0.000 Creating connection with server4:443 with v1 0.080 Setting up connection for downloading https://server4:443/qwavppbkab at 31:15.086 on ClientConnection[c5d098e0e199f2bf/7414ce32828bf549(V1) with server4/193.167.100.100:443] 0.081 Original destination connection id: c5d098e0e199f2bf (scid: 7414ce32828bf549) >- CryptoStream[I|ClientHello] 0.264 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.465/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.259 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.301 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.318 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.519/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.301 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) 0.346 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 0.467/Handshake, because peerAwaitingAddressValidation | RTT:41/20 0.345 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 0.379 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 0.500/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 0.376 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.382 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 0.383 Starting downloading https://server4:443/qwavppbkab at 31:15.403 on ClientConnection[c5d098e0e199f2bf/7414ce32828bf549(V1) with server4/193.167.100.100:443] 0.389 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 0.510/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 0.389 Discarding pn space Initial because first Handshake message is being sent 0.409 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 0.530/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 0.408 -> Packet A|0|S0|0000000000001007d0d00a3059e034c87eafa08b|59|1 StreamFrame[0(CIB),0,17,fin] 0.529 loss detection timeout handler running Sending probe 0, because no ack since 0.376. Current RTT: 41/20. 0.530 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.531 (Probe is a handshake retransmit) 0.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 241 millis, based on 0.775/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 0.532 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 0.665 <- (2) Packet A|2|S0|7414ce32828bf549|1350|2 PingFrame[] Padding(1323) 0.686 -> Packet A|1|S0|0000000000001007d0d00a3059e034c87eafa08b|44|1 AckFrame[2|Δ19] 0.774 loss detection timeout handler running Sending probe 1, because no ack since 0.408. Current RTT: 41/20. 0.774 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.774 (Probe is a handshake retransmit) 0.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 483 millis, based on 1.259/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 0.775 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 0.776 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 483 millis, based on 1.260/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 0.776 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 1.175 <- (3) Packet A|5|S0|7414ce32828bf549|29|2 PingFrame[] Padding(2) 1.175 <- (4) Packet A|6|S0|7414ce32828bf549|29|2 PingFrame[] Padding(2) 1.177 <- (5) Packet A|7|S0|7414ce32828bf549|1425|2 PingFrame[] Padding(1398) 1.177 -> Packet A|2|S0|0000000000001007d0d00a3059e034c87eafa08b|45|1 AckFrame[6-5,2|Δ0] 1.197 -> Packet A|3|S0|0000000000001007d0d00a3059e034c87eafa08b|46|1 AckFrame[7-5,2|Δ19] 1.208 <- (6) Packet A|8|S0|7414ce32828bf549|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007c1da8620756bd4bdfb8b3615|67fc011af76530510f93d6e096fba1d9] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.216 State is set to Confirmed reschedule loss detection timer for PTO over -223 millis, based on 0.992/App, because ackElicitingInFlight | RTT:41/20 reschedule loss detection timer for PTO over -661 millis, based on 0.554/App, because ackElicitingInFlight | RTT:41/20 1.216 Discarding pn space Handshake because HandshakeDone is received 1.216 loss detection timeout handler running Sending probe 0, because no ack since 0.408. Current RTT: 41/20. 1.217 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 291 millis, based on 1.509/App, because ackElicitingInFlight | RTT:41/20 1.217 -> Packet PA|4|S0|0000000000001007d0d00a3059e034c87eafa08b|59|1 StreamFrame[0(CIB),0,17,fin] 1.236 -> Packet A|5|S0|0000000000001007d0d00a3059e034c87eafa08b|46|1 AckFrame[8-5,2|Δ19] 1.250 <- (7) Packet A|9|S0|7414ce32828bf549|1067|3 AckFrame[4,2-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 1.253 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 145 millis, based on 1.399/App, because ackElicitingInFlight | RTT:41/20 1.253 -> Packet A|6|S0|0000000000001007d0d00a3059e034c87eafa08b|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8-7|Δ0] 1.254 Cwnd(-): 6000; inflight: 64 reschedule loss detection timer for PTO over 144 millis, based on 1.399/App, because ackElicitingInFlight | RTT:41/20 1.257 Finished downloading https://server4:443/qwavppbkab at 31:16.276 on ClientConnection[c5d098e0e199f2bf/7414ce32828bf549(V1) with server4/193.167.100.100:443] 1.258 Closing ClientConnection[c5d098e0e199f2bf/7414ce32828bf549(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.261 Creating connection with server4:443 with v1 1.261 Setting up connection for downloading https://server4:443/yqenjpcrmx at 31:16.281 on ClientConnection[bb6528abcc9a825d/61e4c76af9eb640a(V1) with server4/193.167.100.100:443] 1.261 Original destination connection id: bb6528abcc9a825d (scid: 61e4c76af9eb640a) >- CryptoStream[I|ClientHello] 1.265 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.465/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.265 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.261 -> Packet A|7|S0|0000000000001007d0d00a3059e034c87eafa08b|48|2 ConnectionCloseFrame[0|0|] AckFrame[9-7|Δ5] 1.291 <- (8) Packet A|10|S0|7414ce32828bf549|29|1 MaxStreamsFrame[B,129] 1.296 -> Packet A|8|S0|0000000000001007d0d00a3059e034c87eafa08b|47|2 ConnectionCloseFrame[0|0|] AckFrame[9-7|Δ0] 1.464 loss detection timeout handler running Sending probe 0, because no ack since 1.265. Current RTT: 100/25. 1.465 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.465 (Probe is an initial retransmit) 1.466 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.866/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.466 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.499 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 1.500 probe count not reset on ack because handshake not yet confirmed 1.501 Retransmitting CryptoFrame[0,257] on level Initial 1.501 Cwnd(-): 6000; inflight: 0 1.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.901/Initial, because peerAwaitingAddressValidation | RTT:100/25 1.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 1.696/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.501 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 1.506 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.700/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.499 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 1.506 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 1.511 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.705/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.511 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.512 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.512 Starting downloading https://server4:443/yqenjpcrmx at 31:16.532 on ClientConnection[bb6528abcc9a825d/61e4c76af9eb640a(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 1.609/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.512 Discarding pn space Initial because first Handshake message is being sent 1.513 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.610/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.513 -> [Packet H|1|L|58|1 AckFrame[0|Δ0], Packet A|0|S0|00000000000010074daac6e1de5e77520fa8cdea|59|1 StreamFrame[0(CIB),0,17,fin]] 1.543 <- (2) Packet A|0|S0|61e4c76af9eb640a|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000100717bda09763f2f860dd10033e|15eca7f05c679154fddaf42c36b9617e] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.544 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 1.608/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 1.635/App, because ackElicitingInFlight | RTT:33/16 1.545 Discarding pn space Handshake because HandshakeDone is received 1.545 <- (3) Packet A|1|S0|61e4c76af9eb640a|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 1.546 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.546 -> Packet A|1|S0|00000000000010074daac6e1de5e77520fa8cdea|44|1 AckFrame[1-0|Δ1] 1.547 Finished downloading https://server4:443/yqenjpcrmx at 31:16.567 on ClientConnection[bb6528abcc9a825d/61e4c76af9eb640a(V1) with server4/193.167.100.100:443] 1.547 Closing ClientConnection[bb6528abcc9a825d/61e4c76af9eb640a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.548 -> Packet A|2|S0|00000000000010074daac6e1de5e77520fa8cdea|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 1.549 Creating connection with server4:443 with v1 1.550 Setting up connection for downloading https://server4:443/smknvucbmz at 31:16.569 on ClientConnection[99387b764f4450b0/02517cea63df087f(V1) with server4/193.167.100.100:443] 1.550 Original destination connection id: 99387b764f4450b0 (scid: 02517cea63df087f) >- CryptoStream[I|ClientHello] 1.552 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.753/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.552 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.586 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 1.587 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.787/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.591 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.586 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) reschedule loss detection timer for PTO over 96 millis, based on 1.688/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.591 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.596 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.693/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.596 Discarding pn space Initial because first Handshake message is being sent 1.596 Starting downloading https://server4:443/smknvucbmz at 31:16.616 on ClientConnection[99387b764f4450b0/02517cea63df087f(V1) with server4/193.167.100.100:443] 1.597 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.694/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.595 -> Packet H|0|L|92|1 CryptoFrame[0,36] 1.598 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.695/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.598 -> [Packet H|1|L|58|1 AckFrame[0|Δ0], Packet A|0|S0|00000000000010075781c7746b486e22135df79b|59|1 StreamFrame[0(CIB),0,17,fin]] 1.694 loss detection timeout handler running Sending probe 0, because no ack since 1.595. Current RTT: 33/16. 1.694 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.694 (Probe is a handshake retransmit) 1.695 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.889/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.694 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 1.727 <- (2) Packet A|2|S0|02517cea63df087f|1350|2 PingFrame[] Padding(1323) 1.747 -> Packet A|1|S0|00000000000010075781c7746b486e22135df79b|44|1 AckFrame[2|Δ19] 1.888 loss detection timeout handler running Sending probe 1, because no ack since 1.598. Current RTT: 33/16. 1.888 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.888 (Probe is a handshake retransmit) 1.889 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 2.277/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.888 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 1.890 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 2.278/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.889 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 2.277 loss detection timeout handler running Sending probe 2, because no ack since 1.598. Current RTT: 33/16. 2.277 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.277 (Probe is a handshake retransmit) 2.278 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 3.054/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.278 -> Packet PH|5|L|92|1 CryptoFrame[0,36] 2.279 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 3.055/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.279 -> Packet PH|6|L|92|1 CryptoFrame[0,36] 2.749 <- (3) Packet A|3|S0|02517cea63df087f|29|2 PingFrame[] Padding(2) 2.749 <- (4) Packet A|4|S0|02517cea63df087f|29|2 PingFrame[] Padding(2) 2.750 -> Packet A|2|S0|00000000000010075781c7746b486e22135df79b|43|1 AckFrame[4-2|Δ0] 2.750 <- (5) Packet A|5|S0|02517cea63df087f|1350|2 PingFrame[] Padding(1323) 2.770 -> Packet A|3|S0|00000000000010075781c7746b486e22135df79b|44|1 AckFrame[5-2|Δ19] 2.782 <- (6) Packet A|6|S0|02517cea63df087f|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000100752f03df0d7924f39d8d83d54|f884a318218ed08c7b0a1082cedcc880] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.783 State is set to Confirmed reschedule loss detection timer for PTO over -209 millis, based on 2.574/App, because ackElicitingInFlight | RTT:33/16 2.783 loss detection timeout handler running Sending probe 0, because no ack since 1.598. Current RTT: 33/16. reschedule loss detection timer for PTO over -1063 millis, based on 1.720/App, because ackElicitingInFlight | RTT:33/16 2.783 Discarding pn space Handshake because HandshakeDone is received 2.783 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 3.027/App, because ackElicitingInFlight | RTT:33/16 2.783 -> Packet PA|4|S0|00000000000010075781c7746b486e22135df79b|59|1 StreamFrame[0(CIB),0,17,fin] 2.803 -> Packet A|5|S0|00000000000010075781c7746b486e22135df79b|44|1 AckFrame[6-2|Δ19] 2.815 <- (7) Packet A|7|S0|02517cea63df087f|1065|3 AckFrame[4-2|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 2.816 Cwnd(-): 6000; inflight: 0 2.816 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 2.816 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 2.923/App, because ackElicitingInFlight | RTT:33/12 2.817 Finished downloading https://server4:443/smknvucbmz at 31:17.837 on ClientConnection[99387b764f4450b0/02517cea63df087f(V1) with server4/193.167.100.100:443] 2.817 -> Packet A|6|S0|00000000000010075781c7746b486e22135df79b|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ0] 2.817 Closing ClientConnection[99387b764f4450b0/02517cea63df087f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.818 Creating connection with server4:443 with v1 2.818 -> Packet A|7|S0|00000000000010075781c7746b486e22135df79b|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 2.819 Setting up connection for downloading https://server4:443/dudmnygsby at 31:17.839 on ClientConnection[920ddf3f8380f1f3/b067c90219feb0af(V1) with server4/193.167.100.100:443] 2.819 Original destination connection id: 920ddf3f8380f1f3 (scid: b067c90219feb0af) >- CryptoStream[I|ClientHello] 2.821 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.021/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.821 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.849 <- (8) Packet A|8|S0|02517cea63df087f|29|1 MaxStreamsFrame[B,129] 2.850 -> Packet A|8|S0|00000000000010075781c7746b486e22135df79b|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 3.021 loss detection timeout handler running Sending probe 0, because no ack since 2.821. Current RTT: 100/25. 3.021 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.021 (Probe is an initial retransmit) 3.022 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.422/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.021 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.055 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 3.056 probe count not reset on ack because handshake not yet confirmed 3.056 Retransmitting CryptoFrame[0,257] on level Initial 3.056 Cwnd(-): 6000; inflight: 0 3.056 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.456/Initial, because peerAwaitingAddressValidation | RTT:100/25 3.056 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.457/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.056 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 3.060 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.055 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) reschedule loss detection timer for PTO over 193 millis, based on 3.254/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.060 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 3.063 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.258/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.063 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.064 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.161/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.065 Discarding pn space Initial because first Handshake message is being sent 3.064 Starting downloading https://server4:443/dudmnygsby at 31:18.084 on ClientConnection[920ddf3f8380f1f3/b067c90219feb0af(V1) with server4/193.167.100.100:443] 3.065 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 3.066 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.163/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.066 -> Packet A|0|S0|00000000000010075a16648527d25bd19dfa93b9|59|1 StreamFrame[0(CIB),0,17,fin] 3.095 <- (2) Packet A|0|S0|b067c90219feb0af|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007e2959cebb677f3a835525fea|601847e35edf3c3772e9ff2ae5b79f81] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.096 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 3.160/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 3.188/App, because ackElicitingInFlight | RTT:33/16 3.097 Discarding pn space Handshake because HandshakeDone is received 3.097 <- (3) Packet A|1|S0|b067c90219feb0af|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 3.098 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.098 Finished downloading https://server4:443/dudmnygsby at 31:18.118 on ClientConnection[920ddf3f8380f1f3/b067c90219feb0af(V1) with server4/193.167.100.100:443] 3.099 Closing ClientConnection[920ddf3f8380f1f3/b067c90219feb0af(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.098 -> Packet A|1|S0|00000000000010075a16648527d25bd19dfa93b9|44|1 AckFrame[1-0|Δ1] 3.099 -> Packet A|2|S0|00000000000010075a16648527d25bd19dfa93b9|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 3.099 Creating connection with server4:443 with v1 3.100 Setting up connection for downloading https://server4:443/itvqgpyqfm at 31:18.120 on ClientConnection[55d32439c459857a/a36822e39dfb35d3(V1) with server4/193.167.100.100:443] 3.100 Original destination connection id: 55d32439c459857a (scid: a36822e39dfb35d3) >- CryptoStream[I|ClientHello] 3.102 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.302/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.102 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.301 loss detection timeout handler running Sending probe 0, because no ack since 3.102. Current RTT: 100/25. 3.301 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.301 (Probe is an initial retransmit) 3.302 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.702/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.302 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.335 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 3.336 probe count not reset on ack because handshake not yet confirmed 3.336 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.736/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.335 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,718] Padding(237) 3.340 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.534/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.340 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 3.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.538/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.343 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.344 Starting downloading https://server4:443/itvqgpyqfm at 31:18.364 on ClientConnection[55d32439c459857a/a36822e39dfb35d3(V1) with server4/193.167.100.100:443] 3.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.442/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.345 Discarding pn space Initial because first Handshake message is being sent 3.345 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 3.345 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.442/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.345 -> Packet A|0|S0|000000000000100780b59d04ffa1fb6b208a3947|59|1 StreamFrame[0(CIB),0,17,fin] 3.442 loss detection timeout handler running Sending probe 0, because no ack since 3.343. Current RTT: 33/16. 3.442 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.442 (Probe is a handshake retransmit) 3.442 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.636/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.442 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 3.635 loss detection timeout handler running Sending probe 1, because no ack since 3.345. Current RTT: 33/16. 3.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.636 (Probe is a handshake retransmit) 3.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 4.024/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.636 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 3.637 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 4.025/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.637 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 4.024 loss detection timeout handler running Sending probe 2, because no ack since 3.345. Current RTT: 33/16. 4.025 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.025 (Probe is a handshake retransmit) 4.025 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 4.801/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.025 -> Packet PH|5|L|92|1 CryptoFrame[0,36] 4.026 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 4.802/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.026 -> Packet PH|6|L|92|1 CryptoFrame[0,36] 4.497 <- (2) Packet A|3|S0|a36822e39dfb35d3|29|2 PingFrame[] Padding(2) 4.498 <- (3) Packet A|4|S0|a36822e39dfb35d3|29|2 PingFrame[] Padding(2) 4.499 -> Packet A|1|S0|000000000000100780b59d04ffa1fb6b208a3947|43|1 AckFrame[4-3|Δ0] 4.499 <- (4) Packet A|5|S0|a36822e39dfb35d3|1350|2 PingFrame[] Padding(1323) 4.519 -> Packet A|2|S0|000000000000100780b59d04ffa1fb6b208a3947|44|1 AckFrame[5-3|Δ19] 4.550 <- (5) Packet A|6|S0|a36822e39dfb35d3|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007e135c63ddc765807cbb56b83|62c712885f7f720bca0adc5db9016aaa] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 4.551 State is set to Confirmed reschedule loss detection timer for PTO over -229 millis, based on 4.321/App, because ackElicitingInFlight | RTT:33/16 4.551 loss detection timeout handler running Sending probe 3, because no ack since 3.345. Current RTT: 33/16. reschedule loss detection timer for PTO over -1084 millis, based on 3.467/App, because ackElicitingInFlight | RTT:33/16 4.551 (Probe is retransmit on level App) 4.551 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 243 millis, based on 4.796/App, because ackElicitingInFlight | RTT:33/16 4.552 -> Packet PA|3|S0|000000000000100780b59d04ffa1fb6b208a3947|59|1 StreamFrame[0(CIB),0,17,fin] 4.571 -> Packet A|4|S0|000000000000100780b59d04ffa1fb6b208a3947|44|1 AckFrame[6-3|Δ19] 4.584 <- (6) Packet A|7|S0|a36822e39dfb35d3|1065|3 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 4.584 Cwnd(-): 6000; inflight: 0 4.584 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 4.584 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 4.691/App, because ackElicitingInFlight | RTT:33/12 4.585 Finished downloading https://server4:443/itvqgpyqfm at 31:19.605 on ClientConnection[55d32439c459857a/a36822e39dfb35d3(V1) with server4/193.167.100.100:443] 4.585 -> Packet A|5|S0|000000000000100780b59d04ffa1fb6b208a3947|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ0] 4.585 Closing ClientConnection[55d32439c459857a/a36822e39dfb35d3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.586 -> Packet A|6|S0|000000000000100780b59d04ffa1fb6b208a3947|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 4.586 Creating connection with server4:443 with v1 4.587 Setting up connection for downloading https://server4:443/srdrvlxkew at 31:19.607 on ClientConnection[8fe74e268ca0cd56/b4bd4bed2da2031a(V1) with server4/193.167.100.100:443] 4.587 Original destination connection id: 8fe74e268ca0cd56 (scid: b4bd4bed2da2031a) >- CryptoStream[I|ClientHello] 4.589 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.789/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.589 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.641 <- (7) Packet A|8|S0|a36822e39dfb35d3|32|1 AckFrame[5-2|Δ26] 4.641 -> Packet A|7|S0|000000000000100780b59d04ffa1fb6b208a3947|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 4.650 <- (8) Packet A|9|S0|a36822e39dfb35d3|1425|2 PingFrame[] Padding(1398) 4.651 -> Packet A|8|S0|000000000000100780b59d04ffa1fb6b208a3947|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 4.788 loss detection timeout handler running Sending probe 0, because no ack since 4.589. Current RTT: 100/25. 4.789 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.789 (Probe is an initial retransmit) 4.789 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.189/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.789 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.808 <- (9) Packet A|12|S0|a36822e39dfb35d3|1425|2 PingFrame[] Padding(1398) 4.822 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 4.822 probe count not reset on ack because handshake not yet confirmed 4.822 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.222/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.825 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.822 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,719] Padding(236) reschedule loss detection timer for PTO over 191 millis, based on 5.017/Handshake, because peerAwaitingAddressValidation | RTT:32/16 4.825 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 4.828 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 5.020/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.828 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.829 Starting downloading https://server4:443/srdrvlxkew at 31:19.849 on ClientConnection[8fe74e268ca0cd56/b4bd4bed2da2031a(V1) with server4/193.167.100.100:443] 4.829 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 4.829 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.925/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.829 Discarding pn space Initial because first Handshake message is being sent 4.830 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.926/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.829 -> Packet A|0|S0|00000000000010070dedfe384e18d3960f801b7a|59|1 StreamFrame[0(CIB),0,17,fin] 4.925 loss detection timeout handler running Sending probe 0, because no ack since 4.828. Current RTT: 32/16. 4.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.925 (Probe is a handshake retransmit) 4.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 5.117/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.925 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 5.116 loss detection timeout handler running Sending probe 1, because no ack since 4.829. Current RTT: 32/16. 5.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.117 (Probe is a handshake retransmit) 5.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 5.501/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.117 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 5.118 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 5.502/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.118 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 5.149 <- (2) Packet A|0|S0|b4bd4bed2da2031a|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007813d0f30dba50d7a2e342139|9efd32b820adbf019a22551cd0f16d1a] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 5.150 State is set to Confirmed reschedule loss detection timer for PTO over 163 millis, based on 5.313/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -199 millis, based on 4.950/App, because ackElicitingInFlight | RTT:32/16 5.150 loss detection timeout handler running 5.150 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 4.829. Current RTT: 32/16. 5.150 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 5.392/App, because ackElicitingInFlight | RTT:32/16 5.150 -> Packet PA|1|S0|00000000000010070dedfe384e18d3960f801b7a|59|1 StreamFrame[0(CIB),0,17,fin] 5.170 -> Packet A|2|S0|00000000000010070dedfe384e18d3960f801b7a|44|1 AckFrame[0|Δ19] 5.249 <- (3) Packet A|2|S0|b4bd4bed2da2031a|1350|2 PingFrame[] Padding(1323) 5.269 -> Packet A|3|S0|00000000000010070dedfe384e18d3960f801b7a|46|1 AckFrame[2,0|Δ19] 5.365 <- (4) Packet A|3|S0|b4bd4bed2da2031a|29|2 PingFrame[] Padding(2) 5.365 <- (5) Packet A|4|S0|b4bd4bed2da2031a|29|2 PingFrame[] Padding(2) 5.366 -> Packet A|4|S0|00000000000010070dedfe384e18d3960f801b7a|45|1 AckFrame[4-2,0|Δ0] 5.391 loss detection timeout handler running Sending probe 1, because no ack since 5.150. Current RTT: 32/16. 5.392 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 5.876/App, because ackElicitingInFlight | RTT:32/16 5.392 -> Packet PA|5|S0|00000000000010070dedfe384e18d3960f801b7a|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 5.877/App, because ackElicitingInFlight | RTT:32/16 5.393 -> Packet PA|6|S0|00000000000010070dedfe384e18d3960f801b7a|59|1 StreamFrame[0(CIB),0,17,fin] 5.474 <- (6) Packet A|6|S0|b4bd4bed2da2031a|29|2 PingFrame[] Padding(2) 5.474 <- (7) Packet A|7|S0|b4bd4bed2da2031a|29|2 PingFrame[] Padding(2) 5.476 -> Packet A|7|S0|00000000000010070dedfe384e18d3960f801b7a|47|1 AckFrame[7-6,4-2,0|Δ0] 5.601 <- (8) Packet A|8|S0|b4bd4bed2da2031a|1425|2 PingFrame[] Padding(1398) 5.621 -> Packet A|8|S0|00000000000010070dedfe384e18d3960f801b7a|48|1 AckFrame[8-6,4-2,0|Δ19] 5.753 <- (9) Packet A|9|S0|b4bd4bed2da2031a|1462|2 PingFrame[] Padding(1435) 5.772 -> Packet A|9|S0|00000000000010070dedfe384e18d3960f801b7a|48|1 AckFrame[9-6,4-2,0|Δ19] 5.876 loss detection timeout handler running Sending probe 2, because no ack since 5.393. Current RTT: 32/16. 5.876 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 967 millis, based on 6.845/App, because ackElicitingInFlight | RTT:32/16 5.877 -> Packet PA|10|S0|00000000000010070dedfe384e18d3960f801b7a|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 967 millis, based on 6.846/App, because ackElicitingInFlight | RTT:32/16 5.878 -> Packet PA|11|S0|00000000000010070dedfe384e18d3960f801b7a|59|1 StreamFrame[0(CIB),0,17,fin] 5.904 <- (10) Packet A|11|S0|b4bd4bed2da2031a|1471|2 PingFrame[] Padding(1444) 5.910 <- (11) Packet A|12|S0|b4bd4bed2da2031a|1069|3 AckFrame[11,9-8,4|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 5.910 Cwnd(-): 6000; inflight: 59 5.910 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 5.910 -> Packet A|12|S0|00000000000010070dedfe384e18d3960f801b7a|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[11|Δ5] 5.911 Finished downloading https://server4:443/srdrvlxkew at 31:20.931 on ClientConnection[8fe74e268ca0cd56/b4bd4bed2da2031a(V1) with server4/193.167.100.100:443] 5.911 Closing ClientConnection[8fe74e268ca0cd56/b4bd4bed2da2031a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.912 Creating connection with server4:443 with v1 5.911 -> Packet A|13|S0|00000000000010070dedfe384e18d3960f801b7a|47|2 ConnectionCloseFrame[0|0|] AckFrame[12-11|Δ0] 5.912 Setting up connection for downloading https://server4:443/xybgdjoiuo at 31:20.932 on ClientConnection[2d203f8dd3e3f7bb/cc24ed6163ca31cd(V1) with server4/193.167.100.100:443] 5.912 Original destination connection id: 2d203f8dd3e3f7bb (scid: cc24ed6163ca31cd) >- CryptoStream[I|ClientHello] 5.914 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.115/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.914 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.942 <- (12) Packet A|13|S0|b4bd4bed2da2031a|29|1 MaxStreamsFrame[B,129] 5.943 -> Packet A|14|S0|00000000000010070dedfe384e18d3960f801b7a|47|2 ConnectionCloseFrame[0|0|] AckFrame[12-11|Δ0] 6.114 loss detection timeout handler running Sending probe 0, because no ack since 5.914. Current RTT: 100/25. 6.114 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.114 (Probe is an initial retransmit) 6.115 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.515/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.114 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.514 loss detection timeout handler running Sending probe 1, because no ack since 6.114. Current RTT: 100/25. 6.514 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.514 (Probe is an initial retransmit) 6.515 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.315/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.514 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.515 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.315/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.515 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.549 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 6.550 probe count not reset on ack because handshake not yet confirmed 6.550 Retransmitting CryptoFrame[0,257] on level Initial 6.550 Cwnd(-): 6000; inflight: 0 6.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.350/Initial, because peerAwaitingAddressValidation | RTT:100/25 6.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 6.959/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.551 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 6.549 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,719] Padding(236) 6.553 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 6.961/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.553 -> Packet I|5|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 6.556 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 6.964/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.556 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.557 Starting downloading https://server4:443/xybgdjoiuo at 31:21.577 on ClientConnection[2d203f8dd3e3f7bb/cc24ed6163ca31cd(V1) with server4/193.167.100.100:443] 6.557 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 6.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.659/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.558 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 101 millis, based on 6.660/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.557 -> Packet A|0|S0|0000000000001007b524d410d6c5974503c704c8|59|1 StreamFrame[0(CIB),0,17,fin] 6.585 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.589 <- (3) Packet A|1|S0|cc24ed6163ca31cd|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 6.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.591 Finished downloading https://server4:443/xybgdjoiuo at 31:21.611 on ClientConnection[2d203f8dd3e3f7bb/cc24ed6163ca31cd(V1) with server4/193.167.100.100:443] 6.591 Closing ClientConnection[2d203f8dd3e3f7bb/cc24ed6163ca31cd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.591 -> Packet A|1|S0|0000000000001007b524d410d6c5974503c704c8|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 6.592 Creating connection with server4:443 with v1 6.592 Setting up connection for downloading https://server4:443/kkgcivdlwg at 31:21.612 on ClientConnection[d5dd923c6b534d31/700cd16851490401(V1) with server4/193.167.100.100:443] 6.592 Original destination connection id: d5dd923c6b534d31 (scid: 700cd16851490401) >- CryptoStream[I|ClientHello] 6.594 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.794/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.594 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.622 <- (4) Packet A|2|S0|cc24ed6163ca31cd|29|1 MaxStreamsFrame[B,129] 6.623 -> Packet A|2|S0|0000000000001007b524d410d6c5974503c704c8|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 6.793 loss detection timeout handler running Sending probe 0, because no ack since 6.594. Current RTT: 100/25. 6.793 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.793 (Probe is an initial retransmit) 6.794 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.194/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.794 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.827 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 6.827 probe count not reset on ack because handshake not yet confirmed 6.827 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.227/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.831 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.827 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,719] Padding(236) reschedule loss detection timer for PTO over 191 millis, based on 7.023/Handshake, because peerAwaitingAddressValidation | RTT:32/16 6.831 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 6.834 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 7.026/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 6.834 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.835 Starting downloading https://server4:443/kkgcivdlwg at 31:21.855 on ClientConnection[d5dd923c6b534d31/700cd16851490401(V1) with server4/193.167.100.100:443] 6.835 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 6.931/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 6.835 Discarding pn space Initial because first Handshake message is being sent 6.835 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 6.836 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 6.932/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 6.836 -> Packet A|0|S0|0000000000001007dae703f8e063c7bfa70568d5|59|1 StreamFrame[0(CIB),0,17,fin] 6.866 <- (2) Packet A|0|S0|700cd16851490401|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000100799c5172c2efdcd2a191a4aaf|18b9209f4a3c2c49853d108d2b54e4a2] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.867 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 6.930/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 6.957/App, because ackElicitingInFlight | RTT:32/16 6.867 Discarding pn space Handshake because HandshakeDone is received 6.868 <- (3) Packet A|1|S0|700cd16851490401|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 6.868 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.869 Finished downloading https://server4:443/kkgcivdlwg at 31:21.889 on ClientConnection[d5dd923c6b534d31/700cd16851490401(V1) with server4/193.167.100.100:443] 6.869 Closing ClientConnection[d5dd923c6b534d31/700cd16851490401(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.869 Creating connection with server4:443 with v1 6.869 -> Packet A|1|S0|0000000000001007dae703f8e063c7bfa70568d5|48|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ2] 6.870 Setting up connection for downloading https://server4:443/egncdtobck at 31:21.890 on ClientConnection[07c655f2e5637db6/183210a4b1a07b9f(V1) with server4/193.167.100.100:443] 6.870 Original destination connection id: 07c655f2e5637db6 (scid: 183210a4b1a07b9f) >- CryptoStream[I|ClientHello] 6.872 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.072/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.872 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.900 <- (4) Packet A|2|S0|700cd16851490401|29|1 MaxStreamsFrame[B,129] 6.901 -> Packet A|2|S0|0000000000001007dae703f8e063c7bfa70568d5|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 6.905 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.906 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.106/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.909 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.905 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) reschedule loss detection timer for PTO over 96 millis, based on 7.006/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.908 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 6.912 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.009/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.912 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.913 Starting downloading https://server4:443/egncdtobck at 31:21.932 on ClientConnection[07c655f2e5637db6/183210a4b1a07b9f(V1) with server4/193.167.100.100:443] 6.913 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.010/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.913 Discarding pn space Initial because first Handshake message is being sent 6.913 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 6.913 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.010/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.913 -> Packet A|0|S0|00000000000010071015abfccf50e6402bb8aa89|59|1 StreamFrame[0(CIB),0,17,fin] 6.943 <- (2) Packet A|0|S0|183210a4b1a07b9f|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010075495b8e1eb953764e7637175|219c9fb89f1a235a505b8ff3f242938a] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.944 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 7.009/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 7.035/App, because ackElicitingInFlight | RTT:33/16 6.944 Discarding pn space Handshake because HandshakeDone is received 6.963 -> Packet A|1|S0|00000000000010071015abfccf50e6402bb8aa89|44|1 AckFrame[0|Δ19] 7.035 loss detection timeout handler running Sending probe 0, because no ack since 6.913. Current RTT: 33/16. 7.035 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 7.279/App, because ackElicitingInFlight | RTT:33/16 7.035 -> Packet PA|2|S0|00000000000010071015abfccf50e6402bb8aa89|59|1 StreamFrame[0(CIB),0,17,fin] 7.067 <- (3) Packet A|3|S0|183210a4b1a07b9f|1065|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 7.068 Cwnd(-): 6000; inflight: 0 7.068 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.068 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 7.174/App, because ackElicitingInFlight | RTT:33/12 7.068 -> Packet A|3|S0|00000000000010071015abfccf50e6402bb8aa89|59|1 StreamFrame[0(CIB),0,17,fin] 7.069 Finished downloading https://server4:443/egncdtobck at 31:22.089 on ClientConnection[07c655f2e5637db6/183210a4b1a07b9f(V1) with server4/193.167.100.100:443] 7.069 Closing ClientConnection[07c655f2e5637db6/183210a4b1a07b9f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.069 Creating connection with server4:443 with v1 7.069 -> Packet A|4|S0|00000000000010071015abfccf50e6402bb8aa89|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 7.070 Setting up connection for downloading https://server4:443/mxsnpzprrk at 31:22.090 on ClientConnection[4885f249bd6e40a6/98d27559759b12ad(V1) with server4/193.167.100.100:443] 7.070 Original destination connection id: 4885f249bd6e40a6 (scid: 98d27559759b12ad) >- CryptoStream[I|ClientHello] 7.072 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.272/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.072 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.100 <- (4) Packet A|4|S0|183210a4b1a07b9f|34|2 AckFrame[4-3|Δ0] MaxStreamsFrame[B,129] 7.101 -> Packet A|5|S0|00000000000010071015abfccf50e6402bb8aa89|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 7.105 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.106 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.306/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.105 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) 7.108 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.205/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.108 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 7.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.208/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.111 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.111 Starting downloading https://server4:443/mxsnpzprrk at 31:22.131 on ClientConnection[4885f249bd6e40a6/98d27559759b12ad(V1) with server4/193.167.100.100:443] 7.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.208/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.112 Discarding pn space Initial because first Handshake message is being sent 7.112 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.209/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.112 -> [Packet H|1|L|58|1 AckFrame[0|Δ0], Packet A|0|S0|00000000000010078b992e85f3d607642b2eab22|59|1 StreamFrame[0(CIB),0,17,fin]] 7.208 loss detection timeout handler running Sending probe 0, because no ack since 7.111. Current RTT: 33/16. 7.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.208 (Probe is a handshake retransmit) 7.209 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.403/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.208 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 7.402 loss detection timeout handler running Sending probe 1, because no ack since 7.112. Current RTT: 33/16. 7.402 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.402 (Probe is a handshake retransmit) 7.402 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.790/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.402 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 7.403 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.791/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.403 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 7.434 <- (2) Packet A|0|S0|98d27559759b12ad|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007b38493285c0ccce3942f5b35|d53894b45c518e1096a79c4d4edf044c] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.434 State is set to Confirmed reschedule loss detection timer for PTO over 165 millis, based on 7.600/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -200 millis, based on 7.234/App, because ackElicitingInFlight | RTT:33/16 7.435 loss detection timeout handler running 7.435 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 7.112. Current RTT: 33/16. 7.435 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 7.679/App, because ackElicitingInFlight | RTT:33/16 7.435 -> Packet PA|1|S0|00000000000010078b992e85f3d607642b2eab22|59|1 StreamFrame[0(CIB),0,17,fin] 7.455 -> Packet A|2|S0|00000000000010078b992e85f3d607642b2eab22|44|1 AckFrame[0|Δ20] 7.467 <- (3) Packet A|1|S0|98d27559759b12ad|1065|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 7.468 Cwnd(-): 6000; inflight: 0 7.468 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.468 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 7.574/App, because ackElicitingInFlight | RTT:33/12 7.468 -> Packet A|3|S0|00000000000010078b992e85f3d607642b2eab22|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 7.469 Finished downloading https://server4:443/mxsnpzprrk at 31:22.488 on ClientConnection[4885f249bd6e40a6/98d27559759b12ad(V1) with server4/193.167.100.100:443] 7.469 Closing ClientConnection[4885f249bd6e40a6/98d27559759b12ad(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.469 -> Packet A|4|S0|00000000000010078b992e85f3d607642b2eab22|42|1 ConnectionCloseFrame[0|0|] 7.469 Creating connection with server4:443 with v1 7.470 Setting up connection for downloading https://server4:443/cilbkqvueg at 31:22.490 on ClientConnection[b2a135b41839030c/aa15d134e6a58ba7(V1) with server4/193.167.100.100:443] 7.470 Original destination connection id: b2a135b41839030c (scid: aa15d134e6a58ba7) >- CryptoStream[I|ClientHello] 7.472 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.672/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.472 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.505 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.506 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.706/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.505 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 7.509 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.607/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.509 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.513 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.610/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.513 Discarding pn space Initial because first Handshake message is being sent 7.513 Starting downloading https://server4:443/cilbkqvueg at 31:22.533 on ClientConnection[b2a135b41839030c/aa15d134e6a58ba7(V1) with server4/193.167.100.100:443] 7.513 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.610/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.513 -> Packet H|0|L|92|1 CryptoFrame[0,36] 7.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.611/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.514 -> [Packet H|1|L|58|1 AckFrame[0|Δ0], Packet A|0|S0|0000000000001007df1c9fc54816ed07328f49ca|59|1 StreamFrame[0(CIB),0,17,fin]] 7.546 <- (2) Packet A|1|S0|aa15d134e6a58ba7|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 7.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.643/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.547 Finished downloading https://server4:443/cilbkqvueg at 31:22.567 on ClientConnection[b2a135b41839030c/aa15d134e6a58ba7(V1) with server4/193.167.100.100:443] 7.547 Closing ClientConnection[b2a135b41839030c/aa15d134e6a58ba7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.547 -> Packet A|1|S0|0000000000001007df1c9fc54816ed07328f49ca|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 7.547 Creating connection with server4:443 with v1 7.548 Setting up connection for downloading https://server4:443/tfoltutsmq at 31:22.568 on ClientConnection[570a2cc562937521/ba27e19a10476b80(V1) with server4/193.167.100.100:443] 7.548 Original destination connection id: 570a2cc562937521 (scid: ba27e19a10476b80) >- CryptoStream[I|ClientHello] 7.549 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.749/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.549 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.583 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.583 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.783/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.583 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) 7.586 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.683/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.586 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 7.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.686/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.589 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.589 Starting downloading https://server4:443/tfoltutsmq at 31:22.609 on ClientConnection[570a2cc562937521/ba27e19a10476b80(V1) with server4/193.167.100.100:443] 7.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.686/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.589 Discarding pn space Initial because first Handshake message is being sent 7.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.687/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.589 -> [Packet H|1|L|58|1 AckFrame[0|Δ0], Packet A|0|S0|000000000000100784872e641fefbbae3b5feb44|59|1 StreamFrame[0(CIB),0,17,fin]] 7.620 <- (2) Packet A|0|S0|ba27e19a10476b80|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007372382b2947eb5c1b4dc86cc|4812332858cedb44ea111a19fd801d18] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.621 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 7.686/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 7.711/App, because ackElicitingInFlight | RTT:33/16 7.621 Discarding pn space Handshake because HandshakeDone is received 7.641 -> Packet A|1|S0|000000000000100784872e641fefbbae3b5feb44|44|1 AckFrame[0|Δ19] 7.711 loss detection timeout handler running Sending probe 0, because no ack since 7.589. Current RTT: 33/16. 7.712 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 7.956/App, because ackElicitingInFlight | RTT:33/16 7.712 -> Packet PA|2|S0|000000000000100784872e641fefbbae3b5feb44|59|1 StreamFrame[0(CIB),0,17,fin] 7.721 <- (3) Packet A|2|S0|ba27e19a10476b80|1350|2 PingFrame[] Padding(1323) 7.740 -> Packet A|3|S0|000000000000100784872e641fefbbae3b5feb44|46|1 AckFrame[2,0|Δ19] 7.744 <- (4) Packet A|3|S0|ba27e19a10476b80|1065|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 7.744 Cwnd(-): 6000; inflight: 0 7.745 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.745 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 7.851/App, because ackElicitingInFlight | RTT:33/12 7.745 -> Packet A|4|S0|000000000000100784872e641fefbbae3b5feb44|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 7.745 Finished downloading https://server4:443/tfoltutsmq at 31:22.765 on ClientConnection[570a2cc562937521/ba27e19a10476b80(V1) with server4/193.167.100.100:443] 7.745 Closing ClientConnection[570a2cc562937521/ba27e19a10476b80(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.745 -> Packet A|5|S0|000000000000100784872e641fefbbae3b5feb44|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 7.746 Creating connection with server4:443 with v1 7.746 Setting up connection for downloading https://server4:443/xxllfosllf at 31:22.766 on ClientConnection[471c7737007e8f2e/f721ad9c16168df6(V1) with server4/193.167.100.100:443] 7.746 Original destination connection id: 471c7737007e8f2e (scid: f721ad9c16168df6) >- CryptoStream[I|ClientHello] 7.748 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.948/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.748 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.776 <- (5) Packet A|4|S0|ba27e19a10476b80|29|1 MaxStreamsFrame[B,129] 7.777 -> Packet A|6|S0|000000000000100784872e641fefbbae3b5feb44|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 7.782 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.782 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.982/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.782 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 7.785 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.882/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.785 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 7.788 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.885/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.788 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.788 Starting downloading https://server4:443/xxllfosllf at 31:22.808 on ClientConnection[471c7737007e8f2e/f721ad9c16168df6(V1) with server4/193.167.100.100:443] 7.788 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.885/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.788 Discarding pn space Initial because first Handshake message is being sent 7.789 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.886/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.789 -> [Packet H|1|L|58|1 AckFrame[0|Δ0], Packet A|0|S0|0000000000001007f8ae5cc3f1ab0664510fa383|59|1 StreamFrame[0(CIB),0,17,fin]] 7.819 <- (2) Packet A|0|S0|f721ad9c16168df6|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010070731de8a93ce088206fce737|035d616c62f4793c66aecc532e047e2e] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.820 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 7.885/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 7.911/App, because ackElicitingInFlight | RTT:33/16 7.820 Discarding pn space Handshake because HandshakeDone is received 7.840 -> Packet A|1|S0|0000000000001007f8ae5cc3f1ab0664510fa383|44|1 AckFrame[0|Δ19] 7.911 loss detection timeout handler running Sending probe 0, because no ack since 7.789. Current RTT: 33/16. 7.911 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 8.155/App, because ackElicitingInFlight | RTT:33/16 7.911 -> Packet PA|2|S0|0000000000001007f8ae5cc3f1ab0664510fa383|59|1 StreamFrame[0(CIB),0,17,fin] 7.920 <- (3) Packet A|3|S0|f721ad9c16168df6|1350|2 PingFrame[] Padding(1323) 7.940 -> Packet A|3|S0|0000000000001007f8ae5cc3f1ab0664510fa383|46|1 AckFrame[3,0|Δ19] 8.051 <- (4) Packet A|5|S0|f721ad9c16168df6|29|2 PingFrame[] Padding(2) 8.053 <- (5) Packet A|7|S0|f721ad9c16168df6|1350|2 PingFrame[] Padding(1323) 8.053 -> Packet A|4|S0|0000000000001007f8ae5cc3f1ab0664510fa383|50|1 AckFrame[7,5,3,0|Δ1] 8.154 loss detection timeout handler running Sending probe 1, because no ack since 7.911. Current RTT: 33/16. 8.154 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 8.642/App, because ackElicitingInFlight | RTT:33/16 8.154 -> Packet PA|5|S0|0000000000001007f8ae5cc3f1ab0664510fa383|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 8.643/App, because ackElicitingInFlight | RTT:33/16 8.155 -> Packet PA|6|S0|0000000000001007f8ae5cc3f1ab0664510fa383|59|1 StreamFrame[0(CIB),0,17,fin] 8.186 <- (6) Packet A|9|S0|f721ad9c16168df6|33|1 AckFrame[6-4,2-0|Δ0] 8.187 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.204 <- (7) Packet A|10|S0|f721ad9c16168df6|29|2 PingFrame[] Padding(2) 8.224 -> Packet A|7|S0|0000000000001007f8ae5cc3f1ab0664510fa383|44|1 AckFrame[10-9|Δ19] 8.316 <- (8) Packet A|12|S0|f721ad9c16168df6|1425|2 PingFrame[] Padding(1398) 8.336 -> Packet A|8|S0|0000000000001007f8ae5cc3f1ab0664510fa383|46|1 AckFrame[12,10-9|Δ19] 8.368 <- (9) Packet A|13|S0|f721ad9c16168df6|1069|3 AckFrame[8,6-4,2-0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 8.368 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.369 Finished downloading https://server4:443/xxllfosllf at 31:23.389 on ClientConnection[471c7737007e8f2e/f721ad9c16168df6(V1) with server4/193.167.100.100:443] 8.369 Closing ClientConnection[471c7737007e8f2e/f721ad9c16168df6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.369 -> Packet A|9|S0|0000000000001007f8ae5cc3f1ab0664510fa383|47|2 ConnectionCloseFrame[0|0|] AckFrame[13|Δ0] 8.369 Creating connection with server4:443 with v1 8.370 Setting up connection for downloading https://server4:443/ftjuxjzcoj at 31:23.390 on ClientConnection[96dbdd95f4bd3cb4/f6fb7a00329519ca(V1) with server4/193.167.100.100:443] 8.370 Original destination connection id: 96dbdd95f4bd3cb4 (scid: f6fb7a00329519ca) >- CryptoStream[I|ClientHello] 8.371 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.571/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.371 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.405 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.405 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.605/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.408 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.505/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.405 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 8.408 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 8.412 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.509/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.411 -> Packet H|0|L|92|1 CryptoFrame[0,36] 8.412 Starting downloading https://server4:443/ftjuxjzcoj at 31:23.432 on ClientConnection[96dbdd95f4bd3cb4/f6fb7a00329519ca(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.412 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.509/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.412 Discarding pn space Initial because first Handshake message is being sent 8.412 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.509/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.412 -> Packet A|0|S0|0000000000001007c2e6fae45702291833e20874|59|1 StreamFrame[0(CIB),0,17,fin] 8.413 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 8.508 loss detection timeout handler running Sending probe 0, because no ack since 8.411. Current RTT: 33/16. 8.508 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.509 (Probe is a handshake retransmit) 8.509 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.703/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.509 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 8.543 <- (2) Packet A|3|S0|f6fb7a00329519ca|1350|2 PingFrame[] Padding(1323) 8.563 -> Packet A|1|S0|0000000000001007c2e6fae45702291833e20874|44|1 AckFrame[3|Δ19] 8.676 <- (3) Packet A|5|S0|f6fb7a00329519ca|29|2 PingFrame[] Padding(2) 8.695 -> Packet A|2|S0|0000000000001007c2e6fae45702291833e20874|46|1 AckFrame[5,3|Δ19] 8.702 loss detection timeout handler running Sending probe 1, because no ack since 8.412. Current RTT: 33/16. 8.702 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.702 (Probe is a handshake retransmit) 8.702 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.090/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.702 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 8.703 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.091/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.703 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 8.728 <- (4) Packet A|7|S0|f6fb7a00329519ca|1350|5 AckFrame[2,0|Δ0] CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007cf6698a5564d9e92e0663626|73f158bb6bba7bdc54cd7db0c5af6e33] StreamFrame[0(CIB),0,695] 8.728 probe count not reset on ack because handshake not yet confirmed 8.728 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.116/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 8.728 State is set to Confirmed reschedule loss detection timer for PTO over 362 millis, based on 9.091/Handshake, because ackElicitingInFlight | RTT:33/16 8.729 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.729 Discarding pn space Handshake because HandshakeDone is received 8.728 <- (5) Packet A|8|S0|f6fb7a00329519ca|366|2 StreamFrame[0(CIB),695,329] StreamFrame[0(CIB),1024,0,fin] 8.729 Finished downloading https://server4:443/ftjuxjzcoj at 31:23.749 on ClientConnection[96dbdd95f4bd3cb4/f6fb7a00329519ca(V1) with server4/193.167.100.100:443] 8.729 -> Packet A|3|S0|0000000000001007c2e6fae45702291833e20874|43|1 AckFrame[8-7|Δ0] 8.729 Closing ClientConnection[96dbdd95f4bd3cb4/f6fb7a00329519ca(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.729 -> Packet A|4|S0|0000000000001007c2e6fae45702291833e20874|47|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 8.730 Creating connection with server4:443 with v1 8.730 Setting up connection for downloading https://server4:443/sbpulspqzk at 31:23.750 on ClientConnection[02481cb5711deed7/b4825964149059d2(V1) with server4/193.167.100.100:443] 8.730 Original destination connection id: 02481cb5711deed7 (scid: b4825964149059d2) >- CryptoStream[I|ClientHello] 8.732 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.932/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.732 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.761 <- (6) Packet A|9|S0|f6fb7a00329519ca|29|1 MaxStreamsFrame[B,129] 8.761 -> Packet A|5|S0|0000000000001007c2e6fae45702291833e20874|47|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 8.931 loss detection timeout handler running Sending probe 0, because no ack since 8.732. Current RTT: 100/25. 8.931 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.931 (Probe is an initial retransmit) 8.932 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.332/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.931 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.965 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 8.966 probe count not reset on ack because handshake not yet confirmed 8.966 Retransmitting CryptoFrame[0,257] on level Initial 8.966 Cwnd(-): 6000; inflight: 0 8.966 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.366/Initial, because peerAwaitingAddressValidation | RTT:100/25 8.966 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 9.160/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.966 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 8.965 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 8.968 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 9.162/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.968 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 8.971 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 9.165/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.971 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.971 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.068/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.971 Discarding pn space Initial because first Handshake message is being sent 8.972 Starting downloading https://server4:443/sbpulspqzk at 31:23.991 on ClientConnection[02481cb5711deed7/b4825964149059d2(V1) with server4/193.167.100.100:443] 8.971 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 8.972 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.069/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.972 -> Packet A|0|S0|00000000000010079ba5c582aba203122873be1d|59|1 StreamFrame[0(CIB),0,17,fin] 8.999 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.004 <- (3) Packet A|1|S0|b4825964149059d2|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 9.005 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.102/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.005 Finished downloading https://server4:443/sbpulspqzk at 31:24.025 on ClientConnection[02481cb5711deed7/b4825964149059d2(V1) with server4/193.167.100.100:443] 9.005 Closing ClientConnection[02481cb5711deed7/b4825964149059d2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.005 -> Packet A|1|S0|00000000000010079ba5c582aba203122873be1d|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 9.006 Creating connection with server4:443 with v1 9.006 Setting up connection for downloading https://server4:443/zrblyuzuga at 31:24.026 on ClientConnection[08702786c6a62fbb/b79972fa4b8f2e26(V1) with server4/193.167.100.100:443] 9.006 Original destination connection id: 08702786c6a62fbb (scid: b79972fa4b8f2e26) >- CryptoStream[I|ClientHello] 9.008 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.208/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.008 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.041 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.042 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.242/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.041 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) 9.044 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.141/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.044 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 9.046 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 9.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.046 Starting downloading https://server4:443/zrblyuzuga at 31:24.066 on ClientConnection[08702786c6a62fbb/b79972fa4b8f2e26(V1) with server4/193.167.100.100:443] 9.046 -> Packet H|0|L|92|1 CryptoFrame[0,36] 9.047 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.144/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.047 Discarding pn space Initial because first Handshake message is being sent 9.047 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 9.047 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.144/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.047 -> Packet A|0|S0|0000000000001007fb45c15c3afe06a9c0213f79|59|1 StreamFrame[0(CIB),0,17,fin] 9.078 <- (2) Packet A|0|S0|b79972fa4b8f2e26|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007a075356aa3eb507a63f23d17|9c16c18a875bc5f737c4e7a472c3ce75] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.078 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 9.143/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 9.169/App, because ackElicitingInFlight | RTT:33/16 9.078 Discarding pn space Handshake because HandshakeDone is received 9.098 -> Packet A|1|S0|0000000000001007fb45c15c3afe06a9c0213f79|44|1 AckFrame[0|Δ19] 9.104 <- (4) Packet A|3|S0|b4825964149059d2|1350|2 PingFrame[] Padding(1323) 9.104 -> Packet A|2|S0|00000000000010079ba5c582aba203122873be1d|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 9.168 loss detection timeout handler running Sending probe 0, because no ack since 9.047. Current RTT: 33/16. 9.169 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 9.413/App, because ackElicitingInFlight | RTT:33/16 9.169 -> Packet PA|2|S0|0000000000001007fb45c15c3afe06a9c0213f79|59|1 StreamFrame[0(CIB),0,17,fin] 9.201 <- (3) Packet A|3|S0|b79972fa4b8f2e26|1065|3 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 9.202 Cwnd(-): 6000; inflight: 0 9.202 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.202 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 105 millis, based on 9.308/App, because ackElicitingInFlight | RTT:33/12 9.202 -> Packet A|3|S0|0000000000001007fb45c15c3afe06a9c0213f79|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 9.202 Finished downloading https://server4:443/zrblyuzuga at 31:24.222 on ClientConnection[08702786c6a62fbb/b79972fa4b8f2e26(V1) with server4/193.167.100.100:443] 9.202 Closing ClientConnection[08702786c6a62fbb/b79972fa4b8f2e26(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.203 Creating connection with server4:443 with v1 9.203 -> Packet A|4|S0|0000000000001007fb45c15c3afe06a9c0213f79|49|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 9.204 Setting up connection for downloading https://server4:443/yamamyxpbm at 31:24.224 on ClientConnection[f1bd1aecb54454c9/713a38bbc21715d1(V1) with server4/193.167.100.100:443] 9.204 Original destination connection id: f1bd1aecb54454c9 (scid: 713a38bbc21715d1) >- CryptoStream[I|ClientHello] 9.206 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.406/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.205 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.234 <- (4) Packet A|4|S0|b79972fa4b8f2e26|29|1 MaxStreamsFrame[B,129] 9.235 -> Packet A|5|S0|0000000000001007fb45c15c3afe06a9c0213f79|49|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 9.405 loss detection timeout handler running Sending probe 0, because no ack since 9.205. Current RTT: 100/25. 9.405 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.405 (Probe is an initial retransmit) 9.405 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.805/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.405 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.805 loss detection timeout handler running Sending probe 1, because no ack since 9.405. Current RTT: 100/25. 9.805 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.805 (Probe is an initial retransmit) 9.805 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.605/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.805 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.806 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.606/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.806 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.839 <- (1) Packet I|1|L|189|2 Token=[] AckFrame[3,0|Δ0] CryptoFrame[0,123] 9.840 probe count not reset on ack because handshake not yet confirmed 9.840 Cwnd(-): 6000; inflight: 1200 -< CryptoStream[I|ServerHello] 9.839 <- (1) Packet H|1|L|1011|2 CryptoFrame[0,720] Padding(233) 9.842 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 9.845 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.845 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.845 Starting downloading https://server4:443/yamamyxpbm at 31:24.865 on ClientConnection[f1bd1aecb54454c9/713a38bbc21715d1(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 9.941/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.845 Discarding pn space Initial because first Handshake message is being sent 9.845 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 9.846 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 9.942/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.846 -> Packet A|0|S0|0000000000001007cc7d07cd86ca0838f988ace9|59|1 StreamFrame[0(CIB),0,17,fin] 9.941 loss detection timeout handler running Sending probe 0, because no ack since 9.845. Current RTT: 32/16. 9.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.941 (Probe is a handshake retransmit) 9.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 10.133/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.941 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 9.973 <- (2) Packet A|0|S0|713a38bbc21715d1|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007be9b9871ea7b83b1f6a32bab|8d46d75fbbb7d2eda2ac38447c7fd696] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.974 State is set to Confirmed reschedule loss detection timer for PTO over 113 millis, based on 10.088/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -7 millis, based on 9.967/App, because ackElicitingInFlight | RTT:32/16 9.974 loss detection timeout handler running 9.974 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 9.846. Current RTT: 32/16. 9.974 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 10.216/App, because ackElicitingInFlight | RTT:32/16 9.974 -> Packet PA|1|S0|0000000000001007cc7d07cd86ca0838f988ace9|59|1 StreamFrame[0(CIB),0,17,fin] 9.994 -> Packet A|2|S0|0000000000001007cc7d07cd86ca0838f988ace9|44|1 AckFrame[0|Δ19] 10.074 <- (3) Packet A|2|S0|713a38bbc21715d1|1350|2 PingFrame[] Padding(1323) 10.094 -> Packet A|3|S0|0000000000001007cc7d07cd86ca0838f988ace9|46|1 AckFrame[2,0|Δ19] 10.215 loss detection timeout handler running Sending probe 1, because no ack since 9.974. Current RTT: 32/16. 10.215 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 10.700/App, because ackElicitingInFlight | RTT:32/16 10.216 -> Packet PA|4|S0|0000000000001007cc7d07cd86ca0838f988ace9|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 10.701/App, because ackElicitingInFlight | RTT:32/16 10.217 -> Packet PA|5|S0|0000000000001007cc7d07cd86ca0838f988ace9|59|1 StreamFrame[0(CIB),0,17,fin] 10.355 <- (4) Packet A|6|S0|713a38bbc21715d1|1425|2 PingFrame[] Padding(1398) 10.375 -> Packet A|6|S0|0000000000001007cc7d07cd86ca0838f988ace9|48|1 AckFrame[6,2,0|Δ19] 10.406 <- (5) Packet A|7|S0|713a38bbc21715d1|1065|3 AckFrame[6-2|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 10.407 Cwnd(-): 3000; inflight: 0 10.407 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 10.407 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 120 millis, based on 10.528/App, because ackElicitingInFlight | RTT:32/16 10.407 -> Packet A|7|S0|0000000000001007cc7d07cd86ca0838f988ace9|59|1 StreamFrame[0(CIB),0,17,fin] 10.408 Finished downloading https://server4:443/yamamyxpbm at 31:25.427 on ClientConnection[f1bd1aecb54454c9/713a38bbc21715d1(V1) with server4/193.167.100.100:443] 10.408 Closing ClientConnection[f1bd1aecb54454c9/713a38bbc21715d1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.408 -> Packet A|8|S0|0000000000001007cc7d07cd86ca0838f988ace9|47|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 10.408 Creating connection with server4:443 with v1 10.409 Setting up connection for downloading https://server4:443/dsfdcjpuqn at 31:25.429 on ClientConnection[c93c66492dfc2119/7ea947a809017693(V1) with server4/193.167.100.100:443] 10.409 Original destination connection id: c93c66492dfc2119 (scid: 7ea947a809017693) >- CryptoStream[I|ClientHello] 10.410 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.610/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.410 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.463 <- (6) Packet A|8|S0|713a38bbc21715d1|32|1 AckFrame[7-2|Δ25] 10.464 -> Packet A|9|S0|0000000000001007cc7d07cd86ca0838f988ace9|47|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 10.494 <- (7) Packet A|9|S0|713a38bbc21715d1|29|1 MaxStreamsFrame[B,129] 10.495 -> Packet A|10|S0|0000000000001007cc7d07cd86ca0838f988ace9|47|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 10.610 loss detection timeout handler running Sending probe 0, because no ack since 10.410. Current RTT: 100/25. 10.610 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.610 (Probe is an initial retransmit) 10.610 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.010/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.610 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.009 loss detection timeout handler running Sending probe 1, because no ack since 10.610. Current RTT: 100/25. 11.009 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.009 (Probe is an initial retransmit) 11.010 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.810/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.010 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.811/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.011 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.640 <- (1) Packet I|1|L|57|2 Token=[] PingFrame[] Padding(2) 11.641 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 11.641 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 12.441/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.641 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) 12.441 loss detection timeout handler running Sending probe 2, because no ack since 11.011. Current RTT: 100/25. 12.441 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.441 (Probe is an initial retransmit) 12.441 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 14.041/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.441 -> Packet PI|5|L|1212|2 Token=[] CryptoFrame[0,257] Padding(896) 12.442 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 14.042/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.442 -> Packet PI|6|L|1212|2 Token=[] CryptoFrame[0,257] Padding(896) 12.474 <- (3) Packet I|3|L|189|2 Token=[] AckFrame[5,1|Δ0] CryptoFrame[0,123] 12.474 probe count not reset on ack because handshake not yet confirmed 12.475 Retransmitting CryptoFrame[0,257] on level Initial 12.475 Cwnd(-): 6000; inflight: 1212 12.475 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 14.075/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.475 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 13.243/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 12.475 -> Packet I|7|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[1|Δ0] Padding(879) -< CryptoStream[I|ServerHello] 12.478 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.474 <- (3) Packet H|3|L|1011|2 CryptoFrame[0,719] Padding(234) reschedule loss detection timer for PTO over 767 millis, based on 13.246/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 12.478 -> Packet I|8|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1139) >- CryptoStream[H|Finished] 12.481 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 13.249/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 12.480 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.481 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.481 Starting downloading https://server4:443/dsfdcjpuqn at 31:27.501 on ClientConnection[c93c66492dfc2119/7ea947a809017693(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 12.577/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 12.481 Discarding pn space Initial because first Handshake message is being sent 12.481 Discarding packet (838 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 12.481 -> Packet H|1|L|58|1 AckFrame[3|Δ0] 12.481 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 12.577/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 12.481 -> Packet A|0|S0|0000000000001007a7de2e2397bc62c35bac7e52|59|1 StreamFrame[0(CIB),0,17,fin] 12.507 Discarding packet (838 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 12.577 loss detection timeout handler running Sending probe 0, because no ack since 12.480. Current RTT: 32/16. 12.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.577 (Probe is a handshake retransmit) 12.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 12.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 12.577 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 12.609 <- (6) Packet A|0|S0|7ea947a809017693|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010077d1e92fcc24708695ea35697|b9f11f88290a23f555dff639c103ec7a] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.609 State is set to Confirmed reschedule loss detection timer for PTO over 113 millis, based on 12.723/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -7 millis, based on 12.602/App, because ackElicitingInFlight | RTT:32/16 12.610 Discarding pn space Handshake because HandshakeDone is received 12.610 loss detection timeout handler running Sending probe 0, because no ack since 12.481. Current RTT: 32/16. 12.610 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 12.852/App, because ackElicitingInFlight | RTT:32/16 12.610 -> Packet PA|1|S0|0000000000001007a7de2e2397bc62c35bac7e52|59|1 StreamFrame[0(CIB),0,17,fin] 12.629 -> Packet A|2|S0|0000000000001007a7de2e2397bc62c35bac7e52|44|1 AckFrame[0|Δ19] 12.851 loss detection timeout handler running Sending probe 1, because no ack since 12.610. Current RTT: 32/16. 12.851 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 13.335/App, because ackElicitingInFlight | RTT:32/16 12.851 -> Packet PA|3|S0|0000000000001007a7de2e2397bc62c35bac7e52|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 13.336/App, because ackElicitingInFlight | RTT:32/16 12.852 -> Packet PA|4|S0|0000000000001007a7de2e2397bc62c35bac7e52|59|1 StreamFrame[0(CIB),0,17,fin] 12.885 <- (7) Packet A|3|S0|7ea947a809017693|1067|3 AckFrame[4,2|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 12.885 Cwnd(-): 3000; inflight: 59 12.885 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.885 -> Packet A|5|S0|0000000000001007a7de2e2397bc62c35bac7e52|59|1 StreamFrame[0(CIB),0,17,fin] 12.886 Finished downloading https://server4:443/dsfdcjpuqn at 31:27.906 on ClientConnection[c93c66492dfc2119/7ea947a809017693(V1) with server4/193.167.100.100:443] 12.886 Closing ClientConnection[c93c66492dfc2119/7ea947a809017693(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.886 Creating connection with server4:443 with v1 12.886 -> Packet A|6|S0|0000000000001007a7de2e2397bc62c35bac7e52|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 12.887 Setting up connection for downloading https://server4:443/ilzlfsoufe at 31:27.907 on ClientConnection[a80f43a701d181a5/4eb0836b6389d0bd(V1) with server4/193.167.100.100:443] 12.887 Original destination connection id: a80f43a701d181a5 (scid: 4eb0836b6389d0bd) >- CryptoStream[I|ClientHello] 12.888 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.088/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.888 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.922 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.923 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.123/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.922 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) reschedule loss detection timer for PTO over 96 millis, based on 13.022/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.925 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 12.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.024/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.927 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.928 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.928 Starting downloading https://server4:443/ilzlfsoufe at 31:27.948 on ClientConnection[a80f43a701d181a5/4eb0836b6389d0bd(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 13.025/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.928 Discarding pn space Initial because first Handshake message is being sent 12.928 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 12.928 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.025/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.928 -> Packet A|0|S0|0000000000001007fcc152eb774c43a55735e263|59|1 StreamFrame[0(CIB),0,17,fin] 13.024 loss detection timeout handler running Sending probe 0, because no ack since 12.927. Current RTT: 33/16. 13.024 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.024 (Probe is a handshake retransmit) 13.025 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.025 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 13.028 <- (2) Packet H|2|L|56|2 PingFrame[] Padding(2) 13.028 -> Packet H|3|L|60|1 AckFrame[2,0|Δ0] 13.057 <- (3) Packet A|0|S0|4eb0836b6389d0bd|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010070979f824a4ce45b6ccc745e4|76f447cd07d4d3e322b445ce318e9283] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.057 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 13.172/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 13.050/App, because ackElicitingInFlight | RTT:33/16 13.057 loss detection timeout handler running 13.057 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 12.928. Current RTT: 33/16. 13.058 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 13.302/App, because ackElicitingInFlight | RTT:33/16 13.058 -> Packet PA|1|S0|0000000000001007fcc152eb774c43a55735e263|59|1 StreamFrame[0(CIB),0,17,fin] 13.071 <- (8) Packet A|6|S0|7ea947a809017693|29|2 PingFrame[] Padding(2) 13.072 -> Packet A|7|S0|0000000000001007a7de2e2397bc62c35bac7e52|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 13.077 -> Packet A|2|S0|0000000000001007fcc152eb774c43a55735e263|44|1 AckFrame[0|Δ19] 13.292 <- (4) Packet A|5|S0|4eb0836b6389d0bd|1350|2 PingFrame[] Padding(1323) 13.301 loss detection timeout handler running Sending probe 1, because no ack since 13.058. Current RTT: 33/16. 13.301 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 13.789/App, because ackElicitingInFlight | RTT:33/16 13.301 -> Packet PA|3|S0|0000000000001007fcc152eb774c43a55735e263|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 13.790/App, because ackElicitingInFlight | RTT:33/16 13.302 -> Packet PA|4|S0|0000000000001007fcc152eb774c43a55735e263|59|1 StreamFrame[0(CIB),0,17,fin] 13.311 -> Packet A|5|S0|0000000000001007fcc152eb774c43a55735e263|46|1 AckFrame[5,0|Δ19] 13.333 <- (5) Packet A|6|S0|4eb0836b6389d0bd|1065|3 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 13.334 Cwnd(-): 6000; inflight: 59 13.334 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 13.424/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 105 millis, based on 13.440/App, because ackElicitingInFlight | RTT:33/12 13.334 -> Packet A|6|S0|0000000000001007fcc152eb774c43a55735e263|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 13.334 Finished downloading https://server4:443/ilzlfsoufe at 31:28.354 on ClientConnection[a80f43a701d181a5/4eb0836b6389d0bd(V1) with server4/193.167.100.100:443] 13.334 Closing ClientConnection[a80f43a701d181a5/4eb0836b6389d0bd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.335 Creating connection with server4:443 with v1 13.335 -> Packet A|7|S0|0000000000001007fcc152eb774c43a55735e263|47|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 13.335 Setting up connection for downloading https://server4:443/sxmdvbyitj at 31:28.355 on ClientConnection[76babfb5825d03f9/4fd58c4140816c2d(V1) with server4/193.167.100.100:443] 13.335 Original destination connection id: 76babfb5825d03f9 (scid: 4fd58c4140816c2d) >- CryptoStream[I|ClientHello] 13.337 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.537/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.337 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.365 <- (6) Packet A|8|S0|4eb0836b6389d0bd|34|2 AckFrame[7-4|Δ0] MaxStreamsFrame[B,129] 13.366 -> Packet A|8|S0|0000000000001007fcc152eb774c43a55735e263|47|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 13.537 loss detection timeout handler running Sending probe 0, because no ack since 13.337. Current RTT: 100/25. 13.537 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.537 (Probe is an initial retransmit) 13.537 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.937/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.537 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.570 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 13.570 probe count not reset on ack because handshake not yet confirmed 13.570 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.970/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.570 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,719] Padding(236) 13.573 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 13.765/Handshake, because peerAwaitingAddressValidation | RTT:32/16 13.573 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 13.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 13.768/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.575 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 13.672/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.576 Discarding pn space Initial because first Handshake message is being sent 13.576 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 13.576 Starting downloading https://server4:443/sxmdvbyitj at 31:28.596 on ClientConnection[76babfb5825d03f9/4fd58c4140816c2d(V1) with server4/193.167.100.100:443] 13.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 13.673/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.576 -> Packet A|0|S0|00000000000010074c6df1d4cf24576390863277|59|1 StreamFrame[0(CIB),0,17,fin] 13.607 <- (2) Packet A|0|S0|4fd58c4140816c2d|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007cfdcb2917aec2ce2dcb30c84|202e0f5028faa4c50a9ebd46c50bb66e] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.608 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 13.671/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 13.697/App, because ackElicitingInFlight | RTT:32/16 13.608 Discarding pn space Handshake because HandshakeDone is received 13.627 -> Packet A|1|S0|00000000000010074c6df1d4cf24576390863277|44|1 AckFrame[0|Δ19] 13.697 loss detection timeout handler running Sending probe 0, because no ack since 13.576. Current RTT: 32/16. 13.697 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 13.939/App, because ackElicitingInFlight | RTT:32/16 13.697 -> Packet PA|2|S0|00000000000010074c6df1d4cf24576390863277|59|1 StreamFrame[0(CIB),0,17,fin] 13.707 <- (3) Packet A|3|S0|4fd58c4140816c2d|1350|2 PingFrame[] Padding(1323) 13.727 -> Packet A|3|S0|00000000000010074c6df1d4cf24576390863277|46|1 AckFrame[3,0|Δ19] 13.859 <- (4) Packet A|5|S0|4fd58c4140816c2d|1425|2 PingFrame[] Padding(1398) 13.879 -> Packet A|4|S0|00000000000010074c6df1d4cf24576390863277|48|1 AckFrame[5,3,0|Δ19] 13.911 <- (5) Packet A|6|S0|4fd58c4140816c2d|1067|3 AckFrame[4-3,0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 13.911 Cwnd(-): 6000; inflight: 0 13.911 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.912 Finished downloading https://server4:443/sxmdvbyitj at 31:28.932 on ClientConnection[76babfb5825d03f9/4fd58c4140816c2d(V1) with server4/193.167.100.100:443] 13.912 Closing ClientConnection[76babfb5825d03f9/4fd58c4140816c2d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.912 Creating connection with server4:443 with v1 13.912 -> Packet A|5|S0|00000000000010074c6df1d4cf24576390863277|47|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 13.913 Setting up connection for downloading https://server4:443/mbgdlwswun at 31:28.933 on ClientConnection[cc85dc407715e686/8952e4f059c99f6b(V1) with server4/193.167.100.100:443] 13.913 Original destination connection id: cc85dc407715e686 (scid: 8952e4f059c99f6b) >- CryptoStream[I|ClientHello] 13.914 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.114/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.914 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.943 <- (6) Packet A|7|S0|4fd58c4140816c2d|29|1 MaxStreamsFrame[B,129] 13.943 -> Packet A|6|S0|00000000000010074c6df1d4cf24576390863277|47|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 14.113 loss detection timeout handler running Sending probe 0, because no ack since 13.914. Current RTT: 100/25. 14.113 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.113 (Probe is an initial retransmit) 14.114 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.514/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.114 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.147 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 14.148 probe count not reset on ack because handshake not yet confirmed 14.148 Retransmitting CryptoFrame[0,257] on level Initial 14.148 Cwnd(-): 6000; inflight: 0 14.148 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.548/Initial, because peerAwaitingAddressValidation | RTT:100/25 14.148 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 14.342/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.148 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 14.147 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 14.150 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.345/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.150 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 14.153 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.347/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.153 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.153 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.153 Starting downloading https://server4:443/mbgdlwswun at 31:29.173 on ClientConnection[cc85dc407715e686/8952e4f059c99f6b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 14.250/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.153 Discarding pn space Initial because first Handshake message is being sent 14.153 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 14.154 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.251/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.154 -> Packet A|0|S0|0000000000001007dc9660b79b4fcd1a4c38cd90|59|1 StreamFrame[0(CIB),0,17,fin] 14.186 <- (2) Packet A|1|S0|8952e4f059c99f6b|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 14.186 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.283/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.187 Finished downloading https://server4:443/mbgdlwswun at 31:29.207 on ClientConnection[cc85dc407715e686/8952e4f059c99f6b(V1) with server4/193.167.100.100:443] 14.187 Closing ClientConnection[cc85dc407715e686/8952e4f059c99f6b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.187 Creating connection with server4:443 with v1 14.187 -> Packet A|1|S0|0000000000001007dc9660b79b4fcd1a4c38cd90|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 14.188 Setting up connection for downloading https://server4:443/jwrsowsukp at 31:29.208 on ClientConnection[46e00a725f106aa5/e52c12a99cd5bf9b(V1) with server4/193.167.100.100:443] 14.188 Original destination connection id: 46e00a725f106aa5 (scid: e52c12a99cd5bf9b) >- CryptoStream[I|ClientHello] 14.189 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.389/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.189 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.218 <- (3) Packet A|2|S0|8952e4f059c99f6b|29|1 MaxStreamsFrame[B,129] 14.219 -> Packet A|2|S0|0000000000001007dc9660b79b4fcd1a4c38cd90|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 14.223 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.223 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.423/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.226 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.223 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) reschedule loss detection timer for PTO over 96 millis, based on 14.323/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.226 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 14.229 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.326/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.229 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.229 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.229 Starting downloading https://server4:443/jwrsowsukp at 31:29.249 on ClientConnection[46e00a725f106aa5/e52c12a99cd5bf9b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 14.326/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.229 Discarding pn space Initial because first Handshake message is being sent 14.229 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 14.229 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.326/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.229 -> Packet A|0|S0|00000000000010072d7478f64b00a4d8ef66fb3a|59|1 StreamFrame[0(CIB),0,17,fin] 14.260 <- (2) Packet A|0|S0|e52c12a99cd5bf9b|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010077f598bb5074bed1fddd61463|1734e90fa3d63aa2c5d9113a4a6e8996] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.261 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 14.326/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 14.351/App, because ackElicitingInFlight | RTT:33/16 14.261 Discarding pn space Handshake because HandshakeDone is received 14.261 <- (3) Packet A|1|S0|e52c12a99cd5bf9b|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 14.262 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.262 Finished downloading https://server4:443/jwrsowsukp at 31:29.282 on ClientConnection[46e00a725f106aa5/e52c12a99cd5bf9b(V1) with server4/193.167.100.100:443] 14.262 -> Packet A|1|S0|00000000000010072d7478f64b00a4d8ef66fb3a|44|1 AckFrame[1-0|Δ1] 14.262 Closing ClientConnection[46e00a725f106aa5/e52c12a99cd5bf9b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.262 -> Packet A|2|S0|00000000000010072d7478f64b00a4d8ef66fb3a|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 14.263 Creating connection with server4:443 with v1 14.263 Setting up connection for downloading https://server4:443/etsnnaawnx at 31:29.283 on ClientConnection[83745594ac15756b/c31b23259b6d401e(V1) with server4/193.167.100.100:443] 14.263 Original destination connection id: 83745594ac15756b (scid: c31b23259b6d401e) >- CryptoStream[I|ClientHello] 14.264 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.464/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.264 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.298 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.298 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.499/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.298 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) reschedule loss detection timer for PTO over 96 millis, based on 14.398/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.301 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 14.304 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.303 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.304 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.304 Discarding pn space Initial because first Handshake message is being sent 14.304 Starting downloading https://server4:443/etsnnaawnx at 31:29.324 on ClientConnection[83745594ac15756b/c31b23259b6d401e(V1) with server4/193.167.100.100:443] 14.304 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 14.304 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.304 -> Packet A|0|S0|00000000000010074c7211e5d84ab5ee4c9791b1|59|1 StreamFrame[0(CIB),0,17,fin] 14.335 <- (2) Packet A|0|S0|c31b23259b6d401e|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007ef193c59a004e7c12edf6ee2|0d007b311732c5e9dd9cfd6104ffb17c] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.335 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 14.400/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 14.426/App, because ackElicitingInFlight | RTT:33/16 14.336 Discarding pn space Handshake because HandshakeDone is received 14.355 -> Packet A|1|S0|00000000000010074c7211e5d84ab5ee4c9791b1|44|1 AckFrame[0|Δ19] 14.361 <- (4) Packet A|3|S0|e52c12a99cd5bf9b|1350|2 PingFrame[] Padding(1323) 14.361 -> Packet A|3|S0|00000000000010072d7478f64b00a4d8ef66fb3a|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 14.426 loss detection timeout handler running Sending probe 0, because no ack since 14.304. Current RTT: 33/16. 14.426 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 14.670/App, because ackElicitingInFlight | RTT:33/16 14.426 -> Packet PA|2|S0|00000000000010074c7211e5d84ab5ee4c9791b1|59|1 StreamFrame[0(CIB),0,17,fin] 14.435 <- (3) Packet A|3|S0|c31b23259b6d401e|1350|2 PingFrame[] Padding(1323) 14.455 -> Packet A|3|S0|00000000000010074c7211e5d84ab5ee4c9791b1|46|1 AckFrame[3,0|Δ19] 14.482 <- (4) Packet A|4|S0|c31b23259b6d401e|32|1 AckFrame[2-0|Δ25] 14.482 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.486 <- (5) Packet A|5|S0|c31b23259b6d401e|1065|3 AckFrame[3-0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 14.487 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.487 Finished downloading https://server4:443/etsnnaawnx at 31:29.507 on ClientConnection[83745594ac15756b/c31b23259b6d401e(V1) with server4/193.167.100.100:443] 14.487 Closing ClientConnection[83745594ac15756b/c31b23259b6d401e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.487 -> Packet A|4|S0|00000000000010074c7211e5d84ab5ee4c9791b1|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 14.488 Creating connection with server4:443 with v1 14.488 Setting up connection for downloading https://server4:443/poqfiawlvn at 31:29.508 on ClientConnection[8c234f0fd327bca9/a22be16cca8549cf(V1) with server4/193.167.100.100:443] 14.488 Original destination connection id: 8c234f0fd327bca9 (scid: a22be16cca8549cf) >- CryptoStream[I|ClientHello] 14.490 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.690/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.490 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.523 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.524 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.724/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.523 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) 14.526 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.623/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.526 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 14.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.625/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.528 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.528 Starting downloading https://server4:443/poqfiawlvn at 31:29.548 on ClientConnection[8c234f0fd327bca9/a22be16cca8549cf(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 14.625/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.529 Discarding pn space Initial because first Handshake message is being sent 14.529 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 14.529 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.626/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.529 -> Packet A|0|S0|0000000000001007e51898138babb45a667cc1ef|59|1 StreamFrame[0(CIB),0,17,fin] 14.625 loss detection timeout handler running Sending probe 0, because no ack since 14.528. Current RTT: 33/16. 14.625 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.625 (Probe is a handshake retransmit) 14.625 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.819/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.625 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 14.715 <- (6) Packet A|7|S0|c31b23259b6d401e|29|2 PingFrame[] Padding(2) 14.715 <- (7) Packet A|8|S0|c31b23259b6d401e|29|2 PingFrame[] Padding(2) 14.716 -> Packet A|5|S0|00000000000010074c7211e5d84ab5ee4c9791b1|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 14.716 -> Packet A|6|S0|00000000000010074c7211e5d84ab5ee4c9791b1|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 14.747 <- (8) Packet A|10|S0|c31b23259b6d401e|29|1 MaxStreamsFrame[B,129] 14.819 loss detection timeout handler running Sending probe 1, because no ack since 14.529. Current RTT: 33/16. 14.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.819 (Probe is a handshake retransmit) 14.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 15.207/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.819 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 14.820 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 15.208/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.820 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 15.067 <- (2) Packet A|3|S0|a22be16cca8549cf|29|2 PingFrame[] Padding(2) 15.067 <- (3) Packet A|4|S0|a22be16cca8549cf|29|2 PingFrame[] Padding(2) 15.068 -> Packet A|1|S0|0000000000001007e51898138babb45a667cc1ef|43|1 AckFrame[4-3|Δ0] 15.207 loss detection timeout handler running Sending probe 2, because no ack since 14.529. Current RTT: 33/16. 15.207 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.207 (Probe is a handshake retransmit) 15.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 15.984/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.207 -> Packet PH|5|L|92|1 CryptoFrame[0,36] 15.209 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 15.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.209 -> Packet PH|6|L|92|1 CryptoFrame[0,36] 15.301 <- (4) Packet A|6|S0|a22be16cca8549cf|29|2 PingFrame[] Padding(2) 15.321 -> Packet A|2|S0|0000000000001007e51898138babb45a667cc1ef|46|1 AckFrame[6,4-3|Δ19] 15.352 <- (5) Packet A|9|S0|a22be16cca8549cf|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010078ad90d625b885a83b9e5797f|f09e649c59330c62e278af70ab9fbeda] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.353 State is set to Confirmed reschedule loss detection timer for PTO over 152 millis, based on 15.505/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -702 millis, based on 14.651/App, because ackElicitingInFlight | RTT:33/16 15.353 loss detection timeout handler running 15.353 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 14.529. Current RTT: 33/16. 15.353 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 15.597/App, because ackElicitingInFlight | RTT:33/16 15.353 -> Packet PA|3|S0|0000000000001007e51898138babb45a667cc1ef|59|1 StreamFrame[0(CIB),0,17,fin] 15.373 -> Packet A|4|S0|0000000000001007e51898138babb45a667cc1ef|48|1 AckFrame[9,6,4-3|Δ19] 15.503 <- (6) Packet A|11|S0|a22be16cca8549cf|29|2 PingFrame[] Padding(2) 15.503 <- (7) Packet A|12|S0|a22be16cca8549cf|29|2 PingFrame[] Padding(2) 15.504 -> Packet A|5|S0|0000000000001007e51898138babb45a667cc1ef|49|1 AckFrame[12-11,9,6,4-3|Δ0] 15.535 <- (8) Packet A|13|S0|a22be16cca8549cf|1067|3 AckFrame[5,3-2|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 15.536 Cwnd(-): 6000; inflight: 0 15.536 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.536 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 15.658/App, because ackElicitingInFlight | RTT:33/16 15.536 -> Packet A|6|S0|0000000000001007e51898138babb45a667cc1ef|59|1 StreamFrame[0(CIB),0,17,fin] 15.536 Finished downloading https://server4:443/poqfiawlvn at 31:30.556 on ClientConnection[8c234f0fd327bca9/a22be16cca8549cf(V1) with server4/193.167.100.100:443] 15.536 Closing ClientConnection[8c234f0fd327bca9/a22be16cca8549cf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.537 -> Packet A|7|S0|0000000000001007e51898138babb45a667cc1ef|47|2 ConnectionCloseFrame[0|0|] AckFrame[13|Δ0] 15.537 Creating connection with server4:443 with v1 15.537 Setting up connection for downloading https://server4:443/ayzrhztmse at 31:30.557 on ClientConnection[7b65f53fd6bea7a3/57577c767e322460(V1) with server4/193.167.100.100:443] 15.537 Original destination connection id: 7b65f53fd6bea7a3 (scid: 57577c767e322460) >- CryptoStream[I|ClientHello] 15.539 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.739/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.539 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.567 <- (9) Packet A|14|S0|a22be16cca8549cf|34|2 AckFrame[7-6|Δ0] MaxStreamsFrame[B,129] 15.568 -> Packet A|8|S0|0000000000001007e51898138babb45a667cc1ef|47|2 ConnectionCloseFrame[0|0|] AckFrame[13|Δ0] 15.572 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.573 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.773/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.572 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) 15.575 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.672/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.575 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 15.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.674/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.577 -> Packet H|0|L|92|1 CryptoFrame[0,36] 15.577 Starting downloading https://server4:443/ayzrhztmse at 31:30.597 on ClientConnection[7b65f53fd6bea7a3/57577c767e322460(V1) with server4/193.167.100.100:443] 15.577 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 15.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.674/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.577 Discarding pn space Initial because first Handshake message is being sent 15.578 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.675/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.578 -> Packet A|0|S0|0000000000001007bd4e3c966d81bd63c2e13501|59|1 StreamFrame[0(CIB),0,17,fin] 15.608 <- (2) Packet A|0|S0|57577c767e322460|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010070b7fa3594840ec41b2614634|04472b08f2e3b4d264ad22198fd36078] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.609 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 15.674/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 15.700/App, because ackElicitingInFlight | RTT:33/16 15.609 Discarding pn space Handshake because HandshakeDone is received 15.609 <- (3) Packet A|1|S0|57577c767e322460|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 15.610 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.610 Finished downloading https://server4:443/ayzrhztmse at 31:30.630 on ClientConnection[7b65f53fd6bea7a3/57577c767e322460(V1) with server4/193.167.100.100:443] 15.610 -> Packet A|1|S0|0000000000001007bd4e3c966d81bd63c2e13501|43|1 AckFrame[1-0|Δ0] 15.610 Closing ClientConnection[7b65f53fd6bea7a3/57577c767e322460(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.610 -> Packet A|2|S0|0000000000001007bd4e3c966d81bd63c2e13501|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 15.611 Creating connection with server4:443 with v1 15.611 Setting up connection for downloading https://server4:443/yplntwnfzm at 31:30.631 on ClientConnection[c43d58b244589e71/be043afd976fd7b8(V1) with server4/193.167.100.100:443] 15.611 Original destination connection id: c43d58b244589e71 (scid: be043afd976fd7b8) >- CryptoStream[I|ClientHello] 15.612 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.812/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.612 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.641 <- (4) Packet A|2|S0|57577c767e322460|29|1 MaxStreamsFrame[B,129] 15.641 -> Packet A|3|S0|0000000000001007bd4e3c966d81bd63c2e13501|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 15.646 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.646 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.846/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.646 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) 15.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.745/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.648 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 15.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.747/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.650 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.651 Starting downloading https://server4:443/yplntwnfzm at 31:30.670 on ClientConnection[c43d58b244589e71/be043afd976fd7b8(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 15.748/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.651 Discarding pn space Initial because first Handshake message is being sent 15.651 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 15.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.748/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.651 -> Packet A|0|S0|0000000000001007c6f23ab22f04f55773eb22d7|59|1 StreamFrame[0(CIB),0,17,fin] 15.747 loss detection timeout handler running Sending probe 0, because no ack since 15.650. Current RTT: 33/16. 15.747 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.747 (Probe is a handshake retransmit) 15.747 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.941/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.747 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 15.941 loss detection timeout handler running Sending probe 1, because no ack since 15.651. Current RTT: 33/16. 15.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.941 (Probe is a handshake retransmit) 15.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.329/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.941 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 15.942 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.330/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.942 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 16.012 <- (2) Packet A|3|S0|be043afd976fd7b8|29|2 PingFrame[] Padding(2) 16.012 <- (3) Packet A|4|S0|be043afd976fd7b8|29|2 PingFrame[] Padding(2) 16.013 -> Packet A|1|S0|0000000000001007c6f23ab22f04f55773eb22d7|43|1 AckFrame[4-3|Δ0] 16.013 <- (4) Packet A|5|S0|be043afd976fd7b8|1350|2 PingFrame[] Padding(1323) 16.033 -> Packet A|2|S0|0000000000001007c6f23ab22f04f55773eb22d7|44|1 AckFrame[5-3|Δ19] 16.157 <- (5) Packet A|8|S0|be043afd976fd7b8|29|2 PingFrame[] Padding(2) 16.177 -> Packet A|3|S0|0000000000001007c6f23ab22f04f55773eb22d7|46|1 AckFrame[8,5-3|Δ19] 16.208 <- (6) Packet A|9|S0|be043afd976fd7b8|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007a894c3b71b16beebfad30fdb|bdecc58396515f650df1f9542db4d85d] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 16.209 State is set to Confirmed reschedule loss detection timer for PTO over -69 millis, based on 16.139/App, because ackElicitingInFlight | RTT:33/16 16.209 loss detection timeout handler running Sending probe 2, because no ack since 15.651. Current RTT: 33/16. 16.209 (Probe is retransmit on level App) reschedule loss detection timer for PTO over -435 millis, based on 15.773/App, because ackElicitingInFlight | RTT:33/16 16.209 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 121 millis, based on 16.331/App, because ackElicitingInFlight | RTT:33/16 16.209 -> Packet PA|4|S0|0000000000001007c6f23ab22f04f55773eb22d7|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 121 millis, based on 16.332/App, because ackElicitingInFlight | RTT:33/16 16.210 -> Packet PA|5|S0|0000000000001007c6f23ab22f04f55773eb22d7|59|1 StreamFrame[0(CIB),0,17,fin] 16.228 -> Packet A|6|S0|0000000000001007c6f23ab22f04f55773eb22d7|46|1 AckFrame[9-8,5-3|Δ19] 16.282 <- (7) Packet A|11|S0|be043afd976fd7b8|1425|2 PingFrame[] Padding(1398) 16.301 -> Packet A|7|S0|0000000000001007c6f23ab22f04f55773eb22d7|48|1 AckFrame[11,9-8,5-3|Δ19] 16.331 loss detection timeout handler running Sending probe 0, because no ack since 16.210. Current RTT: 33/16. 16.331 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 16.575/App, because ackElicitingInFlight | RTT:33/16 16.331 -> Packet PA|8|S0|0000000000001007c6f23ab22f04f55773eb22d7|59|1 StreamFrame[0(CIB),0,17,fin] 16.433 <- (8) Packet A|13|S0|be043afd976fd7b8|1462|2 PingFrame[] Padding(1435) 16.453 -> Packet A|9|S0|0000000000001007c6f23ab22f04f55773eb22d7|50|1 AckFrame[13,11,9-8,5-3|Δ19] 16.535 <- (9) Packet A|14|S0|be043afd976fd7b8|29|2 PingFrame[] Padding(2) 16.535 <- (10) Packet A|15|S0|be043afd976fd7b8|29|2 PingFrame[] Padding(2) 16.536 -> Packet A|10|S0|0000000000001007c6f23ab22f04f55773eb22d7|49|1 AckFrame[15-13,11,9-8,5-3|Δ0] 16.536 <- (11) Packet A|16|S0|be043afd976fd7b8|1462|2 PingFrame[] Padding(1435) 16.556 -> Packet A|11|S0|0000000000001007c6f23ab22f04f55773eb22d7|50|1 AckFrame[16-13,11,9-8,5-3|Δ19] 16.567 <- (12) Packet A|17|S0|be043afd976fd7b8|1069|3 AckFrame[10,7-5,3-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 16.568 Cwnd(-): 6000; inflight: 0 16.568 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.568 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 16.690/App, because ackElicitingInFlight | RTT:33/16 16.568 -> Packet A|12|S0|0000000000001007c6f23ab22f04f55773eb22d7|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[16|Δ0] 16.569 Finished downloading https://server4:443/yplntwnfzm at 31:31.589 on ClientConnection[c43d58b244589e71/be043afd976fd7b8(V1) with server4/193.167.100.100:443] 16.569 Closing ClientConnection[c43d58b244589e71/be043afd976fd7b8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.569 -> Packet A|13|S0|0000000000001007c6f23ab22f04f55773eb22d7|47|2 ConnectionCloseFrame[0|0|] AckFrame[17-16|Δ0] 16.569 Creating connection with server4:443 with v1 16.570 Setting up connection for downloading https://server4:443/sufyvrfsyb at 31:31.590 on ClientConnection[79ea498cfbd51bbb/09cbeb681e5c9546(V1) with server4/193.167.100.100:443] 16.570 Original destination connection id: 79ea498cfbd51bbb (scid: 09cbeb681e5c9546) >- CryptoStream[I|ClientHello] 16.571 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.771/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.571 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.604 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.605 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.805/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.604 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 16.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.704/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.607 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 16.609 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.706/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.609 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.609 Starting downloading https://server4:443/sufyvrfsyb at 31:31.629 on ClientConnection[79ea498cfbd51bbb/09cbeb681e5c9546(V1) with server4/193.167.100.100:443] 16.609 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.707/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.610 Discarding pn space Initial because first Handshake message is being sent 16.610 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 16.610 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.707/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.610 -> Packet A|0|S0|0000000000001007fd8d6ffe4c47bedeace08ade|59|1 StreamFrame[0(CIB),0,17,fin] 16.641 <- (2) Packet A|0|S0|09cbeb681e5c9546|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010071b0a5f1bc5ad33816a181baa|633531df7819fe4e198c5afc1d043336] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 16.641 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 16.706/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 16.732/App, because ackElicitingInFlight | RTT:33/16 16.642 Discarding pn space Handshake because HandshakeDone is received 16.660 <- (13) Packet A|18|S0|be043afd976fd7b8|29|2 PingFrame[] Padding(2) 16.660 <- (14) Packet A|19|S0|be043afd976fd7b8|29|2 PingFrame[] Padding(2) 16.660 -> Packet A|14|S0|0000000000001007c6f23ab22f04f55773eb22d7|47|2 ConnectionCloseFrame[0|0|] AckFrame[17-16|Δ0] 16.660 -> Packet A|15|S0|0000000000001007c6f23ab22f04f55773eb22d7|47|2 ConnectionCloseFrame[0|0|] AckFrame[17-16|Δ0] 16.661 -> Packet A|1|S0|0000000000001007fd8d6ffe4c47bedeace08ade|44|1 AckFrame[0|Δ19] 16.691 <- (15) Packet A|20|S0|be043afd976fd7b8|29|1 MaxStreamsFrame[B,129] 16.732 loss detection timeout handler running Sending probe 0, because no ack since 16.610. Current RTT: 33/16. 16.732 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 16.976/App, because ackElicitingInFlight | RTT:33/16 16.732 -> Packet PA|2|S0|0000000000001007fd8d6ffe4c47bedeace08ade|59|1 StreamFrame[0(CIB),0,17,fin] 16.741 <- (3) Packet A|2|S0|09cbeb681e5c9546|1350|2 PingFrame[] Padding(1323) 16.760 -> Packet A|3|S0|0000000000001007fd8d6ffe4c47bedeace08ade|46|1 AckFrame[2,0|Δ19] 16.764 <- (4) Packet A|3|S0|09cbeb681e5c9546|1065|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 16.764 Cwnd(-): 6000; inflight: 0 16.764 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.765 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 16.871/App, because ackElicitingInFlight | RTT:33/12 16.765 -> Packet A|4|S0|0000000000001007fd8d6ffe4c47bedeace08ade|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 16.765 Finished downloading https://server4:443/sufyvrfsyb at 31:31.785 on ClientConnection[79ea498cfbd51bbb/09cbeb681e5c9546(V1) with server4/193.167.100.100:443] 16.765 Closing ClientConnection[79ea498cfbd51bbb/09cbeb681e5c9546(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.765 Creating connection with server4:443 with v1 16.765 -> Packet A|5|S0|0000000000001007fd8d6ffe4c47bedeace08ade|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 16.766 Setting up connection for downloading https://server4:443/wbdfphpgxk at 31:31.786 on ClientConnection[139aa1ac280b6c62/a350dc9484e277f2(V1) with server4/193.167.100.100:443] 16.766 Original destination connection id: 139aa1ac280b6c62 (scid: a350dc9484e277f2) >- CryptoStream[I|ClientHello] 16.767 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.967/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.767 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.796 <- (5) Packet A|4|S0|09cbeb681e5c9546|34|2 AckFrame[5-3|Δ0] MaxStreamsFrame[B,129] 16.797 -> Packet A|6|S0|0000000000001007fd8d6ffe4c47bedeace08ade|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 16.966 loss detection timeout handler running Sending probe 0, because no ack since 16.767. Current RTT: 100/25. 16.966 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.966 (Probe is an initial retransmit) 16.967 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.367/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.967 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.366 loss detection timeout handler running Sending probe 1, because no ack since 16.967. Current RTT: 100/25. 17.366 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.366 (Probe is an initial retransmit) 17.366 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.166/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.366 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.367 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.167/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.367 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.399 <- (1) Packet I|1|L|189|2 Token=[] AckFrame[2,0|Δ0] CryptoFrame[0,123] 17.399 probe count not reset on ack because handshake not yet confirmed 17.400 Cwnd(-): 6000; inflight: 1200 17.400 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.200/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 17.402 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.399 <- (1) Packet H|1|L|1011|2 CryptoFrame[0,718] Padding(235) reschedule loss detection timer for PTO over 383 millis, based on 17.786/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.402 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 17.404 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 17.788/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.404 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.405 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.405 Starting downloading https://server4:443/wbdfphpgxk at 31:32.425 on ClientConnection[139aa1ac280b6c62/a350dc9484e277f2(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 17.501/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.405 Discarding pn space Initial because first Handshake message is being sent 17.405 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 17.405 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 17.501/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.405 -> Packet A|0|S0|0000000000001007a4b1451e44b2f8406e20d6bf|59|1 StreamFrame[0(CIB),0,17,fin] 17.436 <- (2) Packet A|0|S0|a350dc9484e277f2|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010072eca42489298bf6896541814|537232356636e65561652c08875f6ebf] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.437 State is set to Confirmed reschedule loss detection timer for PTO over 62 millis, based on 17.500/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 88 millis, based on 17.526/App, because ackElicitingInFlight | RTT:32/16 17.437 Discarding pn space Handshake because HandshakeDone is received 17.457 -> Packet A|1|S0|0000000000001007a4b1451e44b2f8406e20d6bf|44|1 AckFrame[0|Δ19] 17.525 loss detection timeout handler running Sending probe 0, because no ack since 17.405. Current RTT: 32/16. 17.526 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 17.768/App, because ackElicitingInFlight | RTT:32/16 17.526 -> Packet PA|2|S0|0000000000001007a4b1451e44b2f8406e20d6bf|59|1 StreamFrame[0(CIB),0,17,fin] 17.582 <- (3) Packet A|4|S0|a350dc9484e277f2|32|1 AckFrame[2-0|Δ26] 17.582 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.717 <- (4) Packet A|7|S0|a350dc9484e277f2|1350|2 PingFrame[] Padding(1323) 17.737 -> Packet A|3|S0|0000000000001007a4b1451e44b2f8406e20d6bf|46|1 AckFrame[7,4|Δ19] 18.079 <- (5) Packet A|8|S0|a350dc9484e277f2|29|2 PingFrame[] Padding(2) 18.080 <- (6) Packet A|10|S0|a350dc9484e277f2|1350|2 PingFrame[] Padding(1323) 18.080 -> Packet A|4|S0|0000000000001007a4b1451e44b2f8406e20d6bf|48|1 AckFrame[10,8-7,4|Δ1] 18.212 <- (7) Packet A|12|S0|a350dc9484e277f2|1425|2 PingFrame[] Padding(1398) 18.232 -> Packet A|5|S0|0000000000001007a4b1451e44b2f8406e20d6bf|50|1 AckFrame[12,10,8-7,4|Δ19] 18.263 <- (8) Packet A|13|S0|a350dc9484e277f2|1067|3 AckFrame[5-4,2-0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 18.264 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.264 Finished downloading https://server4:443/wbdfphpgxk at 31:33.284 on ClientConnection[139aa1ac280b6c62/a350dc9484e277f2(V1) with server4/193.167.100.100:443] 18.264 Closing ClientConnection[139aa1ac280b6c62/a350dc9484e277f2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.265 -> Packet A|6|S0|0000000000001007a4b1451e44b2f8406e20d6bf|47|2 ConnectionCloseFrame[0|0|] AckFrame[13|Δ0] 18.265 Creating connection with server4:443 with v1 18.265 Setting up connection for downloading https://server4:443/jjjawscxjs at 31:33.285 on ClientConnection[88974b477ecb7096/f93035f128bce007(V1) with server4/193.167.100.100:443] 18.265 Original destination connection id: 88974b477ecb7096 (scid: f93035f128bce007) >- CryptoStream[I|ClientHello] 18.267 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.467/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.267 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.295 <- (9) Packet A|14|S0|a350dc9484e277f2|29|1 MaxStreamsFrame[B,129] 18.296 -> Packet A|7|S0|0000000000001007a4b1451e44b2f8406e20d6bf|47|2 ConnectionCloseFrame[0|0|] AckFrame[13|Δ0] 18.466 loss detection timeout handler running Sending probe 0, because no ack since 18.267. Current RTT: 100/25. 18.466 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.466 (Probe is an initial retransmit) 18.466 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.866/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.466 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.500 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 18.500 probe count not reset on ack because handshake not yet confirmed 18.501 Retransmitting CryptoFrame[0,257] on level Initial 18.501 Cwnd(-): 6000; inflight: 0 18.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.901/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 18.695/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.501 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 18.500 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 18.503 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.697/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.503 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 18.505 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.699/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.505 -> Packet H|0|L|92|1 CryptoFrame[0,36] 18.505 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.602/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.505 Discarding pn space Initial because first Handshake message is being sent 18.505 Starting downloading https://server4:443/jjjawscxjs at 31:33.525 on ClientConnection[88974b477ecb7096/f93035f128bce007(V1) with server4/193.167.100.100:443] 18.505 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 18.506 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.603/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.506 -> Packet A|0|S0|0000000000001007445482b73d35c62d0f946127|59|1 StreamFrame[0(CIB),0,17,fin] 18.602 loss detection timeout handler running Sending probe 0, because no ack since 18.505. Current RTT: 33/16. 18.602 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.602 (Probe is a handshake retransmit) 18.602 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.796/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.602 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 18.795 loss detection timeout handler running Sending probe 1, because no ack since 18.506. Current RTT: 33/16. 18.795 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.796 (Probe is a handshake retransmit) 18.796 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 19.184/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.796 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 18.797 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 19.185/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.797 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 18.828 <- (2) Packet A|0|S0|f93035f128bce007|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007e58681638dd9e0a1d86f16c3|59028fb7ce5a31ec79f98d387e0d23aa] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 18.829 State is set to Confirmed reschedule loss detection timer for PTO over 164 millis, based on 18.994/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -201 millis, based on 18.628/App, because ackElicitingInFlight | RTT:33/16 18.829 Discarding pn space Handshake because HandshakeDone is received 18.829 loss detection timeout handler running Sending probe 0, because no ack since 18.506. Current RTT: 33/16. 18.829 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 19.073/App, because ackElicitingInFlight | RTT:33/16 18.829 -> Packet PA|1|S0|0000000000001007445482b73d35c62d0f946127|59|1 StreamFrame[0(CIB),0,17,fin] 18.848 -> Packet A|2|S0|0000000000001007445482b73d35c62d0f946127|44|1 AckFrame[0|Δ19] 18.929 <- (3) Packet A|2|S0|f93035f128bce007|1350|2 PingFrame[] Padding(1323) 18.948 -> Packet A|3|S0|0000000000001007445482b73d35c62d0f946127|46|1 AckFrame[2,0|Δ19] 19.072 loss detection timeout handler running Sending probe 1, because no ack since 18.829. Current RTT: 33/16. 19.072 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 19.561/App, because ackElicitingInFlight | RTT:33/16 19.073 -> Packet PA|4|S0|0000000000001007445482b73d35c62d0f946127|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 19.562/App, because ackElicitingInFlight | RTT:33/16 19.074 -> Packet PA|5|S0|0000000000001007445482b73d35c62d0f946127|59|1 StreamFrame[0(CIB),0,17,fin] 19.105 <- (4) Packet A|3|S0|f93035f128bce007|1065|3 AckFrame[4-2|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 19.105 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.105 Cwnd(-): 3000; inflight: 59 reschedule loss detection timer for PTO over 90 millis, based on 19.196/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 109 millis, based on 19.215/App, because ackElicitingInFlight | RTT:33/13 19.105 -> Packet A|6|S0|0000000000001007445482b73d35c62d0f946127|59|1 StreamFrame[0(CIB),0,17,fin] 19.106 Finished downloading https://server4:443/jjjawscxjs at 31:34.126 on ClientConnection[88974b477ecb7096/f93035f128bce007(V1) with server4/193.167.100.100:443] 19.106 Closing ClientConnection[88974b477ecb7096/f93035f128bce007(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.106 -> Packet A|7|S0|0000000000001007445482b73d35c62d0f946127|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 19.106 Creating connection with server4:443 with v1 19.107 Setting up connection for downloading https://server4:443/fcewozyijj at 31:34.127 on ClientConnection[d357b2bfab6501e3/4cc163f8343581c4(V1) with server4/193.167.100.100:443] 19.107 Original destination connection id: d357b2bfab6501e3 (scid: 4cc163f8343581c4) >- CryptoStream[I|ClientHello] 19.108 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.308/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.108 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.109 <- (5) Packet A|4|S0|f93035f128bce007|1425|2 PingFrame[] Padding(1398) 19.109 -> Packet A|8|S0|0000000000001007445482b73d35c62d0f946127|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 19.130 <- (6) Packet A|5|S0|f93035f128bce007|32|1 AckFrame[5-2|Δ25] 19.130 -> Packet A|9|S0|0000000000001007445482b73d35c62d0f946127|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 19.137 <- (7) Packet A|6|S0|f93035f128bce007|34|2 AckFrame[7-5|Δ0] MaxStreamsFrame[B,129] 19.308 loss detection timeout handler running Sending probe 0, because no ack since 19.108. Current RTT: 100/25. 19.308 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.308 (Probe is an initial retransmit) 19.308 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.708/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.308 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.342 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 19.342 probe count not reset on ack because handshake not yet confirmed 19.342 Retransmitting CryptoFrame[0,257] on level Initial 19.342 Cwnd(-): 6000; inflight: 0 19.342 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.742/Initial, because peerAwaitingAddressValidation | RTT:100/25 19.342 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 19.536/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.342 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 19.342 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 19.345 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.539/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.344 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.347 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.347 Starting downloading https://server4:443/fcewozyijj at 31:34.367 on ClientConnection[d357b2bfab6501e3/4cc163f8343581c4(V1) with server4/193.167.100.100:443] 19.347 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.541/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 19.444/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.347 -> Packet H|0|L|92|1 CryptoFrame[0,36] 19.347 Discarding pn space Initial because first Handshake message is being sent 19.347 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 19.347 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.444/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.347 -> Packet A|0|S0|000000000000100752d0bcd943e224d96a128e77|59|1 StreamFrame[0(CIB),0,17,fin] 19.375 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.378 <- (3) Packet A|0|S0|4cc163f8343581c4|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000100750d9f8ded6d031615357f9d8|f3f23a18d25b827ea445162769878fbf] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.379 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 19.444/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 19.469/App, because ackElicitingInFlight | RTT:33/16 19.379 Discarding pn space Handshake because HandshakeDone is received 19.398 -> Packet A|1|S0|000000000000100752d0bcd943e224d96a128e77|44|1 AckFrame[0|Δ19] 19.469 loss detection timeout handler running Sending probe 0, because no ack since 19.347. Current RTT: 33/16. 19.469 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 19.713/App, because ackElicitingInFlight | RTT:33/16 19.469 -> Packet PA|2|S0|000000000000100752d0bcd943e224d96a128e77|59|1 StreamFrame[0(CIB),0,17,fin] 19.478 <- (4) Packet A|2|S0|4cc163f8343581c4|1350|2 PingFrame[] Padding(1323) 19.498 -> Packet A|3|S0|000000000000100752d0bcd943e224d96a128e77|46|1 AckFrame[2,0|Δ19] 19.501 <- (5) Packet A|3|S0|4cc163f8343581c4|1065|3 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 19.502 Cwnd(-): 3000; inflight: 0 19.502 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.502 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 19.608/App, because ackElicitingInFlight | RTT:33/12 19.502 -> Packet A|4|S0|000000000000100752d0bcd943e224d96a128e77|66|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2,0|Δ0] 19.502 Finished downloading https://server4:443/fcewozyijj at 31:34.522 on ClientConnection[d357b2bfab6501e3/4cc163f8343581c4(V1) with server4/193.167.100.100:443] 19.502 Closing ClientConnection[d357b2bfab6501e3/4cc163f8343581c4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.503 -> Packet A|5|S0|000000000000100752d0bcd943e224d96a128e77|49|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 19.503 Creating connection with server4:443 with v1 19.503 Setting up connection for downloading https://server4:443/xtmxcxkhlj at 31:34.523 on ClientConnection[aec4ff25fbbdc159/60464368c4be54e4(V1) with server4/193.167.100.100:443] 19.503 Original destination connection id: aec4ff25fbbdc159 (scid: 60464368c4be54e4) >- CryptoStream[I|ClientHello] 19.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.705/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.504 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.538 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.538 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.738/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.538 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) reschedule loss detection timer for PTO over 96 millis, based on 19.637/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.540 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 19.543 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.640/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.542 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.543 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.640/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.543 Discarding pn space Initial because first Handshake message is being sent 19.543 Starting downloading https://server4:443/xtmxcxkhlj at 31:34.563 on ClientConnection[aec4ff25fbbdc159/60464368c4be54e4(V1) with server4/193.167.100.100:443] 19.543 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 19.543 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.640/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.543 -> Packet A|0|S0|00000000000010079447b8eefec655de06fa93a6|59|1 StreamFrame[0(CIB),0,17,fin] 19.574 <- (2) Packet A|0|S0|60464368c4be54e4|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007eb93d31155fd2e3383e3b83b|ed1dc45e0fe8d0613564278bfe696898] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.575 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 19.639/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 19.665/App, because ackElicitingInFlight | RTT:33/16 19.575 Discarding pn space Handshake because HandshakeDone is received 19.575 <- (3) Packet A|1|S0|60464368c4be54e4|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 19.576 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.576 -> Packet A|1|S0|00000000000010079447b8eefec655de06fa93a6|43|1 AckFrame[1-0|Δ0] 19.576 Finished downloading https://server4:443/xtmxcxkhlj at 31:34.596 on ClientConnection[aec4ff25fbbdc159/60464368c4be54e4(V1) with server4/193.167.100.100:443] 19.576 Closing ClientConnection[aec4ff25fbbdc159/60464368c4be54e4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.576 -> Packet A|2|S0|00000000000010079447b8eefec655de06fa93a6|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 19.577 Creating connection with server4:443 with v1 19.577 Setting up connection for downloading https://server4:443/iayhqcsztk at 31:34.597 on ClientConnection[4ea037eb1b2a008e/f34d5c41df7fdd6e(V1) with server4/193.167.100.100:443] 19.577 Original destination connection id: 4ea037eb1b2a008e (scid: f34d5c41df7fdd6e) >- CryptoStream[I|ClientHello] 19.578 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.778/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.578 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.675 <- (4) Packet A|3|S0|60464368c4be54e4|1350|2 PingFrame[] Padding(1323) 19.675 -> Packet A|3|S0|00000000000010079447b8eefec655de06fa93a6|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 19.706 <- (5) Packet A|4|S0|60464368c4be54e4|29|1 MaxStreamsFrame[B,129] 19.707 -> Packet A|4|S0|00000000000010079447b8eefec655de06fa93a6|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 19.777 loss detection timeout handler running Sending probe 0, because no ack since 19.578. Current RTT: 100/25. 19.778 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.778 (Probe is an initial retransmit) 19.778 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.178/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.778 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.177 loss detection timeout handler running Sending probe 1, because no ack since 19.778. Current RTT: 100/25. 20.177 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.177 (Probe is an initial retransmit) 20.178 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.978/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.177 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.178 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.979/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.178 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.210 <- (1) Packet I|1|L|189|2 Token=[] AckFrame[2,0|Δ0] CryptoFrame[0,123] 20.211 probe count not reset on ack because handshake not yet confirmed 20.211 Cwnd(-): 6000; inflight: 1200 20.211 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.011/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 20.210 <- (1) Packet H|1|L|1011|2 CryptoFrame[0,718] Padding(235) 20.213 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 20.597/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 20.213 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 20.216 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 20.600/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 20.216 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.216 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 20.312/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 20.216 Starting downloading https://server4:443/iayhqcsztk at 31:35.236 on ClientConnection[4ea037eb1b2a008e/f34d5c41df7fdd6e(V1) with server4/193.167.100.100:443] 20.216 Discarding pn space Initial because first Handshake message is being sent 20.216 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 20.216 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.216 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 20.312/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 20.216 -> Packet A|0|S0|0000000000001007b116c112ec1c5c1d9a962c64|59|1 StreamFrame[0(CIB),0,17,fin] 20.247 <- (3) Packet A|0|S0|f34d5c41df7fdd6e|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007401745c3f9f3ce691ab85981|30b43d4509a4321ead0fa53b8b6418eb] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.248 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 20.312/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 20.337/App, because ackElicitingInFlight | RTT:32/16 20.248 Discarding pn space Handshake because HandshakeDone is received 20.267 -> Packet A|1|S0|0000000000001007b116c112ec1c5c1d9a962c64|44|1 AckFrame[0|Δ19] 20.337 loss detection timeout handler running Sending probe 0, because no ack since 20.216. Current RTT: 32/16. 20.337 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 20.579/App, because ackElicitingInFlight | RTT:32/16 20.337 -> Packet PA|2|S0|0000000000001007b116c112ec1c5c1d9a962c64|59|1 StreamFrame[0(CIB),0,17,fin] 20.347 <- (4) Packet A|2|S0|f34d5c41df7fdd6e|1350|2 PingFrame[] Padding(1323) 20.367 -> Packet A|3|S0|0000000000001007b116c112ec1c5c1d9a962c64|46|1 AckFrame[2,0|Δ19] 20.369 <- (5) Packet A|3|S0|f34d5c41df7fdd6e|1065|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 20.369 Cwnd(-): 3000; inflight: 0 20.369 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 20.369 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 104 millis, based on 20.474/App, because ackElicitingInFlight | RTT:32/12 20.369 -> Packet A|4|S0|0000000000001007b116c112ec1c5c1d9a962c64|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 20.370 Finished downloading https://server4:443/iayhqcsztk at 31:35.390 on ClientConnection[4ea037eb1b2a008e/f34d5c41df7fdd6e(V1) with server4/193.167.100.100:443] 20.370 Closing ClientConnection[4ea037eb1b2a008e/f34d5c41df7fdd6e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.370 -> Packet A|5|S0|0000000000001007b116c112ec1c5c1d9a962c64|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 20.370 Creating connection with server4:443 with v1 20.371 Setting up connection for downloading https://server4:443/lknqupvgyj at 31:35.391 on ClientConnection[3f58d485a1d41ae6/1a900965f8eeed19(V1) with server4/193.167.100.100:443] 20.371 Original destination connection id: 3f58d485a1d41ae6 (scid: 1a900965f8eeed19) >- CryptoStream[I|ClientHello] 20.373 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.573/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.372 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.401 <- (6) Packet A|5|S0|f34d5c41df7fdd6e|29|1 MaxStreamsFrame[B,129] 20.402 -> Packet A|6|S0|0000000000001007b116c112ec1c5c1d9a962c64|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 20.572 loss detection timeout handler running Sending probe 0, because no ack since 20.372. Current RTT: 100/25. 20.572 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.572 (Probe is an initial retransmit) 20.572 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.972/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.572 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.606 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 20.606 probe count not reset on ack because handshake not yet confirmed 20.607 Retransmitting CryptoFrame[0,257] on level Initial 20.607 Cwnd(-): 6000; inflight: 0 20.607 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.007/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.607 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 20.801/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.607 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 20.609 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.606 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) reschedule loss detection timer for PTO over 193 millis, based on 20.803/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.609 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 20.612 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.806/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.612 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.612 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.612 Starting downloading https://server4:443/lknqupvgyj at 31:35.632 on ClientConnection[3f58d485a1d41ae6/1a900965f8eeed19(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 20.709/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.612 Discarding pn space Initial because first Handshake message is being sent 20.612 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 20.613 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.710/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.613 -> Packet A|0|S0|00000000000010072a3847a95922face4bd69d3e|59|1 StreamFrame[0(CIB),0,17,fin] 20.645 <- (2) Packet A|1|S0|1a900965f8eeed19|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 20.645 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.742/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.646 Finished downloading https://server4:443/lknqupvgyj at 31:35.666 on ClientConnection[3f58d485a1d41ae6/1a900965f8eeed19(V1) with server4/193.167.100.100:443] 20.646 Closing ClientConnection[3f58d485a1d41ae6/1a900965f8eeed19(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.646 -> Packet A|1|S0|00000000000010072a3847a95922face4bd69d3e|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 20.646 Creating connection with server4:443 with v1 20.647 Setting up connection for downloading https://server4:443/wazupzpitc at 31:35.667 on ClientConnection[17fcef0db8bc786a/bff620167cde880f(V1) with server4/193.167.100.100:443] 20.647 Original destination connection id: 17fcef0db8bc786a (scid: bff620167cde880f) >- CryptoStream[I|ClientHello] 20.648 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.848/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.648 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.677 <- (3) Packet A|2|S0|1a900965f8eeed19|29|1 MaxStreamsFrame[B,129] 20.677 -> Packet A|2|S0|00000000000010072a3847a95922face4bd69d3e|47|2 ConnectionCloseFrame[0|0|] AckFrame[1|Δ0] 20.848 loss detection timeout handler running Sending probe 0, because no ack since 20.648. Current RTT: 100/25. 20.848 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.848 (Probe is an initial retransmit) 20.848 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.248/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.848 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.881 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 20.882 probe count not reset on ack because handshake not yet confirmed 20.882 Retransmitting CryptoFrame[0,257] on level Initial 20.882 Cwnd(-): 6000; inflight: 0 20.882 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.282/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.882 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 21.076/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.882 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 20.881 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 20.884 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.078/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.884 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 20.886 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.080/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.886 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.886 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.886 Starting downloading https://server4:443/wazupzpitc at 31:35.906 on ClientConnection[17fcef0db8bc786a/bff620167cde880f(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 20.983/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.886 Discarding pn space Initial because first Handshake message is being sent 20.886 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 20.887 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.984/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.887 -> Packet A|0|S0|0000000000001007eb7d65af65d2be48e321d698|59|1 StreamFrame[0(CIB),0,17,fin] 20.915 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.983 loss detection timeout handler running Sending probe 0, because no ack since 20.886. Current RTT: 33/16. 20.983 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.983 (Probe is a handshake retransmit) 20.983 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.177/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.983 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 21.115 <- (3) Packet A|2|S0|bff620167cde880f|1350|2 PingFrame[] Padding(1323) 21.135 -> Packet A|1|S0|0000000000001007eb7d65af65d2be48e321d698|44|1 AckFrame[2|Δ19] 21.176 loss detection timeout handler running Sending probe 1, because no ack since 20.887. Current RTT: 33/16. 21.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.176 (Probe is a handshake retransmit) 21.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.565/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.177 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 21.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.566/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.178 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 21.565 loss detection timeout handler running Sending probe 2, because no ack since 20.887. Current RTT: 33/16. 21.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.565 (Probe is a handshake retransmit) 21.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 22.341/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.565 -> Packet PH|5|L|92|1 CryptoFrame[0,36] 21.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 22.342/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.566 -> Packet PH|6|L|92|1 CryptoFrame[0,36] 22.137 <- (4) Packet A|3|S0|bff620167cde880f|29|2 PingFrame[] Padding(2) 22.137 <- (5) Packet A|4|S0|bff620167cde880f|29|2 PingFrame[] Padding(2) 22.137 -> Packet A|2|S0|0000000000001007eb7d65af65d2be48e321d698|43|1 AckFrame[4-2|Δ0] 22.169 <- (6) Packet A|6|S0|bff620167cde880f|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010078f614004633dda04a0e2e420|2bf997b02c95c22541e4e8e2ac05cc0c] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.170 State is set to Confirmed reschedule loss detection timer for PTO over -306 millis, based on 21.863/App, because ackElicitingInFlight | RTT:33/16 22.170 loss detection timeout handler running Sending probe 3, because no ack since 20.887. Current RTT: 33/16. reschedule loss detection timer for PTO over -1160 millis, based on 21.009/App, because ackElicitingInFlight | RTT:33/16 22.170 Discarding pn space Handshake because HandshakeDone is received 22.170 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 121 millis, based on 22.292/App, because ackElicitingInFlight | RTT:33/16 22.170 -> Packet PA|3|S0|0000000000001007eb7d65af65d2be48e321d698|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 121 millis, based on 22.293/App, because ackElicitingInFlight | RTT:33/16 22.171 -> Packet PA|4|S0|0000000000001007eb7d65af65d2be48e321d698|59|1 StreamFrame[0(CIB),0,17,fin] 22.189 -> Packet A|5|S0|0000000000001007eb7d65af65d2be48e321d698|46|1 AckFrame[6,4-2|Δ19] 22.202 <- (7) Packet A|7|S0|bff620167cde880f|1065|3 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 22.202 Cwnd(-): 3000; inflight: 59 22.202 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 22.293/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 109 millis, based on 22.312/App, because ackElicitingInFlight | RTT:33/13 22.202 -> Packet A|6|S0|0000000000001007eb7d65af65d2be48e321d698|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ0] 22.203 Finished downloading https://server4:443/wazupzpitc at 31:37.223 on ClientConnection[17fcef0db8bc786a/bff620167cde880f(V1) with server4/193.167.100.100:443] 22.203 Closing ClientConnection[17fcef0db8bc786a/bff620167cde880f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.203 -> Packet A|7|S0|0000000000001007eb7d65af65d2be48e321d698|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 22.203 Creating connection with server4:443 with v1 22.204 Setting up connection for downloading https://server4:443/uluusrkzqr at 31:37.224 on ClientConnection[97d512eef29d5c31/82fe38677a243f5e(V1) with server4/193.167.100.100:443] 22.204 Original destination connection id: 97d512eef29d5c31 (scid: 82fe38677a243f5e) >- CryptoStream[I|ClientHello] 22.205 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.406/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.205 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.234 <- (8) Packet A|8|S0|bff620167cde880f|34|2 AckFrame[7-5|Δ0] MaxStreamsFrame[B,129] 22.234 -> Packet A|8|S0|0000000000001007eb7d65af65d2be48e321d698|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 22.405 loss detection timeout handler running Sending probe 0, because no ack since 22.205. Current RTT: 100/25. 22.405 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.405 (Probe is an initial retransmit) 22.405 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.805/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.405 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.804 loss detection timeout handler running Sending probe 1, because no ack since 22.405. Current RTT: 100/25. 22.804 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.804 (Probe is an initial retransmit) 22.805 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.605/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.805 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.806 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.606/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.806 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.837 <- (1) Packet I|1|L|189|2 Token=[] AckFrame[2,0|Δ0] CryptoFrame[0,123] 22.838 probe count not reset on ack because handshake not yet confirmed 22.838 Cwnd(-): 6000; inflight: 1200 22.838 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.638/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 22.837 <- (1) Packet H|1|L|1011|2 CryptoFrame[0,720] Padding(233) 22.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 23.224/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.840 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 22.843 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 23.227/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.843 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.843 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 22.939/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.843 Discarding pn space Initial because first Handshake message is being sent 22.843 Starting downloading https://server4:443/uluusrkzqr at 31:37.863 on ClientConnection[97d512eef29d5c31/82fe38677a243f5e(V1) with server4/193.167.100.100:443] 22.843 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 22.843 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 22.939/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.843 -> Packet A|0|S0|0000000000001007d8695e24365e202c6e88cfb8|59|1 StreamFrame[0(CIB),0,17,fin] 22.874 <- (2) Packet A|0|S0|82fe38677a243f5e|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000100762aa830a749fca81a79bf855|de72c252a6e3957c08f442321c3e2231] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.875 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 22.939/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 22.964/App, because ackElicitingInFlight | RTT:32/16 22.875 Discarding pn space Handshake because HandshakeDone is received 22.875 <- (3) Packet A|1|S0|82fe38677a243f5e|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 22.876 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.876 -> Packet A|1|S0|0000000000001007d8695e24365e202c6e88cfb8|43|1 AckFrame[1-0|Δ0] 22.876 Finished downloading https://server4:443/uluusrkzqr at 31:37.896 on ClientConnection[97d512eef29d5c31/82fe38677a243f5e(V1) with server4/193.167.100.100:443] 22.876 Closing ClientConnection[97d512eef29d5c31/82fe38677a243f5e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.876 -> Packet A|2|S0|0000000000001007d8695e24365e202c6e88cfb8|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 22.876 Creating connection with server4:443 with v1 22.877 Setting up connection for downloading https://server4:443/eyzzjhlgdm at 31:37.897 on ClientConnection[d1ab910d45ee89f9/08c209d0333d5d27(V1) with server4/193.167.100.100:443] 22.877 Original destination connection id: d1ab910d45ee89f9 (scid: 08c209d0333d5d27) >- CryptoStream[I|ClientHello] 22.878 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.078/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.878 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.912 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.912 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.112/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.912 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 22.915 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.012/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.915 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 22.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.014/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.917 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.014/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.917 Discarding pn space Initial because first Handshake message is being sent 22.917 Starting downloading https://server4:443/eyzzjhlgdm at 31:37.937 on ClientConnection[d1ab910d45ee89f9/08c209d0333d5d27(V1) with server4/193.167.100.100:443] 22.917 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 22.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.015/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.917 -> Packet A|0|S0|0000000000001007ed6e5e53dba5233a7d9b4cac|59|1 StreamFrame[0(CIB),0,17,fin] 22.948 <- (2) Packet A|0|S0|08c209d0333d5d27|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000100770da7baa6f75e2942717e271|4c06f0119442705faf33328741322aa8] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.949 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 23.014/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 23.039/App, because ackElicitingInFlight | RTT:33/16 22.949 Discarding pn space Handshake because HandshakeDone is received 22.949 <- (3) Packet A|1|S0|08c209d0333d5d27|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 22.950 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.950 -> Packet A|1|S0|0000000000001007ed6e5e53dba5233a7d9b4cac|43|1 AckFrame[1-0|Δ0] 22.950 Finished downloading https://server4:443/eyzzjhlgdm at 31:37.970 on ClientConnection[d1ab910d45ee89f9/08c209d0333d5d27(V1) with server4/193.167.100.100:443] 22.950 Closing ClientConnection[d1ab910d45ee89f9/08c209d0333d5d27(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.950 -> Packet A|2|S0|0000000000001007ed6e5e53dba5233a7d9b4cac|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 22.950 Creating connection with server4:443 with v1 22.951 Setting up connection for downloading https://server4:443/tomphbwjfu at 31:37.971 on ClientConnection[d54426995fac5f12/963fd77e0770fb58(V1) with server4/193.167.100.100:443] 22.951 Original destination connection id: d54426995fac5f12 (scid: 963fd77e0770fb58) >- CryptoStream[I|ClientHello] 22.952 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.152/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.952 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.981 <- (4) Packet A|2|S0|08c209d0333d5d27|29|1 MaxStreamsFrame[B,129] 22.981 -> Packet A|3|S0|0000000000001007ed6e5e53dba5233a7d9b4cac|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 22.985 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.986 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.186/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.985 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) 22.988 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.085/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.987 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 22.989 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.087/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.989 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.990 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.990 Starting downloading https://server4:443/tomphbwjfu at 31:38.010 on ClientConnection[d54426995fac5f12/963fd77e0770fb58(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 23.087/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.990 Discarding pn space Initial because first Handshake message is being sent 22.990 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 22.990 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.087/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.990 -> Packet A|0|S0|00000000000010071f15968b55157c57996abcab|59|1 StreamFrame[0(CIB),0,17,fin] 23.021 <- (2) Packet A|0|S0|963fd77e0770fb58|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007ccc68b0a48940aa990368dc9|10cb94b429a5418813bbbdd15ddb76f9] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 23.022 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 23.086/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 23.112/App, because ackElicitingInFlight | RTT:33/16 23.022 Discarding pn space Handshake because HandshakeDone is received 23.041 -> Packet A|1|S0|00000000000010071f15968b55157c57996abcab|44|1 AckFrame[0|Δ19] 23.095 <- (4) Packet A|6|S0|82fe38677a243f5e|29|2 PingFrame[] Padding(2) 23.095 -> Packet A|3|S0|0000000000001007d8695e24365e202c6e88cfb8|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 23.112 loss detection timeout handler running Sending probe 0, because no ack since 22.990. Current RTT: 33/16. 23.112 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 23.356/App, because ackElicitingInFlight | RTT:33/16 23.112 -> Packet PA|2|S0|00000000000010071f15968b55157c57996abcab|59|1 StreamFrame[0(CIB),0,17,fin] 23.121 <- (3) Packet A|2|S0|963fd77e0770fb58|1350|2 PingFrame[] Padding(1323) 23.141 -> Packet A|3|S0|00000000000010071f15968b55157c57996abcab|46|1 AckFrame[2,0|Δ19] 23.273 <- (4) Packet A|3|S0|963fd77e0770fb58|1425|2 PingFrame[] Padding(1398) 23.292 -> Packet A|4|S0|00000000000010071f15968b55157c57996abcab|46|1 AckFrame[3-2,0|Δ19] 23.355 loss detection timeout handler running Sending probe 1, because no ack since 23.112. Current RTT: 33/16. 23.355 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 23.843/App, because ackElicitingInFlight | RTT:33/16 23.355 -> Packet PA|5|S0|00000000000010071f15968b55157c57996abcab|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 23.844/App, because ackElicitingInFlight | RTT:33/16 23.356 -> Packet PA|6|S0|00000000000010071f15968b55157c57996abcab|59|1 StreamFrame[0(CIB),0,17,fin] 23.388 <- (5) Packet A|4|S0|963fd77e0770fb58|1069|3 AckFrame[6,4-3,1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 23.389 Cwnd(-): 6000; inflight: 59 23.389 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 23.389 -> Packet A|7|S0|00000000000010071f15968b55157c57996abcab|59|1 StreamFrame[0(CIB),0,17,fin] 23.390 Finished downloading https://server4:443/tomphbwjfu at 31:38.410 on ClientConnection[d54426995fac5f12/963fd77e0770fb58(V1) with server4/193.167.100.100:443] 23.390 Closing ClientConnection[d54426995fac5f12/963fd77e0770fb58(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.390 -> Packet A|8|S0|00000000000010071f15968b55157c57996abcab|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 23.390 Creating connection with server4:443 with v1 23.391 Setting up connection for downloading https://server4:443/mhpadzixtt at 31:38.411 on ClientConnection[7e9875d2a566147a/f7237fef3f6227db(V1) with server4/193.167.100.100:443] 23.391 Original destination connection id: 7e9875d2a566147a (scid: f7237fef3f6227db) >- CryptoStream[I|ClientHello] 23.392 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.592/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.392 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.421 <- (6) Packet A|5|S0|963fd77e0770fb58|34|2 AckFrame[8-7|Δ0] MaxStreamsFrame[B,129] 23.421 -> Packet A|9|S0|00000000000010071f15968b55157c57996abcab|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 23.426 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 23.426 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.626/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.426 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 23.428 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.525/Handshake, because peerAwaitingAddressValidation | RTT:33/16 23.428 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 23.430 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.527/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.430 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.430 Starting downloading https://server4:443/mhpadzixtt at 31:38.450 on ClientConnection[7e9875d2a566147a/f7237fef3f6227db(V1) with server4/193.167.100.100:443] 23.430 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.527/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.430 Discarding pn space Initial because first Handshake message is being sent 23.430 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 23.430 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.527/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.430 -> Packet A|0|S0|0000000000001007a901b46deca9b13c88d64ec9|59|1 StreamFrame[0(CIB),0,17,fin] 23.527 loss detection timeout handler running Sending probe 0, because no ack since 23.430. Current RTT: 33/16. 23.527 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.527 (Probe is a handshake retransmit) 23.527 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.721/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.527 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 23.559 <- (2) Packet A|0|S0|f7237fef3f6227db|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010072e1cba49daca450b2c99fe4f|dc9ea073907c31550eea66a3c20179e6] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 23.559 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 23.674/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 23.552/App, because ackElicitingInFlight | RTT:33/16 23.559 loss detection timeout handler running 23.559 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 23.430. Current RTT: 33/16. 23.559 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 23.803/App, because ackElicitingInFlight | RTT:33/16 23.559 -> Packet PA|1|S0|0000000000001007a901b46deca9b13c88d64ec9|59|1 StreamFrame[0(CIB),0,17,fin] 23.579 -> Packet A|2|S0|0000000000001007a901b46deca9b13c88d64ec9|44|1 AckFrame[0|Δ19] 23.592 <- (3) Packet A|1|S0|f7237fef3f6227db|1065|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 23.592 Cwnd(-): 6000; inflight: 0 23.592 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 23.592 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 23.698/App, because ackElicitingInFlight | RTT:33/12 23.592 -> Packet A|3|S0|0000000000001007a901b46deca9b13c88d64ec9|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 23.593 Finished downloading https://server4:443/mhpadzixtt at 31:38.613 on ClientConnection[7e9875d2a566147a/f7237fef3f6227db(V1) with server4/193.167.100.100:443] 23.593 Closing ClientConnection[7e9875d2a566147a/f7237fef3f6227db(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.593 -> Packet A|4|S0|0000000000001007a901b46deca9b13c88d64ec9|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 23.593 Creating connection with server4:443 with v1 23.594 Setting up connection for downloading https://server4:443/clntrrgfuz at 31:38.614 on ClientConnection[3ffc53af8a620d84/2a2d3750d821f1bc(V1) with server4/193.167.100.100:443] 23.594 Original destination connection id: 3ffc53af8a620d84 (scid: 2a2d3750d821f1bc) >- CryptoStream[I|ClientHello] 23.597 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.797/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.597 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.624 <- (4) Packet A|2|S0|f7237fef3f6227db|34|2 AckFrame[4-2|Δ0] MaxStreamsFrame[B,129] 23.624 -> Packet A|5|S0|0000000000001007a901b46deca9b13c88d64ec9|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 23.631 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 23.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.831/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.631 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 23.634 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.731/Handshake, because peerAwaitingAddressValidation | RTT:33/16 23.634 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 23.637 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.637 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.637 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.637 Starting downloading https://server4:443/clntrrgfuz at 31:38.657 on ClientConnection[3ffc53af8a620d84/2a2d3750d821f1bc(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 23.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.637 Discarding pn space Initial because first Handshake message is being sent 23.637 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 23.638 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.735/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.638 -> Packet A|0|S0|000000000000100711242aa7fca43ab5b7414af2|59|1 StreamFrame[0(CIB),0,17,fin] 23.734 loss detection timeout handler running Sending probe 0, because no ack since 23.637. Current RTT: 33/16. 23.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.734 (Probe is a handshake retransmit) 23.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.928/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.734 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 23.766 <- (2) Packet A|0|S0|2a2d3750d821f1bc|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007502f67171dc7bea3933d8861|7e904f6ef99b51844e8a5b6eff30d516] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 23.767 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 23.882/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 23.760/App, because ackElicitingInFlight | RTT:33/16 23.767 Discarding pn space Handshake because HandshakeDone is received 23.767 loss detection timeout handler running Sending probe 0, because no ack since 23.638. Current RTT: 33/16. 23.767 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 24.011/App, because ackElicitingInFlight | RTT:33/16 23.767 -> Packet PA|1|S0|000000000000100711242aa7fca43ab5b7414af2|59|1 StreamFrame[0(CIB),0,17,fin] 23.786 -> Packet A|2|S0|000000000000100711242aa7fca43ab5b7414af2|44|1 AckFrame[0|Δ19] 23.799 <- (3) Packet A|1|S0|2a2d3750d821f1bc|1065|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 23.800 Cwnd(-): 6000; inflight: 0 23.800 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 23.800 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 23.906/App, because ackElicitingInFlight | RTT:33/12 23.800 -> Packet A|3|S0|000000000000100711242aa7fca43ab5b7414af2|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 23.800 Finished downloading https://server4:443/clntrrgfuz at 31:38.820 on ClientConnection[3ffc53af8a620d84/2a2d3750d821f1bc(V1) with server4/193.167.100.100:443] 23.800 Closing ClientConnection[3ffc53af8a620d84/2a2d3750d821f1bc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.800 -> Packet A|4|S0|000000000000100711242aa7fca43ab5b7414af2|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 23.801 Creating connection with server4:443 with v1 23.801 Setting up connection for downloading https://server4:443/ozaznaxqpr at 31:38.821 on ClientConnection[00f531150e3fcd7e/29456d07898d2f1b(V1) with server4/193.167.100.100:443] 23.801 Original destination connection id: 00f531150e3fcd7e (scid: 29456d07898d2f1b) >- CryptoStream[I|ClientHello] 23.803 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.003/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.802 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.868 <- (4) Packet A|4|S0|2a2d3750d821f1bc|1350|2 PingFrame[] Padding(1323) 23.868 -> Packet A|5|S0|000000000000100711242aa7fca43ab5b7414af2|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 23.899 <- (5) Packet A|5|S0|2a2d3750d821f1bc|29|1 MaxStreamsFrame[B,129] 23.899 -> Packet A|6|S0|000000000000100711242aa7fca43ab5b7414af2|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 24.002 loss detection timeout handler running Sending probe 0, because no ack since 23.802. Current RTT: 100/25. 24.002 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.002 (Probe is an initial retransmit) 24.002 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.402/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.002 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.035 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 24.035 probe count not reset on ack because handshake not yet confirmed 24.035 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.435/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.035 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,719] Padding(236) 24.037 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 24.229/Handshake, because peerAwaitingAddressValidation | RTT:32/16 24.037 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 24.040 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 24.232/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.040 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.040 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.136/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.040 Discarding pn space Initial because first Handshake message is being sent 24.040 Starting downloading https://server4:443/ozaznaxqpr at 31:39.060 on ClientConnection[00f531150e3fcd7e/29456d07898d2f1b(V1) with server4/193.167.100.100:443] 24.040 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 24.041 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.137/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.041 -> Packet A|0|S0|000000000000100786b53e4d0d9df7817044280a|59|1 StreamFrame[0(CIB),0,17,fin] 24.136 loss detection timeout handler running Sending probe 0, because no ack since 24.040. Current RTT: 32/16. 24.136 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.136 (Probe is a handshake retransmit) 24.136 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 24.328/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.136 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 24.328 loss detection timeout handler running Sending probe 1, because no ack since 24.041. Current RTT: 32/16. 24.328 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.328 (Probe is a handshake retransmit) 24.328 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 24.712/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.328 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 24.329 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 24.713/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.329 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 24.380 <- (2) Packet A|4|S0|29456d07898d2f1b|29|2 PingFrame[] Padding(2) 24.381 <- (3) Packet A|5|S0|29456d07898d2f1b|1350|2 PingFrame[] Padding(1323) 24.382 -> Packet A|1|S0|000000000000100786b53e4d0d9df7817044280a|43|1 AckFrame[5-4|Δ0] 24.413 <- (4) Packet A|6|S0|29456d07898d2f1b|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000100736881c3fa2b3fad03639d984|b9b72432f2167a9f981a2d106d4dac89] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.414 State is set to Confirmed reschedule loss detection timer for PTO over 111 millis, based on 24.525/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -251 millis, based on 24.162/App, because ackElicitingInFlight | RTT:32/16 24.414 Discarding pn space Handshake because HandshakeDone is received 24.414 loss detection timeout handler running Sending probe 0, because no ack since 24.041. Current RTT: 32/16. 24.414 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 24.656/App, because ackElicitingInFlight | RTT:32/16 24.414 -> Packet PA|2|S0|000000000000100786b53e4d0d9df7817044280a|59|1 StreamFrame[0(CIB),0,17,fin] 24.433 -> Packet A|3|S0|000000000000100786b53e4d0d9df7817044280a|44|1 AckFrame[6-4|Δ19] 24.446 <- (5) Packet A|7|S0|29456d07898d2f1b|1065|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 24.446 Cwnd(-): 6000; inflight: 0 24.446 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 24.446 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 104 millis, based on 24.551/App, because ackElicitingInFlight | RTT:32/12 24.446 -> Packet A|4|S0|000000000000100786b53e4d0d9df7817044280a|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ0] 24.447 Finished downloading https://server4:443/ozaznaxqpr at 31:39.467 on ClientConnection[00f531150e3fcd7e/29456d07898d2f1b(V1) with server4/193.167.100.100:443] 24.447 Closing ClientConnection[00f531150e3fcd7e/29456d07898d2f1b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.447 -> Packet A|5|S0|000000000000100786b53e4d0d9df7817044280a|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 24.447 Creating connection with server4:443 with v1 24.448 Setting up connection for downloading https://server4:443/radjuoaiwv at 31:39.468 on ClientConnection[4be0dcc90838837a/7ab6754db94380c5(V1) with server4/193.167.100.100:443] 24.448 Original destination connection id: 4be0dcc90838837a (scid: 7ab6754db94380c5) >- CryptoStream[I|ClientHello] 24.450 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.650/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.450 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.478 <- (6) Packet A|8|S0|29456d07898d2f1b|29|1 MaxStreamsFrame[B,129] 24.478 -> Packet A|6|S0|000000000000100786b53e4d0d9df7817044280a|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6|Δ0] 24.483 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.484 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.684/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.483 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) 24.486 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.583/Handshake, because peerAwaitingAddressValidation | RTT:33/16 24.486 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 24.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.585/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.488 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.585/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.488 Starting downloading https://server4:443/radjuoaiwv at 31:39.508 on ClientConnection[4be0dcc90838837a/7ab6754db94380c5(V1) with server4/193.167.100.100:443] 24.488 Discarding pn space Initial because first Handshake message is being sent 24.488 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 24.489 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.586/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.489 -> Packet A|0|S0|00000000000010079e391e5cca96c95af725af8f|59|1 StreamFrame[0(CIB),0,17,fin] 24.585 loss detection timeout handler running Sending probe 0, because no ack since 24.488. Current RTT: 33/16. 24.585 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.585 (Probe is a handshake retransmit) 24.585 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 24.779/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.585 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 24.620 <- (2) Packet A|3|S0|7ab6754db94380c5|1350|2 PingFrame[] Padding(1323) 24.640 -> Packet A|1|S0|00000000000010079e391e5cca96c95af725af8f|44|1 AckFrame[3|Δ19] 24.672 <- (3) Packet A|4|S0|7ab6754db94380c5|1350|5 AckFrame[1-0|Δ0] CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000100700bc4fd7a51fa12f904cbf77|3a279eb8066c52629d057a5b4b60c165] StreamFrame[0(CIB),0,697] 24.672 probe count not reset on ack because handshake not yet confirmed 24.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 24.866/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.672 State is set to Confirmed reschedule loss detection timer for PTO over 106 millis, based on 24.779/Handshake, because ackElicitingInFlight | RTT:33/16 24.672 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.672 Discarding pn space Handshake because HandshakeDone is received 24.672 <- (4) Packet A|5|S0|7ab6754db94380c5|364|2 StreamFrame[0(CIB),697,327] StreamFrame[0(CIB),1024,0,fin] 24.673 -> Packet A|2|S0|00000000000010079e391e5cca96c95af725af8f|43|1 AckFrame[5-4|Δ0] 24.673 Finished downloading https://server4:443/radjuoaiwv at 31:39.693 on ClientConnection[4be0dcc90838837a/7ab6754db94380c5(V1) with server4/193.167.100.100:443] 24.673 Closing ClientConnection[4be0dcc90838837a/7ab6754db94380c5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.673 -> Packet A|3|S0|00000000000010079e391e5cca96c95af725af8f|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 24.673 Creating connection with server4:443 with v1 24.674 Setting up connection for downloading https://server4:443/wdbscfxptq at 31:39.694 on ClientConnection[db30074123815137/5484e69620498671(V1) with server4/193.167.100.100:443] 24.674 Original destination connection id: db30074123815137 (scid: 5484e69620498671) >- CryptoStream[I|ClientHello] 24.675 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.875/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.675 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.703 <- (5) Packet A|6|S0|7ab6754db94380c5|29|1 MaxStreamsFrame[B,129] 24.704 -> Packet A|4|S0|00000000000010079e391e5cca96c95af725af8f|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 24.708 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.709 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.909/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.708 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) 24.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.808/Handshake, because peerAwaitingAddressValidation | RTT:33/16 24.711 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 24.713 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.713 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.713 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.713 Starting downloading https://server4:443/wdbscfxptq at 31:39.733 on ClientConnection[db30074123815137/5484e69620498671(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 24.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.713 Discarding pn space Initial because first Handshake message is being sent 24.713 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 24.713 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.713 -> Packet A|0|S0|000000000000100786c4c2dc9f9d36395ad5ebe1|59|1 StreamFrame[0(CIB),0,17,fin] 24.744 <- (2) Packet A|0|S0|5484e69620498671|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000100765970340962fa6484b3eb0dd|6dc9903816aeba83cc3449c0b267f361] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.745 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 24.810/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 24.835/App, because ackElicitingInFlight | RTT:33/16 24.745 Discarding pn space Handshake because HandshakeDone is received 24.746 <- (3) Packet A|1|S0|5484e69620498671|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 24.746 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.746 -> Packet A|1|S0|000000000000100786c4c2dc9f9d36395ad5ebe1|44|1 AckFrame[1-0|Δ1] 24.746 Finished downloading https://server4:443/wdbscfxptq at 31:39.766 on ClientConnection[db30074123815137/5484e69620498671(V1) with server4/193.167.100.100:443] 24.746 Closing ClientConnection[db30074123815137/5484e69620498671(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.747 -> Packet A|2|S0|000000000000100786c4c2dc9f9d36395ad5ebe1|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 24.747 Creating connection with server4:443 with v1 24.747 Setting up connection for downloading https://server4:443/rxzjcmjtxe at 31:39.767 on ClientConnection[0e0cb4417cf5180a/261871160c81d0b9(V1) with server4/193.167.100.100:443] 24.747 Original destination connection id: 0e0cb4417cf5180a (scid: 261871160c81d0b9) >- CryptoStream[I|ClientHello] 24.748 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.948/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.748 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.782 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.782 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.982/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.782 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 24.784 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.881/Handshake, because peerAwaitingAddressValidation | RTT:33/16 24.784 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 24.787 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.884/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.787 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.787 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.884/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.787 Discarding pn space Initial because first Handshake message is being sent 24.787 Starting downloading https://server4:443/rxzjcmjtxe at 31:39.807 on ClientConnection[0e0cb4417cf5180a/261871160c81d0b9(V1) with server4/193.167.100.100:443] 24.788 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.885/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.788 -> [Packet H|1|L|58|1 AckFrame[0|Δ0], Packet A|0|S0|0000000000001007f814f339b28eac5aaeae7fc6|59|1 StreamFrame[0(CIB),0,17,fin]] 24.884 loss detection timeout handler running Sending probe 0, because no ack since 24.787. Current RTT: 33/16. 24.884 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.884 (Probe is a handshake retransmit) 24.884 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 25.078/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.884 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 24.916 <- (2) Packet A|0|S0|261871160c81d0b9|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|000000000000100759a2db65b3d27615b96712de|e41206c2273ff8397ec8f1de0ae92c96] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.916 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 25.032/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 24.910/App, because ackElicitingInFlight | RTT:33/16 24.916 Discarding pn space Handshake because HandshakeDone is received 24.916 loss detection timeout handler running Sending probe 0, because no ack since 24.788. Current RTT: 33/16. 24.917 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 25.161/App, because ackElicitingInFlight | RTT:33/16 24.917 -> Packet PA|1|S0|0000000000001007f814f339b28eac5aaeae7fc6|59|1 StreamFrame[0(CIB),0,17,fin] 24.936 -> Packet A|2|S0|0000000000001007f814f339b28eac5aaeae7fc6|44|1 AckFrame[0|Δ19] 24.949 <- (3) Packet A|1|S0|261871160c81d0b9|1065|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 24.949 Cwnd(-): 6000; inflight: 0 24.949 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 24.949 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 25.055/App, because ackElicitingInFlight | RTT:33/12 24.949 -> Packet A|3|S0|0000000000001007f814f339b28eac5aaeae7fc6|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 24.950 Finished downloading https://server4:443/rxzjcmjtxe at 31:39.969 on ClientConnection[0e0cb4417cf5180a/261871160c81d0b9(V1) with server4/193.167.100.100:443] 24.950 Closing ClientConnection[0e0cb4417cf5180a/261871160c81d0b9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.950 -> Packet A|4|S0|0000000000001007f814f339b28eac5aaeae7fc6|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 24.950 Creating connection with server4:443 with v1 24.951 Setting up connection for downloading https://server4:443/kgryxmpcmb at 31:39.971 on ClientConnection[7c85f18b09aa666b/446389b332a419de(V1) with server4/193.167.100.100:443] 24.951 Original destination connection id: 7c85f18b09aa666b (scid: 446389b332a419de) >- CryptoStream[I|ClientHello] 24.953 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.153/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.953 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.971 <- (4) Packet A|4|S0|5484e69620498671|29|2 PingFrame[] Padding(2) 24.971 <- (5) Packet A|5|S0|5484e69620498671|29|2 PingFrame[] Padding(2) 24.971 -> Packet A|3|S0|000000000000100786c4c2dc9f9d36395ad5ebe1|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 24.972 -> Packet A|4|S0|000000000000100786c4c2dc9f9d36395ad5ebe1|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 24.972 <- (6) Packet A|6|S0|5484e69620498671|1350|2 PingFrame[] Padding(1323) 24.986 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.986 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.186/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.986 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,718] Padding(237) 24.989 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.086/Handshake, because peerAwaitingAddressValidation | RTT:33/16 24.989 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 24.991 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.088/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.991 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.991 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.991 Starting downloading https://server4:443/kgryxmpcmb at 31:40.011 on ClientConnection[7c85f18b09aa666b/446389b332a419de(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 25.088/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.991 Discarding pn space Initial because first Handshake message is being sent 24.991 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 24.992 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.089/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.992 -> Packet A|0|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|59|1 StreamFrame[0(CIB),0,17,fin] 25.002 <- (7) Packet A|7|S0|5484e69620498671|29|1 MaxStreamsFrame[B,129] 25.003 -> Packet A|5|S0|000000000000100786c4c2dc9f9d36395ad5ebe1|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 25.088 loss detection timeout handler running Sending probe 0, because no ack since 24.991. Current RTT: 33/16. 25.088 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.088 (Probe is a handshake retransmit) 25.088 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 25.282/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.088 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 25.094 <- (2) Packet H|1|L|56|2 PingFrame[] Padding(2) 25.094 <- (3) Packet H|2|L|56|2 PingFrame[] Padding(2) 25.094 -> Packet H|3|L|58|1 AckFrame[1-0|Δ0] 25.094 -> Packet H|4|L|58|1 AckFrame[2-0|Δ0] 25.220 <- (4) Packet A|2|S0|446389b332a419de|1350|2 PingFrame[] Padding(1323) 25.240 -> Packet A|1|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|44|1 AckFrame[2|Δ19] 25.281 loss detection timeout handler running Sending probe 1, because no ack since 24.992. Current RTT: 33/16. 25.281 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.281 (Probe is a handshake retransmit) 25.281 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 25.669/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.281 -> Packet PH|5|L|92|1 CryptoFrame[0,36] 25.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 25.671/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.282 -> Packet PH|6|L|92|1 CryptoFrame[0,36] 25.372 <- (5) Packet A|4|S0|446389b332a419de|1425|2 PingFrame[] Padding(1398) 25.391 -> Packet A|2|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|46|1 AckFrame[4,2|Δ19] 25.503 <- (6) Packet A|5|S0|446389b332a419de|29|2 PingFrame[] Padding(2) 25.504 <- (7) Packet A|7|S0|446389b332a419de|1425|2 PingFrame[] Padding(1398) 25.505 -> Packet A|3|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|48|1 AckFrame[7,5-4,2|Δ1] 25.670 loss detection timeout handler running Sending probe 2, because no ack since 24.992. Current RTT: 33/16. 25.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.670 (Probe is a handshake retransmit) 25.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 26.446/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.670 -> Packet PH|7|L|92|1 CryptoFrame[0,36] 25.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 26.447/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.671 -> Packet PH|8|L|92|1 CryptoFrame[0,36] 25.767 <- (8) Packet A|8|S0|446389b332a419de|29|2 PingFrame[] Padding(2) 25.768 <- (9) Packet A|10|S0|446389b332a419de|1425|2 PingFrame[] Padding(1398) 25.768 -> Packet A|4|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|50|1 AckFrame[10,8-7,5-4,2|Δ1] 26.020 <- (10) Packet A|14|S0|446389b332a419de|29|2 PingFrame[] Padding(2) 26.021 <- (11) Packet A|15|S0|446389b332a419de|1462|2 PingFrame[] Padding(1435) 26.022 -> Packet A|5|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|52|1 AckFrame[15-14,10,8-7,5-4,2|Δ1] 26.053 <- (12) Packet A|16|S0|446389b332a419de|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010073356cc348ac452bf0c02650d|7111bbbf243d7793ab1d3254e0403015] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 26.054 State is set to Confirmed reschedule loss detection timer for PTO over -85 millis, based on 25.968/App, because ackElicitingInFlight | RTT:33/16 26.054 loss detection timeout handler running Sending probe 3, because no ack since 24.992. Current RTT: 33/16. reschedule loss detection timer for PTO over -940 millis, based on 25.114/App, because ackElicitingInFlight | RTT:33/16 26.054 (Probe is retransmit on level App) 26.054 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 121 millis, based on 26.176/App, because ackElicitingInFlight | RTT:33/16 26.054 -> Packet PA|6|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 121 millis, based on 26.177/App, because ackElicitingInFlight | RTT:33/16 26.055 -> Packet PA|7|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|59|1 StreamFrame[0(CIB),0,17,fin] 26.073 -> Packet A|8|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|52|1 AckFrame[16-14,10,8-7,5-4,2|Δ19] 26.176 loss detection timeout handler running Sending probe 0, because no ack since 26.055. Current RTT: 33/16. 26.176 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 26.420/App, because ackElicitingInFlight | RTT:33/16 26.176 -> Packet PA|9|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|59|1 StreamFrame[0(CIB),0,17,fin] 26.189 <- (13) Packet A|20|S0|446389b332a419de|29|2 PingFrame[] Padding(2) 26.209 -> Packet A|10|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|54|1 AckFrame[20,16-14,10,8-7,5-4,2|Δ19] 26.232 <- (14) Packet A|21|S0|446389b332a419de|34|1 AckFrame[9-4,1|Δ25] 26.232 Cwnd(-): 6000; inflight: 0 26.233 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 26.233 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 132 millis, based on 26.366/App, because ackElicitingInFlight | RTT:36/18 26.233 -> Packet A|11|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[20|Δ0] 26.365 loss detection timeout handler running Sending probe 0, because no ack since 26.233. Current RTT: 36/18. 26.365 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 265 millis, based on 26.631/App, because ackElicitingInFlight | RTT:36/18 26.365 -> Packet PA|12|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|59|1 StreamFrame[0(CIB),0,17,fin] 26.367 <- (15) Packet A|26|S0|446389b332a419de|1471|2 PingFrame[] Padding(1444) 26.386 -> Packet A|13|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|46|1 AckFrame[26,21-20|Δ19] 26.525 <- (16) Packet A|28|S0|446389b332a419de|29|2 PingFrame[] Padding(2) 26.525 <- (17) Packet A|29|S0|446389b332a419de|29|2 PingFrame[] Padding(2) 26.525 -> Packet A|14|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|47|1 AckFrame[29-28,26,21-20|Δ0] 26.630 loss detection timeout handler running Sending probe 1, because no ack since 26.365. Current RTT: 36/18. 26.630 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 531 millis, based on 27.162/App, because ackElicitingInFlight | RTT:36/18 26.630 -> Packet PA|15|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 531 millis, based on 27.163/App, because ackElicitingInFlight | RTT:36/18 26.631 -> Packet PA|16|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|59|1 StreamFrame[0(CIB),0,17,fin] 26.662 <- (18) Packet A|30|S0|446389b332a419de|35|1 AckFrame[16,13-4,1|Δ0] 26.691 loss detection timeout handler running 26.691 Cwnd(-): 3000; inflight: 0 26.691 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.169 <- (19) Packet A|33|S0|446389b332a419de|29|2 PingFrame[] Padding(2) 27.169 <- (20) Packet A|34|S0|446389b332a419de|29|2 PingFrame[] Padding(2) 27.169 -> Packet A|17|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|45|1 AckFrame[34-33,30-28|Δ0] 27.201 <- (21) Packet A|35|S0|446389b332a419de|1069|3 AckFrame[17-16,13-4,1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 27.201 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.202 Finished downloading https://server4:443/kgryxmpcmb at 31:42.222 on ClientConnection[7c85f18b09aa666b/446389b332a419de(V1) with server4/193.167.100.100:443] 27.202 Closing ClientConnection[7c85f18b09aa666b/446389b332a419de(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.202 -> Packet A|18|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|47|2 ConnectionCloseFrame[0|0|] AckFrame[35|Δ0] 27.203 Creating connection with server4:443 with v1 27.203 Setting up connection for downloading https://server4:443/brtdgyqyko at 31:42.223 on ClientConnection[f95b358d64430f51/8f73cf80384dc84c(V1) with server4/193.167.100.100:443] 27.203 Original destination connection id: f95b358d64430f51 (scid: 8f73cf80384dc84c) >- CryptoStream[I|ClientHello] 27.204 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.404/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.204 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.233 <- (22) Packet A|36|S0|446389b332a419de|29|1 MaxStreamsFrame[B,129] 27.233 -> Packet A|19|S0|00000000000010075d2f2daf02bc0d0fb4ed9d00|47|2 ConnectionCloseFrame[0|0|] AckFrame[35|Δ0] 27.237 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 27.238 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.438/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.237 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) 27.240 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.337/Handshake, because peerAwaitingAddressValidation | RTT:33/16 27.240 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 27.242 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.339/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.242 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.242 Starting downloading https://server4:443/brtdgyqyko at 31:42.262 on ClientConnection[f95b358d64430f51/8f73cf80384dc84c(V1) with server4/193.167.100.100:443] 27.242 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.339/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.242 Discarding pn space Initial because first Handshake message is being sent 27.242 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 27.243 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.340/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.243 -> Packet A|0|S0|00000000000010077369064acc0ca784201eb370|59|1 StreamFrame[0(CIB),0,17,fin] 27.274 <- (2) Packet A|0|S0|8f73cf80384dc84c|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007807ee5768e9af02477b88522|9bdc58dd7d5d09b04b4a6d6b43f36e72] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 27.274 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 27.339/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 27.365/App, because ackElicitingInFlight | RTT:33/16 27.274 Discarding pn space Handshake because HandshakeDone is received 27.275 <- (3) Packet A|1|S0|8f73cf80384dc84c|1065|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 27.275 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.275 Finished downloading https://server4:443/brtdgyqyko at 31:42.295 on ClientConnection[f95b358d64430f51/8f73cf80384dc84c(V1) with server4/193.167.100.100:443] 27.275 Closing ClientConnection[f95b358d64430f51/8f73cf80384dc84c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.276 Creating connection with server4:443 with v1 27.276 -> Packet A|1|S0|00000000000010077369064acc0ca784201eb370|48|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ1] 27.276 Setting up connection for downloading https://server4:443/btdyaqbfzj at 31:42.296 on ClientConnection[537c77e5794cea2c/1c54d4eb07cb255d(V1) with server4/193.167.100.100:443] 27.276 Original destination connection id: 537c77e5794cea2c (scid: 1c54d4eb07cb255d) >- CryptoStream[I|ClientHello] 27.277 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.477/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.277 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.306 <- (4) Packet A|2|S0|8f73cf80384dc84c|29|1 MaxStreamsFrame[B,129] 27.307 -> Packet A|2|S0|00000000000010077369064acc0ca784201eb370|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 27.476 loss detection timeout handler running Sending probe 0, because no ack since 27.277. Current RTT: 100/25. 27.476 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.477 (Probe is an initial retransmit) 27.477 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.877/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.477 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.876 loss detection timeout handler running Sending probe 1, because no ack since 27.477. Current RTT: 100/25. 27.876 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.876 (Probe is an initial retransmit) 27.876 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.676/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.876 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.877 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.677/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.877 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.909 <- (1) Packet I|1|L|189|2 Token=[] AckFrame[2,0|Δ0] CryptoFrame[0,123] 27.909 probe count not reset on ack because handshake not yet confirmed 27.910 Cwnd(-): 6000; inflight: 1200 27.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.710/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 27.909 <- (1) Packet H|1|L|1011|2 CryptoFrame[0,719] Padding(234) 27.912 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 28.296/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.912 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 27.914 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 28.298/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.914 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.914 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 28.010/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.914 Starting downloading https://server4:443/btdyaqbfzj at 31:42.934 on ClientConnection[537c77e5794cea2c/1c54d4eb07cb255d(V1) with server4/193.167.100.100:443] 27.914 Discarding pn space Initial because first Handshake message is being sent 27.914 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 27.914 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 28.010/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.914 -> Packet A|0|S0|000000000000100748274987e97a4924802e6da2|59|1 StreamFrame[0(CIB),0,17,fin] 27.945 <- (2) Packet A|0|S0|1c54d4eb07cb255d|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010072a9ffb898ddc6af92f8d5316|fb707cf450d3be20ad4ebc7be4f07b1e] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 27.946 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 28.010/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 28.035/App, because ackElicitingInFlight | RTT:32/16 27.946 Discarding pn space Handshake because HandshakeDone is received 27.965 -> Packet A|1|S0|000000000000100748274987e97a4924802e6da2|44|1 AckFrame[0|Δ19] 28.035 loss detection timeout handler running Sending probe 0, because no ack since 27.914. Current RTT: 32/16. 28.035 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 28.277/App, because ackElicitingInFlight | RTT:32/16 28.035 -> Packet PA|2|S0|000000000000100748274987e97a4924802e6da2|59|1 StreamFrame[0(CIB),0,17,fin] 28.045 <- (3) Packet A|2|S0|1c54d4eb07cb255d|1350|2 PingFrame[] Padding(1323) 28.064 -> Packet A|3|S0|000000000000100748274987e97a4924802e6da2|46|1 AckFrame[2,0|Δ19] 28.276 loss detection timeout handler running Sending probe 1, because no ack since 28.035. Current RTT: 32/16. 28.276 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 28.760/App, because ackElicitingInFlight | RTT:32/16 28.276 -> Packet PA|4|S0|000000000000100748274987e97a4924802e6da2|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 28.761/App, because ackElicitingInFlight | RTT:32/16 28.277 -> Packet PA|5|S0|000000000000100748274987e97a4924802e6da2|59|1 StreamFrame[0(CIB),0,17,fin] 28.309 <- (4) Packet A|4|S0|1c54d4eb07cb255d|1067|3 AckFrame[4-3,1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 28.309 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 28.309 Cwnd(-): 3000; inflight: 59 reschedule loss detection timer for PTO over 88 millis, based on 28.398/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 120 millis, based on 28.430/App, because ackElicitingInFlight | RTT:32/16 28.309 -> Packet A|6|S0|000000000000100748274987e97a4924802e6da2|59|1 StreamFrame[0(CIB),0,17,fin] 28.310 Finished downloading https://server4:443/btdyaqbfzj at 31:43.330 on ClientConnection[537c77e5794cea2c/1c54d4eb07cb255d(V1) with server4/193.167.100.100:443] 28.310 Closing ClientConnection[537c77e5794cea2c/1c54d4eb07cb255d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.310 -> Packet A|7|S0|000000000000100748274987e97a4924802e6da2|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 28.311 Creating connection with server4:443 with v1 28.311 Setting up connection for downloading https://server4:443/lawkjuczpo at 31:43.331 on ClientConnection[a6c12ecd17b856c8/f92505b1c8fc42aa(V1) with server4/193.167.100.100:443] 28.311 Original destination connection id: a6c12ecd17b856c8 (scid: f92505b1c8fc42aa) >- CryptoStream[I|ClientHello] 28.312 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.512/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.312 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.333 <- (5) Packet A|6|S0|1c54d4eb07cb255d|34|1 AckFrame[5-3,1|Δ25] 28.333 -> Packet A|8|S0|000000000000100748274987e97a4924802e6da2|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 28.341 <- (6) Packet A|7|S0|1c54d4eb07cb255d|34|2 AckFrame[7-5|Δ0] MaxStreamsFrame[B,129] 28.341 -> Packet A|9|S0|000000000000100748274987e97a4924802e6da2|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 28.511 loss detection timeout handler running Sending probe 0, because no ack since 28.312. Current RTT: 100/25. 28.511 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.511 (Probe is an initial retransmit) 28.512 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.912/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.512 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.544 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 28.545 probe count not reset on ack because handshake not yet confirmed 28.545 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.945/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 28.544 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,720] Padding(235) 28.547 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 28.739/Handshake, because peerAwaitingAddressValidation | RTT:32/16 28.547 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 28.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 28.741/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.549 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.549 Starting downloading https://server4:443/lawkjuczpo at 31:43.569 on ClientConnection[a6c12ecd17b856c8/f92505b1c8fc42aa(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 28.645/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.549 Discarding pn space Initial because first Handshake message is being sent 28.549 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 28.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 28.645/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.549 -> Packet A|0|S0|00000000000010073dd5598fa884ee3491a411cc|59|1 StreamFrame[0(CIB),0,17,fin] 28.580 <- (2) Packet A|0|S0|f92505b1c8fc42aa|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007bb9fe977ffc8b72528e8b21a|6f1b2929cbb93b1a7cb5289cd3d492f3] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 28.581 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 28.645/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 28.670/App, because ackElicitingInFlight | RTT:32/16 28.581 Discarding pn space Handshake because HandshakeDone is received 28.600 -> Packet A|1|S0|00000000000010073dd5598fa884ee3491a411cc|44|1 AckFrame[0|Δ19] 28.670 loss detection timeout handler running Sending probe 0, because no ack since 28.549. Current RTT: 32/16. 28.670 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 28.912/App, because ackElicitingInFlight | RTT:32/16 28.670 -> Packet PA|2|S0|00000000000010073dd5598fa884ee3491a411cc|59|1 StreamFrame[0(CIB),0,17,fin] 28.680 <- (3) Packet A|2|S0|f92505b1c8fc42aa|1350|2 PingFrame[] Padding(1323) 28.699 -> Packet A|3|S0|00000000000010073dd5598fa884ee3491a411cc|46|1 AckFrame[2,0|Δ19] 28.832 <- (4) Packet A|3|S0|f92505b1c8fc42aa|1425|2 PingFrame[] Padding(1398) 28.851 -> Packet A|4|S0|00000000000010073dd5598fa884ee3491a411cc|46|1 AckFrame[3-2,0|Δ19] 28.911 loss detection timeout handler running Sending probe 1, because no ack since 28.670. Current RTT: 32/16. 28.911 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 29.395/App, because ackElicitingInFlight | RTT:32/16 28.911 -> Packet PA|5|S0|00000000000010073dd5598fa884ee3491a411cc|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 29.396/App, because ackElicitingInFlight | RTT:32/16 28.912 -> Packet PA|6|S0|00000000000010073dd5598fa884ee3491a411cc|59|1 StreamFrame[0(CIB),0,17,fin] 28.944 <- (5) Packet A|4|S0|f92505b1c8fc42aa|1069|3 AckFrame[6,4-3,1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 28.945 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 28.945 Cwnd(-): 6000; inflight: 59 28.945 -> Packet A|7|S0|00000000000010073dd5598fa884ee3491a411cc|59|1 StreamFrame[0(CIB),0,17,fin] 28.945 Finished downloading https://server4:443/lawkjuczpo at 31:43.965 on ClientConnection[a6c12ecd17b856c8/f92505b1c8fc42aa(V1) with server4/193.167.100.100:443] 28.946 Closing ClientConnection[a6c12ecd17b856c8/f92505b1c8fc42aa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.946 -> Packet A|8|S0|00000000000010073dd5598fa884ee3491a411cc|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 28.946 Creating connection with server4:443 with v1 28.947 Setting up connection for downloading https://server4:443/prephzmyvj at 31:43.967 on ClientConnection[e6b7c78368ac4ea3/e12c8d72281551a0(V1) with server4/193.167.100.100:443] 28.947 Original destination connection id: e6b7c78368ac4ea3 (scid: e12c8d72281551a0) >- CryptoStream[I|ClientHello] 28.948 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.148/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.948 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.977 <- (6) Packet A|5|S0|f92505b1c8fc42aa|29|1 MaxStreamsFrame[B,129] 28.977 -> Packet A|9|S0|00000000000010073dd5598fa884ee3491a411cc|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 29.147 loss detection timeout handler running Sending probe 0, because no ack since 28.948. Current RTT: 100/25. 29.147 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.147 (Probe is an initial retransmit) 29.147 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.547/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.147 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.180 <- (1) Packet I|1|L|187|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 29.180 probe count not reset on ack because handshake not yet confirmed 29.180 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.580/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 29.180 <- (1) Packet H|1|L|1013|2 CryptoFrame[0,718] Padding(237) 29.182 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 29.374/Handshake, because peerAwaitingAddressValidation | RTT:32/16 29.182 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 29.184 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 29.376/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 29.184 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.185 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.185 Starting downloading https://server4:443/prephzmyvj at 31:44.205 on ClientConnection[e6b7c78368ac4ea3/e12c8d72281551a0(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 29.281/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 29.185 Discarding pn space Initial because first Handshake message is being sent 29.185 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 29.185 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 29.281/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 29.185 -> Packet A|0|S0|0000000000001007b45964f07072edf470a69e56|59|1 StreamFrame[0(CIB),0,17,fin] 29.280 loss detection timeout handler running Sending probe 0, because no ack since 29.184. Current RTT: 32/16. 29.280 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.280 (Probe is a handshake retransmit) 29.281 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 29.473/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 29.280 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 29.312 <- (2) Packet A|0|S0|e12c8d72281551a0|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|0000000000001007a33f5678558bfc95526b7db2|52c15daf7230da8899be9a0b0dcf9500] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 29.313 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 29.427/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -6 millis, based on 29.306/App, because ackElicitingInFlight | RTT:32/16 29.313 Discarding pn space Handshake because HandshakeDone is received 29.313 loss detection timeout handler running Sending probe 0, because no ack since 29.185. Current RTT: 32/16. 29.313 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 29.555/App, because ackElicitingInFlight | RTT:32/16 29.313 -> Packet PA|1|S0|0000000000001007b45964f07072edf470a69e56|59|1 StreamFrame[0(CIB),0,17,fin] 29.332 -> Packet A|2|S0|0000000000001007b45964f07072edf470a69e56|44|1 AckFrame[0|Δ19] 29.554 loss detection timeout handler running Sending probe 1, because no ack since 29.313. Current RTT: 32/16. 29.554 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 30.038/App, because ackElicitingInFlight | RTT:32/16 29.554 -> Packet PA|3|S0|0000000000001007b45964f07072edf470a69e56|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 30.039/App, because ackElicitingInFlight | RTT:32/16 29.555 -> Packet PA|4|S0|0000000000001007b45964f07072edf470a69e56|59|1 StreamFrame[0(CIB),0,17,fin] 29.586 <- (3) Packet A|4|S0|e12c8d72281551a0|31|1 AckFrame[4-1|Δ0] 29.586 Cwnd(-): 6000; inflight: 0 29.587 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.587 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 108 millis, based on 29.696/App, because ackElicitingInFlight | RTT:32/13 29.587 -> Packet A|5|S0|0000000000001007b45964f07072edf470a69e56|59|1 StreamFrame[0(CIB),0,17,fin] 29.592 <- (4) Packet A|6|S0|e12c8d72281551a0|29|2 PingFrame[] Padding(2) 29.612 -> Packet A|6|S0|0000000000001007b45964f07072edf470a69e56|46|1 AckFrame[6,4|Δ19] 29.643 <- (5) Packet A|8|S0|e12c8d72281551a0|1065|3 AckFrame[6-1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 29.644 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.644 Finished downloading https://server4:443/prephzmyvj at 31:44.664 on ClientConnection[e6b7c78368ac4ea3/e12c8d72281551a0(V1) with server4/193.167.100.100:443] 29.644 Closing ClientConnection[e6b7c78368ac4ea3/e12c8d72281551a0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.644 -> Packet A|7|S0|0000000000001007b45964f07072edf470a69e56|47|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 29.645 Creating connection with server4:443 with v1 29.645 Setting up connection for downloading https://server4:443/pfhsaigbfm at 31:44.665 on ClientConnection[1888951d957d2197/13ff1752bc5abc69(V1) with server4/193.167.100.100:443] 29.645 Original destination connection id: 1888951d957d2197 (scid: 13ff1752bc5abc69) >- CryptoStream[I|ClientHello] 29.646 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.846/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.646 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.845 loss detection timeout handler running Sending probe 0, because no ack since 29.646. Current RTT: 100/25. 29.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.845 (Probe is an initial retransmit) 29.846 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 30.246/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.846 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.245 loss detection timeout handler running Sending probe 1, because no ack since 29.846. Current RTT: 100/25. 30.245 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.245 (Probe is an initial retransmit) 30.245 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 31.045/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.245 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.246 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 31.046/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.246 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.279 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 30.279 probe count not reset on ack because handshake not yet confirmed 30.279 Retransmitting CryptoFrame[0,257] on level Initial 30.280 Cwnd(-): 6000; inflight: 1200 30.280 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 31.080/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.280 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 30.668/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.280 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 30.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.279 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,719] Padding(236) reschedule loss detection timer for PTO over 387 millis, based on 30.670/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.282 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 30.284 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 30.672/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.284 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.284 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.381/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.284 Discarding pn space Initial because first Handshake message is being sent 30.284 Starting downloading https://server4:443/pfhsaigbfm at 31:45.304 on ClientConnection[1888951d957d2197/13ff1752bc5abc69(V1) with server4/193.167.100.100:443] 30.284 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 30.284 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.382/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.285 -> Packet A|0|S0|000000000000100732a8e7ca2514b9167f8676d6|59|1 StreamFrame[0(CIB),0,17,fin] 30.381 loss detection timeout handler running Sending probe 0, because no ack since 30.284. Current RTT: 33/16. 30.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.381 (Probe is a handshake retransmit) 30.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 30.575/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.381 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 30.574 loss detection timeout handler running Sending probe 1, because no ack since 30.285. Current RTT: 33/16. 30.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.574 (Probe is a handshake retransmit) 30.575 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 30.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.575 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 30.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 30.964/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.576 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 30.606 <- (3) Packet A|0|S0|13ff1752bc5abc69|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010070e4c3a8528d206c6d56854bb|eeef3350c88473eebf41762423533ec2] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 30.607 State is set to Confirmed reschedule loss detection timer for PTO over 165 millis, based on 30.773/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -200 millis, based on 30.407/App, because ackElicitingInFlight | RTT:33/16 30.607 Discarding pn space Handshake because HandshakeDone is received 30.607 loss detection timeout handler running Sending probe 0, because no ack since 30.285. Current RTT: 33/16. 30.607 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 30.851/App, because ackElicitingInFlight | RTT:33/16 30.607 -> Packet PA|1|S0|000000000000100732a8e7ca2514b9167f8676d6|59|1 StreamFrame[0(CIB),0,17,fin] 30.626 -> Packet A|2|S0|000000000000100732a8e7ca2514b9167f8676d6|44|1 AckFrame[0|Δ19] 30.707 <- (4) Packet A|2|S0|13ff1752bc5abc69|1350|2 PingFrame[] Padding(1323) 30.726 -> Packet A|3|S0|000000000000100732a8e7ca2514b9167f8676d6|46|1 AckFrame[2,0|Δ19] 30.850 loss detection timeout handler running Sending probe 1, because no ack since 30.607. Current RTT: 33/16. 30.850 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 31.339/App, because ackElicitingInFlight | RTT:33/16 30.851 -> Packet PA|4|S0|000000000000100732a8e7ca2514b9167f8676d6|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 31.340/App, because ackElicitingInFlight | RTT:33/16 30.852 -> Packet PA|5|S0|000000000000100732a8e7ca2514b9167f8676d6|59|1 StreamFrame[0(CIB),0,17,fin] 30.883 <- (5) Packet A|4|S0|13ff1752bc5abc69|1065|3 AckFrame[4-3|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 30.883 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 30.883 Cwnd(-): 3000; inflight: 59 reschedule loss detection timer for PTO over 90 millis, based on 30.974/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 121 millis, based on 31.005/App, because ackElicitingInFlight | RTT:33/12 30.883 -> Packet A|6|S0|000000000000100732a8e7ca2514b9167f8676d6|59|1 StreamFrame[0(CIB),0,17,fin] 30.884 Finished downloading https://server4:443/pfhsaigbfm at 31:45.904 on ClientConnection[1888951d957d2197/13ff1752bc5abc69(V1) with server4/193.167.100.100:443] 30.884 Closing ClientConnection[1888951d957d2197/13ff1752bc5abc69(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.884 -> Packet A|7|S0|000000000000100732a8e7ca2514b9167f8676d6|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 30.884 Creating connection with server4:443 with v1 30.885 Setting up connection for downloading https://server4:443/blcjzhqplr at 31:45.905 on ClientConnection[96758ba7ea0d74e8/b391bfb964a7cf63(V1) with server4/193.167.100.100:443] 30.885 Original destination connection id: 96758ba7ea0d74e8 (scid: b391bfb964a7cf63) >- CryptoStream[I|ClientHello] 30.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.086/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.886 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.907 <- (6) Packet A|5|S0|13ff1752bc5abc69|32|1 AckFrame[5-3|Δ26] 30.908 -> Packet A|8|S0|000000000000100732a8e7ca2514b9167f8676d6|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 30.915 <- (7) Packet A|6|S0|13ff1752bc5abc69|34|2 AckFrame[7-5|Δ0] MaxStreamsFrame[B,129] 30.915 -> Packet A|9|S0|000000000000100732a8e7ca2514b9167f8676d6|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 30.919 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 30.920 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.120/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 30.919 <- (1) Packet H|0|L|1013|2 CryptoFrame[0,720] Padding(235) 30.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.019/Handshake, because peerAwaitingAddressValidation | RTT:33/16 30.922 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 30.924 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.021/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.924 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.925 Starting downloading https://server4:443/blcjzhqplr at 31:45.945 on ClientConnection[96758ba7ea0d74e8/b391bfb964a7cf63(V1) with server4/193.167.100.100:443] 30.925 Discarding pn space Initial because first Handshake message is being sent 30.925 -> Packet H|1|L|58|1 AckFrame[0|Δ0] 30.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 31.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.925 -> Packet A|0|S0|0000000000001007d430cdc99e4d241bb4a86121|59|1 StreamFrame[0(CIB),0,17,fin] 31.021 loss detection timeout handler running Sending probe 0, because no ack since 30.924. Current RTT: 33/16. 31.021 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.021 (Probe is a handshake retransmit) 31.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 31.216/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 31.021 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 31.215 loss detection timeout handler running Sending probe 1, because no ack since 30.925. Current RTT: 33/16. 31.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.215 (Probe is a handshake retransmit) 31.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 31.603/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 31.215 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 31.216 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 31.604/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 31.216 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 31.247 <- (2) Packet A|0|S0|b391bfb964a7cf63|643|3 CryptoFrame[0,572] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|00000000000010078d82f15eb06ad6f5f6a2f8ab|e53e9eaee0127518ac44ca801eb735d9] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 31.248 State is set to Confirmed reschedule loss detection timer for PTO over 165 millis, based on 31.413/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -200 millis, based on 31.047/App, because ackElicitingInFlight | RTT:33/16 31.248 loss detection timeout handler running 31.248 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 30.925. Current RTT: 33/16. 31.248 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 31.492/App, because ackElicitingInFlight | RTT:33/16 31.248 -> Packet PA|1|S0|0000000000001007d430cdc99e4d241bb4a86121|59|1 StreamFrame[0(CIB),0,17,fin] 31.267 -> Packet A|2|S0|0000000000001007d430cdc99e4d241bb4a86121|44|1 AckFrame[0|Δ19] 31.280 <- (3) Packet A|1|S0|b391bfb964a7cf63|1065|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024] StreamFrame[0(CIB),1024,0,fin] 31.280 Cwnd(-): 6000; inflight: 0 31.280 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 31.280 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 31.387/App, because ackElicitingInFlight | RTT:33/12 31.281 -> Packet A|3|S0|0000000000001007d430cdc99e4d241bb4a86121|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 31.281 Finished downloading https://server4:443/blcjzhqplr at 31:46.301 on ClientConnection[96758ba7ea0d74e8/b391bfb964a7cf63(V1) with server4/193.167.100.100:443] 31.281 Closing ClientConnection[96758ba7ea0d74e8/b391bfb964a7cf63(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.281 -> Packet A|4|S0|0000000000001007d430cdc99e4d241bb4a86121|47|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0]