ec66ed79fc10dbfc: No root crt list specified -- certificate will not be verified. ec66ed79fc10dbfc: Sending ALPN list (1): hq-interop ec66ed79fc10dbfc: Sending transport parameter TLS extension (85 bytes): ec66ed79fc10dbfc: Extension list (85 bytes): ec66ed79fc10dbfc: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 ec66ed79fc10dbfc: Extension type: 4 (initial_max_data), length 4, 80100000 ec66ed79fc10dbfc: Extension type: 8 (max_streams_bidi), length 2, 4200 ec66ed79fc10dbfc: Extension type: 1 (idle_timeout), length 4, 8002bf20 ec66ed79fc10dbfc: Extension type: 3 (max_packet_size), length 2, 45a0 ec66ed79fc10dbfc: Extension type: 9 (max_streams_uni), length 2, 4200 ec66ed79fc10dbfc: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 ec66ed79fc10dbfc: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff ec66ed79fc10dbfc: Extension type: 14 (active_connection_id_limit), length 1, 08 ec66ed79fc10dbfc: Extension type: 11 (max_ack_delay), length 1, 0a ec66ed79fc10dbfc: Extension type: 15 (hcid), length 8, 6037bb4cb9ca26f9 ec66ed79fc10dbfc: Extension type: 7374 (unknown), length 4, 800066ed ec66ed79fc10dbfc: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 ec66ed79fc10dbfc: Extension type: 29016 (enable_time_stamp), length 1, 03 ec66ed79fc10dbfc: Extension type: 10930 (grease_quic_bit), length 0 ec66ed79fc10dbfc: Preparing GET on stream 0 for /proud-noisy-monk ec66ed79fc10dbfc: Sending packet type: 2 (initial), S0, Q1, Version 1, ec66ed79fc10dbfc: , <6037bb4cb9ca26f9>, Seq: 93286, pl: 617 ec66ed79fc10dbfc: Token length: 0 ec66ed79fc10dbfc: Prepared 597 bytes ec66ed79fc10dbfc: ping, 1 bytes ec66ed79fc10dbfc: crypto_hs, offset 0, length 592: 0100024c0303a9e5... ec66ed79fc10dbfc: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, ec66ed79fc10dbfc: , <6037bb4cb9ca26f9>, Seq: 0, pl: 584 ec66ed79fc10dbfc: Prepared 564 bytes ec66ed79fc10dbfc: stream 0, offset 0, length 23, fin = 1: 474554202f70726f... ec66ed79fc10dbfc: padding, 538 bytes ec66ed79fc10dbfc: Sending 1252 bytes to 193.167.100.100:443 at T=0.001843 (33908b01) ec66ed79fc10dbfc: Receiving 1200 bytes from 193.167.100.100:443 at T=0.036823 (339113a5) ec66ed79fc10dbfc: Receiving packet type: 2 (initial), S0, Q1, Version 1, ec66ed79fc10dbfc: <6037bb4cb9ca26f9>, <0000000000003004f7d078477330b233c74ab805>, Seq: 0, pl: 158 ec66ed79fc10dbfc: Token length: 0 ec66ed79fc10dbfc: Decrypted 141 bytes ec66ed79fc10dbfc: ack (nb=0), 93286 ec66ed79fc10dbfc: crypto_hs, offset 0, length 129: 0200007d0303eda3... ec66ed79fc10dbfc: Receiving packet type: 4 (handshake), S0, Q1, Version 1, ec66ed79fc10dbfc: <6037bb4cb9ca26f9>, <0000000000003004f7d078477330b233c74ab805>, Seq: 0, pl: 190 ec66ed79fc10dbfc: Decrypted 173 bytes ec66ed79fc10dbfc: crypto_hs, offset 0, length 169: 08000081007f0010... ec66ed79fc10dbfc: Received transport parameter TLS extension (102 bytes): ec66ed79fc10dbfc: Extension list (102 bytes): ec66ed79fc10dbfc: Extension type: 4 (initial_max_data), length 4, 80830000 ec66ed79fc10dbfc: Extension type: 9 (max_streams_uni), length 1, 03 ec66ed79fc10dbfc: Extension type: 8 (max_streams_bidi), length 2, 4080 ec66ed79fc10dbfc: Extension type: 5 (max_stream_data_bidi_local), length 4, 80010000 ec66ed79fc10dbfc: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010000 ec66ed79fc10dbfc: Extension type: 7 (max_stream_data_uni), length 4, 80010000 ec66ed79fc10dbfc: Extension type: 1 (idle_timeout), length 4, 800124f8 ec66ed79fc10dbfc: Extension type: 3 (max_packet_size), length 4, 8000fff7 ec66ed79fc10dbfc: Extension type: 14 (active_connection_id_limit), length 1, 02 ec66ed79fc10dbfc: Extension type: 11 (max_ack_delay), length 1, 19 ec66ed79fc10dbfc: Extension type: 10 (ack_delay_exponent), length 1, 03 ec66ed79fc10dbfc: Extension type: 0 (ocid), length 8, ec66ed79fc10dbfc ec66ed79fc10dbfc: Extension type: 15 (hcid), length 20, 0000000000003004f7d078477330b233c74ab805 ec66ed79fc10dbfc: Extension type: 2 (stateless_reset_token), length 16, 892b36192fb954bb61a4d0ef42da4e62 ec66ed79fc10dbfc: Receiving packet type: 6 (1rtt protected), S0, Q1, ec66ed79fc10dbfc: <6037bb4cb9ca26f9>, Seq: 0 (0), Phi: 0, ec66ed79fc10dbfc: Decrypted 751 bytes ec66ed79fc10dbfc: ack (nb=0), 0 ec66ed79fc10dbfc: crypto_hs, offset 0, length 572: 0400011a000000c2... ec66ed79fc10dbfc: stream 0, offset 0, length 165, fin = 0: 125439f85a11028d... ec66ed79fc10dbfc: T= 0.036823, cwin: 16580,flight: 0,nb_ret: 0,rtt_min: 34980,rtt: 34980,rtt_var: 13117,max_ack_delay: 0,state: 10 ec66ed79fc10dbfc: The session was properly resumed! ec66ed79fc10dbfc: Zero RTT data is accepted! ec66ed79fc10dbfc: Negotiated ALPN: hq-interop ec66ed79fc10dbfc: Sending packet type: 4 (handshake), S0, Q1, Version 1, ec66ed79fc10dbfc: <0000000000003004f7d078477330b233c74ab805>, <6037bb4cb9ca26f9>, Seq: 0, pl: 64 ec66ed79fc10dbfc: Prepared 44 bytes ec66ed79fc10dbfc: ack (nb=0), 0 ec66ed79fc10dbfc: crypto_hs, offset 0, length 36: 140000205375038c... ec66ed79fc10dbfc: Sending packet type: 6 (1rtt protected), S1, Q1, ec66ed79fc10dbfc: <0000000000003004f7d078477330b233c74ab805>, Seq: 1 (1), Phi: 0, ec66ed79fc10dbfc: Prepared 145 bytes ec66ed79fc10dbfc: new_connection_id[1]: 0x3ea3a3359e2298bf, e90b03c1ad5eb7102c0931a74a6aa33e ec66ed79fc10dbfc: padding, 117 bytes ec66ed79fc10dbfc: T= 0.037333, cwin: 16580,flight: 284,nb_ret: 0,rtt_min: 34980,rtt: 34980,rtt_var: 13117,max_ack_delay: 0,state: 13 ec66ed79fc10dbfc: Sending 284 bytes to 193.167.100.100:443 at T=0.037333 (339115a3) ec66ed79fc10dbfc: Connection established. Version = 1, I-CID: ec66ed79fc10dbfc, verified: 1 ec66ed79fc10dbfc: Receiving 896 bytes from 193.167.100.100:443 at T=0.037540 (33911672) ec66ed79fc10dbfc: Receiving packet type: 6 (1rtt protected), S0, Q1, ec66ed79fc10dbfc: <6037bb4cb9ca26f9>, Seq: 1 (1), Phi: 0, ec66ed79fc10dbfc: Decrypted 870 bytes ec66ed79fc10dbfc: stream 0, offset 165, length 859, fin = 0: e0a4c00fcb21feda... ec66ed79fc10dbfc: stream 0, offset 1024, length 0, fin = 1: ec66ed79fc10dbfc: T= 0.037540, cwin: 16580,flight: 284,nb_ret: 0,rtt_min: 34980,rtt: 34980,rtt_var: 13117,max_ack_delay: 0,state: 13 ec66ed79fc10dbfc: All done, Closing the connection. ec66ed79fc10dbfc: Sending packet type: 6 (1rtt protected), S1, Q1, ec66ed79fc10dbfc: <0000000000003004f7d078477330b233c74ab805>, Seq: 2 (2), Phi: 0, ec66ed79fc10dbfc: Prepared 8 bytes ec66ed79fc10dbfc: ack (nb=0), 0-1 ec66ed79fc10dbfc: application_close, Error 0x0000, Reason length 0 ec66ed79fc10dbfc: Sending 46 bytes to 193.167.100.100:443 at T=0.037627 (339116c9) ec66ed79fc10dbfc: Out of 1 zero RTT packets, 1 were acked by the server. ec66ed79fc10dbfc: Received 1024 bytes in 0.336118 seconds, 0.024372 Mbps. ec66ed79fc10dbfc: Sent 23 bytes in 0.336118 seconds, 0.000547 Mbps.