Using document root /www/ Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:58364 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:58364 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:58364 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:58364 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:58364 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:58364 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 if=eth0 ecn=0x0 1220 bytes I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cca bbr enter Startup I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con next skip pkn=641664815 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con recv packet len=1220 mask=ec3b8103fd sample=0ee7042eb8c6c285cb6af696d6785bbc I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt rx pkn=0 dcid=0x02817b3a154bd488 scid=0x version=0x00000001 type=Initial len=1202 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 0 Initial CRYPTO(0x06) offset=0 len=297 Ordered CRYPTO data in Initial crypto level 00000000 01 00 01 25 03 03 17 0e b4 fe aa 3e 19 5e b2 48 |...%.......>.^.H| 00000010 bc f2 ff eb ff 88 4b a0 d9 19 d3 41 d4 18 85 e2 |......K....A....| 00000020 b6 bc e3 28 f3 4e 00 00 08 13 02 13 03 13 01 00 |...(.N..........| 00000030 ff 01 00 00 f4 00 00 00 0c 00 0a 00 00 07 73 65 |..............se| 00000040 72 76 65 72 34 00 0b 00 04 03 00 01 02 00 0a 00 |rver4...........| 00000050 16 00 14 00 1d 00 17 00 1e 00 19 00 18 01 00 01 |................| 00000060 01 01 02 01 03 01 04 00 23 00 00 00 10 00 1c 00 |........#.......| 00000070 1a 0a 68 71 2d 69 6e 74 65 72 6f 70 02 68 33 05 |..hq-interop.h3.| 00000080 68 71 2d 32 39 05 68 33 2d 32 39 00 16 00 00 00 |hq-29.h3-29.....| 00000090 17 00 00 00 0d 00 1e 00 1c 04 03 05 03 06 03 08 |................| 000000a0 07 08 08 08 09 08 0a 08 0b 08 04 08 05 08 06 04 |................| 000000b0 01 05 01 06 01 00 2b 00 03 02 03 04 00 2d 00 02 |......+......-..| 000000c0 01 01 00 33 00 26 00 24 00 1d 00 20 57 02 72 68 |...3.&.$... W.rh| 000000d0 c7 ad 76 f9 af e9 55 29 ee a5 95 13 29 3b 91 d6 |..v...U)....);..| 000000e0 77 dc 93 15 a6 4c 32 b4 71 f9 9e 5e 00 39 00 39 |w....L2.q..^.9.9| 000000f0 01 02 67 10 03 02 45 c0 04 04 81 00 00 00 05 04 |..g...E.........| 00000100 80 01 00 00 06 04 80 01 00 00 07 04 80 01 00 00 |................| 00000110 09 01 03 0a 01 08 0b 01 1a 0e 01 04 0f 00 c0 00 |................| 00000120 00 00 ff 04 de 1b 02 43 e8 |.......C.| 00000129 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con the negotiated version is 0x00000001 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters initial_source_connection_id=0x I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters initial_max_stream_data_bidi_local=65536 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters initial_max_stream_data_bidi_remote=65536 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters initial_max_stream_data_uni=65536 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters initial_max_data=16777216 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters initial_max_streams_bidi=0 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters initial_max_streams_uni=3 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters max_idle_timeout=10000 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters max_udp_payload_size=1472 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters ack_delay_exponent=8 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters max_ack_delay=26 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters active_connection_id_limit=4 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters disable_active_migration=0 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters max_datagram_frame_size=0 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cry remote transport_parameters grease_quic_bit=0 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 0 Initial PADDING(0x00) len=881 I00000000 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt read packet 1220 left 0 Set timer=29.998940s I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt tx pkn=641664678 dcid=0x scid=0x4b1883d78e5a879a6d45f0aa29e88cc7783f version=0x00000001 type=Initial len=0 I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664678 Initial ACK(0x02) largest_ack=0 ack_delay=0(0) ack_range_count=0 I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664678 Initial ACK(0x02) range=[0..0] len=0 I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664678 Initial CRYPTO(0x06) offset=0 len=90 mask=33f664c5bd sample=6dffad45001877e03770a8d9f7d39c2a I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177414766533 timeout=300 I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt tx pkn=641664678 dcid=0x scid=0x4b1883d78e5a879a6d45f0aa29e88cc7783f version=0x00000001 type=Handshake len=0 I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664678 Handshake CRYPTO(0x06) offset=0 len=705 mask=4e99b6914c sample=b4295d55a1e230327c58e3af612ab98c I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177414766533 timeout=300 I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt tx pkn=641664678 dcid=0x type=1RTT k=0 I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664678 1RTT NEW_CONNECTION_ID(0x18) seq=3 cid=0x0fdca2c54df5c3e03cf3f1678486e09d1cf0 retire_prior_to=0 stateless_reset_token=0x66e88aa9f66889cd2101fb67a0e5544d I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664678 1RTT NEW_CONNECTION_ID(0x18) seq=2 cid=0x12351e3aa969bbd9dc4b0f15179694a846f5 retire_prior_to=0 stateless_reset_token=0x18e7af72771b3a64cc1603abf7bda587 I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664678 1RTT NEW_CONNECTION_ID(0x18) seq=1 cid=0x584b1178756eed5e245e0ba0e481cf70347e retire_prior_to=0 stateless_reset_token=0x052fb11236466173cdc73bd86ee5b9e4 I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664678 1RTT PADDING(0x00) len=158 mask=9cfbcb8854 sample=93c479ec94eb77712f2373e08445cff6 I00000001 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177414766533 timeout=300 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 ecn=0x2 1200 bytes Timer has already expired: 0.000230s Timer expired Set timer=0.299688s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 if=eth0 ecn=0x0 97 bytes I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con recv packet len=97 mask=07edcffd6d sample=a6b296d6b1c280f362bcba15cd0105ad I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt rx pkn=1 dcid=0x4b1883d78e5a879a6d45f0aa29e88cc7783f scid=0x version=0x00000001 type=Handshake len=70 I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 1 Handshake ACK(0x03) largest_ack=641664678 ack_delay=0(0) ack_range_count=0 I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 1 Handshake ACK(0x03) range=[641664678..641664678] len=0 I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 1 Handshake ACK(0x03) ect0=1 ect1=0 ce=0 I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc latest_rtt=32 min_rtt=32 smoothed_rtt=32 rttvar=16 ack_delay=0 I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con path is ECN capable I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f cca bbr update min_rtt=32390678 I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177211938567 timeout=64 I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 1 Handshake CRYPTO(0x06) offset=0 len=36 Ordered CRYPTO data in Handshake crypto level 00000000 14 00 00 20 1d 68 fd 6b e4 f3 a2 08 0a 56 c6 d3 |... .h.k.....V..| 00000010 dc d0 fb 9d fc b5 01 4f 11 2a 29 63 86 fd e0 f2 |.......O.*)c....| 00000020 d1 dc 08 f9 |....| 00000024 I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt read packet 97 left 0 I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con processing buffered handshake packet I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con discarding Initial packet number space I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177237938567 timeout=90 QUIC handshake has completed Negotiated cipher suite is TLS13-AES128-GCM-SHA256 Negotiated ALPN is hq-interop I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con processing buffered protected packet I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con discarding Handshake packet number space I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177237938567 timeout=90 I00000033 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177237938567 timeout=90 Set timer=0.090459s application_traffic rx secret 1 + secret=3478363c5d48fb4fa4a12981010abacc9046e3f629863c840f515f319632c62e + key=ee05575d491b5dcf4acb6ae657309eb4 + iv=c1acf494e1d978e8b5c74967 application_traffic tx secret 1 + secret=9f7a41dce5d657509d015881b1c3bfb07e2a720fbe44a0c2a100646e82f7965a + key=76325dc7fcc4b6cf0c8efde8fe24cc16 + iv=3c8ff206652e05b573221bf1 I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con sending PMTUD probe packet len=1406 I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt tx pkn=641664679 dcid=0x type=1RTT k=0 I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664679 1RTT PING(0x01) I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664679 1RTT PADDING(0x00) len=1384 mask=db65f9d690 sample=c39fcb3eaa7ca6b8c632fe25b212240f I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177270671506 timeout=123 I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt tx pkn=641664680 dcid=0x type=1RTT k=0 I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664680 1RTT HANDSHAKE_DONE(0x1e) I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664680 1RTT NEW_TOKEN(0x07) token=0x36e1d6ab0263df56a3bfc2dace028260a098052f4031faa51ede66caf8ee866b7d34c8e14ae32936d1 len=41 I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664680 1RTT CRYPTO(0x06) offset=0 len=237 I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664680 1RTT PADDING(0x00) len=894 mask=055313df53 sample=84eac830e1df55788d349e0d7f7ba39f I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177270671506 timeout=123 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 ecn=0x2 1406 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 ecn=0x2 1200 bytes Timer has already expired: 0.000401s Timer expired Set timer=0.122708s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 if=eth0 ecn=0x0 1252 bytes I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con recv packet len=1252 mask=3f97756125 sample=f25da144f0518cddbf14a05ad90e94d9 I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt rx pkn=2 dcid=0x4b1883d78e5a879a6d45f0aa29e88cc7783f type=1RTT k=0 I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 2 1RTT PING(0x01) I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 2 1RTT PADDING(0x00) len=1212 I00000034 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt read packet 1252 left 0 Set timer=0.003985s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 if=eth0 ecn=0x0 54 bytes I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con recv packet len=54 mask=48a6f6ab06 sample=41af151011f3ebad6702e87231732388 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt rx pkn=3 dcid=0x4b1883d78e5a879a6d45f0aa29e88cc7783f type=1RTT k=0 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 3 1RTT ACK(0x03) largest_ack=641664678 ack_delay=0(0) ack_range_count=0 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 3 1RTT ACK(0x03) range=[641664678..641664678] len=0 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 3 1RTT ACK(0x03) ect0=1 ect1=0 ce=0 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc latest_rtt=33 min_rtt=32 smoothed_rtt=32 rttvar=12 ack_delay=0 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177255747861 timeout=107 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 3 1RTT STREAM(0x0a) id=0x0 fin=0 offset=0 len=0 uni=0 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt read packet 54 left 0 Set timer=0.003865s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 if=eth0 ecn=0x0 60 bytes I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con recv packet len=60 mask=4cca2bb108 sample=1e93245330eadb36b3dc5ec8dc04f2df I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt rx pkn=4 dcid=0x4b1883d78e5a879a6d45f0aa29e88cc7783f type=1RTT k=0 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 4 1RTT STREAM(0x0b) id=0x0 fin=1 offset=0 len=17 uni=0 Ordered STREAM data stream_id=0x0 00000000 47 45 54 20 2f 75 6f 65 78 6a 6f 74 7a 75 6d 0d |GET /uoexjotzum.| 00000010 0a |.| 00000011 http: stream 0x0 submit response headers [:status: 200] I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt read packet 60 left 0 Set timer=0.003743s I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt tx pkn=641664681 dcid=0x type=1RTT k=0 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664681 1RTT ACK(0x02) largest_ack=4 ack_delay=0(10) ack_range_count=0 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664681 1RTT ACK(0x02) range=[4..2] len=2 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664681 1RTT STREAM(0x0b) id=0x0 fin=1 offset=0 len=1024 uni=0 I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664681 1RTT PADDING(0x00) len=149 mask=94f3170ba6 sample=755fa6ef07a6e35bb27b2fa9f643e26a I00000035 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177256747621 timeout=108 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 ecn=0x2 1200 bytes Timer has already expired: 0.000088s Timer expired Set timer=0.108117s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 if=eth0 ecn=0x0 50 bytes I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con recv packet len=50 mask=942eef3f10 sample=d5f99226abe32baa2986c43186ced041 I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt rx pkn=5 dcid=0x4b1883d78e5a879a6d45f0aa29e88cc7783f type=1RTT k=0 I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 5 1RTT ACK(0x03) largest_ack=641664680 ack_delay=0(0) ack_range_count=0 I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 5 1RTT ACK(0x03) range=[641664680..641664678] len=2 I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 5 1RTT ACK(0x03) ect0=3 ect1=0 ce=0 I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc latest_rtt=32 min_rtt=32 smoothed_rtt=32 rttvar=9 ack_delay=0 I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177244733633 timeout=64 I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt read packet 50 left 0 Set timer=0.064287s I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con sending PMTUD probe packet len=1444 I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt tx pkn=641664682 dcid=0x type=1RTT k=0 I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664682 1RTT PING(0x01) I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm tx 641664682 1RTT PADDING(0x00) len=1425 mask=998115743d sample=f42ca3b1a953b6aefa122d22375125b3 I00000067 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177276696499 timeout=96 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 ecn=0x2 1444 bytes Timer has already expired: 0.000072s Timer expired Set timer=0.096113s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 if=eth0 ecn=0x0 1332 bytes I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con recv packet len=1332 mask=43e7be39d0 sample=1559464a08b3c617e5c08a11737890de I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt rx pkn=6 dcid=0x4b1883d78e5a879a6d45f0aa29e88cc7783f type=1RTT k=0 I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 6 1RTT PING(0x01) I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 6 1RTT PADDING(0x00) len=1292 I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt read packet 1332 left 0 Set timer=0.004036s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:55960 if=eth0 ecn=0x0 53 bytes I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f con recv packet len=53 mask=81915c7f43 sample=01e1ed0ccd3f4f0cc91da832e831714b I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f pkt rx pkn=7 dcid=0x4b1883d78e5a879a6d45f0aa29e88cc7783f type=1RTT k=0 I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 7 1RTT ACK(0x03) largest_ack=641664681 ack_delay=0(0) ack_range_count=0 I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 7 1RTT ACK(0x03) range=[641664681..641664679] len=2 I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 7 1RTT ACK(0x03) ect0=4 ect1=0 ce=0 I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc latest_rtt=33 min_rtt=32 smoothed_rtt=32 rttvar=7 ack_delay=0 QUIC stream 0 closed HTTP stream 0 closed with error code 0 I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f ldc loss_detection_timer=177268803981 timeout=86 I00000069 0x4b1883d78e5a879a6d45f0aa29e88cc7783f frm rx 7 1RTT CONNECTION_CLOSE(0x1d) error_code=(unknown)(0x0) frame_type=0 reason_len=0 reason=[] ngtcp2_conn_read_pkt: ERR_DRAINING Draining period has started (0.265026 seconds) Draining Period is over 0x4b1883d78e5a879a6d45f0aa29e88cc7783f Closing QUIC connection