5592cfcaf444b56e: No root crt list specified -- certificate will not be verified. 5592cfcaf444b56e: Sending ALPN list (1): hq-interop 5592cfcaf444b56e: Sending transport parameter TLS extension (85 bytes): 5592cfcaf444b56e: Extension list (85 bytes): 5592cfcaf444b56e: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 5592cfcaf444b56e: Extension type: 4 (initial_max_data), length 4, 80100000 5592cfcaf444b56e: Extension type: 8 (max_streams_bidi), length 2, 4200 5592cfcaf444b56e: Extension type: 1 (idle_timeout), length 4, 8002bf20 5592cfcaf444b56e: Extension type: 3 (max_packet_size), length 2, 45a0 5592cfcaf444b56e: Extension type: 9 (max_streams_uni), length 2, 4200 5592cfcaf444b56e: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 5592cfcaf444b56e: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 5592cfcaf444b56e: Extension type: 14 (active_connection_id_limit), length 1, 08 5592cfcaf444b56e: Extension type: 11 (max_ack_delay), length 1, 0a 5592cfcaf444b56e: Extension type: 15 (hcid), length 8, 2c94fa252565e306 5592cfcaf444b56e: Extension type: 2693 (unknown), length 4, 800092cf 5592cfcaf444b56e: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 5592cfcaf444b56e: Extension type: 29016 (enable_time_stamp), length 1, 03 5592cfcaf444b56e: Extension type: 10930 (grease_quic_bit), length 0 5592cfcaf444b56e: Preparing GET on stream 0 for /lvigznntya 5592cfcaf444b56e: Sending packet type: 2 (initial), S0, Q1, Version 1, 5592cfcaf444b56e: <5592cfcaf444b56e>, <2c94fa252565e306>, Seq: 98367, pl: 572 5592cfcaf444b56e: Token length: 0 5592cfcaf444b56e: Prepared 552 bytes 5592cfcaf444b56e: ping, 1 bytes 5592cfcaf444b56e: crypto_hs, offset 0, length 547: 0100021f0303fe23... 5592cfcaf444b56e: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 5592cfcaf444b56e: <5592cfcaf444b56e>, <2c94fa252565e306>, Seq: 0, pl: 629 5592cfcaf444b56e: Prepared 609 bytes 5592cfcaf444b56e: stream 0, offset 0, length 17, fin = 1: 474554202f6c7669... 5592cfcaf444b56e: padding, 589 bytes 5592cfcaf444b56e: Sending 1252 bytes to 193.167.100.100:443 at T=0.001923 (1942f417) 5592cfcaf444b56e: Receiving 1200 bytes from 193.167.100.100:443 at T=0.037004 (19437d20) 5592cfcaf444b56e: T= 0.037004, Keys unavailable, buffered packet type 6. 5592cfcaf444b56e: T= 0.094517, Lost packet type 2, number 98367, size 582, DCID <>, reason: timer 5592cfcaf444b56e: Sending packet type: 2 (initial), S0, Q1, Version 1, 5592cfcaf444b56e: <5592cfcaf444b56e>, <2c94fa252565e306>, Seq: 98368, pl: 572 5592cfcaf444b56e: Token length: 0 5592cfcaf444b56e: Prepared 552 bytes 5592cfcaf444b56e: ping, 1 bytes 5592cfcaf444b56e: crypto_hs, offset 0, length 547: 0100021f0303fe23... 5592cfcaf444b56e: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 5592cfcaf444b56e: <5592cfcaf444b56e>, <2c94fa252565e306>, Seq: 1, pl: 629 5592cfcaf444b56e: Prepared 609 bytes 5592cfcaf444b56e: padding, 609 bytes 5592cfcaf444b56e: Sending 1252 bytes to 193.167.100.100:443 at T=0.094517 (19445dc9) 5592cfcaf444b56e: Receiving 1200 bytes from 193.167.100.100:443 at T=0.127427 (1944de57) 5592cfcaf444b56e: Receiving packet type: 2 (initial), S0, Q0, Version 1, 5592cfcaf444b56e: <2c94fa252565e306>, , Seq: 1414462715, pl: 164 5592cfcaf444b56e: Token length: 0 5592cfcaf444b56e: Decrypted 144 bytes 5592cfcaf444b56e: ack_ecn (nb=0), 98367-98368, ect0=0, ect1=2, ce=0 5592cfcaf444b56e: crypto_hs, offset 0, length 129: 0200007d0303288d... 5592cfcaf444b56e: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 5592cfcaf444b56e: <2c94fa252565e306>, , Seq: 1414462715, pl: 183 5592cfcaf444b56e: Decrypted 163 bytes 5592cfcaf444b56e: crypto_hs, offset 0, length 159: 0800007700750039... 5592cfcaf444b56e: Received transport parameter TLS extension (92 bytes): 5592cfcaf444b56e: Extension list (92 bytes): 5592cfcaf444b56e: Extension type: 0 (ocid), length 8, 5592cfcaf444b56e 5592cfcaf444b56e: Extension type: 2 (stateless_reset_token), length 16, 105e19591fe03a0312d743e34f1b52a5 5592cfcaf444b56e: Extension type: 15 (hcid), length 18, b9ca0385210b97889e2aa519e5d44505ffa1 5592cfcaf444b56e: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80040000 5592cfcaf444b56e: Extension type: 7 (max_stream_data_uni), length 4, 80040000 5592cfcaf444b56e: Extension type: 4 (initial_max_data), length 4, 80100000 5592cfcaf444b56e: Extension type: 8 (max_streams_bidi), length 2, 4064 5592cfcaf444b56e: Extension type: 1 (idle_timeout), length 4, 8002bf20 5592cfcaf444b56e: Extension type: 14 (active_connection_id_limit), length 1, 07 5592cfcaf444b56e: Extension type: 10930 (grease_quic_bit), length 0 5592cfcaf444b56e: Extension type: 17 (version_negotiation), length 8, 0000000100000001 5592cfcaf444b56e: Receiving packet type: 6 (1rtt protected), S0, Q0, 5592cfcaf444b56e: <2c94fa252565e306>, Seq: 1414462717 (1414462717), Phi: 0, 5592cfcaf444b56e: Decrypted 749 bytes 5592cfcaf444b56e: padding, 749 bytes 5592cfcaf444b56e: T= 0.127427, cwin: 16524,flight: 1308,nb_ret: 1,rtt_min: 32910,rtt: 36492,rtt_var: 14900,max_ack_delay: 0,state: 10 5592cfcaf444b56e: The session was properly resumed! 5592cfcaf444b56e: Zero RTT data is accepted! 5592cfcaf444b56e: Negotiated ALPN: hq-interop 5592cfcaf444b56e: Receiving 1200 bytes from 193.167.100.100:443 at T=0.127800 (1944dfcc) 5592cfcaf444b56e: Receiving packet type: 6 (1rtt protected), S0, Q0, 5592cfcaf444b56e: <2c94fa252565e306>, Seq: 1414462715 (1414462715), Phi: 0, 5592cfcaf444b56e: Decrypted 1171 bytes 5592cfcaf444b56e: stream 0, offset 479, length 545, fin = 1: 01b0bf034f542c0f... 5592cfcaf444b56e: padding, 620 bytes 5592cfcaf444b56e: T= 0.127800, cwin: 16524,flight: 1308,nb_ret: 1,rtt_min: 32910,rtt: 36492,rtt_var: 14900,max_ack_delay: 0,state: 10 5592cfcaf444b56e: Sending packet type: 4 (handshake), S0, Q0, Version 1, 5592cfcaf444b56e: , <2c94fa252565e306>, Seq: 0, pl: 74 5592cfcaf444b56e: Prepared 54 bytes 5592cfcaf444b56e: ack_ecn (nb=0), 1414462715, ect0=1, ect1=0, ce=0 5592cfcaf444b56e: crypto_hs, offset 0, length 36: 14000020039412ee... 5592cfcaf444b56e: Sending packet type: 6 (1rtt protected), S1, Q0, 5592cfcaf444b56e: , Seq: 2 (2), Phi: 0, 5592cfcaf444b56e: Prepared 275 bytes 5592cfcaf444b56e: ack_ecn (nb=1), 1414462717, 1414462715, ect0=2, ect1=0, ce=0 5592cfcaf444b56e: new_connection_id[1]: 0x1010c9715a3a0a57, 5b4dc1190a4378ee9961318d7dba79f1 5592cfcaf444b56e: new_connection_id[2]: 0x11b123f0f3163b05, aa79042d2042ff851e0a10299da66e9a 5592cfcaf444b56e: new_connection_id[3]: 0x54927d6131581651, 662e8c9ffa18145a9be54638ed2a60c2 5592cfcaf444b56e: new_connection_id[4]: 0x70ffaecac18fe54e, 1532fb3db5fba7fe6a257721d5c5e289 5592cfcaf444b56e: new_connection_id[5]: 0x378824f5e4735d87, 177197894b7df1fa65aef453df6ae585 5592cfcaf444b56e: new_connection_id[6]: 0x9741b0739fd6031d, 531e3ab97e053ee31940ef4aa7a998ae 5592cfcaf444b56e: padding, 90 bytes 5592cfcaf444b56e: T= 0.127800, cwin: 16524,flight: 1728,nb_ret: 1,rtt_min: 32910,rtt: 36492,rtt_var: 14900,max_ack_delay: 0,state: 13 5592cfcaf444b56e: Sending 420 bytes to 193.167.100.100:443 at T=0.127800 (1944dfcc) 5592cfcaf444b56e: Connection established. Version = 1, I-CID: 5592cfcaf444b56e, verified: 1 5592cfcaf444b56e: Receiving 1406 bytes from 193.167.100.100:443 at T=0.160533 (19455fa9) 5592cfcaf444b56e: Receiving packet type: 6 (1rtt protected), S0, Q0, 5592cfcaf444b56e: <2c94fa252565e306>, Seq: 254 (1414462718), Phi: 0, 5592cfcaf444b56e: Decrypted 1380 bytes 5592cfcaf444b56e: ping, 1 bytes 5592cfcaf444b56e: padding, 1379 bytes 5592cfcaf444b56e: T= 0.160533, cwin: 16524,flight: 1728,nb_ret: 1,rtt_min: 32910,rtt: 36492,rtt_var: 14900,max_ack_delay: 0,state: 13 5592cfcaf444b56e: Receiving 1200 bytes from 193.167.100.100:443 at T=0.161507 (19456377) 5592cfcaf444b56e: Receiving packet type: 6 (1rtt protected), S0, Q0, 5592cfcaf444b56e: <2c94fa252565e306>, Seq: 255 (1414462719), Phi: 0, 5592cfcaf444b56e: Decrypted 1174 bytes 5592cfcaf444b56e: new_connection_id[7]: 0x911b66df04c40239677f626d44d9b6a551e5, 9ec16e0c9508757e8b0f7e8f48fc4ced 5592cfcaf444b56e: new_connection_id[6]: 0x2fd045733fbf0c3489f8adddfdbe88f77772, a1bd5434e0c4956a5b700bd5ccb67519 5592cfcaf444b56e: new_connection_id[5]: 0x59224f3bed45a3accf3e31612f6701ea980a, e602662d3bf425216c4c88ce469d2d86 5592cfcaf444b56e: new_connection_id[4]: 0x4f5fbea0e09ee4630eeed66c20d8fe835c3f, c56a097abc7e16254da271714da3b7c5 5592cfcaf444b56e: new_connection_id[3]: 0x72e5edbba8da658047145107285062b66af6, fd7eba51657956575ac377b077df70ec 5592cfcaf444b56e: new_connection_id[2]: 0xc48b848be8276c74ff6c658c1dfbb6340136, 57f4be091eda71f0551ce4cbcf8496bc 5592cfcaf444b56e: new_connection_id[1]: 0x215de798222a6ae21c68d1f96886f8ff15fd, 23a02bd51b96790b38762d8d1d06c42e 5592cfcaf444b56e: handshake_done 5592cfcaf444b56e: new_token[41]: 0x36a2de54e59f395871c71d4c6688f00b... 5592cfcaf444b56e: crypto_hs, offset 0, length 237: 040000e90000012c... 5592cfcaf444b56e: stream 0, offset 0, length 479, fin = 0: caa31728814b8adb... 5592cfcaf444b56e: padding, 140 bytes 5592cfcaf444b56e: T= 0.161507, cwin: 16617,flight: 1619,nb_ret: 1,rtt_min: 32910,rtt: 36492,rtt_var: 14900,max_ack_delay: 0,state: 14 5592cfcaf444b56e: All done, Closing the connection. 5592cfcaf444b56e: Sending packet type: 6 (1rtt protected), S1, Q1, 5592cfcaf444b56e: , Seq: 3 (3), Phi: 0, 5592cfcaf444b56e: Prepared 20 bytes 5592cfcaf444b56e: ack_ecn (nb=1), 1414462717-1414462719, 1414462715, ect0=4, ect1=0, ce=0 5592cfcaf444b56e: application_close, Error 0x0000, Reason length 0 5592cfcaf444b56e: Sending 56 bytes to 193.167.100.100:443 at T=0.161720 (1945644c) 5592cfcaf444b56e: Receiving 40 bytes from 193.167.100.100:443 at T=0.163768 (19456c4c) 5592cfcaf444b56e: Receiving packet type: 6 (1rtt protected), S0, Q0, 5592cfcaf444b56e: <2c94fa252565e306>, Seq: 0 (1414462720), Phi: 0, 5592cfcaf444b56e: Decrypted 14 bytes 5592cfcaf444b56e: ack_ecn (nb=0), 0-2, ect0=0, ect1=3, ce=0 5592cfcaf444b56e: padding, 5 bytes 5592cfcaf444b56e: Receiving 1406 bytes from 193.167.100.100:443 at T=0.252354 (1946c656) 5592cfcaf444b56e: Receiving packet type: 6 (1rtt protected), S0, Q0, 5592cfcaf444b56e: <2c94fa252565e306>, Seq: 1 (1414462721), Phi: 0, 5592cfcaf444b56e: Decrypted 1380 bytes 5592cfcaf444b56e: ping, 1 bytes 5592cfcaf444b56e: padding, 1379 bytes 5592cfcaf444b56e: Sending packet type: 6 (1rtt protected), S1, Q0, 5592cfcaf444b56e: , Seq: 4 (4), Phi: 0, 5592cfcaf444b56e: Prepared 3 bytes 5592cfcaf444b56e: application_close, Error 0x0000, Reason length 0 5592cfcaf444b56e: Sending 39 bytes to 193.167.100.100:443 at T=0.252404 (1946c688) 5592cfcaf444b56e: Out of 2 zero RTT packets, 0 were acked by the server. 5592cfcaf444b56e: Received 1024 bytes in 0.405532 seconds, 0.020201 Mbps. 5592cfcaf444b56e: Sent 17 bytes in 0.405532 seconds, 0.000335 Mbps.