30fc1768e66ada3d: No root crt list specified -- certificate will not be verified. 30fc1768e66ada3d: Sending ALPN list (1): hq-interop 30fc1768e66ada3d: Sending transport parameter TLS extension (85 bytes): 30fc1768e66ada3d: Extension list (85 bytes): 30fc1768e66ada3d: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 30fc1768e66ada3d: Extension type: 4 (initial_max_data), length 4, 80100000 30fc1768e66ada3d: Extension type: 8 (max_streams_bidi), length 2, 4200 30fc1768e66ada3d: Extension type: 1 (idle_timeout), length 4, 8002bf20 30fc1768e66ada3d: Extension type: 3 (max_packet_size), length 2, 45a0 30fc1768e66ada3d: Extension type: 9 (max_streams_uni), length 2, 4200 30fc1768e66ada3d: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 30fc1768e66ada3d: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 30fc1768e66ada3d: Extension type: 14 (active_connection_id_limit), length 1, 08 30fc1768e66ada3d: Extension type: 11 (max_ack_delay), length 1, 0a 30fc1768e66ada3d: Extension type: 15 (hcid), length 8, db8b001021b4d3b9 30fc1768e66ada3d: Extension type: 1546 (unknown), length 4, 8000fc17 30fc1768e66ada3d: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 30fc1768e66ada3d: Extension type: 29016 (enable_time_stamp), length 1, 03 30fc1768e66ada3d: Extension type: 10930 (grease_quic_bit), length 0 30fc1768e66ada3d: Preparing GET on stream 0 for /kpttnstvzn 30fc1768e66ada3d: Sending packet type: 2 (initial), S0, Q1, Version 1, 30fc1768e66ada3d: <30fc1768e66ada3d>, , Seq: 122065, pl: 572 30fc1768e66ada3d: Token length: 0 30fc1768e66ada3d: Prepared 552 bytes 30fc1768e66ada3d: ping, 1 bytes 30fc1768e66ada3d: crypto_hs, offset 0, length 547: 0100021f03035253... 30fc1768e66ada3d: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 30fc1768e66ada3d: <30fc1768e66ada3d>, , Seq: 0, pl: 629 30fc1768e66ada3d: Prepared 609 bytes 30fc1768e66ada3d: stream 0, offset 0, length 17, fin = 1: 474554202f6b7074... 30fc1768e66ada3d: padding, 589 bytes 30fc1768e66ada3d: Sending 1252 bytes to 193.167.100.100:443 at T=0.001832 (188990f8) 30fc1768e66ada3d: T= 0.252127, Lost packet type 2, number 122065, size 582, DCID <>, reason: timer 30fc1768e66ada3d: Sending packet type: 2 (initial), S0, Q1, Version 1, 30fc1768e66ada3d: <30fc1768e66ada3d>, , Seq: 122066, pl: 572 30fc1768e66ada3d: Token length: 0 30fc1768e66ada3d: Prepared 552 bytes 30fc1768e66ada3d: ping, 1 bytes 30fc1768e66ada3d: crypto_hs, offset 0, length 547: 0100021f03035253... 30fc1768e66ada3d: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 30fc1768e66ada3d: <30fc1768e66ada3d>, , Seq: 1, pl: 629 30fc1768e66ada3d: Prepared 609 bytes 30fc1768e66ada3d: padding, 609 bytes 30fc1768e66ada3d: Sending 1252 bytes to 193.167.100.100:443 at T=0.252127 (188d62af) 30fc1768e66ada3d: Receiving 1200 bytes from 193.167.100.100:443 at T=0.285001 (188de319) 30fc1768e66ada3d: Receiving packet type: 2 (initial), S0, Q1, Version 1, 30fc1768e66ada3d: , , Seq: 963864140, pl: 164 30fc1768e66ada3d: Token length: 0 30fc1768e66ada3d: Decrypted 144 bytes 30fc1768e66ada3d: ack_ecn (nb=0), 122065-122066, ect0=0, ect1=2, ce=0 30fc1768e66ada3d: crypto_hs, offset 0, length 129: 0200007d03039c9a... 30fc1768e66ada3d: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 30fc1768e66ada3d: , , Seq: 963864140, pl: 183 30fc1768e66ada3d: Decrypted 163 bytes 30fc1768e66ada3d: crypto_hs, offset 0, length 159: 0800007700750039... 30fc1768e66ada3d: Received transport parameter TLS extension (92 bytes): 30fc1768e66ada3d: Extension list (92 bytes): 30fc1768e66ada3d: Extension type: 0 (ocid), length 8, 30fc1768e66ada3d 30fc1768e66ada3d: Extension type: 2 (stateless_reset_token), length 16, d00a0daf05d10aad30f6d2c77fca2a94 30fc1768e66ada3d: Extension type: 15 (hcid), length 18, f48b367c8be378094430850a078257f7f139 30fc1768e66ada3d: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80040000 30fc1768e66ada3d: Extension type: 7 (max_stream_data_uni), length 4, 80040000 30fc1768e66ada3d: Extension type: 4 (initial_max_data), length 4, 80100000 30fc1768e66ada3d: Extension type: 8 (max_streams_bidi), length 2, 4064 30fc1768e66ada3d: Extension type: 1 (idle_timeout), length 4, 8002bf20 30fc1768e66ada3d: Extension type: 14 (active_connection_id_limit), length 1, 07 30fc1768e66ada3d: Extension type: 10930 (grease_quic_bit), length 0 30fc1768e66ada3d: Extension type: 17 (version_negotiation), length 8, 0000000100000001 30fc1768e66ada3d: Receiving packet type: 6 (1rtt protected), S0, Q1, 30fc1768e66ada3d: , Seq: 963864142 (963864142), Phi: 0, 30fc1768e66ada3d: Decrypted 749 bytes 30fc1768e66ada3d: ping, 1 bytes 30fc1768e66ada3d: padding, 748 bytes 30fc1768e66ada3d: T= 0.285001, cwin: 16524,flight: 1308,nb_ret: 1,rtt_min: 32874,rtt: 32874,rtt_var: 16437,max_ack_delay: 0,state: 10 30fc1768e66ada3d: The session was properly resumed! 30fc1768e66ada3d: Zero RTT data is accepted! 30fc1768e66ada3d: Negotiated ALPN: hq-interop 30fc1768e66ada3d: Sending packet type: 4 (handshake), S0, Q0, Version 1, 30fc1768e66ada3d: , , Seq: 0, pl: 70 30fc1768e66ada3d: Prepared 50 bytes 30fc1768e66ada3d: ack_ecn (nb=0), 963864140, ect0=1, ect1=0, ce=0 30fc1768e66ada3d: crypto_hs, offset 0, length 36: 1400002005a40b4e... 30fc1768e66ada3d: T= 0.285385, Lost packet type 5, number 0, size 638, DCID , reason: timer 30fc1768e66ada3d: Sending packet type: 6 (1rtt protected), S1, Q0, 30fc1768e66ada3d: , Seq: 2 (2), Phi: 0, 30fc1768e66ada3d: Prepared 275 bytes 30fc1768e66ada3d: ack_ecn (nb=0), 963864142, ect0=1, ect1=0, ce=0 30fc1768e66ada3d: new_connection_id[1]: 0x71b1797c820d20fa, 72a9d18c3cb38b2458d7d742efe19699 30fc1768e66ada3d: new_connection_id[2]: 0x981525671ca520e7, f7ab5702ada24d898c6cda6280c7b729 30fc1768e66ada3d: new_connection_id[3]: 0xfe1c4dc9d886dce9, c66a97e09204cdc3a1addbc2586f3791 30fc1768e66ada3d: new_connection_id[4]: 0xaa4cba566c8b2c21, 8d2e9bc620f77a0e55cd85c1763a360c 30fc1768e66ada3d: new_connection_id[5]: 0x0d5b2f01ba9f8f79, da730123c2f329616d45b49a05595d47 30fc1768e66ada3d: new_connection_id[6]: 0xa6270eb1238a59e7, a0fa8f4b245e83f4cd172b724fc86c55 30fc1768e66ada3d: stream 0, offset 0, length 17, fin = 1: 474554202f6b7074... 30fc1768e66ada3d: padding, 76 bytes 30fc1768e66ada3d: T= 0.285385, cwin: 16524,flight: 1070,nb_ret: 2,rtt_min: 32874,rtt: 32874,rtt_var: 16437,max_ack_delay: 0,state: 13 30fc1768e66ada3d: Sending 416 bytes to 193.167.100.100:443 at T=0.285385 (188de499) 30fc1768e66ada3d: Connection established. Version = 1, I-CID: 30fc1768e66ada3d, verified: 1 30fc1768e66ada3d: T= 0.367697, Lost packet type 4, number 0, size 89, DCID , reason: timer 30fc1768e66ada3d: Sending packet type: 4 (handshake), S0, Q0, Version 1, 30fc1768e66ada3d: , , Seq: 1, pl: 148 30fc1768e66ada3d: Prepared 128 bytes 30fc1768e66ada3d: crypto_hs, offset 0, length 36: 1400002005a40b4e... 30fc1768e66ada3d: ack_ecn (nb=0), 963864140, ect0=1, ect1=0, ce=0 30fc1768e66ada3d: padding, 77 bytes 30fc1768e66ada3d: T= 0.367697, cwin: 16524,flight: 1148,nb_ret: 3,rtt_min: 32874,rtt: 32874,rtt_var: 16437,max_ack_delay: 0,state: 13 30fc1768e66ada3d: Sending 183 bytes to 193.167.100.100:443 at T=0.367697 (188f2621) 30fc1768e66ada3d: Receiving 1406 bytes from 193.167.100.100:443 at T=0.400222 (188fa52e) 30fc1768e66ada3d: Receiving packet type: 6 (1rtt protected), S0, Q1, 30fc1768e66ada3d: , Seq: 963864143 (963864143), Phi: 0, 30fc1768e66ada3d: Decrypted 1377 bytes 30fc1768e66ada3d: ping, 1 bytes 30fc1768e66ada3d: padding, 1376 bytes 30fc1768e66ada3d: T= 0.400222, cwin: 16524,flight: 1148,nb_ret: 3,rtt_min: 32874,rtt: 32874,rtt_var: 16437,max_ack_delay: 0,state: 13 30fc1768e66ada3d: Receiving 1200 bytes from 193.167.100.100:443 at T=0.401184 (188fa8f0) 30fc1768e66ada3d: Receiving packet type: 6 (1rtt protected), S0, Q1, 30fc1768e66ada3d: , Seq: 963864144 (963864144), Phi: 0, 30fc1768e66ada3d: Decrypted 1171 bytes 30fc1768e66ada3d: handshake_done 30fc1768e66ada3d: new_token[41]: 0x367287d8a780cf96ca10b0a0e7fbbd26... 30fc1768e66ada3d: crypto_hs, offset 0, length 237: 040000e90000012c... 30fc1768e66ada3d: padding, 886 bytes 30fc1768e66ada3d: T= 0.401184, cwin: 16524,flight: 965,nb_ret: 3,rtt_min: 32874,rtt: 32874,rtt_var: 16437,max_ack_delay: 0,state: 14 30fc1768e66ada3d: Sending packet type: 6 (1rtt protected), S1, Q1, 30fc1768e66ada3d: , Seq: 3 (3), Phi: 0, 30fc1768e66ada3d: Prepared 19 bytes 30fc1768e66ada3d: ack_ecn (nb=0), 963864142-963864144, ect0=3, ect1=0, ce=0 30fc1768e66ada3d: padding, 8 bytes 30fc1768e66ada3d: T= 0.401260, cwin: 16524,flight: 1020,nb_ret: 3,rtt_min: 32874,rtt: 32874,rtt_var: 16437,max_ack_delay: 0,state: 14 30fc1768e66ada3d: Sending 55 bytes to 193.167.100.100:443 at T=0.401260 (188fa93c) 30fc1768e66ada3d: T= 0.565840, Lost packet type 6, number 2, size 295, DCID , reason: timer 30fc1768e66ada3d: Sending packet type: 6 (1rtt protected), S1, Q1, 30fc1768e66ada3d: , Seq: 4 (4), Phi: 0, 30fc1768e66ada3d: Prepared 275 bytes 30fc1768e66ada3d: new_connection_id[1]: 0x71b1797c820d20fa, 72a9d18c3cb38b2458d7d742efe19699 30fc1768e66ada3d: new_connection_id[2]: 0x981525671ca520e7, f7ab5702ada24d898c6cda6280c7b729 30fc1768e66ada3d: new_connection_id[3]: 0xfe1c4dc9d886dce9, c66a97e09204cdc3a1addbc2586f3791 30fc1768e66ada3d: new_connection_id[4]: 0xaa4cba566c8b2c21, 8d2e9bc620f77a0e55cd85c1763a360c 30fc1768e66ada3d: new_connection_id[5]: 0x0d5b2f01ba9f8f79, da730123c2f329616d45b49a05595d47 30fc1768e66ada3d: new_connection_id[6]: 0xa6270eb1238a59e7, a0fa8f4b245e83f4cd172b724fc86c55 30fc1768e66ada3d: ack_ecn (nb=0), 963864142-963864144, ect0=3, ect1=0, ce=0 30fc1768e66ada3d: padding, 93 bytes 30fc1768e66ada3d: T= 0.565840, cwin: 2272,flight: 366,nb_ret: 4,rtt_min: 32874,rtt: 32874,rtt_var: 16437,max_ack_delay: 0,state: 14 30fc1768e66ada3d: Sending 311 bytes to 193.167.100.100:443 at T=0.565840 (18922c20) 30fc1768e66ada3d: Sending packet type: 6 (1rtt protected), S1, Q1, 30fc1768e66ada3d: , Seq: 5 (5), Phi: 0, 30fc1768e66ada3d: Prepared 147 bytes 30fc1768e66ada3d: stream 0, offset 0, length 17, fin = 1: 474554202f6b7074... 30fc1768e66ada3d: padding, 127 bytes 30fc1768e66ada3d: T= 0.565840, cwin: 2272,flight: 549,nb_ret: 4,rtt_min: 32874,rtt: 32874,rtt_var: 16437,max_ack_delay: 0,state: 14 30fc1768e66ada3d: Sending 183 bytes to 193.167.100.100:443 at T=0.565840 (18922c20) 30fc1768e66ada3d: Receiving 40 bytes from 193.167.100.100:443 at T=0.597181 (1892a68d) 30fc1768e66ada3d: Receiving packet type: 6 (1rtt protected), S0, Q1, 30fc1768e66ada3d: , Seq: 82 (963864146), Phi: 0, 30fc1768e66ada3d: Decrypted 14 bytes 30fc1768e66ada3d: ack_ecn (nb=1), 3-5, 0-1, ect0=0, ect1=5, ce=0 30fc1768e66ada3d: padding, 4 bytes 30fc1768e66ada3d: T= 0.597181, cwin: 17663,flight: 0,nb_ret: 4,rtt_min: 31341,rtt: 32682,rtt_var: 12711,max_ack_delay: 0,state: 14 30fc1768e66ada3d: Receiving 1406 bytes from 193.167.100.100:443 at T=0.801160 (1895c358) 30fc1768e66ada3d: Receiving packet type: 6 (1rtt protected), S0, Q1, 30fc1768e66ada3d: , Seq: 83 (963864147), Phi: 0, 30fc1768e66ada3d: Decrypted 1380 bytes 30fc1768e66ada3d: new_connection_id[7]: 0x3537b09fbba9b1ec7e233ccebb46afdd461a, 2aecf17134b4b891aaeb63b501a7ac96 30fc1768e66ada3d: new_connection_id[6]: 0x5547a46d229e4f951a103032aaddad1b2a8b, d3997ee0663b8e904abd769e16dafab6 30fc1768e66ada3d: new_connection_id[5]: 0xb4dc955d9e7bee3905862995b5685b2d3ff4, f397a3fb943247dd11a0d60f70eef36a 30fc1768e66ada3d: new_connection_id[4]: 0x9fec26dc747f080767dfb356223c8f0a504d, 9b480088d9808db88011dd8bf1ce9495 30fc1768e66ada3d: new_connection_id[3]: 0x4fc9eb0212e0b576fd18f4a9bfac09dde36d, b1c52370951e01027d79ab9de4235d54 30fc1768e66ada3d: new_connection_id[2]: 0x2b61dcf9b8b6572ecd252f9998e576ba4496, 80e34fcdf1ec9cc0d2a80f72d2f40651 30fc1768e66ada3d: new_connection_id[1]: 0xcb05eba4e5249b5b7e49677a8e216cb3a0c6, d7feb7460880d5d3b41ab25520984803 30fc1768e66ada3d: stream 0, offset 0, length 1024, fin = 1: 557a7dbc7010756a... 30fc1768e66ada3d: padding, 86 bytes 30fc1768e66ada3d: T= 0.801160, cwin: 17663,flight: 0,nb_ret: 4,rtt_min: 31341,rtt: 32682,rtt_var: 12711,max_ack_delay: 0,state: 14 30fc1768e66ada3d: All done, Closing the connection. 30fc1768e66ada3d: Sending packet type: 6 (1rtt protected), S1, Q0, 30fc1768e66ada3d: , Seq: 6 (6), Phi: 0, 30fc1768e66ada3d: Prepared 16 bytes 30fc1768e66ada3d: ack_ecn (nb=1), 963864146-963864147, 963864144, ect0=5, ect1=0, ce=0 30fc1768e66ada3d: application_close, Error 0x0000, Reason length 0 30fc1768e66ada3d: Sending 52 bytes to 193.167.100.100:443 at T=0.801336 (1895c408) 30fc1768e66ada3d: Out of 2 zero RTT packets, 1 were acked by the server. 30fc1768e66ada3d: Received 1024 bytes in 1.089189 seconds, 0.007521 Mbps. 30fc1768e66ada3d: Sent 17 bytes in 1.089189 seconds, 0.000125 Mbps.