Using document root /www/ Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36359 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36359 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36359 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36359 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36359 if=eth0 ecn=0x0 1207 bytes Sent packet: local=[193.167.100.100]:443 remote=[193.167.100.2]:36359 ecn=0x0 15 bytes Received packet: local=[193.167.100.100]:443 remote=[193.167.0.100]:33951 if=eth0 ecn=0x2 1252 bytes I00000000 0xe6a36baf9d0546cea132f6d5c5e2cfb6a89d cca bbr enter Startup I00000000 0xe6a36baf9d0546cea132f6d5c5e2cfb6a89d con next skip pkn=108906727 I00000000 0xe6a36baf9d0546cea132f6d5c5e2cfb6a89d con recv packet len=1252 mask=6dec111b47 sample=17963e373c37c2dbf644c07f1714ceea I00000000 0xe6a36baf9d0546cea132f6d5c5e2cfb6a89d pkt rx pkn=0 dcid=0x54c130a0d26b9953 scid=0x2f56883108171d87d697643d9c44d08d version=0x00000001 type=Initial len=1218 I00000000 0xe6a36baf9d0546cea132f6d5c5e2cfb6a89d frm rx 0 Initial CRYPTO(0x06) offset=0 len=287 Ordered CRYPTO data in Initial crypto level 00000000 01 00 01 1b 03 03 b6 2a 58 72 85 9a 89 a3 7d cc |.......*Xr....}.| 00000010 e4 5e 57 01 b2 f7 de 51 0b 04 95 63 5b 5b 18 6e |.^W....Q...c[[.n| 00000020 0d 95 5d 93 5f 88 00 00 06 13 01 13 02 13 03 01 |..]._...........| 00000030 00 00 ec 00 2b 00 03 02 03 04 00 0a 00 0a 00 08 |....+...........| 00000040 00 17 00 1d 00 18 00 19 00 33 00 47 00 45 00 17 |.........3.G.E..| 00000050 00 41 04 94 e0 79 ce 35 b9 3a 71 47 2e 59 b1 77 |.A...y.5.:qG.Y.w| 00000060 b7 49 25 ac a3 7d 24 20 9a 30 10 21 dc 66 81 3f |.I%..}$ .0.!.f.?| 00000070 70 23 d7 c7 80 da 1a d1 d4 66 cb 6b 39 2a 3c 21 |p#.......f.k9*