e1ae1d3484af60fa: No root crt list specified -- certificate will not be verified. e1ae1d3484af60fa: Sending ALPN list (1): hq-interop e1ae1d3484af60fa: Sending transport parameter TLS extension (85 bytes): e1ae1d3484af60fa: Extension list (85 bytes): e1ae1d3484af60fa: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 e1ae1d3484af60fa: Extension type: 4 (initial_max_data), length 4, 80100000 e1ae1d3484af60fa: Extension type: 8 (max_streams_bidi), length 2, 4200 e1ae1d3484af60fa: Extension type: 1 (idle_timeout), length 4, 8002bf20 e1ae1d3484af60fa: Extension type: 3 (max_packet_size), length 2, 45a0 e1ae1d3484af60fa: Extension type: 9 (max_streams_uni), length 2, 4200 e1ae1d3484af60fa: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 e1ae1d3484af60fa: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff e1ae1d3484af60fa: Extension type: 14 (active_connection_id_limit), length 1, 08 e1ae1d3484af60fa: Extension type: 11 (max_ack_delay), length 1, 0a e1ae1d3484af60fa: Extension type: 15 (hcid), length 8, 3c3246b7b05eccd9 e1ae1d3484af60fa: Extension type: 7033 (unknown), length 4, 8000ae1d e1ae1d3484af60fa: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 e1ae1d3484af60fa: Extension type: 29016 (enable_time_stamp), length 1, 03 e1ae1d3484af60fa: Extension type: 10930 (grease_quic_bit), length 0 e1ae1d3484af60fa: Preparing GET on stream 0 for /polar-minuscule-diary e1ae1d3484af60fa: Sending packet type: 2 (initial), S0, Q1, Version 1, e1ae1d3484af60fa: , <3c3246b7b05eccd9>, Seq: 99282, pl: 572 e1ae1d3484af60fa: Token length: 41, Token: 3637eab88cd15191c70eb2bad4ded749... e1ae1d3484af60fa: Prepared 552 bytes e1ae1d3484af60fa: ping, 1 bytes e1ae1d3484af60fa: crypto_hs, offset 0, length 547: 0100021f030389ce... e1ae1d3484af60fa: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, e1ae1d3484af60fa: , <3c3246b7b05eccd9>, Seq: 0, pl: 588 e1ae1d3484af60fa: Prepared 568 bytes e1ae1d3484af60fa: stream 0, offset 0, length 28, fin = 1: 474554202f706f6c... e1ae1d3484af60fa: padding, 537 bytes e1ae1d3484af60fa: Sending 1252 bytes to 193.167.100.100:443 at T=0.001899 (2ba4ab56) e1ae1d3484af60fa: T= 0.252194, Lost packet type 2, number 99282, size 623, DCID <>, reason: timer e1ae1d3484af60fa: Sending packet type: 2 (initial), S0, Q1, Version 1, e1ae1d3484af60fa: , <3c3246b7b05eccd9>, Seq: 99283, pl: 572 e1ae1d3484af60fa: Token length: 41, Token: 3637eab88cd15191c70eb2bad4ded749... e1ae1d3484af60fa: Prepared 552 bytes e1ae1d3484af60fa: ping, 1 bytes e1ae1d3484af60fa: crypto_hs, offset 0, length 547: 0100021f030389ce... e1ae1d3484af60fa: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, e1ae1d3484af60fa: , <3c3246b7b05eccd9>, Seq: 1, pl: 588 e1ae1d3484af60fa: Prepared 568 bytes e1ae1d3484af60fa: padding, 568 bytes e1ae1d3484af60fa: Sending 1252 bytes to 193.167.100.100:443 at T=0.252194 (2ba87d0d) e1ae1d3484af60fa: Receiving 1200 bytes from 193.167.100.100:443 at T=0.587459 (2bad9aae) e1ae1d3484af60fa: Receiving packet type: 2 (initial), S0, Q1, Version 1, e1ae1d3484af60fa: <3c3246b7b05eccd9>, , Seq: 290746886, pl: 153 e1ae1d3484af60fa: Token length: 0 e1ae1d3484af60fa: Decrypted 133 bytes e1ae1d3484af60fa: crypto_hs, offset 0, length 129: 0200007d03031855... e1ae1d3484af60fa: Receiving packet type: 4 (handshake), S0, Q1, Version 1, e1ae1d3484af60fa: <3c3246b7b05eccd9>, , Seq: 290746886, pl: 183 e1ae1d3484af60fa: Decrypted 163 bytes e1ae1d3484af60fa: crypto_hs, offset 0, length 159: 0800007700750039... e1ae1d3484af60fa: Received transport parameter TLS extension (92 bytes): e1ae1d3484af60fa: Extension list (92 bytes): e1ae1d3484af60fa: Extension type: 0 (ocid), length 8, e1ae1d3484af60fa e1ae1d3484af60fa: Extension type: 2 (stateless_reset_token), length 16, 316e152e8242bcdb00c6f354a88aed27 e1ae1d3484af60fa: Extension type: 15 (hcid), length 18, db8d84e908009fe77a8f374666e08270392f e1ae1d3484af60fa: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80040000 e1ae1d3484af60fa: Extension type: 7 (max_stream_data_uni), length 4, 80040000 e1ae1d3484af60fa: Extension type: 4 (initial_max_data), length 4, 80100000 e1ae1d3484af60fa: Extension type: 8 (max_streams_bidi), length 2, 4064 e1ae1d3484af60fa: Extension type: 1 (idle_timeout), length 4, 8002bf20 e1ae1d3484af60fa: Extension type: 14 (active_connection_id_limit), length 1, 07 e1ae1d3484af60fa: Extension type: 10930 (grease_quic_bit), length 0 e1ae1d3484af60fa: Extension type: 17 (version_negotiation), length 8, 0000000100000001 e1ae1d3484af60fa: Receiving packet type: 6 (1rtt protected), S0, Q1, e1ae1d3484af60fa: <3c3246b7b05eccd9>, Seq: 290746886 (290746886), Phi: 0, e1ae1d3484af60fa: Decrypted 760 bytes e1ae1d3484af60fa: padding, 760 bytes e1ae1d3484af60fa: T= 0.587459, cwin: 15360,flight: 1865,nb_ret: 1,rtt_min: 0,rtt: 250000,rtt_var: 0,max_ack_delay: 0,state: 10 e1ae1d3484af60fa: The session was properly resumed! e1ae1d3484af60fa: Zero RTT data is accepted! e1ae1d3484af60fa: Negotiated ALPN: hq-interop e1ae1d3484af60fa: Sending packet type: 4 (handshake), S0, Q0, Version 1, e1ae1d3484af60fa: , <3c3246b7b05eccd9>, Seq: 0, pl: 70 e1ae1d3484af60fa: Prepared 50 bytes e1ae1d3484af60fa: ack_ecn (nb=0), 290746886, ect0=1, ect1=0, ce=0 e1ae1d3484af60fa: crypto_hs, offset 0, length 36: 1400002075a22784... e1ae1d3484af60fa: Sending packet type: 6 (1rtt protected), S1, Q1, e1ae1d3484af60fa: , Seq: 2 (2), Phi: 0, e1ae1d3484af60fa: Prepared 275 bytes e1ae1d3484af60fa: ack_ecn (nb=0), 290746886, ect0=1, ect1=0, ce=0 e1ae1d3484af60fa: new_connection_id[1]: 0x88b49cf0c507f3a4, e6d0ace8c640f7db715ea6405831fd20 e1ae1d3484af60fa: new_connection_id[2]: 0xdc49088ea118bccc, a98309ddc27d7d5e0163d0e0b28a6b5d e1ae1d3484af60fa: new_connection_id[3]: 0xf5d2dce70d9fc1d1, 9d7408f9305f1d2ba8960ae2338a65e6 e1ae1d3484af60fa: new_connection_id[4]: 0xd7f6b4c21da700a4, 4270dc19fdf19a7896cbfb6844712a54 e1ae1d3484af60fa: new_connection_id[5]: 0x81fcba54dedabb0a, 2935592861f985ec6c6bdb4f878470e1 e1ae1d3484af60fa: new_connection_id[6]: 0x5a04cc09de845b54, 057284578f10f868ffbc20ee8fd86b1f e1ae1d3484af60fa: padding, 96 bytes e1ae1d3484af60fa: T= 0.587934, cwin: 15360,flight: 1642,nb_ret: 1,rtt_min: 0,rtt: 250000,rtt_var: 0,max_ack_delay: 0,state: 13 e1ae1d3484af60fa: Sending 416 bytes to 193.167.100.100:443 at T=0.587934 (2bad9c89) e1ae1d3484af60fa: Connection established. Version = 1, I-CID: e1ae1d3484af60fa, verified: 1 e1ae1d3484af60fa: Receiving 1406 bytes from 193.167.100.100:443 at T=0.620749 (2bae1cb8) e1ae1d3484af60fa: Receiving packet type: 6 (1rtt protected), S0, Q1, e1ae1d3484af60fa: <3c3246b7b05eccd9>, Seq: 7 (290746887), Phi: 0, e1ae1d3484af60fa: Decrypted 1380 bytes e1ae1d3484af60fa: ping, 1 bytes e1ae1d3484af60fa: padding, 1379 bytes e1ae1d3484af60fa: T= 0.620749, cwin: 15360,flight: 1642,nb_ret: 1,rtt_min: 0,rtt: 250000,rtt_var: 0,max_ack_delay: 0,state: 13 e1ae1d3484af60fa: Sending packet type: 6 (1rtt protected), S1, Q0, e1ae1d3484af60fa: , Seq: 3 (3), Phi: 0, e1ae1d3484af60fa: Prepared 19 bytes e1ae1d3484af60fa: ack_ecn (nb=0), 290746886-290746887, ect0=2, ect1=0, ce=0 e1ae1d3484af60fa: padding, 7 bytes e1ae1d3484af60fa: T= 0.621820, cwin: 15360,flight: 1697,nb_ret: 1,rtt_min: 0,rtt: 250000,rtt_var: 0,max_ack_delay: 0,state: 13 e1ae1d3484af60fa: Sending 55 bytes to 193.167.100.100:443 at T=0.621820 (2bae20e7) e1ae1d3484af60fa: Receiving 40 bytes from 193.167.100.100:443 at T=0.623939 (2bae292e) e1ae1d3484af60fa: Receiving packet type: 6 (1rtt protected), S0, Q1, e1ae1d3484af60fa: <3c3246b7b05eccd9>, Seq: 9 (290746889), Phi: 0, e1ae1d3484af60fa: Decrypted 14 bytes e1ae1d3484af60fa: ack_ecn (nb=0), 1-2, ect0=0, ect1=2, ce=0 e1ae1d3484af60fa: padding, 5 bytes e1ae1d3484af60fa: T= 0.623939, Lost packet type 5, number 0, size 597, DCID , reason: repeat e1ae1d3484af60fa: T= 0.623939, cwin: 16252,flight: 55,nb_ret: 2,rtt_min: 36005,rtt: 36005,rtt_var: 18002,max_ack_delay: 0,state: 14 e1ae1d3484af60fa: Sending packet type: 6 (1rtt protected), S1, Q1, e1ae1d3484af60fa: , Seq: 4 (4), Phi: 0, e1ae1d3484af60fa: Prepared 147 bytes e1ae1d3484af60fa: stream 0, offset 0, length 28, fin = 1: 474554202f706f6c... e1ae1d3484af60fa: padding, 116 bytes e1ae1d3484af60fa: T= 0.629246, cwin: 16252,flight: 238,nb_ret: 2,rtt_min: 36005,rtt: 36005,rtt_var: 18002,max_ack_delay: 0,state: 14 e1ae1d3484af60fa: Sending 183 bytes to 193.167.100.100:443 at T=0.629246 (2bae3de9) e1ae1d3484af60fa: Receiving 1200 bytes from 193.167.100.100:443 at T=0.661232 (2baebadb) e1ae1d3484af60fa: Receiving packet type: 6 (1rtt protected), S0, Q1, e1ae1d3484af60fa: <3c3246b7b05eccd9>, Seq: 10 (290746890), Phi: 0, e1ae1d3484af60fa: Decrypted 1174 bytes e1ae1d3484af60fa: ack_ecn (nb=1), 4, 1-2, ect0=0, ect1=3, ce=0 e1ae1d3484af60fa: stream 0, offset 0, length 1024, fin = 1: a8b3d7804bf39712... e1ae1d3484af60fa: padding, 136 bytes e1ae1d3484af60fa: T= 0.661232, cwin: 16419,flight: 55,nb_ret: 2,rtt_min: 31986,rtt: 35502,rtt_var: 14506,max_ack_delay: 0,state: 14 e1ae1d3484af60fa: All done, Closing the connection. e1ae1d3484af60fa: Sending packet type: 6 (1rtt protected), S1, Q0, e1ae1d3484af60fa: , Seq: 5 (5), Phi: 0, e1ae1d3484af60fa: Prepared 16 bytes e1ae1d3484af60fa: ack_ecn (nb=1), 290746889-290746890, 290746887, ect0=4, ect1=0, ce=0 e1ae1d3484af60fa: application_close, Error 0x0000, Reason length 0 e1ae1d3484af60fa: Sending 52 bytes to 193.167.100.100:443 at T=0.661419 (2baebb96) e1ae1d3484af60fa: Out of 2 zero RTT packets, 1 were acked by the server. e1ae1d3484af60fa: Received 1024 bytes in 0.973956 seconds, 0.008411 Mbps. e1ae1d3484af60fa: Sent 28 bytes in 0.973956 seconds, 0.000230 Mbps.