0.000 Creating connection with server4:443 with v1 0.080 Setting up connection for downloading https://server4:443/vbcjkoepoz at 04:17.518 on ClientConnection[2b4e9713b6da0289/b8085a0e8c00bc6a(V1) with server4/193.167.100.100:443] 0.082 Original destination connection id: 2b4e9713b6da0289 (scid: b8085a0e8c00bc6a) >- CryptoStream[I|ClientHello] 0.270 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.470/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.265 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.309 <- (1) Packet I|34270653|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.326 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.526/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.352 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 126 millis, based on 0.479/Handshake, because peerAwaitingAddressValidation | RTT:43/21 0.351 -> Packet I|1|L|1201|2 Token=[] AckFrame[34270653|Δ0] Padding(1140) 0.309 <- (1) Packet H|34270653|L|779|1 CryptoFrame[0,718] 0.357 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 0.382 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 126 millis, based on 0.509/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:43/21 0.382 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.389 -> Packet H|1|L|59|1 AckFrame[34270653|Δ0] 0.391 Starting downloading https://server4:443/vbcjkoepoz at 04:17.845 on ClientConnection[2b4e9713b6da0289/b8085a0e8c00bc6a(V1) with server4/193.167.100.100:443] 0.309 <- (1) Packet A|34270653|S0|b8085a0e8c00bc6a|231|2 NewConnectionIdFrame[1,<0|7048ae046c165c5e76331d3fb4a54c1c386e|062a6a557461476fa277252fe01960ec] Padding(164) 0.404 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 126 millis, based on 0.531/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:43/21 0.404 Discarding pn space Initial because first Handshake message is being sent 0.417 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 126 millis, based on 0.545/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:43/21 0.417 <- (2) Packet A|34270654|S0|b8085a0e8c00bc6a|1406|2 PingFrame[] Padding(1376) 0.418 <- (3) Packet A|34270655|S0|b8085a0e8c00bc6a|1200|4 HandshakeDoneFrame[] NewTokenFrame[360d83c0a4e42962f43912be15da5a2287ddbf2f149db89bf9d8a48fa1ce84625abb35bca318de41c1] CryptoFrame[0,237] Padding(886) 0.421 State is set to Confirmed reschedule loss detection timer for PTO over 88 millis, based on 0.509/Handshake, because ackElicitingInFlight | RTT:43/21 reschedule loss detection timer for PTO over 147 millis, based on 0.569/App, because ackElicitingInFlight | RTT:43/21 0.422 Discarding pn space Handshake because HandshakeDone is received 0.417 -> Packet A|0|S0|6134ff6d66e669a5799bb7c0e4a23fc98c54|66|2 StreamFrame[0(CIB),0,17,fin] AckFrame[34270653|Δ17] -< CryptoStream[A|NewSessionTicket] 0.423 -> Packet A|1|S0|6134ff6d66e669a5799bb7c0e4a23fc98c54|45|1 AckFrame[34270654-34270653|Δ3] 0.443 -> Packet A|2|S0|6134ff6d66e669a5799bb7c0e4a23fc98c54|45|1 AckFrame[34270655-34270653|Δ19] 0.449 <- (4) Packet A|34270656|S0|b8085a0e8c00bc6a|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 0.452 Finished downloading https://server4:443/vbcjkoepoz at 04:17.906 on ClientConnection[2b4e9713b6da0289/b8085a0e8c00bc6a(V1) with server4/193.167.100.100:443] 0.454 Closing ClientConnection[2b4e9713b6da0289/b8085a0e8c00bc6a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.456 Creating connection with server4:443 with v1 0.458 Setting up connection for downloading https://server4:443/vvrwlvuouy at 04:17.912 on ClientConnection[5bf23984548ef75b/817678d07f16ae84(V1) with server4/193.167.100.100:443] 0.459 Original destination connection id: 5bf23984548ef75b (scid: 817678d07f16ae84) 0.456 -> Packet A|3|S0|6134ff6d66e669a5799bb7c0e4a23fc98c54|49|2 ConnectionCloseFrame[0|0|] AckFrame[34270656-34270653|Δ5] >- CryptoStream[I|ClientHello] 0.464 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.664/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.464 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.663 loss detection timeout handler running Sending probe 0, because no ack since 0.464. Current RTT: 100/25. 0.664 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.666 (Probe is an initial retransmit) 0.667 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.068/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.667 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.002 <- (1) Packet I|78673044|L|185|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 1.002 <- (1) Packet H|78673044|L|780|1 CryptoFrame[0,719] 1.009 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.409/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.008 -> Packet I|2|L|1201|2 Token=[] AckFrame[78673044|Δ0] Padding(1140) 1.009 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 1.013 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.413/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.013 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.014 Starting downloading https://server4:443/vvrwlvuouy at 04:18.469 on ClientConnection[5bf23984548ef75b/817678d07f16ae84(V1) with server4/193.167.100.100:443] 1.002 <- (1) Packet A|78673044|S0|817678d07f16ae84|235|1 Padding(206) 1.015 -> Packet H|1|L|59|1 AckFrame[78673044|Δ0] 1.015 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.215/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.015 Discarding pn space Initial because first Handshake message is being sent 1.016 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.216/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.016 -> Packet A|0|S0|11ad341e54d1902f32ffffd85c223198f86f|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[78673044|Δ0] 1.045 <- (2) Packet A|78673045|S0|817678d07f16ae84|1406|2 PingFrame[] Padding(1376) 1.047 <- (3) Packet A|78673047|S0|817678d07f16ae84|1200|2 NewConnectionIdFrame[1,<0|31a8ec0033fe8f42edc293e6a862b28514a3|8bb9ff06bfb468e463baaf13d8932ce7] Padding(1133) 1.049 -> Packet A|1|S0|11ad341e54d1902f32ffffd85c223198f86f|47|1 AckFrame[78673047,78673045-78673044|Δ2] 1.048 <- (4) Packet A|78673048|S0|817678d07f16ae84|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 1.049 Finished downloading https://server4:443/vvrwlvuouy at 04:18.504 on ClientConnection[5bf23984548ef75b/817678d07f16ae84(V1) with server4/193.167.100.100:443] 1.050 Closing ClientConnection[5bf23984548ef75b/817678d07f16ae84(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.050 Creating connection with server4:443 with v1 1.050 -> Packet A|2|S0|11ad341e54d1902f32ffffd85c223198f86f|50|2 ConnectionCloseFrame[0|0|] AckFrame[78673048-78673047,78673045-78673044|Δ0] 1.051 Setting up connection for downloading https://server4:443/rjmbnikdfs at 04:18.505 on ClientConnection[b8c415bf59d613e5/637786289d63accf(V1) with server4/193.167.100.100:443] 1.051 Original destination connection id: b8c415bf59d613e5 (scid: 637786289d63accf) 1.052 <- (5) Packet A|78673049|S0|817678d07f16ae84|40|2 AckFrame[0|Δ5] Padding(8) >- CryptoStream[I|ClientHello] 1.054 -> Packet A|3|S0|11ad341e54d1902f32ffffd85c223198f86f|50|2 ConnectionCloseFrame[0|0|] AckFrame[78673048-78673047,78673045-78673044|Δ0] 1.055 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.255/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.054 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.254 loss detection timeout handler running Sending probe 0, because no ack since 1.054. Current RTT: 100/25. 1.254 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.254 (Probe is an initial retransmit) 1.255 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.655/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.255 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.654 loss detection timeout handler running Sending probe 1, because no ack since 1.255. Current RTT: 100/25. 1.655 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.655 (Probe is an initial retransmit) 1.655 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.455/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.655 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.656 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.456/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.656 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.688 <- (1) Packet I|934977221|L|192|2 Token=[] AckFrame[2,0|Δ0] CryptoFrame[0,123] 1.689 probe count not reset on ack because handshake not yet confirmed 1.692 Cwnd(-): 6000; inflight: 1200 1.692 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.492/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 1.688 <- (1) Packet H|934977221|L|778|1 CryptoFrame[0,717] 1.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 2.085/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.696 -> Packet I|4|L|1201|2 Token=[] AckFrame[934977221|Δ0] Padding(1140) 1.697 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 1.700 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 2.088/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.700 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.701 Starting downloading https://server4:443/rjmbnikdfs at 04:19.156 on ClientConnection[b8c415bf59d613e5/637786289d63accf(V1) with server4/193.167.100.100:443] 1.688 <- (1) Packet A|934977221|S0|637786289d63accf|230|2 PingFrame[] Padding(200) 1.702 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.799/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.702 Discarding pn space Initial because first Handshake message is being sent 1.702 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.799/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.702 -> [Packet H|1|L|59|1 AckFrame[934977221|Δ0], Packet A|0|S0|eaf61f1993e3eb64cdb7f99ef0221c3288f3|57|1 StreamFrame[0(CIB),0,17,fin]] 1.722 -> Packet A|1|S0|eaf61f1993e3eb64cdb7f99ef0221c3288f3|45|1 AckFrame[934977221|Δ20] 1.799 loss detection timeout handler running Sending probe 0, because no ack since 1.700. Current RTT: 33/16. 1.799 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.799 (Probe is a handshake retransmit) 1.800 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.994/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.800 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 1.832 <- (2) Packet A|934977222|S0|637786289d63accf|1406|2 PingFrame[] Padding(1379) 1.834 <- (3) Packet A|934977224|S0|637786289d63accf|1200|2 StreamFrame[0(CIB),841,183,fin] Padding(985) 1.835 -> Packet A|2|S0|eaf61f1993e3eb64cdb7f99ef0221c3288f3|47|1 AckFrame[934977224,934977222-934977221|Δ1] 1.885 <- (4) Packet A|934977226|S0|637786289d63accf|1406|6 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|8f5dc830c62840db6641b3f4c249d4a3d7a1|c89a3ccce87e74a67f48fc4b82910817] NewTokenFrame[36227fea4fcfc696fd9037a555ec03454d97ffa5e3b4ea709d607d6eb99f1beb887e8eb9f60d7b57fe] CryptoFrame[0,237] StreamFrame[0(CIB),0,841] Padding(212) 1.886 State is set to Confirmed reschedule loss detection timer for PTO over 60 millis, based on 1.946/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -62 millis, based on 1.824/App, because ackElicitingInFlight | RTT:33/16 1.886 loss detection timeout handler running 1.886 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 1.702. Current RTT: 33/16. -< CryptoStream[A|NewSessionTicket] 1.887 (Probe is retransmit on level App) 1.887 Finished downloading https://server4:443/rjmbnikdfs at 04:19.342 on ClientConnection[b8c415bf59d613e5/637786289d63accf(V1) with server4/193.167.100.100:443] 1.887 Closing ClientConnection[b8c415bf59d613e5/637786289d63accf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 243 millis, based on 2.131/App, because ackElicitingInFlight | RTT:33/16 1.887 -> Packet PA|3|S0|eaf61f1993e3eb64cdb7f99ef0221c3288f3|57|1 StreamFrame[0(CIB),0,17,fin] 1.888 Creating connection with server4:443 with v1 1.888 -> Packet A|4|S0|eaf61f1993e3eb64cdb7f99ef0221c3288f3|53|2 ConnectionCloseFrame[0|0|] AckFrame[934977226,934977224,934977222-934977221|Δ1] 1.889 Setting up connection for downloading https://server4:443/karyueihfo at 04:19.344 on ClientConnection[daf2291c611dbf9e/14b77ad12168a4c6(V1) with server4/193.167.100.100:443] 1.889 Original destination connection id: daf2291c611dbf9e (scid: 14b77ad12168a4c6) >- CryptoStream[I|ClientHello] 1.891 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.092/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.891 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.091 loss detection timeout handler running Sending probe 0, because no ack since 1.891. Current RTT: 100/25. 2.091 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.091 (Probe is an initial retransmit) 2.092 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.492/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.092 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.126 <- (1) Packet I|1513767547|L|190|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 2.127 probe count not reset on ack because handshake not yet confirmed 2.127 Retransmitting CryptoFrame[0,257] on level Initial 2.128 Cwnd(-): 6000; inflight: 0 2.128 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.528/Initial, because peerAwaitingAddressValidation | RTT:100/25 2.128 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 2.332/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.128 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 2.126 <- (1) Packet H|1513767547|L|779|1 CryptoFrame[0,718] 2.132 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 2.336/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.132 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 2.132 -> Packet I|3|L|1201|2 Token=[] AckFrame[1513767547|Δ0] Padding(1136) >- CryptoStream[H|Finished] 2.135 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 2.339/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.135 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.136 Starting downloading https://server4:443/karyueihfo at 04:19.590 on ClientConnection[daf2291c611dbf9e/14b77ad12168a4c6(V1) with server4/193.167.100.100:443] 2.126 <- (1) Packet A|1513767547|S0|14b77ad12168a4c6|231|2 NewConnectionIdFrame[1,<0|222d73655b4def3e5a57af956bdf8160ffee|696bd77d3b5eb5ed328d076014a33c7f] Padding(164) 2.137 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.239/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.137 Discarding pn space Initial because first Handshake message is being sent 2.137 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.239/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.137 -> [Packet H|1|L|63|1 AckFrame[1513767547|Δ0], Packet A|0|S0|7c5669da8b259a082e020879cee1941bd137|57|1 StreamFrame[0(CIB),0,17,fin]] 2.157 -> Packet A|1|S0|7c5669da8b259a082e020879cee1941bd137|49|1 AckFrame[1513767547|Δ20] 2.238 loss detection timeout handler running Sending probe 0, because no ack since 2.135. Current RTT: 34/17. 2.238 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.239 (Probe is a handshake retransmit) 2.239 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 2.443/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.239 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 2.272 <- (2) Packet A|1513767548|S0|14b77ad12168a4c6|1406|2 PingFrame[] Padding(1379) 2.273 <- (3) Packet A|1513767549|S0|14b77ad12168a4c6|1200|5 AckFrame[1-0|Δ82] HandshakeDoneFrame[] NewTokenFrame[366d4189ccfb8750baad9add7f4691b346d96bd6cbfd49de46499ab8a87ac1ee4c3d5e759ff46e31d1] CryptoFrame[0,237] StreamFrame[0(CIB),0,879] 2.274 probe count not reset on ack because handshake not yet confirmed 2.275 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 2.479/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.275 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 2.443/Handshake, because ackElicitingInFlight | RTT:34/17 2.275 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.275 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 2.274 <- (4) Packet A|1513767550|S0|14b77ad12168a4c6|1200|2 StreamFrame[0(CIB),879,145,fin] Padding(1023) 2.276 -> Packet A|2|S0|7c5669da8b259a082e020879cee1941bd137|49|1 AckFrame[1513767549-1513767548|Δ3] 2.277 Finished downloading https://server4:443/karyueihfo at 04:19.731 on ClientConnection[daf2291c611dbf9e/14b77ad12168a4c6(V1) with server4/193.167.100.100:443] 2.277 Closing ClientConnection[daf2291c611dbf9e/14b77ad12168a4c6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.278 Creating connection with server4:443 with v1 2.278 -> Packet A|3|S0|7c5669da8b259a082e020879cee1941bd137|53|2 ConnectionCloseFrame[0|0|] AckFrame[1513767550-1513767548|Δ1] 2.278 Setting up connection for downloading https://server4:443/kkboagxykd at 04:19.733 on ClientConnection[1b27841d0715dd59/ee0115952eb70174(V1) with server4/193.167.100.100:443] 2.278 Original destination connection id: 1b27841d0715dd59 (scid: ee0115952eb70174) >- CryptoStream[I|ClientHello] 2.280 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.481/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.280 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.314 <- (1) Packet I|100332351|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.315 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.515/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.314 <- (1) Packet H|100332351|L|780|1 CryptoFrame[0,719] 2.320 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.417/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.320 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 2.319 -> Packet I|1|L|1201|2 Token=[] AckFrame[100332351|Δ0] Padding(1140) >- CryptoStream[H|Finished] 2.323 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.420/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.323 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.324 Starting downloading https://server4:443/kkboagxykd at 04:19.778 on ClientConnection[1b27841d0715dd59/ee0115952eb70174(V1) with server4/193.167.100.100:443] 2.314 <- (1) Packet A|100332351|S0|ee0115952eb70174|230|2 NewConnectionIdFrame[1,<0|dc3bb1473c1acc17c1e21319d920e94483a9|e70f1f579a41b147eb541b1069a48446] Padding(163) 2.324 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.421/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.324 Discarding pn space Initial because first Handshake message is being sent 2.325 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.422/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.324 -> [Packet H|1|L|59|1 AckFrame[100332351|Δ0], Packet A|0|S0|47f16875a88dbb7dceb889ef31b6d3f9b982|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[100332351|Δ0]] 2.355 <- (2) Packet A|100332352|S0|ee0115952eb70174|1406|2 PingFrame[] Padding(1376) 2.361 <- (3) Packet A|100332355|S0|ee0115952eb70174|40|2 AckFrame[0|Δ5] Padding(8) 2.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.458/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.376 -> Packet A|1|S0|47f16875a88dbb7dceb889ef31b6d3f9b982|47|1 AckFrame[100332355,100332352|Δ19] 2.409 <- (4) Packet A|100332357|S0|ee0115952eb70174|1406|5 HandshakeDoneFrame[] NewTokenFrame[36d3ed0e9af58ba460cd1521015ef1b622801f08709ffa650c61f76b5da7191acf0da95ac3c1e0b328] CryptoFrame[0,237] StreamFrame[0(CIB),0,1024,fin] Padding(67) 2.410 State is set to Confirmed reschedule loss detection timer for PTO over -2 millis, based on 2.408/Handshake, because ackElicitingInFlight | RTT:33/13 2.410 loss detection timeout handler running 2.410 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) Sending probe 0, because no ack since 2.324. Current RTT: 33/13. 2.410 Discarding pn space Handshake because HandshakeDone is received 2.410 Refraining from sending probe as no ack eliciting in flight and no peer awaiting address validation -< CryptoStream[A|NewSessionTicket] 2.411 Finished downloading https://server4:443/kkboagxykd at 04:19.865 on ClientConnection[1b27841d0715dd59/ee0115952eb70174(V1) with server4/193.167.100.100:443] 2.411 Closing ClientConnection[1b27841d0715dd59/ee0115952eb70174(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.411 -> Packet A|2|S0|47f16875a88dbb7dceb889ef31b6d3f9b982|52|2 ConnectionCloseFrame[0|0|] AckFrame[100332357,100332355,100332352|Δ0] 2.412 Creating connection with server4:443 with v1 2.412 Setting up connection for downloading https://server4:443/xczecmfqdy at 04:19.867 on ClientConnection[ad612325cdbf8950/4708ae56587b52ff(V1) with server4/193.167.100.100:443] 2.412 Original destination connection id: ad612325cdbf8950 (scid: 4708ae56587b52ff) >- CryptoStream[I|ClientHello] 2.414 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.614/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.414 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.448 <- (1) Packet I|1010513396|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.448 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.649/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.448 <- (1) Packet H|1010513396|L|779|1 CryptoFrame[0,718] 2.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.548/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.451 -> Packet I|1|L|1201|2 Token=[] AckFrame[1010513396|Δ0] Padding(1140) 2.452 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 2.454 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.551/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.454 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.455 Starting downloading https://server4:443/xczecmfqdy at 04:19.909 on ClientConnection[ad612325cdbf8950/4708ae56587b52ff(V1) with server4/193.167.100.100:443] 2.455 -> Packet H|1|L|59|1 AckFrame[1010513396|Δ0] 2.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.448 <- (1) Packet A|1010513396|S0|4708ae56587b52ff|231|2 NewConnectionIdFrame[1,<0|370b22b4e21440dc953abaa5ca050a88d2c7|f7e0ec661ad98af10ce9f7b6bcb8a40b] Padding(164) reschedule loss detection timer for PTO over 96 millis, based on 2.553/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.456 -> Packet A|0|S0|f05e8d66d35e01c90f5f294084ac07f54dc9|57|1 StreamFrame[0(CIB),0,17,fin] 2.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.553/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.456 Discarding pn space Initial because first Handshake message is being sent 2.475 -> Packet A|1|S0|f05e8d66d35e01c90f5f294084ac07f54dc9|45|1 AckFrame[1010513396|Δ19] 2.487 <- (2) Packet A|1010513397|S0|4708ae56587b52ff|1406|2 PingFrame[] Padding(1376) 2.488 <- (3) Packet A|1010513398|S0|4708ae56587b52ff|1200|4 HandshakeDoneFrame[] NewTokenFrame[3628727e3cb4711707c3e34d157cc8fdb5cfc225611c149954caebbe8b912350f62a58f095fbfa0105] CryptoFrame[0,237] Padding(886) 2.488 State is set to Confirmed reschedule loss detection timer for PTO over 62 millis, based on 2.551/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 89 millis, based on 2.578/App, because ackElicitingInFlight | RTT:33/16 2.488 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 2.489 -> Packet A|2|S0|f05e8d66d35e01c90f5f294084ac07f54dc9|45|1 AckFrame[1010513398-1010513396|Δ1] 2.492 <- (4) Packet A|1010513400|S0|4708ae56587b52ff|40|2 AckFrame[0|Δ5] Padding(5) 2.492 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.521 <- (5) Packet A|1010513401|S0|4708ae56587b52ff|1444|2 PingFrame[] Padding(1417) 2.541 -> Packet A|3|S0|f05e8d66d35e01c90f5f294084ac07f54dc9|47|1 AckFrame[1010513401-1010513400,1010513398-1010513396|Δ19] 2.631 <- (6) Packet A|1010513403|S0|4708ae56587b52ff|1406|2 StreamFrame[0(CIB),0,1024,fin] Padding(352) 2.632 Finished downloading https://server4:443/xczecmfqdy at 04:20.086 on ClientConnection[ad612325cdbf8950/4708ae56587b52ff(V1) with server4/193.167.100.100:443] 2.632 Closing ClientConnection[ad612325cdbf8950/4708ae56587b52ff(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.632 -> Packet A|4|S0|f05e8d66d35e01c90f5f294084ac07f54dc9|52|2 ConnectionCloseFrame[0|0|] AckFrame[1010513403,1010513401-1010513400,1010513398-1010513396|Δ0] 2.633 Creating connection with server4:443 with v1 2.634 Setting up connection for downloading https://server4:443/bomuxzkpkd at 04:20.088 on ClientConnection[c2292a489917c53c/67ffa2b67758d9b1(V1) with server4/193.167.100.100:443] 2.634 Original destination connection id: c2292a489917c53c (scid: 67ffa2b67758d9b1) >- CryptoStream[I|ClientHello] 2.636 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.836/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.636 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.737 <- (7) Packet A|1010513405|S0|4708ae56587b52ff|1444|2 PingFrame[] Padding(1417) 2.738 -> Packet A|5|S0|f05e8d66d35e01c90f5f294084ac07f54dc9|52|2 ConnectionCloseFrame[0|0|] AckFrame[1010513403,1010513401-1010513400,1010513398-1010513396|Δ0] 2.836 loss detection timeout handler running Sending probe 0, because no ack since 2.636. Current RTT: 100/25. 2.836 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.836 (Probe is an initial retransmit) 2.837 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.237/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.836 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.869 <- (1) Packet I|1830904511|L|190|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 2.870 probe count not reset on ack because handshake not yet confirmed 2.870 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.270/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.869 <- (1) Packet H|1830904511|L|779|1 CryptoFrame[0,718] 2.874 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.068/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.874 -> Packet I|2|L|1201|2 Token=[] AckFrame[1830904511|Δ0] Padding(1136) 2.874 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 2.877 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.071/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.877 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.869 <- (1) Packet A|1830904511|S0|67ffa2b67758d9b1|231|1 Padding(202) 2.882 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.979/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.882 Discarding pn space Initial because first Handshake message is being sent 2.882 -> Packet H|1|L|63|1 AckFrame[1830904511|Δ0] 2.883 Starting downloading https://server4:443/bomuxzkpkd at 04:20.337 on ClientConnection[c2292a489917c53c/67ffa2b67758d9b1(V1) with server4/193.167.100.100:443] 2.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.980/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.883 -> Packet A|0|S0|252f92cc0e1d95383ff3ff0fa13bd84fb7fc|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1830904511|Δ0] 2.911 <- (2) Packet A|1830904514|S0|67ffa2b67758d9b1|1200|2 NewConnectionIdFrame[1,<0|b1bda9dbb9cdc47ca1d11e25ef254ea5e11d|3949bad4080fbe659084e9631672f0ac] Padding(1133) 2.931 -> Packet A|1|S0|252f92cc0e1d95383ff3ff0fa13bd84fb7fc|51|1 AckFrame[1830904514,1830904511|Δ19] 2.970 <- (3) Packet A|1830904517|S0|67ffa2b67758d9b1|1200|4 HandshakeDoneFrame[] NewTokenFrame[36ca1b26043ddf1f1b5deae15f0eaabda9fbedff678b5e4c7a9f7408601fb210229fcf7e31ec4a4d7a] CryptoFrame[0,237] Padding(889) 2.971 State is set to Confirmed reschedule loss detection timer for PTO over 2 millis, based on 2.974/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 33 millis, based on 3.005/App, because ackElicitingInFlight | RTT:33/16 2.971 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 2.991 -> Packet A|2|S0|252f92cc0e1d95383ff3ff0fa13bd84fb7fc|53|1 AckFrame[1830904517,1830904514,1830904511|Δ19] 3.004 loss detection timeout handler running Sending probe 0, because no ack since 2.883. Current RTT: 33/16. 3.005 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 3.249/App, because ackElicitingInFlight | RTT:33/16 3.005 -> Packet PA|3|S0|252f92cc0e1d95383ff3ff0fa13bd84fb7fc|57|1 StreamFrame[0(CIB),0,17,fin] 3.023 <- (4) Packet A|1830904518|S0|67ffa2b67758d9b1|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 3.024 Finished downloading https://server4:443/bomuxzkpkd at 04:20.478 on ClientConnection[c2292a489917c53c/67ffa2b67758d9b1(V1) with server4/193.167.100.100:443] 3.024 Closing ClientConnection[c2292a489917c53c/67ffa2b67758d9b1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.025 Creating connection with server4:443 with v1 3.025 -> Packet A|4|S0|252f92cc0e1d95383ff3ff0fa13bd84fb7fc|56|2 ConnectionCloseFrame[0|0|] AckFrame[1830904518-1830904517,1830904514,1830904511|Δ0] 3.025 Setting up connection for downloading https://server4:443/foiovzjsxv at 04:20.480 on ClientConnection[0f1ac2a0d6ec0dc1/21bb559b28b5c79e(V1) with server4/193.167.100.100:443] 3.026 Original destination connection id: 0f1ac2a0d6ec0dc1 (scid: 21bb559b28b5c79e) >- CryptoStream[I|ClientHello] 3.027 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.227/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.027 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.182 <- (5) Packet A|1830904521|S0|67ffa2b67758d9b1|1406|2 PingFrame[] Padding(1379) 3.183 -> Packet A|5|S0|252f92cc0e1d95383ff3ff0fa13bd84fb7fc|56|2 ConnectionCloseFrame[0|0|] AckFrame[1830904518-1830904517,1830904514,1830904511|Δ0] 3.184 <- (6) Packet A|1830904523|S0|67ffa2b67758d9b1|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 3.184 -> Packet A|6|S0|252f92cc0e1d95383ff3ff0fa13bd84fb7fc|56|2 ConnectionCloseFrame[0|0|] AckFrame[1830904518-1830904517,1830904514,1830904511|Δ0] 3.227 loss detection timeout handler running Sending probe 0, because no ack since 3.027. Current RTT: 100/25. 3.227 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.227 (Probe is an initial retransmit) 3.227 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.627/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.227 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.561 <- (1) Packet I|873063837|L|185|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 3.561 <- (1) Packet H|873063837|L|779|1 CryptoFrame[0,718] 3.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.965/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.565 -> Packet I|2|L|1201|2 Token=[] AckFrame[873063837|Δ0] Padding(1140) 3.565 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 3.568 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.968/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.568 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.569 Starting downloading https://server4:443/foiovzjsxv at 04:21.023 on ClientConnection[0f1ac2a0d6ec0dc1/21bb559b28b5c79e(V1) with server4/193.167.100.100:443] 3.561 <- (1) Packet A|873063837|S0|21bb559b28b5c79e|236|2 PingFrame[] Padding(206) 3.569 -> Packet H|1|L|59|1 AckFrame[873063837|Δ0] 3.569 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.569 Discarding pn space Initial because first Handshake message is being sent 3.569 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.770/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.569 -> Packet A|0|S0|54335006c141b425476c9142d0f746b20dae|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[873063837|Δ0] 3.769 loss detection timeout handler running Sending probe 0, because no ack since 3.568. Current RTT: 100/25. 3.769 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.769 (Probe is a handshake retransmit) 3.770 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.170/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.769 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 3.803 <- (2) Packet A|873063839|S0|21bb559b28b5c79e|1200|6 AckFrame[0|Δ200] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a2b773c91fa6381c5463f2b369892fe3df82|ba0a442e4eebe33a92a9a9eff102efc1] NewTokenFrame[36fe9880ac5ca2eb4f78d3f4f714ad1a2efce84133820f57c671d87ac0b1d472c451472aae0100d89d] CryptoFrame[0,237] StreamFrame[0(CIB),0,839] 3.804 probe count not reset on ack because handshake not yet confirmed 3.804 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.204/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.804 State is set to Confirmed reschedule loss detection timer for PTO over 1358 millis, based on 5.163/Handshake, because ackElicitingInFlight | RTT:233/116 3.805 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.805 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 3.804 <- (3) Packet A|873063840|S0|21bb559b28b5c79e|1200|2 StreamFrame[0(CIB),839,185,fin] Padding(983) 3.806 Finished downloading https://server4:443/foiovzjsxv at 04:21.260 on ClientConnection[0f1ac2a0d6ec0dc1/21bb559b28b5c79e(V1) with server4/193.167.100.100:443] 3.806 Closing ClientConnection[0f1ac2a0d6ec0dc1/21bb559b28b5c79e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.806 -> Packet A|1|S0|54335006c141b425476c9142d0f746b20dae|44|1 AckFrame[873063840-873063839|Δ0] 3.807 Creating connection with server4:443 with v1 3.807 -> Packet A|2|S0|54335006c141b425476c9142d0f746b20dae|48|2 ConnectionCloseFrame[0|0|] AckFrame[873063840-873063839|Δ0] 3.807 Setting up connection for downloading https://server4:443/clpxseyyxv at 04:21.262 on ClientConnection[016bfdd11d03391f/f9e937ef6af9c6be(V1) with server4/193.167.100.100:443] 3.807 Original destination connection id: 016bfdd11d03391f (scid: f9e937ef6af9c6be) >- CryptoStream[I|ClientHello] 3.809 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.009/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.809 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.843 <- (1) Packet I|425025501|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.844 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.044/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.848 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.843 <- (1) Packet H|425025501|L|780|1 CryptoFrame[0,719] reschedule loss detection timer for PTO over 96 millis, based on 3.945/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.848 -> Packet I|1|L|1201|2 Token=[] AckFrame[425025501|Δ0] Padding(1140) 3.848 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 3.851 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.948/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.851 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.851 Starting downloading https://server4:443/clpxseyyxv at 04:21.306 on ClientConnection[016bfdd11d03391f/f9e937ef6af9c6be(V1) with server4/193.167.100.100:443] 3.851 -> Packet H|1|L|59|1 AckFrame[425025501|Δ0] 3.843 <- (1) Packet A|425025501|S0|f9e937ef6af9c6be|230|2 NewConnectionIdFrame[1,<0|9cdd012dc268ed40ecbe45e358b9ba776022|94de92928b956c81f3a000d99f45dfd8] Padding(163) 3.852 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.949/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.852 Discarding pn space Initial because first Handshake message is being sent 3.852 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.949/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.852 -> Packet A|0|S0|3b4087a0d305aad6793fe6291ad91183e5ae|57|1 StreamFrame[0(CIB),0,17,fin] 3.872 -> Packet A|1|S0|3b4087a0d305aad6793fe6291ad91183e5ae|45|1 AckFrame[425025501|Δ19] 3.884 <- (2) Packet A|425025502|S0|f9e937ef6af9c6be|1406|2 PingFrame[] Padding(1376) 3.885 <- (3) Packet A|425025503|S0|f9e937ef6af9c6be|1200|4 HandshakeDoneFrame[] NewTokenFrame[36aa8caec73b4fa819fdcfac9eaee137e9aec4e8dc1c624838715db5b8e1438847c5854bb68b71f8a6] CryptoFrame[0,237] Padding(886) 3.885 State is set to Confirmed reschedule loss detection timer for PTO over 62 millis, based on 3.948/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 88 millis, based on 3.974/App, because ackElicitingInFlight | RTT:33/16 3.885 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 3.886 <- (4) Packet A|425025504|S0|f9e937ef6af9c6be|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(143) 3.886 -> Packet A|2|S0|3b4087a0d305aad6793fe6291ad91183e5ae|45|1 AckFrame[425025503-425025501|Δ1] 3.887 Finished downloading https://server4:443/clpxseyyxv at 04:21.341 on ClientConnection[016bfdd11d03391f/f9e937ef6af9c6be(V1) with server4/193.167.100.100:443] 3.887 Closing ClientConnection[016bfdd11d03391f/f9e937ef6af9c6be(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.887 -> Packet A|3|S0|3b4087a0d305aad6793fe6291ad91183e5ae|48|2 ConnectionCloseFrame[0|0|] AckFrame[425025504-425025501|Δ0] 3.888 Creating connection with server4:443 with v1 3.888 Setting up connection for downloading https://server4:443/fmucokebre at 04:21.343 on ClientConnection[df5c33b1cdc7c694/1f640c0394495b11(V1) with server4/193.167.100.100:443] 3.888 Original destination connection id: df5c33b1cdc7c694 (scid: 1f640c0394495b11) >- CryptoStream[I|ClientHello] 3.890 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.090/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.890 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.918 <- (5) Packet A|425025506|S0|f9e937ef6af9c6be|1444|2 PingFrame[] Padding(1417) 3.919 -> Packet A|4|S0|3b4087a0d305aad6793fe6291ad91183e5ae|48|2 ConnectionCloseFrame[0|0|] AckFrame[425025504-425025501|Δ0] 3.924 <- (1) Packet I|786485967|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.924 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.124/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.924 <- (1) Packet H|786485967|L|779|1 CryptoFrame[0,718] 3.927 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 3.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.024/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.927 -> Packet I|1|L|1201|2 Token=[] AckFrame[786485967|Δ0] Padding(1140) >- CryptoStream[H|Finished] 3.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.027/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.930 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.931 Starting downloading https://server4:443/fmucokebre at 04:21.385 on ClientConnection[df5c33b1cdc7c694/1f640c0394495b11(V1) with server4/193.167.100.100:443] 3.924 <- (1) Packet A|786485967|S0|1f640c0394495b11|231|2 NewConnectionIdFrame[1,<0|d97280944d4f17e60e714439a78c316fafd6|cd520add0d15aa841511b98a7b753d53] Padding(164) 3.931 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.028/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.931 Discarding pn space Initial because first Handshake message is being sent 3.931 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.028/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.931 -> [Packet H|1|L|59|1 AckFrame[786485967|Δ0], Packet A|0|S0|7b1e030ae97abdd05f9a95ad76656b87fb7b|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[786485967|Δ0]] 3.948 <- (4) Packet A|873063842|S0|21bb559b28b5c79e|1406|2 PingFrame[] Padding(1379) 3.949 -> Packet A|3|S0|54335006c141b425476c9142d0f746b20dae|48|2 ConnectionCloseFrame[0|0|] AckFrame[873063840-873063839|Δ0] 3.962 <- (2) Packet A|786485968|S0|1f640c0394495b11|1406|2 PingFrame[] Padding(1376) 3.963 <- (3) Packet A|786485969|S0|1f640c0394495b11|1200|4 HandshakeDoneFrame[] NewTokenFrame[36f247cd21c4c2495bb0d75b2710f42355c2eabcd5a45caaf0a1a430a4a2c113f7c095d660391b018c] CryptoFrame[0,237] Padding(886) 3.964 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 4.027/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 89 millis, based on 4.053/App, because ackElicitingInFlight | RTT:33/16 3.964 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 3.964 -> Packet A|1|S0|7b1e030ae97abdd05f9a95ad76656b87fb7b|45|1 AckFrame[786485969-786485967|Δ1] 3.964 <- (4) Packet A|786485970|S0|1f640c0394495b11|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 3.965 Finished downloading https://server4:443/fmucokebre at 04:21.419 on ClientConnection[df5c33b1cdc7c694/1f640c0394495b11(V1) with server4/193.167.100.100:443] 3.965 Closing ClientConnection[df5c33b1cdc7c694/1f640c0394495b11(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.966 -> Packet A|2|S0|7b1e030ae97abdd05f9a95ad76656b87fb7b|48|2 ConnectionCloseFrame[0|0|] AckFrame[786485970-786485967|Δ0] 3.966 Creating connection with server4:443 with v1 3.967 Setting up connection for downloading https://server4:443/vayqroussz at 04:21.421 on ClientConnection[f1d60838883a8e4f/5cc58b78a1959ea1(V1) with server4/193.167.100.100:443] 3.967 Original destination connection id: f1d60838883a8e4f (scid: 5cc58b78a1959ea1) 3.967 <- (5) Packet A|786485971|S0|1f640c0394495b11|40|2 AckFrame[0|Δ5] Padding(8) 3.968 -> Packet A|3|S0|7b1e030ae97abdd05f9a95ad76656b87fb7b|48|2 ConnectionCloseFrame[0|0|] AckFrame[786485970-786485967|Δ0] >- CryptoStream[I|ClientHello] 3.969 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.169/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.969 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.003 <- (1) Packet I|1034329177|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.003 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.203/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.003 <- (1) Packet H|1034329177|L|779|1 CryptoFrame[0,718] 4.006 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.103/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.006 -> Packet I|1|L|1201|2 Token=[] AckFrame[1034329177|Δ0] Padding(1140) 4.006 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 4.009 Starting downloading https://server4:443/vayqroussz at 04:21.463 on ClientConnection[f1d60838883a8e4f/5cc58b78a1959ea1(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.009 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.106/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.009 -> Packet H|0|L|90|1 CryptoFrame[0,36] 4.003 <- (1) Packet A|1034329177|S0|5cc58b78a1959ea1|231|2 NewConnectionIdFrame[1,<0|9ec84f20b3a44866fd5a219036607d556ed7|359fc8fa6a33a9260449d37a561e5659] Padding(164) 4.010 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.107/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.010 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.010 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 96 millis, based on 4.107/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.010 -> [Packet H|1|L|59|1 AckFrame[1034329177|Δ0], Packet A|0|S0|fd56eded9fce033841c260c763ba8c4defbc|57|1 StreamFrame[0(CIB),0,17,fin]] 4.029 -> Packet A|1|S0|fd56eded9fce033841c260c763ba8c4defbc|45|1 AckFrame[1034329177|Δ19] 4.042 <- (2) Packet A|1034329179|S0|5cc58b78a1959ea1|1200|4 HandshakeDoneFrame[] NewTokenFrame[363ef0223249e057696a62a1debfc09523ca02746767fc6e4aae1fc48ccae4f3148a4c16d8142b4e70] CryptoFrame[0,237] Padding(886) 4.043 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 4.106/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 88 millis, based on 4.132/App, because ackElicitingInFlight | RTT:33/16 4.043 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 4.063 -> Packet A|2|S0|fd56eded9fce033841c260c763ba8c4defbc|47|1 AckFrame[1034329179,1034329177|Δ19] 4.104 <- (6) Packet A|786485973|S0|1f640c0394495b11|1444|2 PingFrame[] Padding(1417) 4.104 -> Packet A|4|S0|7b1e030ae97abdd05f9a95ad76656b87fb7b|48|2 ConnectionCloseFrame[0|0|] AckFrame[786485970-786485967|Δ0] 4.106 <- (7) Packet A|786485975|S0|1f640c0394495b11|1406|2 StreamFrame[0(CIB),0,1024,fin] Padding(352) 4.119 <- (6) Packet A|425025507|S0|f9e937ef6af9c6be|1444|2 PingFrame[] Padding(1417) 4.120 -> Packet A|5|S0|3b4087a0d305aad6793fe6291ad91183e5ae|48|2 ConnectionCloseFrame[0|0|] AckFrame[425025504-425025501|Δ0] 4.120 <- (7) Packet A|425025508|S0|f9e937ef6af9c6be|1406|2 StreamFrame[0(CIB),0,1024,fin] Padding(352) 4.121 <- (8) Packet A|425025509|S0|f9e937ef6af9c6be|1406|2 StreamFrame[0(CIB),0,1024,fin] Padding(352) 4.122 -> Packet A|6|S0|3b4087a0d305aad6793fe6291ad91183e5ae|48|2 ConnectionCloseFrame[0|0|] AckFrame[425025504-425025501|Δ0] 4.131 loss detection timeout handler running Sending probe 0, because no ack since 4.010. Current RTT: 33/16. 4.131 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 4.375/App, because ackElicitingInFlight | RTT:33/16 4.131 -> Packet PA|3|S0|fd56eded9fce033841c260c763ba8c4defbc|57|1 StreamFrame[0(CIB),0,17,fin] 4.161 <- (3) Packet A|1034329180|S0|5cc58b78a1959ea1|1200|4 HandshakeDoneFrame[] NewTokenFrame[363ef0223249e057696a62a1debfc09523ca02746767fc6e4aae1fc48ccae4f3148a4c16d8142b4e70] CryptoFrame[0,237] Padding(889) -< CryptoStream[A|NewSessionTicket] 4.162 <- (4) Packet A|1034329181|S0|5cc58b78a1959ea1|1200|4 HandshakeDoneFrame[] NewTokenFrame[363ef0223249e057696a62a1debfc09523ca02746767fc6e4aae1fc48ccae4f3148a4c16d8142b4e70] CryptoFrame[0,237] Padding(889) -< CryptoStream[A|NewSessionTicket] 4.164 -> Packet A|4|S0|fd56eded9fce033841c260c763ba8c4defbc|46|1 AckFrame[1034329181-1034329179,1034329177|Δ0] 4.167 <- (5) Packet A|1034329183|S0|5cc58b78a1959ea1|40|2 AckFrame[3,1|Δ5] Padding(6) 4.168 Cwnd(-): 6000; inflight: 0 4.168 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.169 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 4.279/App, because ackElicitingInFlight | RTT:33/13 4.169 -> Packet A|5|S0|fd56eded9fce033841c260c763ba8c4defbc|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1034329181-1034329179|Δ0] 4.175 <- (6) Packet A|1034329184|S0|5cc58b78a1959ea1|1406|2 PingFrame[] Padding(1379) 4.194 -> Packet A|6|S0|fd56eded9fce033841c260c763ba8c4defbc|47|1 AckFrame[1034329184-1034329183,1034329181-1034329179|Δ19] 4.278 loss detection timeout handler running Sending probe 0, because no ack since 4.169. Current RTT: 33/13. 4.278 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 219 millis, based on 4.499/App, because ackElicitingInFlight | RTT:33/13 4.279 -> Packet PA|7|S0|fd56eded9fce033841c260c763ba8c4defbc|57|1 StreamFrame[0(CIB),0,17,fin] 4.349 <- (7) Packet A|1034329188|S0|5cc58b78a1959ea1|1444|2 PingFrame[] Padding(1417) 4.369 -> Packet A|8|S0|fd56eded9fce033841c260c763ba8c4defbc|49|1 AckFrame[1034329188,1034329184-1034329183,1034329181-1034329179|Δ19] 4.471 <- (8) Packet A|1034329191|S0|5cc58b78a1959ea1|1444|2 PingFrame[] Padding(1417) 4.491 -> Packet A|9|S0|fd56eded9fce033841c260c763ba8c4defbc|51|1 AckFrame[1034329191,1034329188,1034329184-1034329183,1034329181-1034329179|Δ19] 4.498 loss detection timeout handler running Sending probe 1, because no ack since 4.279. Current RTT: 33/13. 4.498 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 439 millis, based on 4.938/App, because ackElicitingInFlight | RTT:33/13 4.498 -> Packet PA|10|S0|fd56eded9fce033841c260c763ba8c4defbc|57|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 439 millis, based on 4.939/App, because ackElicitingInFlight | RTT:33/13 4.499 -> Packet PA|11|S0|fd56eded9fce033841c260c763ba8c4defbc|57|1 StreamFrame[0(CIB),0,17,fin] 4.523 <- (9) Packet A|1034329192|S0|5cc58b78a1959ea1|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 4.524 Finished downloading https://server4:443/vayqroussz at 04:21.979 on ClientConnection[f1d60838883a8e4f/5cc58b78a1959ea1(V1) with server4/193.167.100.100:443] 4.524 Closing ClientConnection[f1d60838883a8e4f/5cc58b78a1959ea1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.525 Creating connection with server4:443 with v1 4.525 -> Packet A|12|S0|fd56eded9fce033841c260c763ba8c4defbc|54|2 ConnectionCloseFrame[0|0|] AckFrame[1034329192-1034329191,1034329188,1034329184-1034329183,1034329181-1034329179|Δ0] 4.526 Setting up connection for downloading https://server4:443/ltuliktoog at 04:21.980 on ClientConnection[72e02ee4e69bcdb7/07cca046aab9e6c0(V1) with server4/193.167.100.100:443] 4.526 Original destination connection id: 72e02ee4e69bcdb7 (scid: 07cca046aab9e6c0) >- CryptoStream[I|ClientHello] 4.527 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.727/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.527 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.530 <- (10) Packet A|1034329193|S0|5cc58b78a1959ea1|40|2 AckFrame[11,9,7-6|Δ0] Padding(5) 4.530 -> Packet A|13|S0|fd56eded9fce033841c260c763ba8c4defbc|54|2 ConnectionCloseFrame[0|0|] AckFrame[1034329192-1034329191,1034329188,1034329184-1034329183,1034329181-1034329179|Δ0] 4.561 <- (1) Packet I|383685931|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.562 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.762/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.561 <- (1) Packet H|383685931|L|779|1 CryptoFrame[0,718] 4.564 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.666/Handshake, because peerAwaitingAddressValidation | RTT:34/17 4.564 -> Packet I|1|L|1201|2 Token=[] AckFrame[383685931|Δ0] Padding(1140) 4.565 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 4.567 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.669/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.567 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.568 Starting downloading https://server4:443/ltuliktoog at 04:22.022 on ClientConnection[72e02ee4e69bcdb7/07cca046aab9e6c0(V1) with server4/193.167.100.100:443] 4.568 -> Packet H|1|L|59|1 AckFrame[383685931|Δ0] 4.561 <- (1) Packet A|383685931|S0|07cca046aab9e6c0|231|2 NewConnectionIdFrame[1,<0|aa6679ad3ee6216c47497f96a6a1c65ca3e8|661b6cf464713223dc7adadc96c46b7f] Padding(164) 4.568 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.670/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.568 Discarding pn space Initial because first Handshake message is being sent 4.568 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.670/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.568 -> Packet A|0|S0|c51470e59d29ef4329944167889b154465f8|57|1 StreamFrame[0(CIB),0,17,fin] 4.588 -> Packet A|1|S0|c51470e59d29ef4329944167889b154465f8|45|1 AckFrame[383685931|Δ19] 4.646 <- (11) Packet A|1034329194|S0|5cc58b78a1959ea1|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 4.647 -> Packet A|14|S0|fd56eded9fce033841c260c763ba8c4defbc|54|2 ConnectionCloseFrame[0|0|] AckFrame[1034329192-1034329191,1034329188,1034329184-1034329183,1034329181-1034329179|Δ0] 4.669 loss detection timeout handler running Sending probe 0, because no ack since 4.567. Current RTT: 34/17. 4.669 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.670 (Probe is a handshake retransmit) 4.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 4.874/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.670 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 4.873 loss detection timeout handler running Sending probe 1, because no ack since 4.568. Current RTT: 34/17. 4.873 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.873 (Probe is a handshake retransmit) 4.874 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 5.282/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.874 -> Packet PH|3|L|90|1 CryptoFrame[0,36] 4.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 5.283/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.875 -> Packet PH|4|L|90|1 CryptoFrame[0,36] 4.906 <- (2) Packet A|383685932|S0|07cca046aab9e6c0|1406|2 PingFrame[] Padding(1376) 4.907 <- (3) Packet A|383685933|S0|07cca046aab9e6c0|1200|4 HandshakeDoneFrame[] NewTokenFrame[36f6ffa9050c45fd53b81ae3c6ee869087a2719429d9bd2e6ff4f8658c6d2a19299bf05cb3dfc40eff] CryptoFrame[0,237] Padding(886) 4.908 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 5.076/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -213 millis, based on 4.695/App, because ackElicitingInFlight | RTT:34/17 4.908 Discarding pn space Handshake because HandshakeDone is received 4.908 loss detection timeout handler running Sending probe 0, because no ack since 4.568. Current RTT: 34/17. 4.908 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 253 millis, based on 5.163/App, because ackElicitingInFlight | RTT:34/17 4.909 -> Packet PA|2|S0|c51470e59d29ef4329944167889b154465f8|66|2 AckFrame[383685933-383685931|Δ1] StreamFrame[0(CIB),0,17,fin] 4.909 <- (4) Packet A|383685934|S0|07cca046aab9e6c0|1200|2 NewConnectionIdFrame[1,<0|aa6679ad3ee6216c47497f96a6a1c65ca3e8|661b6cf464713223dc7adadc96c46b7f] Padding(1133) 4.928 -> Packet A|3|S0|c51470e59d29ef4329944167889b154465f8|45|1 AckFrame[383685934-383685931|Δ19] 4.942 <- (5) Packet A|383685936|S0|07cca046aab9e6c0|1406|2 StreamFrame[0(CIB),0,1024,fin] Padding(352) 4.943 Finished downloading https://server4:443/ltuliktoog at 04:22.397 on ClientConnection[72e02ee4e69bcdb7/07cca046aab9e6c0(V1) with server4/193.167.100.100:443] 4.943 Closing ClientConnection[72e02ee4e69bcdb7/07cca046aab9e6c0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.943 Creating connection with server4:443 with v1 4.943 -> Packet A|4|S0|c51470e59d29ef4329944167889b154465f8|50|2 ConnectionCloseFrame[0|0|] AckFrame[383685936,383685934-383685931|Δ0] 4.944 Setting up connection for downloading https://server4:443/rhamwugbxc at 04:22.399 on ClientConnection[932c5a3b36524f6a/48546956371791df(V1) with server4/193.167.100.100:443] 4.944 Original destination connection id: 932c5a3b36524f6a (scid: 48546956371791df) >- CryptoStream[I|ClientHello] 4.946 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.146/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.946 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.145 loss detection timeout handler running Sending probe 0, because no ack since 4.946. Current RTT: 100/25. 5.145 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.145 (Probe is an initial retransmit) 5.146 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.546/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.146 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.480 <- (1) Packet I|560683994|L|185|1 Token=[] CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 5.480 <- (1) Packet H|560683994|L|778|1 CryptoFrame[0,717] 5.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.484 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) reschedule loss detection timer for PTO over 399 millis, based on 5.884/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.484 -> Packet I|2|L|1201|2 Token=[] AckFrame[560683994|Δ0] Padding(1140) >- CryptoStream[H|Finished] 5.486 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 5.886/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.486 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.487 Starting downloading https://server4:443/rhamwugbxc at 04:22.941 on ClientConnection[932c5a3b36524f6a/48546956371791df(V1) with server4/193.167.100.100:443] 5.480 <- (1) Packet A|560683994|S0|48546956371791df|237|1 Padding(208) 5.487 -> Packet H|1|L|59|1 AckFrame[560683994|Δ0] 5.487 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 5.687/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.487 Discarding pn space Initial because first Handshake message is being sent 5.487 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 5.687/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.487 -> Packet A|0|S0|16c7ef7fd04ad79aabcd6391371dbe205abe|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[560683994|Δ0] 5.590 <- (2) Packet H|560683995|L|778|1 CryptoFrame[0,717] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.591 <- (3) Packet H|560683996|L|778|1 CryptoFrame[0,717] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.591 -> Packet H|2|L|59|1 AckFrame[560683995-560683994|Δ0] 5.591 -> Packet H|3|L|59|1 AckFrame[560683996-560683994|Δ0] 5.687 loss detection timeout handler running Sending probe 0, because no ack since 5.486. Current RTT: 100/25. 5.687 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.687 (Probe is a handshake retransmit) 5.687 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.087/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.687 -> Packet PH|4|L|90|1 CryptoFrame[0,36] 5.722 <- (4) Packet A|560683997|S0|48546956371791df|1200|2 StreamFrame[0(CIB),839,185,fin] Padding(983) 5.742 -> Packet A|1|S0|16c7ef7fd04ad79aabcd6391371dbe205abe|47|1 AckFrame[560683997,560683994|Δ19] 5.781 <- (5) Packet A|560683998|S0|48546956371791df|1200|6 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|d6ae73053c178d96baf13a1b94a751b81339|5df5d61c1152501f78c6afbcf5358b27] NewTokenFrame[36acea51503659aa0d55993f278ac109b1632dc062c16bff079ce42314be0459d55bfe4ee2dfd18b27] CryptoFrame[0,237] StreamFrame[0(CIB),0,839] Padding(8) 5.781 State is set to Confirmed reschedule loss detection timer for PTO over 155 millis, based on 5.937/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -69 millis, based on 5.712/App, because ackElicitingInFlight | RTT:100/25 5.782 Discarding pn space Handshake because HandshakeDone is received 5.782 loss detection timeout handler running Sending probe 0, because no ack since 5.487. Current RTT: 100/25. 5.782 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 449 millis, based on 6.232/App, because ackElicitingInFlight | RTT:100/25 5.782 -> Packet PA|2|S0|16c7ef7fd04ad79aabcd6391371dbe205abe|57|1 StreamFrame[0(CIB),0,17,fin] 5.782 Finished downloading https://server4:443/rhamwugbxc at 04:23.237 on ClientConnection[932c5a3b36524f6a/48546956371791df(V1) with server4/193.167.100.100:443] 5.782 Closing ClientConnection[932c5a3b36524f6a/48546956371791df(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.783 -> Packet A|3|S0|16c7ef7fd04ad79aabcd6391371dbe205abe|50|2 ConnectionCloseFrame[0|0|] AckFrame[560683998-560683997,560683994|Δ0] 5.783 Creating connection with server4:443 with v1 5.783 Setting up connection for downloading https://server4:443/cguxhtpxsf at 04:23.238 on ClientConnection[00c12b5ec891931a/f3602bef30a239cc(V1) with server4/193.167.100.100:443] 5.783 Original destination connection id: 00c12b5ec891931a (scid: f3602bef30a239cc) >- CryptoStream[I|ClientHello] 5.785 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.985/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.785 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.819 <- (6) Packet A|560683999|S0|48546956371791df|40|2 AckFrame[2-0|Δ5] Padding(8) 5.819 <- (1) Packet I|1460069697|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 5.819 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.019/Initial, because peerAwaitingAddressValidation | RTT:100/25 5.819 -> Packet A|4|S0|16c7ef7fd04ad79aabcd6391371dbe205abe|50|2 ConnectionCloseFrame[0|0|] AckFrame[560683998-560683997,560683994|Δ0] -< CryptoStream[I|ServerHello] 5.819 <- (1) Packet H|1460069697|L|780|1 CryptoFrame[0,719] 5.822 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.919/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.822 -> Packet I|1|L|1201|2 Token=[] AckFrame[1460069697|Δ0] Padding(1136) 5.822 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 5.824 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.921/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.824 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.824 Starting downloading https://server4:443/cguxhtpxsf at 04:23.279 on ClientConnection[00c12b5ec891931a/f3602bef30a239cc(V1) with server4/193.167.100.100:443] 5.824 -> Packet H|1|L|63|1 AckFrame[1460069697|Δ0] 5.819 <- (1) Packet A|1460069697|S0|f3602bef30a239cc|230|2 NewConnectionIdFrame[1,<0|95abe26464cc5756b6ce1440af515996a0c4|d35210f6fa4ffe1cd000b9f359aa6daa] Padding(163) 5.825 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.922/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.825 Discarding pn space Initial because first Handshake message is being sent 5.825 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.922/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.825 -> Packet A|0|S0|3367500be28209ff8d13d038c94676c2096f|57|1 StreamFrame[0(CIB),0,17,fin] 5.844 -> Packet A|1|S0|3367500be28209ff8d13d038c94676c2096f|49|1 AckFrame[1460069697|Δ19] 5.857 <- (2) Packet A|1460069699|S0|f3602bef30a239cc|1200|4 HandshakeDoneFrame[] NewTokenFrame[36f8b7404b12a584d6bb5d91e653c7021aa0fd633fbd18b17cfcdb98d8dbced65da947faf8625d0b9e] CryptoFrame[0,237] Padding(886) 5.858 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 5.921/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 88 millis, based on 5.947/App, because ackElicitingInFlight | RTT:33/16 5.858 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 5.858 <- (3) Packet A|1460069700|S0|f3602bef30a239cc|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(143) 5.859 Finished downloading https://server4:443/cguxhtpxsf at 04:23.313 on ClientConnection[00c12b5ec891931a/f3602bef30a239cc(V1) with server4/193.167.100.100:443] 5.859 Closing ClientConnection[00c12b5ec891931a/f3602bef30a239cc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.859 -> Packet A|2|S0|3367500be28209ff8d13d038c94676c2096f|50|1 AckFrame[1460069700-1460069699,1460069697|Δ0] 5.860 Creating connection with server4:443 with v1 5.860 -> Packet A|3|S0|3367500be28209ff8d13d038c94676c2096f|54|2 ConnectionCloseFrame[0|0|] AckFrame[1460069700-1460069699,1460069697|Δ0] 5.860 Setting up connection for downloading https://server4:443/qrscjogqmm at 04:23.315 on ClientConnection[297d96264a77a97e/1be4f26164563e03(V1) with server4/193.167.100.100:443] 5.860 Original destination connection id: 297d96264a77a97e (scid: 1be4f26164563e03) >- CryptoStream[I|ClientHello] 5.862 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.062/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.862 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.869 <- (4) Packet A|1460069701|S0|f3602bef30a239cc|40|2 AckFrame[0|Δ13] Padding(5) 5.869 -> Packet A|4|S0|3367500be28209ff8d13d038c94676c2096f|54|2 ConnectionCloseFrame[0|0|] AckFrame[1460069700-1460069699,1460069697|Δ0] 5.891 <- (5) Packet A|1460069702|S0|f3602bef30a239cc|1200|2 MaxStreamsFrame[B,101] Padding(1171) 5.892 -> Packet A|5|S0|3367500be28209ff8d13d038c94676c2096f|54|2 ConnectionCloseFrame[0|0|] AckFrame[1460069700-1460069699,1460069697|Δ0] 5.895 <- (1) Packet I|2136121587|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 5.896 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.096/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.995/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.895 <- (1) Packet H|2136121587|L|780|1 CryptoFrame[0,719] 5.898 -> Packet I|1|L|1201|2 Token=[] AckFrame[2136121587|Δ0] Padding(1136) 5.899 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 5.901 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.998/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.901 -> Packet H|0|L|90|1 CryptoFrame[0,36] 5.901 Starting downloading https://server4:443/qrscjogqmm at 04:23.356 on ClientConnection[297d96264a77a97e/1be4f26164563e03(V1) with server4/193.167.100.100:443] 5.895 <- (1) Packet A|2136121587|S0|1be4f26164563e03|230|2 NewConnectionIdFrame[1,<0|d39bea6d59bd32b75e74f2fcfdb1efd89271|efbd277ff8cd8118afbc1c9abbdc6021] Padding(163) 5.901 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.998/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.901 Discarding pn space Initial because first Handshake message is being sent 5.901 -> Packet H|1|L|63|1 AckFrame[2136121587|Δ0] 5.902 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.999/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.902 -> Packet A|0|S0|c48d4027bc27110e67155a3fa7add2fa7d13|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2136121587|Δ0] 5.998 loss detection timeout handler running Sending probe 0, because no ack since 5.901. Current RTT: 33/16. 5.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.998 (Probe is a handshake retransmit) 5.999 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.193/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.998 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 6.192 loss detection timeout handler running Sending probe 1, because no ack since 5.902. Current RTT: 33/16. 6.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.192 (Probe is a handshake retransmit) 6.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.581/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.192 -> Packet PH|3|L|90|1 CryptoFrame[0,36] 6.193 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.581/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.193 -> Packet PH|4|L|90|1 CryptoFrame[0,36] 6.226 <- (2) Packet A|2136121588|S0|1be4f26164563e03|1406|2 PingFrame[] Padding(1379) 6.228 <- (3) Packet A|2136121590|S0|1be4f26164563e03|1200|2 StreamFrame[0(CIB),877,147,fin] Padding(1021) 6.228 -> Packet A|1|S0|c48d4027bc27110e67155a3fa7add2fa7d13|51|1 AckFrame[2136121590,2136121588-2136121587|Δ1] 6.333 <- (4) Packet A|2136121592|S0|1be4f26164563e03|1200|5 HandshakeDoneFrame[] NewTokenFrame[36002fb5a561ea0818f4cb7b5f66170f6946475b08b9f81d0c2b0baef31c3cf9ad2e6a5b39b69e4e3c] CryptoFrame[0,237] StreamFrame[0(CIB),0,877] Padding(8) 6.334 State is set to Confirmed reschedule loss detection timer for PTO over 56 millis, based on 6.390/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -310 millis, based on 6.024/App, because ackElicitingInFlight | RTT:33/16 6.334 Discarding pn space Handshake because HandshakeDone is received 6.334 loss detection timeout handler running Sending probe 0, because no ack since 5.902. Current RTT: 33/16. -< CryptoStream[A|NewSessionTicket] 6.334 (Probe is retransmit on level App) 6.335 Finished downloading https://server4:443/qrscjogqmm at 04:23.789 on ClientConnection[297d96264a77a97e/1be4f26164563e03(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 243 millis, based on 6.579/App, because ackElicitingInFlight | RTT:33/16 6.335 Closing ClientConnection[297d96264a77a97e/1be4f26164563e03(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.335 -> Packet PA|2|S0|c48d4027bc27110e67155a3fa7add2fa7d13|57|1 StreamFrame[0(CIB),0,17,fin] 6.335 <- (5) Packet A|2136121593|S0|1be4f26164563e03|1200|2 StreamFrame[0(CIB),877,147,fin] Padding(1021) 6.335 Receiving frame for non-existent stream 0 6.336 Creating connection with server4:443 with v1 6.336 -> Packet A|3|S0|c48d4027bc27110e67155a3fa7add2fa7d13|57|2 AckFrame[2136121593-2136121592,2136121590,2136121588-2136121587|Δ1] ConnectionCloseFrame[0|0|] 6.336 Setting up connection for downloading https://server4:443/dsvedoytiy at 04:23.791 on ClientConnection[c7779cb787a85687/961ba3a76eef465c(V1) with server4/193.167.100.100:443] 6.336 Original destination connection id: c7779cb787a85687 (scid: 961ba3a76eef465c) >- CryptoStream[I|ClientHello] 6.338 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.538/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.338 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.366 <- (6) Packet A|2136121594|S0|1be4f26164563e03|40|2 AckFrame[2,0|Δ0] Padding(7) 6.366 -> Packet A|4|S0|c48d4027bc27110e67155a3fa7add2fa7d13|56|2 ConnectionCloseFrame[0|0|] AckFrame[2136121593-2136121592,2136121590,2136121588-2136121587|Δ0] 6.371 <- (1) Packet I|1451712755|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.372 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.572/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.371 <- (1) Packet H|1451712755|L|779|1 CryptoFrame[0,718] 6.375 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.472/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.375 -> Packet I|1|L|1201|2 Token=[] AckFrame[1451712755|Δ0] Padding(1136) 6.375 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 6.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.475/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.378 -> Packet H|0|L|90|1 CryptoFrame[0,36] 6.378 Starting downloading https://server4:443/dsvedoytiy at 04:23.832 on ClientConnection[c7779cb787a85687/961ba3a76eef465c(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.371 <- (1) Packet A|1451712755|S0|961ba3a76eef465c|231|2 NewConnectionIdFrame[1,<0|928a97f983ffef91932b1a6222819a08d89e|9da33beb89e7ba0f31103c6070c8476e] Padding(164) 6.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.476/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.379 Discarding pn space Initial because first Handshake message is being sent 6.379 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.476/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.379 -> [Packet H|1|L|63|1 AckFrame[1451712755|Δ0], Packet A|0|S0|a4258e2f96b807fb91c4dcbb47cc282994b4|57|1 StreamFrame[0(CIB),0,17,fin]] 6.398 -> Packet A|1|S0|a4258e2f96b807fb91c4dcbb47cc282994b4|49|1 AckFrame[1451712755|Δ19] 6.475 loss detection timeout handler running Sending probe 0, because no ack since 6.378. Current RTT: 33/16. 6.475 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.475 (Probe is a handshake retransmit) 6.475 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.669/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.475 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 6.480 <- (2) Packet H|1451712757|L|779|1 CryptoFrame[0,718] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.481 -> Packet H|3|L|65|1 AckFrame[1451712757,1451712755|Δ0] 6.508 <- (3) Packet A|1451712756|S0|961ba3a76eef465c|1406|2 PingFrame[] Padding(1379) 6.509 <- (4) Packet A|1451712757|S0|961ba3a76eef465c|1200|4 HandshakeDoneFrame[] NewTokenFrame[369e037981219f32ad80f7e99e1ca1d2688045860d82d3dcf114bb56e176c94af384aad2475cafb9fc] CryptoFrame[0,237] Padding(889) 6.509 State is set to Confirmed reschedule loss detection timer for PTO over 113 millis, based on 6.623/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -8 millis, based on 6.501/App, because ackElicitingInFlight | RTT:33/16 6.509 Discarding pn space Handshake because HandshakeDone is received 6.509 loss detection timeout handler running Sending probe 0, because no ack since 6.379. Current RTT: 33/16. 6.509 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 6.753/App, because ackElicitingInFlight | RTT:33/16 6.509 -> Packet PA|2|S0|a4258e2f96b807fb91c4dcbb47cc282994b4|57|1 StreamFrame[0(CIB),0,17,fin] 6.510 -> Packet A|3|S0|a4258e2f96b807fb91c4dcbb47cc282994b4|49|1 AckFrame[1451712757-1451712755|Δ1] 6.542 <- (5) Packet A|1451712758|S0|961ba3a76eef465c|1444|2 PingFrame[] Padding(1417) 6.543 <- (6) Packet A|1451712759|S0|961ba3a76eef465c|1406|2 StreamFrame[0(CIB),0,1024,fin] Padding(352) 6.543 -> Packet A|4|S0|a4258e2f96b807fb91c4dcbb47cc282994b4|49|1 AckFrame[1451712759-1451712755|Δ1] 6.544 Finished downloading https://server4:443/dsvedoytiy at 04:23.998 on ClientConnection[c7779cb787a85687/961ba3a76eef465c(V1) with server4/193.167.100.100:443] 6.544 Closing ClientConnection[c7779cb787a85687/961ba3a76eef465c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.544 -> Packet A|5|S0|a4258e2f96b807fb91c4dcbb47cc282994b4|52|2 ConnectionCloseFrame[0|0|] AckFrame[1451712759-1451712755|Δ0] 6.544 Creating connection with server4:443 with v1 6.545 Setting up connection for downloading https://server4:443/jdixjiskyg at 04:23.999 on ClientConnection[0d21f17ae38f1380/aadd3278ec2fe120(V1) with server4/193.167.100.100:443] 6.545 Original destination connection id: 0d21f17ae38f1380 (scid: aadd3278ec2fe120) 6.545 <- (7) Packet A|1451712760|S0|961ba3a76eef465c|40|2 AckFrame[3-1|Δ4] Padding(8) 6.545 -> Packet A|6|S0|a4258e2f96b807fb91c4dcbb47cc282994b4|52|2 ConnectionCloseFrame[0|0|] AckFrame[1451712759-1451712755|Δ0] >- CryptoStream[I|ClientHello] 6.547 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.747/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.546 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.746 loss detection timeout handler running Sending probe 0, because no ack since 6.546. Current RTT: 100/25. 6.746 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.746 (Probe is an initial retransmit) 6.746 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.146/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.746 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.780 <- (1) Packet I|947778496|L|190|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 6.781 probe count not reset on ack because handshake not yet confirmed 6.781 Retransmitting CryptoFrame[0,257] on level Initial 6.781 Cwnd(-): 6000; inflight: 0 6.781 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.181/Initial, because peerAwaitingAddressValidation | RTT:100/25 6.781 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 6.986/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.781 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 6.780 <- (1) Packet H|947778496|L|779|1 CryptoFrame[0,718] 6.784 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 6.988/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.784 -> Packet I|3|L|1201|2 Token=[] AckFrame[947778496|Δ0] Padding(1140) 6.784 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 6.786 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 6.990/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.786 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.787 Starting downloading https://server4:443/jdixjiskyg at 04:24.241 on ClientConnection[0d21f17ae38f1380/aadd3278ec2fe120(V1) with server4/193.167.100.100:443] 6.787 -> Packet H|1|L|59|1 AckFrame[947778496|Δ0] 6.780 <- (1) Packet A|947778496|S0|aadd3278ec2fe120|231|2 NewConnectionIdFrame[1,<0|5e4aba8d17deb522caa161df9e46b150aba3|f8db0a0bab110281067b2653650c2de9] Padding(164) 6.787 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.889/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.787 Discarding pn space Initial because first Handshake message is being sent 6.787 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 6.889/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 6.787 -> Packet A|0|S0|2cfc667d2a324144d0ec58335a4912ddcc7a|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[947778496|Δ0] 6.818 <- (2) Packet A|947778498|S0|aadd3278ec2fe120|1406|2 PingFrame[] Padding(1376) 6.819 <- (3) Packet A|947778499|S0|aadd3278ec2fe120|1200|4 HandshakeDoneFrame[] NewTokenFrame[366a194ecb14074aefd2cdfc9c073f14001aa0ea89565228bdd97b785bcd1b41d4681ae7f234757ff5] CryptoFrame[0,237] Padding(886) 6.820 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 6.888/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 94 millis, based on 6.914/App, because ackElicitingInFlight | RTT:34/17 6.820 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 6.820 -> Packet A|1|S0|2cfc667d2a324144d0ec58335a4912ddcc7a|47|1 AckFrame[947778499-947778498,947778496|Δ1] 6.820 <- (4) Packet A|947778500|S0|aadd3278ec2fe120|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 6.821 Finished downloading https://server4:443/jdixjiskyg at 04:24.275 on ClientConnection[0d21f17ae38f1380/aadd3278ec2fe120(V1) with server4/193.167.100.100:443] 6.821 Closing ClientConnection[0d21f17ae38f1380/aadd3278ec2fe120(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.821 Creating connection with server4:443 with v1 6.821 -> Packet A|2|S0|2cfc667d2a324144d0ec58335a4912ddcc7a|50|2 ConnectionCloseFrame[0|0|] AckFrame[947778500-947778498,947778496|Δ0] 6.822 Setting up connection for downloading https://server4:443/vtygaxnfwl at 04:24.276 on ClientConnection[c904d2009461c701/9d921b773d558761(V1) with server4/193.167.100.100:443] 6.822 Original destination connection id: c904d2009461c701 (scid: 9d921b773d558761) >- CryptoStream[I|ClientHello] 6.823 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.023/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.823 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.823 <- (5) Packet A|947778501|S0|aadd3278ec2fe120|40|2 AckFrame[0|Δ5] Padding(8) 6.824 -> Packet A|3|S0|2cfc667d2a324144d0ec58335a4912ddcc7a|50|2 ConnectionCloseFrame[0|0|] AckFrame[947778500-947778498,947778496|Δ0] 6.857 <- (1) Packet I|2052527758|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.858 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.058/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.857 <- (1) Packet H|2052527758|L|779|1 CryptoFrame[0,718] 6.860 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.957/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.860 -> Packet I|1|L|1201|2 Token=[] AckFrame[2052527758|Δ0] Padding(1136) 6.860 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 6.863 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.960/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.863 -> Packet H|0|L|90|1 CryptoFrame[0,36] 6.863 Starting downloading https://server4:443/vtygaxnfwl at 04:24.318 on ClientConnection[c904d2009461c701/9d921b773d558761(V1) with server4/193.167.100.100:443] 6.857 <- (1) Packet A|2052527758|S0|9d921b773d558761|231|2 NewConnectionIdFrame[1,<0|08aeb958156dece612cd050ebad366483a9b|62038e03c25ae711c8ddb7dca9844f70] Padding(164) 6.864 -> Packet H|1|L|63|1 AckFrame[2052527758|Δ0] 6.864 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.961/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.864 Discarding pn space Initial because first Handshake message is being sent 6.864 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.961/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.864 -> Packet A|0|S0|6ee68d3406f49021a01c5f1341ef4c124778|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2052527758|Δ0] 6.897 <- (2) Packet A|2052527761|S0|9d921b773d558761|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 6.898 Finished downloading https://server4:443/vtygaxnfwl at 04:24.353 on ClientConnection[c904d2009461c701/9d921b773d558761(V1) with server4/193.167.100.100:443] 6.898 Closing ClientConnection[c904d2009461c701/9d921b773d558761(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.898 -> Packet A|1|S0|6ee68d3406f49021a01c5f1341ef4c124778|54|2 ConnectionCloseFrame[0|0|] AckFrame[2052527761,2052527758|Δ0] 6.899 Creating connection with server4:443 with v1 6.899 Setting up connection for downloading https://server4:443/xvfqoqahnw at 04:24.354 on ClientConnection[edfdea2403e6b811/fe77e2f582a30f96(V1) with server4/193.167.100.100:443] 6.899 Original destination connection id: edfdea2403e6b811 (scid: fe77e2f582a30f96) >- CryptoStream[I|ClientHello] 6.901 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.101/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.901 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.100 loss detection timeout handler running Sending probe 0, because no ack since 6.901. Current RTT: 100/25. 7.100 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.100 (Probe is an initial retransmit) 7.101 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.501/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.101 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.500 loss detection timeout handler running Sending probe 1, because no ack since 7.101. Current RTT: 100/25. 7.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.500 (Probe is an initial retransmit) 7.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.301/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.501 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.502 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.302/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.502 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.534 <- (1) Packet I|1176081301|L|190|2 Token=[] AckFrame[2-1|Δ0] CryptoFrame[0,123] 7.534 probe count not reset on ack because handshake not yet confirmed 7.534 Retransmitting CryptoFrame[0,257] on level Initial 7.534 Cwnd(-): 6000; inflight: 1200 7.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.334/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.535 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 7.919/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 7.534 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 7.534 <- (1) Packet H|1176081301|L|779|1 CryptoFrame[0,718] 7.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 7.921/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 7.537 -> Packet I|5|L|1201|2 Token=[] AckFrame[1176081301|Δ0] Padding(1136) 7.537 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 7.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 7.923/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 7.539 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.540 Starting downloading https://server4:443/xvfqoqahnw at 04:24.994 on ClientConnection[edfdea2403e6b811/fe77e2f582a30f96(V1) with server4/193.167.100.100:443] 7.540 -> Packet H|1|L|63|1 AckFrame[1176081301|Δ0] 7.534 <- (1) Packet A|1176081301|S0|fe77e2f582a30f96|231|1 Padding(202) 7.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 7.636/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 7.540 Discarding pn space Initial because first Handshake message is being sent 7.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 7.636/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 7.540 -> Packet A|0|S0|2ef6cb6e3c1cba2f9f6c09d61541252eb7cf|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1176081301|Δ0] 7.568 Discarding packet (63 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.571 <- (3) Packet A|1176081302|S0|fe77e2f582a30f96|1406|2 PingFrame[] Padding(1376) 7.573 <- (4) Packet A|1176081304|S0|fe77e2f582a30f96|1200|2 NewConnectionIdFrame[1,<0|7aa89362f769854af2eedbd061ac41e09dec|c3cb9b03e9ef9876aa7c29aa1e3c62cb] Padding(1133) 7.574 -> Packet A|1|S0|2ef6cb6e3c1cba2f9f6c09d61541252eb7cf|51|1 AckFrame[1176081304,1176081302-1176081301|Δ1] 7.606 <- (5) Packet A|1176081305|S0|fe77e2f582a30f96|1444|2 PingFrame[] Padding(1417) 7.625 -> Packet A|2|S0|2ef6cb6e3c1cba2f9f6c09d61541252eb7cf|51|1 AckFrame[1176081305-1176081304,1176081302-1176081301|Δ19] 7.635 loss detection timeout handler running Sending probe 0, because no ack since 7.539. Current RTT: 32/16. 7.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.635 (Probe is a handshake retransmit) 7.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 7.828/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 7.636 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 7.827 loss detection timeout handler running Sending probe 1, because no ack since 7.540. Current RTT: 32/16. 7.827 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.827 (Probe is a handshake retransmit) 7.828 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 8.212/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 7.827 -> Packet PH|3|L|90|1 CryptoFrame[0,36] 7.829 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 8.213/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 7.828 -> Packet PH|4|L|90|1 CryptoFrame[0,36] 7.974 <- (6) Packet A|1176081309|S0|fe77e2f582a30f96|1444|4 HandshakeDoneFrame[] NewTokenFrame[36d94a88839cd5de45623b9d37855b350196f78bb97bf82b7d18315f4886fab0dff16036c069a058ee] CryptoFrame[0,237] Padding(1133) 7.975 State is set to Confirmed reschedule loss detection timer for PTO over 49 millis, based on 8.024/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -313 millis, based on 7.661/App, because ackElicitingInFlight | RTT:32/16 7.975 loss detection timeout handler running 7.975 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 7.540. Current RTT: 32/16. 7.975 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 8.217/App, because ackElicitingInFlight | RTT:32/16 7.975 -> Packet PA|3|S0|2ef6cb6e3c1cba2f9f6c09d61541252eb7cf|57|1 StreamFrame[0(CIB),0,17,fin] 7.995 -> Packet A|4|S0|2ef6cb6e3c1cba2f9f6c09d61541252eb7cf|53|1 AckFrame[1176081309,1176081305-1176081304,1176081302-1176081301|Δ19] 8.011 <- (7) Packet A|1176081311|S0|fe77e2f582a30f96|40|2 AckFrame[3-1|Δ5] Padding(8) 8.012 Cwnd(-): 3000; inflight: 0 8.012 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 8.012 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 8.122/App, because ackElicitingInFlight | RTT:33/13 8.012 -> Packet A|5|S0|2ef6cb6e3c1cba2f9f6c09d61541252eb7cf|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1176081309|Δ0] 8.048 <- (8) Packet A|1176081313|S0|fe77e2f582a30f96|40|2 AckFrame[5-1|Δ5] Padding(8) 8.048 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.152 <- (9) Packet A|1176081315|S0|fe77e2f582a30f96|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 8.152 Finished downloading https://server4:443/xvfqoqahnw at 04:25.607 on ClientConnection[edfdea2403e6b811/fe77e2f582a30f96(V1) with server4/193.167.100.100:443] 8.153 Closing ClientConnection[edfdea2403e6b811/fe77e2f582a30f96(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.153 Creating connection with server4:443 with v1 8.153 -> Packet A|6|S0|2ef6cb6e3c1cba2f9f6c09d61541252eb7cf|56|2 ConnectionCloseFrame[0|0|] AckFrame[1176081315,1176081313,1176081311|Δ0] 8.154 Setting up connection for downloading https://server4:443/ybeffwzsxc at 04:25.608 on ClientConnection[777edfea91de95a9/edd09782f967f0f3(V1) with server4/193.167.100.100:443] 8.154 Original destination connection id: 777edfea91de95a9 (scid: edd09782f967f0f3) >- CryptoStream[I|ClientHello] 8.155 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.355/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.155 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.189 <- (1) Packet I|760264583|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.190 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.390/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.189 <- (1) Packet H|760264583|L|779|1 CryptoFrame[0,718] 8.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.289/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.192 -> Packet I|1|L|1201|2 Token=[] AckFrame[760264583|Δ0] Padding(1140) 8.192 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 8.195 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.292/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.195 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.196 Starting downloading https://server4:443/ybeffwzsxc at 04:25.650 on ClientConnection[777edfea91de95a9/edd09782f967f0f3(V1) with server4/193.167.100.100:443] 8.196 -> Packet H|1|L|59|1 AckFrame[760264583|Δ0] 8.197 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.294/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.189 <- (1) Packet A|760264583|S0|edd09782f967f0f3|231|2 NewConnectionIdFrame[1,<0|55181f87df1908c8bf00e1a59d78b718c231|b70f01b000526bcd48ece62f0af4f74c] Padding(164) 8.196 -> Packet A|0|S0|f40747fccb3a7b94b59a0b3903d7d181a72b|57|1 StreamFrame[0(CIB),0,17,fin] 8.197 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.294/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.197 Discarding pn space Initial because first Handshake message is being sent 8.216 -> Packet A|1|S0|f40747fccb3a7b94b59a0b3903d7d181a72b|45|1 AckFrame[760264583|Δ19] 8.228 <- (2) Packet A|760264584|S0|edd09782f967f0f3|1406|2 PingFrame[] Padding(1376) 8.229 <- (3) Packet A|760264585|S0|edd09782f967f0f3|1200|4 HandshakeDoneFrame[] NewTokenFrame[36835a0f70d3e7e6413175783dec1c7e3ae86a76ea5a1afdedd8e703640d9a1ffb78e03bddd391c808] CryptoFrame[0,237] Padding(886) 8.229 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 8.292/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 89 millis, based on 8.318/App, because ackElicitingInFlight | RTT:33/16 8.229 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 8.229 -> Packet A|2|S0|f40747fccb3a7b94b59a0b3903d7d181a72b|45|1 AckFrame[760264585-760264583|Δ1] 8.230 <- (4) Packet A|760264586|S0|edd09782f967f0f3|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(143) 8.230 Finished downloading https://server4:443/ybeffwzsxc at 04:25.685 on ClientConnection[777edfea91de95a9/edd09782f967f0f3(V1) with server4/193.167.100.100:443] 8.230 Closing ClientConnection[777edfea91de95a9/edd09782f967f0f3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.231 -> Packet A|3|S0|f40747fccb3a7b94b59a0b3903d7d181a72b|48|2 ConnectionCloseFrame[0|0|] AckFrame[760264586-760264583|Δ0] 8.231 Creating connection with server4:443 with v1 8.232 Setting up connection for downloading https://server4:443/oiqppgreta at 04:25.686 on ClientConnection[d7ac2b0123831884/fa5f68ffecdaa46d(V1) with server4/193.167.100.100:443] 8.232 Original destination connection id: d7ac2b0123831884 (scid: fa5f68ffecdaa46d) >- CryptoStream[I|ClientHello] 8.233 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.433/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.233 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.241 <- (5) Packet A|760264587|S0|edd09782f967f0f3|40|2 AckFrame[0|Δ13] Padding(5) 8.241 -> Packet A|4|S0|f40747fccb3a7b94b59a0b3903d7d181a72b|48|2 ConnectionCloseFrame[0|0|] AckFrame[760264586-760264583|Δ0] 8.267 <- (1) Packet I|1167418543|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.268 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.468/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.267 <- (1) Packet H|1167418543|L|778|1 CryptoFrame[0,717] 8.271 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.368/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.271 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 8.270 -> Packet I|1|L|1201|2 Token=[] AckFrame[1167418543|Δ0] Padding(1136) >- CryptoStream[H|Finished] 8.274 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.371/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.274 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.274 -> Packet H|1|L|63|1 AckFrame[1167418543|Δ0] 8.267 <- (1) Packet A|1167418543|S0|fa5f68ffecdaa46d|232|2 NewConnectionIdFrame[1,<0|4d8733c4dd6784414fb055976387b0d7a482|b78b6a8362c3ca8481975801f2392f85] Padding(165) 8.274 Starting downloading https://server4:443/oiqppgreta at 04:25.729 on ClientConnection[d7ac2b0123831884/fa5f68ffecdaa46d(V1) with server4/193.167.100.100:443] 8.274 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.371/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.274 Discarding pn space Initial because first Handshake message is being sent 8.275 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.372/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.275 -> Packet A|0|S0|b6a46c1f20cca956a4f58d3eca4e0bfa9d47|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1167418543|Δ0] 8.371 loss detection timeout handler running Sending probe 0, because no ack since 8.274. Current RTT: 33/16. 8.371 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.371 (Probe is a handshake retransmit) 8.372 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.566/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.371 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 8.565 loss detection timeout handler running Sending probe 1, because no ack since 8.275. Current RTT: 33/16. 8.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.565 (Probe is a handshake retransmit) 8.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 8.954/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.565 -> Packet PH|3|L|90|1 CryptoFrame[0,36] 8.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 8.954/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.566 -> Packet PH|4|L|90|1 CryptoFrame[0,36] 8.598 <- (2) Packet A|1167418544|S0|fa5f68ffecdaa46d|1406|2 PingFrame[] Padding(1376) 8.618 -> Packet A|1|S0|b6a46c1f20cca956a4f58d3eca4e0bfa9d47|49|1 AckFrame[1167418544-1167418543|Δ19] 8.650 <- (3) Packet A|1167418547|S0|fa5f68ffecdaa46d|1444|2 PingFrame[] Padding(1417) 8.669 -> Packet A|2|S0|b6a46c1f20cca956a4f58d3eca4e0bfa9d47|51|1 AckFrame[1167418547,1167418544-1167418543|Δ19] 8.825 <- (4) Packet A|1167418550|S0|fa5f68ffecdaa46d|1444|4 HandshakeDoneFrame[] NewTokenFrame[3696a2b770b5b321cbcb7e0aa659fb3b6af2597dc31dd60b3e58a531cfd966f7599e0b17681cb7d58f] CryptoFrame[0,237] Padding(1133) 8.826 State is set to Confirmed reschedule loss detection timer for PTO over -63 millis, based on 8.763/App, because ackElicitingInFlight | RTT:33/16 8.826 loss detection timeout handler running Sending probe 2, because no ack since 8.275. Current RTT: 33/16. 8.826 (Probe is retransmit on level App) reschedule loss detection timer for PTO over -429 millis, based on 8.397/App, because ackElicitingInFlight | RTT:33/16 8.826 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 121 millis, based on 8.948/App, because ackElicitingInFlight | RTT:33/16 8.826 -> Packet PA|3|S0|b6a46c1f20cca956a4f58d3eca4e0bfa9d47|57|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 121 millis, based on 8.949/App, because ackElicitingInFlight | RTT:33/16 8.827 -> Packet PA|4|S0|b6a46c1f20cca956a4f58d3eca4e0bfa9d47|57|1 StreamFrame[0(CIB),0,17,fin] 8.846 -> Packet A|5|S0|b6a46c1f20cca956a4f58d3eca4e0bfa9d47|53|1 AckFrame[1167418550,1167418547,1167418544-1167418543|Δ19] 8.859 <- (5) Packet A|1167418551|S0|fa5f68ffecdaa46d|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 8.860 Finished downloading https://server4:443/oiqppgreta at 04:26.315 on ClientConnection[d7ac2b0123831884/fa5f68ffecdaa46d(V1) with server4/193.167.100.100:443] 8.860 Closing ClientConnection[d7ac2b0123831884/fa5f68ffecdaa46d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.861 Creating connection with server4:443 with v1 8.861 -> Packet A|6|S0|b6a46c1f20cca956a4f58d3eca4e0bfa9d47|56|2 ConnectionCloseFrame[0|0|] AckFrame[1167418551-1167418550,1167418547,1167418544-1167418543|Δ0] 8.862 Setting up connection for downloading https://server4:443/avygjgnefu at 04:26.316 on ClientConnection[3140b9d50c35aad4/bbb2e8a996417f68(V1) with server4/193.167.100.100:443] 8.862 Original destination connection id: 3140b9d50c35aad4 (scid: bbb2e8a996417f68) >- CryptoStream[I|ClientHello] 8.863 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.063/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.863 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.863 <- (6) Packet A|1167418552|S0|fa5f68ffecdaa46d|40|2 AckFrame[4,2-1|Δ5] Padding(6) 8.864 -> Packet A|7|S0|b6a46c1f20cca956a4f58d3eca4e0bfa9d47|56|2 ConnectionCloseFrame[0|0|] AckFrame[1167418551-1167418550,1167418547,1167418544-1167418543|Δ0] 8.897 <- (1) Packet I|1435514309|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.898 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.098/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.897 <- (1) Packet H|1435514309|L|778|1 CryptoFrame[0,717] reschedule loss detection timer for PTO over 101 millis, based on 9.002/Handshake, because peerAwaitingAddressValidation | RTT:34/17 8.900 -> Packet I|1|L|1201|2 Token=[] AckFrame[1435514309|Δ0] Padding(1136) 8.900 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 8.903 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.005/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.903 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.903 Starting downloading https://server4:443/avygjgnefu at 04:26.358 on ClientConnection[3140b9d50c35aad4/bbb2e8a996417f68(V1) with server4/193.167.100.100:443] 8.897 <- (1) Packet A|1435514309|S0|bbb2e8a996417f68|232|2 NewConnectionIdFrame[1,<0|3f9fb02b3dff4bb90eb5ec2a6f259b555cbf|7ddc71aab20d3cb7f46977dde6da399a] Padding(165) 8.904 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.006/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.904 Discarding pn space Initial because first Handshake message is being sent 8.904 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.006/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.904 -> [Packet H|1|L|63|1 AckFrame[1435514309|Δ0], Packet A|0|S0|c113baefb495fc3d75d010fc55b2a35fe118|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1435514309|Δ0]] 8.935 <- (2) Packet A|1435514310|S0|bbb2e8a996417f68|1406|2 PingFrame[] Padding(1376) 8.955 -> Packet A|1|S0|c113baefb495fc3d75d010fc55b2a35fe118|49|1 AckFrame[1435514310-1435514309|Δ19] 8.987 <- (3) Packet A|1435514312|S0|bbb2e8a996417f68|1444|2 PingFrame[] Padding(1417) 9.005 loss detection timeout handler running Sending probe 0, because no ack since 8.903. Current RTT: 34/17. 9.005 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.005 (Probe is a handshake retransmit) 9.006 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 9.210/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.006 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 9.007 -> Packet A|2|S0|c113baefb495fc3d75d010fc55b2a35fe118|51|1 AckFrame[1435514312,1435514310-1435514309|Δ19] 9.170 <- (4) Packet A|1435514314|S0|bbb2e8a996417f68|1444|4 HandshakeDoneFrame[] NewTokenFrame[3673ca5657e31ffd0fcea9f70bd0a180377b344d751c2da46800a1083dcdd1933afe26bfe8cf7d0715] CryptoFrame[0,237] Padding(1133) 9.171 State is set to Confirmed reschedule loss detection timer for PTO over -12 millis, based on 9.158/App, because ackElicitingInFlight | RTT:34/17 9.171 loss detection timeout handler running Sending probe 1, because no ack since 8.904. Current RTT: 34/17. reschedule loss detection timer for PTO over -12 millis, based on 9.158/App, because ackElicitingInFlight | RTT:34/17 9.171 (Probe is retransmit on level App) 9.171 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 253 millis, based on 9.425/App, because ackElicitingInFlight | RTT:34/17 9.171 -> Packet PA|3|S0|c113baefb495fc3d75d010fc55b2a35fe118|57|1 StreamFrame[0(CIB),0,17,fin] 9.171 <- (5) Packet A|1435514315|S0|bbb2e8a996417f68|1444|4 HandshakeDoneFrame[] NewTokenFrame[3673ca5657e31ffd0fcea9f70bd0a180377b344d751c2da46800a1083dcdd1933afe26bfe8cf7d0715] CryptoFrame[0,237] Padding(1133) -< CryptoStream[A|NewSessionTicket] 9.172 -> Packet A|4|S0|c113baefb495fc3d75d010fc55b2a35fe118|52|1 AckFrame[1435514315-1435514314,1435514312,1435514310-1435514309|Δ0] 9.424 loss detection timeout handler running Sending probe 1, because no ack since 9.171. Current RTT: 34/17. 9.425 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 9.933/App, because ackElicitingInFlight | RTT:34/17 9.425 -> Packet PA|5|S0|c113baefb495fc3d75d010fc55b2a35fe118|57|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 9.934/App, because ackElicitingInFlight | RTT:34/17 9.426 -> Packet PA|6|S0|c113baefb495fc3d75d010fc55b2a35fe118|57|1 StreamFrame[0(CIB),0,17,fin] 9.457 <- (6) Packet A|1435514316|S0|bbb2e8a996417f68|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 9.458 Finished downloading https://server4:443/avygjgnefu at 04:26.912 on ClientConnection[3140b9d50c35aad4/bbb2e8a996417f68(V1) with server4/193.167.100.100:443] 9.458 Closing ClientConnection[3140b9d50c35aad4/bbb2e8a996417f68(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.459 Creating connection with server4:443 with v1 9.459 -> Packet A|7|S0|c113baefb495fc3d75d010fc55b2a35fe118|56|2 ConnectionCloseFrame[0|0|] AckFrame[1435514316-1435514314,1435514312,1435514310-1435514309|Δ0] 9.459 Setting up connection for downloading https://server4:443/vqbceurtbr at 04:26.914 on ClientConnection[14d46fbb113b503d/a7ccc0b9bfcfbcfd(V1) with server4/193.167.100.100:443] 9.459 Original destination connection id: 14d46fbb113b503d (scid: a7ccc0b9bfcfbcfd) >- CryptoStream[I|ClientHello] 9.461 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.661/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.461 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.495 <- (1) Packet I|381780804|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.495 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.695/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.495 <- (1) Packet H|381780804|L|779|1 CryptoFrame[0,718] 9.498 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.600/Handshake, because peerAwaitingAddressValidation | RTT:34/17 9.498 -> Packet I|1|L|1201|2 Token=[] AckFrame[381780804|Δ0] Padding(1140) 9.498 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 9.500 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.602/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.500 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.501 Starting downloading https://server4:443/vqbceurtbr at 04:26.955 on ClientConnection[14d46fbb113b503d/a7ccc0b9bfcfbcfd(V1) with server4/193.167.100.100:443] 9.495 <- (1) Packet A|381780804|S0|a7ccc0b9bfcfbcfd|231|2 NewConnectionIdFrame[1,<0|dc9cf9a87f386baf417a01ee5d89b27c7748|5e9d38ad6381b1b6ecd36ec7121fb6bd] Padding(164) 9.501 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.603/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.501 Discarding pn space Initial because first Handshake message is being sent 9.501 -> Packet H|1|L|59|1 AckFrame[381780804|Δ0] 9.502 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 9.604/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.502 -> Packet A|0|S0|922debb51f4fb49f310aa6dc485d2c911388|66|2 StreamFrame[0(CIB),0,17,fin] AckFrame[381780804|Δ1] 9.534 <- (2) Packet A|381780806|S0|a7ccc0b9bfcfbcfd|1200|4 HandshakeDoneFrame[] NewTokenFrame[36e902f33ef3ac9d255dc1f2307b4eae19d6f015630d4ff164c11e2c2d52aa9f5ffe0ac49547e387c9] CryptoFrame[0,237] Padding(886) 9.535 State is set to Confirmed reschedule loss detection timer for PTO over 67 millis, based on 9.602/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 94 millis, based on 9.629/App, because ackElicitingInFlight | RTT:34/17 9.535 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 9.554 -> Packet A|1|S0|922debb51f4fb49f310aa6dc485d2c911388|47|1 AckFrame[381780806,381780804|Δ19] 9.629 loss detection timeout handler running Sending probe 0, because no ack since 9.502. Current RTT: 34/17. 9.629 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 9.883/App, because ackElicitingInFlight | RTT:34/17 9.629 -> Packet PA|2|S0|922debb51f4fb49f310aa6dc485d2c911388|57|1 StreamFrame[0(CIB),0,17,fin] 9.667 <- (3) Packet A|381780809|S0|a7ccc0b9bfcfbcfd|1200|3 AckFrame[2-0|Δ6] PingFrame[] Padding(1167) 9.668 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.687 -> Packet A|3|S0|922debb51f4fb49f310aa6dc485d2c911388|45|1 AckFrame[381780809|Δ19] 9.719 <- (4) Packet A|381780810|S0|a7ccc0b9bfcfbcfd|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 9.720 Finished downloading https://server4:443/vqbceurtbr at 04:27.174 on ClientConnection[14d46fbb113b503d/a7ccc0b9bfcfbcfd(V1) with server4/193.167.100.100:443] 9.720 Closing ClientConnection[14d46fbb113b503d/a7ccc0b9bfcfbcfd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.721 Creating connection with server4:443 with v1 9.721 -> Packet A|4|S0|922debb51f4fb49f310aa6dc485d2c911388|48|2 ConnectionCloseFrame[0|0|] AckFrame[381780810-381780809|Δ0] 9.721 Setting up connection for downloading https://server4:443/chhyrcscnp at 04:27.176 on ClientConnection[8b3b5d95c68fe017/59905252d3d08345(V1) with server4/193.167.100.100:443] 9.721 Original destination connection id: 8b3b5d95c68fe017 (scid: 59905252d3d08345) >- CryptoStream[I|ClientHello] 9.723 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.923/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.723 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.922 loss detection timeout handler running Sending probe 0, because no ack since 9.723. Current RTT: 100/25. 9.922 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.922 (Probe is an initial retransmit) 9.923 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.323/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.923 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.957 <- (1) Packet I|432889047|L|190|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 9.957 probe count not reset on ack because handshake not yet confirmed 9.958 Retransmitting CryptoFrame[0,257] on level Initial 9.958 Cwnd(-): 6000; inflight: 0 9.958 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.358/Initial, because peerAwaitingAddressValidation | RTT:100/25 9.958 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 10.162/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.958 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 9.957 <- (1) Packet H|432889047|L|779|1 CryptoFrame[0,718] 9.960 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 10.164/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.960 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 9.960 -> Packet I|3|L|1201|2 Token=[] AckFrame[432889047|Δ0] Padding(1140) >- CryptoStream[H|Finished] 9.963 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 10.167/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.963 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.963 Starting downloading https://server4:443/chhyrcscnp at 04:27.418 on ClientConnection[8b3b5d95c68fe017/59905252d3d08345(V1) with server4/193.167.100.100:443] 9.957 <- (1) Packet A|432889047|S0|59905252d3d08345|231|2 NewConnectionIdFrame[1,<0|6d5dada8bc3b1e863c45a214246b8f2b6f37|81a43338bdfcbce7828ea2fc5b7538db] Padding(164) 9.964 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.066/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.964 Discarding pn space Initial because first Handshake message is being sent 9.964 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 10.066/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.964 -> [Packet H|1|L|59|1 AckFrame[432889047|Δ0], Packet A|0|S0|815046e80e19fc6a2d09afa9d995a9e77818|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[432889047|Δ0]] 10.065 loss detection timeout handler running Sending probe 0, because no ack since 9.963. Current RTT: 34/17. 10.065 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.065 (Probe is a handshake retransmit) 10.066 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 10.270/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.066 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 10.099 <- (2) Packet A|432889050|S0|59905252d3d08345|1200|5 AckFrame[0|Δ102] HandshakeDoneFrame[] NewTokenFrame[36c25026ccf89423a903d48c57f556ed868f5eb298c42a252f67431649230a4d33fae3eadb8a551220] CryptoFrame[0,237] StreamFrame[0(CIB),0,879] 10.100 probe count not reset on ack because handshake not yet confirmed 10.100 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 10.304/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 10.100 State is set to Confirmed reschedule loss detection timer for PTO over 309 millis, based on 10.410/Handshake, because ackElicitingInFlight | RTT:44/32 10.100 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.100 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 10.100 <- (3) Packet A|432889051|S0|59905252d3d08345|1200|2 StreamFrame[0(CIB),879,145,fin] Padding(1023) 10.101 Finished downloading https://server4:443/chhyrcscnp at 04:27.555 on ClientConnection[8b3b5d95c68fe017/59905252d3d08345(V1) with server4/193.167.100.100:443] 10.101 Closing ClientConnection[8b3b5d95c68fe017/59905252d3d08345(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.101 -> Packet A|1|S0|815046e80e19fc6a2d09afa9d995a9e77818|44|1 AckFrame[432889051-432889050|Δ0] 10.101 -> Packet A|2|S0|815046e80e19fc6a2d09afa9d995a9e77818|48|2 ConnectionCloseFrame[0|0|] AckFrame[432889051-432889050|Δ0] 10.101 Creating connection with server4:443 with v1 10.102 Setting up connection for downloading https://server4:443/dqaovzpnad at 04:27.556 on ClientConnection[635d1dc2727856fe/83a3ea9398873bd6(V1) with server4/193.167.100.100:443] 10.102 Original destination connection id: 635d1dc2727856fe (scid: 83a3ea9398873bd6) >- CryptoStream[I|ClientHello] 10.104 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.304/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.103 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.137 <- (1) Packet I|572596901|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 10.138 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.338/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.137 <- (1) Packet H|572596901|L|778|1 CryptoFrame[0,717] 10.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.237/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.140 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 10.140 -> Packet I|1|L|1201|2 Token=[] AckFrame[572596901|Δ0] Padding(1140) >- CryptoStream[H|Finished] 10.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.240/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.143 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.143 Starting downloading https://server4:443/dqaovzpnad at 04:27.597 on ClientConnection[635d1dc2727856fe/83a3ea9398873bd6(V1) with server4/193.167.100.100:443] 10.137 <- (1) Packet A|572596901|S0|83a3ea9398873bd6|232|2 NewConnectionIdFrame[1,<0|3785d6bb4287c425d6d81a637d1c77a06799|29f62643ab8a98c30ab62977fd5cb19a] Padding(165) 10.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.240/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.143 Discarding pn space Initial because first Handshake message is being sent 10.144 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.241/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.144 -> [Packet H|1|L|59|1 AckFrame[572596901|Δ0], Packet A|0|S0|087a98bf8f56d45f6fad893b2618498a5815|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[572596901|Δ0]] 10.175 <- (2) Packet A|572596902|S0|83a3ea9398873bd6|1406|2 PingFrame[] Padding(1376) 10.176 <- (3) Packet A|572596903|S0|83a3ea9398873bd6|1200|4 HandshakeDoneFrame[] NewTokenFrame[364cf505442f0d2c800de22dcb2396dcdd87077103f8863157cc28832c7118dff51f7de947a63dadea] CryptoFrame[0,237] Padding(886) 10.176 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 10.240/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 89 millis, based on 10.266/App, because ackElicitingInFlight | RTT:33/16 10.176 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 10.176 -> Packet A|1|S0|087a98bf8f56d45f6fad893b2618498a5815|45|1 AckFrame[572596903-572596901|Δ1] 10.265 loss detection timeout handler running Sending probe 0, because no ack since 10.144. Current RTT: 33/16. 10.265 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 10.510/App, because ackElicitingInFlight | RTT:33/16 10.266 -> Packet PA|2|S0|087a98bf8f56d45f6fad893b2618498a5815|57|1 StreamFrame[0(CIB),0,17,fin] 10.298 <- (4) Packet A|572596904|S0|83a3ea9398873bd6|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(143) 10.299 Finished downloading https://server4:443/dqaovzpnad at 04:27.753 on ClientConnection[635d1dc2727856fe/83a3ea9398873bd6(V1) with server4/193.167.100.100:443] 10.299 Closing ClientConnection[635d1dc2727856fe/83a3ea9398873bd6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.299 Creating connection with server4:443 with v1 10.299 -> Packet A|3|S0|087a98bf8f56d45f6fad893b2618498a5815|48|2 ConnectionCloseFrame[0|0|] AckFrame[572596904-572596901|Δ0] 10.300 Setting up connection for downloading https://server4:443/azspwywtok at 04:27.754 on ClientConnection[55c470a458c4ff03/ecebd7db978038bb(V1) with server4/193.167.100.100:443] 10.300 Original destination connection id: 55c470a458c4ff03 (scid: ecebd7db978038bb) >- CryptoStream[I|ClientHello] 10.301 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.301 <- (5) Packet A|572596905|S0|83a3ea9398873bd6|40|2 AckFrame[2|Δ4] Padding(5) reschedule loss detection timer for PTO over 199 millis, based on 10.501/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.301 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.302 -> Packet A|4|S0|087a98bf8f56d45f6fad893b2618498a5815|48|2 ConnectionCloseFrame[0|0|] AckFrame[572596904-572596901|Δ0] 10.307 <- (6) Packet A|572596906|S0|83a3ea9398873bd6|1406|2 PingFrame[] Padding(1376) 10.308 -> Packet A|5|S0|087a98bf8f56d45f6fad893b2618498a5815|48|2 ConnectionCloseFrame[0|0|] AckFrame[572596904-572596901|Δ0] 10.500 loss detection timeout handler running Sending probe 0, because no ack since 10.301. Current RTT: 100/25. 10.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.501 (Probe is an initial retransmit) 10.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.901/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.501 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.534 <- (1) Packet I|890781820|L|190|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 10.535 probe count not reset on ack because handshake not yet confirmed 10.535 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.935/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.534 <- (1) Packet H|890781820|L|779|1 CryptoFrame[0,718] 10.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.731/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.537 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 10.537 -> Packet I|2|L|1201|2 Token=[] AckFrame[890781820|Δ0] Padding(1140) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.539 Starting downloading https://server4:443/azspwywtok at 04:27.994 on ClientConnection[55c470a458c4ff03/ecebd7db978038bb(V1) with server4/193.167.100.100:443] 10.534 <- (1) Packet A|890781820|S0|ecebd7db978038bb|231|1 Padding(202) 10.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.636/Handshake, because peerAwaitingAddressValidation | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 10.636/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.539 Discarding pn space Initial because first Handshake message is being sent 10.539 -> Packet H|0|L|90|1 CryptoFrame[0,36] 10.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.637/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.540 -> [Packet H|1|L|59|1 AckFrame[890781820|Δ0], Packet A|0|S0|53c68cbeff185a457b8b15bfdcb79f2bbaec|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[890781820|Δ0]] 10.572 <- (2) Packet A|890781821|S0|ecebd7db978038bb|1406|2 PingFrame[] Padding(1376) 10.573 <- (3) Packet A|890781822|S0|ecebd7db978038bb|1200|4 HandshakeDoneFrame[] NewTokenFrame[3665f15fe130805942466a3b973bb6f7fa14f95aa7a64b40cc1ff1b1af039af627fb798094df93b8c3] CryptoFrame[0,237] Padding(886) 10.573 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 10.636/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 88 millis, based on 10.662/App, because ackElicitingInFlight | RTT:33/16 10.573 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 10.573 -> Packet A|1|S0|53c68cbeff185a457b8b15bfdcb79f2bbaec|45|1 AckFrame[890781822-890781820|Δ1] 10.574 <- (4) Packet A|890781823|S0|ecebd7db978038bb|1200|2 NewConnectionIdFrame[1,<0|3eb62d25eba55d72a274d063eebfa69f1083|50439e19a0d56f1a94d6b7ef650aa727] Padding(1133) 10.593 -> Packet A|2|S0|53c68cbeff185a457b8b15bfdcb79f2bbaec|45|1 AckFrame[890781823-890781820|Δ19] 10.605 <- (5) Packet A|890781824|S0|ecebd7db978038bb|1444|2 PingFrame[] Padding(1417) 10.625 -> Packet A|3|S0|53c68cbeff185a457b8b15bfdcb79f2bbaec|45|1 AckFrame[890781824-890781820|Δ19] 10.661 loss detection timeout handler running Sending probe 0, because no ack since 10.540. Current RTT: 33/16. 10.661 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 10.905/App, because ackElicitingInFlight | RTT:33/16 10.661 -> Packet PA|4|S0|53c68cbeff185a457b8b15bfdcb79f2bbaec|57|1 StreamFrame[0(CIB),0,17,fin] 10.694 <- (6) Packet A|890781825|S0|ecebd7db978038bb|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 10.694 Finished downloading https://server4:443/azspwywtok at 04:28.149 on ClientConnection[55c470a458c4ff03/ecebd7db978038bb(V1) with server4/193.167.100.100:443] 10.694 Closing ClientConnection[55c470a458c4ff03/ecebd7db978038bb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.695 -> Packet A|5|S0|53c68cbeff185a457b8b15bfdcb79f2bbaec|48|2 ConnectionCloseFrame[0|0|] AckFrame[890781825-890781820|Δ0] 10.695 Creating connection with server4:443 with v1 10.696 Setting up connection for downloading https://server4:443/zskjxsaati at 04:28.150 on ClientConnection[adec3b9637721abb/bb47128beb4fad0d(V1) with server4/193.167.100.100:443] 10.696 Original destination connection id: adec3b9637721abb (scid: bb47128beb4fad0d) >- CryptoStream[I|ClientHello] 10.697 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.897/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.697 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.698 <- (7) Packet A|890781826|S0|ecebd7db978038bb|40|2 AckFrame[4-3,1|Δ5] Padding(6) 10.698 -> Packet A|6|S0|53c68cbeff185a457b8b15bfdcb79f2bbaec|48|2 ConnectionCloseFrame[0|0|] AckFrame[890781825-890781820|Δ0] 10.731 <- (1) Packet I|659758646|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 10.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.931/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.731 <- (1) Packet H|659758646|L|780|1 CryptoFrame[0,719] 10.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.830/Handshake, because peerAwaitingAddressValidation | RTT:33/16 10.733 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 10.733 -> Packet I|1|L|1201|2 Token=[] AckFrame[659758646|Δ0] Padding(1140) >- CryptoStream[H|Finished] 10.735 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.832/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.735 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.736 Starting downloading https://server4:443/zskjxsaati at 04:28.190 on ClientConnection[adec3b9637721abb/bb47128beb4fad0d(V1) with server4/193.167.100.100:443] 10.731 <- (1) Packet A|659758646|S0|bb47128beb4fad0d|230|2 NewConnectionIdFrame[1,<0|a3746c1ae80238e5f9e54a7f1a1eb066cddb|71fb88e0e6f4d26b3bec7a9b706b3f2f] Padding(163) 10.736 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.833/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.736 Discarding pn space Initial because first Handshake message is being sent 10.736 -> Packet H|1|L|59|1 AckFrame[659758646|Δ0] 10.736 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.833/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.736 -> Packet A|0|S0|547d1a4ab3e6bdac3cfa15a12fc1ee141048|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[659758646|Δ0] 10.768 <- (2) Packet A|659758647|S0|bb47128beb4fad0d|1406|2 PingFrame[] Padding(1376) 10.769 <- (3) Packet A|659758648|S0|bb47128beb4fad0d|1200|4 HandshakeDoneFrame[] NewTokenFrame[361348c4e585fccedfc1ba5cabbf2eb6fe76ffacf687cce119c920b5c015dd96ad6054f3a481cc955f] CryptoFrame[0,237] Padding(886) 10.769 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 10.832/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 89 millis, based on 10.858/App, because ackElicitingInFlight | RTT:33/16 10.769 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 10.769 -> Packet A|1|S0|547d1a4ab3e6bdac3cfa15a12fc1ee141048|45|1 AckFrame[659758648-659758646|Δ1] 10.772 <- (4) Packet A|659758650|S0|bb47128beb4fad0d|40|2 AckFrame[0|Δ5] Padding(8) 10.773 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.802 <- (5) Packet A|659758651|S0|bb47128beb4fad0d|1444|2 PingFrame[] Padding(1417) 10.815 <- (8) Packet A|890781827|S0|ecebd7db978038bb|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 10.815 -> Packet A|7|S0|53c68cbeff185a457b8b15bfdcb79f2bbaec|48|2 ConnectionCloseFrame[0|0|] AckFrame[890781825-890781820|Δ0] 10.821 -> Packet A|2|S0|547d1a4ab3e6bdac3cfa15a12fc1ee141048|47|1 AckFrame[659758651-659758650,659758648-659758647|Δ19] 10.853 <- (6) Packet A|659758652|S0|bb47128beb4fad0d|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 10.854 Finished downloading https://server4:443/zskjxsaati at 04:28.308 on ClientConnection[adec3b9637721abb/bb47128beb4fad0d(V1) with server4/193.167.100.100:443] 10.854 Closing ClientConnection[adec3b9637721abb/bb47128beb4fad0d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.854 -> Packet A|3|S0|547d1a4ab3e6bdac3cfa15a12fc1ee141048|50|2 ConnectionCloseFrame[0|0|] AckFrame[659758652-659758650,659758648-659758647|Δ0] 10.855 Creating connection with server4:443 with v1 10.855 Setting up connection for downloading https://server4:443/svkmtzmklj at 04:28.310 on ClientConnection[fe1f2773da3a04c9/626324e51a015e86(V1) with server4/193.167.100.100:443] 10.855 Original destination connection id: fe1f2773da3a04c9 (scid: 626324e51a015e86) >- CryptoStream[I|ClientHello] 10.856 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.056/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.856 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.056 loss detection timeout handler running Sending probe 0, because no ack since 10.856. Current RTT: 100/25. 11.056 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.056 (Probe is an initial retransmit) 11.056 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.456/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.056 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.089 <- (1) Packet I|275489802|L|190|2 Token=[] AckFrame[1-0|Δ0] CryptoFrame[0,123] 11.090 probe count not reset on ack because handshake not yet confirmed 11.090 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.490/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.089 <- (1) Packet H|275489802|L|779|1 CryptoFrame[0,718] 11.092 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.286/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.092 -> Packet I|2|L|1201|2 Token=[] AckFrame[275489802|Δ0] Padding(1140) 11.092 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 11.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 193 millis, based on 11.289/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.095 -> Packet H|0|L|90|1 CryptoFrame[0,36] 11.095 Starting downloading https://server4:443/svkmtzmklj at 04:28.549 on ClientConnection[fe1f2773da3a04c9/626324e51a015e86(V1) with server4/193.167.100.100:443] 11.089 <- (1) Packet A|275489802|S0|626324e51a015e86|231|1 Padding(202) 11.095 -> Packet H|1|L|59|1 AckFrame[275489802|Δ0] 11.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.192/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.095 Discarding pn space Initial because first Handshake message is being sent 11.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.192/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.095 -> Packet A|0|S0|1bb28467864cf9412ccde47c4b0b0d0249fd|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[275489802|Δ0] 11.128 <- (2) Packet A|275489804|S0|626324e51a015e86|1200|4 HandshakeDoneFrame[] NewTokenFrame[36ef9298a42f82b10d4f6e9552bca45352f54afcabf47ca54b5e65aedcc710702b33ec9e8a4dd4eec9] CryptoFrame[0,237] Padding(886) 11.129 State is set to Confirmed reschedule loss detection timer for PTO over 62 millis, based on 11.192/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 88 millis, based on 11.217/App, because ackElicitingInFlight | RTT:33/16 11.129 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 11.140 <- (3) Packet A|275489806|S0|626324e51a015e86|40|2 AckFrame[0|Δ13] Padding(8) 11.140 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.148 -> Packet A|1|S0|1bb28467864cf9412ccde47c4b0b0d0249fd|47|1 AckFrame[275489806,275489804|Δ19] 11.241 <- (4) Packet A|275489807|S0|626324e51a015e86|1200|3 NewConnectionIdFrame[1,<0|071d3f964abfddba708c931dfa5a074cad25|b19f37c4c13315ad46c5742f6bd79056] StreamFrame[0(CIB),0,1024,fin] Padding(108) 11.242 Finished downloading https://server4:443/svkmtzmklj at 04:28.696 on ClientConnection[fe1f2773da3a04c9/626324e51a015e86(V1) with server4/193.167.100.100:443] 11.242 Closing ClientConnection[fe1f2773da3a04c9/626324e51a015e86(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.242 Creating connection with server4:443 with v1 11.242 -> Packet A|2|S0|1bb28467864cf9412ccde47c4b0b0d0249fd|50|2 ConnectionCloseFrame[0|0|] AckFrame[275489807-275489806,275489804|Δ0] 11.243 Setting up connection for downloading https://server4:443/lgkvmtrxre at 04:28.698 on ClientConnection[b717ce4da9b3ec4e/a02e94e359b0bf87(V1) with server4/193.167.100.100:443] 11.243 Original destination connection id: b717ce4da9b3ec4e (scid: a02e94e359b0bf87) >- CryptoStream[I|ClientHello] 11.245 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.445/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.245 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.279 <- (1) Packet I|628255452|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 11.279 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.479/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.379/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.279 <- (1) Packet H|628255452|L|779|1 CryptoFrame[0,718] 11.282 -> Packet I|1|L|1201|2 Token=[] AckFrame[628255452|Δ0] Padding(1140) 11.282 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 11.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.382/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.284 -> Packet H|0|L|90|1 CryptoFrame[0,36] 11.285 Starting downloading https://server4:443/lgkvmtrxre at 04:28.739 on ClientConnection[b717ce4da9b3ec4e/a02e94e359b0bf87(V1) with server4/193.167.100.100:443] 11.285 -> Packet H|1|L|59|1 AckFrame[628255452|Δ0] 11.279 <- (1) Packet A|628255452|S0|a02e94e359b0bf87|231|2 NewConnectionIdFrame[1,<0|00b490737a399494d9802dc6b35f5cab22c7|30381ace3c5c84b6b1c007567a7988ea] Padding(164) 11.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.382/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.285 Discarding pn space Initial because first Handshake message is being sent 11.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.382/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.285 -> Packet A|0|S0|5d8b735c8f32279c8e575129f2e46048d052|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[628255452|Δ0] 11.317 <- (2) Packet A|628255453|S0|a02e94e359b0bf87|1406|2 PingFrame[] Padding(1376) 11.318 <- (3) Packet A|628255454|S0|a02e94e359b0bf87|1200|4 HandshakeDoneFrame[] NewTokenFrame[365bcecb8ce0b7d56535b26a3d8a2a04321f837f24afb384535feea3a97a5a1a9230ba5652be5b9334] CryptoFrame[0,237] Padding(886) 11.318 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 11.381/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 88 millis, based on 11.407/App, because ackElicitingInFlight | RTT:33/16 11.318 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 11.319 -> Packet A|1|S0|5d8b735c8f32279c8e575129f2e46048d052|45|1 AckFrame[628255454-628255452|Δ1] 11.321 <- (4) Packet A|628255456|S0|a02e94e359b0bf87|40|2 AckFrame[0|Δ5] Padding(8) 11.322 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.351 <- (5) Packet A|628255457|S0|a02e94e359b0bf87|1444|2 PingFrame[] Padding(1417) 11.370 -> Packet A|2|S0|5d8b735c8f32279c8e575129f2e46048d052|47|1 AckFrame[628255457-628255456,628255454-628255453|Δ19] 11.528 <- (6) Packet A|628255459|S0|a02e94e359b0bf87|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 11.529 Finished downloading https://server4:443/lgkvmtrxre at 04:28.983 on ClientConnection[b717ce4da9b3ec4e/a02e94e359b0bf87(V1) with server4/193.167.100.100:443] 11.529 Closing ClientConnection[b717ce4da9b3ec4e/a02e94e359b0bf87(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.529 <- (7) Packet A|628255460|S0|a02e94e359b0bf87|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 11.529 Creating connection with server4:443 with v1 11.530 -> Packet A|3|S0|5d8b735c8f32279c8e575129f2e46048d052|56|3 ConnectionCloseFrame[0|0|] AckFrame[628255459,628255457-628255456,628255454-628255453|Δ0] ConnectionCloseFrame[0|0|] 11.530 Setting up connection for downloading https://server4:443/enpwijzbgv at 04:28.984 on ClientConnection[085851f0b1db452e/68ef33d25879818c(V1) with server4/193.167.100.100:443] 11.530 Original destination connection id: 085851f0b1db452e (scid: 68ef33d25879818c) >- CryptoStream[I|ClientHello] 11.531 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.731/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.531 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.565 <- (1) Packet I|887782805|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 11.565 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.765/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.565 <- (1) Packet H|887782805|L|778|1 CryptoFrame[0,717] 11.567 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.664/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.567 -> Packet I|1|L|1201|2 Token=[] AckFrame[887782805|Δ0] Padding(1140) 11.568 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 11.570 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.667/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.570 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.570 Starting downloading https://server4:443/enpwijzbgv at 04:29.025 on ClientConnection[085851f0b1db452e/68ef33d25879818c(V1) with server4/193.167.100.100:443] 11.570 -> Packet H|1|L|59|1 AckFrame[887782805|Δ0] 11.565 <- (1) Packet A|887782805|S0|68ef33d25879818c|232|2 NewConnectionIdFrame[1,<0|402c11b0462192a8029739ac73075976fec9|f18d16ebd46d6ed4d99a77b1a5c9404b] Padding(165) 11.570 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.667/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.570 Discarding pn space Initial because first Handshake message is being sent 11.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.668/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.571 -> Packet A|0|S0|ec1cbf6061d60e3d1259e99b122450f28d6a|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[887782805|Δ0] 11.602 <- (2) Packet A|887782806|S0|68ef33d25879818c|1406|2 PingFrame[] Padding(1376) 11.603 <- (3) Packet A|887782807|S0|68ef33d25879818c|1200|4 HandshakeDoneFrame[] NewTokenFrame[361ed5bda782b4901a34c8d2d89cbd90a2a006c299e4007fa64bf8893d3d28fb2f6ad48370bb8a9293] CryptoFrame[0,237] Padding(886) 11.604 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 11.667/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 88 millis, based on 11.693/App, because ackElicitingInFlight | RTT:33/16 11.604 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 11.604 -> Packet A|1|S0|ec1cbf6061d60e3d1259e99b122450f28d6a|45|1 AckFrame[887782807-887782805|Δ1] 11.636 <- (4) Packet A|887782808|S0|68ef33d25879818c|1444|2 PingFrame[] Padding(1417) 11.656 -> Packet A|2|S0|ec1cbf6061d60e3d1259e99b122450f28d6a|45|1 AckFrame[887782808-887782805|Δ19] 11.692 loss detection timeout handler running Sending probe 0, because no ack since 11.571. Current RTT: 33/16. 11.692 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 11.936/App, because ackElicitingInFlight | RTT:33/16 11.692 -> Packet PA|3|S0|ec1cbf6061d60e3d1259e99b122450f28d6a|57|1 StreamFrame[0(CIB),0,17,fin] 11.725 <- (5) Packet A|887782809|S0|68ef33d25879818c|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 11.725 Finished downloading https://server4:443/enpwijzbgv at 04:29.180 on ClientConnection[085851f0b1db452e/68ef33d25879818c(V1) with server4/193.167.100.100:443] 11.725 Closing ClientConnection[085851f0b1db452e/68ef33d25879818c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.726 -> Packet A|4|S0|ec1cbf6061d60e3d1259e99b122450f28d6a|48|2 ConnectionCloseFrame[0|0|] AckFrame[887782809-887782805|Δ0] 11.726 Creating connection with server4:443 with v1 11.726 Setting up connection for downloading https://server4:443/zvhhomivpc at 04:29.181 on ClientConnection[6173f894345b80d0/e527fc877e0df22d(V1) with server4/193.167.100.100:443] 11.726 Original destination connection id: 6173f894345b80d0 (scid: e527fc877e0df22d) >- CryptoStream[I|ClientHello] 11.728 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.928/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.728 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.729 <- (6) Packet A|887782810|S0|68ef33d25879818c|40|2 AckFrame[3-1|Δ5] Padding(8) 11.729 -> Packet A|5|S0|ec1cbf6061d60e3d1259e99b122450f28d6a|48|2 ConnectionCloseFrame[0|0|] AckFrame[887782809-887782805|Δ0] 11.761 <- (1) Packet I|753828456|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 11.762 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.962/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.761 <- (1) Packet H|753828456|L|778|1 CryptoFrame[0,717] 11.764 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.861/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.764 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 11.764 -> Packet I|1|L|1201|2 Token=[] AckFrame[753828456|Δ0] Padding(1140) >- CryptoStream[H|Finished] 11.766 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.863/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.766 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.767 Starting downloading https://server4:443/zvhhomivpc at 04:29.221 on ClientConnection[6173f894345b80d0/e527fc877e0df22d(V1) with server4/193.167.100.100:443] 11.767 -> Packet H|1|L|59|1 AckFrame[753828456|Δ0] 11.761 <- (1) Packet A|753828456|S0|e527fc877e0df22d|232|2 NewConnectionIdFrame[1,<0|1fa595455ab9f2574aaee4b9d40ae0b3d5d0|39f1db90f3ceb11ac9dddbcfed7bf906] Padding(165) 11.767 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.864/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.767 Discarding pn space Initial because first Handshake message is being sent 11.767 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.864/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.767 -> Packet A|0|S0|76d710fada07c31c51bb3f409654bd74f9d8|57|1 StreamFrame[0(CIB),0,17,fin] 11.786 -> Packet A|1|S0|76d710fada07c31c51bb3f409654bd74f9d8|45|1 AckFrame[753828456|Δ19] 11.798 <- (2) Packet A|753828457|S0|e527fc877e0df22d|1406|2 PingFrame[] Padding(1376) 11.799 <- (3) Packet A|753828458|S0|e527fc877e0df22d|1200|4 HandshakeDoneFrame[] NewTokenFrame[36a20dacc3e0d1dc60fbe0d032fb0f854af3c547aaf4c6384e91955bda9953f03e07dd98fd675d7d85] CryptoFrame[0,237] Padding(886) 11.800 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 11.863/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 89 millis, based on 11.889/App, because ackElicitingInFlight | RTT:33/16 11.800 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 11.800 -> Packet A|2|S0|76d710fada07c31c51bb3f409654bd74f9d8|45|1 AckFrame[753828458-753828456|Δ1] 11.800 <- (4) Packet A|753828459|S0|e527fc877e0df22d|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(143) 11.801 Finished downloading https://server4:443/zvhhomivpc at 04:29.255 on ClientConnection[6173f894345b80d0/e527fc877e0df22d(V1) with server4/193.167.100.100:443] 11.801 Closing ClientConnection[6173f894345b80d0/e527fc877e0df22d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.801 -> Packet A|3|S0|76d710fada07c31c51bb3f409654bd74f9d8|48|2 ConnectionCloseFrame[0|0|] AckFrame[753828459-753828456|Δ0] 11.801 Creating connection with server4:443 with v1 11.802 Setting up connection for downloading https://server4:443/bkwghrwdan at 04:29.256 on ClientConnection[d312014ba7946793/0f15b1d703bbbe2e(V1) with server4/193.167.100.100:443] 11.802 Original destination connection id: d312014ba7946793 (scid: 0f15b1d703bbbe2e) >- CryptoStream[I|ClientHello] 11.803 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.003/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.803 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.003 loss detection timeout handler running Sending probe 0, because no ack since 11.803. Current RTT: 100/25. 12.003 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.003 (Probe is an initial retransmit) 12.003 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.403/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.003 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.037 <- (1) Packet I|1718614849|L|190|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 12.038 probe count not reset on ack because handshake not yet confirmed 12.038 Retransmitting CryptoFrame[0,257] on level Initial 12.038 Cwnd(-): 6000; inflight: 0 12.038 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.438/Initial, because peerAwaitingAddressValidation | RTT:100/25 12.038 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 12.242/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.038 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 12.037 <- (1) Packet H|1718614849|L|778|1 CryptoFrame[0,717] 12.040 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 12.245/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.040 -> Packet I|3|L|1201|2 Token=[] AckFrame[1718614849|Δ0] Padding(1136) 12.041 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 12.043 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 12.247/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.043 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.043 Starting downloading https://server4:443/bkwghrwdan at 04:29.498 on ClientConnection[d312014ba7946793/0f15b1d703bbbe2e(V1) with server4/193.167.100.100:443] 12.037 <- (1) Packet A|1718614849|S0|0f15b1d703bbbe2e|232|2 NewConnectionIdFrame[1,<0|449ba6938c7946e26d127d932ae7a11aa7e7|0a248fe353d002cbabc4ef0d9c53f6fb] Padding(165) 12.044 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.146/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.044 Discarding pn space Initial because first Handshake message is being sent 12.044 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.146/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.044 -> [Packet H|1|L|63|1 AckFrame[1718614849|Δ0], Packet A|0|S0|5bb8d503553c95821dbed2ba5a5d5657375c|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1718614849|Δ0]] 12.145 loss detection timeout handler running Sending probe 0, because no ack since 12.043. Current RTT: 34/17. 12.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.145 (Probe is a handshake retransmit) 12.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 12.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.145 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 12.178 <- (2) Packet H|1718614851|L|778|1 CryptoFrame[0,717] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.179 -> Packet H|3|L|65|1 AckFrame[1718614851,1718614849|Δ0] 12.349 loss detection timeout handler running Sending probe 1, because no ack since 12.044. Current RTT: 34/17. 12.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.349 (Probe is a handshake retransmit) 12.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 12.757/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.349 -> Packet PH|4|L|90|1 CryptoFrame[0,36] 12.350 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 12.758/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.350 -> Packet PH|5|L|90|1 CryptoFrame[0,36] 12.382 <- (3) Packet A|1718614851|S0|0f15b1d703bbbe2e|1406|2 PingFrame[] Padding(1376) 12.401 -> Packet A|1|S0|5bb8d503553c95821dbed2ba5a5d5657375c|51|1 AckFrame[1718614851,1718614849|Δ19] 12.433 <- (4) Packet A|1718614854|S0|0f15b1d703bbbe2e|1444|2 PingFrame[] Padding(1417) 12.453 -> Packet A|2|S0|5bb8d503553c95821dbed2ba5a5d5657375c|53|1 AckFrame[1718614854,1718614851,1718614849|Δ19] 12.540 <- (5) Packet A|1718614855|S0|0f15b1d703bbbe2e|1444|2 PingFrame[] Padding(1417) 12.541 <- (6) Packet A|1718614856|S0|0f15b1d703bbbe2e|1406|4 HandshakeDoneFrame[] NewTokenFrame[365429fe3c54c8a4f5c56e0e34f88f0603ed829c6520266804896998843d6ea9f29a2e184a8835ef98] CryptoFrame[0,237] Padding(1095) 12.541 State is set to Confirmed reschedule loss detection timer for PTO over 10 millis, based on 12.552/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -370 millis, based on 12.171/App, because ackElicitingInFlight | RTT:34/17 12.541 loss detection timeout handler running 12.541 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 12.044. Current RTT: 34/17. 12.542 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 253 millis, based on 12.796/App, because ackElicitingInFlight | RTT:34/17 12.542 -> Packet PA|3|S0|5bb8d503553c95821dbed2ba5a5d5657375c|57|1 StreamFrame[0(CIB),0,17,fin] 12.542 -> Packet A|4|S0|5bb8d503553c95821dbed2ba5a5d5657375c|53|1 AckFrame[1718614856-1718614854,1718614851,1718614849|Δ1] 12.542 <- (7) Packet A|1718614857|S0|0f15b1d703bbbe2e|1406|4 HandshakeDoneFrame[] NewTokenFrame[365429fe3c54c8a4f5c56e0e34f88f0603ed829c6520266804896998843d6ea9f29a2e184a8835ef98] CryptoFrame[0,237] Padding(1095) -< CryptoStream[A|NewSessionTicket] 12.562 -> Packet A|5|S0|5bb8d503553c95821dbed2ba5a5d5657375c|53|1 AckFrame[1718614857-1718614854,1718614851,1718614849|Δ19] 12.795 loss detection timeout handler running Sending probe 1, because no ack since 12.542. Current RTT: 34/17. 12.795 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 13.303/App, because ackElicitingInFlight | RTT:34/17 12.795 -> Packet PA|6|S0|5bb8d503553c95821dbed2ba5a5d5657375c|57|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 13.304/App, because ackElicitingInFlight | RTT:34/17 12.796 -> Packet PA|7|S0|5bb8d503553c95821dbed2ba5a5d5657375c|57|1 StreamFrame[0(CIB),0,17,fin] 12.828 <- (8) Packet A|1718614858|S0|0f15b1d703bbbe2e|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 12.828 Finished downloading https://server4:443/bkwghrwdan at 04:30.283 on ClientConnection[d312014ba7946793/0f15b1d703bbbe2e(V1) with server4/193.167.100.100:443] 12.828 Closing ClientConnection[d312014ba7946793/0f15b1d703bbbe2e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.829 -> Packet A|8|S0|5bb8d503553c95821dbed2ba5a5d5657375c|56|2 ConnectionCloseFrame[0|0|] AckFrame[1718614858-1718614854,1718614851,1718614849|Δ0] 12.829 Creating connection with server4:443 with v1 12.830 Setting up connection for downloading https://server4:443/mvezqaxvau at 04:30.284 on ClientConnection[5c4ec6f17995c62a/4c8224138ecf3cd8(V1) with server4/193.167.100.100:443] 12.830 Original destination connection id: 5c4ec6f17995c62a (scid: 4c8224138ecf3cd8) >- CryptoStream[I|ClientHello] 12.831 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.831 <- (9) Packet A|1718614859|S0|0f15b1d703bbbe2e|40|2 AckFrame[6-4,1|Δ4] Padding(6) reschedule loss detection timer for PTO over 199 millis, based on 13.031/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.831 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.831 -> Packet A|9|S0|5bb8d503553c95821dbed2ba5a5d5657375c|56|2 ConnectionCloseFrame[0|0|] AckFrame[1718614858-1718614854,1718614851,1718614849|Δ0] 12.865 <- (1) Packet I|2064278860|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.865 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.065/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.865 <- (1) Packet H|2064278860|L|780|1 CryptoFrame[0,719] 12.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.970/Handshake, because peerAwaitingAddressValidation | RTT:34/17 12.867 -> Packet I|1|L|1201|2 Token=[] AckFrame[2064278860|Δ0] Padding(1136) 12.868 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 12.870 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.972/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.870 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.870 Starting downloading https://server4:443/mvezqaxvau at 04:30.325 on ClientConnection[5c4ec6f17995c62a/4c8224138ecf3cd8(V1) with server4/193.167.100.100:443] 12.870 -> Packet H|1|L|63|1 AckFrame[2064278860|Δ0] 12.865 <- (1) Packet A|2064278860|S0|4c8224138ecf3cd8|230|2 NewConnectionIdFrame[1,<0|34bd7f3a972ecd1ec70ab390e0f65c9affe9|219e54bf1b0fcb26f0e0999e49a89a9a] Padding(163) 12.870 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.972/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.870 Discarding pn space Initial because first Handshake message is being sent 12.871 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 12.973/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.871 -> Packet A|0|S0|deac698697553c7293a75320d71ad6c3ea12|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2064278860|Δ0] 12.972 loss detection timeout handler running Sending probe 0, because no ack since 12.870. Current RTT: 34/17. 12.972 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.972 (Probe is a handshake retransmit) 12.972 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 13.176/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 12.972 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 13.176 loss detection timeout handler running Sending probe 1, because no ack since 12.871. Current RTT: 34/17. 13.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.176 (Probe is a handshake retransmit) 13.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 13.584/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.176 -> Packet PH|3|L|90|1 CryptoFrame[0,36] 13.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 13.585/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.177 -> Packet PH|4|L|90|1 CryptoFrame[0,36] 13.210 <- (2) Packet A|2064278862|S0|4c8224138ecf3cd8|1200|5 AckFrame[0|Δ306] HandshakeDoneFrame[] NewTokenFrame[36f702698fcb976101222cc3382a8ee02a7db4f3165af509ad05e1422c2135cbe166a37cc26c9fe6e5] CryptoFrame[0,237] StreamFrame[0(CIB),0,877] 13.210 probe count not reset on ack because handshake not yet confirmed 13.211 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 13.619/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.211 State is set to Confirmed reschedule loss detection timer for PTO over 1570 millis, based on 14.781/Handshake, because ackElicitingInFlight | RTT:69/83 13.211 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.211 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 13.230 -> Packet A|1|S0|deac698697553c7293a75320d71ad6c3ea12|49|1 AckFrame[2064278862|Δ19] 13.313 <- (3) Packet A|2064278864|S0|4c8224138ecf3cd8|1406|2 PingFrame[] Padding(1379) 13.332 -> Packet A|2|S0|deac698697553c7293a75320d71ad6c3ea12|51|1 AckFrame[2064278864,2064278862|Δ19] 13.417 <- (4) Packet A|2064278865|S0|4c8224138ecf3cd8|1406|2 PingFrame[] Padding(1379) 13.437 -> Packet A|3|S0|deac698697553c7293a75320d71ad6c3ea12|51|1 AckFrame[2064278865-2064278864,2064278862|Δ19] 13.469 <- (5) Packet A|2064278869|S0|4c8224138ecf3cd8|1444|2 PingFrame[] Padding(1417) 13.488 -> Packet A|4|S0|deac698697553c7293a75320d71ad6c3ea12|53|1 AckFrame[2064278869,2064278865-2064278864,2064278862|Δ19] 13.580 <- (6) Packet A|2064278870|S0|4c8224138ecf3cd8|1444|2 PingFrame[] Padding(1417) 13.581 <- (7) Packet A|2064278871|S0|4c8224138ecf3cd8|1406|2 StreamFrame[0(CIB),877,147,fin] Padding(1227) 13.582 -> Packet A|5|S0|deac698697553c7293a75320d71ad6c3ea12|53|1 AckFrame[2064278871-2064278869,2064278865-2064278864,2064278862|Δ1] 13.582 Finished downloading https://server4:443/mvezqaxvau at 04:31.037 on ClientConnection[5c4ec6f17995c62a/4c8224138ecf3cd8(V1) with server4/193.167.100.100:443] 13.582 Closing ClientConnection[5c4ec6f17995c62a/4c8224138ecf3cd8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.582 -> Packet A|6|S0|deac698697553c7293a75320d71ad6c3ea12|56|2 ConnectionCloseFrame[0|0|] AckFrame[2064278871-2064278869,2064278865-2064278864,2064278862|Δ0] 13.583 Creating connection with server4:443 with v1 13.583 Setting up connection for downloading https://server4:443/phfuvoabmj at 04:31.038 on ClientConnection[4fa99727000b3f14/ad7db8bfabf56fc0(V1) with server4/193.167.100.100:443] 13.583 Original destination connection id: 4fa99727000b3f14 (scid: ad7db8bfabf56fc0) >- CryptoStream[I|ClientHello] 13.584 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.784/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.584 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.614 <- (8) Packet A|2064278873|S0|4c8224138ecf3cd8|1444|2 MaxStreamsFrame[B,101] Padding(1415) 13.614 -> Packet A|7|S0|deac698697553c7293a75320d71ad6c3ea12|56|2 ConnectionCloseFrame[0|0|] AckFrame[2064278871-2064278869,2064278865-2064278864,2064278862|Δ0] 13.618 <- (1) Packet I|1173020145|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.619 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.819/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.618 <- (1) Packet H|1173020145|L|780|1 CryptoFrame[0,719] 13.621 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.718/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.621 -> Packet I|1|L|1201|2 Token=[] AckFrame[1173020145|Δ0] Padding(1136) 13.621 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 13.623 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.720/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.623 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.623 Starting downloading https://server4:443/phfuvoabmj at 04:31.078 on ClientConnection[4fa99727000b3f14/ad7db8bfabf56fc0(V1) with server4/193.167.100.100:443] 13.618 <- (1) Packet A|1173020145|S0|ad7db8bfabf56fc0|230|2 NewConnectionIdFrame[1,<0|7b26d98f2180097e83081143225d1a799606|50d837fff284f01532878af16f188b83] Padding(163) 13.623 -> Packet H|1|L|63|1 AckFrame[1173020145|Δ0] 13.624 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.624 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.721/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 13.721/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.624 Discarding pn space Initial because first Handshake message is being sent 13.624 -> Packet A|0|S0|1ee1b805d7b95312d1a557b7feb90c08eadb|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1173020145|Δ0] 13.656 <- (2) Packet A|1173020146|S0|ad7db8bfabf56fc0|1406|2 PingFrame[] Padding(1376) 13.657 <- (3) Packet A|1173020147|S0|ad7db8bfabf56fc0|1200|4 HandshakeDoneFrame[] NewTokenFrame[36fa852ea5c941b29548808b06aca56da813ce7ca857f908c57b43cf1330f0633248e0a61111081a29] CryptoFrame[0,237] Padding(886) 13.657 State is set to Confirmed reschedule loss detection timer for PTO over 62 millis, based on 13.720/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 88 millis, based on 13.746/App, because ackElicitingInFlight | RTT:33/16 13.657 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 13.657 -> Packet A|1|S0|1ee1b805d7b95312d1a557b7feb90c08eadb|49|1 AckFrame[1173020147-1173020145|Δ1] 13.745 loss detection timeout handler running Sending probe 0, because no ack since 13.624. Current RTT: 33/16. 13.745 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 13.989/App, because ackElicitingInFlight | RTT:33/16 13.745 -> Packet PA|2|S0|1ee1b805d7b95312d1a557b7feb90c08eadb|57|1 StreamFrame[0(CIB),0,17,fin] 13.790 <- (4) Packet A|1173020149|S0|ad7db8bfabf56fc0|40|2 AckFrame[2|Δ13] Padding(5) 13.790 Cwnd(-): 6000; inflight: 0 13.790 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.790 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 118 millis, based on 13.910/App, because ackElicitingInFlight | RTT:34/15 13.791 -> Packet A|3|S0|1ee1b805d7b95312d1a557b7feb90c08eadb|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1173020147-1173020145|Δ0] 13.823 <- (5) Packet A|1173020150|S0|ad7db8bfabf56fc0|1444|2 PingFrame[] Padding(1417) 13.842 -> Packet A|4|S0|1ee1b805d7b95312d1a557b7feb90c08eadb|51|1 AckFrame[1173020150-1173020149,1173020147-1173020145|Δ19] 13.843 <- (6) Packet A|1173020151|S0|ad7db8bfabf56fc0|40|2 AckFrame[3-2|Δ21] Padding(8) 13.843 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.950 <- (7) Packet A|1173020152|S0|ad7db8bfabf56fc0|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 13.951 Finished downloading https://server4:443/phfuvoabmj at 04:31.405 on ClientConnection[4fa99727000b3f14/ad7db8bfabf56fc0(V1) with server4/193.167.100.100:443] 13.951 Closing ClientConnection[4fa99727000b3f14/ad7db8bfabf56fc0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.951 -> Packet A|5|S0|1ee1b805d7b95312d1a557b7feb90c08eadb|52|2 ConnectionCloseFrame[0|0|] AckFrame[1173020152-1173020149|Δ0] 13.951 Creating connection with server4:443 with v1 13.952 Setting up connection for downloading https://server4:443/gufgxtnqky at 04:31.406 on ClientConnection[498946aac83bb508/5b304cc85f180d00(V1) with server4/193.167.100.100:443] 13.952 Original destination connection id: 498946aac83bb508 (scid: 5b304cc85f180d00) >- CryptoStream[I|ClientHello] 13.953 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.153/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.953 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.987 <- (1) Packet I|1138710712|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.987 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.187/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.987 <- (1) Packet H|1138710712|L|778|1 CryptoFrame[0,717] 13.989 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.086/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.989 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 13.989 -> Packet I|1|L|1201|2 Token=[] AckFrame[1138710712|Δ0] Padding(1136) >- CryptoStream[H|Finished] 13.991 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.088/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.991 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.992 Starting downloading https://server4:443/gufgxtnqky at 04:31.446 on ClientConnection[498946aac83bb508/5b304cc85f180d00(V1) with server4/193.167.100.100:443] 13.987 <- (1) Packet A|1138710712|S0|5b304cc85f180d00|232|2 NewConnectionIdFrame[1,<0|19549862560199315e6f3350c9adc5be9403|770d410d8f35914fc276416e459fb761] Padding(165) 13.992 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.089/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.992 Discarding pn space Initial because first Handshake message is being sent 13.992 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.089/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.992 -> [Packet H|1|L|63|1 AckFrame[1138710712|Δ0], Packet A|0|S0|a876942b05e20f9dee27b1183a5447815a3d|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1138710712|Δ0]] 14.089 loss detection timeout handler running Sending probe 0, because no ack since 13.991. Current RTT: 33/16. 14.089 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.089 (Probe is a handshake retransmit) 14.089 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.283/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.089 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 14.282 loss detection timeout handler running Sending probe 1, because no ack since 13.992. Current RTT: 33/16. 14.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.282 (Probe is a handshake retransmit) 14.283 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 14.671/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.283 -> Packet PH|3|L|90|1 CryptoFrame[0,36] 14.284 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 14.672/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.284 -> Packet PH|4|L|90|1 CryptoFrame[0,36] 14.447 <- (2) Packet A|1138710715|S0|5b304cc85f180d00|1406|2 PingFrame[] Padding(1376) 14.448 <- (3) Packet A|1138710716|S0|5b304cc85f180d00|1200|2 NewConnectionIdFrame[1,<0|19549862560199315e6f3350c9adc5be9403|770d410d8f35914fc276416e459fb761] Padding(1133) 14.449 -> Packet A|1|S0|a876942b05e20f9dee27b1183a5447815a3d|50|1 AckFrame[1138710716-1138710715,1138710712|Δ0] 14.449 <- (4) Packet A|1138710717|S0|5b304cc85f180d00|1200|4 HandshakeDoneFrame[] NewTokenFrame[360aa04257247f99603e4f57840f6472ca16b8ec3d29a84dcb884b013e366a484791426cf1112919a2] CryptoFrame[0,237] Padding(886) 14.449 State is set to Confirmed reschedule loss detection timer for PTO over 30 millis, based on 14.480/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -335 millis, based on 14.114/App, because ackElicitingInFlight | RTT:33/16 14.450 loss detection timeout handler running 14.450 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 13.992. Current RTT: 33/16. 14.450 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 14.694/App, because ackElicitingInFlight | RTT:33/16 14.450 -> Packet PA|2|S0|a876942b05e20f9dee27b1183a5447815a3d|57|1 StreamFrame[0(CIB),0,17,fin] 14.469 -> Packet A|3|S0|a876942b05e20f9dee27b1183a5447815a3d|51|1 AckFrame[1138710717-1138710715,1138710712|Δ19] 14.481 <- (5) Packet A|1138710718|S0|5b304cc85f180d00|1444|2 PingFrame[] Padding(1417) 14.500 -> Packet A|4|S0|a876942b05e20f9dee27b1183a5447815a3d|51|1 AckFrame[1138710718-1138710715,1138710712|Δ19] 14.601 <- (6) Packet A|1138710722|S0|5b304cc85f180d00|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 14.601 Finished downloading https://server4:443/gufgxtnqky at 04:32.056 on ClientConnection[498946aac83bb508/5b304cc85f180d00(V1) with server4/193.167.100.100:443] 14.601 Closing ClientConnection[498946aac83bb508/5b304cc85f180d00(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.602 -> Packet A|5|S0|a876942b05e20f9dee27b1183a5447815a3d|56|2 ConnectionCloseFrame[0|0|] AckFrame[1138710722,1138710718-1138710715,1138710712|Δ0] 14.602 Creating connection with server4:443 with v1 14.603 Setting up connection for downloading https://server4:443/kxqqckaxoo at 04:32.057 on ClientConnection[5ad64cd20719772e/95be0a3d31611703(V1) with server4/193.167.100.100:443] 14.603 Original destination connection id: 5ad64cd20719772e (scid: 95be0a3d31611703) >- CryptoStream[I|ClientHello] 14.604 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.804/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.604 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.638 <- (1) Packet I|1912727168|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.638 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.838/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.638 <- (1) Packet H|1912727168|L|779|1 CryptoFrame[0,718] 14.641 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.738/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.641 -> Packet I|1|L|1201|2 Token=[] AckFrame[1912727168|Δ0] Padding(1136) 14.641 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 14.643 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.643 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.644 Starting downloading https://server4:443/kxqqckaxoo at 04:32.098 on ClientConnection[5ad64cd20719772e/95be0a3d31611703(V1) with server4/193.167.100.100:443] 14.638 <- (1) Packet A|1912727168|S0|95be0a3d31611703|231|2 NewConnectionIdFrame[1,<0|ae3ba0ab306ddb7b3bb3a861928205a2a99f|da3c45f4852e624c7064159161977586] Padding(164) 14.644 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.741/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.644 Discarding pn space Initial because first Handshake message is being sent 14.644 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.741/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.644 -> [Packet H|1|L|63|1 AckFrame[1912727168|Δ0], Packet A|0|S0|12ff75a2604ac307fbdabc297faac15f02eb|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1912727168|Δ0]] 14.740 loss detection timeout handler running Sending probe 0, because no ack since 14.643. Current RTT: 33/16. 14.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.741 (Probe is a handshake retransmit) 14.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.935/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.741 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 14.773 <- (2) Packet A|1912727169|S0|95be0a3d31611703|1406|2 PingFrame[] Padding(1379) 14.775 <- (3) Packet A|1912727171|S0|95be0a3d31611703|1200|2 StreamFrame[0(CIB),879,145,fin] Padding(1023) 14.776 -> Packet A|1|S0|12ff75a2604ac307fbdabc297faac15f02eb|51|1 AckFrame[1912727171,1912727169-1912727168|Δ1] 14.808 <- (4) Packet A|1912727172|S0|95be0a3d31611703|1444|2 PingFrame[] Padding(1417) 14.816 <- (5) Packet A|1912727173|S0|95be0a3d31611703|1406|5 HandshakeDoneFrame[] NewTokenFrame[360c259d8e6d4432fa3c764bf19415de020de5d54b800b98324cac45098b453ef8a36750e317a57749] CryptoFrame[0,237] StreamFrame[0(CIB),0,879] Padding(212) 14.816 State is set to Confirmed reschedule loss detection timer for PTO over 72 millis, based on 14.888/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -50 millis, based on 14.766/App, because ackElicitingInFlight | RTT:33/16 14.816 Discarding pn space Handshake because HandshakeDone is received 14.816 loss detection timeout handler running Sending probe 0, because no ack since 14.644. Current RTT: 33/16. 14.816 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 15.060/App, because ackElicitingInFlight | RTT:33/16 14.816 -> Packet PA|2|S0|12ff75a2604ac307fbdabc297faac15f02eb|57|1 StreamFrame[0(CIB),0,17,fin] 14.817 -> Packet A|3|S0|12ff75a2604ac307fbdabc297faac15f02eb|51|1 AckFrame[1912727173-1912727171,1912727169-1912727168|Δ8] 14.817 Finished downloading https://server4:443/kxqqckaxoo at 04:32.271 on ClientConnection[5ad64cd20719772e/95be0a3d31611703(V1) with server4/193.167.100.100:443] 14.817 Closing ClientConnection[5ad64cd20719772e/95be0a3d31611703(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.817 -> Packet A|4|S0|12ff75a2604ac307fbdabc297faac15f02eb|54|2 ConnectionCloseFrame[0|0|] AckFrame[1912727173-1912727171,1912727169-1912727168|Δ0] 14.817 Creating connection with server4:443 with v1 14.818 Setting up connection for downloading https://server4:443/etjlgpfynb at 04:32.272 on ClientConnection[8546b21dbef450dc/9662ed15eb079be6(V1) with server4/193.167.100.100:443] 14.818 Original destination connection id: 8546b21dbef450dc (scid: 9662ed15eb079be6) >- CryptoStream[I|ClientHello] 14.819 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.019/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.819 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.836 <- (7) Packet A|1138710724|S0|5b304cc85f180d00|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 14.836 -> Packet A|6|S0|a876942b05e20f9dee27b1183a5447815a3d|56|2 ConnectionCloseFrame[0|0|] AckFrame[1138710722,1138710718-1138710715,1138710712|Δ0] 15.019 loss detection timeout handler running Sending probe 0, because no ack since 14.819. Current RTT: 100/25. 15.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.019 (Probe is an initial retransmit) 15.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.419/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.019 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.053 <- (1) Packet I|391751336|L|190|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 15.054 probe count not reset on ack because handshake not yet confirmed 15.054 Retransmitting CryptoFrame[0,257] on level Initial 15.054 Cwnd(-): 6000; inflight: 0 15.054 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.454/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.054 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 15.258/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.054 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 15.053 <- (1) Packet H|391751336|L|780|1 CryptoFrame[0,719] 15.056 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 15.261/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.057 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 15.056 -> Packet I|3|L|1201|2 Token=[] AckFrame[391751336|Δ0] Padding(1140) >- CryptoStream[H|Finished] 15.059 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 15.263/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.059 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.059 Starting downloading https://server4:443/etjlgpfynb at 04:32.513 on ClientConnection[8546b21dbef450dc/9662ed15eb079be6(V1) with server4/193.167.100.100:443] 15.053 <- (1) Packet A|391751336|S0|9662ed15eb079be6|230|2 NewConnectionIdFrame[1,<0|169c6fb8f5638a4a6b0d31eaaad0c20a4fb9|27dd1824c79c011aa9932c3c7859747f] Padding(163) 15.059 -> Packet H|1|L|59|1 AckFrame[391751336|Δ0] 15.059 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.161/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.059 Discarding pn space Initial because first Handshake message is being sent 15.059 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.161/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.059 -> Packet A|0|S0|d1950cd344e7f74ebb308c7d24fd516a9b73|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[391751336|Δ0] 15.092 <- (2) Packet A|391751339|S0|9662ed15eb079be6|1200|4 HandshakeDoneFrame[] NewTokenFrame[369e18e6dbdbcb2755823d0a55092c37f7bcdaa5a8c5749c578c9e73db1d15ad8a66b70b5068d699c8] CryptoFrame[0,237] Padding(886) 15.092 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 15.161/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 94 millis, based on 15.186/App, because ackElicitingInFlight | RTT:34/17 15.092 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 15.093 <- (3) Packet A|391751340|S0|9662ed15eb079be6|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 15.093 -> Packet A|1|S0|d1950cd344e7f74ebb308c7d24fd516a9b73|46|1 AckFrame[391751340-391751339,391751336|Δ0] 15.093 Finished downloading https://server4:443/etjlgpfynb at 04:32.548 on ClientConnection[8546b21dbef450dc/9662ed15eb079be6(V1) with server4/193.167.100.100:443] 15.093 Closing ClientConnection[8546b21dbef450dc/9662ed15eb079be6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.094 -> Packet A|2|S0|d1950cd344e7f74ebb308c7d24fd516a9b73|50|2 ConnectionCloseFrame[0|0|] AckFrame[391751340-391751339,391751336|Δ0] 15.094 Creating connection with server4:443 with v1 15.094 Setting up connection for downloading https://server4:443/cpyyksldup at 04:32.549 on ClientConnection[85c7215157f4f988/1de4639f2e2ba860(V1) with server4/193.167.100.100:443] 15.094 Original destination connection id: 85c7215157f4f988 (scid: 1de4639f2e2ba860) >- CryptoStream[I|ClientHello] 15.095 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.295/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.095 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.295 loss detection timeout handler running Sending probe 0, because no ack since 15.095. Current RTT: 100/25. 15.295 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.295 (Probe is an initial retransmit) 15.295 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.695/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.295 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.694 loss detection timeout handler running Sending probe 1, because no ack since 15.295. Current RTT: 100/25. 15.694 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.695 (Probe is an initial retransmit) 15.695 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.495/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.695 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.696 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.496/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.696 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.730 <- (1) Packet I|1517716561|L|190|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 15.730 probe count not reset on ack because handshake not yet confirmed 15.731 Retransmitting CryptoFrame[0,257] on level Initial 15.731 Cwnd(-): 6000; inflight: 0 15.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.531/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 16.139/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.731 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 15.730 <- (1) Packet H|1517716561|L|778|1 CryptoFrame[0,717] 15.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 16.142/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.734 -> Packet I|5|L|1201|2 Token=[] AckFrame[1517716561|Δ0] Padding(1136) 15.734 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 15.736 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 16.144/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.736 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.736 Starting downloading https://server4:443/cpyyksldup at 04:33.191 on ClientConnection[85c7215157f4f988/1de4639f2e2ba860(V1) with server4/193.167.100.100:443] 15.730 <- (1) Packet A|1517716561|S0|1de4639f2e2ba860|232|1 Padding(203) 15.736 -> Packet H|1|L|63|1 AckFrame[1517716561|Δ0] 15.736 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.839/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.737 Discarding pn space Initial because first Handshake message is being sent 15.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.839/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.737 -> Packet A|0|S0|d78911351ed0fc6678b11fbfd2a91efc845c|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1517716561|Δ0] 15.768 <- (2) Packet A|1517716562|S0|1de4639f2e2ba860|1406|2 PingFrame[] Padding(1376) 15.769 <- (3) Packet A|1517716563|S0|1de4639f2e2ba860|1200|4 HandshakeDoneFrame[] NewTokenFrame[36b44106a52dc8fc5a375f0489a1b091d2833e4a35c8f741fa02a321a64b75a6d6934bb5a823f8fdfa] CryptoFrame[0,237] Padding(886) 15.769 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 15.838/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 94 millis, based on 15.864/App, because ackElicitingInFlight | RTT:34/17 15.770 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 15.770 -> Packet A|1|S0|d78911351ed0fc6678b11fbfd2a91efc845c|49|1 AckFrame[1517716563-1517716561|Δ1] 15.770 <- (4) Packet A|1517716564|S0|1de4639f2e2ba860|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 15.771 Finished downloading https://server4:443/cpyyksldup at 04:33.225 on ClientConnection[85c7215157f4f988/1de4639f2e2ba860(V1) with server4/193.167.100.100:443] 15.771 Closing ClientConnection[85c7215157f4f988/1de4639f2e2ba860(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.771 -> Packet A|2|S0|d78911351ed0fc6678b11fbfd2a91efc845c|52|2 ConnectionCloseFrame[0|0|] AckFrame[1517716564-1517716561|Δ0] 15.771 Creating connection with server4:443 with v1 15.771 <- (5) Packet A|1517716565|S0|1de4639f2e2ba860|1200|2 NewConnectionIdFrame[1,<0|52a6ef1c784359e934709b5dffda59f6cefa|ed8cadb6af11ce983990faacc61c961e] Padding(1136) 15.772 -> Packet A|3|S0|d78911351ed0fc6678b11fbfd2a91efc845c|52|2 ConnectionCloseFrame[0|0|] AckFrame[1517716564-1517716561|Δ0] 15.772 Setting up connection for downloading https://server4:443/cxdoltcmzh at 04:33.226 on ClientConnection[8576f52eb1a65a20/70c829c10bd907b4(V1) with server4/193.167.100.100:443] 15.772 Original destination connection id: 8576f52eb1a65a20 (scid: 70c829c10bd907b4) >- CryptoStream[I|ClientHello] 15.773 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.974/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.773 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.802 <- (6) Packet A|1517716567|S0|1de4639f2e2ba860|1444|2 PingFrame[] Padding(1417) 15.802 -> Packet A|4|S0|d78911351ed0fc6678b11fbfd2a91efc845c|52|2 ConnectionCloseFrame[0|0|] AckFrame[1517716564-1517716561|Δ0] 15.973 loss detection timeout handler running Sending probe 0, because no ack since 15.773. Current RTT: 100/25. 15.973 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.973 (Probe is an initial retransmit) 15.973 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.373/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.973 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.372 loss detection timeout handler running Sending probe 1, because no ack since 15.973. Current RTT: 100/25. 16.373 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.373 (Probe is an initial retransmit) 16.373 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.173/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.373 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.374 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.174/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.374 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.407 <- (1) Packet I|176247417|L|190|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 16.407 probe count not reset on ack because handshake not yet confirmed 16.407 Retransmitting CryptoFrame[0,257] on level Initial 16.408 Cwnd(-): 6000; inflight: 1200 16.408 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.208/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.408 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 16.816/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.408 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 16.407 <- (1) Packet H|176247417|L|779|1 CryptoFrame[0,718] 16.410 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 16.818/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.410 -> Packet I|5|L|1201|2 Token=[] AckFrame[176247417|Δ0] Padding(1140) 16.410 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 16.412 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 16.820/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.412 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.413 Starting downloading https://server4:443/cxdoltcmzh at 04:33.867 on ClientConnection[8576f52eb1a65a20/70c829c10bd907b4(V1) with server4/193.167.100.100:443] 16.413 -> Packet H|1|L|59|1 AckFrame[176247417|Δ0] 16.407 <- (1) Packet A|176247417|S0|70c829c10bd907b4|231|2 NewConnectionIdFrame[1,<0|26dc8ede131470a990efa21a70c4384d7815|51b28a706c5cba86620b51c28d795dcf] Padding(164) 16.413 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.515/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.413 Discarding pn space Initial because first Handshake message is being sent 16.413 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.515/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.413 -> Packet A|0|S0|46732b6da6bd4b2ea5bca82776bf52db5295|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[176247417|Δ0] 16.440 Discarding packet (63 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.514 loss detection timeout handler running Sending probe 0, because no ack since 16.412. Current RTT: 34/17. 16.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.514 (Probe is a handshake retransmit) 16.515 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 16.719/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.514 <- (3) Packet H|176247419|L|779|1 CryptoFrame[0,718] 16.515 -> Packet PH|2|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.515 -> Packet H|3|L|61|1 AckFrame[176247419,176247417|Δ0] 16.547 <- (4) Packet A|176247419|S0|70c829c10bd907b4|1406|2 PingFrame[] Padding(1376) 16.567 -> Packet A|1|S0|46732b6da6bd4b2ea5bca82776bf52db5295|47|1 AckFrame[176247419,176247417|Δ19] 16.599 <- (5) Packet A|176247422|S0|70c829c10bd907b4|1444|2 PingFrame[] Padding(1417) 16.619 -> Packet A|2|S0|46732b6da6bd4b2ea5bca82776bf52db5295|49|1 AckFrame[176247422,176247419,176247417|Δ19] 16.651 <- (6) Packet A|176247423|S0|70c829c10bd907b4|1444|4 HandshakeDoneFrame[] NewTokenFrame[36248e4978fe65623a0a61c7a8a6f804d79b9b90b45ee04a20321264fc17b768b28ab413b8626be62d] CryptoFrame[0,237] Padding(1133) 16.651 State is set to Confirmed reschedule loss detection timer for PTO over 15 millis, based on 16.667/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -111 millis, based on 16.540/App, because ackElicitingInFlight | RTT:34/17 16.651 Discarding pn space Handshake because HandshakeDone is received 16.651 loss detection timeout handler running Sending probe 0, because no ack since 16.413. Current RTT: 34/17. 16.651 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 253 millis, based on 16.906/App, because ackElicitingInFlight | RTT:34/17 16.652 -> Packet PA|3|S0|46732b6da6bd4b2ea5bca82776bf52db5295|57|1 StreamFrame[0(CIB),0,17,fin] 16.671 -> Packet A|4|S0|46732b6da6bd4b2ea5bca82776bf52db5295|49|1 AckFrame[176247423-176247422,176247419,176247417|Δ19] 16.684 <- (7) Packet A|176247424|S0|70c829c10bd907b4|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 16.684 Finished downloading https://server4:443/cxdoltcmzh at 04:34.139 on ClientConnection[8576f52eb1a65a20/70c829c10bd907b4(V1) with server4/193.167.100.100:443] 16.684 Closing ClientConnection[8576f52eb1a65a20/70c829c10bd907b4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.685 -> Packet A|5|S0|46732b6da6bd4b2ea5bca82776bf52db5295|52|2 ConnectionCloseFrame[0|0|] AckFrame[176247424-176247422,176247419,176247417|Δ0] 16.685 Creating connection with server4:443 with v1 16.685 Setting up connection for downloading https://server4:443/bqjaiugjfp at 04:34.140 on ClientConnection[67a09d7aa90b96ca/e61cd9cb8a711377(V1) with server4/193.167.100.100:443] 16.685 Original destination connection id: 67a09d7aa90b96ca (scid: e61cd9cb8a711377) >- CryptoStream[I|ClientHello] 16.687 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.887/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.687 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.720 <- (1) Packet I|1938158223|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.721 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.921/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.720 <- (1) Packet H|1938158223|L|779|1 CryptoFrame[0,718] 16.724 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.821/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.724 -> Packet I|1|L|1201|2 Token=[] AckFrame[1938158223|Δ0] Padding(1136) 16.724 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 16.727 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.824/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.727 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.727 Starting downloading https://server4:443/bqjaiugjfp at 04:34.182 on ClientConnection[67a09d7aa90b96ca/e61cd9cb8a711377(V1) with server4/193.167.100.100:443] 16.720 <- (1) Packet A|1938158223|S0|e61cd9cb8a711377|231|2 NewConnectionIdFrame[1,<0|bc3b388a473a52bfbb3b8ea492abf755204a|eef09cc074e19ffc4399a10a139d3ac4] Padding(164) 16.727 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.824/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.727 Discarding pn space Initial because first Handshake message is being sent 16.728 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.825/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.728 -> [Packet H|1|L|63|1 AckFrame[1938158223|Δ0], Packet A|0|S0|ed656b9b7c3dfe5afd8a53d0e60d90d02dd2|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1938158223|Δ0]] 16.759 <- (2) Packet A|1938158224|S0|e61cd9cb8a711377|1406|2 PingFrame[] Padding(1376) 16.761 <- (3) Packet A|1938158226|S0|e61cd9cb8a711377|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 16.761 -> Packet A|1|S0|ed656b9b7c3dfe5afd8a53d0e60d90d02dd2|51|1 AckFrame[1938158226,1938158224-1938158223|Δ1] 16.762 Finished downloading https://server4:443/bqjaiugjfp at 04:34.216 on ClientConnection[67a09d7aa90b96ca/e61cd9cb8a711377(V1) with server4/193.167.100.100:443] 16.762 Closing ClientConnection[67a09d7aa90b96ca/e61cd9cb8a711377(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.762 -> Packet A|2|S0|ed656b9b7c3dfe5afd8a53d0e60d90d02dd2|54|2 ConnectionCloseFrame[0|0|] AckFrame[1938158226,1938158224-1938158223|Δ0] 16.762 Creating connection with server4:443 with v1 16.763 Setting up connection for downloading https://server4:443/bmssylqtjc at 04:34.217 on ClientConnection[c9e1278165ce2f55/52c8e94c0492b8dc(V1) with server4/193.167.100.100:443] 16.763 Original destination connection id: c9e1278165ce2f55 (scid: 52c8e94c0492b8dc) >- CryptoStream[I|ClientHello] 16.764 <- (4) Packet A|1938158227|S0|e61cd9cb8a711377|40|2 AckFrame[0|Δ5] Padding(8) 16.764 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.964/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.764 -> Packet A|3|S0|ed656b9b7c3dfe5afd8a53d0e60d90d02dd2|54|2 ConnectionCloseFrame[0|0|] AckFrame[1938158226,1938158224-1938158223|Δ0] 16.764 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.793 <- (5) Packet A|1938158228|S0|e61cd9cb8a711377|1444|2 PingFrame[] Padding(1417) 16.794 -> Packet A|4|S0|ed656b9b7c3dfe5afd8a53d0e60d90d02dd2|54|2 ConnectionCloseFrame[0|0|] AckFrame[1938158226,1938158224-1938158223|Δ0] 16.795 <- (6) Packet A|1938158229|S0|e61cd9cb8a711377|1406|2 MaxStreamsFrame[B,101] Padding(1377) 16.963 loss detection timeout handler running Sending probe 0, because no ack since 16.764. Current RTT: 100/25. 16.964 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.964 (Probe is an initial retransmit) 16.964 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.364/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.964 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.998 <- (1) Packet I|685173889|L|190|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 16.998 probe count not reset on ack because handshake not yet confirmed 16.999 Retransmitting CryptoFrame[0,257] on level Initial 16.999 Cwnd(-): 6000; inflight: 0 16.999 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.399/Initial, because peerAwaitingAddressValidation | RTT:100/25 16.999 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 17.203/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.999 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 16.998 <- (1) Packet H|685173889|L|779|1 CryptoFrame[0,718] 17.001 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 17.205/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.001 -> Packet I|3|L|1201|2 Token=[] AckFrame[685173889|Δ0] Padding(1140) 17.001 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 17.004 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 17.208/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.004 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.998 <- (1) Packet A|685173889|S0|52c8e94c0492b8dc|231|2 NewConnectionIdFrame[1,<0|e1b3ef1a1d210cf7ed422fdd92797dbf648c|d1c30b9a91f9aef5b147f8fc4c16653f] Padding(164) 17.004 Starting downloading https://server4:443/bmssylqtjc at 04:34.458 on ClientConnection[c9e1278165ce2f55/52c8e94c0492b8dc(V1) with server4/193.167.100.100:443] 17.004 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.106/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.004 Discarding pn space Initial because first Handshake message is being sent 17.005 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.107/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.004 -> [Packet H|1|L|59|1 AckFrame[685173889|Δ0], Packet A|0|S0|9e748eaa5bbbd96d5c36a78d3875354c3842|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[685173889|Δ0]] 17.036 <- (2) Packet A|685173890|S0|52c8e94c0492b8dc|1406|2 PingFrame[] Padding(1376) 17.055 -> Packet A|1|S0|9e748eaa5bbbd96d5c36a78d3875354c3842|45|1 AckFrame[685173890-685173889|Δ19] 17.106 loss detection timeout handler running Sending probe 0, because no ack since 17.004. Current RTT: 34/17. 17.106 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.106 (Probe is a handshake retransmit) 17.106 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 17.310/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.106 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 17.309 loss detection timeout handler running Sending probe 1, because no ack since 17.004. Current RTT: 34/17. 17.309 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.309 (Probe is a handshake retransmit) 17.310 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 17.718/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.310 -> Packet PH|3|L|90|1 CryptoFrame[0,36] 17.311 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 17.719/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.311 -> Packet PH|4|L|90|1 CryptoFrame[0,36] 17.362 <- (3) Packet A|685173892|S0|52c8e94c0492b8dc|1406|2 PingFrame[] Padding(1376) 17.363 <- (4) Packet A|685173893|S0|52c8e94c0492b8dc|1200|2 NewConnectionIdFrame[1,<0|e1b3ef1a1d210cf7ed422fdd92797dbf648c|d1c30b9a91f9aef5b147f8fc4c16653f] Padding(1133) 17.363 -> Packet A|2|S0|9e748eaa5bbbd96d5c36a78d3875354c3842|46|1 AckFrame[685173893-685173892,685173890-685173889|Δ0] 17.364 <- (5) Packet A|685173894|S0|52c8e94c0492b8dc|1200|4 HandshakeDoneFrame[] NewTokenFrame[366576f30a2dc53ff00fea11cc78055f93417729fb8a6dd0425be1cb0f95f345f36475b58819123fca] CryptoFrame[0,237] Padding(886) 17.364 State is set to Confirmed reschedule loss detection timer for PTO over 148 millis, based on 17.512/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -232 millis, based on 17.131/App, because ackElicitingInFlight | RTT:34/17 17.364 Discarding pn space Handshake because HandshakeDone is received 17.364 loss detection timeout handler running Sending probe 0, because no ack since 17.004. Current RTT: 34/17. 17.364 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 253 millis, based on 17.618/App, because ackElicitingInFlight | RTT:34/17 17.364 -> Packet PA|3|S0|9e748eaa5bbbd96d5c36a78d3875354c3842|57|1 StreamFrame[0(CIB),0,17,fin] 17.383 -> Packet A|4|S0|9e748eaa5bbbd96d5c36a78d3875354c3842|47|1 AckFrame[685173894-685173892,685173890-685173889|Δ19] 17.415 <- (6) Packet A|685173895|S0|52c8e94c0492b8dc|1444|2 PingFrame[] Padding(1417) 17.435 -> Packet A|5|S0|9e748eaa5bbbd96d5c36a78d3875354c3842|47|1 AckFrame[685173895-685173892,685173890-685173889|Δ19] 17.617 loss detection timeout handler running Sending probe 1, because no ack since 17.364. Current RTT: 34/17. 17.618 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 18.126/App, because ackElicitingInFlight | RTT:34/17 17.618 -> Packet PA|6|S0|9e748eaa5bbbd96d5c36a78d3875354c3842|57|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 18.127/App, because ackElicitingInFlight | RTT:34/17 17.619 -> Packet PA|7|S0|9e748eaa5bbbd96d5c36a78d3875354c3842|57|1 StreamFrame[0(CIB),0,17,fin] 17.656 <- (7) Packet A|685173897|S0|52c8e94c0492b8dc|40|2 AckFrame[6-4|Δ7] Padding(8) 17.657 Cwnd(-): 3000; inflight: 57 17.657 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 89 millis, based on 17.746/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 115 millis, based on 17.773/App, because ackElicitingInFlight | RTT:35/14 17.657 -> Packet A|8|S0|9e748eaa5bbbd96d5c36a78d3875354c3842|57|1 StreamFrame[0(CIB),0,17,fin] 17.688 <- (8) Packet A|685173898|S0|52c8e94c0492b8dc|40|2 AckFrame[8,6-4|Δ0] Padding(7) 17.688 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.811 <- (9) Packet A|685173899|S0|52c8e94c0492b8dc|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 17.812 Finished downloading https://server4:443/bmssylqtjc at 04:35.267 on ClientConnection[c9e1278165ce2f55/52c8e94c0492b8dc(V1) with server4/193.167.100.100:443] 17.812 Closing ClientConnection[c9e1278165ce2f55/52c8e94c0492b8dc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.813 -> Packet A|9|S0|9e748eaa5bbbd96d5c36a78d3875354c3842|48|2 ConnectionCloseFrame[0|0|] AckFrame[685173899-685173897|Δ0] 17.813 <- (10) Packet A|685173900|S0|52c8e94c0492b8dc|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 17.813 Creating connection with server4:443 with v1 17.813 -> Packet A|10|S0|9e748eaa5bbbd96d5c36a78d3875354c3842|48|2 ConnectionCloseFrame[0|0|] AckFrame[685173899-685173897|Δ0] 17.814 Setting up connection for downloading https://server4:443/zjcpchrqpe at 04:35.269 on ClientConnection[ffaf78c3c7125a5b/bb93d74f9af9d4d8(V1) with server4/193.167.100.100:443] 17.814 Original destination connection id: ffaf78c3c7125a5b (scid: bb93d74f9af9d4d8) >- CryptoStream[I|ClientHello] 17.816 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.016/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.815 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.015 loss detection timeout handler running Sending probe 0, because no ack since 17.815. Current RTT: 100/25. 18.015 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.015 (Probe is an initial retransmit) 18.015 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.415/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.015 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.049 <- (1) Packet I|772549129|L|190|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 18.050 probe count not reset on ack because handshake not yet confirmed 18.050 Retransmitting CryptoFrame[0,257] on level Initial 18.050 Cwnd(-): 6000; inflight: 0 18.050 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.450/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.050 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 18.254/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.050 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 18.049 <- (1) Packet H|772549129|L|779|1 CryptoFrame[0,718] 18.052 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 18.256/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.052 -> Packet I|3|L|1201|2 Token=[] AckFrame[772549129|Δ0] Padding(1140) 18.053 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 18.055 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 18.259/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.055 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.056 Starting downloading https://server4:443/zjcpchrqpe at 04:35.510 on ClientConnection[ffaf78c3c7125a5b/bb93d74f9af9d4d8(V1) with server4/193.167.100.100:443] 18.049 <- (1) Packet A|772549129|S0|bb93d74f9af9d4d8|231|2 NewConnectionIdFrame[1,<0|20e19e2e7f7854fd24c0587384e333620152|fe0c9ed80b6e3e1ad76ce56c1b8259e9] Padding(164) 18.056 -> Packet H|1|L|59|1 AckFrame[772549129|Δ0] 18.056 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.158/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.056 Discarding pn space Initial because first Handshake message is being sent 18.056 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.158/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.056 -> Packet A|0|S0|911be3d0e49bbec47e10e9b2900a14653b53|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[772549129|Δ0] 18.083 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 18.087 <- (3) Packet A|772549131|S0|bb93d74f9af9d4d8|1406|2 PingFrame[] Padding(1376) 18.088 <- (4) Packet A|772549132|S0|bb93d74f9af9d4d8|1200|4 HandshakeDoneFrame[] NewTokenFrame[36c275ef316d2a02306d656822e61ae8a99296790740b3f4083a7f3525111ffe9447d2b2824f760f0a] CryptoFrame[0,237] Padding(886) 18.089 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 18.157/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 94 millis, based on 18.183/App, because ackElicitingInFlight | RTT:34/17 18.089 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 18.089 -> Packet A|1|S0|911be3d0e49bbec47e10e9b2900a14653b53|47|1 AckFrame[772549132-772549131,772549129|Δ1] 18.092 <- (5) Packet A|772549134|S0|bb93d74f9af9d4d8|40|2 AckFrame[0|Δ5] Padding(8) 18.092 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.121 <- (6) Packet A|772549135|S0|bb93d74f9af9d4d8|1444|2 PingFrame[] Padding(1417) 18.140 -> Packet A|2|S0|911be3d0e49bbec47e10e9b2900a14653b53|47|1 AckFrame[772549135-772549134,772549132-772549131|Δ19] 18.172 <- (7) Packet A|772549136|S0|bb93d74f9af9d4d8|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 18.173 Finished downloading https://server4:443/zjcpchrqpe at 04:35.627 on ClientConnection[ffaf78c3c7125a5b/bb93d74f9af9d4d8(V1) with server4/193.167.100.100:443] 18.173 Closing ClientConnection[ffaf78c3c7125a5b/bb93d74f9af9d4d8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.173 -> Packet A|3|S0|911be3d0e49bbec47e10e9b2900a14653b53|50|2 ConnectionCloseFrame[0|0|] AckFrame[772549136-772549134,772549132-772549131|Δ0] 18.174 Creating connection with server4:443 with v1 18.174 Setting up connection for downloading https://server4:443/aqwmxypfps at 04:35.629 on ClientConnection[a06ced6994fd83a3/a462f63745947da7(V1) with server4/193.167.100.100:443] 18.174 Original destination connection id: a06ced6994fd83a3 (scid: a462f63745947da7) >- CryptoStream[I|ClientHello] 18.177 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.377/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.177 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.298 <- (8) Packet A|772549137|S0|bb93d74f9af9d4d8|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 18.299 -> Packet A|4|S0|911be3d0e49bbec47e10e9b2900a14653b53|50|2 ConnectionCloseFrame[0|0|] AckFrame[772549136-772549134,772549132-772549131|Δ0] 18.299 <- (9) Packet A|772549138|S0|bb93d74f9af9d4d8|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 18.299 -> Packet A|5|S0|911be3d0e49bbec47e10e9b2900a14653b53|50|2 ConnectionCloseFrame[0|0|] AckFrame[772549136-772549134,772549132-772549131|Δ0] 18.376 loss detection timeout handler running Sending probe 0, because no ack since 18.177. Current RTT: 100/25. 18.377 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.377 (Probe is an initial retransmit) 18.377 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.777/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.377 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.411 <- (1) Packet I|1163118324|L|190|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 18.411 probe count not reset on ack because handshake not yet confirmed 18.411 Retransmitting CryptoFrame[0,257] on level Initial 18.411 Cwnd(-): 6000; inflight: 0 18.411 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.811/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.412 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 18.616/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.412 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 18.414 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 18.618/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.411 <- (1) Packet H|1163118324|L|778|1 CryptoFrame[0,717] 18.414 -> Packet I|3|L|1201|2 Token=[] AckFrame[1163118324|Δ0] Padding(1136) 18.414 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 18.417 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 18.621/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.417 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.411 <- (1) Packet A|1163118324|S0|a462f63745947da7|232|2 NewConnectionIdFrame[1,<0|f6e5a2ddd8ddcb2f2e64635601a8d29d7b72|24be5cf9f92d342395df17a1f2cb2021] Padding(165) 18.417 -> Packet H|1|L|63|1 AckFrame[1163118324|Δ0] 18.417 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.519/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.417 Discarding pn space Initial because first Handshake message is being sent 18.418 Starting downloading https://server4:443/aqwmxypfps at 04:35.872 on ClientConnection[a06ced6994fd83a3/a462f63745947da7(V1) with server4/193.167.100.100:443] 18.418 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.520/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.418 -> Packet A|0|S0|1e21b6046f5ae8c28cde43f23353b10481fe|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1163118324|Δ0] 18.450 <- (2) Packet A|1163118325|S0|a462f63745947da7|1406|2 PingFrame[] Padding(1376) 18.450 <- (3) Packet A|1163118326|S0|a462f63745947da7|1200|4 HandshakeDoneFrame[] NewTokenFrame[3671057723d02dead429ea1db40cd8b736cbee3b611f1db21730bd5b0b05fa745a895f85e6c9b4ba2e] CryptoFrame[0,237] Padding(886) 18.451 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 18.519/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 94 millis, based on 18.545/App, because ackElicitingInFlight | RTT:34/17 18.451 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 18.451 -> Packet A|1|S0|1e21b6046f5ae8c28cde43f23353b10481fe|49|1 AckFrame[1163118326-1163118324|Δ1] 18.545 loss detection timeout handler running Sending probe 0, because no ack since 18.418. Current RTT: 34/17. 18.545 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 18.799/App, because ackElicitingInFlight | RTT:34/17 18.545 -> Packet PA|2|S0|1e21b6046f5ae8c28cde43f23353b10481fe|57|1 StreamFrame[0(CIB),0,17,fin] 18.582 <- (4) Packet A|1163118327|S0|a462f63745947da7|1406|2 PingFrame[] Padding(1376) 18.584 <- (5) Packet A|1163118329|S0|a462f63745947da7|1200|4 HandshakeDoneFrame[] NewTokenFrame[3671057723d02dead429ea1db40cd8b736cbee3b611f1db21730bd5b0b05fa745a895f85e6c9b4ba2e] CryptoFrame[0,237] Padding(886) -< CryptoStream[A|NewSessionTicket] 18.585 -> Packet A|3|S0|1e21b6046f5ae8c28cde43f23353b10481fe|51|1 AckFrame[1163118329,1163118327-1163118324|Δ2] 18.617 <- (6) Packet A|1163118330|S0|a462f63745947da7|1444|2 PingFrame[] Padding(1417) 18.636 -> Packet A|4|S0|1e21b6046f5ae8c28cde43f23353b10481fe|51|1 AckFrame[1163118330-1163118329,1163118327-1163118324|Δ19] 18.799 loss detection timeout handler running Sending probe 1, because no ack since 18.545. Current RTT: 34/17. 18.799 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 19.307/App, because ackElicitingInFlight | RTT:34/17 18.799 -> Packet PA|5|S0|1e21b6046f5ae8c28cde43f23353b10481fe|57|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 19.308/App, because ackElicitingInFlight | RTT:34/17 18.800 -> Packet PA|6|S0|1e21b6046f5ae8c28cde43f23353b10481fe|57|1 StreamFrame[0(CIB),0,17,fin] 18.831 <- (7) Packet A|1163118331|S0|a462f63745947da7|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 18.831 <- (8) Packet A|1163118332|S0|a462f63745947da7|40|2 AckFrame[6-3|Δ0] Padding(9) 18.832 Finished downloading https://server4:443/aqwmxypfps at 04:36.286 on ClientConnection[a06ced6994fd83a3/a462f63745947da7(V1) with server4/193.167.100.100:443] 18.832 Closing ClientConnection[a06ced6994fd83a3/a462f63745947da7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.832 Cwnd(-): 3000; inflight: 0 18.832 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.833 -> Packet A|7|S0|1e21b6046f5ae8c28cde43f23353b10481fe|52|2 ConnectionCloseFrame[0|0|] AckFrame[1163118332-1163118331|Δ0] 18.833 Creating connection with server4:443 with v1 18.834 Setting up connection for downloading https://server4:443/krjhgwghzt at 04:36.288 on ClientConnection[f534a5cde46aba46/de1f182c0ad00652(V1) with server4/193.167.100.100:443] 18.834 Original destination connection id: f534a5cde46aba46 (scid: de1f182c0ad00652) >- CryptoStream[I|ClientHello] 18.835 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.035/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.835 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.869 <- (1) Packet I|463779673|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18.870 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.070/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.869 <- (1) Packet H|463779673|L|780|1 CryptoFrame[0,719] 18.872 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.974/Handshake, because peerAwaitingAddressValidation | RTT:34/17 18.872 -> Packet I|1|L|1201|2 Token=[] AckFrame[463779673|Δ0] Padding(1140) 18.872 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 18.874 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.976/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.874 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.874 Starting downloading https://server4:443/krjhgwghzt at 04:36.329 on ClientConnection[f534a5cde46aba46/de1f182c0ad00652(V1) with server4/193.167.100.100:443] 18.869 <- (1) Packet A|463779673|S0|de1f182c0ad00652|230|2 NewConnectionIdFrame[1,<0|8d8fd6e38d2a0249f5f1d639c65d475c4796|ef0ec909a7c4f4089c466bc6ff6d83c2] Padding(163) 18.874 -> Packet H|1|L|59|1 AckFrame[463779673|Δ0] 18.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.977/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.875 Discarding pn space Initial because first Handshake message is being sent 18.875 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.977/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.875 -> Packet A|0|S0|3b6af0359bcb2eceff31b7b8aaf66bdce141|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[463779673|Δ0] 18.976 loss detection timeout handler running Sending probe 0, because no ack since 18.874. Current RTT: 34/17. 18.976 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.976 (Probe is a handshake retransmit) 18.976 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 19.180/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.976 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 19.009 <- (2) Packet A|463779674|S0|de1f182c0ad00652|1406|2 PingFrame[] Padding(1379) 19.011 <- (3) Packet A|463779676|S0|de1f182c0ad00652|1200|2 StreamFrame[0(CIB),879,145,fin] Padding(1023) 19.011 -> Packet A|1|S0|3b6af0359bcb2eceff31b7b8aaf66bdce141|47|1 AckFrame[463779676,463779674-463779673|Δ1] 19.179 loss detection timeout handler running Sending probe 1, because no ack since 18.875. Current RTT: 34/17. 19.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.180 (Probe is a handshake retransmit) 19.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 19.588/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.180 -> Packet PH|3|L|90|1 CryptoFrame[0,36] 19.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 19.589/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.181 -> Packet PH|4|L|90|1 CryptoFrame[0,36] 19.217 <- (4) Packet A|463779678|S0|de1f182c0ad00652|1406|2 PingFrame[] Padding(1379) 19.218 <- (5) Packet A|463779679|S0|de1f182c0ad00652|1200|5 HandshakeDoneFrame[] NewTokenFrame[36a9e13a8b9930be4594430717bbae9258b694b722918a9e88baccbfe9d3d7629c4002a8cb502fd731] CryptoFrame[0,237] StreamFrame[0(CIB),0,879] Padding(6) 19.218 State is set to Confirmed reschedule loss detection timer for PTO over 164 millis, based on 19.383/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -216 millis, based on 19.002/App, because ackElicitingInFlight | RTT:34/17 19.218 Discarding pn space Handshake because HandshakeDone is received 19.218 loss detection timeout handler running Sending probe 0, because no ack since 18.875. Current RTT: 34/17. 19.218 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 253 millis, based on 19.473/App, because ackElicitingInFlight | RTT:34/17 19.219 -> Packet PA|2|S0|3b6af0359bcb2eceff31b7b8aaf66bdce141|57|1 StreamFrame[0(CIB),0,17,fin] 19.219 -> Packet A|3|S0|3b6af0359bcb2eceff31b7b8aaf66bdce141|49|1 AckFrame[463779679-463779678,463779676,463779674-463779673|Δ1] 19.219 Finished downloading https://server4:443/krjhgwghzt at 04:36.673 on ClientConnection[f534a5cde46aba46/de1f182c0ad00652(V1) with server4/193.167.100.100:443] 19.219 Closing ClientConnection[f534a5cde46aba46/de1f182c0ad00652(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.219 <- (6) Packet A|463779680|S0|de1f182c0ad00652|1200|2 StreamFrame[0(CIB),879,145,fin] Padding(1023) 19.219 -> Packet A|4|S0|3b6af0359bcb2eceff31b7b8aaf66bdce141|56|3 ConnectionCloseFrame[0|0|] AckFrame[463779679-463779678,463779676,463779674-463779673|Δ0] ConnectionCloseFrame[0|0|] 19.220 Creating connection with server4:443 with v1 19.220 Setting up connection for downloading https://server4:443/fjjzkjwtcp at 04:36.675 on ClientConnection[6a5c1174cfd84e5e/6b2333e72b52f0c2(V1) with server4/193.167.100.100:443] 19.220 Original destination connection id: 6a5c1174cfd84e5e (scid: 6b2333e72b52f0c2) >- CryptoStream[I|ClientHello] 19.221 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.421/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.221 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.251 <- (7) Packet A|463779681|S0|de1f182c0ad00652|1444|2 PingFrame[] Padding(1417) 19.251 -> Packet A|5|S0|3b6af0359bcb2eceff31b7b8aaf66bdce141|52|2 ConnectionCloseFrame[0|0|] AckFrame[463779679-463779678,463779676,463779674-463779673|Δ0] 19.255 <- (1) Packet I|1014555671|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.256 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.456/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.255 <- (1) Packet H|1014555671|L|780|1 CryptoFrame[0,719] 19.259 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.356/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.259 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 19.258 -> Packet I|1|L|1201|2 Token=[] AckFrame[1014555671|Δ0] Padding(1140) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.261 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.358/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.261 -> Packet H|0|L|90|1 CryptoFrame[0,36] 19.255 <- (1) Packet A|1014555671|S0|6b2333e72b52f0c2|230|2 NewConnectionIdFrame[1,<0|e1e7418cb56ee460232b5b7fa393714833fd|2cf9ee5f8161cbf9955a20bf9d05f09c] Padding(163) 19.261 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.358/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.261 Discarding pn space Initial because first Handshake message is being sent 19.261 -> Packet H|1|L|59|1 AckFrame[1014555671|Δ0] 19.262 Starting downloading https://server4:443/fjjzkjwtcp at 04:36.716 on ClientConnection[6a5c1174cfd84e5e/6b2333e72b52f0c2(V1) with server4/193.167.100.100:443] 19.262 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.359/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.262 -> Packet A|0|S0|5c943b4d61089632dd6bcb923a7ad190f245|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1014555671|Δ0] 19.294 <- (2) Packet A|1014555673|S0|6b2333e72b52f0c2|1200|4 HandshakeDoneFrame[] NewTokenFrame[36595d6258217d7cff41d835014c0f2ca328cf7d4442c7fa3bec5e14bdc1f7380f98746e9fe1d634f5] CryptoFrame[0,237] Padding(886) 19.295 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 19.358/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 89 millis, based on 19.384/App, because ackElicitingInFlight | RTT:33/16 19.295 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 19.314 -> Packet A|1|S0|5c943b4d61089632dd6bcb923a7ad190f245|47|1 AckFrame[1014555673,1014555671|Δ19] 19.384 loss detection timeout handler running Sending probe 0, because no ack since 19.262. Current RTT: 33/16. 19.384 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 19.628/App, because ackElicitingInFlight | RTT:33/16 19.384 -> Packet PA|2|S0|5c943b4d61089632dd6bcb923a7ad190f245|57|1 StreamFrame[0(CIB),0,17,fin] 19.619 <- (3) Packet A|1014555674|S0|6b2333e72b52f0c2|1406|2 PingFrame[] Padding(1379) 19.627 loss detection timeout handler running Sending probe 1, because no ack since 19.384. Current RTT: 33/16. 19.628 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 20.116/App, because ackElicitingInFlight | RTT:33/16 19.628 -> Packet PA|3|S0|5c943b4d61089632dd6bcb923a7ad190f245|57|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 20.117/App, because ackElicitingInFlight | RTT:33/16 19.629 -> Packet PA|4|S0|5c943b4d61089632dd6bcb923a7ad190f245|57|1 StreamFrame[0(CIB),0,17,fin] 19.639 -> Packet A|5|S0|5c943b4d61089632dd6bcb923a7ad190f245|47|1 AckFrame[1014555674-1014555673,1014555671|Δ19] 19.671 <- (4) Packet A|1014555675|S0|6b2333e72b52f0c2|1444|2 PingFrame[] Padding(1417) 19.691 -> Packet A|6|S0|5c943b4d61089632dd6bcb923a7ad190f245|47|1 AckFrame[1014555675-1014555673,1014555671|Δ19] 20.116 loss detection timeout handler running Sending probe 2, because no ack since 19.629. Current RTT: 33/16. 20.116 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 975 millis, based on 21.092/App, because ackElicitingInFlight | RTT:33/16 20.116 -> Packet PA|7|S0|5c943b4d61089632dd6bcb923a7ad190f245|57|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 975 millis, based on 21.093/App, because ackElicitingInFlight | RTT:33/16 20.117 -> Packet PA|8|S0|5c943b4d61089632dd6bcb923a7ad190f245|57|1 StreamFrame[0(CIB),0,17,fin] 20.149 <- (5) Packet A|1014555676|S0|6b2333e72b52f0c2|1444|2 StreamFrame[0(CIB),0,1024,fin] Padding(390) 20.149 <- (6) Packet A|1014555677|S0|6b2333e72b52f0c2|40|2 AckFrame[8-5,1|Δ0] Padding(7) 20.149 Finished downloading https://server4:443/fjjzkjwtcp at 04:37.604 on ClientConnection[6a5c1174cfd84e5e/6b2333e72b52f0c2(V1) with server4/193.167.100.100:443] 20.149 Closing ClientConnection[6a5c1174cfd84e5e/6b2333e72b52f0c2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.149 Cwnd(-): 6000; inflight: 0 20.149 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.150 -> Packet A|9|S0|5c943b4d61089632dd6bcb923a7ad190f245|48|2 ConnectionCloseFrame[0|0|] AckFrame[1014555677-1014555676|Δ0] 20.150 Creating connection with server4:443 with v1 20.150 Setting up connection for downloading https://server4:443/hwhmhaqwfr at 04:37.605 on ClientConnection[8987ccf089c0f61f/29bdbb304a9af7f0(V1) with server4/193.167.100.100:443] 20.150 Original destination connection id: 8987ccf089c0f61f (scid: 29bdbb304a9af7f0) >- CryptoStream[I|ClientHello] 20.152 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.352/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.152 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.185 <- (1) Packet I|1514374521|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 20.186 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.386/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.185 <- (1) Packet H|1514374521|L|778|1 CryptoFrame[0,717] 20.189 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.286/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.189 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 20.189 -> Packet I|1|L|1201|2 Token=[] AckFrame[1514374521|Δ0] Padding(1136) >- CryptoStream[H|Finished] 20.191 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.288/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.191 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.192 Starting downloading https://server4:443/hwhmhaqwfr at 04:37.646 on ClientConnection[8987ccf089c0f61f/29bdbb304a9af7f0(V1) with server4/193.167.100.100:443] 20.185 <- (1) Packet A|1514374521|S0|29bdbb304a9af7f0|232|2 NewConnectionIdFrame[1,<0|abe3b84e9feddfab63219589a38bd8ac2205|825da5aaf9ad9eff5558c48713a15d9d] Padding(165) 20.192 -> Packet H|1|L|63|1 AckFrame[1514374521|Δ0] 20.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.289/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.192 Discarding pn space Initial because first Handshake message is being sent 20.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.289/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.192 -> Packet A|0|S0|ef66abd50115a9352b209306da80775281d0|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1514374521|Δ0] 20.288 loss detection timeout handler running Sending probe 0, because no ack since 20.191. Current RTT: 33/16. 20.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.288 (Probe is a handshake retransmit) 20.289 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.483/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.289 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 20.323 <- (2) Packet A|1514374524|S0|29bdbb304a9af7f0|1200|2 StreamFrame[0(CIB),879,145,fin] Padding(1023) 20.343 -> Packet A|1|S0|ef66abd50115a9352b209306da80775281d0|51|1 AckFrame[1514374524,1514374521|Δ19] 20.382 <- (3) Packet A|1514374525|S0|29bdbb304a9af7f0|1200|5 HandshakeDoneFrame[] NewTokenFrame[36eaa370be88348d20ca34ece470e796c1b9d8ce8410189c6241335768f9ebee54f8ecf3be9f5b46ce] CryptoFrame[0,237] StreamFrame[0(CIB),0,879] Padding(6) 20.382 State is set to Confirmed reschedule loss detection timer for PTO over 53 millis, based on 20.436/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -68 millis, based on 20.314/App, because ackElicitingInFlight | RTT:33/16 20.382 Discarding pn space Handshake because HandshakeDone is received 20.382 loss detection timeout handler running Sending probe 0, because no ack since 20.192. Current RTT: 33/16. 20.383 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 20.627/App, because ackElicitingInFlight | RTT:33/16 20.383 -> Packet PA|2|S0|ef66abd50115a9352b209306da80775281d0|57|1 StreamFrame[0(CIB),0,17,fin] 20.383 Finished downloading https://server4:443/hwhmhaqwfr at 04:37.837 on ClientConnection[8987ccf089c0f61f/29bdbb304a9af7f0(V1) with server4/193.167.100.100:443] 20.383 Closing ClientConnection[8987ccf089c0f61f/29bdbb304a9af7f0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.383 -> Packet A|3|S0|ef66abd50115a9352b209306da80775281d0|54|2 ConnectionCloseFrame[0|0|] AckFrame[1514374525-1514374524,1514374521|Δ0] 20.384 Creating connection with server4:443 with v1 20.384 Setting up connection for downloading https://server4:443/xsctufnfhn at 04:37.839 on ClientConnection[2ecb380766897665/33cb2e92117f3d17(V1) with server4/193.167.100.100:443] 20.384 Original destination connection id: 2ecb380766897665 (scid: 33cb2e92117f3d17) >- CryptoStream[I|ClientHello] 20.385 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.585/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.385 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.419 <- (1) Packet I|640939360|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 20.419 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.619/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.419 <- (1) Packet H|640939360|L|779|1 CryptoFrame[0,718] 20.421 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.518/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.421 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 20.421 -> Packet I|1|L|1201|2 Token=[] AckFrame[640939360|Δ0] Padding(1140) >- CryptoStream[H|Finished] 20.423 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.520/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.423 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.423 Starting downloading https://server4:443/xsctufnfhn at 04:37.878 on ClientConnection[2ecb380766897665/33cb2e92117f3d17(V1) with server4/193.167.100.100:443] 20.419 <- (1) Packet A|640939360|S0|33cb2e92117f3d17|231|2 NewConnectionIdFrame[1,<0|88602f951f17128ba7bf35441d9bc5db828c|fbcb748d43c90e1513e3c0b62c345bb9] Padding(164) 20.423 -> Packet H|1|L|59|1 AckFrame[640939360|Δ0] 20.423 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.520/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.423 Discarding pn space Initial because first Handshake message is being sent 20.423 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.520/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.423 -> Packet A|0|S0|1023885e84f21fc09733348820b0aaccbc15|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[640939360|Δ0] 20.455 <- (2) Packet A|640939361|S0|33cb2e92117f3d17|1406|2 PingFrame[] Padding(1379) 20.456 <- (3) Packet A|640939362|S0|33cb2e92117f3d17|1200|4 HandshakeDoneFrame[] NewTokenFrame[3671fddac4ccddabd255e246cdcafc3a7aef6d6c74ecbba47869a6d528bba36f80ad9791101a773eaa] CryptoFrame[0,237] StreamFrame[0(CIB),0,885] 20.457 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 20.520/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 88 millis, based on 20.545/App, because ackElicitingInFlight | RTT:33/16 20.457 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 20.457 -> Packet A|1|S0|1023885e84f21fc09733348820b0aaccbc15|45|1 AckFrame[640939362-640939360|Δ1] 20.457 <- (4) Packet A|640939363|S0|33cb2e92117f3d17|1200|2 StreamFrame[0(CIB),885,139,fin] Padding(1029) 20.458 Finished downloading https://server4:443/xsctufnfhn at 04:37.912 on ClientConnection[2ecb380766897665/33cb2e92117f3d17(V1) with server4/193.167.100.100:443] 20.458 Closing ClientConnection[2ecb380766897665/33cb2e92117f3d17(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.458 -> Packet A|2|S0|1023885e84f21fc09733348820b0aaccbc15|48|2 ConnectionCloseFrame[0|0|] AckFrame[640939363-640939360|Δ0] 20.459 Creating connection with server4:443 with v1 20.459 <- (5) Packet A|640939364|S0|33cb2e92117f3d17|40|2 AckFrame[0|Δ4] Padding(8) 20.459 -> Packet A|3|S0|1023885e84f21fc09733348820b0aaccbc15|48|2 ConnectionCloseFrame[0|0|] AckFrame[640939363-640939360|Δ0] 20.459 Setting up connection for downloading https://server4:443/umropyshew at 04:37.914 on ClientConnection[64b866f6929edc84/542f6cb3863aded4(V1) with server4/193.167.100.100:443] 20.459 Original destination connection id: 64b866f6929edc84 (scid: 542f6cb3863aded4) >- CryptoStream[I|ClientHello] 20.460 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.660/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.460 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.489 <- (6) Packet A|640939365|S0|33cb2e92117f3d17|1444|2 PingFrame[] Padding(1417) 20.489 -> Packet A|4|S0|1023885e84f21fc09733348820b0aaccbc15|48|2 ConnectionCloseFrame[0|0|] AckFrame[640939363-640939360|Δ0] 20.494 <- (1) Packet I|695452236|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 20.494 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.694/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.494 <- (1) Packet H|695452236|L|779|1 CryptoFrame[0,718] 20.496 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.593/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.496 -> Packet I|1|L|1201|2 Token=[] AckFrame[695452236|Δ0] Padding(1140) 20.497 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 20.499 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.596/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.499 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.499 Starting downloading https://server4:443/umropyshew at 04:37.953 on ClientConnection[64b866f6929edc84/542f6cb3863aded4(V1) with server4/193.167.100.100:443] 20.494 <- (1) Packet A|695452236|S0|542f6cb3863aded4|231|2 NewConnectionIdFrame[1,<0|cedee371d991c225441e55285fdabbe174e3|6dd5be7c0afbaabea5e8f7ff2b78f847] Padding(164) 20.499 -> Packet H|1|L|59|1 AckFrame[695452236|Δ0] 20.499 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.596/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.499 Discarding pn space Initial because first Handshake message is being sent 20.499 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.596/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.499 -> Packet A|0|S0|ce1b619547df3f5b815814b758a5ab042ba6|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[695452236|Δ0] 20.531 <- (2) Packet A|695452237|S0|542f6cb3863aded4|1406|2 PingFrame[] Padding(1376) 20.532 <- (3) Packet A|695452238|S0|542f6cb3863aded4|1200|4 HandshakeDoneFrame[] NewTokenFrame[36a01efdb8192370296a08ed9e76622e60e58193dfbea18bde9c9cb7621c915fa38729711e788403f6] CryptoFrame[0,237] Padding(886) 20.532 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 20.596/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 88 millis, based on 20.621/App, because ackElicitingInFlight | RTT:33/16 20.532 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 20.532 -> Packet A|1|S0|ce1b619547df3f5b815814b758a5ab042ba6|45|1 AckFrame[695452238-695452236|Δ1] 20.533 <- (4) Packet A|695452239|S0|542f6cb3863aded4|1200|2 StreamFrame[0(CIB),0,1024,fin] Padding(146) 20.533 Finished downloading https://server4:443/umropyshew at 04:37.988 on ClientConnection[64b866f6929edc84/542f6cb3863aded4(V1) with server4/193.167.100.100:443] 20.533 Closing ClientConnection[64b866f6929edc84/542f6cb3863aded4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.534 -> Packet A|2|S0|ce1b619547df3f5b815814b758a5ab042ba6|48|2 ConnectionCloseFrame[0|0|] AckFrame[695452239-695452236|Δ0] 20.534 Creating connection with server4:443 with v1 20.534 Setting up connection for downloading https://server4:443/xdekxficsf at 04:37.989 on ClientConnection[686602342539efda/972f8ab7d09462e9(V1) with server4/193.167.100.100:443] 20.534 Original destination connection id: 686602342539efda (scid: 972f8ab7d09462e9) >- CryptoStream[I|ClientHello] 20.535 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.735/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.535 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.564 <- (5) Packet A|695452241|S0|542f6cb3863aded4|1444|2 PingFrame[] Padding(1417) 20.565 -> Packet A|3|S0|ce1b619547df3f5b815814b758a5ab042ba6|48|2 ConnectionCloseFrame[0|0|] AckFrame[695452239-695452236|Δ0] 20.735 loss detection timeout handler running Sending probe 0, because no ack since 20.535. Current RTT: 100/25. 20.735 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.735 (Probe is an initial retransmit) 20.735 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.135/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.735 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.769 <- (1) Packet I|1959272665|L|190|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 20.769 probe count not reset on ack because handshake not yet confirmed 20.769 Retransmitting CryptoFrame[0,257] on level Initial 20.770 Cwnd(-): 6000; inflight: 0 20.770 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.170/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.770 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 20.964/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.770 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(886) -< CryptoStream[I|ServerHello] 20.769 <- (1) Packet H|1959272665|L|779|1 CryptoFrame[0,718] 20.772 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.966/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.772 -> Packet I|3|L|1201|2 Token=[] AckFrame[1959272665|Δ0] Padding(1136) 20.772 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) >- CryptoStream[H|Finished] 20.774 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.968/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.774 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.774 Starting downloading https://server4:443/xdekxficsf at 04:38.229 on ClientConnection[686602342539efda/972f8ab7d09462e9(V1) with server4/193.167.100.100:443] 20.769 <- (1) Packet A|1959272665|S0|972f8ab7d09462e9|231|2 NewConnectionIdFrame[1,<0|2e94d23ef685cd263358b8d4cfadc9cf2da4|ec5f7e0dbb7de9d49777477167bf6676] Padding(164) 20.774 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.871/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.774 Discarding pn space Initial because first Handshake message is being sent 20.774 -> Packet H|1|L|63|1 AckFrame[1959272665|Δ0] 20.775 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.872/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.775 -> Packet A|0|S0|763bb0be66bb22359a9a8025adaa0b2d2e7c|69|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1959272665|Δ0] 20.871 loss detection timeout handler running Sending probe 0, because no ack since 20.774. Current RTT: 33/16. 20.871 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.871 (Probe is a handshake retransmit) 20.871 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.065/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.871 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 20.876 <- (2) Packet H|1959272666|L|779|1 CryptoFrame[0,718] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.877 -> Packet H|3|L|63|1 AckFrame[1959272666-1959272665|Δ0] 20.877 <- (3) Packet H|1959272667|L|779|1 CryptoFrame[0,718] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.877 -> Packet H|4|L|63|1 AckFrame[1959272667-1959272665|Δ0] 20.905 <- (4) Packet A|1959272667|S0|972f8ab7d09462e9|1200|5 AckFrame[0|Δ97] HandshakeDoneFrame[] NewTokenFrame[3637bcfad041529f37167d6207665afee4e99c758c374e905522950f673afb83181066681556cd670c] CryptoFrame[0,237] StreamFrame[0(CIB),0,879] 20.905 probe count not reset on ack because handshake not yet confirmed 20.905 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.099/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.905 State is set to Confirmed reschedule loss detection timer for PTO over 289 millis, based on 21.195/Handshake, because ackElicitingInFlight | RTT:42/30 20.905 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.905 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 20.925 -> Packet A|1|S0|763bb0be66bb22359a9a8025adaa0b2d2e7c|49|1 AckFrame[1959272667|Δ19] 21.021 <- (5) Packet A|1959272669|S0|972f8ab7d09462e9|1406|2 PingFrame[] Padding(1379) 21.022 <- (6) Packet A|1959272670|S0|972f8ab7d09462e9|1200|5 HandshakeDoneFrame[] NewTokenFrame[3637bcfad041529f37167d6207665afee4e99c758c374e905522950f673afb83181066681556cd670c] CryptoFrame[0,237] StreamFrame[0(CIB),0,879] Padding(6) -< CryptoStream[A|NewSessionTicket] 21.022 -> Packet A|2|S0|763bb0be66bb22359a9a8025adaa0b2d2e7c|50|1 AckFrame[1959272670-1959272669,1959272667|Δ0] 21.023 <- (7) Packet A|1959272671|S0|972f8ab7d09462e9|1200|2 StreamFrame[0(CIB),879,145,fin] Padding(1023) 21.023 Finished downloading https://server4:443/xdekxficsf at 04:38.477 on ClientConnection[686602342539efda/972f8ab7d09462e9(V1) with server4/193.167.100.100:443] 21.023 Closing ClientConnection[686602342539efda/972f8ab7d09462e9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.023 -> Packet A|3|S0|763bb0be66bb22359a9a8025adaa0b2d2e7c|54|2 ConnectionCloseFrame[0|0|] AckFrame[1959272671-1959272669,1959272667|Δ0] 21.024 Creating connection with server4:443 with v1 21.024 Setting up connection for downloading https://server4:443/nrwvaziaqz at 04:38.479 on ClientConnection[b1e7eee7c6f0df8c/6f986169f10caa5f(V1) with server4/193.167.100.100:443] 21.024 Original destination connection id: b1e7eee7c6f0df8c (scid: 6f986169f10caa5f) >- CryptoStream[I|ClientHello] 21.025 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.225/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.025 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.059 <- (1) Packet I|165504598|L|190|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.060 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.260/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.059 <- (1) Packet H|165504598|L|780|1 CryptoFrame[0,719] 21.062 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.159/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.062 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 21.062 -> Packet I|1|L|1201|2 Token=[] AckFrame[165504598|Δ0] Padding(1140) >- CryptoStream[H|Finished] 21.064 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.161/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.064 -> Packet H|0|L|90|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.064 Starting downloading https://server4:443/nrwvaziaqz at 04:38.519 on ClientConnection[b1e7eee7c6f0df8c/6f986169f10caa5f(V1) with server4/193.167.100.100:443] 21.059 <- (1) Packet A|165504598|S0|6f986169f10caa5f|230|2 NewConnectionIdFrame[1,<0|cd3d21569172427331c65c26b92496d9ce81|8bb4f2eb4ae8e10ae35c49e4c408daeb] Padding(163) 21.064 -> Packet H|1|L|59|1 AckFrame[165504598|Δ0] 21.064 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.161/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.064 Discarding pn space Initial because first Handshake message is being sent 21.065 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.162/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.065 -> Packet A|0|S0|e3c16c5c944f3a74e4ecce85701fef70fdd8|65|2 StreamFrame[0(CIB),0,17,fin] AckFrame[165504598|Δ0] 21.096 <- (2) Packet A|165504599|S0|6f986169f10caa5f|1406|2 PingFrame[] Padding(1376) 21.101 <- (3) Packet A|165504602|S0|6f986169f10caa5f|40|2 AckFrame[0|Δ5] Padding(8) 21.101 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.198/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.116 -> Packet A|1|S0|e3c16c5c944f3a74e4ecce85701fef70fdd8|47|1 AckFrame[165504602,165504599|Δ19] 21.198 loss detection timeout handler running Sending probe 0, because no ack since 21.064. Current RTT: 33/13. 21.198 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.198 (Probe is a handshake retransmit) 21.198 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 169 millis, based on 21.368/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/13 21.198 -> Packet PH|2|L|90|1 CryptoFrame[0,36] 21.264 <- (4) Packet A|165504605|S0|6f986169f10caa5f|1444|2 PingFrame[] Padding(1417) 21.265 <- (5) Packet A|165504606|S0|6f986169f10caa5f|1406|5 HandshakeDoneFrame[] NewTokenFrame[365ae7489ec2f3b9637f61bb38727434d657497cc5510c99c521c57bbf170047d39a44542eccf78a44] CryptoFrame[0,237] StreamFrame[0(CIB),0,1024,fin] Padding(67) 21.266 State is set to Confirmed reschedule loss detection timer for PTO over 102 millis, based on 21.368/Handshake, because ackElicitingInFlight | RTT:33/13 21.266 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.266 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 21.266 -> Packet A|2|S0|e3c16c5c944f3a74e4ecce85701fef70fdd8|49|1 AckFrame[165504606-165504605,165504602,165504599|Δ1] 21.266 Finished downloading https://server4:443/nrwvaziaqz at 04:38.721 on ClientConnection[b1e7eee7c6f0df8c/6f986169f10caa5f(V1) with server4/193.167.100.100:443] 21.266 Closing ClientConnection[b1e7eee7c6f0df8c/6f986169f10caa5f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.267 -> Packet A|3|S0|e3c16c5c944f3a74e4ecce85701fef70fdd8|52|2 ConnectionCloseFrame[0|0|] AckFrame[165504606-165504605,165504602,165504599|Δ0]