Using document root /www/ Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36491 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36491 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36491 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36491 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36491 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36491 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:36108 if=eth0 ecn=0x1 1252 bytes I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cca bbr enter Startup I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 con next skip pkn=119605040 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 con recv packet len=1252 mask=48084a7bf4 sample=af3ebcf0cb18af24466efa1253b10639 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt rx pkn=130059 dcid=0xb184f8cc111386aa scid=0xc833e5fef699995d version=0x00000001 type=Initial len=1226 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 130059 Initial PING(0x01) I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 130059 Initial CRYPTO(0x06) offset=0 len=285 Ordered CRYPTO data in Initial crypto level 00000000 01 00 01 19 03 03 9d d1 59 7c 14 0e c7 58 1d d7 |........Y|...X..| 00000010 dd db 43 ec 94 d7 0f bf 50 a7 1a e9 43 ea 7e 5d |..C.....P...C.~]| 00000020 1d 78 d5 c9 8f 62 00 00 06 13 01 13 02 13 03 01 |.x...b..........| 00000030 00 00 ea 00 33 00 47 00 45 00 17 00 41 04 27 7f |....3.G.E...A.'.| 00000040 d0 0f 8d 14 11 9e 98 43 1f 7c ba eb 37 0e 83 8f |.......C.|..7...| 00000050 9c 3f b9 b0 cd c0 77 36 e0 e6 f6 56 d3 b0 c0 0a |.?....w6...V....| 00000060 22 da 1c 03 b9 40 19 d8 96 bf 6f f5 79 8f c0 6c |"....@....o.y..l| 00000070 f1 c6 9a 01 56 94 95 44 88 8f 7f ac dc f8 00 00 |....V..D........| 00000080 00 0c 00 0a 00 00 07 73 65 72 76 65 72 34 00 10 |.......server4..| 00000090 00 0d 00 0b 0a 68 71 2d 69 6e 74 65 72 6f 70 00 |.....hq-interop.| 000000a0 2b 00 03 02 03 04 00 0d 00 0a 00 08 08 04 04 03 |+...............| 000000b0 04 01 02 01 00 0a 00 06 00 04 00 17 00 1d 00 39 |...............9| 000000c0 00 55 05 04 80 20 00 00 04 04 80 10 00 00 08 02 |.U... ..........| 000000d0 42 00 01 04 80 02 bf 20 03 02 45 a0 09 02 42 00 |B...... ..E...B.| 000000e0 06 04 80 01 00 63 07 04 80 00 ff ff 0e 01 08 0b |.....c..........| 000000f0 01 0a 0f 08 c8 33 e5 fe f6 99 99 5d 55 a9 04 80 |.....3.....]U...| 00000100 00 84 f8 c0 00 00 00 ff 04 de 1b 02 43 e8 80 00 |............C...| 00000110 71 58 01 03 6a b2 00 00 2d 00 02 01 01 |qX..j...-....| 0000011d I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 con the negotiated version is 0x00000001 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters initial_source_connection_id=0xc833e5fef699995d I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters initial_max_stream_data_bidi_local=2097152 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters initial_max_stream_data_bidi_remote=65635 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters initial_max_stream_data_uni=65535 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters initial_max_data=1048576 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters initial_max_streams_bidi=512 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters initial_max_streams_uni=512 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters max_idle_timeout=180000 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters max_udp_payload_size=1440 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters ack_delay_exponent=3 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters max_ack_delay=10 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters active_connection_id_limit=8 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters disable_active_migration=0 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters max_datagram_frame_size=0 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 cry remote transport_parameters grease_quic_bit=1 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 130059 Initial PADDING(0x00) len=916 I00000000 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt read packet 1252 left 0 Set timer=29.998976s I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt tx pkn=119604916 dcid=0xc833e5fef699995d scid=0x56e3971ddf80ad4022485fa57b5a444c1893 version=0x00000001 type=Initial len=0 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604916 Initial ACK(0x03) largest_ack=130059 ack_delay=0(0) ack_range_count=0 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604916 Initial ACK(0x03) range=[130059..130059] len=0 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604916 Initial ACK(0x03) ect0=0 ect1=1 ce=0 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604916 Initial CRYPTO(0x06) offset=0 len=123 mask=bb6aeb0e37 sample=2342b61500a4766612fe624e74799fab I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161780425589 timeout=300 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt tx pkn=119604916 dcid=0xc833e5fef699995d scid=0x56e3971ddf80ad4022485fa57b5a444c1893 version=0x00000001 type=Handshake len=0 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604916 Handshake CRYPTO(0x06) offset=0 len=702 mask=ef57f22f06 sample=d28306b47bd76e27ba3bffe446bb225d I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161780425589 timeout=300 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt tx pkn=119604916 dcid=0xc833e5fef699995d type=1RTT k=0 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604916 1RTT NEW_CONNECTION_ID(0x18) seq=7 cid=0xc8180c580f5d1a32984dc76043124590046c retire_prior_to=0 stateless_reset_token=0x0cfb8e47e95993a60e1e7f66d0da8fa9 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604916 1RTT NEW_CONNECTION_ID(0x18) seq=6 cid=0x20353eb5dfb940018eea4185a079db6e62cf retire_prior_to=0 stateless_reset_token=0xce6561a99c217099bbcd035c74adb77c I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604916 1RTT NEW_CONNECTION_ID(0x18) seq=5 cid=0xfcb1b3b1d3cb258d247f71c773a149b012b1 retire_prior_to=0 stateless_reset_token=0xc1152176db6fdb301a73b7ee3e037d6c I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604916 1RTT NEW_CONNECTION_ID(0x18) seq=4 cid=0x816f2bf66bee598b46b8980b4c4d63cd4504 retire_prior_to=0 stateless_reset_token=0x3f62c9ba85f998a3c886537fb215a3aa I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604916 1RTT NEW_CONNECTION_ID(0x18) seq=3 cid=0x28fa1703ad34797c69847665a6def9513d05 retire_prior_to=0 stateless_reset_token=0xfddef8ecd598252b24a1159985208b35 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604916 1RTT PADDING(0x00) len=22 mask=ed9785bdde sample=9b8c6d8c3a823b7d91d8cd78913c0ce3 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161780425589 timeout=300 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt tx pkn=119604917 dcid=0xc833e5fef699995d type=1RTT k=0 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604917 1RTT NEW_CONNECTION_ID(0x18) seq=2 cid=0x9373141f23765e1e210508f8c40685fb2c95 retire_prior_to=0 stateless_reset_token=0x62cbac2bd9e901a13e32d769a5f6fe2f I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604917 1RTT NEW_CONNECTION_ID(0x18) seq=1 cid=0x6973c83b5fe2b6d7ff42a8655d5e24dc3b29 retire_prior_to=0 stateless_reset_token=0xea5e154703d671fdf089c7b8e13d5115 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604917 1RTT PADDING(0x00) len=1095 mask=b1bdf8e59b sample=764a9692744b666f5bd428a1087323d5 I00000001 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161780425589 timeout=300 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:36108 ecn=0x2 2400 bytes Timer has already expired: 0.000312s Timer expired Set timer=0.299582s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:36108 if=eth0 ecn=0x1 416 bytes I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 con recv packet len=416 mask=f7de07fb8b sample=c6972ffa07a128410cfc63b2e965dfbc I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt rx pkn=0 dcid=0x56e3971ddf80ad4022485fa57b5a444c1893 scid=0xc833e5fef699995d version=0x00000001 type=Handshake len=70 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 Handshake ACK(0x03) largest_ack=119604916 ack_delay=0(0) ack_range_count=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 Handshake ACK(0x03) range=[119604916..119604916] len=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 Handshake ACK(0x03) ect0=1 ect1=0 ce=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc latest_rtt=32 min_rtt=32 smoothed_rtt=32 rttvar=16 ack_delay=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 con path is ECN capable I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 cca bbr update min_rtt=32539196 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161578043177 timeout=65 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 Handshake CRYPTO(0x06) offset=0 len=36 Ordered CRYPTO data in Handshake crypto level 00000000 14 00 00 20 da 93 c8 a8 76 f3 24 05 1a b6 c0 0e |... ....v.$.....| 00000010 bf f2 0b 94 0c 9f b0 24 fb 40 05 ce 80 2a 0e b6 |.......$.@...*..| 00000020 bf 4c 3d f2 |.L=.| 00000024 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt read packet 105 left 311 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 con processing buffered handshake packet I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 con discarding Initial packet number space I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161588043177 timeout=75 QUIC handshake has completed Negotiated cipher suite is TLS13-AES128-GCM-SHA256 Negotiated ALPN is hq-interop I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 con processing buffered protected packet I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 con discarding Handshake packet number space I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161588043177 timeout=75 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161588043177 timeout=75 mask=55f06fdf43 sample=2996efa98a3b4a888a33fa329aa72db4 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt rx pkn=0 dcid=0x56e3971ddf80ad4022485fa57b5a444c1893 type=1RTT k=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 1RTT ACK(0x03) largest_ack=119604916 ack_delay=0(42) ack_range_count=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 1RTT ACK(0x03) range=[119604916..119604916] len=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 1RTT ACK(0x03) ect0=1 ect1=0 ce=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc latest_rtt=32 min_rtt=32 smoothed_rtt=32 rttvar=12 ack_delay=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161571773577 timeout=58 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 1RTT NEW_CONNECTION_ID(0x18) seq=1 cid=0xc71252fd7f1e469a retire_prior_to=0 stateless_reset_token=0x1476e5de0b5e4bfd8ca3e879004c8e59 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 1RTT NEW_CONNECTION_ID(0x18) seq=2 cid=0x868c8e210b44a93d retire_prior_to=0 stateless_reset_token=0x91146524e6da04a5cf3e7a34eb330971 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 1RTT NEW_CONNECTION_ID(0x18) seq=3 cid=0xf767fe27766a490b retire_prior_to=0 stateless_reset_token=0xd5634f49b20b455896ea98d16884a40f I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 1RTT NEW_CONNECTION_ID(0x18) seq=4 cid=0xcb29edcb2d4fc9a7 retire_prior_to=0 stateless_reset_token=0xd00fa90173258e532fd6b6e2d17945f6 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 1RTT NEW_CONNECTION_ID(0x18) seq=5 cid=0xa319df970171f17e retire_prior_to=0 stateless_reset_token=0x7330e7d5ae4bdfad9897d977ba8027c7 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 1RTT NEW_CONNECTION_ID(0x18) seq=6 cid=0x68b4a77be639b77f retire_prior_to=0 stateless_reset_token=0x164b3acb789868608190d46a1b4103e3 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 0 1RTT PADDING(0x00) len=96 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt read packet 311 left 0 Set timer=0.003535s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:36108 if=eth0 ecn=0x1 183 bytes I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 con recv packet len=183 application_traffic rx secret 1 + secret=0af87ed85d3d61e6b152c8a853e2ed96164e53d7f3a8064a808a8858096f725a + key=7817febbafe072d913aef91145b727e7 + iv=fee99b594b42c98dc1b3c70b application_traffic tx secret 1 + secret=40bfaa87ef24496b3cd3cff9198074b11d6b8aa089886f5db891fef8a2d1b25e + key=ef8deeca53e6facd48f9b0cb2d2c3718 + iv=f62cfb6ae0e455bf622dea4a mask=d7afc562be sample=8457ebe4f6edc18d3269110d9be34ee7 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt rx pkn=1 dcid=0x56e3971ddf80ad4022485fa57b5a444c1893 type=1RTT k=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 1 1RTT STREAM(0x0b) id=0x0 fin=1 offset=0 len=17 uni=0 Ordered STREAM data stream_id=0x0 00000000 47 45 54 20 2f 6f 6e 70 74 71 6b 61 77 69 61 0d |GET /onptqkawia.| 00000010 0a |.| 00000011 http: stream 0x0 submit response headers [:status: 200] I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 1 1RTT PADDING(0x00) len=127 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt read packet 183 left 0 Set timer=0.003190s I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 con sending PMTUD probe packet len=1406 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt tx pkn=119604918 dcid=0xc833e5fef699995d type=1RTT k=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604918 1RTT PING(0x01) I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604918 1RTT PADDING(0x00) len=1379 mask=3245b7b717 sample=c350ad62d79471b97f4eac8246ae5a1c I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161605209252 timeout=91 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt tx pkn=119604919 dcid=0xc833e5fef699995d type=1RTT k=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604919 1RTT ACK(0x03) largest_ack=1 ack_delay=0(36) ack_range_count=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604919 1RTT ACK(0x03) range=[1..0] len=1 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604919 1RTT ACK(0x03) ect0=0 ect1=2 ce=0 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604919 1RTT HANDSHAKE_DONE(0x1e) I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604919 1RTT NEW_TOKEN(0x07) token=0x36c10ae956cada45b539688642e326820b8799dd1a04a1dbb0eb8195c198911e6e93627ff535a6d684 len=41 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604919 1RTT CRYPTO(0x06) offset=0 len=237 I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604919 1RTT STREAM(0x0a) id=0x0 fin=0 offset=0 len=877 uni=0 mask=7a611dbeb9 sample=c34121e5f36eb7cdf66f45dfe1b8e13a I00000034 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161605209252 timeout=91 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:36108 ecn=0x2 1406 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:36108 ecn=0x2 1200 bytes Timer has already expired: 0.000246s Timer expired I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt tx pkn=119604920 dcid=0xc833e5fef699995d type=1RTT k=0 I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604920 1RTT STREAM(0x0f) id=0x0 fin=1 offset=877 len=147 uni=0 I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 frm tx 119604920 1RTT PADDING(0x00) len=1021 mask=9870a238dd sample=6598efea06b8add4b05ea8e58325ea3d I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161605513258 timeout=91 Sent packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:36108 ecn=0x2 1200 bytes Timer has already expired: 0.000080s Timer expired Set timer=0.090918s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:36108 if=eth0 ecn=0x1 55 bytes I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 con recv packet len=55 mask=45809c1a29 sample=cec892580478d61bbdb5f2a9210df66c I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt rx pkn=2 dcid=0x56e3971ddf80ad4022485fa57b5a444c1893 type=1RTT k=0 I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 2 1RTT ACK(0x03) largest_ack=119604917 ack_delay=1(132) ack_range_count=0 I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 2 1RTT ACK(0x03) range=[119604917..119604916] len=1 I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 2 1RTT ACK(0x03) ect0=2 ect1=0 ce=0 I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc latest_rtt=33 min_rtt=32 smoothed_rtt=32 rttvar=9 ack_delay=1 I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161593678140 timeout=79 I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 2 1RTT PADDING(0x00) len=7 I00000035 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt read packet 55 left 0 Set timer=0.079281s Set timer=0.079266s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:36108 if=eth0 ecn=0x1 55 bytes I00000067 0x56e3971ddf80ad4022485fa57b5a444c1893 con recv packet len=55 mask=1de3e4ed03 sample=900d076bdbb14cf079f6a54ecfcf716b I00000067 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt rx pkn=3 dcid=0x56e3971ddf80ad4022485fa57b5a444c1893 type=1RTT k=0 I00000067 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 3 1RTT ACK(0x03) largest_ack=119604919 ack_delay=0(10) ack_range_count=0 I00000067 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 3 1RTT ACK(0x03) range=[119604919..119604917] len=2 I00000067 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 3 1RTT ACK(0x03) ect0=4 ect1=0 ce=0 I00000067 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc latest_rtt=32 min_rtt=32 smoothed_rtt=32 rttvar=6 ack_delay=0 I00000067 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss_detection_timer=161584616154 timeout=37 I00000067 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 3 1RTT PADDING(0x00) len=8 I00000067 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt read packet 55 left 0 Set timer=0.037874s Set timer=0.037851s Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:36108 if=eth0 ecn=0x1 50 bytes I00000068 0x56e3971ddf80ad4022485fa57b5a444c1893 con recv packet len=50 mask=910f7b3d04 sample=28905bce0946441b53a84984cce0b697 I00000068 0x56e3971ddf80ad4022485fa57b5a444c1893 pkt rx pkn=4 dcid=0x56e3971ddf80ad4022485fa57b5a444c1893 type=1RTT k=0 I00000068 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 4 1RTT ACK(0x03) largest_ack=119604920 ack_delay=0(6) ack_range_count=0 I00000068 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 4 1RTT ACK(0x03) range=[119604920..119604917] len=3 I00000068 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 4 1RTT ACK(0x03) ect0=5 ect1=0 ce=0 I00000068 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc latest_rtt=33 min_rtt=32 smoothed_rtt=32 rttvar=5 ack_delay=0 QUIC stream 0 closed HTTP stream 0 closed with error code 0 I00000068 0x56e3971ddf80ad4022485fa57b5a444c1893 ldc loss detection timer canceled I00000068 0x56e3971ddf80ad4022485fa57b5a444c1893 frm rx 4 1RTT CONNECTION_CLOSE(0x1d) error_code=(unknown)(0x0) frame_type=0 reason_len=0 reason=[] ngtcp2_conn_read_pkt: ERR_DRAINING Draining period has started (0.193031 seconds) Draining Period is over 0x56e3971ddf80ad4022485fa57b5a444c1893 Closing QUIC connection