:443] 17.413 Closing ClientConnection[134c6df9747396c9/604b56152d1e13aa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.414 -> Packet A|1|S0|0000000000002003e1a268549875bd9c369fd863|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 17.414 Creating connection with server4:443 with v1 17.414 Setting up connection for downloading https://server4:443/hrpbwpouzz at 32:33.430 on ClientConnection[53ee663f8db898d7/72c9278139f0b06e(V1) with server4/193.167.100.100:443] 17.414 Original destination connection id: 53ee663f8db898d7 (scid: 72c9278139f0b06e) >- CryptoStream[I|ClientHello] 17.415 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.615/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.415 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.445 <- (3) Packet A|2|S0|604b56152d1e13aa|29|1 MaxStreamsFrame[B,129] 17.445 -> Packet A|2|S0|0000000000002003e1a268549875bd9c369fd863|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 17.614 loss detection timeout handler running Sending probe 0, because no ack since 17.415. Current RTT: 100/25. 17.614 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.614 (Probe is an initial retransmit) 17.615 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.015/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.615 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.014 loss detection timeout handler running Sending probe 1, because no ack since 17.615. Current RTT: 100/25. 18.014 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.014 (Probe is an initial retransmit) 18.014 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.814/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.014 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.015 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.815/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.015 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.048 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 18.048 probe count not reset on ack because handshake not yet confirmed 18.049 Retransmitting CryptoFrame[0,257] on level Initial 18.049 Cwnd(-): 6000; inflight: 1200 18.049 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.849/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.049 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 18.437/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.049 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 18.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.048 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) reschedule loss detection timer for PTO over 387 millis, based on 18.439/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.051 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 18.053 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.441/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.053 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.054 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.151/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.054 Discarding pn space Initial because first Handshake message is being sent 18.054 Starting downloading https://server4:443/hrpbwpouzz at 32:34.069 on ClientConnection[53ee663f8db898d7/72c9278139f0b06e(V1) with server4/193.167.100.100:443] 18.054 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 18.054 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 18.054 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.151/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.054 -> Packet A|0|S0|0000000000002003d6857d961d748e064e5c5aea|59|1 StreamFrame[0(CIB),0,17,fin] 18.082 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 18.086 <- (4) Packet A|1|S0|72c9278139f0b06e|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 18.087 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.184/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.087 Finished downloading https://server4:443/hrpbwpouzz at 32:34.103 on ClientConnection[53ee663f8db898d7/72c9278139f0b06e(V1) with server4/193.167.100.100:443] 18.087 Closing ClientConnection[53ee663f8db898d7/72c9278139f0b06e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.088 Creating connection with server4:443 with v1 18.088 -> Packet A|1|S0|0000000000002003d6857d961d748e064e5c5aea|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 18.088 Setting up connection for downloading https://server4:443/tuqgnlodpb at 32:34.104 on ClientConnection[f7e3b823bab97f29/8b858e086cc5af1d(V1) with server4/193.167.100.100:443] 18.088 Original destination connection id: f7e3b823bab97f29 (scid: 8b858e086cc5af1d) >- CryptoStream[I|ClientHello] 18.089 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.289/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.089 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.288 loss detection timeout handler running Sending probe 0, because no ack since 18.089. Current RTT: 100/25. 18.289 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.289 (Probe is an initial retransmit) 18.289 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.689/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.289 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.322 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 18.323 probe count not reset on ack because handshake not yet confirmed 18.323 Retransmitting CryptoFrame[0,257] on level Initial 18.323 Cwnd(-): 6000; inflight: 0 18.323 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.723/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.323 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 18.517/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.323 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 18.322 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 18.325 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.519/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.325 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 18.327 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.521/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.327 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.328 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.425/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.328 Starting downloading https://server4:443/tuqgnlodpb at 32:34.343 on ClientConnection[f7e3b823bab97f29/8b858e086cc5af1d(V1) with server4/193.167.100.100:443] 18.328 Discarding pn space Initial because first Handshake message is being sent 18.328 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 18.328 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.425/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.328 -> Packet A|0|S0|000000000000200339f384423c7613e2573396e0|59|1 StreamFrame[0(CIB),0,17,fin] 18.356 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 18.424 loss detection timeout handler running Sending probe 0, because no ack since 18.327. Current RTT: 33/16. 18.424 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.424 (Probe is a handshake retransmit) 18.424 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.618/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.424 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 18.456 <- (3) Packet A|0|S0|8b858e086cc5af1d|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000200301a784cc8233ea2210b90d41|b3f76ba8eb410fefe23ad79428c3ef19] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 18.457 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 18.572/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 18.450/App, because ackElicitingInFlight | RTT:33/16 18.457 loss detection timeout handler running 18.457 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 18.328. Current RTT: 33/16. 18.457 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 18.701/App, because ackElicitingInFlight | RTT:33/16 18.457 -> Packet PA|1|S0|000000000000200339f384423c7613e2573396e0|59|1 StreamFrame[0(CIB),0,17,fin] 18.476 -> Packet A|2|S0|000000000000200339f384423c7613e2573396e0|44|1 AckFrame[0|Δ19] 18.556 <- (4) Packet A|3|S0|8b858e086cc5af1d|1350|2 PingFrame[] Padding(1323) 18.576 -> Packet A|3|S0|000000000000200339f384423c7613e2573396e0|46|1 AckFrame[3,0|Δ19] 18.700 loss detection timeout handler running Sending probe 1, because no ack since 18.457. Current RTT: 33/16. 18.700 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 19.188/App, because ackElicitingInFlight | RTT:33/16 18.700 -> Packet PA|4|S0|000000000000200339f384423c7613e2573396e0|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 19.189/App, because ackElicitingInFlight | RTT:33/16 18.701 -> Packet PA|5|S0|000000000000200339f384423c7613e2573396e0|59|1 StreamFrame[0(CIB),0,17,fin] 18.737 <- (5) Packet A|6|S0|8b858e086cc5af1d|1425|2 PingFrame[] Padding(1398) 18.757 -> Packet A|6|S0|000000000000200339f384423c7613e2573396e0|48|1 AckFrame[6,3,0|Δ19] 19.032 <- (6) Packet A|9|S0|8b858e086cc5af1d|29|2 PingFrame[] Padding(2) 19.032 <- (7) Packet A|10|S0|8b858e086cc5af1d|29|2 PingFrame[] Padding(2) 19.032 -> Packet A|7|S0|000000000000200339f384423c7613e2573396e0|49|1 AckFrame[10-9,6,3,0|Δ0] 19.189 loss detection timeout handler running Sending probe 2, because no ack since 18.701. Current RTT: 33/16. 19.189 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 975 millis, based on 20.165/App, because ackElicitingInFlight | RTT:33/16 19.189 -> Packet PA|8|S0|000000000000200339f384423c7613e2573396e0|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 975 millis, based on 20.166/App, because ackElicitingInFlight | RTT:33/16 19.190 -> Packet PA|9|S0|000000000000200339f384423c7613e2573396e0|59|1 StreamFrame[0(CIB),0,17,fin] 19.206 <- (8) Packet A|13|S0|8b858e086cc5af1d|29|2 PingFrame[] Padding(2) 19.206 <- (9) Packet A|14|S0|8b858e086cc5af1d|29|2 PingFrame[] Padding(2) 19.207 -> Packet A|10|S0|000000000000200339f384423c7613e2573396e0|51|1 AckFrame[14-13,10-9,6,3,0|Δ0] 19.307 <- (10) Packet A|17|S0|8b858e086cc5af1d|1462|2 PingFrame[] Padding(1435) 19.326 -> Packet A|11|S0|000000000000200339f384423c7613e2573396e0|54|1 AckFrame[17,14-13,10-9,6,3,0|Δ19] 19.459 <- (11) Packet A|20|S0|8b858e086cc5af1d|1471|2 PingFrame[] Padding(1444) 19.478 -> Packet A|12|S0|000000000000200339f384423c7613e2573396e0|56|1 AckFrame[20,17,14-13,10-9,6,3,0|Δ19] 19.510 <- (12) Packet A|21|S0|8b858e086cc5af1d|1065|3 AckFrame[12-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 19.511 Cwnd(-): 3000; inflight: 0 19.511 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.511 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 19.633/App, because ackElicitingInFlight | RTT:33/16 19.511 -> Packet A|13|S0|000000000000200339f384423c7613e2573396e0|59|1 StreamFrame[0(CIB),0,17,fin] 19.511 Finished downloading https://server4:443/tuqgnlodpb at 32:35.527 on ClientConnection[f7e3b823bab97f29/8b858e086cc5af1d(V1) with server4/193.167.100.100:443] 19.511 Closing ClientConnection[f7e3b823bab97f29/8b858e086cc5af1d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.512 Creating connection with server4:443 with v1 19.512 -> Packet A|14|S0|000000000000200339f384423c7613e2573396e0|47|2 ConnectionCloseFrame[0|0|] AckFrame[21|Δ0] 19.512 Setting up connection for downloading https://server4:443/yusgstymgc at 32:35.528 on ClientConnection[e49e737e30a6933b/c1ee236bb0183f2a(V1) with server4/193.167.100.100:443] 19.512 Original destination connection id: e49e737e30a6933b (scid: c1ee236bb0183f2a) >- CryptoStream[I|ClientHello] 19.514 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.714/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.514 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.542 <- (13) Packet A|22|S0|8b858e086cc5af1d|34|2 AckFrame[14-13|Δ0] MaxStreamsFrame[B,129] 19.543 -> Packet A|15|S0|000000000000200339f384423c7613e2573396e0|47|2 ConnectionCloseFrame[0|0|] AckFrame[21|Δ0] 19.547 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.547 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.747/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.547 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,717] Padding(238) 19.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.647/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.549 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 19.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.649/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.551 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.552 Starting downloading https://server4:443/yusgstymgc at 32:35.568 on ClientConnection[e49e737e30a6933b/c1ee236bb0183f2a(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 19.649/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.552 Discarding pn space Initial because first Handshake message is being sent 19.552 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 19.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.649/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.552 -> Packet A|0|S0|00000000000020039ce1be75ff54203e42cab825|59|1 StreamFrame[0(CIB),0,17,fin] 19.648 loss detection timeout handler running Sending probe 0, because no ack since 19.551. Current RTT: 33/16. 19.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.649 (Probe is a handshake retransmit) 19.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.843/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.649 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 19.681 <- (2) Packet A|0|S0|c1ee236bb0183f2a|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003bc9128d391b8714baf1da27b|f905c0cbde5d4322646560458e61e9ba] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.681 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 19.796/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 19.674/App, because ackElicitingInFlight | RTT:33/16 19.681 loss detection timeout handler running 19.681 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 19.552. Current RTT: 33/16. 19.681 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 19.925/App, because ackElicitingInFlight | RTT:33/16 19.681 -> Packet PA|1|S0|00000000000020039ce1be75ff54203e42cab825|59|1 StreamFrame[0(CIB),0,17,fin] 19.701 -> Packet A|2|S0|00000000000020039ce1be75ff54203e42cab825|44|1 AckFrame[0|Δ19] 19.781 <- (3) Packet A|3|S0|c1ee236bb0183f2a|1350|2 PingFrame[] Padding(1323) 19.801 -> Packet A|3|S0|00000000000020039ce1be75ff54203e42cab825|46|1 AckFrame[3,0|Δ19] 19.832 <- (4) Packet A|4|S0|c1ee236bb0183f2a|1065|3 AckFrame[3-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 19.833 Cwnd(-): 6000; inflight: 0 19.833 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.833 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 19.955/App, because ackElicitingInFlight | RTT:33/16 19.833 -> Packet A|4|S0|00000000000020039ce1be75ff54203e42cab825|59|1 StreamFrame[0(CIB),0,17,fin] 19.833 Finished downloading https://server4:443/yusgstymgc at 32:35.849 on ClientConnection[e49e737e30a6933b/c1ee236bb0183f2a(V1) with server4/193.167.100.100:443] 19.833 Closing ClientConnection[e49e737e30a6933b/c1ee236bb0183f2a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.834 Creating connection with server4:443 with v1 19.834 -> Packet A|5|S0|00000000000020039ce1be75ff54203e42cab825|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 19.835 Setting up connection for downloading https://server4:443/bbtrxslbrs at 32:35.850 on ClientConnection[e24449e2e07a2cce/36e4b5d7fa216774(V1) with server4/193.167.100.100:443] 19.835 Original destination connection id: e24449e2e07a2cce (scid: 36e4b5d7fa216774) >- CryptoStream[I|ClientHello] 19.836 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.036/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.836 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.870 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.871 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.071/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.873 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.975/Handshake, because peerAwaitingAddressValidation | RTT:34/17 19.870 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 19.873 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 19.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.977/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.875 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.977/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.875 Discarding pn space Initial because first Handshake message is being sent 19.875 Starting downloading https://server4:443/bbtrxslbrs at 32:35.891 on ClientConnection[e24449e2e07a2cce/36e4b5d7fa216774(V1) with server4/193.167.100.100:443] 19.875 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 19.876 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.978/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.875 -> Packet A|0|S0|0000000000002003d2a28452ba6fecabb3221a82|59|1 StreamFrame[0(CIB),0,17,fin] 19.977 loss detection timeout handler running Sending probe 0, because no ack since 19.875. Current RTT: 34/17. 19.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.977 <- (2) Packet H|1|L|56|2 PingFrame[] Padding(2) 19.977 (Probe is a handshake retransmit) 19.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 20.181/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.977 -> Packet PH|2|L|97|2 AckFrame[1-0|Δ0] CryptoFrame[0,36] 20.009 <- (3) Packet A|0|S0|36e4b5d7fa216774|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000200315c20588b27a292d37bcabb5|7e05bb451eaff61884692d7df724d56f] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.009 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 20.129/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 20.002/App, because ackElicitingInFlight | RTT:34/17 20.009 Discarding pn space Handshake because HandshakeDone is received 20.009 loss detection timeout handler running Sending probe 0, because no ack since 19.875. Current RTT: 34/17. 20.009 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 20.263/App, because ackElicitingInFlight | RTT:34/17 20.009 -> Packet PA|1|S0|0000000000002003d2a28452ba6fecabb3221a82|59|1 StreamFrame[0(CIB),0,17,fin] 20.029 -> Packet A|2|S0|0000000000002003d2a28452ba6fecabb3221a82|44|1 AckFrame[0|Δ19] 20.217 <- (4) Packet A|5|S0|36e4b5d7fa216774|29|2 PingFrame[] Padding(2) 20.218 <- (5) Packet A|6|S0|36e4b5d7fa216774|1350|2 PingFrame[] Padding(1323) 20.218 -> Packet A|3|S0|0000000000002003d2a28452ba6fecabb3221a82|46|1 AckFrame[6-5,0|Δ1] 20.263 loss detection timeout handler running Sending probe 1, because no ack since 20.009. Current RTT: 34/17. 20.263 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 20.771/App, because ackElicitingInFlight | RTT:34/17 20.263 -> Packet PA|4|S0|0000000000002003d2a28452ba6fecabb3221a82|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 20.772/App, because ackElicitingInFlight | RTT:34/17 20.264 -> Packet PA|5|S0|0000000000002003d2a28452ba6fecabb3221a82|59|1 StreamFrame[0(CIB),0,17,fin] 20.351 <- (6) Packet A|9|S0|36e4b5d7fa216774|29|2 PingFrame[] Padding(2) 20.351 <- (7) Packet A|10|S0|36e4b5d7fa216774|29|2 PingFrame[] Padding(2) 20.351 -> Packet A|6|S0|0000000000002003d2a28452ba6fecabb3221a82|47|1 AckFrame[10-9,6-5,0|Δ0] 20.383 <- (8) Packet A|11|S0|36e4b5d7fa216774|1065|3 AckFrame[6-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 20.383 Cwnd(-): 6000; inflight: 0 20.384 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.384 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 126 millis, based on 20.511/App, because ackElicitingInFlight | RTT:34/17 20.384 -> Packet A|7|S0|0000000000002003d2a28452ba6fecabb3221a82|59|1 StreamFrame[0(CIB),0,17,fin] 20.384 Finished downloading https://server4:443/bbtrxslbrs at 32:36.400 on ClientConnection[e24449e2e07a2cce/36e4b5d7fa216774(V1) with server4/193.167.100.100:443] 20.384 Closing ClientConnection[e24449e2e07a2cce/36e4b5d7fa216774(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.384 -> Packet A|8|S0|0000000000002003d2a28452ba6fecabb3221a82|47|2 ConnectionCloseFrame[0|0|] AckFrame[11|Δ0] 20.384 Creating connection with server4:443 with v1 20.385 Setting up connection for downloading https://server4:443/rohxoqwprk at 32:36.401 on ClientConnection[2dabb7b15af6c202/3c8129fa46612778(V1) with server4/193.167.100.100:443] 20.385 Original destination connection id: 2dabb7b15af6c202 (scid: 3c8129fa46612778) >- CryptoStream[I|ClientHello] 20.386 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.586/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.386 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.415 <- (9) Packet A|12|S0|36e4b5d7fa216774|34|2 AckFrame[8-7|Δ0] MaxStreamsFrame[B,129] 20.416 -> Packet A|9|S0|0000000000002003d2a28452ba6fecabb3221a82|47|2 ConnectionCloseFrame[0|0|] AckFrame[11|Δ0] 20.585 loss detection timeout handler running Sending probe 0, because no ack since 20.386. Current RTT: 100/25. 20.585 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.585 (Probe is an initial retransmit) 20.586 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.986/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.586 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.618 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 20.619 probe count not reset on ack because handshake not yet confirmed 20.619 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.019/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.621 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.618 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,718] Padding(237) reschedule loss detection timer for PTO over 191 millis, based on 20.813/Handshake, because peerAwaitingAddressValidation | RTT:32/16 20.621 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 20.624 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 20.816/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 20.624 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.624 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 20.624 Starting downloading https://server4:443/rohxoqwprk at 32:36.640 on ClientConnection[2dabb7b15af6c202/3c8129fa46612778(V1) with server4/193.167.100.100:443] 20.624 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 20.720/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 20.624 Discarding pn space Initial because first Handshake message is being sent 20.625 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 20.721/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 20.625 -> Packet A|0|S0|000000000000200375e83198ae15147556d56338|59|1 StreamFrame[0(CIB),0,17,fin] 20.657 <- (2) Packet A|1|S0|3c8129fa46612778|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 20.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 20.753/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 20.658 Finished downloading https://server4:443/rohxoqwprk at 32:36.673 on ClientConnection[2dabb7b15af6c202/3c8129fa46612778(V1) with server4/193.167.100.100:443] 20.658 Closing ClientConnection[2dabb7b15af6c202/3c8129fa46612778(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.658 -> Packet A|1|S0|000000000000200375e83198ae15147556d56338|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 20.658 Creating connection with server4:443 with v1 20.659 Setting up connection for downloading https://server4:443/qputrzhsay at 32:36.674 on ClientConnection[417023a116ad7c90/5c7d5b6507a448ed(V1) with server4/193.167.100.100:443] 20.659 Original destination connection id: 417023a116ad7c90 (scid: 5c7d5b6507a448ed) >- CryptoStream[I|ClientHello] 20.660 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.860/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.660 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.689 <- (3) Packet A|2|S0|3c8129fa46612778|29|1 MaxStreamsFrame[B,129] 20.689 -> Packet A|2|S0|000000000000200375e83198ae15147556d56338|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 20.859 loss detection timeout handler running Sending probe 0, because no ack since 20.660. Current RTT: 100/25. 20.859 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.859 (Probe is an initial retransmit) 20.859 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.259/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.859 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.893 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 20.893 probe count not reset on ack because handshake not yet confirmed 20.893 Retransmitting CryptoFrame[0,257] on level Initial 20.894 Cwnd(-): 6000; inflight: 0 20.894 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.294/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.894 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 21.088/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.894 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 20.896 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.893 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,717] Padding(238) reschedule loss detection timer for PTO over 193 millis, based on 21.090/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.896 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 20.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.092/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.898 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.898 Discarding pn space Initial because first Handshake message is being sent 20.898 Starting downloading https://server4:443/qputrzhsay at 32:36.914 on ClientConnection[417023a116ad7c90/5c7d5b6507a448ed(V1) with server4/193.167.100.100:443] 20.898 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 20.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.898 -> Packet A|0|S0|00000000000020034a14e47e7839f180dca339aa|59|1 StreamFrame[0(CIB),0,17,fin] 20.927 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.929 <- (3) Packet A|0|S0|5c7d5b6507a448ed|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003f49afe9e1ffd86a981f7c8aa|771f11c86963c6fb7b4597f6f0dcd6e2] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.930 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 20.995/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 21.020/App, because ackElicitingInFlight | RTT:33/16 20.930 Discarding pn space Handshake because HandshakeDone is received 20.949 -> Packet A|1|S0|00000000000020034a14e47e7839f180dca339aa|44|1 AckFrame[0|Δ19] 21.020 loss detection timeout handler running Sending probe 0, because no ack since 20.898. Current RTT: 33/16. 21.020 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 21.264/App, because ackElicitingInFlight | RTT:33/16 21.020 -> Packet PA|2|S0|00000000000020034a14e47e7839f180dca339aa|59|1 StreamFrame[0(CIB),0,17,fin] 21.029 <- (4) Packet A|3|S0|5c7d5b6507a448ed|1350|2 PingFrame[] Padding(1323) 21.049 -> Packet A|3|S0|00000000000020034a14e47e7839f180dca339aa|46|1 AckFrame[3,0|Δ19] 21.076 <- (5) Packet A|4|S0|5c7d5b6507a448ed|32|1 AckFrame[2-0|Δ26] 21.076 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.080 <- (6) Packet A|5|S0|5c7d5b6507a448ed|1065|3 AckFrame[3-0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 21.081 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.081 Finished downloading https://server4:443/qputrzhsay at 32:37.097 on ClientConnection[417023a116ad7c90/5c7d5b6507a448ed(V1) with server4/193.167.100.100:443] 21.081 Closing ClientConnection[417023a116ad7c90/5c7d5b6507a448ed(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.082 Creating connection with server4:443 with v1 21.082 -> Packet A|4|S0|00000000000020034a14e47e7839f180dca339aa|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 21.082 Setting up connection for downloading https://server4:443/aedbequvgv at 32:37.098 on ClientConnection[e73531d9f1852255/366717451b82896e(V1) with server4/193.167.100.100:443] 21.082 Original destination connection id: e73531d9f1852255 (scid: 366717451b82896e) >- CryptoStream[I|ClientHello] 21.083 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.283/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.083 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.112 <- (7) Packet A|6|S0|5c7d5b6507a448ed|29|1 MaxStreamsFrame[B,129] 21.113 -> Packet A|5|S0|00000000000020034a14e47e7839f180dca339aa|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 21.117 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.117 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.317/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.117 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 21.119 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.216/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.119 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 21.121 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.218/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.121 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.122 Starting downloading https://server4:443/aedbequvgv at 32:37.137 on ClientConnection[e73531d9f1852255/366717451b82896e(V1) with server4/193.167.100.100:443] 21.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.122 Discarding pn space Initial because first Handshake message is being sent 21.122 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 21.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.122 -> Packet A|0|S0|0000000000002003f275498ec516198a34a072d4|59|1 StreamFrame[0(CIB),0,17,fin] 21.218 loss detection timeout handler running Sending probe 0, because no ack since 21.121. Current RTT: 33/16. 21.218 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.218 (Probe is a handshake retransmit) 21.218 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.412/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.218 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 21.224 <- (2) Packet H|1|L|56|2 PingFrame[] Padding(2) 21.224 <- (3) Packet H|2|L|56|2 PingFrame[] Padding(2) 21.224 -> Packet H|3|L|58|1 AckFrame[1-0|Δ0] 21.224 -> Packet H|4|L|58|1 AckFrame[2-0|Δ0] 21.250 <- (4) Packet A|0|S0|366717451b82896e|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003b8e3b2f82b8c634d18f8adeb|3ba7f7e1ef41f820f83dd954e4433177] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 21.251 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 21.366/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 21.244/App, because ackElicitingInFlight | RTT:33/16 21.251 loss detection timeout handler running 21.251 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 21.122. Current RTT: 33/16. 21.251 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 21.495/App, because ackElicitingInFlight | RTT:33/16 21.251 -> Packet PA|1|S0|0000000000002003f275498ec516198a34a072d4|59|1 StreamFrame[0(CIB),0,17,fin] 21.270 -> Packet A|2|S0|0000000000002003f275498ec516198a34a072d4|44|1 AckFrame[0|Δ19] 21.283 <- (5) Packet A|1|S0|366717451b82896e|1065|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 21.283 Cwnd(-): 6000; inflight: 0 21.283 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 21.283 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 21.389/App, because ackElicitingInFlight | RTT:33/12 21.283 -> Packet A|3|S0|0000000000002003f275498ec516198a34a072d4|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 21.284 Finished downloading https://server4:443/aedbequvgv at 32:37.299 on ClientConnection[e73531d9f1852255/366717451b82896e(V1) with server4/193.167.100.100:443] 21.284 Closing ClientConnection[e73531d9f1852255/366717451b82896e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.284 -> Packet A|4|S0|0000000000002003f275498ec516198a34a072d4|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 21.284 Creating connection with server4:443 with v1 21.285 Setting up connection for downloading https://server4:443/tljpqgictf at 32:37.300 on ClientConnection[8faf8c2942ec9b3a/643ab1b9091f0e7f(V1) with server4/193.167.100.100:443] 21.285 Original destination connection id: 8faf8c2942ec9b3a (scid: 643ab1b9091f0e7f) >- CryptoStream[I|ClientHello] 21.286 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.486/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.286 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.315 <- (6) Packet A|2|S0|366717451b82896e|34|2 AckFrame[4-2|Δ0] MaxStreamsFrame[B,129] 21.315 -> Packet A|5|S0|0000000000002003f275498ec516198a34a072d4|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 21.485 loss detection timeout handler running Sending probe 0, because no ack since 21.286. Current RTT: 100/25. 21.485 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.485 (Probe is an initial retransmit) 21.485 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.885/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.485 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.518 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 21.519 probe count not reset on ack because handshake not yet confirmed 21.519 Retransmitting CryptoFrame[0,257] on level Initial 21.519 Cwnd(-): 6000; inflight: 0 21.519 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.919/Initial, because peerAwaitingAddressValidation | RTT:100/25 21.519 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 21.713/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.519 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 21.518 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 21.521 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.715/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.521 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 21.523 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.717/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.523 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.523 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.523 Starting downloading https://server4:443/tljpqgictf at 32:37.539 on ClientConnection[8faf8c2942ec9b3a/643ab1b9091f0e7f(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 21.620/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.523 Discarding pn space Initial because first Handshake message is being sent 21.523 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 21.524 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.621/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.524 -> Packet A|0|S0|000000000000200383f733c3532973880453aa0f|59|1 StreamFrame[0(CIB),0,17,fin] 21.556 <- (2) Packet A|1|S0|643ab1b9091f0e7f|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 21.556 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.653/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.556 Finished downloading https://server4:443/tljpqgictf at 32:37.572 on ClientConnection[8faf8c2942ec9b3a/643ab1b9091f0e7f(V1) with server4/193.167.100.100:443] 21.556 Closing ClientConnection[8faf8c2942ec9b3a/643ab1b9091f0e7f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.556 -> Packet A|1|S0|000000000000200383f733c3532973880453aa0f|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 21.557 Creating connection with server4:443 with v1 21.557 Setting up connection for downloading https://server4:443/twwpbjxsnh at 32:37.573 on ClientConnection[edb652d57debe7a5/35c06eda97e6231f(V1) with server4/193.167.100.100:443] 21.557 Original destination connection id: edb652d57debe7a5 (scid: 35c06eda97e6231f) >- CryptoStream[I|ClientHello] 21.558 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.758/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.558 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.592 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.592 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.792/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.592 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 21.594 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.691/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.594 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.596 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.596 Starting downloading https://server4:443/twwpbjxsnh at 32:37.612 on ClientConnection[edb652d57debe7a5/35c06eda97e6231f(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 21.693/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.596 Discarding pn space Initial because first Handshake message is being sent 21.596 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.693/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.596 -> Packet H|0|L|92|1 CryptoFrame[0,36] 21.596 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.693/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.596 -> [Packet H|1|L|58|1 AckFrame[0|Δ0], Packet A|0|S0|000000000000200383298f6a18d8ba24f40fdcfa|59|1 StreamFrame[0(CIB),0,17,fin]] 21.692 loss detection timeout handler running Sending probe 0, because no ack since 21.596. Current RTT: 33/16. 21.693 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.693 (Probe is a handshake retransmit) 21.693 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.887/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.693 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 21.724 <- (2) Packet A|0|S0|35c06eda97e6231f|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000020034fcb85bb7322853bf7702c63|efb8403bb7fd237ddb6dfc7ae1b6b967] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 21.725 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 21.840/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 21.718/App, because ackElicitingInFlight | RTT:33/16 21.725 Discarding pn space Handshake because HandshakeDone is received 21.725 loss detection timeout handler running Sending probe 0, because no ack since 21.596. Current RTT: 33/16. 21.725 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 21.969/App, because ackElicitingInFlight | RTT:33/16 21.725 -> Packet PA|1|S0|000000000000200383298f6a18d8ba24f40fdcfa|59|1 StreamFrame[0(CIB),0,17,fin] 21.744 -> Packet A|2|S0|000000000000200383298f6a18d8ba24f40fdcfa|44|1 AckFrame[0|Δ19] 21.757 <- (3) Packet A|1|S0|35c06eda97e6231f|1065|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 21.758 Cwnd(-): 6000; inflight: 0 21.758 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.758 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 105 millis, based on 21.864/App, because ackElicitingInFlight | RTT:33/12 21.758 -> Packet A|3|S0|000000000000200383298f6a18d8ba24f40fdcfa|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 21.758 Finished downloading https://server4:443/twwpbjxsnh at 32:37.774 on ClientConnection[edb652d57debe7a5/35c06eda97e6231f(V1) with server4/193.167.100.100:443] 21.758 Closing ClientConnection[edb652d57debe7a5/35c06eda97e6231f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.758 -> Packet A|4|S0|000000000000200383298f6a18d8ba24f40fdcfa|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 21.759 Creating connection with server4:443 with v1 21.759 Setting up connection for downloading https://server4:443/bollklrbol at 32:37.775 on ClientConnection[760698aaa3a1b754/8b4c8c19d3e06e9f(V1) with server4/193.167.100.100:443] 21.759 Original destination connection id: 760698aaa3a1b754 (scid: 8b4c8c19d3e06e9f) >- CryptoStream[I|ClientHello] 21.760 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.960/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.760 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.789 <- (4) Packet A|2|S0|35c06eda97e6231f|34|2 AckFrame[4-2|Δ0] MaxStreamsFrame[B,129] 21.789 -> Packet A|5|S0|000000000000200383298f6a18d8ba24f40fdcfa|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 21.959 loss detection timeout handler running Sending probe 0, because no ack since 21.760. Current RTT: 100/25. 21.959 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.959 (Probe is an initial retransmit) 21.959 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.360/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.959 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.359 loss detection timeout handler running Sending probe 1, because no ack since 21.959. Current RTT: 100/25. 22.359 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.359 (Probe is an initial retransmit) 22.359 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.159/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.359 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.360 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.160/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.360 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.393 <- (1) Packet I|2|L|189|2 Token=[] AckFrame[3-2,0|Δ0] CryptoFrame[0,123] 22.393 probe count not reset on ack because handshake not yet confirmed 22.393 Cwnd(-): 6000; inflight: 0 22.393 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.193/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.395 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.393 <- (1) Packet H|2|L|1011|2 CryptoFrame[0,718] Padding(235) reschedule loss detection timer for PTO over 383 millis, based on 22.780/Handshake, because peerAwaitingAddressValidation | RTT:32/16 22.395 -> Packet I|4|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1141) >- CryptoStream[H|Finished] 22.397 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 22.781/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.397 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.398 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.398 Starting downloading https://server4:443/bollklrbol at 32:38.413 on ClientConnection[760698aaa3a1b754/8b4c8c19d3e06e9f(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 22.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.398 Discarding pn space Initial because first Handshake message is being sent 22.398 -> Packet H|1|L|58|1 AckFrame[2|Δ0] 22.398 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 22.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.398 -> Packet A|0|S0|0000000000002003ee83d0e46baa08847e47d7d6|59|1 StreamFrame[0(CIB),0,17,fin] 22.493 loss detection timeout handler running Sending probe 0, because no ack since 22.397. Current RTT: 32/16. 22.493 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.493 (Probe is a handshake retransmit) 22.494 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 22.686/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.494 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 22.525 <- (2) Packet A|0|S0|8b4c8c19d3e06e9f|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003bd9ef2b2532fe2656a2d80d2|16b2ca127948f82ebe88dc5511ce9c0c] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.526 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 22.640/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -6 millis, based on 22.519/App, because ackElicitingInFlight | RTT:32/16 22.526 Discarding pn space Handshake because HandshakeDone is received 22.526 loss detection timeout handler running Sending probe 0, because no ack since 22.398. Current RTT: 32/16. 22.526 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 22.768/App, because ackElicitingInFlight | RTT:32/16 22.526 -> Packet PA|1|S0|0000000000002003ee83d0e46baa08847e47d7d6|59|1 StreamFrame[0(CIB),0,17,fin] 22.545 -> Packet A|2|S0|0000000000002003ee83d0e46baa08847e47d7d6|44|1 AckFrame[0|Δ19] 22.625 <- (3) Packet A|3|S0|8b4c8c19d3e06e9f|1350|2 PingFrame[] Padding(1323) 22.645 -> Packet A|3|S0|0000000000002003ee83d0e46baa08847e47d7d6|46|1 AckFrame[3,0|Δ19] 22.677 <- (4) Packet A|4|S0|8b4c8c19d3e06e9f|1065|3 AckFrame[3-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 22.677 Cwnd(-): 3000; inflight: 0 22.677 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 22.677 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 120 millis, based on 22.798/App, because ackElicitingInFlight | RTT:32/16 22.677 -> Packet A|4|S0|0000000000002003ee83d0e46baa08847e47d7d6|59|1 StreamFrame[0(CIB),0,17,fin] 22.677 Finished downloading https://server4:443/bollklrbol at 32:38.693 on ClientConnection[760698aaa3a1b754/8b4c8c19d3e06e9f(V1) with server4/193.167.100.100:443] 22.677 Closing ClientConnection[760698aaa3a1b754/8b4c8c19d3e06e9f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.678 -> Packet A|5|S0|0000000000002003ee83d0e46baa08847e47d7d6|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 22.678 Creating connection with server4:443 with v1 22.679 Setting up connection for downloading https://server4:443/gibvtesijz at 32:38.694 on ClientConnection[4fe9ee718b40a90c/7dc59c099605b03a(V1) with server4/193.167.100.100:443] 22.679 Original destination connection id: 4fe9ee718b40a90c (scid: 7dc59c099605b03a) >- CryptoStream[I|ClientHello] 22.680 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.880/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.680 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.709 <- (5) Packet A|5|S0|8b4c8c19d3e06e9f|34|2 AckFrame[5-4|Δ0] MaxStreamsFrame[B,129] 22.709 -> Packet A|6|S0|0000000000002003ee83d0e46baa08847e47d7d6|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 22.713 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.713 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.913/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.713 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 22.716 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.813/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.716 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 22.719 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.816/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.719 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.719 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.816/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.719 Discarding pn space Initial because first Handshake message is being sent 22.719 Starting downloading https://server4:443/gibvtesijz at 32:38.735 on ClientConnection[4fe9ee718b40a90c/7dc59c099605b03a(V1) with server4/193.167.100.100:443] 22.719 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 22.719 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.817/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.719 -> Packet A|0|S0|0000000000002003e12565dd13de304893632a99|59|1 StreamFrame[0(CIB),0,17,fin] 22.750 <- (2) Packet A|0|S0|7dc59c099605b03a|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000002003f17023d0cf2fffa179bafadb|471ee0c56c480cbb575cdef32fe2bcaa] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.751 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 22.816/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 22.841/App, because ackElicitingInFlight | RTT:33/16 22.751 Discarding pn space Handshake because HandshakeDone is received 22.770 -> Packet A|1|S0|0000000000002003e12565dd13de304893632a99|44|1 AckFrame[0|Δ19] 22.841 loss detection timeout handler running Sending probe 0, because no ack since 22.719. Current RTT: 33/16. 22.841 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 23.085/App, because ackElicitingInFlight | RTT:33/16 22.841 -> Packet PA|2|S0|0000000000002003e12565dd13de304893632a99|59|1 StreamFrame[0(CIB),0,17,fin] 22.851 <- (3) Packet A|3|S0|7dc59c099605b03a|1350|2 PingFrame[] Padding(1323) 22.871 -> Packet A|3|S0|0000000000002003e12565dd13de304893632a99|46|1 AckFrame[3,0|Δ19] 22.902 <- (4) Packet A|5|S0|7dc59c099605b03a|1065|3 AckFrame[3-0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 22.903 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.903 Finished downloading https://server4:443/gibvtesijz at 32:38.919 on ClientConnection[4fe9ee718b40a90c/7dc59c099605b03a(V1) with server4/193.167.100.100:443] 22.903 Closing ClientConnection[4fe9ee718b40a90c/7dc59c099605b03a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.903 -> Packet A|4|S0|0000000000002003e12565dd13de304893632a99|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 22.904 Creating connection with server4:443 with v1 22.904 Setting up connection for downloading https://server4:443/opmxlygawn at 32:38.920 on ClientConnection[fee3f4072316ecdd/b8578e4afd4d4c5b(V1) with server4/193.167.100.100:443] 22.904 Original destination connection id: fee3f4072316ecdd (scid: b8578e4afd4d4c5b) >- CryptoStream[I|ClientHello] 22.906 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.106/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.905 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.934 <- (5) Packet A|6|S0|7dc59c099605b03a|29|1 MaxStreamsFrame[B,129] 22.935 -> Packet A|5|S0|0000000000002003e12565dd13de304893632a99|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 23.105 loss detection timeout handler running Sending probe 0, because no ack since 22.905. Current RTT: 100/25. 23.105 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.105 (Probe is an initial retransmit) 23.105 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.505/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.105 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.504 loss detection timeout handler running Sending probe 1, because no ack since 23.105. Current RTT: 100/25. 23.504 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.504 (Probe is an initial retransmit) 23.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.305/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.505 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.506 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.306/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.506 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.538 <- (1) Packet I|1|L|189|2 Token=[] AckFrame[3,0|Δ0] CryptoFrame[0,123] 23.539 probe count not reset on ack because handshake not yet confirmed 23.539 Cwnd(-): 6000; inflight: 1200 -< CryptoStream[I|ServerHello] 23.538 <- (1) Packet H|1|L|1011|2 CryptoFrame[0,719] Padding(234) 23.541 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 23.543 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.543 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 23.639/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 23.543 Discarding pn space Initial because first Handshake message is being sent 23.543 Starting downloading https://server4:443/opmxlygawn at 32:39.559 on ClientConnection[fee3f4072316ecdd/b8578e4afd4d4c5b(V1) with server4/193.167.100.100:443] 23.543 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 23.544 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 23.640/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 23.544 -> Packet A|0|S0|00000000000020039f98c43708267c17c593cc8f|59|1 StreamFrame[0(CIB),0,17,fin] 23.574 <- (2) Packet A|0|S0|b8578e4afd4d4c5b|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000200377daf3827cbed755de266da2|6446630d5975838306b83e29b5e0e68d] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 23.575 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 23.639/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 23.665/App, because ackElicitingInFlight | RTT:32/16 23.575 Discarding pn space Handshake because HandshakeDone is received 23.594 -> Packet A|1|S0|00000000000020039f98c43708267c17c593cc8f|44|1 AckFrame[0|Δ19] 23.665 loss detection timeout handler running Sending probe 0, because no ack since 23.544. Current RTT: 32/16. 23.665 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 23.907/App, because ackElicitingInFlight | RTT:32/16 23.665 -> Packet PA|2|S0|00000000000020039f98c43708267c17c593cc8f|59|1 StreamFrame[0(CIB),0,17,fin] 23.674 <- (3) Packet A|3|S0|b8578e4afd4d4c5b|1350|2 PingFrame[] Padding(1323) 23.694 -> Packet A|3|S0|00000000000020039f98c43708267c17c593cc8f|46|1 AckFrame[3,0|Δ19] 23.721 <- (4) Packet A|4|S0|b8578e4afd4d4c5b|32|1 AckFrame[2-0|Δ25] 23.721 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 23.725 <- (5) Packet A|5|S0|b8578e4afd4d4c5b|1065|3 AckFrame[3-0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 23.725 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 23.726 Finished downloading https://server4:443/opmxlygawn at 32:39.741 on ClientConnection[fee3f4072316ecdd/b8578e4afd4d4c5b(V1) with server4/193.167.100.100:443] 23.726 Closing ClientConnection[fee3f4072316ecdd/b8578e4afd4d4c5b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.726 -> Packet A|4|S0|00000000000020039f98c43708267c17c593cc8f|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0]