0.000 Creating connection with server4:443 with v1 0.082 Setting up connection for downloading https://server4:443/dquefvyglp at 07:29.380 on ClientConnection[41af8793b6f84069/41966ee7fe315af5(V1) with server4/193.167.100.100:443] 0.084 Original destination connection id: 41af8793b6f84069 (scid: 41966ee7fe315af5) >- CryptoStream[I|ClientHello] 0.267 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.468/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.263 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.468 loss detection timeout handler running Sending probe 0, because no ack since 0.263. Current RTT: 100/25. 0.469 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.471 (Probe is an initial retransmit) 0.473 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.873/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.473 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.512 <- (1) Packet I|128800|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 0.522 probe count not reset on ack because handshake not yet confirmed 0.527 Retransmitting CryptoFrame[0,257] on level Initial 0.530 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.930/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.529 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.532 Cwnd(-): 6000; inflight: 0 0.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.934/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 0.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.785/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.557 -> Packet I|3|L|1201|2 Token=[] AckFrame[128800|Δ0] Padding(1150) 0.512 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] >- CryptoStream[H|Finished] 0.583 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.811/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.582 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.512 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 0.588 Starting downloading https://server4:443/dquefvyglp at 07:29.902 on ClientConnection[41af8793b6f84069/41966ee7fe315af5(V1) with server4/193.167.100.100:443] 0.588 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 0.590 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 0.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.707/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.594 Discarding pn space Initial because first Handshake message is being sent 0.512 <- (2) Packet A|0|S0|41966ee7fe315af5|311|4 CryptoFrame[0,133] NewTokenFrame[b481a71b168207d2245d7f483995b31fff5cf6db9d5eb1a7927b40137966f08d176d0522cd75fa00b448af5512c49bf8777e] NewConnectionIdFrame[1,<0|04439581cfa33129|f025a11166f4181fd7a3ae2faac70e69] Padding(68) -< CryptoStream[A|NewSessionTicket] 0.618 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.732/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.618 -> Packet A|0|S0|d044d84bb545e84b|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ7] 0.731 loss detection timeout handler running Sending probe 0, because no ack since 0.582. Current RTT: 38/19. 0.732 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.732 (Probe is a handshake retransmit) 0.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.961/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.733 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 0.960 loss detection timeout handler running Sending probe 1, because no ack since 0.618. Current RTT: 38/19. 0.961 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.961 (Probe is a handshake retransmit) 0.962 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 1.418/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.962 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 0.963 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 1.419/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.963 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 1.418 loss detection timeout handler running Sending probe 2, because no ack since 0.618. Current RTT: 38/19. 1.419 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.419 (Probe is a handshake retransmit) 1.419 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 911 millis, based on 2.331/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 1.419 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 1.420 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 911 millis, based on 2.332/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 1.420 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 1.543 <- (3) Packet A|5|S0|41966ee7fe315af5|55|2 HandshakeDoneFrame[] Padding(28) 1.545 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 1.610/App, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over -803 millis, based on 0.742/App, because ackElicitingInFlight | RTT:38/19 1.545 loss detection timeout handler running 1.545 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 0.618. Current RTT: 38/19. 1.546 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 247 millis, based on 1.794/App, because ackElicitingInFlight | RTT:38/19 1.546 -> Packet PA|1|S0|d044d84bb545e84b|47|1 StreamFrame[0(CIB),0,17,fin] 1.565 -> Packet A|2|S0|d044d84bb545e84b|34|1 AckFrame[5,0|Δ19] 1.794 loss detection timeout handler running Sending probe 1, because no ack since 1.546. Current RTT: 38/19. 1.794 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 495 millis, based on 2.291/App, because ackElicitingInFlight | RTT:38/19 1.795 -> Packet PA|3|S0|d044d84bb545e84b|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 495 millis, based on 2.291/App, because ackElicitingInFlight | RTT:38/19 1.795 -> Packet PA|4|S0|d044d84bb545e84b|47|1 StreamFrame[0(CIB),0,17,fin] 1.839 <- (4) Packet A|9|S0|41966ee7fe315af5|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 1.842 Finished downloading https://server4:443/dquefvyglp at 07:31.156 on ClientConnection[41af8793b6f84069/41966ee7fe315af5(V1) with server4/193.167.100.100:443] 1.843 Closing ClientConnection[41af8793b6f84069/41966ee7fe315af5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.846 Creating connection with server4:443 with v1 1.846 Setting up connection for downloading https://server4:443/iaaaxnakwg at 07:31.160 on ClientConnection[5eaf675e14a235ee/e8a1f0aea0acb2be(V1) with server4/193.167.100.100:443] 1.847 Original destination connection id: 5eaf675e14a235ee (scid: e8a1f0aea0acb2be) >- CryptoStream[I|ClientHello] 1.850 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.846 -> Packet A|5|S0|d044d84bb545e84b|40|2 ConnectionCloseFrame[0|0|] AckFrame[9,5,0|Δ4] reschedule loss detection timer for PTO over 199 millis, based on 2.050/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.850 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.852 <- (5) Packet A|10|S0|41966ee7fe315af5|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 1.853 -> Packet A|6|S0|d044d84bb545e84b|39|2 ConnectionCloseFrame[0|0|] AckFrame[9,5,0|Δ0] 1.865 <- (6) Packet A|11|S0|41966ee7fe315af5|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 1.866 -> Packet A|7|S0|d044d84bb545e84b|39|2 ConnectionCloseFrame[0|0|] AckFrame[9,5,0|Δ0] 1.876 <- (7) Packet A|12|S0|41966ee7fe315af5|30|1 ConnectionCloseFrame[0|0|] 1.883 <- (1) Packet I|105584|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 1.884 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.084/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.883 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 1.889 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.986/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.888 -> Packet I|1|L|1201|2 Token=[] AckFrame[105584|Δ0] Padding(1150) >- CryptoStream[H|Finished] 1.892 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.989/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.892 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.894 Starting downloading https://server4:443/iaaaxnakwg at 07:31.208 on ClientConnection[5eaf675e14a235ee/e8a1f0aea0acb2be(V1) with server4/193.167.100.100:443] 1.883 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 1.895 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.992/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.895 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.992/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.895 Discarding pn space Initial because first Handshake message is being sent 1.894 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|f60281541859ea24|47|1 StreamFrame[0(CIB),0,17,fin]] 1.896 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 1.883 <- (2) Packet A|0|S0|e8a1f0aea0acb2be|311|4 CryptoFrame[0,133] NewTokenFrame[f844cbaebfb476259a1a24c59aaa26b7e557b801746bdc669776bdccdea8355fc317adf02b977aab47fea453419703b794e1] NewConnectionIdFrame[1,<0|29f0d818210c4998|363c9a7f163efee6ea67f90a879b0f48] Padding(68) -< CryptoStream[A|NewSessionTicket] 1.916 -> Packet A|1|S0|f60281541859ea24|32|1 AckFrame[0|Δ19] 1.923 <- (3) Packet A|2|S0|e8a1f0aea0acb2be|55|2 HandshakeDoneFrame[] Padding(28) 1.924 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 1.989/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 77 millis, based on 2.001/App, because ackElicitingInFlight | RTT:33/16 1.924 Discarding pn space Handshake because HandshakeDone is received 1.943 -> Packet A|2|S0|f60281541859ea24|34|1 AckFrame[2,0|Δ19] 1.975 <- (4) Packet A|3|S0|e8a1f0aea0acb2be|1400|2 PingFrame[] Padding(1373) 1.995 -> Packet A|3|S0|f60281541859ea24|34|1 AckFrame[3-2,0|Δ19] 2.001 loss detection timeout handler running Sending probe 0, because no ack since 1.894. Current RTT: 33/16. 2.001 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 2.216/App, because ackElicitingInFlight | RTT:33/16 2.002 -> Packet PA|4|S0|f60281541859ea24|47|1 StreamFrame[0(CIB),0,17,fin] 2.053 <- (5) Packet A|6|S0|e8a1f0aea0acb2be|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 2.054 Finished downloading https://server4:443/iaaaxnakwg at 07:31.368 on ClientConnection[5eaf675e14a235ee/e8a1f0aea0acb2be(V1) with server4/193.167.100.100:443] 2.055 Closing ClientConnection[5eaf675e14a235ee/e8a1f0aea0acb2be(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.055 -> Packet A|5|S0|f60281541859ea24|39|2 ConnectionCloseFrame[0|0|] AckFrame[6,3-2,0|Δ0] 2.055 Creating connection with server4:443 with v1 2.056 Setting up connection for downloading https://server4:443/rrbymmhwlf at 07:31.370 on ClientConnection[5b08adcb81fa1dc3/1c8014e396aed688(V1) with server4/193.167.100.100:443] 2.056 Original destination connection id: 5b08adcb81fa1dc3 (scid: 1c8014e396aed688) >- CryptoStream[I|ClientHello] 2.059 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.259/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.059 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.074 <- (6) Packet A|8|S0|e8a1f0aea0acb2be|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 2.074 -> Packet A|6|S0|f60281541859ea24|39|2 ConnectionCloseFrame[0|0|] AckFrame[6,3-2,0|Δ0] 2.086 <- (7) Packet A|10|S0|e8a1f0aea0acb2be|30|1 ConnectionCloseFrame[0|0|] 2.092 <- (1) Packet I|97813|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.093 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.293/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.092 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 2.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.195/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.097 -> Packet I|1|L|1201|2 Token=[] AckFrame[97813|Δ0] Padding(1150) >- CryptoStream[H|Finished] 2.102 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.199/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.102 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.103 Starting downloading https://server4:443/rrbymmhwlf at 07:31.417 on ClientConnection[5b08adcb81fa1dc3/1c8014e396aed688(V1) with server4/193.167.100.100:443] 2.092 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 2.103 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.200/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.103 Discarding pn space Initial because first Handshake message is being sent 2.104 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.201/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.092 <- (2) Packet A|0|S0|1c8014e396aed688|311|4 CryptoFrame[0,133] NewTokenFrame[a7b617344ae32f996d208b4376d86d8e9cb1af62b749aa1079af6440426720f55985c006c7fdee038f657072a3914a096423] NewConnectionIdFrame[1,<0|a8c2831032ff9454|2602fb3e8fa1d8fc2f6da07eeb0cf1eb] Padding(68) 2.104 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|4f1f7f0e95589a2f|47|1 StreamFrame[0(CIB),0,17,fin]] -< CryptoStream[A|NewSessionTicket] 2.124 -> Packet A|1|S0|4f1f7f0e95589a2f|32|1 AckFrame[0|Δ19] 2.132 <- (3) Packet A|2|S0|1c8014e396aed688|55|2 HandshakeDoneFrame[] Padding(28) 2.133 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 2.199/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 77 millis, based on 2.211/App, because ackElicitingInFlight | RTT:33/16 2.133 Discarding pn space Handshake because HandshakeDone is received 2.153 -> Packet A|2|S0|4f1f7f0e95589a2f|34|1 AckFrame[2,0|Δ19] 2.210 loss detection timeout handler running Sending probe 0, because no ack since 2.104. Current RTT: 33/16. 2.211 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 2.425/App, because ackElicitingInFlight | RTT:33/16 2.211 -> Packet PA|3|S0|4f1f7f0e95589a2f|47|1 StreamFrame[0(CIB),0,17,fin] 2.243 <- (4) Packet A|4|S0|1c8014e396aed688|1079|3 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 2.245 Cwnd(-): 6000; inflight: 0 2.245 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.245 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 94 millis, based on 2.340/App, because ackElicitingInFlight | RTT:33/13 2.246 Finished downloading https://server4:443/rrbymmhwlf at 07:31.559 on ClientConnection[5b08adcb81fa1dc3/1c8014e396aed688(V1) with server4/193.167.100.100:443] 2.245 -> Packet A|4|S0|4f1f7f0e95589a2f|47|1 StreamFrame[0(CIB),0,17,fin] 2.246 Closing ClientConnection[5b08adcb81fa1dc3/1c8014e396aed688(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.246 Creating connection with server4:443 with v1 2.246 -> Packet A|5|S0|4f1f7f0e95589a2f|36|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ1] 2.247 Setting up connection for downloading https://server4:443/rmaapfecvt at 07:31.561 on ClientConnection[7712af861fc5cc70/ad11ff6f280795b2(V1) with server4/193.167.100.100:443] 2.247 Original destination connection id: 7712af861fc5cc70 (scid: ad11ff6f280795b2) >- CryptoStream[I|ClientHello] 2.249 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.449/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.249 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.253 <- (5) Packet A|5|S0|1c8014e396aed688|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 2.253 -> Packet A|6|S0|4f1f7f0e95589a2f|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 2.263 <- (6) Packet A|6|S0|1c8014e396aed688|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 2.263 -> Packet A|7|S0|4f1f7f0e95589a2f|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 2.273 <- (7) Packet A|7|S0|1c8014e396aed688|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 2.276 <- (8) Packet A|8|S0|1c8014e396aed688|55|2 AckFrame[4-2|Δ0] Padding(24) 2.277 -> Packet A|8|S0|4f1f7f0e95589a2f|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 2.277 <- (9) Packet A|9|S0|1c8014e396aed688|30|1 ConnectionCloseFrame[0|0|] 2.448 loss detection timeout handler running Sending probe 0, because no ack since 2.249. Current RTT: 100/25. 2.449 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.449 (Probe is an initial retransmit) 2.449 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.849/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.449 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.482 <- (1) Packet I|128502|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 2.483 probe count not reset on ack because handshake not yet confirmed 2.484 Retransmitting CryptoFrame[0,257] on level Initial 2.484 Cwnd(-): 6000; inflight: 0 2.484 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.884/Initial, because peerAwaitingAddressValidation | RTT:100/25 2.484 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.884/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.484 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 2.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.482 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] reschedule loss detection timer for PTO over 193 millis, based on 2.682/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.488 -> Packet I|3|L|1201|2 Token=[] AckFrame[128502|Δ0] Padding(1150) >- CryptoStream[H|Finished] 2.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.685/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.491 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.492 Starting downloading https://server4:443/rmaapfecvt at 07:31.806 on ClientConnection[7712af861fc5cc70/ad11ff6f280795b2(V1) with server4/193.167.100.100:443] 2.482 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 2.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.589/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.492 Discarding pn space Initial because first Handshake message is being sent 2.493 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.590/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.483 <- (2) Packet A|0|S0|ad11ff6f280795b2|311|4 CryptoFrame[0,133] NewTokenFrame[982ef6b21faf7fdd828b903ca16026222df92f3be99fbdfe5a944ed8c53904420e232e40a9958d57f77e8a70001440ac23ff] NewConnectionIdFrame[1,<0|608dd9a791b386d1|154912f57acb59024720411a2e0c3d61] Padding(68) 2.493 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|59d25e542631676f|47|1 StreamFrame[0(CIB),0,17,fin]] -< CryptoStream[A|NewSessionTicket] 2.513 -> Packet A|1|S0|59d25e542631676f|32|1 AckFrame[0|Δ19] 2.522 <- (3) Packet A|2|S0|ad11ff6f280795b2|55|2 HandshakeDoneFrame[] Padding(28) 2.523 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 2.588/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 2.600/App, because ackElicitingInFlight | RTT:33/16 2.523 Discarding pn space Handshake because HandshakeDone is received 2.525 <- (4) Packet A|3|S0|ad11ff6f280795b2|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 2.525 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.526 Finished downloading https://server4:443/rmaapfecvt at 07:31.840 on ClientConnection[7712af861fc5cc70/ad11ff6f280795b2(V1) with server4/193.167.100.100:443] 2.526 -> Packet A|2|S0|59d25e542631676f|34|1 AckFrame[3-2,0|Δ2] 2.526 Closing ClientConnection[7712af861fc5cc70/ad11ff6f280795b2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.527 -> Packet A|3|S0|59d25e542631676f|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 2.527 Creating connection with server4:443 with v1 2.528 Setting up connection for downloading https://server4:443/ynrzxkalax at 07:31.842 on ClientConnection[5f1c3bf4b56c0e05/2501c3f2b0eb287e(V1) with server4/193.167.100.100:443] 2.528 Original destination connection id: 5f1c3bf4b56c0e05 (scid: 2501c3f2b0eb287e) >- CryptoStream[I|ClientHello] 2.530 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.730/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.530 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.558 <- (5) Packet A|5|S0|ad11ff6f280795b2|1400|2 PingFrame[] Padding(1373) 2.559 -> Packet A|4|S0|59d25e542631676f|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 2.589 <- (6) Packet A|6|S0|ad11ff6f280795b2|30|1 ConnectionCloseFrame[0|0|] 2.729 loss detection timeout handler running Sending probe 0, because no ack since 2.530. Current RTT: 100/25. 2.730 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.730 (Probe is an initial retransmit) 2.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.131/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.730 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.130 loss detection timeout handler running Sending probe 1, because no ack since 2.730. Current RTT: 100/25. 3.130 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.130 (Probe is an initial retransmit) 3.131 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.931/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.131 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.132 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.932/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.132 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.164 <- (1) Packet I|127708|L|179|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 3.165 probe count not reset on ack because handshake not yet confirmed 3.165 Retransmitting CryptoFrame[0,257] on level Initial 3.165 Cwnd(-): 6000; inflight: 1200 3.165 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.965/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.165 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 3.553/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.165 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 3.168 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.164 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] reschedule loss detection timer for PTO over 387 millis, based on 3.556/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.168 -> Packet I|5|L|1201|2 Token=[] AckFrame[127708|Δ0] Padding(1150) >- CryptoStream[H|Finished] 3.171 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.171 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.173 Starting downloading https://server4:443/ynrzxkalax at 07:32.487 on ClientConnection[5f1c3bf4b56c0e05/2501c3f2b0eb287e(V1) with server4/193.167.100.100:443] 3.164 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 3.173 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.173 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 3.270/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.173 Discarding pn space Initial because first Handshake message is being sent 3.174 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.271/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.164 <- (2) Packet A|0|S0|2501c3f2b0eb287e|311|4 CryptoFrame[0,133] NewTokenFrame[c0dff101965dac13205a9f9fd3a4b9e75991cbb8dc0e83d297a064ee63c8e09a5fadbabd93e60981bdc73869d92056bd994d] NewConnectionIdFrame[1,<0|542a765da5e83ca9|a0dfd3099d45606f2706cfafe26d3888] Padding(68) 3.173 -> [Packet H|2|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|a08d3bd3089a22e1|47|1 StreamFrame[0(CIB),0,17,fin]] -< CryptoStream[A|NewSessionTicket] 3.193 -> Packet A|1|S0|a08d3bd3089a22e1|32|1 AckFrame[0|Δ19] 3.200 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.270 loss detection timeout handler running Sending probe 0, because no ack since 3.171. Current RTT: 33/16. 3.270 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.270 (Probe is a handshake retransmit) 3.270 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.465/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.270 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 3.322 <- (4) Packet A|3|S0|2501c3f2b0eb287e|55|3 HandshakeDoneFrame[] AckFrame[1|Δ97] Padding(22) 3.322 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 3.387/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -42 millis, based on 3.280/App, because ackElicitingInFlight | RTT:33/16 3.322 loss detection timeout handler running 3.322 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 3.173. Current RTT: 33/16. 3.323 (Probe is retransmit on level App) 3.323 Cwnd(-): 3000; inflight: 0 3.323 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 106 millis, based on 3.430/App, because ackElicitingInFlight | RTT:33/16 3.323 -> Packet PA|2|S0|a08d3bd3089a22e1|47|1 StreamFrame[0(CIB),0,17,fin] 3.323 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 106 millis, based on 3.430/App, because ackElicitingInFlight | RTT:33/16 3.323 -> Packet A|3|S0|a08d3bd3089a22e1|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 3.365 <- (5) Packet A|7|S0|2501c3f2b0eb287e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 3.365 Finished downloading https://server4:443/ynrzxkalax at 07:32.679 on ClientConnection[5f1c3bf4b56c0e05/2501c3f2b0eb287e(V1) with server4/193.167.100.100:443] 3.366 Closing ClientConnection[5f1c3bf4b56c0e05/2501c3f2b0eb287e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.366 Creating connection with server4:443 with v1 3.366 -> Packet A|4|S0|a08d3bd3089a22e1|38|2 ConnectionCloseFrame[0|0|] AckFrame[7,3|Δ1] 3.367 Setting up connection for downloading https://server4:443/pjrlxtltfq at 07:32.681 on ClientConnection[1db9b3707cb4f3bf/652f125cdf007537(V1) with server4/193.167.100.100:443] 3.367 Original destination connection id: 1db9b3707cb4f3bf (scid: 652f125cdf007537) >- CryptoStream[I|ClientHello] 3.369 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.569/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.369 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.375 <- (6) Packet A|8|S0|2501c3f2b0eb287e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 3.375 -> Packet A|5|S0|a08d3bd3089a22e1|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,3|Δ0] 3.385 <- (7) Packet A|9|S0|2501c3f2b0eb287e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 3.385 -> Packet A|6|S0|a08d3bd3089a22e1|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,3|Δ0] 3.402 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 3.405 <- (8) Packet A|11|S0|2501c3f2b0eb287e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 3.415 <- (9) Packet A|12|S0|2501c3f2b0eb287e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 3.416 -> Packet A|7|S0|a08d3bd3089a22e1|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,3|Δ0] 3.416 <- (10) Packet A|13|S0|2501c3f2b0eb287e|30|1 ConnectionCloseFrame[0|0|] 3.568 loss detection timeout handler running Sending probe 0, because no ack since 3.369. Current RTT: 100/25. 3.568 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.569 (Probe is an initial retransmit) 3.569 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.969/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.569 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.968 loss detection timeout handler running Sending probe 1, because no ack since 3.569. Current RTT: 100/25. 3.969 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.969 (Probe is an initial retransmit) 3.969 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.769/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.969 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.970 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.770/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.970 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.003 <- (2) Packet I|70808|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[3,0|Δ0] Padding(3) -< CryptoStream[I|ServerHello] 4.008 probe count not reset on ack because handshake not yet confirmed 4.008 Cwnd(-): 6000; inflight: 1200 4.003 <- (2) Packet H|2|L|1069|2 CryptoFrame[0,702] Padding(318) 4.008 -> Packet I|4|L|1201|2 Token=[] AckFrame[70808|Δ0] Padding(1150) >- CryptoStream[H|Finished] 4.012 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.013 Starting downloading https://server4:443/pjrlxtltfq at 07:33.327 on ClientConnection[1db9b3707cb4f3bf/652f125cdf007537(V1) with server4/193.167.100.100:443] 4.013 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.109/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.013 Discarding pn space Initial because first Handshake message is being sent 4.014 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.110/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.014 -> [Packet H|1|L|46|1 AckFrame[2|Δ0], Packet A|0|S0|f1d95a4e9f063205|47|1 StreamFrame[0(CIB),0,17,fin]] 4.045 <- (3) Packet H|3|L|55|3 PingFrame[] AckFrame[1|Δ0] Padding(4) 4.046 -> Packet H|2|L|46|1 AckFrame[3|Δ0] 4.048 loss detection timeout handler running 4.048 loss detection timeout handler running 4.048 loss detection timeout handler running 4.048 loss detection timeout handler running 4.048 loss detection timeout handler running 4.048 loss detection timeout handler running 4.048 loss detection timeout handler running 4.048 Retransmitting CryptoFrame[0,36] on level Handshake 4.048 Cwnd(-): 3000; inflight: 47 4.048 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 4.048 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 4.049 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 95 millis, based on 4.144/Handshake, because ackElicitingInFlight | RTT:32/16 4.048 -> Packet H|3|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 4.079 <- (4) Packet A|2|S0|652f125cdf007537|311|5 CryptoFrame[0,133] NewTokenFrame[cc618ee0f1af8a0ee65ebe26960e6087a6281efc1b228021eb0db8909980e004a8404ef5e68277ea102a8813a1e5e26f13d3] NewConnectionIdFrame[1,<0|1b3f1b1733558297|5d9d84b0bac1d4771062bb24ed4327d6] AckFrame[0|Δ34] Padding(62) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 63 millis, based on 4.144/Handshake, because ackElicitingInFlight | RTT:32/16 4.080 <- (5) Packet A|3|S0|652f125cdf007537|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 4.082 State is set to Confirmed reschedule loss detection timer for PTO over 73 millis, based on 4.155/Handshake, because ackElicitingInFlight | RTT:35/18 4.082 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.082 Discarding pn space Handshake because HandshakeDone is received 4.082 Finished downloading https://server4:443/pjrlxtltfq at 07:33.396 on ClientConnection[1db9b3707cb4f3bf/652f125cdf007537(V1) with server4/193.167.100.100:443] 4.082 Closing ClientConnection[1db9b3707cb4f3bf/652f125cdf007537(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.083 -> Packet A|1|S0|f1d95a4e9f063205|36|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ1] 4.083 Creating connection with server4:443 with v1 4.084 Setting up connection for downloading https://server4:443/csbsjkrdpd at 07:33.398 on ClientConnection[c0443dc9f6f0953e/522e1e68945e1037(V1) with server4/193.167.100.100:443] 4.084 Original destination connection id: c0443dc9f6f0953e (scid: 522e1e68945e1037) >- CryptoStream[I|ClientHello] 4.089 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.289/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.089 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.113 <- (6) Packet A|5|S0|652f125cdf007537|30|1 ConnectionCloseFrame[0|0|] 4.123 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 4.288 loss detection timeout handler running Sending probe 0, because no ack since 4.089. Current RTT: 100/25. 4.289 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.289 (Probe is an initial retransmit) 4.289 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.689/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.289 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.572 <- (2) Packet I|88447|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ250] Padding(2) -< CryptoStream[I|ServerHello] 4.576 probe count not reset on ack because handshake not yet confirmed 4.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.977/Handshake, because peerAwaitingAddressValidation | RTT:100/25 4.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.572 <- (2) Packet H|3|L|1069|2 PingFrame[] Padding(1023) reschedule loss detection timer for PTO over 1693 millis, based on 6.271/Handshake, because peerAwaitingAddressValidation | RTT:283/141 4.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.577 -> Packet I|2|L|1201|2 Token=[] AckFrame[88447|Δ0] Padding(1150) reschedule loss detection timer for PTO over 846 millis, based on 5.424/Handshake, because peerAwaitingAddressValidation | RTT:283/141 4.578 Discarding pn space Initial because first Handshake message is being sent 4.578 -> Packet H|0|L|46|1 AckFrame[3|Δ0] 4.610 <- (3) Packet H|4|L|823|3 CryptoFrame[0,702] AckFrame[0|Δ0] Padding(67) >- CryptoStream[H|Finished] 4.614 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 846 millis, based on 5.461/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:283/141 4.614 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.615 Starting downloading https://server4:443/csbsjkrdpd at 07:33.928 on ClientConnection[c0443dc9f6f0953e/522e1e68945e1037(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 846 millis, based on 5.461/Handshake, because ackElicitingInFlight | RTT:283/141 4.610 <- (3) Packet H|5|L|55|3 PingFrame[] AckFrame[0|Δ0] Padding(4) reschedule loss detection timer for PTO over 845 millis, based on 5.461/Handshake, because ackElicitingInFlight | RTT:283/141 4.610 <- (4) Packet H|6|L|55|3 PingFrame[] AckFrame[0|Δ0] Padding(4) reschedule loss detection timer for PTO over 845 millis, based on 5.461/Handshake, because ackElicitingInFlight | RTT:283/141 4.615 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 845 millis, based on 5.461/Handshake, because ackElicitingInFlight | RTT:283/141 4.615 -> [Packet H|2|L|46|1 AckFrame[4|Δ0], Packet A|0|S0|e7ff0fe4689cc24c|47|1 StreamFrame[0(CIB),0,17,fin]] 4.616 -> Packet H|3|L|46|1 AckFrame[6-4|Δ0] 5.461 loss detection timeout handler running Sending probe 0, because no ack since 4.614. Current RTT: 283/141. 5.461 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 5.461 (Probe is a handshake retransmit) 5.461 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 1693 millis, based on 7.155/Handshake, because ackElicitingInFlight | RTT:283/141 5.461 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 5.493 <- (5) Packet A|3|S0|522e1e68945e1037|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 5.494 State is set to Confirmed reschedule loss detection timer for PTO over 835 millis, based on 6.329/App, because ackElicitingInFlight | RTT:283/141 reschedule loss detection timer for PTO over -21 millis, based on 5.472/App, because ackElicitingInFlight | RTT:283/141 5.494 Discarding pn space Handshake because HandshakeDone is received 5.494 loss detection timeout handler running Sending probe 0, because no ack since 4.615. Current RTT: 283/141. 5.494 (Probe is retransmit on level App) 5.495 Finished downloading https://server4:443/csbsjkrdpd at 07:34.809 on ClientConnection[c0443dc9f6f0953e/522e1e68945e1037(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 1713 millis, based on 7.209/App, because ackElicitingInFlight | RTT:283/141 5.495 Closing ClientConnection[c0443dc9f6f0953e/522e1e68945e1037(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.495 -> Packet PA|1|S0|e7ff0fe4689cc24c|47|1 StreamFrame[0(CIB),0,17,fin] 5.495 -> Packet A|2|S0|e7ff0fe4689cc24c|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 5.495 Creating connection with server4:443 with v1 5.496 Setting up connection for downloading https://server4:443/uhnfxngblp at 07:34.810 on ClientConnection[bad18f37e337fa56/c80b254a26346373(V1) with server4/193.167.100.100:443] 5.496 Original destination connection id: bad18f37e337fa56 (scid: c80b254a26346373) >- CryptoStream[I|ClientHello] 5.498 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.698/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.498 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.525 <- (6) Packet A|5|S0|522e1e68945e1037|55|2 AckFrame[1-0|Δ0] Padding(24) 5.526 -> Packet A|3|S0|e7ff0fe4689cc24c|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 5.531 <- (1) Packet I|83494|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 5.531 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.731/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.531 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 5.535 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.632/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.535 -> Packet I|1|L|1201|2 Token=[] AckFrame[83494|Δ0] Padding(1150) >- CryptoStream[H|Finished] 5.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.634/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.537 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.538 Starting downloading https://server4:443/uhnfxngblp at 07:34.852 on ClientConnection[bad18f37e337fa56/c80b254a26346373(V1) with server4/193.167.100.100:443] 5.531 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 5.538 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.635/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.538 Discarding pn space Initial because first Handshake message is being sent 5.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.531 <- (2) Packet A|0|S0|c80b254a26346373|311|4 CryptoFrame[0,133] NewTokenFrame[8fa9db65e614689481de7d85cb88f26580bed5e31b9846e80966988f02b7836209469b1addf934b8e4440673e1c7f5ba6c72] NewConnectionIdFrame[1,<0|86dc59ac02bb0705|12c1f6a4a6c3e47c2ae053b933705101] Padding(68) reschedule loss detection timer for PTO over 96 millis, based on 5.636/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket] 5.539 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|ee10203c389db29c|47|1 StreamFrame[0(CIB),0,17,fin]] 5.557 <- (7) Packet A|6|S0|522e1e68945e1037|30|1 ConnectionCloseFrame[0|0|] 5.559 -> Packet A|1|S0|ee10203c389db29c|32|1 AckFrame[0|Δ19] 5.570 <- (3) Packet A|3|S0|c80b254a26346373|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 5.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.668/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.572 Finished downloading https://server4:443/uhnfxngblp at 07:34.886 on ClientConnection[bad18f37e337fa56/c80b254a26346373(V1) with server4/193.167.100.100:443] 5.572 Closing ClientConnection[bad18f37e337fa56/c80b254a26346373(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.572 -> Packet A|2|S0|ee10203c389db29c|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 5.572 Creating connection with server4:443 with v1 5.573 Setting up connection for downloading https://server4:443/ynjuzluaoq at 07:34.887 on ClientConnection[8ad9d4281e1a001a/75b04a62c47b22f2(V1) with server4/193.167.100.100:443] 5.573 Original destination connection id: 8ad9d4281e1a001a (scid: 75b04a62c47b22f2) >- CryptoStream[I|ClientHello] 5.575 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.775/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.575 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.602 <- (4) Packet A|4|S0|c80b254a26346373|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 5.602 -> Packet A|3|S0|ee10203c389db29c|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 5.633 <- (5) Packet A|5|S0|c80b254a26346373|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 5.633 <- (6) Packet A|6|S0|c80b254a26346373|30|1 ConnectionCloseFrame[0|0|] 5.634 -> Packet A|4|S0|ee10203c389db29c|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 5.774 loss detection timeout handler running Sending probe 0, because no ack since 5.575. Current RTT: 100/25. 5.775 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.775 (Probe is an initial retransmit) 5.775 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.175/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.775 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.808 <- (1) Packet I|80558|L|178|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 5.809 probe count not reset on ack because handshake not yet confirmed 5.809 Retransmitting CryptoFrame[0,257] on level Initial 5.809 Cwnd(-): 6000; inflight: 0 5.810 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.210/Initial, because peerAwaitingAddressValidation | RTT:100/25 5.810 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 6.004/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.810 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 5.808 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 5.813 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.008/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.813 -> Packet I|3|L|1201|2 Token=[] AckFrame[80558|Δ0] Padding(1150) >- CryptoStream[H|Finished] 5.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.011/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.817 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.817 Starting downloading https://server4:443/ynjuzluaoq at 07:35.131 on ClientConnection[8ad9d4281e1a001a/75b04a62c47b22f2(V1) with server4/193.167.100.100:443] 5.808 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 5.817 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 5.818 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.915/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.818 Discarding pn space Initial because first Handshake message is being sent 5.818 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.915/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.809 <- (2) Packet A|0|S0|75b04a62c47b22f2|311|4 CryptoFrame[0,133] NewTokenFrame[d457f8b847e2a1dcdb760d27eccaa9167ceea4a988f228b2dd6db81aef8c32e439db0135aae134b6503a75112ddaa55b0430] NewConnectionIdFrame[1,<0|e64ddd6dc55548e5|a0d6a7e13d860acab7762ebe447c8705] Padding(68) 5.818 -> [Packet H|2|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|0ae14b7e6d9820ac|47|1 StreamFrame[0(CIB),0,17,fin]] -< CryptoStream[A|NewSessionTicket] 5.838 -> Packet A|1|S0|0ae14b7e6d9820ac|32|1 AckFrame[0|Δ19] 5.850 <- (3) Packet A|3|S0|75b04a62c47b22f2|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 5.850 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.948/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.851 Finished downloading https://server4:443/ynjuzluaoq at 07:35.165 on ClientConnection[8ad9d4281e1a001a/75b04a62c47b22f2(V1) with server4/193.167.100.100:443] 5.851 Closing ClientConnection[8ad9d4281e1a001a/75b04a62c47b22f2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.852 Creating connection with server4:443 with v1 5.852 -> Packet A|2|S0|0ae14b7e6d9820ac|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 5.852 Setting up connection for downloading https://server4:443/filzzpokzw at 07:35.166 on ClientConnection[c62872be7cf1d1df/83954759f2bb4ac2(V1) with server4/193.167.100.100:443] 5.852 Original destination connection id: c62872be7cf1d1df (scid: 83954759f2bb4ac2) >- CryptoStream[I|ClientHello] 5.854 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.054/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.854 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.870 <- (4) Packet A|5|S0|75b04a62c47b22f2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 5.871 -> Packet A|3|S0|0ae14b7e6d9820ac|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 5.880 <- (5) Packet A|6|S0|75b04a62c47b22f2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 5.881 -> Packet A|4|S0|0ae14b7e6d9820ac|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 6.053 loss detection timeout handler running Sending probe 0, because no ack since 5.854. Current RTT: 100/25. 6.053 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.054 (Probe is an initial retransmit) 6.054 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.454/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.054 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.453 loss detection timeout handler running Sending probe 1, because no ack since 6.054. Current RTT: 100/25. 6.453 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.454 (Probe is an initial retransmit) 6.454 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.254/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.454 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.455 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.255/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.455 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.487 <- (1) Packet I|103521|L|179|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 6.488 probe count not reset on ack because handshake not yet confirmed 6.488 Retransmitting CryptoFrame[0,257] on level Initial 6.488 Cwnd(-): 6000; inflight: 1200 6.488 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.288/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.489 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 6.877/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.488 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 6.487 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 6.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.491 -> Packet I|5|L|1201|2 Token=[] AckFrame[103521|Δ0] Padding(1150) >- CryptoStream[H|Finished] 6.494 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.882/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.494 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.495 Starting downloading https://server4:443/filzzpokzw at 07:35.809 on ClientConnection[c62872be7cf1d1df/83954759f2bb4ac2(V1) with server4/193.167.100.100:443] 6.487 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 6.495 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.592/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.495 Discarding pn space Initial because first Handshake message is being sent 6.487 <- (2) Packet A|0|S0|83954759f2bb4ac2|311|4 CryptoFrame[0,133] NewTokenFrame[f994b603f584e6d544ec1beab358fee3314658179bdb376e9d23923030e97fe2a4030dc7d032bf6b96fb197e1ddd1c8842b6] NewConnectionIdFrame[1,<0|4cf045f55cf97aef|070183619a2319f939ce81a497dc5220] Padding(68) 6.496 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.593/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket] 6.496 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|0b5271faafe4c3a6|47|1 StreamFrame[0(CIB),0,17,fin]] 6.515 -> Packet A|1|S0|0b5271faafe4c3a6|32|1 AckFrame[0|Δ19] 6.521 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.592 loss detection timeout handler running Sending probe 0, because no ack since 6.494. Current RTT: 33/16. 6.592 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.592 (Probe is a handshake retransmit) 6.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.787/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.592 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 6.623 <- (4) Packet A|5|S0|83954759f2bb4ac2|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 6.623 State is set to Confirmed reschedule loss detection timer for PTO over 86 millis, based on 6.710/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -20 millis, based on 6.603/App, because ackElicitingInFlight | RTT:33/16 6.624 Discarding pn space Handshake because HandshakeDone is received 6.624 loss detection timeout handler running Sending probe 0, because no ack since 6.496. Current RTT: 33/16. 6.624 (Probe is retransmit on level App) 6.624 Finished downloading https://server4:443/filzzpokzw at 07:35.938 on ClientConnection[c62872be7cf1d1df/83954759f2bb4ac2(V1) with server4/193.167.100.100:443] 6.624 Closing ClientConnection[c62872be7cf1d1df/83954759f2bb4ac2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 213 millis, based on 6.838/App, because ackElicitingInFlight | RTT:33/16 6.624 -> Packet PA|2|S0|0b5271faafe4c3a6|47|1 StreamFrame[0(CIB),0,17,fin] 6.624 -> Packet A|3|S0|0b5271faafe4c3a6|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,0|Δ0] 6.625 Creating connection with server4:443 with v1 6.625 Setting up connection for downloading https://server4:443/krhyasmfwi at 07:35.939 on ClientConnection[68502ebbe1a36b95/1f91403e18b2607e(V1) with server4/193.167.100.100:443] 6.625 Original destination connection id: 68502ebbe1a36b95 (scid: 1f91403e18b2607e) >- CryptoStream[I|ClientHello] 6.627 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.827/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.627 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.654 <- (5) Packet A|6|S0|83954759f2bb4ac2|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 6.654 -> Packet A|4|S0|0b5271faafe4c3a6|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,0|Δ0] 6.655 <- (6) Packet A|8|S0|83954759f2bb4ac2|30|1 ConnectionCloseFrame[0|0|] 6.660 <- (1) Packet I|95559|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.661 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.861/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.660 <- (1) Packet H|0|L|752|1 CryptoFrame[0,703] 6.663 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.760/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.663 -> Packet I|1|L|1201|2 Token=[] AckFrame[95559|Δ0] Padding(1150) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.660 <- (1) Packet H|1|L|321|2 PingFrame[] Padding(275) 6.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.764/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.666 -> Packet H|0|L|80|1 CryptoFrame[0,36] 6.667 Starting downloading https://server4:443/krhyasmfwi at 07:35.981 on ClientConnection[68502ebbe1a36b95/1f91403e18b2607e(V1) with server4/193.167.100.100:443] 6.667 -> Packet H|1|L|46|1 AckFrame[1-0|Δ0] 6.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.764/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 6.764/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.667 -> Packet A|0|S0|d8f49bb5145f6aaf|47|1 StreamFrame[0(CIB),0,17,fin] 6.668 Discarding pn space Initial because first Handshake message is being sent 6.660 <- (2) Packet A|0|S0|1f91403e18b2607e|311|4 CryptoFrame[0,133] NewTokenFrame[d50e4a197e713a8dfe931f0984617c0b20b5138e8e9ffe92e602d2edfcf8483e27b65bd93ffe99fc3d3470fd9ca3a785d7e0] NewConnectionIdFrame[1,<0|901e3cbb04f68918|4ae84e76f52eba3de088750d3045867d] Padding(68) -< CryptoStream[A|NewSessionTicket] 6.687 -> Packet A|1|S0|d8f49bb5145f6aaf|32|1 AckFrame[0|Δ19] 6.697 <- (3) Packet A|2|S0|1f91403e18b2607e|55|2 HandshakeDoneFrame[] Padding(28) 6.698 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 6.763/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 6.774/App, because ackElicitingInFlight | RTT:33/16 6.698 Discarding pn space Handshake because HandshakeDone is received 6.717 -> Packet A|2|S0|d8f49bb5145f6aaf|34|1 AckFrame[2,0|Δ19] 6.774 loss detection timeout handler running Sending probe 0, because no ack since 6.667. Current RTT: 33/16. 6.774 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 6.989/App, because ackElicitingInFlight | RTT:33/16 6.775 -> Packet PA|3|S0|d8f49bb5145f6aaf|47|1 StreamFrame[0(CIB),0,17,fin] 6.806 <- (4) Packet A|4|S0|1f91403e18b2607e|1079|3 AckFrame[3-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 6.807 Cwnd(-): 6000; inflight: 0 6.807 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.807 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 6.902/App, because ackElicitingInFlight | RTT:33/13 6.807 -> Packet A|4|S0|d8f49bb5145f6aaf|47|1 StreamFrame[0(CIB),0,17,fin] 6.808 Finished downloading https://server4:443/krhyasmfwi at 07:36.122 on ClientConnection[68502ebbe1a36b95/1f91403e18b2607e(V1) with server4/193.167.100.100:443] 6.808 Closing ClientConnection[68502ebbe1a36b95/1f91403e18b2607e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.809 Creating connection with server4:443 with v1 6.808 -> Packet A|5|S0|d8f49bb5145f6aaf|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 6.809 Setting up connection for downloading https://server4:443/ajmgvxwdit at 07:36.123 on ClientConnection[4d70c1758f3e9151/a107e5967f3d22f7(V1) with server4/193.167.100.100:443] 6.809 Original destination connection id: 4d70c1758f3e9151 (scid: a107e5967f3d22f7) >- CryptoStream[I|ClientHello] 6.811 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.011/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.811 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.816 <- (5) Packet A|5|S0|1f91403e18b2607e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 6.817 -> Packet A|6|S0|d8f49bb5145f6aaf|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 6.826 <- (6) Packet A|6|S0|1f91403e18b2607e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 6.827 -> Packet A|7|S0|d8f49bb5145f6aaf|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 6.836 <- (7) Packet A|7|S0|1f91403e18b2607e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 6.837 Loss detection timeout: Timer was cancelled. 6.838 <- (8) Packet A|8|S0|1f91403e18b2607e|55|2 AckFrame[4-1|Δ0] Padding(24) 6.838 -> Packet A|8|S0|d8f49bb5145f6aaf|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 7.010 loss detection timeout handler running Sending probe 0, because no ack since 6.811. Current RTT: 100/25. 7.010 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.010 (Probe is an initial retransmit) 7.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.411/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.011 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.044 <- (1) Packet I|83462|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 7.045 probe count not reset on ack because handshake not yet confirmed 7.045 Retransmitting CryptoFrame[0,257] on level Initial 7.045 Cwnd(-): 6000; inflight: 0 7.045 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.445/Initial, because peerAwaitingAddressValidation | RTT:100/25 7.045 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 7.239/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.045 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 7.044 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 7.048 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.242/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.048 -> Packet I|3|L|1201|2 Token=[] AckFrame[83462|Δ0] Padding(1150) >- CryptoStream[H|Finished] 7.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.244/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.050 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.051 Starting downloading https://server4:443/ajmgvxwdit at 07:36.365 on ClientConnection[4d70c1758f3e9151/a107e5967f3d22f7(V1) with server4/193.167.100.100:443] 7.044 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 7.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.148/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.051 Discarding pn space Initial because first Handshake message is being sent 7.044 <- (2) Packet A|0|S0|a107e5967f3d22f7|311|4 CryptoFrame[0,133] NewTokenFrame[dd1991a86d3153b4649ccd7ba21546b2c97a469f40be0c201b16729a097461b5ad2813395a3c9914bd54c3ecbd61452d699d] NewConnectionIdFrame[1,<0|4f88509d6340b331|9fbb8ae379c7478c9816e44c37c35539] Padding(68) 7.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 96 millis, based on 7.148/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.051 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|8b9c9f271ce4f977|47|1 StreamFrame[0(CIB),0,17,fin]] 7.071 -> Packet A|1|S0|8b9c9f271ce4f977|32|1 AckFrame[0|Δ19] 7.147 loss detection timeout handler running Sending probe 0, because no ack since 7.050. Current RTT: 33/16. 7.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.148 (Probe is a handshake retransmit) 7.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.342/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.148 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 7.341 loss detection timeout handler running Sending probe 1, because no ack since 7.051. Current RTT: 33/16. 7.341 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.341 (Probe is a handshake retransmit) 7.342 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.730/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.342 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 7.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.731/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.343 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 7.429 <- (3) Packet A|5|S0|a107e5967f3d22f7|55|2 HandshakeDoneFrame[] Padding(28) 7.429 State is set to Confirmed reschedule loss detection timer for PTO over 50 millis, based on 7.479/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -271 millis, based on 7.158/App, because ackElicitingInFlight | RTT:33/16 7.429 Discarding pn space Handshake because HandshakeDone is received 7.429 loss detection timeout handler running Sending probe 0, because no ack since 7.051. Current RTT: 33/16. 7.429 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 7.644/App, because ackElicitingInFlight | RTT:33/16 7.430 -> Packet PA|2|S0|8b9c9f271ce4f977|47|1 StreamFrame[0(CIB),0,17,fin] 7.449 -> Packet A|3|S0|8b9c9f271ce4f977|34|1 AckFrame[5,0|Δ19] 7.481 <- (4) Packet A|8|S0|a107e5967f3d22f7|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.482 Finished downloading https://server4:443/ajmgvxwdit at 07:36.796 on ClientConnection[4d70c1758f3e9151/a107e5967f3d22f7(V1) with server4/193.167.100.100:443] 7.482 Closing ClientConnection[4d70c1758f3e9151/a107e5967f3d22f7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.482 <- (5) Packet A|9|S0|a107e5967f3d22f7|1400|2 PingFrame[] Padding(1373) 7.482 -> Packet A|4|S0|8b9c9f271ce4f977|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,5,0|Δ0] 7.483 -> Packet A|5|S0|8b9c9f271ce4f977|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,5,0|Δ0] 7.483 Creating connection with server4:443 with v1 7.483 Setting up connection for downloading https://server4:443/jlmunvqeme at 07:36.797 on ClientConnection[1b152bc7f003f039/02342b85f799e656(V1) with server4/193.167.100.100:443] 7.483 Original destination connection id: 1b152bc7f003f039 (scid: 02342b85f799e656) >- CryptoStream[I|ClientHello] 7.485 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.685/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.485 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.491 <- (6) Packet A|10|S0|a107e5967f3d22f7|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.491 -> Packet A|6|S0|8b9c9f271ce4f977|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,5,0|Δ0] 7.501 <- (7) Packet A|11|S0|a107e5967f3d22f7|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.511 <- (8) Packet A|12|S0|a107e5967f3d22f7|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.511 -> Packet A|7|S0|8b9c9f271ce4f977|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,5,0|Δ0] 7.513 <- (9) Packet A|13|S0|a107e5967f3d22f7|30|1 ConnectionCloseFrame[0|0|] 7.684 loss detection timeout handler running Sending probe 0, because no ack since 7.485. Current RTT: 100/25. 7.684 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.684 (Probe is an initial retransmit) 7.685 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.085/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.684 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.084 loss detection timeout handler running Sending probe 1, because no ack since 7.684. Current RTT: 100/25. 8.084 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.084 (Probe is an initial retransmit) 8.085 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.885/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.084 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.086 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.886/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.085 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.119 <- (1) Packet I|82214|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[3-2|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 8.122 probe count not reset on ack because handshake not yet confirmed 8.122 Retransmitting CryptoFrame[0,257] on level Initial 8.122 Cwnd(-): 6000; inflight: 0 8.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 8.922/Handshake, because peerAwaitingAddressValidation | RTT:100/25 8.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 8.511/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.122 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.119 <- (1) Packet H|2|L|1069|2 PingFrame[] Padding(1023) 8.123 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.220/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.123 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.123 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 96 millis, based on 8.220/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.123 -> Packet I|5|L|1201|2 Token=[] AckFrame[82214|Δ0] Padding(1150) 8.123 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 8.219 loss detection timeout handler running 8.219 Sending probe 0. Current RTT: 33/16. 8.219 Sending probe because peer awaiting address validation 8.219 (Probe is a handshake ping) 8.220 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.414/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.220 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 8.251 <- (2) Packet H|5|L|55|2 AckFrame[1-0|Δ0] Padding(5) 8.251 probe count not reset on ack because handshake not yet confirmed 8.251 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.371 <- (3) Packet H|6|L|823|3 CryptoFrame[0,702] AckFrame[1-0|Δ119] Padding(66) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 169 millis, based on 8.544/Handshake, because ackElicitingInFlight | RTT:33/13 8.374 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[5|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.375 Starting downloading https://server4:443/jlmunvqeme at 07:37.689 on ClientConnection[1b152bc7f003f039/02342b85f799e656(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 84 millis, based on 8.459/Handshake, because ackElicitingInFlight | RTT:33/13 8.375 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 83 millis, based on 8.459/Handshake, because ackElicitingInFlight | RTT:33/13 8.375 -> [Packet H|3|L|46|1 AckFrame[6-5|Δ0], Packet A|0|S0|66d4b52cf9e84cd1|47|1 StreamFrame[0(CIB),0,17,fin]] 8.405 <- (4) Packet A|2|S0|02342b85f799e656|311|4 CryptoFrame[0,133] NewTokenFrame[b8e284f54f4226e20fb6ef504f3b09a248bb6dbfb0ac53d714d27b8bd100c935f883cfa38f1081ecb9accc6d4ca7761dd842] NewConnectionIdFrame[1,<0|13c7e059f1781d36|ddc1d1f93b6a026c2c6edcb605048f93] Padding(68) -< CryptoStream[A|NewSessionTicket] 8.405 <- (5) Packet A|3|S0|02342b85f799e656|55|2 HandshakeDoneFrame[] Padding(28) 8.406 State is set to Confirmed reschedule loss detection timer for PTO over 52 millis, based on 8.459/Handshake, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over 63 millis, based on 8.470/App, because ackElicitingInFlight | RTT:33/13 8.407 Discarding pn space Handshake because HandshakeDone is received 8.407 -> Packet A|1|S0|66d4b52cf9e84cd1|31|1 AckFrame[3-2|Δ0] 8.470 loss detection timeout handler running Sending probe 0, because no ack since 8.375. Current RTT: 33/13. 8.470 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 189 millis, based on 8.660/App, because ackElicitingInFlight | RTT:33/13 8.470 -> Packet PA|2|S0|66d4b52cf9e84cd1|47|1 StreamFrame[0(CIB),0,17,fin] 8.659 loss detection timeout handler running Sending probe 1, because no ack since 8.470. Current RTT: 33/13. 8.660 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 379 millis, based on 9.040/App, because ackElicitingInFlight | RTT:33/13 8.660 -> Packet PA|3|S0|66d4b52cf9e84cd1|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 379 millis, based on 9.041/App, because ackElicitingInFlight | RTT:33/13 8.661 -> Packet PA|4|S0|66d4b52cf9e84cd1|47|1 StreamFrame[0(CIB),0,17,fin] 8.691 <- (6) Packet A|7|S0|02342b85f799e656|55|2 AckFrame[3-2,0|Δ0] Padding(22) reschedule loss detection timer for PTO over 64 millis, based on 8.756/App, because ackElicitingInFlight | RTT:33/13 8.755 loss detection timeout handler running Sending probe 0, because no ack since 8.661. Current RTT: 33/11. 8.756 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 173 millis, based on 8.930/App, because ackElicitingInFlight | RTT:33/11 8.756 -> Packet PA|5|S0|66d4b52cf9e84cd1|47|1 StreamFrame[0(CIB),0,17,fin] 8.929 loss detection timeout handler running Sending probe 1, because no ack since 8.756. Current RTT: 33/11. 8.929 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 347 millis, based on 9.278/App, because ackElicitingInFlight | RTT:33/11 8.930 -> Packet PA|6|S0|66d4b52cf9e84cd1|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 347 millis, based on 9.279/App, because ackElicitingInFlight | RTT:33/11 8.931 -> Packet PA|7|S0|66d4b52cf9e84cd1|47|1 StreamFrame[0(CIB),0,17,fin] 8.961 <- (7) Packet A|9|S0|02342b85f799e656|55|2 AckFrame[7-6,3-2,0|Δ0] Padding(20) 8.962 Cwnd(-): 3000; inflight: 0 8.962 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.378 <- (8) Packet A|11|S0|02342b85f799e656|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 9.378 Finished downloading https://server4:443/jlmunvqeme at 07:38.692 on ClientConnection[1b152bc7f003f039/02342b85f799e656(V1) with server4/193.167.100.100:443] 9.379 Closing ClientConnection[1b152bc7f003f039/02342b85f799e656(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.379 Creating connection with server4:443 with v1 9.379 -> Packet A|8|S0|66d4b52cf9e84cd1|41|2 ConnectionCloseFrame[0|0|] AckFrame[11,9,7,3-2|Δ0] 9.380 Setting up connection for downloading https://server4:443/jnptvlypyz at 07:38.694 on ClientConnection[c5d1ce9c17e6bac5/e403ec3dce582fdf(V1) with server4/193.167.100.100:443] 9.380 Original destination connection id: c5d1ce9c17e6bac5 (scid: e403ec3dce582fdf) >- CryptoStream[I|ClientHello] 9.381 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.581/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.381 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.410 <- (9) Packet A|12|S0|02342b85f799e656|30|1 ConnectionCloseFrame[0|0|] 9.415 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 9.580 loss detection timeout handler running Sending probe 0, because no ack since 9.381. Current RTT: 100/25. 9.581 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.581 (Probe is an initial retransmit) 9.581 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.981/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.581 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.614 <- (2) Packet I|69124|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 9.617 probe count not reset on ack because handshake not yet confirmed 9.617 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 10.017/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.617 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 9.809/Handshake, because peerAwaitingAddressValidation | RTT:32/16 9.614 <- (2) Packet H|2|L|1069|2 PingFrame[] Padding(1023) 9.617 -> Packet I|2|L|1201|2 Token=[] AckFrame[69124|Δ0] Padding(1150) 9.617 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 9.713/Handshake, because peerAwaitingAddressValidation | RTT:32/16 9.618 Discarding pn space Initial because first Handshake message is being sent 9.618 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 9.713 loss detection timeout handler running 9.713 Sending probe 0. Current RTT: 32/16. 9.713 Sending probe because peer awaiting address validation 9.713 (Probe is a handshake ping) 9.713 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 9.905/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.713 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 9.728 <- (3) Packet H|3|L|823|2 CryptoFrame[0,703] Padding(71) >- CryptoStream[H|Finished] 9.731 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 9.923/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.731 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[2|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.732 Starting downloading https://server4:443/jnptvlypyz at 07:39.046 on ClientConnection[c5d1ce9c17e6bac5/e403ec3dce582fdf(V1) with server4/193.167.100.100:443] 9.732 -> Packet H|3|L|46|1 AckFrame[3-2|Δ0] 9.732 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 9.924/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.732 -> Packet A|0|S0|9a882ca3b204ee91|47|1 StreamFrame[0(CIB),0,17,fin] 9.744 <- (4) Packet H|4|L|55|2 AckFrame[1|Δ0] Padding(5) 9.744 probe count not reset on ack because handshake not yet confirmed 9.744 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 178 millis, based on 9.923/Handshake, because ackElicitingInFlight | RTT:32/16 9.762 <- (5) Packet A|2|S0|e403ec3dce582fdf|311|4 CryptoFrame[0,133] NewTokenFrame[ac46c318ae1a47a08400726195b9e5c9a1186009ee3c0e0c1bdc6e17aec60d096d528226117a07b441ec6e98173c7fa5a67f] NewConnectionIdFrame[1,<0|0b6c3412c3b8714f|6fbb59ae1af776bc06f7bf15b12d1a87] Padding(68) -< CryptoStream[A|NewSessionTicket] 9.763 <- (6) Packet A|3|S0|e403ec3dce582fdf|55|2 HandshakeDoneFrame[] Padding(28) 9.764 State is set to Confirmed reschedule loss detection timer for PTO over 135 millis, based on 9.899/Handshake, because ackElicitingInFlight | RTT:32/13 reschedule loss detection timer for PTO over 62 millis, based on 9.826/App, because ackElicitingInFlight | RTT:32/13 9.764 Discarding pn space Handshake because HandshakeDone is received 9.764 -> Packet A|1|S0|9a882ca3b204ee91|31|1 AckFrame[3-2|Δ0] 9.796 <- (7) Packet A|5|S0|e403ec3dce582fdf|1400|2 PingFrame[] Padding(1373) 9.816 -> Packet A|2|S0|9a882ca3b204ee91|34|1 AckFrame[5,3-2|Δ19] 9.826 loss detection timeout handler running Sending probe 0, because no ack since 9.732. Current RTT: 32/13. 9.826 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 187 millis, based on 10.014/App, because ackElicitingInFlight | RTT:32/13 9.826 -> Packet PA|3|S0|9a882ca3b204ee91|47|1 StreamFrame[0(CIB),0,17,fin] 9.858 <- (8) Packet A|6|S0|e403ec3dce582fdf|1079|3 AckFrame[3,1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(18) 9.859 Cwnd(-): 6000; inflight: 0 9.859 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.859 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 81 millis, based on 9.941/App, because ackElicitingInFlight | RTT:32/10 9.859 -> Packet A|4|S0|9a882ca3b204ee91|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 9.859 Finished downloading https://server4:443/jnptvlypyz at 07:39.173 on ClientConnection[c5d1ce9c17e6bac5/e403ec3dce582fdf(V1) with server4/193.167.100.100:443] 9.859 Closing ClientConnection[c5d1ce9c17e6bac5/e403ec3dce582fdf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.860 -> Packet A|5|S0|9a882ca3b204ee91|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 9.860 Creating connection with server4:443 with v1 9.861 Setting up connection for downloading https://server4:443/jssguiyhxv at 07:39.175 on ClientConnection[2d01645be74ae51c/c8323651ce895078(V1) with server4/193.167.100.100:443] 9.861 Original destination connection id: 2d01645be74ae51c (scid: c8323651ce895078) >- CryptoStream[I|ClientHello] 9.862 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.062/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.862 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.868 <- (9) Packet A|7|S0|e403ec3dce582fdf|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 9.868 -> Packet A|6|S0|9a882ca3b204ee91|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 9.888 <- (10) Packet A|9|S0|e403ec3dce582fdf|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 9.889 -> Packet A|7|S0|9a882ca3b204ee91|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 9.890 <- (11) Packet A|10|S0|e403ec3dce582fdf|55|2 AckFrame[4-3,1|Δ0] Padding(22) 9.895 <- (1) Packet I|69296|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.896 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.096/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.995/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.898 -> Packet I|1|L|1201|2 Token=[] AckFrame[69296|Δ0] Padding(1150) 9.895 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 9.898 <- (12) Packet A|11|S0|e403ec3dce582fdf|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 9.899 -> Packet A|8|S0|9a882ca3b204ee91|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 9.899 <- (13) Packet A|12|S0|e403ec3dce582fdf|30|1 ConnectionCloseFrame[0|0|] >- CryptoStream[H|Finished] 9.901 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.998/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.901 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.901 Starting downloading https://server4:443/jssguiyhxv at 07:39.215 on ClientConnection[2d01645be74ae51c/c8323651ce895078(V1) with server4/193.167.100.100:443] 9.901 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 9.895 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 9.902 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.999/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.902 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.902 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 96 millis, based on 9.999/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.902 -> Packet A|0|S0|73dd65ed033c9831|47|1 StreamFrame[0(CIB),0,17,fin] 9.896 <- (2) Packet A|0|S0|c8323651ce895078|311|4 CryptoFrame[0,133] NewTokenFrame[e0cac3cf6449e8fe168c9f4cff07531a39bb338d82d6c8003b30af87a05b3d31a4e7d7500367db680686f2b4f05c37605370] NewConnectionIdFrame[1,<0|c44e7558316d5932|ebb35a5f4a8fa062dced535855980b2c] Padding(68) 9.902 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 9.921 -> Packet A|1|S0|73dd65ed033c9831|32|1 AckFrame[0|Δ19] 9.998 loss detection timeout handler running Sending probe 0, because no ack since 9.901. Current RTT: 33/16. 9.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.998 (Probe is a handshake retransmit) 9.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.192/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.998 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 10.029 <- (3) Packet A|2|S0|c8323651ce895078|311|4 CryptoFrame[0,133] NewTokenFrame[e0cac3cf6449e8fe168c9f4cff07531a39bb338d82d6c8003b30af87a05b3d31a4e7d7500367db680686f2b4f05c37605370] NewConnectionIdFrame[1,<0|c44e7558316d5932|ebb35a5f4a8fa062dced535855980b2c] Padding(68) -< CryptoStream[A|NewSessionTicket] 10.029 <- (4) Packet A|3|S0|c8323651ce895078|55|2 HandshakeDoneFrame[] Padding(28) 10.032 State is set to Confirmed reschedule loss detection timer for PTO over 83 millis, based on 10.116/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -23 millis, based on 10.009/App, because ackElicitingInFlight | RTT:33/16 10.032 Discarding pn space Handshake because HandshakeDone is received 10.032 loss detection timeout handler running Sending probe 0, because no ack since 9.902. Current RTT: 33/16. 10.033 (Probe is retransmit on level App) 10.033 -> Packet A|2|S0|73dd65ed033c9831|33|1 AckFrame[3-2,0|Δ0] reschedule loss detection timer for PTO over 213 millis, based on 10.247/App, because ackElicitingInFlight | RTT:33/16 10.033 -> Packet PA|3|S0|73dd65ed033c9831|47|1 StreamFrame[0(CIB),0,17,fin] 10.246 loss detection timeout handler running Sending probe 1, because no ack since 10.033. Current RTT: 33/16. 10.246 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 427 millis, based on 10.675/App, because ackElicitingInFlight | RTT:33/16 10.247 -> Packet PA|4|S0|73dd65ed033c9831|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 427 millis, based on 10.676/App, because ackElicitingInFlight | RTT:33/16 10.248 -> Packet PA|5|S0|73dd65ed033c9831|47|1 StreamFrame[0(CIB),0,17,fin] 10.271 <- (5) Packet A|5|S0|c8323651ce895078|311|4 CryptoFrame[0,133] NewTokenFrame[e0cac3cf6449e8fe168c9f4cff07531a39bb338d82d6c8003b30af87a05b3d31a4e7d7500367db680686f2b4f05c37605370] NewConnectionIdFrame[1,<0|c44e7558316d5932|ebb35a5f4a8fa062dced535855980b2c] Padding(68) -< CryptoStream[A|NewSessionTicket] 10.278 <- (6) Packet A|7|S0|c8323651ce895078|55|2 AckFrame[5|Δ0] Padding(24) 10.279 Cwnd(-): 6000; inflight: 47 10.279 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 10.279 -> Packet A|6|S0|73dd65ed033c9831|57|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5,3-2,0|Δ7] 10.283 loss detection timeout handler running 10.283 loss detection timeout handler running 10.284 loss detection timeout handler running 10.284 loss detection timeout handler running 10.284 loss detection timeout handler running reschedule loss detection timer for PTO over 90 millis, based on 10.374/App, because ackElicitingInFlight | RTT:33/13 10.311 <- (7) Packet A|8|S0|c8323651ce895078|1079|3 AckFrame[6-5|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 10.311 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.312 Finished downloading https://server4:443/jssguiyhxv at 07:39.626 on ClientConnection[2d01645be74ae51c/c8323651ce895078(V1) with server4/193.167.100.100:443] 10.312 Closing ClientConnection[2d01645be74ae51c/c8323651ce895078(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.312 <- (8) Packet A|9|S0|c8323651ce895078|1400|2 PingFrame[] Padding(1373) 10.313 -> Packet A|7|S0|73dd65ed033c9831|35|2 AckFrame[9-7|Δ0] ConnectionCloseFrame[0|0|] 10.313 Creating connection with server4:443 with v1 10.314 Setting up connection for downloading https://server4:443/bdfxdaqpex at 07:39.628 on ClientConnection[e7a4523b95166d50/28243db4814a1c60(V1) with server4/193.167.100.100:443] 10.314 Original destination connection id: e7a4523b95166d50 (scid: 28243db4814a1c60) >- CryptoStream[I|ClientHello] 10.315 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.515/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.315 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.331 <- (9) Packet A|11|S0|c8323651ce895078|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 10.332 -> Packet A|8|S0|73dd65ed033c9831|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-7|Δ0] 10.341 <- (10) Packet A|12|S0|c8323651ce895078|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 10.341 -> Packet A|9|S0|73dd65ed033c9831|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-7|Δ0] 10.343 <- (11) Packet A|13|S0|c8323651ce895078|30|1 ConnectionCloseFrame[0|0|] 10.349 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 10.514 loss detection timeout handler running Sending probe 0, because no ack since 10.315. Current RTT: 100/25. 10.514 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.515 (Probe is an initial retransmit) 10.515 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.915/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.515 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.548 <- (2) Packet I|123218|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 10.551 probe count not reset on ack because handshake not yet confirmed 10.551 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 10.951/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.548 <- (2) Packet H|2|L|1069|2 PingFrame[] Padding(1023) 10.551 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 10.744/Handshake, because peerAwaitingAddressValidation | RTT:32/16 reschedule loss detection timer for PTO over 95 millis, based on 10.648/Handshake, because peerAwaitingAddressValidation | RTT:32/16 10.552 Discarding pn space Initial because first Handshake message is being sent 10.551 -> Packet I|2|L|1201|2 Token=[] AckFrame[123218|Δ0] Padding(1150) 10.552 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 10.647 loss detection timeout handler running 10.647 Sending probe 0. Current RTT: 32/16. 10.647 Sending probe because peer awaiting address validation 10.647 (Probe is a handshake ping) 10.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 10.839/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 10.647 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 10.700 <- (3) Packet H|5|L|823|3 CryptoFrame[0,702] AckFrame[0|Δ115] Padding(66) >- CryptoStream[H|Finished] 10.703 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 10.895/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 10.703 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[2|Δ0] 10.703 Starting downloading https://server4:443/bdfxdaqpex at 07:40.017 on ClientConnection[e7a4523b95166d50/28243db4814a1c60(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.704 probe count not reset on ack because handshake not yet confirmed reschedule loss detection timer for PTO over 191 millis, based on 10.895/Handshake, because ackElicitingInFlight | RTT:32/16 10.704 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 190 millis, based on 10.895/Handshake, because ackElicitingInFlight | RTT:32/16 10.704 -> Packet A|0|S0|a292f55535c618f7|47|1 StreamFrame[0(CIB),0,17,fin] 10.704 -> Packet H|3|L|46|1 AckFrame[5|Δ0] 10.894 loss detection timeout handler running Sending probe 1, because no ack since 10.703. Current RTT: 32/16. 10.894 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 10.895 (Probe is a handshake retransmit) 10.895 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 383 millis, based on 11.279/Handshake, because ackElicitingInFlight | RTT:32/16 10.895 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 10.896 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 383 millis, based on 11.280/Handshake, because ackElicitingInFlight | RTT:32/16 10.896 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 10.928 <- (4) Packet A|3|S0|28243db4814a1c60|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 10.928 State is set to Confirmed reschedule loss detection timer for PTO over 199 millis, based on 11.128/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -118 millis, based on 10.810/App, because ackElicitingInFlight | RTT:32/16 10.929 Discarding pn space Handshake because HandshakeDone is received 10.929 loss detection timeout handler running Sending probe 0, because no ack since 10.704. Current RTT: 32/16. 10.929 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 211 millis, based on 11.141/App, because ackElicitingInFlight | RTT:32/16 10.929 Finished downloading https://server4:443/bdfxdaqpex at 07:40.243 on ClientConnection[e7a4523b95166d50/28243db4814a1c60(V1) with server4/193.167.100.100:443] 10.929 -> Packet PA|1|S0|a292f55535c618f7|47|1 StreamFrame[0(CIB),0,17,fin] 10.929 Closing ClientConnection[e7a4523b95166d50/28243db4814a1c60(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.930 Creating connection with server4:443 with v1 10.930 -> Packet A|2|S0|a292f55535c618f7|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 10.930 Setting up connection for downloading https://server4:443/xdgzruzcyl at 07:40.244 on ClientConnection[3be462410c7316e6/54c76206f533a076(V1) with server4/193.167.100.100:443] 10.930 Original destination connection id: 3be462410c7316e6 (scid: 54c76206f533a076) >- CryptoStream[I|ClientHello] 10.932 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.132/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.932 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.960 <- (5) Packet A|6|S0|28243db4814a1c60|30|1 ConnectionCloseFrame[0|0|] 10.965 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 11.131 loss detection timeout handler running Sending probe 0, because no ack since 10.932. Current RTT: 100/25. 11.131 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.131 (Probe is an initial retransmit) 11.132 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.532/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.132 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.531 loss detection timeout handler running Sending probe 1, because no ack since 11.132. Current RTT: 100/25. 11.531 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.531 (Probe is an initial retransmit) 11.532 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 12.332/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.531 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.532 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 12.332/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.532 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.564 <- (2) Packet I|87324|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[2,0|Δ0] Padding(3) -< CryptoStream[I|ServerHello] 11.567 probe count not reset on ack because handshake not yet confirmed 11.567 Cwnd(-): 6000; inflight: 1200 11.567 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 12.367/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.564 <- (2) Packet H|2|L|1069|2 CryptoFrame[0,703] Padding(317) 11.568 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 11.952/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 11.568 -> Packet I|4|L|1201|2 Token=[] AckFrame[87324|Δ0] Padding(1150) >- CryptoStream[H|Finished] 11.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 11.955/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.571 -> Packet H|0|L|80|1 CryptoFrame[0,36] 11.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 11.667/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 11.571 Discarding pn space Initial because first Handshake message is being sent 11.571 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 11.571 Starting downloading https://server4:443/xdgzruzcyl at 07:40.885 on ClientConnection[3be462410c7316e6/54c76206f533a076(V1) with server4/193.167.100.100:443] 11.572 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 11.668/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 11.572 -> Packet A|0|S0|11e044ba5b22e792|47|1 StreamFrame[0(CIB),0,17,fin] 11.667 loss detection timeout handler running Sending probe 0, because no ack since 11.571. Current RTT: 32/16. 11.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.667 (Probe is a handshake retransmit) 11.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 11.859/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 11.667 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 11.859 loss detection timeout handler running Sending probe 1, because no ack since 11.572. Current RTT: 32/16. 11.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.859 (Probe is a handshake retransmit) 11.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 12.243/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 11.859 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 11.860 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 12.244/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 11.860 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 11.890 <- (3) Packet A|2|S0|54c76206f533a076|311|4 CryptoFrame[0,133] NewTokenFrame[e95c30ea8322244d2e38e6e1d8b8378a94d9635161ccb2b7befd987d522dd659ac8e3c025021b9a31ac6789548290cd44438] NewConnectionIdFrame[1,<0|a6783da20a896320|2ad7bc257188aa097cd292221248b144] Padding(68) -< CryptoStream[A|NewSessionTicket] 11.890 <- (4) Packet A|3|S0|54c76206f533a076|55|2 HandshakeDoneFrame[] Padding(28) 11.891 State is set to Confirmed reschedule loss detection timer for PTO over 104 millis, based on 11.996/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -213 millis, based on 11.678/App, because ackElicitingInFlight | RTT:32/16 11.891 Discarding pn space Handshake because HandshakeDone is received 11.891 loss detection timeout handler running Sending probe 0, because no ack since 11.572. Current RTT: 32/16. 11.892 (Probe is retransmit on level App) 11.892 -> Packet A|1|S0|11e044ba5b22e792|31|1 AckFrame[3-2|Δ0] reschedule loss detection timer for PTO over 211 millis, based on 12.104/App, because ackElicitingInFlight | RTT:32/16 11.892 -> Packet PA|2|S0|11e044ba5b22e792|47|1 StreamFrame[0(CIB),0,17,fin] 12.103 loss detection timeout handler running Sending probe 1, because no ack since 11.892. Current RTT: 32/16. 12.103 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 423 millis, based on 12.528/App, because ackElicitingInFlight | RTT:32/16 12.104 -> Packet PA|3|S0|11e044ba5b22e792|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 423 millis, based on 12.529/App, because ackElicitingInFlight | RTT:32/16 12.105 -> Packet PA|4|S0|11e044ba5b22e792|47|1 StreamFrame[0(CIB),0,17,fin] 12.135 <- (5) Packet A|6|S0|54c76206f533a076|1079|3 AckFrame[3,1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(18) 12.136 Cwnd(-): 3000; inflight: 47 12.136 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 74 millis, based on 12.211/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 12.226/App, because ackElicitingInFlight | RTT:32/12 12.136 -> Packet A|5|S0|11e044ba5b22e792|47|1 StreamFrame[0(CIB),0,17,fin] 12.136 Finished downloading https://server4:443/xdgzruzcyl at 07:41.450 on ClientConnection[3be462410c7316e6/54c76206f533a076(V1) with server4/193.167.100.100:443] 12.136 Closing ClientConnection[3be462410c7316e6/54c76206f533a076(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.137 -> Packet A|6|S0|11e044ba5b22e792|35|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 12.137 Creating connection with server4:443 with v1 12.138 Setting up connection for downloading https://server4:443/vlixsytttm at 07:41.452 on ClientConnection[603621e6dbf2dcd5/6a62756eb4a21078(V1) with server4/193.167.100.100:443] 12.138 Original destination connection id: 603621e6dbf2dcd5 (scid: 6a62756eb4a21078) >- CryptoStream[I|ClientHello] 12.139 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.339/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.139 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.145 <- (6) Packet A|7|S0|54c76206f533a076|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.146 -> Packet A|7|S0|11e044ba5b22e792|35|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 12.155 <- (7) Packet A|8|S0|54c76206f533a076|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.156 -> Packet A|8|S0|11e044ba5b22e792|35|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 12.172 <- (1) Packet I|83920|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.173 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.373/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.172 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 12.175 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.272/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.175 -> Packet I|1|L|1201|2 Token=[] AckFrame[83920|Δ0] Padding(1150) >- CryptoStream[H|Finished] 12.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.275/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.178 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.178 Starting downloading https://server4:443/vlixsytttm at 07:41.492 on ClientConnection[603621e6dbf2dcd5/6a62756eb4a21078(V1) with server4/193.167.100.100:443] 12.178 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.172 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 12.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.179 Discarding pn space Initial because first Handshake message is being sent 12.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.179 -> [Packet H|2|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|83b2c87c3ee687f6|47|1 StreamFrame[0(CIB),0,17,fin]] 12.210 <- (2) Packet A|3|S0|6a62756eb4a21078|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 12.211 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.308/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.212 Finished downloading https://server4:443/vlixsytttm at 07:41.526 on ClientConnection[603621e6dbf2dcd5/6a62756eb4a21078(V1) with server4/193.167.100.100:443] 12.212 Closing ClientConnection[603621e6dbf2dcd5/6a62756eb4a21078(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.212 Creating connection with server4:443 with v1 12.212 -> Packet A|1|S0|83b2c87c3ee687f6|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 12.213 Setting up connection for downloading https://server4:443/rewijjjeso at 07:41.527 on ClientConnection[69c0cd8168a91568/720f679996e49e18(V1) with server4/193.167.100.100:443] 12.213 Original destination connection id: 69c0cd8168a91568 (scid: 720f679996e49e18) >- CryptoStream[I|ClientHello] 12.214 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.414/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.214 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.220 <- (3) Packet A|4|S0|6a62756eb4a21078|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.221 -> Packet A|2|S0|83b2c87c3ee687f6|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 12.241 <- (4) Packet A|6|S0|6a62756eb4a21078|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.241 -> Packet A|3|S0|83b2c87c3ee687f6|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 12.243 <- (5) Packet A|7|S0|6a62756eb4a21078|30|1 ConnectionCloseFrame[0|0|] 12.248 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 12.413 loss detection timeout handler running Sending probe 0, because no ack since 12.214. Current RTT: 100/25. 12.414 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.414 (Probe is an initial retransmit) 12.414 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.814/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.414 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.446 <- (2) Packet I|93349|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 12.449 probe count not reset on ack because handshake not yet confirmed 12.449 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.849/Handshake, because peerAwaitingAddressValidation | RTT:100/25 12.446 <- (2) Packet H|2|L|1069|2 PingFrame[] Padding(1023) 12.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 12.642/Handshake, because peerAwaitingAddressValidation | RTT:32/16 reschedule loss detection timer for PTO over 95 millis, based on 12.546/Handshake, because peerAwaitingAddressValidation | RTT:32/16 12.450 Discarding pn space Initial because first Handshake message is being sent 12.449 -> Packet I|2|L|1201|2 Token=[] AckFrame[93349|Δ0] Padding(1150) 12.450 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 12.545 loss detection timeout handler running 12.545 Sending probe 0. Current RTT: 32/16. 12.545 Sending probe because peer awaiting address validation 12.545 (Probe is a handshake ping) 12.545 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 12.737/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 12.545 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 12.576 <- (3) Packet H|5|L|55|2 AckFrame[1-0|Δ0] Padding(5) 12.576 probe count not reset on ack because handshake not yet confirmed 12.576 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.677 <- (4) Packet H|6|L|823|3 CryptoFrame[0,703] AckFrame[1-0|Δ100] Padding(65) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 167 millis, based on 12.848/Handshake, because ackElicitingInFlight | RTT:32/13 12.680 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[5|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.681 Starting downloading https://server4:443/rewijjjeso at 07:41.995 on ClientConnection[69c0cd8168a91568/720f679996e49e18(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 83 millis, based on 12.764/Handshake, because ackElicitingInFlight | RTT:32/13 12.681 -> Packet H|3|L|46|1 AckFrame[6-5|Δ0] 12.681 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 82 millis, based on 12.764/Handshake, because ackElicitingInFlight | RTT:32/13 12.681 -> Packet A|0|S0|a205a4232fdaa790|47|1 StreamFrame[0(CIB),0,17,fin] 12.764 loss detection timeout handler running Sending probe 0, because no ack since 12.680. Current RTT: 32/13. 12.764 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 12.764 (Probe is a handshake retransmit) 12.764 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 167 millis, based on 12.932/Handshake, because ackElicitingInFlight | RTT:32/13 12.764 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 12.795 <- (5) Packet A|2|S0|720f679996e49e18|311|5 CryptoFrame[0,133] NewTokenFrame[9bbcca3993d77a4d45a3ce5e92f5aa0813371233922c532ab1ebcce80858f0371279bd15bdbeb2a3fe12466c65a3bcaf3c92] NewConnectionIdFrame[1,<0|2eb4c3c7d5fc7df6|feadda6c83ce5f71b78fc019eebb1749] AckFrame[0|Δ83] Padding(62) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 51 millis, based on 12.848/Handshake, because ackElicitingInFlight | RTT:32/13 12.796 <- (6) Packet A|3|S0|720f679996e49e18|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 12.797 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 12.917/Handshake, because ackElicitingInFlight | RTT:41/28 12.797 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.797 Discarding pn space Handshake because HandshakeDone is received 12.797 -> Packet A|1|S0|a205a4232fdaa790|31|1 AckFrame[3-2|Δ0] 12.797 Finished downloading https://server4:443/rewijjjeso at 07:42.111 on ClientConnection[69c0cd8168a91568/720f679996e49e18(V1) with server4/193.167.100.100:443] 12.797 Closing ClientConnection[69c0cd8168a91568/720f679996e49e18(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.798 -> Packet A|2|S0|a205a4232fdaa790|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 12.798 Creating connection with server4:443 with v1 12.798 Setting up connection for downloading https://server4:443/orpsdaziwe at 07:42.113 on ClientConnection[281520a830908d6a/c21d60882d57fbe0(V1) with server4/193.167.100.100:443] 12.799 Original destination connection id: 281520a830908d6a (scid: c21d60882d57fbe0) >- CryptoStream[I|ClientHello] 12.800 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.000/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.800 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.829 <- (7) Packet A|5|S0|720f679996e49e18|1400|2 PingFrame[] Padding(1373) 12.830 -> Packet A|3|S0|a205a4232fdaa790|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 12.833 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 12.999 loss detection timeout handler running Sending probe 0, because no ack since 12.800. Current RTT: 100/25. 12.999 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.999 (Probe is an initial retransmit) 13.000 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.400/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.000 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.283 <- (2) Packet I|115127|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ250] Padding(2) -< CryptoStream[I|ServerHello] 13.286 probe count not reset on ack because handshake not yet confirmed 13.286 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 13.686/Handshake, because peerAwaitingAddressValidation | RTT:100/25 13.283 <- (2) Packet H|3|L|1069|2 PingFrame[] Padding(1023) 13.286 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.286 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 846 millis, based on 14.133/Handshake, because peerAwaitingAddressValidation | RTT:283/141 13.286 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 846 millis, based on 14.133/Handshake, because peerAwaitingAddressValidation | RTT:283/141 13.286 -> Packet I|2|L|1201|2 Token=[] AckFrame[115127|Δ0] Padding(1150) 13.287 -> Packet H|0|L|46|1 AckFrame[3|Δ0] 13.550 <- (3) Packet H|8|L|823|2 CryptoFrame[0,702] Padding(72) >- CryptoStream[H|Finished] 13.553 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 846 millis, based on 14.400/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:283/141 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.553 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] 13.553 Starting downloading https://server4:443/orpsdaziwe at 07:42.867 on ClientConnection[281520a830908d6a/c21d60882d57fbe0(V1) with server4/193.167.100.100:443] 13.553 -> Packet H|2|L|48|1 AckFrame[8,3|Δ0] 13.554 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 846 millis, based on 14.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:283/141 13.554 -> Packet A|0|S0|3a20480a60015ca6|47|1 StreamFrame[0(CIB),0,17,fin] 13.584 <- (4) Packet A|3|S0|c21d60882d57fbe0|55|2 HandshakeDoneFrame[] Padding(28) 13.585 State is set to Confirmed reschedule loss detection timer for PTO over 815 millis, based on 14.400/Handshake, because ackElicitingInFlight | RTT:283/141 reschedule loss detection timer for PTO over 826 millis, based on 14.411/App, because ackElicitingInFlight | RTT:283/141 13.585 Discarding pn space Handshake because HandshakeDone is received 13.604 -> Packet A|1|S0|3a20480a60015ca6|32|1 AckFrame[3|Δ19] 13.646 <- (5) Packet A|8|S0|c21d60882d57fbe0|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 13.646 Finished downloading https://server4:443/orpsdaziwe at 07:42.960 on ClientConnection[281520a830908d6a/c21d60882d57fbe0(V1) with server4/193.167.100.100:443] 13.646 Closing ClientConnection[281520a830908d6a/c21d60882d57fbe0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.647 -> Packet A|2|S0|3a20480a60015ca6|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3|Δ0] 13.647 Creating connection with server4:443 with v1 13.647 Setting up connection for downloading https://server4:443/dxglyribwb at 07:42.962 on ClientConnection[508fd56c0f172b38/11d335be4196c733(V1) with server4/193.167.100.100:443] 13.648 Original destination connection id: 508fd56c0f172b38 (scid: 11d335be4196c733) >- CryptoStream[I|ClientHello] 13.649 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.849/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.649 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.656 <- (6) Packet A|9|S0|c21d60882d57fbe0|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 13.656 -> Packet A|3|S0|3a20480a60015ca6|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3|Δ0] 13.665 <- (7) Packet A|10|S0|c21d60882d57fbe0|311|5 CryptoFrame[0,133] NewTokenFrame[c8242845983a7b8708a35f75dcb3863296e8713b288cd500eb536391a1945aaacce09685b13c2ec379fb29231c86e24a313f] NewConnectionIdFrame[1,<0|4ffc54ead4eb4fd8|6d22141a85a16f53251def8459ec3546] AckFrame[1-0|Δ30] Padding(62) 13.666 -> Packet A|4|S0|3a20480a60015ca6|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3|Δ0] 13.666 <- (8) Packet A|11|S0|c21d60882d57fbe0|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 13.682 <- (1) Packet I|70542|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.683 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.883/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.682 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 13.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.782/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.685 -> Packet I|1|L|1201|2 Token=[] AckFrame[70542|Δ0] Padding(1150) 13.686 <- (9) Packet A|13|S0|c21d60882d57fbe0|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 13.687 -> Packet A|5|S0|3a20480a60015ca6|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3|Δ0] 13.687 <- (10) Packet A|14|S0|c21d60882d57fbe0|30|1 ConnectionCloseFrame[0|0|] >- CryptoStream[H|Finished] 13.688 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.785/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.688 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.688 Starting downloading https://server4:443/dxglyribwb at 07:43.002 on ClientConnection[508fd56c0f172b38/11d335be4196c733(V1) with server4/193.167.100.100:443] 13.682 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 13.688 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.688 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 13.785/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.689 Discarding pn space Initial because first Handshake message is being sent 13.689 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 13.682 <- (2) Packet A|0|S0|11d335be4196c733|311|4 CryptoFrame[0,133] NewTokenFrame[f0584b59ff080e6fbe436d98f13424daedc99459af7572a6cc581996dc72f94b8438974bde47b1975cc9a18393b349f640a3] NewConnectionIdFrame[1,<0|901711bf06de078e|df9f03fab708f7a54184b4db393fe74f] Padding(68) -< CryptoStream[A|NewSessionTicket] 13.689 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.786/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.689 -> Packet A|0|S0|2680e3c83201ce6d|47|1 StreamFrame[0(CIB),0,17,fin] 13.708 -> Packet A|1|S0|2680e3c83201ce6d|32|1 AckFrame[0|Δ19] 13.785 loss detection timeout handler running Sending probe 0, because no ack since 13.688. Current RTT: 33/16. 13.785 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.785 (Probe is a handshake retransmit) 13.786 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.980/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.786 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 13.979 loss detection timeout handler running Sending probe 1, because no ack since 13.689. Current RTT: 33/16. 13.979 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.979 (Probe is a handshake retransmit) 13.980 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 14.368/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.980 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 13.981 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 14.369/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.981 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 14.060 <- (3) Packet A|5|S0|11d335be4196c733|55|3 HandshakeDoneFrame[] AckFrame[1|Δ321] Padding(20) 14.061 State is set to Confirmed reschedule loss detection timer for PTO over 56 millis, based on 14.117/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -264 millis, based on 13.796/App, because ackElicitingInFlight | RTT:33/16 14.061 loss detection timeout handler running 14.061 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 13.689. Current RTT: 33/16. 14.061 (Probe is retransmit on level App) 14.061 Cwnd(-): 6000; inflight: 0 14.061 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 106 millis, based on 14.168/App, because ackElicitingInFlight | RTT:33/16 14.061 -> Packet PA|2|S0|2680e3c83201ce6d|47|1 StreamFrame[0(CIB),0,17,fin] 14.061 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 106 millis, based on 14.168/App, because ackElicitingInFlight | RTT:33/16 14.061 -> Packet A|3|S0|2680e3c83201ce6d|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 14.094 <- (4) Packet A|9|S0|11d335be4196c733|1400|2 PingFrame[] Padding(1373) 14.103 <- (5) Packet A|10|S0|11d335be4196c733|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 14.104 -> Packet A|4|S0|2680e3c83201ce6d|34|1 AckFrame[10-9,5|Δ9] 14.104 Finished downloading https://server4:443/dxglyribwb at 07:43.418 on ClientConnection[508fd56c0f172b38/11d335be4196c733(V1) with server4/193.167.100.100:443] 14.104 Closing ClientConnection[508fd56c0f172b38/11d335be4196c733(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.104 -> Packet A|5|S0|2680e3c83201ce6d|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,5|Δ0] 14.104 Creating connection with server4:443 with v1 14.105 Setting up connection for downloading https://server4:443/mparopmtxi at 07:43.419 on ClientConnection[5bf9905b06b0f2eb/24fa5362c4efe1e0(V1) with server4/193.167.100.100:443] 14.105 Original destination connection id: 5bf9905b06b0f2eb (scid: 24fa5362c4efe1e0) >- CryptoStream[I|ClientHello] 14.106 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.306/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.106 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.113 <- (6) Packet A|11|S0|11d335be4196c733|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 14.113 -> Packet A|6|S0|2680e3c83201ce6d|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,5|Δ0] 14.123 <- (7) Packet A|12|S0|11d335be4196c733|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 14.124 -> Packet A|7|S0|2680e3c83201ce6d|37|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,5|Δ0] 14.133 <- (8) Packet A|13|S0|11d335be4196c733|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 14.139 <- (1) Packet I|101013|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.140 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.340/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.142 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.239/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.139 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 14.142 -> Packet I|1|L|1201|2 Token=[] AckFrame[101013|Δ0] Padding(1150) 14.144 <- (9) Packet A|15|S0|11d335be4196c733|30|1 ConnectionCloseFrame[0|0|] >- CryptoStream[H|Finished] 14.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.242/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.145 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.145 Starting downloading https://server4:443/mparopmtxi at 07:43.459 on ClientConnection[5bf9905b06b0f2eb/24fa5362c4efe1e0(V1) with server4/193.167.100.100:443] 14.139 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 14.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.242/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.145 Discarding pn space Initial because first Handshake message is being sent 14.140 <- (2) Packet A|0|S0|24fa5362c4efe1e0|311|4 CryptoFrame[0,133] NewTokenFrame[8f40229adf97ca6b69447f68334925458cb7080fe29b1f3267a4a3d235d3e75a3b2d90ed29336a1f14e0ff676ecd61b83d66] NewConnectionIdFrame[1,<0|7687ed96556ff499|4da4c8e0c264d2934857583ea6b6a568] Padding(68) -< CryptoStream[A|NewSessionTicket] 14.145 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 14.146 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.243/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.146 -> [Packet H|2|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|84fcbc055b4aa490|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 14.242 loss detection timeout handler running Sending probe 0, because no ack since 14.145. Current RTT: 33/16. 14.242 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.242 (Probe is a handshake retransmit) 14.243 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.437/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.243 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 14.274 <- (3) Packet A|2|S0|24fa5362c4efe1e0|1079|4 AckFrame[0|Δ96] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(18) 14.275 probe count not reset on ack because handshake not yet confirmed 14.275 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.469/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.275 State is set to Confirmed reschedule loss detection timer for PTO over 319 millis, based on 14.595/Handshake, because ackElicitingInFlight | RTT:44/33 14.275 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.275 Discarding pn space Handshake because HandshakeDone is received 14.276 Finished downloading https://server4:443/mparopmtxi at 07:43.590 on ClientConnection[5bf9905b06b0f2eb/24fa5362c4efe1e0(V1) with server4/193.167.100.100:443] 14.276 Closing ClientConnection[5bf9905b06b0f2eb/24fa5362c4efe1e0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.276 <- (4) Packet A|3|S0|24fa5362c4efe1e0|1400|2 PingFrame[] Padding(1373) 14.276 -> Packet A|1|S0|84fcbc055b4aa490|31|1 AckFrame[3-2|Δ0] 14.276 -> Packet A|2|S0|84fcbc055b4aa490|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 14.277 Creating connection with server4:443 with v1 14.277 Setting up connection for downloading https://server4:443/gfhsxyggvr at 07:43.591 on ClientConnection[97a1271c9b78dd9b/24f8325b74e585d6(V1) with server4/193.167.100.100:443] 14.277 Original destination connection id: 97a1271c9b78dd9b (scid: 24f8325b74e585d6) >- CryptoStream[I|ClientHello] 14.279 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.479/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.279 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.284 <- (5) Packet A|4|S0|24fa5362c4efe1e0|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 14.285 -> Packet A|3|S0|84fcbc055b4aa490|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 14.478 loss detection timeout handler running Sending probe 0, because no ack since 14.279. Current RTT: 100/25. 14.478 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.478 (Probe is an initial retransmit) 14.479 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.879/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.478 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.511 <- (1) Packet I|112504|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 14.514 probe count not reset on ack because handshake not yet confirmed 14.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 14.914/Handshake, because peerAwaitingAddressValidation | RTT:100/25 14.511 <- (1) Packet H|2|L|1069|2 PingFrame[] Padding(1023) 14.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 14.706/Handshake, because peerAwaitingAddressValidation | RTT:32/16 14.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.610/Handshake, because peerAwaitingAddressValidation | RTT:32/16 14.514 -> Packet I|2|L|1201|2 Token=[] AckFrame[112504|Δ0] Padding(1150) 14.514 Discarding pn space Initial because first Handshake message is being sent 14.515 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 14.609 loss detection timeout handler running 14.610 Sending probe 0. Current RTT: 32/16. 14.610 Sending probe because peer awaiting address validation 14.610 (Probe is a handshake ping) 14.610 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 14.802/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.610 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 14.617 <- (6) Packet A|6|S0|24fa5362c4efe1e0|1400|2 PingFrame[] Padding(1373) 14.618 -> Packet A|4|S0|84fcbc055b4aa490|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 14.661 <- (2) Packet H|5|L|823|3 CryptoFrame[0,702] AckFrame[0|Δ114] Padding(66) >- CryptoStream[H|Finished] 14.664 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 14.856/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.664 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[2|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.664 probe count not reset on ack because handshake not yet confirmed 14.664 Starting downloading https://server4:443/gfhsxyggvr at 07:43.978 on ClientConnection[97a1271c9b78dd9b/24f8325b74e585d6(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 191 millis, based on 14.856/Handshake, because ackElicitingInFlight | RTT:32/16 14.664 -> Packet H|3|L|46|1 AckFrame[5|Δ0] 14.665 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 190 millis, based on 14.856/Handshake, because ackElicitingInFlight | RTT:32/16 14.665 -> Packet A|0|S0|0144d96186857289|47|1 StreamFrame[0(CIB),0,17,fin] 14.695 <- (3) Packet A|2|S0|24f8325b74e585d6|311|4 CryptoFrame[0,133] NewTokenFrame[d9a5e3c56cb8b90b7cc5391c90fe710205005d5dd330fa0b61c636097aa31d908397eb2592c000925279fc93bbd2a7ffc03f] NewConnectionIdFrame[1,<0|e19383085a086209|6bfc4945a58d3f74f6722275bfb93271] Padding(68) -< CryptoStream[A|NewSessionTicket] 14.698 <- (4) Packet A|5|S0|24f8325b74e585d6|55|2 AckFrame[0|Δ3] Padding(23) reschedule loss detection timer for PTO over 60 millis, based on 14.760/Handshake, because ackElicitingInFlight | RTT:32/16 14.715 -> Packet A|1|S0|0144d96186857289|34|1 AckFrame[5,2|Δ19] 14.748 <- (5) Packet A|7|S0|24f8325b74e585d6|1400|2 PingFrame[] Padding(1373) 14.757 <- (6) Packet A|8|S0|24f8325b74e585d6|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 14.757 -> Packet A|2|S0|0144d96186857289|36|1 AckFrame[8-7,5,2|Δ8] 14.757 Finished downloading https://server4:443/gfhsxyggvr at 07:44.071 on ClientConnection[97a1271c9b78dd9b/24f8325b74e585d6(V1) with server4/193.167.100.100:443] 14.757 Closing ClientConnection[97a1271c9b78dd9b/24f8325b74e585d6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.758 -> Packet A|3|S0|0144d96186857289|39|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5,2|Δ0] 14.758 Creating connection with server4:443 with v1 14.759 Setting up connection for downloading https://server4:443/axtlttykbx at 07:44.073 on ClientConnection[1c314c13b0f74ea8/2ffa4b35d056b252(V1) with server4/193.167.100.100:443] 14.759 Original destination connection id: 1c314c13b0f74ea8 (scid: 2ffa4b35d056b252) >- CryptoStream[I|ClientHello] 14.760 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.960/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.760 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.772 <- (7) Packet A|10|S0|24f8325b74e585d6|55|3 HandshakeDoneFrame[] AckFrame[1-0|Δ26] Padding(22) 14.773 -> Packet A|4|S0|0144d96186857289|39|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5,2|Δ0] 14.773 <- (8) Packet A|11|S0|24f8325b74e585d6|1400|2 PingFrame[] Padding(1373) 14.774 -> Packet A|5|S0|0144d96186857289|39|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5,2|Δ0] 14.777 <- (9) Packet A|12|S0|24f8325b74e585d6|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 14.787 <- (10) Packet A|13|S0|24f8325b74e585d6|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 14.788 -> Packet A|6|S0|0144d96186857289|39|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5,2|Δ0] 14.793 <- (1) Packet I|115711|L|178|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.794 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.994/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.793 <- (1) Packet H|0|L|752|1 CryptoFrame[0,703] 14.796 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.892/Handshake, because peerAwaitingAddressValidation | RTT:32/16 14.796 -> Packet I|1|L|1201|2 Token=[] AckFrame[115711|Δ0] Padding(1150) >- CryptoStream[H|Finished] 14.798 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 95 millis, based on 14.894/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.798 -> Packet H|0|L|80|1 CryptoFrame[0,36] 14.793 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 14.798 Starting downloading https://server4:443/axtlttykbx at 07:44.112 on ClientConnection[1c314c13b0f74ea8/2ffa4b35d056b252(V1) with server4/193.167.100.100:443] 14.798 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.798 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 95 millis, based on 14.895/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.799 Discarding pn space Initial because first Handshake message is being sent 14.799 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.895/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.799 -> [Packet H|2|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|936b40644dc62216|47|1 StreamFrame[0(CIB),0,17,fin]] 14.894 loss detection timeout handler running Sending probe 0, because no ack since 14.798. Current RTT: 32/16. 14.895 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.895 (Probe is a handshake retransmit) 14.895 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 15.087/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.895 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 14.926 <- (2) Packet A|2|S0|2ffa4b35d056b252|311|5 CryptoFrame[0,133] NewTokenFrame[87f7169135c8aa36ff04581209d40e9b8f41efbd9bbc7e0920c21d62278aae9d1182954c0d78fae063a3b0436081e19a8246] NewConnectionIdFrame[1,<0|e22f51cdaff22bae|d6cf72db4923db3521fcf4eba461e1d2] AckFrame[0|Δ95] Padding(62) -< CryptoStream[A|NewSessionTicket] 14.927 probe count not reset on ack because handshake not yet confirmed 14.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 15.119/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.927 <- (3) Packet A|3|S0|2ffa4b35d056b252|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 14.927 State is set to Confirmed reschedule loss detection timer for PTO over 317 millis, based on 15.245/Handshake, because ackElicitingInFlight | RTT:43/33 14.928 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.928 Discarding pn space Handshake because HandshakeDone is received 14.928 -> Packet A|1|S0|936b40644dc62216|31|1 AckFrame[3-2|Δ0] 14.928 Finished downloading https://server4:443/axtlttykbx at 07:44.242 on ClientConnection[1c314c13b0f74ea8/2ffa4b35d056b252(V1) with server4/193.167.100.100:443] 14.928 Closing ClientConnection[1c314c13b0f74ea8/2ffa4b35d056b252(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.928 -> Packet A|2|S0|936b40644dc62216|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 14.929 Creating connection with server4:443 with v1 14.929 Setting up connection for downloading https://server4:443/vbzrpwbler at 07:44.243 on ClientConnection[79615c5679e77221/a7d17c7f25ee086c(V1) with server4/193.167.100.100:443] 14.929 Original destination connection id: 79615c5679e77221 (scid: a7d17c7f25ee086c) >- CryptoStream[I|ClientHello] 14.930 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.130/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.930 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.960 <- (4) Packet A|5|S0|2ffa4b35d056b252|1400|2 PingFrame[] Padding(1373) 14.960 <- (5) Packet A|6|S0|2ffa4b35d056b252|30|1 ConnectionCloseFrame[0|0|] 14.960 -> Packet A|3|S0|936b40644dc62216|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 15.130 loss detection timeout handler running Sending probe 0, because no ack since 14.930. Current RTT: 100/25. 15.130 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.130 (Probe is an initial retransmit) 15.130 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.530/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.130 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.163 <- (1) Packet I|123381|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 15.164 probe count not reset on ack because handshake not yet confirmed 15.164 Retransmitting CryptoFrame[0,257] on level Initial 15.164 Cwnd(-): 6000; inflight: 0 15.164 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.564/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.164 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 15.358/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.164 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 15.163 <- (1) Packet H|0|L|752|1 CryptoFrame[0,703] 15.166 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.360/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.166 -> Packet I|3|L|1201|2 Token=[] AckFrame[123381|Δ0] Padding(1150) >- CryptoStream[H|Finished] 15.169 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.363/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.169 -> Packet H|0|L|80|1 CryptoFrame[0,36] 15.163 <- (1) Packet H|1|L|321|2 PingFrame[] Padding(275) 15.169 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 15.169 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.266/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.169 Discarding pn space Initial because first Handshake message is being sent 15.169 Starting downloading https://server4:443/vbzrpwbler at 07:44.483 on ClientConnection[79615c5679e77221/a7d17c7f25ee086c(V1) with server4/193.167.100.100:443] 15.169 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 15.164 <- (2) Packet A|0|S0|a7d17c7f25ee086c|311|4 CryptoFrame[0,133] NewTokenFrame[e32580a2055e1221b64b3968e2355355ad5759efb7f65b48d241c5d15d4a6fec2a8aaab46ea9a5e01b2f5ced39f165cbd608] NewConnectionIdFrame[1,<0|8750808772fa8722|aac8d4bfdf1e10209f6d4f2338e73fcf] Padding(68) -< CryptoStream[A|NewSessionTicket] 15.170 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.267/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.169 -> Packet A|0|S0|2e9fd73d00f2f6cb|47|1 StreamFrame[0(CIB),0,17,fin] 15.189 -> Packet A|1|S0|2e9fd73d00f2f6cb|32|1 AckFrame[0|Δ19] 15.199 <- (3) Packet A|2|S0|a7d17c7f25ee086c|55|2 HandshakeDoneFrame[] Padding(28) 15.199 State is set to Confirmed reschedule loss detection timer for PTO over 66 millis, based on 15.266/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 15.276/App, because ackElicitingInFlight | RTT:33/16 15.200 Discarding pn space Handshake because HandshakeDone is received 15.219 -> Packet A|2|S0|2e9fd73d00f2f6cb|34|1 AckFrame[2,0|Δ19] 15.251 <- (4) Packet A|3|S0|a7d17c7f25ee086c|1400|2 PingFrame[] Padding(1373) 15.270 -> Packet A|3|S0|2e9fd73d00f2f6cb|34|1 AckFrame[3-2,0|Δ19] 15.276 loss detection timeout handler running Sending probe 0, because no ack since 15.169. Current RTT: 33/16. 15.276 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 15.490/App, because ackElicitingInFlight | RTT:33/16 15.276 -> Packet PA|4|S0|2e9fd73d00f2f6cb|47|1 StreamFrame[0(CIB),0,17,fin] 15.307 <- (5) Packet A|4|S0|a7d17c7f25ee086c|1079|3 AckFrame[4,2|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(18) 15.308 Cwnd(-): 3000; inflight: 0 15.308 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.308 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 15.403/App, because ackElicitingInFlight | RTT:33/13 15.308 -> Packet A|5|S0|2e9fd73d00f2f6cb|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 15.308 Finished downloading https://server4:443/vbzrpwbler at 07:44.622 on ClientConnection[79615c5679e77221/a7d17c7f25ee086c(V1) with server4/193.167.100.100:443] 15.309 Closing ClientConnection[79615c5679e77221/a7d17c7f25ee086c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.309 -> Packet A|6|S0|2e9fd73d00f2f6cb|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 15.309 Creating connection with server4:443 with v1 15.310 Setting up connection for downloading https://server4:443/ojnsapgeyv at 07:44.624 on ClientConnection[6222edd574a2696f/fa650382ec8f4a69(V1) with server4/193.167.100.100:443] 15.310 Original destination connection id: 6222edd574a2696f (scid: fa650382ec8f4a69) >- CryptoStream[I|ClientHello] 15.311 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.511/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.311 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.328 <- (6) Packet A|6|S0|a7d17c7f25ee086c|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 15.328 -> Packet A|7|S0|2e9fd73d00f2f6cb|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 15.338 <- (7) Packet A|7|S0|a7d17c7f25ee086c|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 15.338 -> Packet A|8|S0|2e9fd73d00f2f6cb|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 15.339 <- (8) Packet A|8|S0|a7d17c7f25ee086c|55|2 AckFrame[5-4,2|Δ0] Padding(22) 15.339 <- (9) Packet A|9|S0|a7d17c7f25ee086c|30|1 ConnectionCloseFrame[0|0|] 15.510 loss detection timeout handler running Sending probe 0, because no ack since 15.311. Current RTT: 100/25. 15.510 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.510 (Probe is an initial retransmit) 15.511 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.911/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.510 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.910 loss detection timeout handler running Sending probe 1, because no ack since 15.510. Current RTT: 100/25. 15.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.910 (Probe is an initial retransmit) 15.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.710/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.910 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.911 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.711/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.911 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.943 <- (1) Packet I|66764|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[2-1|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 15.946 probe count not reset on ack because handshake not yet confirmed 15.946 Retransmitting CryptoFrame[0,257] on level Initial 15.946 Cwnd(-): 6000; inflight: 1200 15.946 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 16.746/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.946 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 16.330/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.946 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.943 <- (1) Packet H|2|L|1069|2 CryptoFrame[0,703] Padding(317) 15.947 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 16.331/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.946 -> Packet I|5|L|1201|2 Token=[] AckFrame[66764|Δ0] Padding(1150) >- CryptoStream[H|Finished] 15.949 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 16.333/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.949 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.949 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.949 Starting downloading https://server4:443/ojnsapgeyv at 07:45.263 on ClientConnection[6222edd574a2696f/fa650382ec8f4a69(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 16.045/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.949 Discarding pn space Initial because first Handshake message is being sent 15.949 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 15.949 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.950 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 16.046/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.950 -> Packet A|0|S0|9bd32b23d7a5d95c|47|1 StreamFrame[0(CIB),0,17,fin] 15.979 <- (3) Packet H|4|L|55|2 PingFrame[] Padding(9) 15.979 -> Packet H|2|L|48|1 AckFrame[4,2|Δ0] 15.980 <- (4) Packet A|2|S0|fa650382ec8f4a69|311|4 CryptoFrame[0,133] NewTokenFrame[c0c9fdf50b70d92e9a89348b8e5ef595c35236fbc17e3e655e6ab01e8777cb8a619d92d8cf686836bb0460e90c572437050c] NewConnectionIdFrame[1,<0|f6bde13ec1a64f11|b31e28a8d26f8a76c84e1eefebf2dc9f] Padding(68) -< CryptoStream[A|NewSessionTicket] 15.980 <- (5) Packet A|3|S0|fa650382ec8f4a69|55|2 HandshakeDoneFrame[] Padding(28) 15.980 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 16.045/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 75 millis, based on 16.056/App, because ackElicitingInFlight | RTT:32/16 15.980 Discarding pn space Handshake because HandshakeDone is received 15.981 -> Packet A|1|S0|9bd32b23d7a5d95c|31|1 AckFrame[3-2|Δ0] 16.012 <- (6) Packet A|6|S0|fa650382ec8f4a69|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 16.013 Finished downloading https://server4:443/ojnsapgeyv at 07:45.327 on ClientConnection[6222edd574a2696f/fa650382ec8f4a69(V1) with server4/193.167.100.100:443] 16.013 Closing ClientConnection[6222edd574a2696f/fa650382ec8f4a69(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.013 <- (7) Packet A|7|S0|fa650382ec8f4a69|1400|2 PingFrame[] Padding(1373) 16.014 -> Packet A|2|S0|9bd32b23d7a5d95c|41|3 ConnectionCloseFrame[0|0|] AckFrame[6,3-2|Δ0] ConnectionCloseFrame[0|0|] 16.014 Creating connection with server4:443 with v1 16.014 Setting up connection for downloading https://server4:443/ycbdqbahlv at 07:45.328 on ClientConnection[4a3b926e5f658341/3b59007fe8732ead(V1) with server4/193.167.100.100:443] 16.015 Original destination connection id: 4a3b926e5f658341 (scid: 3b59007fe8732ead) >- CryptoStream[I|ClientHello] 16.016 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.216/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.016 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.032 <- (8) Packet A|9|S0|fa650382ec8f4a69|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 16.033 -> Packet A|3|S0|9bd32b23d7a5d95c|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3-2|Δ0] 16.042 <- (9) Packet A|10|S0|fa650382ec8f4a69|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 16.049 <- (1) Packet I|76985|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.050 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.250/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.049 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 16.052 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.149/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.052 -> Packet I|1|L|1201|2 Token=[] AckFrame[76985|Δ0] Padding(1150) 16.052 <- (10) Packet A|11|S0|fa650382ec8f4a69|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 16.053 -> Packet A|4|S0|9bd32b23d7a5d95c|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3-2|Δ0] >- CryptoStream[H|Finished] 16.054 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.151/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.054 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.049 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 16.055 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 16.055 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.152/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.055 Starting downloading https://server4:443/ycbdqbahlv at 07:45.369 on ClientConnection[4a3b926e5f658341/3b59007fe8732ead(V1) with server4/193.167.100.100:443] 16.055 Discarding pn space Initial because first Handshake message is being sent 16.055 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 16.055 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.152/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.055 -> Packet A|0|S0|91bb25a70c250ebb|47|1 StreamFrame[0(CIB),0,17,fin] 16.062 <- (11) Packet A|12|S0|fa650382ec8f4a69|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 16.152 loss detection timeout handler running Sending probe 0, because no ack since 16.054. Current RTT: 33/16. 16.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.152 (Probe is a handshake retransmit) 16.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 16.346/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.152 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 16.336 <- (2) Packet A|3|S0|3b59007fe8732ead|311|4 CryptoFrame[0,133] NewTokenFrame[dd38f51d5079bf62941765d494f53822164f8be1d78cc975ba900fd1715ceb95690eb556f40a7a606995a5ccca83454d40a7] NewConnectionIdFrame[1,<0|e541772780f49af0|d87fc4a5088d542666151d9a20d8b3db] Padding(68) -< CryptoStream[A|NewSessionTicket] 16.345 loss detection timeout handler running Sending probe 1, because no ack since 16.055. Current RTT: 33/16. 16.345 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.345 (Probe is a handshake retransmit) 16.346 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.345 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 16.346 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.735/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.346 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 16.356 -> Packet A|1|S0|91bb25a70c250ebb|32|1 AckFrame[3|Δ19] 16.734 loss detection timeout handler running Sending probe 2, because no ack since 16.055. Current RTT: 33/16. 16.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.734 (Probe is a handshake retransmit) 16.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 17.510/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.734 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 16.735 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 17.511/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.735 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 16.836 <- (3) Packet A|5|S0|3b59007fe8732ead|55|2 HandshakeDoneFrame[] Padding(28) 16.837 State is set to Confirmed reschedule loss detection timer for PTO over 74 millis, based on 16.911/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -674 millis, based on 16.162/App, because ackElicitingInFlight | RTT:33/16 16.837 Discarding pn space Handshake because HandshakeDone is received 16.837 loss detection timeout handler running Sending probe 0, because no ack since 16.055. Current RTT: 33/16. 16.837 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 17.051/App, because ackElicitingInFlight | RTT:33/16 16.837 -> Packet PA|2|S0|91bb25a70c250ebb|47|1 StreamFrame[0(CIB),0,17,fin] 16.856 -> Packet A|3|S0|91bb25a70c250ebb|34|1 AckFrame[5,3|Δ19] 16.868 <- (4) Packet A|7|S0|3b59007fe8732ead|55|2 AckFrame[2|Δ0] Padding(24) 16.868 Cwnd(-): 6000; inflight: 0 16.868 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.868 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 16.963/App, because ackElicitingInFlight | RTT:33/13 16.868 -> Packet A|4|S0|91bb25a70c250ebb|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5,3|Δ0] 16.889 <- (5) Packet A|9|S0|3b59007fe8732ead|1400|2 PingFrame[] Padding(1373) 16.901 <- (6) Packet A|11|S0|3b59007fe8732ead|55|2 AckFrame[4-2|Δ1] Padding(23) 16.901 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.908 <- (7) Packet A|12|S0|3b59007fe8732ead|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 16.909 -> Packet A|5|S0|91bb25a70c250ebb|36|1 AckFrame[12-11,9,7|Δ19] 16.909 Finished downloading https://server4:443/ycbdqbahlv at 07:46.223 on ClientConnection[4a3b926e5f658341/3b59007fe8732ead(V1) with server4/193.167.100.100:443] 16.909 Closing ClientConnection[4a3b926e5f658341/3b59007fe8732ead(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.909 -> Packet A|6|S0|91bb25a70c250ebb|39|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,9,7|Δ0] 16.910 Creating connection with server4:443 with v1 16.910 Setting up connection for downloading https://server4:443/owhezwqsvw at 07:46.224 on ClientConnection[4ef7e9bf2121a943/2961a322e1e80047(V1) with server4/193.167.100.100:443] 16.910 Original destination connection id: 4ef7e9bf2121a943 (scid: 2961a322e1e80047) >- CryptoStream[I|ClientHello] 16.911 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.111/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.911 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.918 <- (8) Packet A|13|S0|3b59007fe8732ead|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 16.919 -> Packet A|7|S0|91bb25a70c250ebb|39|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,9,7|Δ0] 16.928 <- (9) Packet A|14|S0|3b59007fe8732ead|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 16.929 -> Packet A|8|S0|91bb25a70c250ebb|39|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,9,7|Δ0] 16.938 <- (10) Packet A|15|S0|3b59007fe8732ead|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 16.940 <- (11) Packet A|16|S0|3b59007fe8732ead|31|1 ConnectionCloseFrame[0|0|] 16.944 <- (1) Packet I|125606|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.945 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.145/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.944 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 16.947 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.044/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.947 -> Packet I|1|L|1201|2 Token=[] AckFrame[125606|Δ0] Padding(1150) >- CryptoStream[H|Finished] 16.950 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.047/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.950 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.950 Starting downloading https://server4:443/owhezwqsvw at 07:46.264 on ClientConnection[4ef7e9bf2121a943/2961a322e1e80047(V1) with server4/193.167.100.100:443] 16.944 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 16.950 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 16.950 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.047/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.950 Discarding pn space Initial because first Handshake message is being sent 16.950 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 16.951 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.048/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.945 <- (2) Packet A|0|S0|2961a322e1e80047|311|4 CryptoFrame[0,133] NewTokenFrame[9e2fc898e6551a4e4efb49e466c4a443e993c516297923d88aaf9fd667b8fbb7149626ff10e78dd29f24b817b8710e519a92] NewConnectionIdFrame[1,<0|86f6a5c6bf11fded|344668fb21dda66c7fd73660f4a69d53] Padding(68) 16.951 -> Packet A|0|S0|f50876c05da82a97|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 16.970 -> Packet A|1|S0|f50876c05da82a97|32|1 AckFrame[0|Δ19] 17.047 loss detection timeout handler running Sending probe 0, because no ack since 16.950. Current RTT: 33/16. 17.047 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.047 (Probe is a handshake retransmit) 17.048 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.242/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.047 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 17.058 <- (3) Packet H|2|L|823|2 CryptoFrame[0,701] Padding(73) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.058 -> Packet H|4|L|46|1 AckFrame[2-0|Δ0] 17.079 <- (4) Packet A|2|S0|2961a322e1e80047|1079|4 AckFrame[1-0|Δ77] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(18) 17.080 probe count not reset on ack because handshake not yet confirmed 17.080 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.274/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.080 State is set to Confirmed reschedule loss detection timer for PTO over 161 millis, based on 17.241/Handshake, because ackElicitingInFlight | RTT:33/16 17.080 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.080 Discarding pn space Handshake because HandshakeDone is received 17.080 Finished downloading https://server4:443/owhezwqsvw at 07:46.394 on ClientConnection[4ef7e9bf2121a943/2961a322e1e80047(V1) with server4/193.167.100.100:443] 17.080 Closing ClientConnection[4ef7e9bf2121a943/2961a322e1e80047(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.080 <- (5) Packet A|3|S0|2961a322e1e80047|1400|2 PingFrame[] Padding(1373) 17.081 -> Packet A|2|S0|f50876c05da82a97|35|2 AckFrame[3-2|Δ0] ConnectionCloseFrame[0|0|] 17.081 Creating connection with server4:443 with v1 17.081 Setting up connection for downloading https://server4:443/logxcwpjbg at 07:46.395 on ClientConnection[921c6bfb09eff3e0/dd4686761de53bb7(V1) with server4/193.167.100.100:443] 17.082 Original destination connection id: 921c6bfb09eff3e0 (scid: dd4686761de53bb7) >- CryptoStream[I|ClientHello] 17.083 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.283/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.083 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.089 <- (6) Packet A|4|S0|2961a322e1e80047|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 17.090 -> Packet A|3|S0|f50876c05da82a97|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 17.116 <- (1) Packet I|109607|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 17.117 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.317/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.116 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 17.119 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.216/Handshake, because peerAwaitingAddressValidation | RTT:33/16 17.119 -> Packet I|1|L|1201|2 Token=[] AckFrame[109607|Δ0] Padding(1150) >- CryptoStream[H|Finished] 17.121 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.218/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.121 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.116 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 17.121 Starting downloading https://server4:443/logxcwpjbg at 07:46.435 on ClientConnection[921c6bfb09eff3e0/dd4686761de53bb7(V1) with server4/193.167.100.100:443] 17.121 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.218/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.121 Discarding pn space Initial because first Handshake message is being sent 17.116 <- (2) Packet A|0|S0|dd4686761de53bb7|311|4 CryptoFrame[0,133] NewTokenFrame[8c1291e2b6f1b994379e13216aeaf7bae0c61fa82afffd625e62fd89fc96253295074dc3d96653d88e373f4e93926b44103b] NewConnectionIdFrame[1,<0|03c8ec7f21adf754|352b673da1bfa24dd18d7bf35731f976] Padding(68) -< CryptoStream[A|NewSessionTicket] 17.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.219/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.122 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|0af6699e5cfdabe5|47|1 StreamFrame[0(CIB),0,17,fin]] 17.141 -> Packet A|1|S0|0af6699e5cfdabe5|32|1 AckFrame[0|Δ19] 17.218 loss detection timeout handler running Sending probe 0, because no ack since 17.121. Current RTT: 33/16. 17.218 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.218 (Probe is a handshake retransmit) 17.218 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.412/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.218 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 17.265 <- (3) Packet A|3|S0|dd4686761de53bb7|55|3 HandshakeDoneFrame[] AckFrame[1|Δ93] Padding(22) 17.265 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 17.336/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -36 millis, based on 17.229/App, because ackElicitingInFlight | RTT:33/16 17.265 Discarding pn space Handshake because HandshakeDone is received 17.265 loss detection timeout handler running Sending probe 0, because no ack since 17.122. Current RTT: 33/16. 17.265 (Probe is retransmit on level App) 17.266 Cwnd(-): 6000; inflight: 0 17.266 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 106 millis, based on 17.373/App, because ackElicitingInFlight | RTT:33/16 17.266 -> Packet PA|2|S0|0af6699e5cfdabe5|47|1 StreamFrame[0(CIB),0,17,fin] 17.266 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 106 millis, based on 17.373/App, because ackElicitingInFlight | RTT:33/16 17.266 -> Packet A|3|S0|0af6699e5cfdabe5|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 17.372 loss detection timeout handler running Sending probe 0, because no ack since 17.266. Current RTT: 33/16. 17.372 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 17.586/App, because ackElicitingInFlight | RTT:33/16 17.372 -> Packet PA|4|S0|0af6699e5cfdabe5|47|1 StreamFrame[0(CIB),0,17,fin] 17.404 <- (4) Packet A|5|S0|dd4686761de53bb7|1079|3 AckFrame[4,1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(18) 17.405 Cwnd(-): 3000; inflight: 0 17.405 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 17.405 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 17.500/App, because ackElicitingInFlight | RTT:33/13 17.405 -> Packet A|5|S0|0af6699e5cfdabe5|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 17.405 Finished downloading https://server4:443/logxcwpjbg at 07:46.719 on ClientConnection[921c6bfb09eff3e0/dd4686761de53bb7(V1) with server4/193.167.100.100:443] 17.405 Closing ClientConnection[921c6bfb09eff3e0/dd4686761de53bb7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.406 Creating connection with server4:443 with v1 17.406 -> Packet A|6|S0|0af6699e5cfdabe5|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,3|Δ0] 17.406 Setting up connection for downloading https://server4:443/lgkorczmyp at 07:46.720 on ClientConnection[cbb133e456575b33/d58594d9a3ae2cc8(V1) with server4/193.167.100.100:443] 17.406 Original destination connection id: cbb133e456575b33 (scid: d58594d9a3ae2cc8) >- CryptoStream[I|ClientHello] 17.408 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.608/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.408 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.436 <- (5) Packet A|8|S0|dd4686761de53bb7|30|1 ConnectionCloseFrame[0|0|] 17.441 <- (1) Packet I|104832|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 17.441 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.641/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.441 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 17.444 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.541/Handshake, because peerAwaitingAddressValidation | RTT:33/16 17.444 -> Packet I|1|L|1201|2 Token=[] AckFrame[104832|Δ0] Padding(1150) >- CryptoStream[H|Finished] 17.446 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.543/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.446 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.446 Starting downloading https://server4:443/lgkorczmyp at 07:46.760 on ClientConnection[cbb133e456575b33/d58594d9a3ae2cc8(V1) with server4/193.167.100.100:443] 17.441 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 17.446 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 17.446 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.543/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.446 Discarding pn space Initial because first Handshake message is being sent 17.446 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 17.441 <- (2) Packet A|0|S0|d58594d9a3ae2cc8|311|4 CryptoFrame[0,133] NewTokenFrame[ee77a291ed88b59005991f8f82758d6831c9aa54e1b3a49ddeb6a0c7f38b10ff7329a20a093f5ca7cf169e95507289f353f2] NewConnectionIdFrame[1,<0|3f66c35f0ccdabba|38746e8fbb39da511655d2d7c5fea440] Padding(68) 17.446 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.543/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.446 -> Packet A|0|S0|975433813b7bc982|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 17.466 -> Packet A|1|S0|975433813b7bc982|32|1 AckFrame[0|Δ19] 17.543 loss detection timeout handler running Sending probe 0, because no ack since 17.446. Current RTT: 33/16. 17.543 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.543 (Probe is a handshake retransmit) 17.543 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.737/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.543 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 17.575 <- (3) Packet A|2|S0|d58594d9a3ae2cc8|1079|4 AckFrame[1-0|Δ77] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(18) 17.575 probe count not reset on ack because handshake not yet confirmed 17.575 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.575 State is set to Confirmed reschedule loss detection timer for PTO over 161 millis, based on 17.737/Handshake, because ackElicitingInFlight | RTT:33/16 17.576 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.576 Discarding pn space Handshake because HandshakeDone is received 17.576 Finished downloading https://server4:443/lgkorczmyp at 07:46.890 on ClientConnection[cbb133e456575b33/d58594d9a3ae2cc8(V1) with server4/193.167.100.100:443] 17.576 Closing ClientConnection[cbb133e456575b33/d58594d9a3ae2cc8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.576 <- (4) Packet A|3|S0|d58594d9a3ae2cc8|1400|2 PingFrame[] Padding(1373) 17.576 -> Packet A|2|S0|975433813b7bc982|39|3 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] ConnectionCloseFrame[0|0|] 17.577 Creating connection with server4:443 with v1 17.577 Setting up connection for downloading https://server4:443/bzqhkuvcrc at 07:46.891 on ClientConnection[c415fa2a8afb93a0/b7d41a6fe05189e9(V1) with server4/193.167.100.100:443] 17.577 Original destination connection id: c415fa2a8afb93a0 (scid: b7d41a6fe05189e9) >- CryptoStream[I|ClientHello] 17.578 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.778/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.578 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.585 <- (5) Packet A|4|S0|d58594d9a3ae2cc8|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 17.585 -> Packet A|3|S0|975433813b7bc982|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 17.607 <- (6) Packet A|5|S0|d58594d9a3ae2cc8|30|1 ConnectionCloseFrame[0|0|] 17.778 loss detection timeout handler running Sending probe 0, because no ack since 17.578. Current RTT: 100/25. 17.778 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.778 (Probe is an initial retransmit) 17.778 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.178/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.778 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.812 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 18.177 loss detection timeout handler running Sending probe 1, because no ack since 17.778. Current RTT: 100/25. 18.177 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.177 (Probe is an initial retransmit) 18.178 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.978/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.178 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.179 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.979/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.179 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.211 <- (2) Packet I|117294|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[3-1|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 18.215 probe count not reset on ack because handshake not yet confirmed 18.215 Retransmitting CryptoFrame[0,257] on level Initial 18.215 Cwnd(-): 6000; inflight: 0 18.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 19.015/Handshake, because peerAwaitingAddressValidation | RTT:100/25 18.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 18.599/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 18.215 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.211 <- (2) Packet H|3|L|1069|2 PingFrame[] Padding(1023) 18.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 18.311/Handshake, because peerAwaitingAddressValidation | RTT:32/16 reschedule loss detection timer for PTO over 95 millis, based on 18.311/Handshake, because peerAwaitingAddressValidation | RTT:32/16 18.215 Discarding pn space Initial because first Handshake message is being sent 18.215 -> Packet I|5|L|1201|2 Token=[] AckFrame[117294|Δ0] Padding(1150) 18.215 -> Packet H|0|L|46|1 AckFrame[3|Δ0] 18.248 <- (3) Packet H|4|L|55|3 PingFrame[] AckFrame[0|Δ0] Padding(4) 18.248 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.248 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 18.375 <- (4) Packet H|6|L|823|3 CryptoFrame[0,702] AckFrame[1-0|Δ95] Padding(66) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 95 millis, based on 18.474/Handshake, because ackElicitingInFlight | RTT:32/16 18.378 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.378 Starting downloading https://server4:443/bzqhkuvcrc at 07:47.692 on ClientConnection[c415fa2a8afb93a0/b7d41a6fe05189e9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 18.474/Handshake, because ackElicitingInFlight | RTT:32/16 18.378 -> Packet H|3|L|46|1 AckFrame[6|Δ0] 18.379 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 94 millis, based on 18.474/Handshake, because ackElicitingInFlight | RTT:32/16 18.379 -> Packet A|0|S0|2a494b77be5bef10|47|1 StreamFrame[0(CIB),0,17,fin] 18.473 loss detection timeout handler running Sending probe 0, because no ack since 18.378. Current RTT: 32/16. 18.473 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 18.473 (Probe is a handshake retransmit) 18.473 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 191 millis, based on 18.665/Handshake, because ackElicitingInFlight | RTT:32/16 18.473 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 18.664 loss detection timeout handler running Sending probe 1, because no ack since 18.379. Current RTT: 32/16. 18.665 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 18.665 (Probe is a handshake retransmit) 18.665 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 383 millis, based on 19.049/Handshake, because ackElicitingInFlight | RTT:32/16 18.665 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 18.666 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 383 millis, based on 19.050/Handshake, because ackElicitingInFlight | RTT:32/16 18.666 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 18.696 <- (5) Packet A|2|S0|b7d41a6fe05189e9|311|4 CryptoFrame[0,133] NewTokenFrame[faf26657c9046c57b6562a58647170a624b7ada007cf8ad9b9e28e1703b343fa9163e55b96ebfd1aaaceb8d0e0b74cb34f74] NewConnectionIdFrame[1,<0|c6362febb07cce2b|df3397859d03e93558010663ad5c1ac9] Padding(68) -< CryptoStream[A|NewSessionTicket] 18.696 <- (6) Packet A|3|S0|b7d41a6fe05189e9|55|2 HandshakeDoneFrame[] Padding(28) 18.697 State is set to Confirmed reschedule loss detection timer for PTO over 105 millis, based on 18.803/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -212 millis, based on 18.485/App, because ackElicitingInFlight | RTT:32/16 18.697 Discarding pn space Handshake because HandshakeDone is received 18.697 loss detection timeout handler running Sending probe 0, because no ack since 18.379. Current RTT: 32/16. 18.697 (Probe is retransmit on level App) 18.697 -> Packet A|1|S0|2a494b77be5bef10|31|1 AckFrame[3-2|Δ0] reschedule loss detection timer for PTO over 211 millis, based on 18.909/App, because ackElicitingInFlight | RTT:32/16 18.697 -> Packet PA|2|S0|2a494b77be5bef10|47|1 StreamFrame[0(CIB),0,17,fin] 18.730 <- (7) Packet A|6|S0|b7d41a6fe05189e9|1400|2 PingFrame[] Padding(1373) 18.739 <- (8) Packet A|7|S0|b7d41a6fe05189e9|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 18.739 -> Packet A|3|S0|2a494b77be5bef10|34|1 AckFrame[7-6,3-2|Δ8] 18.739 Finished downloading https://server4:443/bzqhkuvcrc at 07:48.053 on ClientConnection[c415fa2a8afb93a0/b7d41a6fe05189e9(V1) with server4/193.167.100.100:443] 18.739 Closing ClientConnection[c415fa2a8afb93a0/b7d41a6fe05189e9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.740 -> Packet A|4|S0|2a494b77be5bef10|37|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,3-2|Δ0] 18.740 Creating connection with server4:443 with v1 18.741 Setting up connection for downloading https://server4:443/cbotldwbua at 07:48.055 on ClientConnection[844657ce4344caee/fce646f4b7312ecf(V1) with server4/193.167.100.100:443] 18.741 Original destination connection id: 844657ce4344caee (scid: fce646f4b7312ecf) >- CryptoStream[I|ClientHello] 18.742 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.942/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.742 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.749 <- (9) Packet A|8|S0|b7d41a6fe05189e9|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 18.749 -> Packet A|5|S0|2a494b77be5bef10|37|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,3-2|Δ0] 18.769 <- (10) Packet A|10|S0|b7d41a6fe05189e9|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 18.769 -> Packet A|6|S0|2a494b77be5bef10|37|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,3-2|Δ0] 18.770 <- (11) Packet A|11|S0|b7d41a6fe05189e9|30|1 ConnectionCloseFrame[0|0|] 18.775 <- (1) Packet I|119177|L|178|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18.776 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.976/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.775 <- (1) Packet H|0|L|752|1 CryptoFrame[0,703] 18.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.876/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.779 -> Packet I|1|L|1201|2 Token=[] AckFrame[119177|Δ0] Padding(1150) >- CryptoStream[H|Finished] 18.782 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.879/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.782 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.782 Starting downloading https://server4:443/cbotldwbua at 07:48.096 on ClientConnection[844657ce4344caee/fce646f4b7312ecf(V1) with server4/193.167.100.100:443] 18.775 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 18.782 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 18.782 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.879/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.782 Discarding pn space Initial because first Handshake message is being sent 18.782 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 18.783 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.880/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.783 -> Packet A|0|S0|2f67a7724b386f36|47|1 StreamFrame[0(CIB),0,17,fin] 18.812 <- (2) Packet A|2|S0|fce646f4b7312ecf|55|2 HandshakeDoneFrame[] Padding(28) 18.813 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 18.879/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 18.890/App, because ackElicitingInFlight | RTT:33/16 18.813 Discarding pn space Handshake because HandshakeDone is received 18.814 <- (3) Packet A|3|S0|fce646f4b7312ecf|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 18.814 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.815 -> Packet A|1|S0|2f67a7724b386f36|32|1 AckFrame[3-2|Δ1] 18.815 Finished downloading https://server4:443/cbotldwbua at 07:48.129 on ClientConnection[844657ce4344caee/fce646f4b7312ecf(V1) with server4/193.167.100.100:443] 18.815 Closing ClientConnection[844657ce4344caee/fce646f4b7312ecf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.815 -> Packet A|2|S0|2f67a7724b386f36|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 18.815 Creating connection with server4:443 with v1 18.816 Setting up connection for downloading https://server4:443/asiszcamky at 07:48.130 on ClientConnection[ad583b8c0c9c8044/e9c547eff611052b(V1) with server4/193.167.100.100:443] 18.816 Original destination connection id: ad583b8c0c9c8044 (scid: e9c547eff611052b) >- CryptoStream[I|ClientHello] 18.817 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.017/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.817 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.824 <- (4) Packet A|4|S0|fce646f4b7312ecf|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 18.824 -> Packet A|3|S0|2f67a7724b386f36|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 18.834 <- (5) Packet A|5|S0|fce646f4b7312ecf|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 18.834 -> Packet A|4|S0|2f67a7724b386f36|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 18.845 <- (6) Packet A|7|S0|fce646f4b7312ecf|311|4 CryptoFrame[0,133] NewTokenFrame[8927dfd5d8711d6185d8a72fb6bfd5e76605b84bdf82c10d6f66eb91ddc0b6dddf2ac8efce6813dda79671232dc8887d12fe] NewConnectionIdFrame[1,<0|1d9f4173f10c8f64|04272f1e9506457eb195ccf204d450af] Padding(68) 18.846 <- (7) Packet A|8|S0|fce646f4b7312ecf|1400|2 PingFrame[] Padding(1373) 18.847 -> Packet A|5|S0|2f67a7724b386f36|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 18.855 <- (8) Packet A|9|S0|fce646f4b7312ecf|30|1 ConnectionCloseFrame[0|0|] 19.016 loss detection timeout handler running Sending probe 0, because no ack since 18.817. Current RTT: 100/25. 19.017 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.017 (Probe is an initial retransmit) 19.017 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.417/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.017 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.416 loss detection timeout handler running Sending probe 1, because no ack since 19.017. Current RTT: 100/25. 19.416 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.416 (Probe is an initial retransmit) 19.417 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.217/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.417 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.418 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.218/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.418 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.449 <- (1) Packet I|99075|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[2-1|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 19.452 probe count not reset on ack because handshake not yet confirmed 19.453 Retransmitting CryptoFrame[0,257] on level Initial 19.453 Cwnd(-): 6000; inflight: 1200 19.453 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 20.253/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.453 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 19.837/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.453 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.449 <- (1) Packet H|2|L|1069|2 CryptoFrame[0,702] Padding(318) 19.453 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 19.837/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.453 -> Packet I|5|L|1201|2 Token=[] AckFrame[99075|Δ0] Padding(1150) >- CryptoStream[H|Finished] 19.455 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 19.839/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.455 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.456 Starting downloading https://server4:443/asiszcamky at 07:48.770 on ClientConnection[ad583b8c0c9c8044/e9c547eff611052b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 19.552/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.456 Discarding pn space Initial because first Handshake message is being sent 19.456 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.456 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 19.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 19.552/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.456 -> Packet A|0|S0|fe4f453b8fb9f43a|47|1 StreamFrame[0(CIB),0,17,fin] 19.486 <- (3) Packet A|2|S0|e9c547eff611052b|55|2 HandshakeDoneFrame[] Padding(28) 19.486 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 19.551/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 75 millis, based on 19.562/App, because ackElicitingInFlight | RTT:32/16 19.486 Discarding pn space Handshake because HandshakeDone is received 19.506 -> Packet A|1|S0|fe4f453b8fb9f43a|32|1 AckFrame[2|Δ19] 19.538 <- (4) Packet A|4|S0|e9c547eff611052b|1400|2 PingFrame[] Padding(1373) 19.557 -> Packet A|2|S0|fe4f453b8fb9f43a|34|1 AckFrame[4,2|Δ19] 19.561 loss detection timeout handler running Sending probe 0, because no ack since 19.456. Current RTT: 32/16. 19.562 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 211 millis, based on 19.774/App, because ackElicitingInFlight | RTT:32/16 19.562 -> Packet PA|3|S0|fe4f453b8fb9f43a|47|1 StreamFrame[0(CIB),0,17,fin] 19.603 <- (5) Packet A|6|S0|e9c547eff611052b|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 19.604 Finished downloading https://server4:443/asiszcamky at 07:48.918 on ClientConnection[ad583b8c0c9c8044/e9c547eff611052b(V1) with server4/193.167.100.100:443] 19.604 Closing ClientConnection[ad583b8c0c9c8044/e9c547eff611052b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.605 -> Packet A|4|S0|fe4f453b8fb9f43a|39|2 ConnectionCloseFrame[0|0|] AckFrame[6,4,2|Δ0] 19.605 Creating connection with server4:443 with v1 19.605 Setting up connection for downloading https://server4:443/zppydyokbk at 07:48.919 on ClientConnection[933e1ea9eb760876/07bb0c70d9451092(V1) with server4/193.167.100.100:443] 19.605 Original destination connection id: 933e1ea9eb760876 (scid: 07bb0c70d9451092) >- CryptoStream[I|ClientHello] 19.606 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.806/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.606 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.614 <- (6) Packet A|7|S0|e9c547eff611052b|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 19.614 -> Packet A|5|S0|fe4f453b8fb9f43a|39|2 ConnectionCloseFrame[0|0|] AckFrame[6,4,2|Δ0] 19.623 <- (7) Packet A|8|S0|e9c547eff611052b|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 19.624 -> Packet A|6|S0|fe4f453b8fb9f43a|39|2 ConnectionCloseFrame[0|0|] AckFrame[6,4,2|Δ0] 19.633 <- (8) Packet A|9|S0|e9c547eff611052b|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 19.806 loss detection timeout handler running Sending probe 0, because no ack since 19.606. Current RTT: 100/25. 19.806 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.806 (Probe is an initial retransmit) 19.806 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.206/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.806 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.839 <- (1) Packet I|76856|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 19.841 probe count not reset on ack because handshake not yet confirmed 19.841 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.241/Handshake, because peerAwaitingAddressValidation | RTT:100/25 19.839 <- (1) Packet H|2|L|1069|2 PingFrame[] Padding(1023) 19.842 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 20.034/Handshake, because peerAwaitingAddressValidation | RTT:32/16 19.842 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.842 -> Packet I|2|L|1201|2 Token=[] AckFrame[76856|Δ0] Padding(1150) reschedule loss detection timer for PTO over 95 millis, based on 19.938/Handshake, because peerAwaitingAddressValidation | RTT:32/16 19.842 Discarding pn space Initial because first Handshake message is being sent 19.842 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 19.937 loss detection timeout handler running 19.937 Sending probe 0. Current RTT: 32/16. 19.937 Sending probe because peer awaiting address validation 19.937 (Probe is a handshake ping) 19.937 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 20.129/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.937 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 19.952 <- (2) Packet H|3|L|823|2 CryptoFrame[0,703] Padding(71) >- CryptoStream[H|Finished] 19.955 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 20.147/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.955 -> Packet H|2|L|85|2 CryptoFrame[0,36] AckFrame[2|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.955 Starting downloading https://server4:443/zppydyokbk at 07:49.269 on ClientConnection[933e1ea9eb760876/07bb0c70d9451092(V1) with server4/193.167.100.100:443] 19.955 -> Packet H|3|L|46|1 AckFrame[3-2|Δ0] 19.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 20.148/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.956 -> Packet A|0|S0|bb8afa1aaded6514|47|1 StreamFrame[0(CIB),0,17,fin] 19.968 <- (3) Packet H|4|L|55|2 AckFrame[1|Δ0] Padding(5) 19.968 probe count not reset on ack because handshake not yet confirmed 19.968 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 178 millis, based on 20.147/Handshake, because ackElicitingInFlight | RTT:32/16 19.986 <- (4) Packet A|2|S0|07bb0c70d9451092|311|4 CryptoFrame[0,133] NewTokenFrame[c240d37b9820369e22a8eb67bf73aa9331db10b93a68df06b74b658be81b3f1e96fa81b4f777fead78d40d9e64b3317984ad] NewConnectionIdFrame[1,<0|37788b0451973ef4|98ff7ee6ac0aeee9176b7c4121ce93f0] Padding(68) -< CryptoStream[A|NewSessionTicket] 19.989 <- (5) Packet A|5|S0|07bb0c70d9451092|55|2 AckFrame[0|Δ3] Padding(23) reschedule loss detection timer for PTO over 49 millis, based on 20.039/Handshake, because ackElicitingInFlight | RTT:32/13 20.006 -> Packet A|1|S0|bb8afa1aaded6514|34|1 AckFrame[5,2|Δ19] 20.037 <- (6) Packet A|6|S0|07bb0c70d9451092|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 20.038 Finished downloading https://server4:443/zppydyokbk at 07:49.352 on ClientConnection[933e1ea9eb760876/07bb0c70d9451092(V1) with server4/193.167.100.100:443] 20.038 Closing ClientConnection[933e1ea9eb760876/07bb0c70d9451092(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.039 -> Packet A|2|S0|bb8afa1aaded6514|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 20.039 Creating connection with server4:443 with v1 20.039 Setting up connection for downloading https://server4:443/ouliihpssj at 07:49.353 on ClientConnection[bd51caf24ce8b364/3f54a765585b696d(V1) with server4/193.167.100.100:443] 20.039 Original destination connection id: bd51caf24ce8b364 (scid: 3f54a765585b696d) >- CryptoStream[I|ClientHello] 20.041 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.241/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.040 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.047 <- (7) Packet A|8|S0|07bb0c70d9451092|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 20.048 -> Packet A|3|S0|bb8afa1aaded6514|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 20.057 <- (8) Packet A|9|S0|07bb0c70d9451092|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 20.058 -> Packet A|4|S0|bb8afa1aaded6514|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 20.063 <- (9) Packet A|10|S0|07bb0c70d9451092|55|3 HandshakeDoneFrame[] AckFrame[1-0|Δ26] Padding(22) 20.064 <- (10) Packet A|11|S0|07bb0c70d9451092|1400|2 PingFrame[] Padding(1373) 20.064 -> Packet A|5|S0|bb8afa1aaded6514|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 20.068 <- (11) Packet A|12|S0|07bb0c70d9451092|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 20.069 <- (12) Packet A|13|S0|07bb0c70d9451092|30|1 ConnectionCloseFrame[0|0|] 20.240 loss detection timeout handler running Sending probe 0, because no ack since 20.040. Current RTT: 100/25. 20.240 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.240 (Probe is an initial retransmit) 20.240 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.640/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.240 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.639 loss detection timeout handler running Sending probe 1, because no ack since 20.240. Current RTT: 100/25. 20.640 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.640 (Probe is an initial retransmit) 20.640 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.440/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.640 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.641 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.441/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.641 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.674 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 20.924 <- (2) Packet I|96918|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[3-2|Δ250] Padding(2) -< CryptoStream[I|ServerHello] 20.926 probe count not reset on ack because handshake not yet confirmed 20.927 Retransmitting CryptoFrame[0,257] on level Initial 20.927 Cwnd(-): 6000; inflight: 0 20.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 21.727/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3387 millis, based on 24.315/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:283/141 20.927 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.924 <- (2) Packet H|3|L|1069|2 PingFrame[] Padding(1023) 20.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 846 millis, based on 21.774/Handshake, because peerAwaitingAddressValidation | RTT:283/141 20.927 Discarding pn space Initial because first Handshake message is being sent 20.927 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 846 millis, based on 21.774/Handshake, because peerAwaitingAddressValidation | RTT:283/141 20.927 -> Packet I|5|L|1201|2 Token=[] AckFrame[96918|Δ0] Padding(1150) 20.927 -> Packet H|0|L|46|1 AckFrame[3|Δ0] 21.773 loss detection timeout handler running 21.773 Sending probe 0. Current RTT: 283/141. 21.773 Sending probe because peer awaiting address validation 21.774 (Probe is a handshake ping) 21.774 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1693 millis, based on 23.468/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:283/141 21.774 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 21.805 <- (3) Packet H|5|L|55|2 AckFrame[1|Δ0] Padding(5) 21.805 probe count not reset on ack because handshake not yet confirmed 21.805 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.305 <- (4) Packet H|6|L|55|3 PingFrame[] AckFrame[1|Δ500] Padding(1) 22.306 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.306 -> Packet H|2|L|48|1 AckFrame[6-5,3|Δ0] 22.337 <- (5) Packet H|7|L|55|3 PingFrame[] AckFrame[2-1|Δ0] Padding(4) 22.338 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.337 <- (5) Packet H|8|L|823|3 CryptoFrame[0,701] AckFrame[2-1|Δ0] Padding(68) 22.338 -> Packet H|3|L|46|1 AckFrame[7|Δ0] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 926 millis, based on 23.267/Handshake, because ackElicitingInFlight | RTT:251/169 22.340 -> Packet H|4|L|85|2 CryptoFrame[0,36] AckFrame[7|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.341 Starting downloading https://server4:443/ouliihpssj at 07:51.655 on ClientConnection[bd51caf24ce8b364/3f54a765585b696d(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 926 millis, based on 23.267/Handshake, because ackElicitingInFlight | RTT:251/169 22.341 -> Packet H|5|L|46|1 AckFrame[8-7|Δ0] 22.341 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 925 millis, based on 23.267/Handshake, because ackElicitingInFlight | RTT:251/169 22.341 -> Packet A|0|S0|1ec8e068c28337d2|47|1 StreamFrame[0(CIB),0,17,fin] 23.266 loss detection timeout handler running Sending probe 0, because no ack since 22.340. Current RTT: 251/169. 23.267 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 23.267 (Probe is a handshake retransmit) 23.267 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 1853 millis, based on 25.121/Handshake, because ackElicitingInFlight | RTT:251/169 23.267 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 23.298 <- (6) Packet A|2|S0|3f54a765585b696d|311|4 CryptoFrame[0,133] NewTokenFrame[88c1ccafbeff9b8e0db16ed0eab3d8ef79e02f61b0ebb16afcfbe505c5caafa8fa261e4cd43866db74e48a395b9fd9379197] NewConnectionIdFrame[1,<0|18d918f1141b2570|e0cce3c084a14f0076d7a0490de222aa] Padding(68) -< CryptoStream[A|NewSessionTicket] 23.298 <- (7) Packet A|3|S0|3f54a765585b696d|55|2 HandshakeDoneFrame[] Padding(28) 23.299 State is set to Confirmed reschedule loss detection timer for PTO over 916 millis, based on 24.215/App, because ackElicitingInFlight | RTT:251/169 reschedule loss detection timer for PTO over -20 millis, based on 23.278/App, because ackElicitingInFlight | RTT:251/169 23.299 Discarding pn space Handshake because HandshakeDone is received 23.299 loss detection timeout handler running Sending probe 0, because no ack since 22.341. Current RTT: 251/169. 23.299 (Probe is retransmit on level App) 23.299 -> Packet A|1|S0|1ec8e068c28337d2|31|1 AckFrame[3-2|Δ0] reschedule loss detection timer for PTO over 1873 millis, based on 25.173/App, because ackElicitingInFlight | RTT:251/169 23.299 -> Packet PA|2|S0|1ec8e068c28337d2|47|1 StreamFrame[0(CIB),0,17,fin] 23.331 <- (8) Packet A|5|S0|3f54a765585b696d|1400|2 PingFrame[] Padding(1373) 23.342 <- (9) Packet A|7|S0|3f54a765585b696d|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 23.342 -> Packet A|3|S0|1ec8e068c28337d2|36|1 AckFrame[7,5,3-2|Δ10] 23.342 Finished downloading https://server4:443/ouliihpssj at 07:52.656 on ClientConnection[bd51caf24ce8b364/3f54a765585b696d(V1) with server4/193.167.100.100:443] 23.342 Closing ClientConnection[bd51caf24ce8b364/3f54a765585b696d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.343 -> Packet A|4|S0|1ec8e068c28337d2|39|2 ConnectionCloseFrame[0|0|] AckFrame[7,5,3-2|Δ0] 23.343 Creating connection with server4:443 with v1 23.344 Setting up connection for downloading https://server4:443/rfgihgvgwu at 07:52.658 on ClientConnection[646244e04fb29877/0141104154239959(V1) with server4/193.167.100.100:443] 23.344 Original destination connection id: 646244e04fb29877 (scid: 0141104154239959) >- CryptoStream[I|ClientHello] 23.345 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.545/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.345 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.352 <- (10) Packet A|8|S0|3f54a765585b696d|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 23.352 -> Packet A|5|S0|1ec8e068c28337d2|39|2 ConnectionCloseFrame[0|0|] AckFrame[7,5,3-2|Δ0] 23.362 <- (11) Packet A|9|S0|3f54a765585b696d|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 23.362 -> Packet A|6|S0|1ec8e068c28337d2|39|2 ConnectionCloseFrame[0|0|] AckFrame[7,5,3-2|Δ0] 23.372 <- (12) Packet A|10|S0|3f54a765585b696d|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 23.373 <- (13) Packet A|11|S0|3f54a765585b696d|30|1 ConnectionCloseFrame[0|0|] 23.544 loss detection timeout handler running Sending probe 0, because no ack since 23.345. Current RTT: 100/25. 23.544 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.544 (Probe is an initial retransmit) 23.545 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.945/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.545 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.944 loss detection timeout handler running Sending probe 1, because no ack since 23.545. Current RTT: 100/25. 23.944 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.944 (Probe is an initial retransmit) 23.944 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.744/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.944 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.945 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.745/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.945 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.978 <- (1) Packet I|91457|L|179|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 23.978 probe count not reset on ack because handshake not yet confirmed 23.978 Retransmitting CryptoFrame[0,257] on level Initial 23.978 Cwnd(-): 6000; inflight: 1200 23.979 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.779/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.979 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 24.367/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.979 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 23.978 <- (1) Packet H|0|L|752|1 CryptoFrame[0,703] 23.981 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 24.369/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.981 -> Packet I|5|L|1201|2 Token=[] AckFrame[91457|Δ0] Padding(1150) >- CryptoStream[H|Finished] 23.983 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 24.371/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.983 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.978 <- (1) Packet H|1|L|321|2 PingFrame[] Padding(275) 23.984 Starting downloading https://server4:443/rfgihgvgwu at 07:53.298 on ClientConnection[646244e04fb29877/0141104154239959(V1) with server4/193.167.100.100:443] 23.984 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 23.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.081/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.984 Discarding pn space Initial because first Handshake message is being sent 23.984 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 23.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.081/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.984 -> Packet A|0|S0|f8f6eb97be5681cf|47|1 StreamFrame[0(CIB),0,17,fin] 24.011 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.016 <- (3) Packet A|2|S0|0141104154239959|1079|4 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(19) 24.016 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.113/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.017 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 24.068/Handshake, because ackElicitingInFlight | RTT:33/13 24.017 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.017 Discarding pn space Handshake because HandshakeDone is received 24.017 Finished downloading https://server4:443/rfgihgvgwu at 07:53.331 on ClientConnection[646244e04fb29877/0141104154239959(V1) with server4/193.167.100.100:443] 24.017 Closing ClientConnection[646244e04fb29877/0141104154239959(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.017 -> Packet A|1|S0|f8f6eb97be5681cf|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 24.018 Creating connection with server4:443 with v1 24.018 Setting up connection for downloading https://server4:443/wawaorcdrf at 07:53.332 on ClientConnection[bdfb1a58d5b00ac3/1bc0e80cda76df41(V1) with server4/193.167.100.100:443] 24.018 Original destination connection id: bdfb1a58d5b00ac3 (scid: 1bc0e80cda76df41) >- CryptoStream[I|ClientHello] 24.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.219/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.019 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.026 <- (4) Packet A|3|S0|0141104154239959|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 24.026 -> Packet A|2|S0|f8f6eb97be5681cf|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 24.036 <- (5) Packet A|4|S0|0141104154239959|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 24.036 -> Packet A|3|S0|f8f6eb97be5681cf|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 24.046 <- (6) Packet A|5|S0|0141104154239959|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 24.048 <- (7) Packet A|6|S0|0141104154239959|30|1 ConnectionCloseFrame[0|0|] 24.219 loss detection timeout handler running Sending probe 0, because no ack since 24.019. Current RTT: 100/25. 24.219 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.219 (Probe is an initial retransmit) 24.219 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.619/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.219 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.252 <- (1) Packet I|124053|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 24.253 probe count not reset on ack because handshake not yet confirmed 24.253 Retransmitting CryptoFrame[0,257] on level Initial 24.253 Cwnd(-): 6000; inflight: 0 24.253 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.653/Initial, because peerAwaitingAddressValidation | RTT:100/25 24.253 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 24.447/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.253 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 24.256 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.252 <- (1) Packet H|0|L|752|1 CryptoFrame[0,703] reschedule loss detection timer for PTO over 193 millis, based on 24.450/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.256 -> Packet I|3|L|1201|2 Token=[] AckFrame[124053|Δ0] Padding(1150) >- CryptoStream[H|Finished] 24.258 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 24.452/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.258 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.252 <- (1) Packet H|1|L|321|2 PingFrame[] Padding(275) 24.258 Starting downloading https://server4:443/wawaorcdrf at 07:53.572 on ClientConnection[bdfb1a58d5b00ac3/1bc0e80cda76df41(V1) with server4/193.167.100.100:443] 24.258 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.355/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.258 Discarding pn space Initial because first Handshake message is being sent 24.258 -> Packet H|1|L|46|1 AckFrame[1-0|Δ0] 24.253 <- (2) Packet A|0|S0|1bc0e80cda76df41|311|4 CryptoFrame[0,133] NewTokenFrame[f381b511ab40bdb3be6f03242a2d3efd8c7db4ecece8373d2b38e5daec8ceb14150c3c01417bc9dff58bbf2bf52d458fda02] NewConnectionIdFrame[1,<0|29987a99ad51af6d|10f0b15657335805b29ea6e4d07eefe6] Padding(68) -< CryptoStream[A|NewSessionTicket] 24.259 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.356/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.259 -> Packet A|0|S0|18746a20b876573d|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 24.355 loss detection timeout handler running Sending probe 0, because no ack since 24.258. Current RTT: 33/16. 24.355 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.355 (Probe is a handshake retransmit) 24.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 24.550/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.355 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 24.387 <- (3) Packet A|2|S0|1bc0e80cda76df41|311|4 CryptoFrame[0,133] NewTokenFrame[f381b511ab40bdb3be6f03242a2d3efd8c7db4ecece8373d2b38e5daec8ceb14150c3c01417bc9dff58bbf2bf52d458fda02] NewConnectionIdFrame[1,<0|29987a99ad51af6d|10f0b15657335805b29ea6e4d07eefe6] Padding(68) -< CryptoStream[A|NewSessionTicket] 24.387 <- (4) Packet A|3|S0|1bc0e80cda76df41|55|2 HandshakeDoneFrame[] Padding(28) 24.387 State is set to Confirmed reschedule loss detection timer for PTO over 85 millis, based on 24.473/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -21 millis, based on 24.366/App, because ackElicitingInFlight | RTT:33/16 24.387 Discarding pn space Handshake because HandshakeDone is received 24.387 loss detection timeout handler running Sending probe 0, because no ack since 24.259. Current RTT: 33/16. 24.387 (Probe is retransmit on level App) 24.388 -> Packet A|1|S0|18746a20b876573d|33|1 AckFrame[3-2,0|Δ0] reschedule loss detection timer for PTO over 213 millis, based on 24.602/App, because ackElicitingInFlight | RTT:33/16 24.388 -> Packet PA|2|S0|18746a20b876573d|47|1 StreamFrame[0(CIB),0,17,fin] 24.419 <- (5) Packet A|5|S0|1bc0e80cda76df41|55|2 AckFrame[2|Δ0] Padding(24) 24.419 Cwnd(-): 3000; inflight: 0 24.419 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 24.419 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 24.514/App, because ackElicitingInFlight | RTT:33/13 24.419 -> Packet A|3|S0|18746a20b876573d|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-2,0|Δ0] 24.513 loss detection timeout handler running Sending probe 0, because no ack since 24.419. Current RTT: 33/13. 24.514 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 189 millis, based on 24.704/App, because ackElicitingInFlight | RTT:33/13 24.514 -> Packet PA|4|S0|18746a20b876573d|47|1 StreamFrame[0(CIB),0,17,fin] 24.625 <- (6) Packet A|7|S0|1bc0e80cda76df41|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 24.626 Finished downloading https://server4:443/wawaorcdrf at 07:53.940 on ClientConnection[bdfb1a58d5b00ac3/1bc0e80cda76df41(V1) with server4/193.167.100.100:443] 24.626 Closing ClientConnection[bdfb1a58d5b00ac3/1bc0e80cda76df41(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.626 -> Packet A|5|S0|18746a20b876573d|41|2 ConnectionCloseFrame[0|0|] AckFrame[7,5,3-2,0|Δ0] 24.627 Creating connection with server4:443 with v1 24.627 Setting up connection for downloading https://server4:443/mnhiedjafg at 07:53.941 on ClientConnection[002e93206aa7cb23/9ff620ed77c03eaa(V1) with server4/193.167.100.100:443] 24.627 Original destination connection id: 002e93206aa7cb23 (scid: 9ff620ed77c03eaa) >- CryptoStream[I|ClientHello] 24.630 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.830/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.630 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.657 <- (7) Packet A|9|S0|1bc0e80cda76df41|30|1 ConnectionCloseFrame[0|0|] 24.663 <- (1) Packet I|84069|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.664 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.864/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.663 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 24.666 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.763/Handshake, because peerAwaitingAddressValidation | RTT:33/16 24.666 -> Packet I|1|L|1201|2 Token=[] AckFrame[84069|Δ0] Padding(1150) >- CryptoStream[H|Finished] 24.668 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.765/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.668 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.663 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 24.668 Starting downloading https://server4:443/mnhiedjafg at 07:53.982 on ClientConnection[002e93206aa7cb23/9ff620ed77c03eaa(V1) with server4/193.167.100.100:443] 24.668 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 24.668 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.765/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.669 Discarding pn space Initial because first Handshake message is being sent 24.669 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 24.663 <- (2) Packet A|0|S0|9ff620ed77c03eaa|311|4 CryptoFrame[0,133] NewTokenFrame[995b346399bb9e2ee01077fec1ec73be9c10edf44d8b45191854db16cdd4f2062f0912d38b8f71a4e677ca933ad8a5a5863e] NewConnectionIdFrame[1,<0|3cd3cbac83e4a79d|5f649e9f0e08d825ac78ba5b6addee23] Padding(68) 24.669 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.766/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.669 -> Packet A|0|S0|e116528f2469b8f0|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 24.688 -> Packet A|1|S0|e116528f2469b8f0|32|1 AckFrame[0|Δ19] 24.765 loss detection timeout handler running Sending probe 0, because no ack since 24.668. Current RTT: 33/16. 24.765 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.765 (Probe is a handshake retransmit) 24.765 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 24.959/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.765 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 24.776 <- (3) Packet H|2|L|823|2 CryptoFrame[0,702] Padding(72) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.777 -> Packet H|4|L|46|1 AckFrame[2-0|Δ0] 24.797 <- (4) Packet A|2|S0|9ff620ed77c03eaa|1079|4 AckFrame[1-0|Δ77] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(18) 24.798 probe count not reset on ack because handshake not yet confirmed 24.798 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 24.992/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.798 State is set to Confirmed reschedule loss detection timer for PTO over 161 millis, based on 24.959/Handshake, because ackElicitingInFlight | RTT:33/16 24.798 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.798 Discarding pn space Handshake because HandshakeDone is received 24.798 Finished downloading https://server4:443/mnhiedjafg at 07:54.112 on ClientConnection[002e93206aa7cb23/9ff620ed77c03eaa(V1) with server4/193.167.100.100:443] 24.798 Closing ClientConnection[002e93206aa7cb23/9ff620ed77c03eaa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.798 <- (5) Packet A|3|S0|9ff620ed77c03eaa|1400|2 PingFrame[] Padding(1373) 24.799 -> Packet A|2|S0|e116528f2469b8f0|35|2 AckFrame[3-2|Δ0] ConnectionCloseFrame[0|0|] 24.799 Creating connection with server4:443 with v1 24.799 Setting up connection for downloading https://server4:443/kglvuvodcx at 07:54.113 on ClientConnection[547003e31837224f/1768b637b3ea5df2(V1) with server4/193.167.100.100:443] 24.799 Original destination connection id: 547003e31837224f (scid: 1768b637b3ea5df2) >- CryptoStream[I|ClientHello] 24.800 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.000/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.800 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.807 <- (6) Packet A|4|S0|9ff620ed77c03eaa|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 24.807 -> Packet A|3|S0|e116528f2469b8f0|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 24.833 <- (1) Packet I|113417|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.834 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.034/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.833 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 24.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.934/Handshake, because peerAwaitingAddressValidation | RTT:33/16 24.836 -> Packet I|1|L|1201|2 Token=[] AckFrame[113417|Δ0] Padding(1150) >- CryptoStream[H|Finished] 24.839 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.936/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.839 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.833 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 24.839 Starting downloading https://server4:443/kglvuvodcx at 07:54.153 on ClientConnection[547003e31837224f/1768b637b3ea5df2(V1) with server4/193.167.100.100:443] 24.839 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.936/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.839 Discarding pn space Initial because first Handshake message is being sent 24.839 -> Packet H|1|L|46|1 AckFrame[1-0|Δ0] 24.834 <- (2) Packet A|0|S0|1768b637b3ea5df2|311|4 CryptoFrame[0,133] NewTokenFrame[929181071f20b14f6291898ebfffd9586e4c1fdc214a76ca1ea91b398e7a242deef42ff074eca6c43eff910d9c27f6c99c2c] NewConnectionIdFrame[1,<0|a8f2a9e003ad469b|a677f74c9d9b48f99a4c4dc9eadde17d] Padding(68) -< CryptoStream[A|NewSessionTicket] 24.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.937/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.840 -> Packet A|0|S0|47dfd3c142b6d7de|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 24.871 <- (3) Packet A|3|S0|1768b637b3ea5df2|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 24.872 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.969/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.872 Finished downloading https://server4:443/kglvuvodcx at 07:54.186 on ClientConnection[547003e31837224f/1768b637b3ea5df2(V1) with server4/193.167.100.100:443] 24.872 Closing ClientConnection[547003e31837224f/1768b637b3ea5df2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.872 -> Packet A|1|S0|47dfd3c142b6d7de|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 24.873 Creating connection with server4:443 with v1 24.873 Setting up connection for downloading https://server4:443/fbpzpbcuka at 07:54.187 on ClientConnection[3442d586cab7f536/d4c39a5c2a3c67dd(V1) with server4/193.167.100.100:443] 24.873 Original destination connection id: 3442d586cab7f536 (scid: d4c39a5c2a3c67dd) >- CryptoStream[I|ClientHello] 24.875 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.075/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.875 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.881 <- (4) Packet A|4|S0|1768b637b3ea5df2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 24.882 -> Packet A|2|S0|47dfd3c142b6d7de|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 24.901 <- (5) Packet A|6|S0|1768b637b3ea5df2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 24.902 -> Packet A|3|S0|47dfd3c142b6d7de|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 24.908 <- (1) Packet I|65659|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.909 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.109/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.908 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 24.912 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.009/Handshake, because peerAwaitingAddressValidation | RTT:33/16 24.912 -> Packet I|1|L|1201|2 Token=[] AckFrame[65659|Δ0] Padding(1150) >- CryptoStream[H|Finished] 24.914 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.011/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.914 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.908 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 24.915 Starting downloading https://server4:443/fbpzpbcuka at 07:54.229 on ClientConnection[3442d586cab7f536/d4c39a5c2a3c67dd(V1) with server4/193.167.100.100:443] 24.915 -> Packet H|1|L|46|1 AckFrame[1-0|Δ0] 24.915 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.012/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.915 Discarding pn space Initial because first Handshake message is being sent 24.915 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.012/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.915 -> Packet A|0|S0|815af3927bd72b06|47|1 StreamFrame[0(CIB),0,17,fin] 24.930 <- (7) Packet A|5|S0|9ff620ed77c03eaa|55|3 HandshakeDoneFrame[] AckFrame[1-0|Δ211] Padding(20) 24.931 -> Packet A|4|S0|e116528f2469b8f0|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 24.931 <- (8) Packet A|6|S0|9ff620ed77c03eaa|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 25.011 loss detection timeout handler running Sending probe 0, because no ack since 24.914. Current RTT: 33/16. 25.012 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.012 (Probe is a handshake retransmit) 25.012 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 25.206/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.012 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 25.043 <- (2) Packet A|2|S0|d4c39a5c2a3c67dd|1079|4 AckFrame[0|Δ96] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(18) 25.044 probe count not reset on ack because handshake not yet confirmed 25.044 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 25.238/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.044 State is set to Confirmed reschedule loss detection timer for PTO over 319 millis, based on 25.364/Handshake, because ackElicitingInFlight | RTT:44/33 25.044 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 25.044 Discarding pn space Handshake because HandshakeDone is received 25.045 Finished downloading https://server4:443/fbpzpbcuka at 07:54.359 on ClientConnection[3442d586cab7f536/d4c39a5c2a3c67dd(V1) with server4/193.167.100.100:443] 25.045 Closing ClientConnection[3442d586cab7f536/d4c39a5c2a3c67dd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.045 -> Packet A|1|S0|815af3927bd72b06|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 25.046 Creating connection with server4:443 with v1 25.046 Setting up connection for downloading https://server4:443/lcstvuderz at 07:54.360 on ClientConnection[37148040f92c19ce/5a051a7ac4450bde(V1) with server4/193.167.100.100:443] 25.046 Original destination connection id: 37148040f92c19ce (scid: 5a051a7ac4450bde) >- CryptoStream[I|ClientHello] 25.047 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.247/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.047 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.053 <- (3) Packet A|3|S0|d4c39a5c2a3c67dd|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 25.054 -> Packet A|2|S0|815af3927bd72b06|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 25.074 <- (4) Packet A|5|S0|d4c39a5c2a3c67dd|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 25.074 -> Packet A|3|S0|815af3927bd72b06|35|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 25.246 loss detection timeout handler running Sending probe 0, because no ack since 25.047. Current RTT: 100/25. 25.246 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.246 (Probe is an initial retransmit) 25.247 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.647/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.247 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.280 <- (1) Packet I|91254|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 25.280 probe count not reset on ack because handshake not yet confirmed 25.281 Retransmitting CryptoFrame[0,257] on level Initial 25.281 Cwnd(-): 6000; inflight: 0 25.281 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.681/Initial, because peerAwaitingAddressValidation | RTT:100/25 25.281 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 25.475/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.281 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 25.280 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 25.283 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 25.477/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.283 -> Packet I|3|L|1201|2 Token=[] AckFrame[91254|Δ0] Padding(1150) >- CryptoStream[H|Finished] 25.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 25.479/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.285 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.280 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 25.286 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.383/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.286 Discarding pn space Initial because first Handshake message is being sent 25.286 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 25.286 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 25.280 <- (2) Packet A|0|S0|5a051a7ac4450bde|311|4 CryptoFrame[0,133] NewTokenFrame[9fece21f33aae94813b5a2214503e8a3d93ad79970e5ad61ac315da7731c22f5e6319f48d321096f7a701a2a5c140d9c7a1a] NewConnectionIdFrame[1,<0|ccf59c368dac1031|4ec6bd8d9d1929f249c829f2fc101740] Padding(68) -< CryptoStream[A|NewSessionTicket] 25.286 Starting downloading https://server4:443/lcstvuderz at 07:54.600 on ClientConnection[37148040f92c19ce/5a051a7ac4450bde(V1) with server4/193.167.100.100:443] 25.287 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.384/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.287 -> Packet A|0|S0|a24f6e69d7b0d8c2|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 25.314 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 25.319 <- (4) Packet A|2|S0|5a051a7ac4450bde|55|2 HandshakeDoneFrame[] Padding(28) 25.319 State is set to Confirmed reschedule loss detection timer for PTO over 62 millis, based on 25.382/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 74 millis, based on 25.394/App, because ackElicitingInFlight | RTT:33/16 25.319 Discarding pn space Handshake because HandshakeDone is received 25.339 -> Packet A|1|S0|a24f6e69d7b0d8c2|34|1 AckFrame[2,0|Δ19] 25.370 <- (5) Packet A|3|S0|5a051a7ac4450bde|1400|2 PingFrame[] Padding(1373) 25.390 -> Packet A|2|S0|a24f6e69d7b0d8c2|34|1 AckFrame[3-2,0|Δ19] 25.394 loss detection timeout handler running Sending probe 0, because no ack since 25.287. Current RTT: 33/16. 25.394 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 25.608/App, because ackElicitingInFlight | RTT:33/16 25.394 -> Packet PA|3|S0|a24f6e69d7b0d8c2|47|1 StreamFrame[0(CIB),0,17,fin] 25.425 <- (6) Packet A|4|S0|5a051a7ac4450bde|1079|3 AckFrame[3-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 25.426 Cwnd(-): 3000; inflight: 0 25.426 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 25.426 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 25.521/App, because ackElicitingInFlight | RTT:33/13 25.426 -> Packet A|4|S0|a24f6e69d7b0d8c2|47|1 StreamFrame[0(CIB),0,17,fin] 25.426 Finished downloading https://server4:443/lcstvuderz at 07:54.740 on ClientConnection[37148040f92c19ce/5a051a7ac4450bde(V1) with server4/193.167.100.100:443] 25.426 Closing ClientConnection[37148040f92c19ce/5a051a7ac4450bde(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.427 -> Packet A|5|S0|a24f6e69d7b0d8c2|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 25.427 Creating connection with server4:443 with v1 25.428 Setting up connection for downloading https://server4:443/eilgpcwfov at 07:54.742 on ClientConnection[3a65289465b6feb9/def3d05531ff5583(V1) with server4/193.167.100.100:443] 25.428 Original destination connection id: 3a65289465b6feb9 (scid: def3d05531ff5583) >- CryptoStream[I|ClientHello] 25.429 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.629/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.429 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.435 <- (7) Packet A|5|S0|5a051a7ac4450bde|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 25.436 -> Packet A|6|S0|a24f6e69d7b0d8c2|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 25.445 <- (8) Packet A|6|S0|5a051a7ac4450bde|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 25.446 -> Packet A|7|S0|a24f6e69d7b0d8c2|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 25.457 <- (9) Packet A|8|S0|5a051a7ac4450bde|30|1 ConnectionCloseFrame[0|0|] 25.462 <- (1) Packet I|115735|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 25.463 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.663/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 25.462 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 25.465 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.562/Handshake, because peerAwaitingAddressValidation | RTT:33/16 25.465 -> Packet I|1|L|1201|2 Token=[] AckFrame[115735|Δ0] Padding(1150) >- CryptoStream[H|Finished] 25.467 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.564/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.467 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.468 Starting downloading https://server4:443/eilgpcwfov at 07:54.782 on ClientConnection[3a65289465b6feb9/def3d05531ff5583(V1) with server4/193.167.100.100:443] 25.462 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 25.468 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 25.468 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.565/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.468 Discarding pn space Initial because first Handshake message is being sent 25.468 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.565/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.468 -> Packet A|0|S0|8f5a967812f97217|47|1 StreamFrame[0(CIB),0,17,fin] 25.463 <- (2) Packet A|0|S0|def3d05531ff5583|311|4 CryptoFrame[0,133] NewTokenFrame[b5582e11152713f3c8c636db57f1a679ee075a273b457420df9b3fdf6e6fb40e2a39e10a0cf940c3a275a417f3b629df1594] NewConnectionIdFrame[1,<0|75c0a95636ff646b|36268ecb38746a0c5e499fba3e7040aa] Padding(68) 25.468 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 25.488 -> Packet A|1|S0|8f5a967812f97217|32|1 AckFrame[0|Δ19] 25.498 <- (3) Packet A|2|S0|def3d05531ff5583|55|2 HandshakeDoneFrame[] Padding(28) 25.498 State is set to Confirmed reschedule loss detection timer for PTO over 66 millis, based on 25.564/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 25.575/App, because ackElicitingInFlight | RTT:33/16 25.498 Discarding pn space Handshake because HandshakeDone is received 25.518 -> Packet A|2|S0|8f5a967812f97217|34|1 AckFrame[2,0|Δ19] 25.574 loss detection timeout handler running Sending probe 0, because no ack since 25.468. Current RTT: 33/16. 25.575 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 25.789/App, because ackElicitingInFlight | RTT:33/16 25.575 -> Packet PA|3|S0|8f5a967812f97217|47|1 StreamFrame[0(CIB),0,17,fin] 25.616 <- (4) Packet A|5|S0|def3d05531ff5583|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 25.617 Finished downloading https://server4:443/eilgpcwfov at 07:54.931 on ClientConnection[3a65289465b6feb9/def3d05531ff5583(V1) with server4/193.167.100.100:443] 25.617 Closing ClientConnection[3a65289465b6feb9/def3d05531ff5583(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.617 -> Packet A|4|S0|8f5a967812f97217|39|2 ConnectionCloseFrame[0|0|] AckFrame[5,2,0|Δ0] 25.618 Creating connection with server4:443 with v1 25.618 Setting up connection for downloading https://server4:443/qjexamwfue at 07:54.932 on ClientConnection[5ccf770fa98132f2/c16c4d3af786ed1a(V1) with server4/193.167.100.100:443] 25.618 Original destination connection id: 5ccf770fa98132f2 (scid: c16c4d3af786ed1a) >- CryptoStream[I|ClientHello] 25.619 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.819/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.619 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.626 <- (5) Packet A|6|S0|def3d05531ff5583|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 25.627 -> Packet A|5|S0|8f5a967812f97217|39|2 ConnectionCloseFrame[0|0|] AckFrame[5,2,0|Δ0] 25.636 <- (6) Packet A|7|S0|def3d05531ff5583|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 25.637 -> Packet A|6|S0|8f5a967812f97217|39|2 ConnectionCloseFrame[0|0|] AckFrame[5,2,0|Δ0] 25.648 <- (7) Packet A|9|S0|def3d05531ff5583|30|1 ConnectionCloseFrame[0|0|] 25.652 <- (1) Packet I|86629|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 25.653 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.853/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 25.652 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 25.655 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.752/Handshake, because peerAwaitingAddressValidation | RTT:33/16 25.655 -> Packet I|1|L|1201|2 Token=[] AckFrame[86629|Δ0] Padding(1150) >- CryptoStream[H|Finished] 25.658 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.755/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.658 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.652 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 25.658 Starting downloading https://server4:443/qjexamwfue at 07:54.972 on ClientConnection[5ccf770fa98132f2/c16c4d3af786ed1a(V1) with server4/193.167.100.100:443] 25.658 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.755/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.658 Discarding pn space Initial because first Handshake message is being sent 25.658 -> Packet H|1|L|46|1 AckFrame[1-0|Δ0] 25.659 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.756/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.659 -> Packet A|0|S0|f1fd3de85b60adea|47|1 StreamFrame[0(CIB),0,17,fin] 25.690 <- (2) Packet A|3|S0|c16c4d3af786ed1a|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 25.691 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.788/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.691 Finished downloading https://server4:443/qjexamwfue at 07:55.005 on ClientConnection[5ccf770fa98132f2/c16c4d3af786ed1a(V1) with server4/193.167.100.100:443] 25.692 Closing ClientConnection[5ccf770fa98132f2/c16c4d3af786ed1a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.692 -> Packet A|1|S0|f1fd3de85b60adea|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 25.692 Creating connection with server4:443 with v1 25.693 Setting up connection for downloading https://server4:443/makgyygumc at 07:55.007 on ClientConnection[b7941600c6564e6f/4e509a8e2ed05e73(V1) with server4/193.167.100.100:443] 25.693 Original destination connection id: b7941600c6564e6f (scid: 4e509a8e2ed05e73) >- CryptoStream[I|ClientHello] 25.694 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.894/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.694 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.710 <- (3) Packet A|5|S0|c16c4d3af786ed1a|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 25.711 -> Packet A|2|S0|f1fd3de85b60adea|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 25.720 <- (4) Packet A|6|S0|c16c4d3af786ed1a|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 25.721 -> Packet A|3|S0|f1fd3de85b60adea|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 25.893 loss detection timeout handler running Sending probe 0, because no ack since 25.694. Current RTT: 100/25. 25.893 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.893 (Probe is an initial retransmit) 25.894 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.294/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.894 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.927 <- (1) Packet I|90800|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 25.928 probe count not reset on ack because handshake not yet confirmed 25.928 Retransmitting CryptoFrame[0,257] on level Initial 25.928 Cwnd(-): 6000; inflight: 0 25.928 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.328/Initial, because peerAwaitingAddressValidation | RTT:100/25 25.928 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 26.122/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.928 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 25.927 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 25.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 26.124/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.930 -> Packet I|3|L|1201|2 Token=[] AckFrame[90800|Δ0] Padding(1150) >- CryptoStream[H|Finished] 25.932 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 26.126/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.932 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.927 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 25.933 Starting downloading https://server4:443/makgyygumc at 07:55.247 on ClientConnection[b7941600c6564e6f/4e509a8e2ed05e73(V1) with server4/193.167.100.100:443] 25.933 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 25.933 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.030/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.933 Discarding pn space Initial because first Handshake message is being sent 25.933 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 25.933 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.030/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.927 <- (2) Packet A|0|S0|4e509a8e2ed05e73|311|4 CryptoFrame[0,133] NewTokenFrame[f555f21ea1502f903509c86d5b109608e7b11e38ef38f30e2d9dfd4005a6e8f699e19b751d1a385046273c5760522c289b6d] NewConnectionIdFrame[1,<0|191921ec8cc6155d|191a80fb132615013c0303eefae0d421] Padding(68) 25.933 -> Packet A|0|S0|61762c2cb3d02f18|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 25.953 -> Packet A|1|S0|61762c2cb3d02f18|32|1 AckFrame[0|Δ19] 25.961 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 25.987 <- (4) Packet A|4|S0|4e509a8e2ed05e73|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 25.988 State is set to Confirmed reschedule loss detection timer for PTO over 41 millis, based on 26.029/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 52 millis, based on 26.040/App, because ackElicitingInFlight | RTT:33/16 25.988 Discarding pn space Handshake because HandshakeDone is received 25.988 Finished downloading https://server4:443/makgyygumc at 07:55.302 on ClientConnection[b7941600c6564e6f/4e509a8e2ed05e73(V1) with server4/193.167.100.100:443] 25.988 Closing ClientConnection[b7941600c6564e6f/4e509a8e2ed05e73(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.989 -> Packet A|2|S0|61762c2cb3d02f18|37|2 ConnectionCloseFrame[0|0|] AckFrame[4,0|Δ0] 25.989 Creating connection with server4:443 with v1 25.989 Setting up connection for downloading https://server4:443/yxsuqzsrtj at 07:55.303 on ClientConnection[69bb781e317d2bd6/6201190ee494cae2(V1) with server4/193.167.100.100:443] 25.989 Original destination connection id: 69bb781e317d2bd6 (scid: 6201190ee494cae2) >- CryptoStream[I|ClientHello] 25.991 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.191/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.990 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.008 <- (5) Packet A|6|S0|4e509a8e2ed05e73|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 26.008 -> Packet A|3|S0|61762c2cb3d02f18|37|2 ConnectionCloseFrame[0|0|] AckFrame[4,0|Δ0] 26.018 <- (6) Packet A|7|S0|4e509a8e2ed05e73|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 26.018 -> Packet A|4|S0|61762c2cb3d02f18|37|2 ConnectionCloseFrame[0|0|] AckFrame[4,0|Δ0] 26.019 <- (7) Packet A|8|S0|4e509a8e2ed05e73|30|1 ConnectionCloseFrame[0|0|] 26.190 loss detection timeout handler running Sending probe 0, because no ack since 25.990. Current RTT: 100/25. 26.190 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.190 (Probe is an initial retransmit) 26.190 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.590/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.190 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.589 loss detection timeout handler running Sending probe 1, because no ack since 26.190. Current RTT: 100/25. 26.589 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.590 (Probe is an initial retransmit) 26.590 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.390/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.590 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.591 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.391/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.591 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.624 <- (1) Packet I|105525|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[3-2|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 26.628 probe count not reset on ack because handshake not yet confirmed 26.628 Retransmitting CryptoFrame[0,257] on level Initial 26.628 Cwnd(-): 6000; inflight: 0 26.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 27.428/Handshake, because peerAwaitingAddressValidation | RTT:100/25 26.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 27.016/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.628 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.624 <- (1) Packet H|2|L|1069|2 PingFrame[] Padding(1023) 26.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.725/Handshake, because peerAwaitingAddressValidation | RTT:33/16 26.628 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 96 millis, based on 26.725/Handshake, because peerAwaitingAddressValidation | RTT:33/16 26.628 -> Packet I|5|L|1201|2 Token=[] AckFrame[105525|Δ0] Padding(1150) 26.628 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 26.661 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.724 loss detection timeout handler running 26.724 Sending probe 0. Current RTT: 33/16. 26.724 Sending probe because peer awaiting address validation 26.725 (Probe is a handshake ping) 26.725 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 26.919/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.725 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 26.862 <- (3) Packet H|7|L|55|3 PingFrame[] AckFrame[1-0|Δ106] Padding(3) 26.862 probe count not reset on ack because handshake not yet confirmed 26.862 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 26.862 -> Packet H|2|L|46|1 AckFrame[7|Δ0] 26.894 <- (4) Packet H|8|L|823|3 CryptoFrame[0,701] AckFrame[2-1|Δ0] Padding(68) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 395 millis, based on 27.293/Handshake, because ackElicitingInFlight | RTT:46/38 26.897 -> Packet H|3|L|85|2 CryptoFrame[0,36] AckFrame[7|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.897 Starting downloading https://server4:443/yxsuqzsrtj at 07:56.211 on ClientConnection[69bb781e317d2bd6/6201190ee494cae2(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 197 millis, based on 27.095/Handshake, because ackElicitingInFlight | RTT:46/38 26.894 <- (4) Packet H|9|L|55|3 PingFrame[] AckFrame[2-1|Δ0] Padding(4) 26.897 -> Packet H|4|L|46|1 AckFrame[8|Δ0] reschedule loss detection timer for PTO over 197 millis, based on 27.095/Handshake, because ackElicitingInFlight | RTT:46/38 26.897 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 197 millis, based on 27.095/Handshake, because ackElicitingInFlight | RTT:46/38 26.897 -> Packet A|0|S0|2ac75b53dca008d4|47|1 StreamFrame[0(CIB),0,17,fin] 26.898 -> Packet H|5|L|46|1 AckFrame[9-8|Δ0] 26.928 <- (5) Packet A|2|S0|6201190ee494cae2|311|4 CryptoFrame[0,133] NewTokenFrame[bba93740650754e28d20e4a3df29b66b71799c622fedf5b5e91409a8972f3858d2b80c28ed5494a6aa87fd9b7a02d90fadfb] NewConnectionIdFrame[1,<0|7db256d1eaa98fe8|3eea09537c40c969ca5c9ce8321d387b] Padding(68) -< CryptoStream[A|NewSessionTicket] 26.947 -> Packet A|1|S0|2ac75b53dca008d4|32|1 AckFrame[2|Δ19] 26.979 <- (6) Packet A|6|S0|6201190ee494cae2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 26.980 Finished downloading https://server4:443/yxsuqzsrtj at 07:56.294 on ClientConnection[69bb781e317d2bd6/6201190ee494cae2(V1) with server4/193.167.100.100:443] 26.980 Closing ClientConnection[69bb781e317d2bd6/6201190ee494cae2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.980 -> Packet A|2|S0|2ac75b53dca008d4|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,2|Δ0] 26.981 Creating connection with server4:443 with v1 26.980 <- (7) Packet A|7|S0|6201190ee494cae2|1400|2 PingFrame[] Padding(1373) 26.981 -> Packet A|3|S0|2ac75b53dca008d4|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,2|Δ0] 26.981 Setting up connection for downloading https://server4:443/qgibtkhbik at 07:56.295 on ClientConnection[5815185ed90a9040/1a9d0924f9bbf9d7(V1) with server4/193.167.100.100:443] 26.981 Original destination connection id: 5815185ed90a9040 (scid: 1a9d0924f9bbf9d7) >- CryptoStream[I|ClientHello] 26.982 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.182/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.982 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.989 <- (8) Packet A|8|S0|6201190ee494cae2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 26.989 -> Packet A|4|S0|2ac75b53dca008d4|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,2|Δ0] 27.009 <- (9) Packet A|10|S0|6201190ee494cae2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 27.011 <- (10) Packet A|11|S0|6201190ee494cae2|30|1 ConnectionCloseFrame[0|0|] 27.015 <- (1) Packet I|129203|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 27.016 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.216/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.015 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 27.018 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.115/Handshake, because peerAwaitingAddressValidation | RTT:33/16 27.018 -> Packet I|1|L|1201|2 Token=[] AckFrame[129203|Δ0] Padding(1150) >- CryptoStream[H|Finished] 27.020 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.117/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.020 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.015 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 27.020 Starting downloading https://server4:443/qgibtkhbik at 07:56.334 on ClientConnection[5815185ed90a9040/1a9d0924f9bbf9d7(V1) with server4/193.167.100.100:443] 27.021 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.020 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 27.118/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.021 Discarding pn space Initial because first Handshake message is being sent 27.021 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 27.021 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.118/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.021 -> Packet A|0|S0|e17e42c57c39d6de|47|1 StreamFrame[0(CIB),0,17,fin] 27.117 loss detection timeout handler running Sending probe 0, because no ack since 27.020. Current RTT: 33/16. 27.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.117 (Probe is a handshake retransmit) 27.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 27.312/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.117 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 27.311 loss detection timeout handler running Sending probe 1, because no ack since 27.021. Current RTT: 33/16. 27.311 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.311 (Probe is a handshake retransmit) 27.311 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 27.699/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.311 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 27.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 27.700/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.312 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 27.342 <- (2) Packet A|2|S0|1a9d0924f9bbf9d7|311|5 CryptoFrame[0,133] NewTokenFrame[ac534e032830f3969fdedae9347ec31d4bcd4f4d6c4617275d94f6c57e1e30a5bfc3c7fe1881cede6160bad13d23bda65409] NewConnectionIdFrame[1,<0|05d562268975124f|5cf945535f2d720322b813f5ecf1a7d4] AckFrame[0|Δ290] Padding(60) -< CryptoStream[A|NewSessionTicket] 27.343 probe count not reset on ack because handshake not yet confirmed 27.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 27.731/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.343 <- (3) Packet A|3|S0|1a9d0924f9bbf9d7|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 27.343 State is set to Confirmed reschedule loss detection timer for PTO over 1552 millis, based on 28.896/Handshake, because ackElicitingInFlight | RTT:68/82 27.343 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.343 Discarding pn space Handshake because HandshakeDone is received 27.344 -> Packet A|1|S0|e17e42c57c39d6de|31|1 AckFrame[3-2|Δ0] 27.344 Finished downloading https://server4:443/qgibtkhbik at 07:56.658 on ClientConnection[5815185ed90a9040/1a9d0924f9bbf9d7(V1) with server4/193.167.100.100:443] 27.344 Closing ClientConnection[5815185ed90a9040/1a9d0924f9bbf9d7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.344 -> Packet A|2|S0|e17e42c57c39d6de|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 27.344 Creating connection with server4:443 with v1 27.345 Setting up connection for downloading https://server4:443/jocbiynyea at 07:56.659 on ClientConnection[30fef95c8bb19172/05df38131caa8c38(V1) with server4/193.167.100.100:443] 27.345 Original destination connection id: 30fef95c8bb19172 (scid: 05df38131caa8c38) >- CryptoStream[I|ClientHello] 27.346 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.546/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.346 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.375 <- (4) Packet A|5|S0|1a9d0924f9bbf9d7|1400|2 PingFrame[] Padding(1373) 27.375 <- (5) Packet A|6|S0|1a9d0924f9bbf9d7|30|1 ConnectionCloseFrame[0|0|] 27.376 -> Packet A|3|S0|e17e42c57c39d6de|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 27.379 <- (1) Packet I|68405|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 27.380 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.580/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.379 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 27.382 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.479/Handshake, because peerAwaitingAddressValidation | RTT:33/16 27.382 -> Packet I|1|L|1201|2 Token=[] AckFrame[68405|Δ0] Padding(1150) >- CryptoStream[H|Finished] 27.384 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.481/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.384 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.379 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 27.384 Starting downloading https://server4:443/jocbiynyea at 07:56.698 on ClientConnection[30fef95c8bb19172/05df38131caa8c38(V1) with server4/193.167.100.100:443] 27.384 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.384 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 27.481/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.384 Discarding pn space Initial because first Handshake message is being sent 27.384 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 27.384 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.481/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.384 -> Packet A|0|S0|d0ba4ced7d015365|47|1 StreamFrame[0(CIB),0,17,fin] 27.414 <- (2) Packet A|2|S0|05df38131caa8c38|55|2 HandshakeDoneFrame[] Padding(28) 27.415 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 27.481/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 27.491/App, because ackElicitingInFlight | RTT:33/16 27.415 Discarding pn space Handshake because HandshakeDone is received 27.416 <- (3) Packet A|3|S0|05df38131caa8c38|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 27.416 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.416 -> Packet A|1|S0|d0ba4ced7d015365|32|1 AckFrame[3-2|Δ1] 27.416 Finished downloading https://server4:443/jocbiynyea at 07:56.730 on ClientConnection[30fef95c8bb19172/05df38131caa8c38(V1) with server4/193.167.100.100:443] 27.416 Closing ClientConnection[30fef95c8bb19172/05df38131caa8c38(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.417 -> Packet A|2|S0|d0ba4ced7d015365|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 27.417 Creating connection with server4:443 with v1 27.417 Setting up connection for downloading https://server4:443/jwhmrtueta at 07:56.731 on ClientConnection[84b74419d5219583/90b8d8805d84c54b(V1) with server4/193.167.100.100:443] 27.417 Original destination connection id: 84b74419d5219583 (scid: 90b8d8805d84c54b) >- CryptoStream[I|ClientHello] 27.418 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.618/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.418 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.426 <- (4) Packet A|4|S0|05df38131caa8c38|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 27.426 -> Packet A|3|S0|d0ba4ced7d015365|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 27.436 <- (5) Packet A|5|S0|05df38131caa8c38|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 27.436 -> Packet A|4|S0|d0ba4ced7d015365|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 27.446 <- (6) Packet A|6|S0|05df38131caa8c38|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 27.448 <- (7) Packet A|9|S0|05df38131caa8c38|30|1 ConnectionCloseFrame[0|0|] 27.618 loss detection timeout handler running Sending probe 0, because no ack since 27.418. Current RTT: 100/25. 27.618 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.618 (Probe is an initial retransmit) 27.618 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.018/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.618 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.017 loss detection timeout handler running Sending probe 1, because no ack since 27.618. Current RTT: 100/25. 28.017 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.017 (Probe is an initial retransmit) 28.018 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.818/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.018 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 28.819/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.019 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.050 <- (1) Packet I|99837|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[2,0|Δ0] Padding(3) -< CryptoStream[I|ServerHello] 28.053 probe count not reset on ack because handshake not yet confirmed 28.053 Cwnd(-): 6000; inflight: 1200 28.053 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 28.853/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.050 <- (1) Packet H|2|L|1069|2 CryptoFrame[0,703] Padding(317) 28.053 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 28.437/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.053 -> Packet I|4|L|1201|2 Token=[] AckFrame[99837|Δ0] Padding(1150) >- CryptoStream[H|Finished] 28.055 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 28.439/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.055 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.056 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.056 Starting downloading https://server4:443/jwhmrtueta at 07:57.370 on ClientConnection[84b74419d5219583/90b8d8805d84c54b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 28.152/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.056 Discarding pn space Initial because first Handshake message is being sent 28.056 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 28.152/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.056 -> [Packet H|1|L|46|1 AckFrame[2|Δ0], Packet A|0|S0|6cb76fcaa0c6eed3|47|1 StreamFrame[0(CIB),0,17,fin]] 28.086 <- (2) Packet A|3|S0|90b8d8805d84c54b|55|2 HandshakeDoneFrame[] Padding(28) 28.087 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 28.151/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 75 millis, based on 28.162/App, because ackElicitingInFlight | RTT:32/16 28.087 Discarding pn space Handshake because HandshakeDone is received 28.106 -> Packet A|1|S0|6cb76fcaa0c6eed3|32|1 AckFrame[3|Δ19] 28.138 <- (3) Packet A|6|S0|90b8d8805d84c54b|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 28.139 Finished downloading https://server4:443/jwhmrtueta at 07:57.453 on ClientConnection[84b74419d5219583/90b8d8805d84c54b(V1) with server4/193.167.100.100:443] 28.139 Closing ClientConnection[84b74419d5219583/90b8d8805d84c54b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.139 <- (4) Packet A|7|S0|90b8d8805d84c54b|1400|2 PingFrame[] Padding(1373) 28.139 -> Packet A|2|S0|6cb76fcaa0c6eed3|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 28.139 Creating connection with server4:443 with v1 28.140 -> Packet A|3|S0|6cb76fcaa0c6eed3|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 28.140 Setting up connection for downloading https://server4:443/hlctmgacrl at 07:57.454 on ClientConnection[1b0c2734620df802/534ed7998b5c81e9(V1) with server4/193.167.100.100:443] 28.140 Original destination connection id: 1b0c2734620df802 (scid: 534ed7998b5c81e9) >- CryptoStream[I|ClientHello] 28.141 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.341/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.141 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.148 <- (5) Packet A|8|S0|90b8d8805d84c54b|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 28.148 -> Packet A|4|S0|6cb76fcaa0c6eed3|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 28.158 <- (6) Packet A|9|S0|90b8d8805d84c54b|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 28.168 <- (7) Packet A|11|S0|90b8d8805d84c54b|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 28.168 -> Packet A|5|S0|6cb76fcaa0c6eed3|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,3|Δ0] 28.174 <- (1) Packet I|83610|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 28.175 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.375/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 28.174 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 28.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.274/Handshake, because peerAwaitingAddressValidation | RTT:33/16 28.177 -> Packet I|1|L|1201|2 Token=[] AckFrame[83610|Δ0] Padding(1150) >- CryptoStream[H|Finished] 28.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.179 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.174 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 28.179 Starting downloading https://server4:443/hlctmgacrl at 07:57.493 on ClientConnection[1b0c2734620df802/534ed7998b5c81e9(V1) with server4/193.167.100.100:443] 28.179 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 28.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.179 Discarding pn space Initial because first Handshake message is being sent 28.179 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 28.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.179 -> Packet A|0|S0|5c9b6da57d36d91e|47|1 StreamFrame[0(CIB),0,17,fin] 28.210 <- (2) Packet A|2|S0|534ed7998b5c81e9|55|2 HandshakeDoneFrame[] Padding(28) 28.210 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 28.276/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 28.286/App, because ackElicitingInFlight | RTT:33/16 28.210 Discarding pn space Handshake because HandshakeDone is received 28.211 <- (3) Packet A|3|S0|534ed7998b5c81e9|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 28.211 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.211 -> Packet A|1|S0|5c9b6da57d36d91e|32|1 AckFrame[3-2|Δ1] 28.212 Finished downloading https://server4:443/hlctmgacrl at 07:57.526 on ClientConnection[1b0c2734620df802/534ed7998b5c81e9(V1) with server4/193.167.100.100:443] 28.212 Closing ClientConnection[1b0c2734620df802/534ed7998b5c81e9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.212 -> Packet A|2|S0|5c9b6da57d36d91e|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 28.212 Creating connection with server4:443 with v1 28.213 Setting up connection for downloading https://server4:443/smatevzifm at 07:57.527 on ClientConnection[c8d32f2961cca270/75bd342e4d5983a2(V1) with server4/193.167.100.100:443] 28.213 Original destination connection id: c8d32f2961cca270 (scid: 75bd342e4d5983a2) >- CryptoStream[I|ClientHello] 28.214 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.414/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.214 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.242 <- (4) Packet A|4|S0|534ed7998b5c81e9|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 28.242 <- (5) Packet A|5|S0|534ed7998b5c81e9|311|4 CryptoFrame[0,133] NewTokenFrame[dcceebcdb4a35646fd9b47f789ac9c3f69c1e758b870cb994bd2136c2f77f92befd79dca09f00a3d407aab50699105ebd971] NewConnectionIdFrame[1,<0|a23b805667ec7334|acf9e4e147db6b45d21b4f618a6fb1dd] Padding(68) 28.243 -> Packet A|3|S0|5c9b6da57d36d91e|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 28.243 -> Packet A|4|S0|5c9b6da57d36d91e|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 28.244 <- (6) Packet A|6|S0|534ed7998b5c81e9|1400|2 PingFrame[] Padding(1373) 28.244 <- (7) Packet A|7|S0|534ed7998b5c81e9|30|1 ConnectionCloseFrame[0|0|] 28.247 <- (1) Packet I|102747|L|178|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 28.247 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.447/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 28.249 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.247 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] reschedule loss detection timer for PTO over 96 millis, based on 28.346/Handshake, because peerAwaitingAddressValidation | RTT:33/16 28.249 -> Packet I|1|L|1201|2 Token=[] AckFrame[102747|Δ0] Padding(1150) >- CryptoStream[H|Finished] 28.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.348/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.251 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.247 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 28.252 Starting downloading https://server4:443/smatevzifm at 07:57.566 on ClientConnection[c8d32f2961cca270/75bd342e4d5983a2(V1) with server4/193.167.100.100:443] 28.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.252 Discarding pn space Initial because first Handshake message is being sent 28.247 <- (2) Packet A|0|S0|75bd342e4d5983a2|311|4 CryptoFrame[0,133] NewTokenFrame[891a2298b868f4182397b249c622b86845a32c8457d02de5fdd19fd09f3fdc80baf2fe55c2163c75fd250f91f031423af02d] NewConnectionIdFrame[1,<0|a580edd820852f8c|417eeb1116ca8c986feeafdd426e7f17] Padding(68) -< CryptoStream[A|NewSessionTicket] 28.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.252 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|620b26ae539edc6f|47|1 StreamFrame[0(CIB),0,17,fin]] 28.271 -> Packet A|1|S0|620b26ae539edc6f|32|1 AckFrame[0|Δ19] 28.348 loss detection timeout handler running Sending probe 0, because no ack since 28.251. Current RTT: 33/16. 28.348 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.349 (Probe is a handshake retransmit) 28.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 28.543/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.349 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 28.381 <- (3) Packet A|2|S0|75bd342e4d5983a2|1079|4 AckFrame[1-0|Δ77] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(18) 28.381 probe count not reset on ack because handshake not yet confirmed 28.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 28.575/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.381 State is set to Confirmed reschedule loss detection timer for PTO over 161 millis, based on 28.543/Handshake, because ackElicitingInFlight | RTT:33/16 28.381 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.381 Discarding pn space Handshake because HandshakeDone is received 28.382 Finished downloading https://server4:443/smatevzifm at 07:57.696 on ClientConnection[c8d32f2961cca270/75bd342e4d5983a2(V1) with server4/193.167.100.100:443] 28.382 <- (4) Packet A|3|S0|75bd342e4d5983a2|1400|2 PingFrame[] Padding(1373) 28.382 Closing ClientConnection[c8d32f2961cca270/75bd342e4d5983a2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.382 -> Packet A|2|S0|620b26ae539edc6f|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0]