0.000 Creating connection with server4:443 with v1 0.090 Setting up connection for downloading https://server4:443/eqdlxfztzu at 54:05.391 on ClientConnection[41423c4d3df9ac73/0744a1d19df22e73(V1) with server4/193.167.100.100:443] 0.092 Original destination connection id: 41423c4d3df9ac73 (scid: 0744a1d19df22e73) >- CryptoStream[I|ClientHello] 0.282 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.482/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.276 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.325 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 0.482 loss detection timeout handler running Sending probe 0, because no ack since 0.276. Current RTT: 100/25. 0.484 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.485 (Probe is an initial retransmit) 0.488 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.888/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.488 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.887 loss detection timeout handler running Sending probe 1, because no ack since 0.488. Current RTT: 100/25. 0.888 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.888 (Probe is an initial retransmit) 0.889 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 1.689/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.889 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.890 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 1.690/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.890 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.923 <- (2) Packet I|68100|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[3,0|Δ0] Padding(3) -< CryptoStream[I|ServerHello] 0.943 probe count not reset on ack because handshake not yet confirmed 0.949 Cwnd(-): 6000; inflight: 1200 0.954 -> Packet I|4|L|1201|2 Token=[] AckFrame[68100|Δ0] Padding(1150) 0.923 <- (2) Packet H|2|L|1069|2 CryptoFrame[0,702] Padding(318) >- CryptoStream[H|Finished] 0.982 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.989 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 0.989 Starting downloading https://server4:443/eqdlxfztzu at 54:06.307 on ClientConnection[41423c4d3df9ac73/0744a1d19df22e73(V1) with server4/193.167.100.100:443] 0.993 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 1.089/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 0.994 Discarding pn space Initial because first Handshake message is being sent 0.989 <- (3) Packet H|3|L|55|2 PingFrame[] Padding(9) 0.995 -> Packet H|2|L|46|1 AckFrame[3-2|Δ0] 1.016 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 1.112/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 1.014 <- (4) Packet A|2|S0|0744a1d19df22e73|311|4 CryptoFrame[0,133] NewTokenFrame[9dd64fada50b3c05a7c825bf32847464585344a1323ea87a0b8848db09c13fa34735f028193f4483b656e2ce3574e3516e32] NewConnectionIdFrame[1,<0|0f42cb1e88a76222|d301841952604af05ad0265ade0a6998] Padding(68) 1.015 -> Packet A|0|S0|39eca1bb7b865b9d|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 1.014 <- (5) Packet A|3|S0|0744a1d19df22e73|55|2 HandshakeDoneFrame[] Padding(28) 1.032 State is set to Confirmed reschedule loss detection timer for PTO over 46 millis, based on 1.078/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 88 millis, based on 1.121/App, because ackElicitingInFlight | RTT:32/16 1.033 Discarding pn space Handshake because HandshakeDone is received 1.033 -> Packet A|1|S0|39eca1bb7b865b9d|32|1 AckFrame[3-2|Δ1] 1.046 <- (6) Packet A|5|S0|0744a1d19df22e73|55|2 AckFrame[0|Δ0] Padding(24) 1.048 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.418 <- (7) Packet A|6|S0|0744a1d19df22e73|311|5 CryptoFrame[0,133] NewTokenFrame[9dd64fada50b3c05a7c825bf32847464585344a1323ea87a0b8848db09c13fa34735f028193f4483b656e2ce3574e3516e32] NewConnectionIdFrame[1,<0|0f42cb1e88a76222|d301841952604af05ad0265ade0a6998] AckFrame[0|Δ371] Padding(60) -< CryptoStream[A|NewSessionTicket] 1.424 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.444 -> Packet A|2|S0|39eca1bb7b865b9d|34|1 AckFrame[6-5,3-2|Δ19] 1.476 <- (8) Packet A|9|S0|0744a1d19df22e73|1400|2 PingFrame[] Padding(1373) 1.497 -> Packet A|3|S0|39eca1bb7b865b9d|36|1 AckFrame[9,6-5,3-2|Δ19] 1.642 <- (9) Packet A|10|S0|0744a1d19df22e73|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 1.645 Finished downloading https://server4:443/eqdlxfztzu at 54:06.963 on ClientConnection[41423c4d3df9ac73/0744a1d19df22e73(V1) with server4/193.167.100.100:443] 1.647 Closing ClientConnection[41423c4d3df9ac73/0744a1d19df22e73(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.650 Creating connection with server4:443 with v1 1.651 Setting up connection for downloading https://server4:443/gllfgvpbks at 54:06.969 on ClientConnection[0a38a921f5b8bbdb/cea1be17aaf657b0(V1) with server4/193.167.100.100:443] 1.651 Original destination connection id: 0a38a921f5b8bbdb (scid: cea1be17aaf657b0) >- CryptoStream[I|ClientHello] 1.650 -> Packet A|4|S0|39eca1bb7b865b9d|40|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,6-5,3-2|Δ6] 1.655 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.855/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.654 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.681 <- (10) Packet A|12|S0|0744a1d19df22e73|30|1 ConnectionCloseFrame[0|0|] 1.688 <- (1) Packet I|117484|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 1.689 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.890/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.688 <- (1) Packet H|0|L|749|1 CryptoFrame[0,700] 1.695 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.793/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.695 -> Packet I|1|L|1201|2 Token=[] AckFrame[117484|Δ0] Padding(1150) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.688 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 1.701 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.798/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.701 -> Packet H|0|L|80|1 CryptoFrame[0,36] 1.701 Starting downloading https://server4:443/gllfgvpbks at 54:07.020 on ClientConnection[0a38a921f5b8bbdb/cea1be17aaf657b0(V1) with server4/193.167.100.100:443] 1.701 -> Packet H|1|L|46|1 AckFrame[1-0|Δ0] 1.701 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.799/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.702 Discarding pn space Initial because first Handshake message is being sent 1.688 <- (2) Packet A|0|S0|cea1be17aaf657b0|311|4 CryptoFrame[0,133] NewTokenFrame[cee28915e91cda7912144864751d5db2a45d50ca37c966a88938c029a0c75b0dac1b83d2ea082e7e7e8958393849c3d38c72] NewConnectionIdFrame[1,<0|ece88067d3471c23|f7df4f19a9390ab7d3232cc5f9cd347b] Padding(68) -< CryptoStream[A|NewSessionTicket] 1.704 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.801/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.704 -> Packet A|0|S0|f9689d5099bdc56b|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 1.732 <- (3) Packet A|2|S0|cea1be17aaf657b0|55|2 HandshakeDoneFrame[] Padding(28) 1.733 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 1.798/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 77 millis, based on 1.811/App, because ackElicitingInFlight | RTT:33/16 1.733 Discarding pn space Handshake because HandshakeDone is received 1.736 <- (4) Packet A|3|S0|cea1be17aaf657b0|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 1.738 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.738 Finished downloading https://server4:443/gllfgvpbks at 54:07.057 on ClientConnection[0a38a921f5b8bbdb/cea1be17aaf657b0(V1) with server4/193.167.100.100:443] 1.739 Closing ClientConnection[0a38a921f5b8bbdb/cea1be17aaf657b0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.739 -> Packet A|1|S0|f9689d5099bdc56b|32|1 AckFrame[3-2|Δ4] 1.739 -> Packet A|2|S0|f9689d5099bdc56b|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 1.740 Creating connection with server4:443 with v1 1.741 Setting up connection for downloading https://server4:443/ybseuoyzvh at 54:07.059 on ClientConnection[25e64f8d1ceeeffc/49ec275942466d3c(V1) with server4/193.167.100.100:443] 1.741 Original destination connection id: 25e64f8d1ceeeffc (scid: 49ec275942466d3c) >- CryptoStream[I|ClientHello] 1.744 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.944/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.744 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.771 <- (5) Packet A|6|S0|cea1be17aaf657b0|30|1 ConnectionCloseFrame[0|0|] 1.943 loss detection timeout handler running Sending probe 0, because no ack since 1.744. Current RTT: 100/25. 1.944 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.944 (Probe is an initial retransmit) 1.945 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.345/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.945 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.345 loss detection timeout handler running Sending probe 1, because no ack since 1.945. Current RTT: 100/25. 2.345 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.345 (Probe is an initial retransmit) 2.346 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.146/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.346 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.347 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.147/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.347 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.380 <- (1) Packet I|94854|L|179|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 2.381 probe count not reset on ack because handshake not yet confirmed 2.382 Retransmitting CryptoFrame[0,257] on level Initial 2.382 Cwnd(-): 6000; inflight: 1200 2.382 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.182/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.383 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 2.771/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.382 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 2.380 <- (1) Packet H|0|L|749|1 CryptoFrame[0,700] 2.387 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 2.775/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.386 -> Packet I|5|L|1201|2 Token=[] AckFrame[94854|Δ0] Padding(1150) >- CryptoStream[H|Finished] 2.390 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 2.778/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.390 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.380 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 2.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.392 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 2.489/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.392 Discarding pn space Initial because first Handshake message is being sent 2.392 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 2.393 Starting downloading https://server4:443/ybseuoyzvh at 54:07.711 on ClientConnection[25e64f8d1ceeeffc/49ec275942466d3c(V1) with server4/193.167.100.100:443] 2.380 <- (2) Packet A|0|S0|49ec275942466d3c|311|4 CryptoFrame[0,133] NewTokenFrame[8a71910bb34c5779961c1477346789bc0e2ec41a82b7bc7ed0b93e02c83d40a8f89e301fb0de880a624f11ed53a50f519c4f] NewConnectionIdFrame[1,<0|9d240f0f84e35478|162565b7fc5967611a23d903fd10d83e] Padding(68) -< CryptoStream[A|NewSessionTicket] 2.394 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.491/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.394 -> Packet A|0|S0|911b82fd1cf66557|47|1 StreamFrame[0(CIB),0,17,fin] 2.414 -> Packet A|1|S0|911b82fd1cf66557|32|1 AckFrame[0|Δ19] 2.490 loss detection timeout handler running Sending probe 0, because no ack since 2.390. Current RTT: 33/16. 2.490 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.491 (Probe is a handshake retransmit) 2.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.686/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.491 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 2.523 <- (3) Packet A|2|S0|49ec275942466d3c|1079|4 AckFrame[0|Δ97] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(18) 2.524 probe count not reset on ack because handshake not yet confirmed 2.524 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.718/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.525 State is set to Confirmed reschedule loss detection timer for PTO over 326 millis, based on 2.851/Handshake, because ackElicitingInFlight | RTT:44/34 2.525 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.525 Discarding pn space Handshake because HandshakeDone is received 2.525 Finished downloading https://server4:443/ybseuoyzvh at 54:07.844 on ClientConnection[25e64f8d1ceeeffc/49ec275942466d3c(V1) with server4/193.167.100.100:443] 2.526 Closing ClientConnection[25e64f8d1ceeeffc/49ec275942466d3c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.526 -> Packet A|2|S0|911b82fd1cf66557|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 2.526 Creating connection with server4:443 with v1 2.527 Setting up connection for downloading https://server4:443/ssgpbhsdbp at 54:07.846 on ClientConnection[b667a38e131cceb2/19bdb8b50140d521(V1) with server4/193.167.100.100:443] 2.528 Original destination connection id: b667a38e131cceb2 (scid: 19bdb8b50140d521) >- CryptoStream[I|ClientHello] 2.530 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.730/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.530 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.533 <- (4) Packet A|3|S0|49ec275942466d3c|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 2.535 -> Packet A|3|S0|911b82fd1cf66557|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 2.543 <- (5) Packet A|4|S0|49ec275942466d3c|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 2.544 -> Packet A|4|S0|911b82fd1cf66557|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 2.553 <- (6) Packet A|5|S0|49ec275942466d3c|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 2.557 <- (7) Packet A|6|S0|49ec275942466d3c|30|1 ConnectionCloseFrame[0|0|] 2.563 <- (1) Packet I|120836|L|178|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.564 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.764/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.563 <- (1) Packet H|0|L|749|1 CryptoFrame[0,700] 2.568 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.665/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.568 -> Packet I|1|L|1201|2 Token=[] AckFrame[120836|Δ0] Padding(1150) >- CryptoStream[H|Finished] 2.572 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.669/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.572 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.573 Starting downloading https://server4:443/ssgpbhsdbp at 54:07.891 on ClientConnection[b667a38e131cceb2/19bdb8b50140d521(V1) with server4/193.167.100.100:443] 2.563 <- (1) Packet H|1|L|325|2 PingFrame[] Padding(279) 2.573 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.573 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 2.670/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.573 Discarding pn space Initial because first Handshake message is being sent 2.573 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 2.563 <- (2) Packet A|0|S0|19bdb8b50140d521|311|4 CryptoFrame[0,133] NewTokenFrame[96800d6f9419a4e417c1e02eef4ac5fed5c426f7c2bdc97901883c270492d0ce3d959d079dcb6ed5e1873060f15c0d774419] NewConnectionIdFrame[1,<0|dc33505f088aece3|b97ea643b9d958e3c4c65d8b357d4b34] Padding(68) -< CryptoStream[A|NewSessionTicket] 2.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.671/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.574 -> Packet A|0|S0|1a872c4bf7c73f3a|47|1 StreamFrame[0(CIB),0,17,fin] 2.594 -> Packet A|1|S0|1a872c4bf7c73f3a|32|1 AckFrame[0|Δ19] 2.603 <- (3) Packet A|2|S0|19bdb8b50140d521|55|2 HandshakeDoneFrame[] Padding(28) 2.604 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 2.669/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 77 millis, based on 2.681/App, because ackElicitingInFlight | RTT:33/16 2.604 Discarding pn space Handshake because HandshakeDone is received 2.624 -> Packet A|2|S0|1a872c4bf7c73f3a|34|1 AckFrame[2,0|Δ19] 2.656 <- (4) Packet A|3|S0|19bdb8b50140d521|1400|2 PingFrame[] Padding(1373) 2.676 -> Packet A|3|S0|1a872c4bf7c73f3a|34|1 AckFrame[3-2,0|Δ19] 2.681 loss detection timeout handler running Sending probe 0, because no ack since 2.574. Current RTT: 33/16. 2.682 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 2.896/App, because ackElicitingInFlight | RTT:33/16 2.682 -> Packet PA|4|S0|1a872c4bf7c73f3a|47|1 StreamFrame[0(CIB),0,17,fin] 2.714 <- (5) Packet A|4|S0|19bdb8b50140d521|1079|3 AckFrame[4-2|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 2.716 Cwnd(-): 6000; inflight: 0 2.716 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.716 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 2.717 Finished downloading https://server4:443/ssgpbhsdbp at 54:08.035 on ClientConnection[b667a38e131cceb2/19bdb8b50140d521(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 94 millis, based on 2.812/App, because ackElicitingInFlight | RTT:33/13 2.717 Closing ClientConnection[b667a38e131cceb2/19bdb8b50140d521(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.717 -> Packet A|5|S0|1a872c4bf7c73f3a|47|1 StreamFrame[0(CIB),0,17,fin] 2.718 Creating connection with server4:443 with v1 2.718 -> Packet A|6|S0|1a872c4bf7c73f3a|36|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ1] 2.719 Setting up connection for downloading https://server4:443/scqxzkzncx at 54:08.037 on ClientConnection[9d3d5fcc019db8aa/dc2ed8469b9398d5(V1) with server4/193.167.100.100:443] 2.719 Original destination connection id: 9d3d5fcc019db8aa (scid: dc2ed8469b9398d5) >- CryptoStream[I|ClientHello] 2.721 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.921/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.720 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.734 <- (6) Packet A|6|S0|19bdb8b50140d521|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 2.735 -> Packet A|7|S0|1a872c4bf7c73f3a|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 2.744 <- (7) Packet A|7|S0|19bdb8b50140d521|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 2.745 -> Packet A|8|S0|1a872c4bf7c73f3a|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 2.749 <- (8) Packet A|8|S0|19bdb8b50140d521|30|1 ConnectionCloseFrame[0|0|] 2.920 loss detection timeout handler running Sending probe 0, because no ack since 2.720. Current RTT: 100/25. 2.920 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.920 (Probe is an initial retransmit) 2.921 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.321/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.921 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.955 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 3.320 loss detection timeout handler running Sending probe 1, because no ack since 2.921. Current RTT: 100/25. 3.321 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.321 (Probe is an initial retransmit) 3.322 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.122/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.321 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.322 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.122/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.322 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.355 <- (2) Packet I|70623|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[2-1|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 3.360 probe count not reset on ack because handshake not yet confirmed 3.360 Retransmitting CryptoFrame[0,257] on level Initial 3.360 Cwnd(-): 6000; inflight: 1200 3.360 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 4.160/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.360 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.748/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.360 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.355 <- (2) Packet H|2|L|1069|2 CryptoFrame[0,701] Padding(319) 3.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.749/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.361 -> Packet I|5|L|1201|2 Token=[] AckFrame[70623|Δ0] Padding(1150) >- CryptoStream[H|Finished] 3.365 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.753/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.365 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.366 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.366 Starting downloading https://server4:443/scqxzkzncx at 54:08.684 on ClientConnection[9d3d5fcc019db8aa/dc2ed8469b9398d5(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 3.463/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.366 Discarding pn space Initial because first Handshake message is being sent 3.366 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 3.366 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.464/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.366 -> Packet A|0|S0|42ebda51d90fc307|47|1 StreamFrame[0(CIB),0,17,fin] 3.393 <- (3) Packet H|3|L|55|2 PingFrame[] Padding(9) 3.394 -> Packet H|2|L|46|1 AckFrame[3-2|Δ0] 3.396 <- (4) Packet A|2|S0|dc2ed8469b9398d5|311|4 CryptoFrame[0,133] NewTokenFrame[aa73080ade2d31754adae52f7da01e162fa63b9a95150e04a80eed8c1142a855213d2a0d1ab3ab1e855a66411cd4b61737b9] NewConnectionIdFrame[1,<0|9ac67678cf2c33fc|d532851a7427a0623fababb7dfd5fc9a] Padding(68) -< CryptoStream[A|NewSessionTicket] 3.396 <- (5) Packet A|3|S0|dc2ed8469b9398d5|55|2 HandshakeDoneFrame[] Padding(28) 3.397 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 3.462/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 3.473/App, because ackElicitingInFlight | RTT:33/16 3.397 Discarding pn space Handshake because HandshakeDone is received 3.398 -> Packet A|1|S0|42ebda51d90fc307|31|1 AckFrame[3-2|Δ0] 3.399 <- (6) Packet A|5|S0|dc2ed8469b9398d5|55|2 AckFrame[0|Δ2] Padding(23) 3.399 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.647 <- (7) Packet A|6|S0|dc2ed8469b9398d5|311|5 CryptoFrame[0,133] NewTokenFrame[aa73080ade2d31754adae52f7da01e162fa63b9a95150e04a80eed8c1142a855213d2a0d1ab3ab1e855a66411cd4b61737b9] NewConnectionIdFrame[1,<0|9ac67678cf2c33fc|d532851a7427a0623fababb7dfd5fc9a] AckFrame[0|Δ249] Padding(60) -< CryptoStream[A|NewSessionTicket] 3.648 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.648 <- (8) Packet A|7|S0|dc2ed8469b9398d5|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 3.649 Finished downloading https://server4:443/scqxzkzncx at 54:08.967 on ClientConnection[9d3d5fcc019db8aa/dc2ed8469b9398d5(V1) with server4/193.167.100.100:443] 3.649 -> Packet A|2|S0|42ebda51d90fc307|33|1 AckFrame[7-5,3-2|Δ0] 3.649 Closing ClientConnection[9d3d5fcc019db8aa/dc2ed8469b9398d5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.649 -> Packet A|3|S0|42ebda51d90fc307|37|2 ConnectionCloseFrame[0|0|] AckFrame[7-5,3-2|Δ0] 3.650 Creating connection with server4:443 with v1 3.650 Setting up connection for downloading https://server4:443/rdahnulujl at 54:08.969 on ClientConnection[b555d8497f3ae7d2/8f0915c393f13be7(V1) with server4/193.167.100.100:443] 3.651 Original destination connection id: b555d8497f3ae7d2 (scid: 8f0915c393f13be7) >- CryptoStream[I|ClientHello] 3.653 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.853/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.652 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.680 <- (9) Packet A|9|S0|dc2ed8469b9398d5|30|1 ConnectionCloseFrame[0|0|] 3.686 <- (1) Packet I|100061|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.687 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.887/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.686 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 3.691 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.788/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.691 -> Packet I|1|L|1201|2 Token=[] AckFrame[100061|Δ0] Padding(1150) >- CryptoStream[H|Finished] 3.695 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.792/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.695 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.696 Starting downloading https://server4:443/rdahnulujl at 54:09.014 on ClientConnection[b555d8497f3ae7d2/8f0915c393f13be7(V1) with server4/193.167.100.100:443] 3.686 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 3.696 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 3.696 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.793/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.696 Discarding pn space Initial because first Handshake message is being sent 3.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.794/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.686 <- (2) Packet A|0|S0|8f0915c393f13be7|311|4 CryptoFrame[0,133] NewTokenFrame[8699d240db34ffb1f7f4793928f1fe10edc8c1f9f07828449df1d439e7eeedf0c8f5fb0a2fe2f9aee17affbf9c1d7348a355] NewConnectionIdFrame[1,<0|b7995bb067b6375a|94b9ba4a4301f605ae3de4d3160fc726] Padding(68) -< CryptoStream[A|NewSessionTicket] 3.697 -> [Packet H|2|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|b3af225f988eb15e|47|1 StreamFrame[0(CIB),0,17,fin]] 3.717 -> Packet A|1|S0|b3af225f988eb15e|32|1 AckFrame[0|Δ19] 3.726 <- (3) Packet A|2|S0|8f0915c393f13be7|55|2 HandshakeDoneFrame[] Padding(28) 3.727 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 3.792/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 3.804/App, because ackElicitingInFlight | RTT:33/16 3.727 Discarding pn space Handshake because HandshakeDone is received 3.728 <- (4) Packet A|3|S0|8f0915c393f13be7|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 3.729 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.730 Finished downloading https://server4:443/rdahnulujl at 54:09.048 on ClientConnection[b555d8497f3ae7d2/8f0915c393f13be7(V1) with server4/193.167.100.100:443] 3.729 -> Packet A|2|S0|b3af225f988eb15e|34|1 AckFrame[3-2,0|Δ2] 3.730 Closing ClientConnection[b555d8497f3ae7d2/8f0915c393f13be7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.730 -> Packet A|3|S0|b3af225f988eb15e|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 3.730 Creating connection with server4:443 with v1 3.731 Setting up connection for downloading https://server4:443/qwrhkohpod at 54:09.050 on ClientConnection[f5fdd9356df27d70/4a142cf5f199b333(V1) with server4/193.167.100.100:443] 3.731 Original destination connection id: f5fdd9356df27d70 (scid: 4a142cf5f199b333) >- CryptoStream[I|ClientHello] 3.737 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.937/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.737 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.760 <- (5) Packet A|4|S0|8f0915c393f13be7|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 3.760 -> Packet A|4|S0|b3af225f988eb15e|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 3.770 <- (1) Packet I|65915|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.771 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.971/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.774 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.770 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] reschedule loss detection timer for PTO over 96 millis, based on 3.871/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.774 -> Packet I|1|L|1201|2 Token=[] AckFrame[65915|Δ0] Padding(1150) >- CryptoStream[H|Finished] 3.778 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.875/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.778 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.778 Starting downloading https://server4:443/qwrhkohpod at 54:09.097 on ClientConnection[f5fdd9356df27d70/4a142cf5f199b333(V1) with server4/193.167.100.100:443] 3.770 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 3.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.876/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.779 Discarding pn space Initial because first Handshake message is being sent 3.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.876/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.770 <- (2) Packet A|0|S0|4a142cf5f199b333|311|4 CryptoFrame[0,133] NewTokenFrame[803cfa035b35a570c494af60dd663812d36abf9c147e6a0a4413d8df4da8fffdaf22cb5a5439ebb21b4ecdf13494e8e95edc] NewConnectionIdFrame[1,<0|ad3165f6f3e7ccc4|77f1f4cc9414b4eb1541653d263873e1] Padding(68) 3.779 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|21fc1f119bbfe7ce|47|1 StreamFrame[0(CIB),0,17,fin]] -< CryptoStream[A|NewSessionTicket] 3.791 <- (6) Packet A|5|S0|8f0915c393f13be7|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 3.791 <- (7) Packet A|6|S0|8f0915c393f13be7|30|1 ConnectionCloseFrame[0|0|] 3.792 -> Packet A|5|S0|b3af225f988eb15e|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 3.799 -> Packet A|1|S0|21fc1f119bbfe7ce|32|1 AckFrame[0|Δ19] 3.875 loss detection timeout handler running Sending probe 0, because no ack since 3.778. Current RTT: 33/16. 3.876 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.876 (Probe is a handshake retransmit) 3.876 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.070/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.876 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 3.887 <- (3) Packet H|2|L|823|2 CryptoFrame[0,702] Padding(72) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.888 -> Packet H|3|L|46|1 AckFrame[2-0|Δ0] 4.070 loss detection timeout handler running Sending probe 1, because no ack since 3.779. Current RTT: 33/16. 4.070 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.070 (Probe is a handshake retransmit) 4.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 4.459/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.070 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 4.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 4.460/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.071 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 4.102 <- (4) Packet A|2|S0|4a142cf5f199b333|55|2 HandshakeDoneFrame[] Padding(28) 4.102 State is set to Confirmed reschedule loss detection timer for PTO over 104 millis, based on 4.207/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -216 millis, based on 3.886/App, because ackElicitingInFlight | RTT:33/16 4.103 loss detection timeout handler running Sending probe 0, because no ack since 3.779. Current RTT: 33/16. 4.103 Discarding pn space Handshake because HandshakeDone is received 4.103 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 4.317/App, because ackElicitingInFlight | RTT:33/16 4.103 <- (5) Packet A|3|S0|4a142cf5f199b333|1400|2 PingFrame[] Padding(1373) 4.103 -> Packet PA|2|S0|21fc1f119bbfe7ce|47|1 StreamFrame[0(CIB),0,17,fin] 4.104 -> Packet A|3|S0|21fc1f119bbfe7ce|33|1 AckFrame[3-2,0|Δ0] 4.135 <- (6) Packet A|4|S0|4a142cf5f199b333|1079|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 4.136 Cwnd(-): 6000; inflight: 0 4.136 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 4.137 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 4.232/App, because ackElicitingInFlight | RTT:33/13 4.137 -> Packet A|4|S0|21fc1f119bbfe7ce|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-2|Δ0] 4.137 Finished downloading https://server4:443/qwrhkohpod at 54:09.456 on ClientConnection[f5fdd9356df27d70/4a142cf5f199b333(V1) with server4/193.167.100.100:443] 4.137 Closing ClientConnection[f5fdd9356df27d70/4a142cf5f199b333(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.138 -> Packet A|5|S0|21fc1f119bbfe7ce|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 4.138 Creating connection with server4:443 with v1 4.139 Setting up connection for downloading https://server4:443/eubnxibxlz at 54:09.457 on ClientConnection[cf49a4b950447328/f3dfc1bf7deadc55(V1) with server4/193.167.100.100:443] 4.139 Original destination connection id: cf49a4b950447328 (scid: f3dfc1bf7deadc55) >- CryptoStream[I|ClientHello] 4.141 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.341/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.141 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.145 <- (7) Packet A|5|S0|4a142cf5f199b333|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 4.146 -> Packet A|6|S0|21fc1f119bbfe7ce|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 4.155 <- (8) Packet A|6|S0|4a142cf5f199b333|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 4.156 -> Packet A|7|S0|21fc1f119bbfe7ce|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 4.166 <- (9) Packet A|7|S0|4a142cf5f199b333|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 4.167 <- (10) Packet A|8|S0|4a142cf5f199b333|55|2 AckFrame[4-1|Δ0] Padding(24) 4.168 -> Packet A|8|S0|21fc1f119bbfe7ce|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 4.174 <- (1) Packet I|116618|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.175 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.375/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.174 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 4.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.276/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.178 -> Packet I|1|L|1201|2 Token=[] AckFrame[116618|Δ0] Padding(1150) >- CryptoStream[H|Finished] 4.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.278/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.181 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.182 Starting downloading https://server4:443/eubnxibxlz at 54:09.500 on ClientConnection[cf49a4b950447328/f3dfc1bf7deadc55(V1) with server4/193.167.100.100:443] 4.174 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 4.182 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 4.182 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.279/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.182 Discarding pn space Initial because first Handshake message is being sent 4.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.280/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.182 -> [Packet H|2|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|08e79b3e1fe39785|47|1 StreamFrame[0(CIB),0,17,fin]] 4.212 <- (2) Packet A|2|S0|f3dfc1bf7deadc55|55|2 HandshakeDoneFrame[] Padding(28) 4.213 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 4.278/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 4.289/App, because ackElicitingInFlight | RTT:33/16 4.213 Discarding pn space Handshake because HandshakeDone is received 4.233 -> Packet A|1|S0|08e79b3e1fe39785|32|1 AckFrame[2|Δ19] 4.234 <- (3) Packet A|5|S0|f3dfc1bf7deadc55|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 4.235 Finished downloading https://server4:443/eubnxibxlz at 54:09.554 on ClientConnection[cf49a4b950447328/f3dfc1bf7deadc55(V1) with server4/193.167.100.100:443] 4.235 Closing ClientConnection[cf49a4b950447328/f3dfc1bf7deadc55(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.236 -> Packet A|2|S0|08e79b3e1fe39785|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 4.236 Creating connection with server4:443 with v1 4.237 Setting up connection for downloading https://server4:443/fldahenjsr at 54:09.555 on ClientConnection[cbbec72cf214ba24/730072f2bbf32674(V1) with server4/193.167.100.100:443] 4.237 Original destination connection id: cbbec72cf214ba24 (scid: 730072f2bbf32674) >- CryptoStream[I|ClientHello] 4.239 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.439/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.239 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.254 <- (4) Packet A|7|S0|f3dfc1bf7deadc55|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 4.256 -> Packet A|3|S0|08e79b3e1fe39785|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 4.265 <- (5) Packet A|9|S0|f3dfc1bf7deadc55|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 4.266 -> Packet A|4|S0|08e79b3e1fe39785|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 4.273 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 4.275 <- (6) Packet A|11|S0|f3dfc1bf7deadc55|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 4.285 <- (7) Packet A|12|S0|f3dfc1bf7deadc55|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 4.285 -> Packet A|5|S0|08e79b3e1fe39785|37|2 ConnectionCloseFrame[0|0|] AckFrame[5,2|Δ0] 4.295 <- (8) Packet A|13|S0|f3dfc1bf7deadc55|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 4.438 loss detection timeout handler running Sending probe 0, because no ack since 4.239. Current RTT: 100/25. 4.438 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.439 (Probe is an initial retransmit) 4.439 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.839/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.439 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.838 loss detection timeout handler running Sending probe 1, because no ack since 4.439. Current RTT: 100/25. 4.839 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.839 (Probe is an initial retransmit) 4.840 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.640/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.840 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.841 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.641/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.841 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.640 loss detection timeout handler running Sending probe 2, because no ack since 4.841. Current RTT: 100/25. 5.640 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.640 (Probe is an initial retransmit) 5.641 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 7.241/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.641 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.642 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 7.242/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.642 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.674 <- (2) Packet I|90485|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[4,2,0|Δ0] Padding(1) -< CryptoStream[I|ServerHello] 5.678 probe count not reset on ack because handshake not yet confirmed 5.678 Cwnd(-): 6000; inflight: 1200 5.678 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 7.278/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.679 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.674 <- (2) Packet H|4|L|1069|2 PingFrame[] Padding(1023) reschedule loss detection timer for PTO over 775 millis, based on 6.455/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.678 -> Packet I|6|L|1201|2 Token=[] AckFrame[90485|Δ0] Padding(1150) 5.679 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.776/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.679 Discarding pn space Initial because first Handshake message is being sent 5.679 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.679 -> Packet H|0|L|46|1 AckFrame[4|Δ0] 5.711 <- (4) Packet H|6|L|823|2 CryptoFrame[0,701] Padding(73) >- CryptoStream[H|Finished] 5.715 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.812/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.715 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.711 <- (4) Packet H|7|L|55|2 PingFrame[] Padding(9) 5.716 Starting downloading https://server4:443/fldahenjsr at 54:11.034 on ClientConnection[cbbec72cf214ba24/730072f2bbf32674(V1) with server4/193.167.100.100:443] 5.716 -> Packet H|2|L|48|1 AckFrame[6,4|Δ0] 5.716 -> Packet H|3|L|48|1 AckFrame[7-6,4|Δ0] 5.717 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.814/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.717 -> Packet A|0|S0|dfc35c3598acf3ec|47|1 StreamFrame[0(CIB),0,17,fin] 5.746 <- (5) Packet A|2|S0|730072f2bbf32674|311|4 CryptoFrame[0,133] NewTokenFrame[b25682374694500e7d184a964459e126de6d3467ee4c246c8715c83127c095d509e36210b651a8f043970d8a44285e20aefe] NewConnectionIdFrame[1,<0|accdc7165321b409|11e827dd905cf49b5b8fa149f4fde64e] Padding(68) -< CryptoStream[A|NewSessionTicket] 5.746 <- (6) Packet A|3|S0|730072f2bbf32674|55|2 HandshakeDoneFrame[] Padding(28) 5.748 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 5.812/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 75 millis, based on 5.824/App, because ackElicitingInFlight | RTT:33/16 5.748 Discarding pn space Handshake because HandshakeDone is received 5.748 -> Packet A|1|S0|dfc35c3598acf3ec|31|1 AckFrame[3-2|Δ0] 5.749 <- (7) Packet A|5|S0|730072f2bbf32674|55|2 AckFrame[0|Δ1] Padding(23) 5.750 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.780 <- (8) Packet A|6|S0|730072f2bbf32674|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 5.781 Finished downloading https://server4:443/fldahenjsr at 54:11.100 on ClientConnection[cbbec72cf214ba24/730072f2bbf32674(V1) with server4/193.167.100.100:443] 5.782 Closing ClientConnection[cbbec72cf214ba24/730072f2bbf32674(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.781 <- (9) Packet A|7|S0|730072f2bbf32674|1400|2 PingFrame[] Padding(1373) 5.782 Creating connection with server4:443 with v1 5.782 -> Packet A|2|S0|dfc35c3598acf3ec|41|3 ConnectionCloseFrame[0|0|] AckFrame[6-5,3-2|Δ0] ConnectionCloseFrame[0|0|] 5.783 Setting up connection for downloading https://server4:443/fizjrjeesa at 54:11.102 on ClientConnection[6407e998f3d04e7c/7238d13238000113(V1) with server4/193.167.100.100:443] 5.783 Original destination connection id: 6407e998f3d04e7c (scid: 7238d13238000113) >- CryptoStream[I|ClientHello] 5.785 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.985/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.785 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.790 <- (10) Packet A|8|S0|730072f2bbf32674|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 5.791 -> Packet A|3|S0|dfc35c3598acf3ec|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3-2|Δ0] 5.800 <- (11) Packet A|9|S0|730072f2bbf32674|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 5.811 <- (12) Packet A|10|S0|730072f2bbf32674|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 5.811 -> Packet A|4|S0|dfc35c3598acf3ec|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3-2|Δ0] 5.818 <- (1) Packet I|127633|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 5.819 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.019/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.818 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 5.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.920/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.823 -> Packet I|1|L|1201|2 Token=[] AckFrame[127633|Δ0] Padding(1150) >- CryptoStream[H|Finished] 5.826 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.923/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.826 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.827 Starting downloading https://server4:443/fizjrjeesa at 54:11.145 on ClientConnection[6407e998f3d04e7c/7238d13238000113(V1) with server4/193.167.100.100:443] 5.818 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 5.827 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.924/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.827 Discarding pn space Initial because first Handshake message is being sent 5.818 <- (2) Packet A|0|S0|7238d13238000113|311|4 CryptoFrame[0,133] NewTokenFrame[b0812ec5ffdcef18a646e146f8e0b00c8eff08b2ac54e9a1384ca990e021ea7dcdb8cd8c22b461db36f5baf61e5bf1155501] NewConnectionIdFrame[1,<0|f03198fbf7e51339|f708ff73c2929924c2113b02ac5cf511] Padding(68) -< CryptoStream[A|NewSessionTicket] 5.828 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.925/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.828 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|a758adf0eab20be2|47|1 StreamFrame[0(CIB),0,17,fin]] 5.848 -> Packet A|1|S0|a758adf0eab20be2|32|1 AckFrame[0|Δ19] 5.857 <- (3) Packet A|2|S0|7238d13238000113|55|2 HandshakeDoneFrame[] Padding(28) 5.857 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 5.923/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 77 millis, based on 5.935/App, because ackElicitingInFlight | RTT:33/16 5.858 Discarding pn space Handshake because HandshakeDone is received 5.877 -> Packet A|2|S0|a758adf0eab20be2|34|1 AckFrame[2,0|Δ19] 5.935 loss detection timeout handler running Sending probe 0, because no ack since 5.828. Current RTT: 33/16. 5.935 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 6.149/App, because ackElicitingInFlight | RTT:33/16 5.935 -> Packet PA|3|S0|a758adf0eab20be2|47|1 StreamFrame[0(CIB),0,17,fin] 5.975 <- (4) Packet A|3|S0|7238d13238000113|55|3 HandshakeDoneFrame[] AckFrame[1|Δ96] Padding(22) 5.976 Cwnd(-): 6000; inflight: 47 5.977 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 65 millis, based on 6.042/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 106 millis, based on 6.084/App, because ackElicitingInFlight | RTT:33/16 5.977 -> Packet A|4|S0|a758adf0eab20be2|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 5.996 -> Packet A|5|S0|a758adf0eab20be2|32|1 AckFrame[3-2|Δ19] 6.039 <- (5) Packet A|8|S0|7238d13238000113|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 6.040 Finished downloading https://server4:443/fizjrjeesa at 54:11.359 on ClientConnection[6407e998f3d04e7c/7238d13238000113(V1) with server4/193.167.100.100:443] 6.040 Closing ClientConnection[6407e998f3d04e7c/7238d13238000113(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.041 -> Packet A|6|S0|a758adf0eab20be2|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3-2|Δ0] 6.041 Creating connection with server4:443 with v1 6.042 Setting up connection for downloading https://server4:443/yavvdroscd at 54:11.361 on ClientConnection[8aaadaa0cfd77848/c30e9aae40b2b03d(V1) with server4/193.167.100.100:443] 6.042 Original destination connection id: 8aaadaa0cfd77848 (scid: c30e9aae40b2b03d) >- CryptoStream[I|ClientHello] 6.045 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.245/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.044 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.049 <- (6) Packet A|9|S0|7238d13238000113|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 6.050 -> Packet A|7|S0|a758adf0eab20be2|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3-2|Δ0] 6.059 <- (7) Packet A|10|S0|7238d13238000113|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 6.060 -> Packet A|8|S0|a758adf0eab20be2|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3-2|Δ0] 6.069 <- (8) Packet A|11|S0|7238d13238000113|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 6.072 <- (9) Packet A|12|S0|7238d13238000113|30|1 ConnectionCloseFrame[0|0|] 6.078 <- (1) Packet I|72394|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.079 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.279/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.078 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 6.082 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.179/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.081 -> Packet I|1|L|1201|2 Token=[] AckFrame[72394|Δ0] Padding(1150) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.085 Starting downloading https://server4:443/yavvdroscd at 54:11.403 on ClientConnection[8aaadaa0cfd77848/c30e9aae40b2b03d(V1) with server4/193.167.100.100:443] 6.078 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 6.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.182/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.085 -> Packet H|0|L|80|1 CryptoFrame[0,36] reschedule loss detection timer for PTO over 96 millis, based on 6.182/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.085 Discarding pn space Initial because first Handshake message is being sent 6.078 <- (2) Packet A|0|S0|c30e9aae40b2b03d|311|4 CryptoFrame[0,133] NewTokenFrame[d6a502e62bcdc2dc7c05a2372c5d02e2bfca8ee5c314d0e0b1b6d9bf9390368973c09b6533dd40927ff9e33b4c7bb41c519d] NewConnectionIdFrame[1,<0|48e977f8b414b4ec|978361d56ff59b36f9d551a999e9112c] Padding(68) 6.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.182/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket] 6.085 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|463ce6006f07c8de|47|1 StreamFrame[0(CIB),0,17,fin]] 6.105 -> Packet A|1|S0|463ce6006f07c8de|32|1 AckFrame[0|Δ19] 6.117 <- (3) Packet A|3|S0|c30e9aae40b2b03d|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 6.118 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.215/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.119 Finished downloading https://server4:443/yavvdroscd at 54:11.437 on ClientConnection[8aaadaa0cfd77848/c30e9aae40b2b03d(V1) with server4/193.167.100.100:443] 6.119 Closing ClientConnection[8aaadaa0cfd77848/c30e9aae40b2b03d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.119 -> Packet A|2|S0|463ce6006f07c8de|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 6.120 Creating connection with server4:443 with v1 6.120 Setting up connection for downloading https://server4:443/bdmkeitzjn at 54:11.439 on ClientConnection[66887aea60f690ec/ddd07bc7f3467d6e(V1) with server4/193.167.100.100:443] 6.120 Original destination connection id: 66887aea60f690ec (scid: ddd07bc7f3467d6e) >- CryptoStream[I|ClientHello] 6.123 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.323/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.122 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.127 <- (4) Packet A|4|S0|c30e9aae40b2b03d|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 6.128 -> Packet A|3|S0|463ce6006f07c8de|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 6.147 <- (5) Packet A|6|S0|c30e9aae40b2b03d|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 6.148 -> Packet A|4|S0|463ce6006f07c8de|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 6.322 loss detection timeout handler running Sending probe 0, because no ack since 6.122. Current RTT: 100/25. 6.322 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.322 (Probe is an initial retransmit) 6.323 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.723/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.322 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.357 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 6.722 loss detection timeout handler running Sending probe 1, because no ack since 6.322. Current RTT: 100/25. 6.722 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.722 (Probe is an initial retransmit) 6.723 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.523/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.723 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.724 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.524/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.724 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.756 <- (2) Packet I|103104|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[2-1|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 6.759 probe count not reset on ack because handshake not yet confirmed 6.759 Retransmitting CryptoFrame[0,257] on level Initial 6.759 Cwnd(-): 6000; inflight: 1200 6.759 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 7.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.760 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.148/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.760 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.756 <- (2) Packet H|2|L|1069|2 CryptoFrame[0,702] Padding(318) 6.760 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.148/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.760 -> Packet I|5|L|1201|2 Token=[] AckFrame[103104|Δ0] Padding(1150) >- CryptoStream[H|Finished] 6.763 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.151/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.762 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.763 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.860/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.763 Discarding pn space Initial because first Handshake message is being sent 6.763 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 6.763 Starting downloading https://server4:443/bdmkeitzjn at 54:12.081 on ClientConnection[66887aea60f690ec/ddd07bc7f3467d6e(V1) with server4/193.167.100.100:443] 6.764 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.861/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.764 -> Packet A|0|S0|49acd84065d49374|47|1 StreamFrame[0(CIB),0,17,fin] 6.793 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.860 loss detection timeout handler running Sending probe 0, because no ack since 6.762. Current RTT: 33/16. 6.861 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.861 (Probe is a handshake retransmit) 6.861 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.055/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.861 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 7.055 loss detection timeout handler running Sending probe 1, because no ack since 6.764. Current RTT: 33/16. 7.055 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.055 (Probe is a handshake retransmit) 7.055 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.444/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.055 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 7.056 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 7.444/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.056 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 7.300 <- (4) Packet A|3|S0|ddd07bc7f3467d6e|311|4 CryptoFrame[0,133] NewTokenFrame[b4c120ae43b052b5250fcd4bf64623d9eaea51922ceb7d4a37a8bdbfcdaed9cd4398535ba819e3d81a199ea3342b9c3a41c3] NewConnectionIdFrame[1,<0|bb0c6a0e42f8bb84|da3e787fa3c0c609da2065911de1d614] Padding(68) -< CryptoStream[A|NewSessionTicket] 7.321 -> Packet A|1|S0|49acd84065d49374|32|1 AckFrame[3|Δ19] 7.352 <- (5) Packet A|5|S0|ddd07bc7f3467d6e|55|2 HandshakeDoneFrame[] Padding(28) 7.352 State is set to Confirmed reschedule loss detection timer for PTO over -160 millis, based on 7.192/App, because ackElicitingInFlight | RTT:33/16 7.352 loss detection timeout handler running Sending probe 2, because no ack since 6.764. Current RTT: 33/16. reschedule loss detection timer for PTO over -481 millis, based on 6.871/App, because ackElicitingInFlight | RTT:33/16 7.353 Discarding pn space Handshake because HandshakeDone is received 7.353 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 106 millis, based on 7.460/App, because ackElicitingInFlight | RTT:33/16 7.353 <- (6) Packet A|6|S0|ddd07bc7f3467d6e|1400|2 PingFrame[] Padding(1373) 7.353 -> Packet PA|2|S0|49acd84065d49374|47|1 StreamFrame[0(CIB),0,17,fin] 7.353 -> Packet A|3|S0|49acd84065d49374|33|1 AckFrame[6-5,3|Δ0] reschedule loss detection timer for PTO over 106 millis, based on 7.461/App, because ackElicitingInFlight | RTT:33/16 7.354 -> Packet PA|4|S0|49acd84065d49374|47|1 StreamFrame[0(CIB),0,17,fin] 7.385 <- (7) Packet A|8|S0|ddd07bc7f3467d6e|55|2 AckFrame[4-1|Δ0] Padding(24) 7.386 Cwnd(-): 3000; inflight: 0 7.386 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.386 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 7.481/App, because ackElicitingInFlight | RTT:33/13 7.386 -> Packet A|5|S0|49acd84065d49374|47|1 StreamFrame[0(CIB),0,17,fin] 7.395 <- (8) Packet A|9|S0|ddd07bc7f3467d6e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.396 Finished downloading https://server4:443/bdmkeitzjn at 54:12.714 on ClientConnection[66887aea60f690ec/ddd07bc7f3467d6e(V1) with server4/193.167.100.100:443] 7.396 Closing ClientConnection[66887aea60f690ec/ddd07bc7f3467d6e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.397 Creating connection with server4:443 with v1 7.396 -> Packet A|6|S0|49acd84065d49374|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 7.397 Setting up connection for downloading https://server4:443/wlphdnpqgw at 54:12.716 on ClientConnection[40abf606dc3e63ef/bb492380c85ee924(V1) with server4/193.167.100.100:443] 7.397 Original destination connection id: 40abf606dc3e63ef (scid: bb492380c85ee924) >- CryptoStream[I|ClientHello] 7.399 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.599/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.399 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.405 <- (9) Packet A|10|S0|ddd07bc7f3467d6e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.406 -> Packet A|7|S0|49acd84065d49374|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 7.425 <- (10) Packet A|13|S0|ddd07bc7f3467d6e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.426 -> Packet A|8|S0|49acd84065d49374|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 7.432 <- (1) Packet I|130611|L|178|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.433 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.633/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.435 <- (11) Packet A|14|S0|ddd07bc7f3467d6e|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.432 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 7.436 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.533/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.435 -> Packet I|1|L|1201|2 Token=[] AckFrame[130611|Δ0] Padding(1150) 7.436 <- (12) Packet A|15|S0|ddd07bc7f3467d6e|30|1 ConnectionCloseFrame[0|0|] >- CryptoStream[H|Finished] 7.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.535/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.438 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.439 Starting downloading https://server4:443/wlphdnpqgw at 54:12.757 on ClientConnection[40abf606dc3e63ef/bb492380c85ee924(V1) with server4/193.167.100.100:443] 7.432 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 7.439 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.536/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.439 Discarding pn space Initial because first Handshake message is being sent 7.432 <- (2) Packet A|0|S0|bb492380c85ee924|311|4 CryptoFrame[0,133] NewTokenFrame[c3f1b735d7c9edc3a6dc9f1d0d291acb2a356e0daaaaa886c05007ec21636355ffe00224b0a1b72844d0f6aa479f3f6617e1] NewConnectionIdFrame[1,<0|22c98f0a31db306d|08b0dc939dbd9e2780cc4170d038c13a] Padding(68) -< CryptoStream[A|NewSessionTicket] 7.439 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.536/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.439 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|d06ed9bbffc01cbf|47|1 StreamFrame[0(CIB),0,17,fin]] 7.459 -> Packet A|1|S0|d06ed9bbffc01cbf|32|1 AckFrame[0|Δ19] 7.469 <- (3) Packet A|2|S0|bb492380c85ee924|55|2 HandshakeDoneFrame[] Padding(28) 7.469 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 7.535/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 7.546/App, because ackElicitingInFlight | RTT:33/16 7.470 Discarding pn space Handshake because HandshakeDone is received 7.471 <- (4) Packet A|3|S0|bb492380c85ee924|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 7.471 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.472 Finished downloading https://server4:443/wlphdnpqgw at 54:12.790 on ClientConnection[40abf606dc3e63ef/bb492380c85ee924(V1) with server4/193.167.100.100:443] 7.472 -> Packet A|2|S0|d06ed9bbffc01cbf|34|1 AckFrame[3-2,0|Δ1] 7.472 Closing ClientConnection[40abf606dc3e63ef/bb492380c85ee924(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.472 -> Packet A|3|S0|d06ed9bbffc01cbf|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 7.473 Creating connection with server4:443 with v1 7.473 Setting up connection for downloading https://server4:443/wsmvisiqda at 54:12.792 on ClientConnection[79b60e270380df11/be14844cd2132843(V1) with server4/193.167.100.100:443] 7.473 Original destination connection id: 79b60e270380df11 (scid: be14844cd2132843) >- CryptoStream[I|ClientHello] 7.475 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.675/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.475 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.502 <- (5) Packet A|4|S0|bb492380c85ee924|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.503 -> Packet A|4|S0|d06ed9bbffc01cbf|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 7.504 <- (6) Packet A|5|S0|bb492380c85ee924|1400|2 PingFrame[] Padding(1373) 7.504 <- (7) Packet A|6|S0|bb492380c85ee924|30|1 ConnectionCloseFrame[0|0|] 7.504 -> Packet A|5|S0|d06ed9bbffc01cbf|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 7.508 <- (1) Packet I|118960|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.509 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.709/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.508 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 7.512 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.609/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.512 -> Packet I|1|L|1201|2 Token=[] AckFrame[118960|Δ0] Padding(1150) >- CryptoStream[H|Finished] 7.515 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.515 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.508 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 7.516 Starting downloading https://server4:443/wsmvisiqda at 54:12.834 on ClientConnection[79b60e270380df11/be14844cd2132843(V1) with server4/193.167.100.100:443] 7.516 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 7.516 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.613/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.516 Discarding pn space Initial because first Handshake message is being sent 7.516 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.613/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.516 -> Packet A|0|S0|e8a54200121051d6|47|1 StreamFrame[0(CIB),0,17,fin] 7.508 <- (2) Packet A|0|S0|be14844cd2132843|311|4 CryptoFrame[0,133] NewTokenFrame[b2241b8cd98f50135fc3509b255dce272b0f2135fe2a40c6bf92a7f17c3342cd63970ce3f96a8c96946dc41cc8e438b0f9bf] NewConnectionIdFrame[1,<0|7d767e627ef17701|5e9b714f04643d3c3b7414c366e2a53a] Padding(68) 7.517 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 7.536 -> Packet A|1|S0|e8a54200121051d6|32|1 AckFrame[0|Δ19] 7.546 <- (3) Packet A|2|S0|be14844cd2132843|55|2 HandshakeDoneFrame[] Padding(28) 7.547 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 7.612/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 7.623/App, because ackElicitingInFlight | RTT:33/16 7.547 Discarding pn space Handshake because HandshakeDone is received 7.566 -> Packet A|2|S0|e8a54200121051d6|34|1 AckFrame[2,0|Δ19] 7.598 <- (4) Packet A|3|S0|be14844cd2132843|1400|2 PingFrame[] Padding(1373) 7.619 -> Packet A|3|S0|e8a54200121051d6|34|1 AckFrame[3-2,0|Δ19] 7.623 loss detection timeout handler running Sending probe 0, because no ack since 7.516. Current RTT: 33/16. 7.623 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 7.837/App, because ackElicitingInFlight | RTT:33/16 7.623 -> Packet PA|4|S0|e8a54200121051d6|47|1 StreamFrame[0(CIB),0,17,fin] 7.655 <- (5) Packet A|4|S0|be14844cd2132843|1079|3 AckFrame[4-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 7.656 Cwnd(-): 6000; inflight: 0 7.656 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.656 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 7.751/App, because ackElicitingInFlight | RTT:33/13 7.656 -> Packet A|5|S0|e8a54200121051d6|47|1 StreamFrame[0(CIB),0,17,fin] 7.657 Finished downloading https://server4:443/wsmvisiqda at 54:12.975 on ClientConnection[79b60e270380df11/be14844cd2132843(V1) with server4/193.167.100.100:443] 7.657 Closing ClientConnection[79b60e270380df11/be14844cd2132843(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.657 -> Packet A|6|S0|e8a54200121051d6|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 7.658 Creating connection with server4:443 with v1 7.658 Setting up connection for downloading https://server4:443/pxhhiegsmd at 54:12.977 on ClientConnection[c406a4e546e30f7b/844e14ebb0946c79(V1) with server4/193.167.100.100:443] 7.658 Original destination connection id: c406a4e546e30f7b (scid: 844e14ebb0946c79) >- CryptoStream[I|ClientHello] 7.660 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.860/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.660 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.675 <- (6) Packet A|6|S0|be14844cd2132843|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.676 -> Packet A|7|S0|e8a54200121051d6|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 7.685 <- (7) Packet A|7|S0|be14844cd2132843|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.686 -> Packet A|8|S0|e8a54200121051d6|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 7.687 <- (8) Packet A|8|S0|be14844cd2132843|55|2 AckFrame[5-1|Δ0] Padding(24) 7.694 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 7.705 <- (9) Packet A|10|S0|be14844cd2132843|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.706 -> Packet A|9|S0|e8a54200121051d6|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 7.715 <- (10) Packet A|11|S0|be14844cd2132843|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 7.717 <- (11) Packet A|12|S0|be14844cd2132843|30|1 ConnectionCloseFrame[0|0|] 7.859 loss detection timeout handler running Sending probe 0, because no ack since 7.660. Current RTT: 100/25. 7.860 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.860 (Probe is an initial retransmit) 7.860 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.260/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.860 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.893 <- (2) Packet I|103850|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 7.897 probe count not reset on ack because handshake not yet confirmed 7.897 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.297/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.893 <- (2) Packet H|2|L|1069|2 PingFrame[] Padding(1023) 7.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.995/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.898 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 96 millis, based on 7.995/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.897 -> Packet I|2|L|1201|2 Token=[] AckFrame[103850|Δ0] Padding(1150) 7.898 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 7.994 loss detection timeout handler running 7.994 Sending probe 0. Current RTT: 33/16. 7.994 Sending probe because peer awaiting address validation 7.994 (Probe is a handshake ping) 7.995 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.189/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.995 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 8.144 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.188 loss detection timeout handler running Sending probe 1, because no ack since 7.995. Current RTT: 33/16. 8.188 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.188 (Probe is a handshake ping) 8.189 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 8.577/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.189 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 8.190 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 8.578/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.190 -> Packet PH|3|L|44|2 PingFrame[] Padding(2) 8.220 <- (4) Packet H|4|L|55|2 AckFrame[2|Δ0] Padding(5) 8.220 probe count not reset on ack because handshake not yet confirmed 8.221 Cwnd(-): 6000; inflight: 44 reschedule loss detection timer for PTO over 357 millis, based on 8.578/Handshake, because ackElicitingInFlight | RTT:33/16 8.578 loss detection timeout handler running Sending probe 2, because no ack since 8.190. Current RTT: 33/13. 8.578 (Probe is a handshake ping) reschedule loss detection timer for PTO over 679 millis, based on 9.258/Handshake, because ackElicitingInFlight | RTT:33/13 8.578 -> Packet PH|4|L|44|2 PingFrame[] Padding(2) reschedule loss detection timer for PTO over 679 millis, based on 9.259/Handshake, because ackElicitingInFlight | RTT:33/13 8.579 -> Packet PH|5|L|44|2 PingFrame[] Padding(2) 8.609 <- (5) Packet H|5|L|55|2 AckFrame[4,2|Δ0] Padding(3) reschedule loss detection timer for PTO over 54 millis, based on 8.664/Handshake, because ackElicitingInFlight | RTT:33/13 8.664 loss detection timeout handler running Sending probe 0, because no ack since 8.579. Current RTT: 33/10. 8.665 (Probe is a handshake ping) reschedule loss detection timer for PTO over 145 millis, based on 8.811/Handshake, because ackElicitingInFlight | RTT:33/10 8.665 -> Packet PH|6|L|44|2 PingFrame[] Padding(2) 8.696 <- (6) Packet H|6|L|55|2 AckFrame[6,4,2|Δ0] Padding(1) 8.697 Cwnd(-): 3000; inflight: 0 8.697 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.197 <- (7) Packet H|7|L|823|3 CryptoFrame[0,701] AckFrame[6,4,2|Δ500] Padding(61) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 64 millis, based on 9.266/Handshake, because ackElicitingInFlight | RTT:33/8 9.201 Starting downloading https://server4:443/pxhhiegsmd at 54:14.520 on ClientConnection[c406a4e546e30f7b/844e14ebb0946c79(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.201 -> Packet H|7|L|87|2 CryptoFrame[0,36] AckFrame[6-4,2|Δ0] reschedule loss detection timer for PTO over 64 millis, based on 9.266/Handshake, because ackElicitingInFlight | RTT:33/8 9.202 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 63 millis, based on 9.266/Handshake, because ackElicitingInFlight | RTT:33/8 9.202 -> Packet A|0|S0|1d5f15039309d409|47|1 StreamFrame[0(CIB),0,17,fin] 9.202 -> Packet H|8|L|48|1 AckFrame[7-4,2|Δ0] 9.233 <- (8) Packet H|8|L|55|3 PingFrame[] AckFrame[8,6|Δ0] Padding(2) 9.233 <- (8) Packet H|9|L|55|3 PingFrame[] AckFrame[8,6|Δ0] Padding(2) 9.234 -> Packet H|9|L|46|1 AckFrame[8|Δ0] 9.234 -> Packet H|10|L|46|1 AckFrame[9-8|Δ0] 9.237 loss detection timeout handler running 9.237 loss detection timeout handler running 9.237 loss detection timeout handler running 9.237 loss detection timeout handler running 9.238 loss detection timeout handler running 9.238 Retransmitting CryptoFrame[0,36] on level Handshake 9.238 Cwnd(-): 2400; inflight: 47 9.238 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 9.238 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 9.238 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 64 millis, based on 9.303/Handshake, because ackElicitingInFlight | RTT:33/8 9.238 -> Packet H|11|L|85|2 CryptoFrame[0,36] AckFrame[9-8|Δ0] 9.302 loss detection timeout handler running Sending probe 0, because no ack since 9.202. Current RTT: 33/8. 9.302 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 9.302 (Probe is a handshake retransmit) 9.303 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 129 millis, based on 9.433/Handshake, because ackElicitingInFlight | RTT:33/8 9.303 -> Packet PH|12|L|80|1 CryptoFrame[0,36] 9.334 <- (9) Packet A|2|S0|844e14ebb0946c79|311|4 CryptoFrame[0,133] NewTokenFrame[a174f9db355ee0d92dec97a485d780d1fd5b6fe6cf99c1c7d64e63487fe7b227b4d2174b4f758a16b959257660f908bc771e] NewConnectionIdFrame[1,<0|8bea4cd86cb285d4|9c2a9d05207be729093eae65c8118856] Padding(68) -< CryptoStream[A|NewSessionTicket] 9.334 <- (10) Packet A|3|S0|844e14ebb0946c79|55|2 HandshakeDoneFrame[] Padding(28) 9.336 State is set to Confirmed reschedule loss detection timer for PTO over 16 millis, based on 9.352/App, because ackElicitingInFlight | RTT:33/8 9.336 loss detection timeout handler running reschedule loss detection timer for PTO over -59 millis, based on 9.277/App, because ackElicitingInFlight | RTT:33/8 Sending probe 0, because no ack since 9.202. Current RTT: 33/8. 9.336 Discarding pn space Handshake because HandshakeDone is received 9.336 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 149 millis, based on 9.486/App, because ackElicitingInFlight | RTT:33/8 9.336 -> Packet PA|1|S0|1d5f15039309d409|52|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,17,fin] 9.378 <- (11) Packet A|7|S0|844e14ebb0946c79|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 9.379 Finished downloading https://server4:443/pxhhiegsmd at 54:14.698 on ClientConnection[c406a4e546e30f7b/844e14ebb0946c79(V1) with server4/193.167.100.100:443] 9.379 Closing ClientConnection[c406a4e546e30f7b/844e14ebb0946c79(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.380 Creating connection with server4:443 with v1 9.380 -> Packet A|2|S0|1d5f15039309d409|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,3-2|Δ0] 9.380 Setting up connection for downloading https://server4:443/vzisytccez at 54:14.699 on ClientConnection[c85fee61fa1978f7/163c772e1ad5744f(V1) with server4/193.167.100.100:443] 9.380 Original destination connection id: c85fee61fa1978f7 (scid: 163c772e1ad5744f) >- CryptoStream[I|ClientHello] 9.382 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.582/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.382 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.388 <- (12) Packet A|8|S0|844e14ebb0946c79|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 9.389 -> Packet A|3|S0|1d5f15039309d409|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,3-2|Δ0] 9.398 <- (13) Packet A|9|S0|844e14ebb0946c79|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 9.399 -> Packet A|4|S0|1d5f15039309d409|37|2 ConnectionCloseFrame[0|0|] AckFrame[7,3-2|Δ0] 9.408 <- (14) Packet A|10|S0|844e14ebb0946c79|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 9.581 loss detection timeout handler running Sending probe 0, because no ack since 9.382. Current RTT: 100/25. 9.582 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.582 (Probe is an initial retransmit) 9.582 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.982/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.582 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.981 loss detection timeout handler running Sending probe 1, because no ack since 9.582. Current RTT: 100/25. 9.982 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.982 (Probe is an initial retransmit) 9.982 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.782/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.982 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.983 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.783/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.983 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.017 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 10.782 loss detection timeout handler running Sending probe 2, because no ack since 9.983. Current RTT: 100/25. 10.782 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.783 (Probe is an initial retransmit) 10.783 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 12.383/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.783 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.784 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 12.384/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.784 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.816 <- (2) Packet I|130947|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[4-3|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 10.820 probe count not reset on ack because handshake not yet confirmed 10.820 Retransmitting CryptoFrame[0,257] on level Initial 10.820 Cwnd(-): 6000; inflight: 1200 10.820 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 12.420/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 11.597/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.820 -> Packet I|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.816 <- (2) Packet H|2|L|1069|2 CryptoFrame[0,700] Padding(320) 10.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 11.597/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.821 -> Packet I|7|L|1201|2 Token=[] AckFrame[130947|Δ0] Padding(1150) >- CryptoStream[H|Finished] 10.824 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 11.600/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.824 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.824 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.824 Starting downloading https://server4:443/vzisytccez at 54:16.143 on ClientConnection[c85fee61fa1978f7/163c772e1ad5744f(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 10.921/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.824 Discarding pn space Initial because first Handshake message is being sent 10.824 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 10.825 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.922/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.825 -> Packet A|0|S0|b62f964f11ac656a|47|1 StreamFrame[0(CIB),0,17,fin] 10.854 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.921 loss detection timeout handler running Sending probe 0, because no ack since 10.824. Current RTT: 33/16. 10.921 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.921 (Probe is a handshake retransmit) 10.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.116/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.922 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 10.953 <- (4) Packet A|2|S0|163c772e1ad5744f|311|5 CryptoFrame[0,133] NewTokenFrame[d74cadde4f57494fd785e83bcbb4edc6882ee00fe774b7ba78c802007d446433d4d0cc83ea77b924a2fad978c212790e9eba] NewConnectionIdFrame[1,<0|9058798d8b947106|b1d2e495184e5b0eb2e1538dfd5ffc71] AckFrame[0|Δ97] Padding(62) -< CryptoStream[A|NewSessionTicket] 10.955 probe count not reset on ack because handshake not yet confirmed 10.955 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.149/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.974 -> Packet A|1|S0|b62f964f11ac656a|32|1 AckFrame[2|Δ19] 11.007 <- (5) Packet A|5|S0|163c772e1ad5744f|1400|2 PingFrame[] Padding(1373) 11.027 -> Packet A|2|S0|b62f964f11ac656a|34|1 AckFrame[5,2|Δ19] 11.116 <- (6) Packet A|6|S0|163c772e1ad5744f|55|3 HandshakeDoneFrame[] AckFrame[1-0|Δ110] Padding(22) 11.117 State is set to Confirmed reschedule loss detection timer for PTO over 157 millis, based on 11.274/Handshake, because ackElicitingInFlight | RTT:44/33 11.117 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.117 Discarding pn space Handshake because HandshakeDone is received 11.117 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.117 <- (7) Packet A|7|S0|163c772e1ad5744f|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 11.117 -> Packet A|3|S0|b62f964f11ac656a|31|1 AckFrame[7-5|Δ0] 11.118 Finished downloading https://server4:443/vzisytccez at 54:16.436 on ClientConnection[c85fee61fa1978f7/163c772e1ad5744f(V1) with server4/193.167.100.100:443] 11.118 Closing ClientConnection[c85fee61fa1978f7/163c772e1ad5744f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.118 -> Packet A|4|S0|b62f964f11ac656a|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 11.118 Creating connection with server4:443 with v1 11.119 Setting up connection for downloading https://server4:443/sijtfkxege at 54:16.438 on ClientConnection[91ae9330324fa9ba/4f97227f6ced8ce2(V1) with server4/193.167.100.100:443] 11.119 Original destination connection id: 91ae9330324fa9ba (scid: 4f97227f6ced8ce2) >- CryptoStream[I|ClientHello] 11.121 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.321/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.121 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.149 <- (8) Packet A|9|S0|163c772e1ad5744f|30|1 ConnectionCloseFrame[0|0|] 11.154 <- (1) Packet I|101807|L|178|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 11.155 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.355/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.154 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 11.157 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.254/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.157 -> Packet I|1|L|1201|2 Token=[] AckFrame[101807|Δ0] Padding(1150) >- CryptoStream[H|Finished] 11.160 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.257/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.160 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.154 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 11.160 Starting downloading https://server4:443/sijtfkxege at 54:16.479 on ClientConnection[91ae9330324fa9ba/4f97227f6ced8ce2(V1) with server4/193.167.100.100:443] 11.160 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 11.160 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.257/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.161 Discarding pn space Initial because first Handshake message is being sent 11.161 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 11.161 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.258/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.161 -> Packet A|0|S0|849885ca59777445|47|1 StreamFrame[0(CIB),0,17,fin] 11.257 loss detection timeout handler running Sending probe 0, because no ack since 11.160. Current RTT: 33/16. 11.257 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.257 (Probe is a handshake retransmit) 11.258 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.452/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.258 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 11.441 <- (2) Packet A|3|S0|4f97227f6ced8ce2|311|4 CryptoFrame[0,133] NewTokenFrame[a2aca9d2f02965fdb408cb14746e9a65dd7287dad8298431bda087fc58e9c7540024222359e1b19baea7c48e9b37f278d0e6] NewConnectionIdFrame[1,<0|649a2f5a4c980517|ecdef9eacbeb3633916d860a1e89ce40] Padding(68) -< CryptoStream[A|NewSessionTicket] 11.451 loss detection timeout handler running Sending probe 1, because no ack since 11.161. Current RTT: 33/16. 11.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.451 (Probe is a handshake retransmit) 11.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 11.840/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.451 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 11.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 11.840/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.452 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 11.462 -> Packet A|1|S0|849885ca59777445|32|1 AckFrame[3|Δ19] 11.840 loss detection timeout handler running Sending probe 2, because no ack since 11.161. Current RTT: 33/16. 11.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.840 (Probe is a handshake retransmit) 11.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 12.616/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.840 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 11.841 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 12.617/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.841 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 11.942 <- (3) Packet A|5|S0|4f97227f6ced8ce2|55|2 HandshakeDoneFrame[] Padding(28) 11.942 State is set to Confirmed reschedule loss detection timer for PTO over 74 millis, based on 12.017/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -674 millis, based on 11.268/App, because ackElicitingInFlight | RTT:33/16 11.943 loss detection timeout handler running 11.943 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 11.161. Current RTT: 33/16. 11.943 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 12.157/App, because ackElicitingInFlight | RTT:33/16 11.943 -> Packet PA|2|S0|849885ca59777445|47|1 StreamFrame[0(CIB),0,17,fin] 11.963 -> Packet A|3|S0|849885ca59777445|34|1 AckFrame[5,3|Δ19] 11.974 <- (4) Packet A|7|S0|4f97227f6ced8ce2|55|2 AckFrame[2|Δ0] Padding(24) 11.976 Cwnd(-): 6000; inflight: 0 11.976 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 11.976 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 12.071/App, because ackElicitingInFlight | RTT:33/13 11.976 -> Packet A|4|S0|849885ca59777445|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5,3|Δ0] 11.994 <- (5) Packet A|8|S0|4f97227f6ced8ce2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 11.995 Finished downloading https://server4:443/sijtfkxege at 54:17.314 on ClientConnection[91ae9330324fa9ba/4f97227f6ced8ce2(V1) with server4/193.167.100.100:443] 11.995 Closing ClientConnection[91ae9330324fa9ba/4f97227f6ced8ce2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.996 <- (6) Packet A|9|S0|4f97227f6ced8ce2|1400|2 PingFrame[] Padding(1373) 11.996 -> Packet A|5|S0|849885ca59777445|39|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5,3|Δ0] 11.996 Creating connection with server4:443 with v1 11.996 -> Packet A|6|S0|849885ca59777445|39|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5,3|Δ0] 11.997 Setting up connection for downloading https://server4:443/jyyybmuihh at 54:17.315 on ClientConnection[b872ab7ea6021ee6/1f8f38d7eb399767(V1) with server4/193.167.100.100:443] 11.997 Original destination connection id: b872ab7ea6021ee6 (scid: 1f8f38d7eb399767) >- CryptoStream[I|ClientHello] 11.998 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.198/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.998 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.007 <- (7) Packet A|11|S0|4f97227f6ced8ce2|55|2 AckFrame[4-2|Δ0] Padding(23) 12.008 -> Packet A|7|S0|849885ca59777445|39|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5,3|Δ0] 12.025 <- (8) Packet A|13|S0|4f97227f6ced8ce2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.032 <- (1) Packet I|71076|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.033 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.233/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.032 <- (1) Packet H|0|L|749|1 CryptoFrame[0,700] 12.035 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.132/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.035 -> Packet I|1|L|1201|2 Token=[] AckFrame[71076|Δ0] Padding(1150) >- CryptoStream[H|Finished] 12.038 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.135/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.038 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.038 Starting downloading https://server4:443/jyyybmuihh at 54:17.357 on ClientConnection[b872ab7ea6021ee6/1f8f38d7eb399767(V1) with server4/193.167.100.100:443] 12.032 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 12.038 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.039 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.136/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.039 Discarding pn space Initial because first Handshake message is being sent 12.039 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 12.032 <- (2) Packet A|0|S0|1f8f38d7eb399767|311|4 CryptoFrame[0,133] NewTokenFrame[ed4f111f1b4b656dffee01413887794303c52e26b0bc63a300ea8ad1e74c0fb8f965ec10f7f514550ad65ccfd2eda004c713] NewConnectionIdFrame[1,<0|c5c5c496f63cb047|cab1efb7e97ffccdd19dfdb3ca67a529] Padding(68) -< CryptoStream[A|NewSessionTicket] 12.039 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.136/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.039 -> Packet A|0|S0|cd7feb271019282b|47|1 StreamFrame[0(CIB),0,17,fin] 12.059 -> Packet A|1|S0|cd7feb271019282b|32|1 AckFrame[0|Δ19] 12.068 <- (3) Packet A|2|S0|1f8f38d7eb399767|55|2 HandshakeDoneFrame[] Padding(28) 12.069 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 12.135/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 12.146/App, because ackElicitingInFlight | RTT:33/16 12.069 Discarding pn space Handshake because HandshakeDone is received 12.088 -> Packet A|2|S0|cd7feb271019282b|34|1 AckFrame[2,0|Δ19] 12.146 loss detection timeout handler running Sending probe 0, because no ack since 12.039. Current RTT: 33/16. 12.146 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 12.361/App, because ackElicitingInFlight | RTT:33/16 12.147 -> Packet PA|3|S0|cd7feb271019282b|47|1 StreamFrame[0(CIB),0,17,fin] 12.179 <- (4) Packet A|4|S0|1f8f38d7eb399767|1079|3 AckFrame[3-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 12.180 Cwnd(-): 6000; inflight: 0 12.180 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.180 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 90 millis, based on 12.271/App, because ackElicitingInFlight | RTT:33/12 12.180 -> Packet A|4|S0|cd7feb271019282b|47|1 StreamFrame[0(CIB),0,17,fin] 12.180 Finished downloading https://server4:443/jyyybmuihh at 54:17.499 on ClientConnection[b872ab7ea6021ee6/1f8f38d7eb399767(V1) with server4/193.167.100.100:443] 12.180 Closing ClientConnection[b872ab7ea6021ee6/1f8f38d7eb399767(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.181 -> Packet A|5|S0|cd7feb271019282b|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 12.181 Creating connection with server4:443 with v1 12.182 Setting up connection for downloading https://server4:443/atwwowodgh at 54:17.500 on ClientConnection[68562732edef17c7/5f46d299a0f20c43(V1) with server4/193.167.100.100:443] 12.182 Original destination connection id: 68562732edef17c7 (scid: 5f46d299a0f20c43) >- CryptoStream[I|ClientHello] 12.184 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.384/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.183 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.199 <- (5) Packet A|6|S0|1f8f38d7eb399767|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.200 -> Packet A|6|S0|cd7feb271019282b|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 12.209 <- (6) Packet A|7|S0|1f8f38d7eb399767|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.210 -> Packet A|7|S0|cd7feb271019282b|35|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 12.211 <- (7) Packet A|8|S0|1f8f38d7eb399767|55|2 AckFrame[4-1|Δ0] Padding(24) 12.217 <- (1) Packet I|76824|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.217 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.417/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.217 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 12.221 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.318/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.221 -> Packet I|1|L|1201|2 Token=[] AckFrame[76824|Δ0] Padding(1150) >- CryptoStream[H|Finished] 12.224 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.321/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.224 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.224 Starting downloading https://server4:443/atwwowodgh at 54:17.543 on ClientConnection[68562732edef17c7/5f46d299a0f20c43(V1) with server4/193.167.100.100:443] 12.217 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 12.225 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.225 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.322/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.225 Discarding pn space Initial because first Handshake message is being sent 12.226 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 12.226 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.323/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.226 -> Packet A|0|S0|57dc60e1b8dfb5cb|47|1 StreamFrame[0(CIB),0,17,fin] 12.322 <- (2) Packet H|2|L|55|3 PingFrame[] AckFrame[1|Δ66] Padding(3) 12.323 loss detection timeout handler running Sending probe 0, because no ack since 12.224. Current RTT: 33/16. 12.323 Retransmitting CryptoFrame[0,36] on level Handshake 12.323 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 12.323 Refraining from sending probe because received ack meanwhile 12.323 Cwnd(-): 6000; inflight: 47 12.323 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 12.323 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 12.323 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 193 millis, based on 12.517/Handshake, because ackElicitingInFlight | RTT:33/16 12.323 -> Packet H|3|L|85|2 CryptoFrame[0,36] AckFrame[1|Δ0] 12.323 -> Packet H|4|L|46|1 AckFrame[2-1|Δ0] 12.354 <- (3) Packet A|2|S0|5f46d299a0f20c43|55|2 HandshakeDoneFrame[] Padding(28) 12.355 State is set to Confirmed reschedule loss detection timer for PTO over 85 millis, based on 12.440/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -21 millis, based on 12.333/App, because ackElicitingInFlight | RTT:33/16 12.355 Discarding pn space Handshake because HandshakeDone is received 12.355 loss detection timeout handler running Sending probe 0, because no ack since 12.226. Current RTT: 33/16. 12.355 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 12.569/App, because ackElicitingInFlight | RTT:33/16 12.355 -> Packet PA|1|S0|57dc60e1b8dfb5cb|47|1 StreamFrame[0(CIB),0,17,fin] 12.375 -> Packet A|2|S0|57dc60e1b8dfb5cb|32|1 AckFrame[2|Δ19] 12.387 <- (4) Packet A|3|S0|5f46d299a0f20c43|1079|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 12.388 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.388 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 94 millis, based on 12.483/App, because ackElicitingInFlight | RTT:33/13 12.389 Finished downloading https://server4:443/atwwowodgh at 54:17.707 on ClientConnection[68562732edef17c7/5f46d299a0f20c43(V1) with server4/193.167.100.100:443] 12.388 -> Packet A|3|S0|57dc60e1b8dfb5cb|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 12.389 Closing ClientConnection[68562732edef17c7/5f46d299a0f20c43(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.389 -> Packet A|4|S0|57dc60e1b8dfb5cb|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 12.390 Creating connection with server4:443 with v1 12.391 Setting up connection for downloading https://server4:443/qjbrhzcomz at 54:17.710 on ClientConnection[437d6e8196052509/0c90a5f99df312e7(V1) with server4/193.167.100.100:443] 12.391 Original destination connection id: 437d6e8196052509 (scid: 0c90a5f99df312e7) >- CryptoStream[I|ClientHello] 12.393 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.593/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.393 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.409 <- (5) Packet A|7|S0|5f46d299a0f20c43|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.410 -> Packet A|5|S0|57dc60e1b8dfb5cb|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 12.420 <- (6) Packet A|9|S0|5f46d299a0f20c43|30|1 ConnectionCloseFrame[0|0|] 12.426 <- (1) Packet I|80485|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.427 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.627/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.426 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 12.431 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.528/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.431 -> Packet I|1|L|1201|2 Token=[] AckFrame[80485|Δ0] Padding(1150) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.436 Starting downloading https://server4:443/qjbrhzcomz at 54:17.754 on ClientConnection[437d6e8196052509/0c90a5f99df312e7(V1) with server4/193.167.100.100:443] 12.426 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 12.436 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.533/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.436 Discarding pn space Initial because first Handshake message is being sent 12.426 <- (2) Packet A|0|S0|0c90a5f99df312e7|311|4 CryptoFrame[0,133] NewTokenFrame[deb130e2ced0c710abdc965c3dbd9754f087f7e8ca8a9c84367e065f6ba357a44d2d7ebbba54cd2455626553219986e37b8f] NewConnectionIdFrame[1,<0|32881a0d419e7f2a|82d0abd2cdf59baa2b189add053d5a39] Padding(68) -< CryptoStream[A|NewSessionTicket] 12.437 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.534/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.535/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.437 -> [Packet H|0|L|85|2 AckFrame[1-0|Δ0] CryptoFrame[0,36], Packet A|0|S0|939ee0f188f6b925|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 12.534 loss detection timeout handler running Sending probe 0, because no ack since 12.437. Current RTT: 33/16. 12.534 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.534 (Probe is a handshake retransmit) 12.534 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 12.728/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.534 -> Packet PH|1|L|80|1 CryptoFrame[0,36] 12.565 <- (3) Packet A|2|S0|0c90a5f99df312e7|55|2 HandshakeDoneFrame[] Padding(28) 12.566 State is set to Confirmed reschedule loss detection timer for PTO over 85 millis, based on 12.651/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -22 millis, based on 12.544/App, because ackElicitingInFlight | RTT:33/16 12.566 Discarding pn space Handshake because HandshakeDone is received 12.566 loss detection timeout handler running Sending probe 0, because no ack since 12.437. Current RTT: 33/16. 12.566 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 12.781/App, because ackElicitingInFlight | RTT:33/16 12.567 -> Packet PA|1|S0|939ee0f188f6b925|47|1 StreamFrame[0(CIB),0,17,fin] 12.586 -> Packet A|2|S0|939ee0f188f6b925|34|1 AckFrame[2,0|Δ19] 12.598 <- (4) Packet A|3|S0|0c90a5f99df312e7|1079|3 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 12.599 Cwnd(-): 6000; inflight: 0 12.599 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.599 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 12.694/App, because ackElicitingInFlight | RTT:33/13 12.599 -> Packet A|3|S0|939ee0f188f6b925|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2,0|Δ0] 12.600 Finished downloading https://server4:443/qjbrhzcomz at 54:17.918 on ClientConnection[437d6e8196052509/0c90a5f99df312e7(V1) with server4/193.167.100.100:443] 12.600 Closing ClientConnection[437d6e8196052509/0c90a5f99df312e7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.600 -> Packet A|4|S0|939ee0f188f6b925|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 12.601 Creating connection with server4:443 with v1 12.601 Setting up connection for downloading https://server4:443/vfnalljsns at 54:17.920 on ClientConnection[de546773fbac344f/f1cdb7d1706c5aa8(V1) with server4/193.167.100.100:443] 12.601 Original destination connection id: de546773fbac344f (scid: f1cdb7d1706c5aa8) >- CryptoStream[I|ClientHello] 12.603 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.803/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.603 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.630 <- (5) Packet A|4|S0|0c90a5f99df312e7|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.631 -> Packet A|5|S0|939ee0f188f6b925|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 12.636 <- (1) Packet I|80762|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.637 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.837/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.636 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 12.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.737/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.640 -> Packet I|1|L|1201|2 Token=[] AckFrame[80762|Δ0] Padding(1150) >- CryptoStream[H|Finished] 12.643 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.741/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.643 -> Packet H|0|L|80|1 CryptoFrame[0,36] 12.636 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 12.644 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.741/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.644 Discarding pn space Initial because first Handshake message is being sent 12.644 Starting downloading https://server4:443/vfnalljsns at 54:17.962 on ClientConnection[de546773fbac344f/f1cdb7d1706c5aa8(V1) with server4/193.167.100.100:443] 12.644 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.644 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 12.645 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.742/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.645 -> Packet A|0|S0|c5f7c42b3ce2921f|47|1 StreamFrame[0(CIB),0,17,fin] 12.661 <- (6) Packet A|5|S0|0c90a5f99df312e7|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.662 -> Packet A|6|S0|939ee0f188f6b925|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 12.674 <- (2) Packet A|2|S0|f1cdb7d1706c5aa8|55|2 HandshakeDoneFrame[] Padding(28) 12.675 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 12.740/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 75 millis, based on 12.752/App, because ackElicitingInFlight | RTT:33/16 12.676 Discarding pn space Handshake because HandshakeDone is received 12.693 <- (7) Packet A|6|S0|0c90a5f99df312e7|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.695 -> Packet A|1|S0|c5f7c42b3ce2921f|32|1 AckFrame[2|Δ19] 12.726 <- (3) Packet A|3|S0|f1cdb7d1706c5aa8|311|4 CryptoFrame[0,133] NewTokenFrame[f0cb25113cf99835279db6ed4bda1edf55a130fd7b4c522110cf12d057bb704f90b2d9671dd53c109a730c9da764ca4fb194] NewConnectionIdFrame[1,<0|ac18df832f1c8497|f23f8a819fb7a0f5d221c631b8e65480] Padding(68) -< CryptoStream[A|NewSessionTicket] 12.727 <- (4) Packet A|4|S0|f1cdb7d1706c5aa8|1400|2 PingFrame[] Padding(1373) 12.728 -> Packet A|2|S0|c5f7c42b3ce2921f|31|1 AckFrame[4-2|Δ0] 12.751 loss detection timeout handler running Sending probe 0, because no ack since 12.645. Current RTT: 33/16. 12.751 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 12.965/App, because ackElicitingInFlight | RTT:33/16 12.751 -> Packet PA|3|S0|c5f7c42b3ce2921f|47|1 StreamFrame[0(CIB),0,17,fin] 12.783 <- (5) Packet A|5|S0|f1cdb7d1706c5aa8|1079|3 AckFrame[3-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 12.784 Cwnd(-): 6000; inflight: 0 12.784 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 12.784 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 90 millis, based on 12.875/App, because ackElicitingInFlight | RTT:33/12 12.784 -> Packet A|4|S0|c5f7c42b3ce2921f|47|1 StreamFrame[0(CIB),0,17,fin] 12.785 Finished downloading https://server4:443/vfnalljsns at 54:18.103 on ClientConnection[de546773fbac344f/f1cdb7d1706c5aa8(V1) with server4/193.167.100.100:443] 12.785 Closing ClientConnection[de546773fbac344f/f1cdb7d1706c5aa8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.785 -> Packet A|5|S0|c5f7c42b3ce2921f|35|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 12.785 Creating connection with server4:443 with v1 12.786 Setting up connection for downloading https://server4:443/zpnowkvqbn at 54:18.104 on ClientConnection[824ff64b39105af5/95f34a3d73b254e8(V1) with server4/193.167.100.100:443] 12.786 Original destination connection id: 824ff64b39105af5 (scid: 95f34a3d73b254e8) >- CryptoStream[I|ClientHello] 12.788 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.988/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.788 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.793 <- (6) Packet A|6|S0|f1cdb7d1706c5aa8|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.794 -> Packet A|6|S0|c5f7c42b3ce2921f|35|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 12.813 <- (7) Packet A|8|S0|f1cdb7d1706c5aa8|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 12.814 -> Packet A|7|S0|c5f7c42b3ce2921f|35|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 12.821 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 12.987 loss detection timeout handler running Sending probe 0, because no ack since 12.788. Current RTT: 100/25. 12.987 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.987 (Probe is an initial retransmit) 12.988 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.388/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.987 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.387 loss detection timeout handler running Sending probe 1, because no ack since 12.987. Current RTT: 100/25. 13.387 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.387 (Probe is an initial retransmit) 13.387 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.187/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.387 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.388 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.188/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.388 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.420 <- (2) Packet I|117713|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[2-0|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 13.424 probe count not reset on ack because handshake not yet confirmed 13.425 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 14.225/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.425 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 13.813/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.420 <- (2) Packet H|4|L|1069|2 PingFrame[] Padding(1023) 13.425 -> Packet I|4|L|1201|2 Token=[] AckFrame[117713|Δ0] Padding(1150) 13.425 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.522/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.425 Discarding pn space Initial because first Handshake message is being sent 13.425 -> Packet H|0|L|46|1 AckFrame[4|Δ0] 13.458 <- (3) Packet H|6|L|823|3 CryptoFrame[0,702] AckFrame[0|Δ0] Padding(67) >- CryptoStream[H|Finished] 13.461 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.558/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.461 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 13.558/Handshake, because ackElicitingInFlight | RTT:33/16 13.462 Starting downloading https://server4:443/zpnowkvqbn at 54:18.780 on ClientConnection[824ff64b39105af5/95f34a3d73b254e8(V1) with server4/193.167.100.100:443] 13.458 <- (3) Packet H|7|L|55|3 PingFrame[] AckFrame[0|Δ0] Padding(4) reschedule loss detection timer for PTO over 96 millis, based on 13.558/Handshake, because ackElicitingInFlight | RTT:33/16 13.462 -> Packet H|2|L|46|1 AckFrame[6|Δ0] 13.458 <- (4) Packet H|8|L|55|3 PingFrame[] AckFrame[0|Δ0] Padding(4) reschedule loss detection timer for PTO over 95 millis, based on 13.558/Handshake, because ackElicitingInFlight | RTT:33/16 13.458 <- (4) Packet H|9|L|55|3 PingFrame[] AckFrame[0|Δ0] Padding(4) reschedule loss detection timer for PTO over 95 millis, based on 13.558/Handshake, because ackElicitingInFlight | RTT:33/16 13.463 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 95 millis, based on 13.558/Handshake, because ackElicitingInFlight | RTT:33/16 13.463 -> [Packet H|3|L|46|1 AckFrame[7-6|Δ0], Packet A|0|S0|ce9518f949a8de4d|47|1 StreamFrame[0(CIB),0,17,fin]] 13.463 -> Packet H|4|L|46|1 AckFrame[9-6|Δ0] 13.493 <- (5) Packet A|3|S0|95f34a3d73b254e8|55|2 HandshakeDoneFrame[] Padding(28) 13.494 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 13.558/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 75 millis, based on 13.570/App, because ackElicitingInFlight | RTT:33/16 13.494 Discarding pn space Handshake because HandshakeDone is received 13.513 -> Packet A|1|S0|ce9518f949a8de4d|32|1 AckFrame[3|Δ19] 13.546 <- (6) Packet A|5|S0|95f34a3d73b254e8|1400|2 PingFrame[] Padding(1373) 13.565 -> Packet A|2|S0|ce9518f949a8de4d|34|1 AckFrame[5,3|Δ19] 13.569 loss detection timeout handler running Sending probe 0, because no ack since 13.463. Current RTT: 33/16. 13.569 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 13.783/App, because ackElicitingInFlight | RTT:33/16 13.569 -> Packet PA|3|S0|ce9518f949a8de4d|47|1 StreamFrame[0(CIB),0,17,fin] 13.783 loss detection timeout handler running Sending probe 1, because no ack since 13.569. Current RTT: 33/16. 13.783 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 427 millis, based on 14.211/App, because ackElicitingInFlight | RTT:33/16 13.783 -> Packet PA|4|S0|ce9518f949a8de4d|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 427 millis, based on 14.212/App, because ackElicitingInFlight | RTT:33/16 13.784 -> Packet PA|5|S0|ce9518f949a8de4d|47|1 StreamFrame[0(CIB),0,17,fin] 13.815 <- (7) Packet A|11|S0|95f34a3d73b254e8|55|2 AckFrame[5-4,2-1|Δ0] Padding(22) 13.816 Cwnd(-): 6000; inflight: 0 13.816 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.816 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 13.911/App, because ackElicitingInFlight | RTT:33/13 13.816 -> Packet A|6|S0|ce9518f949a8de4d|47|1 StreamFrame[0(CIB),0,17,fin] 13.910 loss detection timeout handler running Sending probe 0, because no ack since 13.816. Current RTT: 33/13. 13.910 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 189 millis, based on 14.101/App, because ackElicitingInFlight | RTT:33/13 13.911 -> Packet PA|7|S0|ce9518f949a8de4d|47|1 StreamFrame[0(CIB),0,17,fin] 14.100 loss detection timeout handler running Sending probe 1, because no ack since 13.911. Current RTT: 33/13. 14.100 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 379 millis, based on 14.481/App, because ackElicitingInFlight | RTT:33/13 14.101 -> Packet PA|8|S0|ce9518f949a8de4d|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 379 millis, based on 14.482/App, because ackElicitingInFlight | RTT:33/13 14.102 -> Packet PA|9|S0|ce9518f949a8de4d|47|1 StreamFrame[0(CIB),0,17,fin] 14.127 <- (8) Packet A|14|S0|95f34a3d73b254e8|311|5 CryptoFrame[0,133] NewTokenFrame[e87ebb259625ef63d87fc9fae8107106aa1a8fc2301e28a8813b6ae83aaf9808acbd4b07820b9e1392c56cab74708dd3f425] NewConnectionIdFrame[1,<0|b67e7eb2fa035c62|9a9dcd1b4c6d9954d7381453aeae85f7] AckFrame[7-4|Δ185] Padding(60) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 68 millis, based on 14.197/App, because ackElicitingInFlight | RTT:33/13 14.132 <- (9) Packet A|15|S0|95f34a3d73b254e8|55|2 AckFrame[9,7-4|Δ0] Padding(22) 14.148 -> Packet A|10|S0|ce9518f949a8de4d|34|1 AckFrame[15-14,11|Δ19] 14.180 <- (10) Packet A|16|S0|95f34a3d73b254e8|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(24) 14.181 Finished downloading https://server4:443/zpnowkvqbn at 54:19.500 on ClientConnection[824ff64b39105af5/95f34a3d73b254e8(V1) with server4/193.167.100.100:443] 14.181 Closing ClientConnection[824ff64b39105af5/95f34a3d73b254e8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.181 <- (11) Packet A|17|S0|95f34a3d73b254e8|1400|2 PingFrame[] Padding(1372) 14.182 -> Packet A|11|S0|ce9518f949a8de4d|37|2 AckFrame[17-14,11|Δ0] ConnectionCloseFrame[0|0|] 14.182 Creating connection with server4:443 with v1 14.182 Setting up connection for downloading https://server4:443/akpevcwtki at 54:19.501 on ClientConnection[3dbb412e11c6639e/f01f7d62cf98ff57(V1) with server4/193.167.100.100:443] 14.183 Original destination connection id: 3dbb412e11c6639e (scid: f01f7d62cf98ff57) >- CryptoStream[I|ClientHello] 14.185 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.385/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.184 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.190 <- (12) Packet A|18|S0|95f34a3d73b254e8|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(24) 14.191 -> Packet A|12|S0|ce9518f949a8de4d|37|2 ConnectionCloseFrame[0|0|] AckFrame[17-14,11|Δ0] 14.210 <- (13) Packet A|20|S0|95f34a3d73b254e8|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(24) 14.211 -> Packet A|13|S0|ce9518f949a8de4d|37|2 ConnectionCloseFrame[0|0|] AckFrame[17-14,11|Δ0] 14.218 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 14.220 <- (14) Packet A|21|S0|95f34a3d73b254e8|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(24) 14.221 <- (15) Packet A|22|S0|95f34a3d73b254e8|31|1 ConnectionCloseFrame[0|0|] 14.384 loss detection timeout handler running Sending probe 0, because no ack since 14.184. Current RTT: 100/25. 14.384 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.384 (Probe is an initial retransmit) 14.385 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.785/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.384 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.784 loss detection timeout handler running Sending probe 1, because no ack since 14.384. Current RTT: 100/25. 14.784 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.784 (Probe is an initial retransmit) 14.785 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.585/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.784 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.785 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.585/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.785 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.818 <- (2) Packet I|94866|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[3,0|Δ0] Padding(3) -< CryptoStream[I|ServerHello] 14.821 probe count not reset on ack because handshake not yet confirmed 14.821 Cwnd(-): 6000; inflight: 1200 14.818 <- (2) Packet H|2|L|1069|2 CryptoFrame[0,702] Padding(318) 14.822 -> Packet I|4|L|1201|2 Token=[] AckFrame[94866|Δ0] Padding(1150) >- CryptoStream[H|Finished] 14.825 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.825 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.921/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.825 Starting downloading https://server4:443/akpevcwtki at 54:20.144 on ClientConnection[3dbb412e11c6639e/f01f7d62cf98ff57(V1) with server4/193.167.100.100:443] 14.825 Discarding pn space Initial because first Handshake message is being sent 14.825 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 14.826 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.922/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.826 -> Packet A|0|S0|3c2b93b673097a63|47|1 StreamFrame[0(CIB),0,17,fin] 14.854 <- (3) Packet H|3|L|55|2 PingFrame[] Padding(9) 14.854 -> Packet H|2|L|46|1 AckFrame[3-2|Δ0] 14.921 loss detection timeout handler running Sending probe 0, because no ack since 14.825. Current RTT: 32/16. 14.921 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.921 (Probe is a handshake retransmit) 14.921 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 15.113/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.921 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 14.953 <- (4) Packet A|2|S0|f01f7d62cf98ff57|311|5 CryptoFrame[0,133] NewTokenFrame[edbe76e83bd9936bcb8cbe300663166f48a2be528bb2fe3485248888801b0e94b4d06ebcae938fc3104b31a8c131ec1e84de] NewConnectionIdFrame[1,<0|581b3a8ead93b48d|5b1db98141e992da850c72c7f8289ea7] AckFrame[0|Δ95] Padding(62) -< CryptoStream[A|NewSessionTicket] 14.954 probe count not reset on ack because handshake not yet confirmed 14.954 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 15.146/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.973 -> Packet A|1|S0|3c2b93b673097a63|32|1 AckFrame[2|Δ19] 15.005 <- (5) Packet A|5|S0|f01f7d62cf98ff57|1400|2 PingFrame[] Padding(1373) 15.025 -> Packet A|2|S0|3c2b93b673097a63|34|1 AckFrame[5,2|Δ19] 15.104 <- (6) Packet A|6|S0|f01f7d62cf98ff57|55|3 HandshakeDoneFrame[] AckFrame[1-0|Δ99] Padding(22) 15.105 State is set to Confirmed reschedule loss detection timer for PTO over 166 millis, based on 15.271/Handshake, because ackElicitingInFlight | RTT:43/33 15.105 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.105 Discarding pn space Handshake because HandshakeDone is received 15.105 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.105 <- (7) Packet A|7|S0|f01f7d62cf98ff57|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 15.106 -> Packet A|3|S0|3c2b93b673097a63|31|1 AckFrame[7-5|Δ0] 15.106 Finished downloading https://server4:443/akpevcwtki at 54:20.424 on ClientConnection[3dbb412e11c6639e/f01f7d62cf98ff57(V1) with server4/193.167.100.100:443] 15.106 Closing ClientConnection[3dbb412e11c6639e/f01f7d62cf98ff57(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.106 -> Packet A|4|S0|3c2b93b673097a63|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 15.107 Creating connection with server4:443 with v1 15.108 Setting up connection for downloading https://server4:443/jzvfogadaq at 54:20.426 on ClientConnection[b4b3cf30f959635e/5c1e194edd0822a1(V1) with server4/193.167.100.100:443] 15.108 Original destination connection id: b4b3cf30f959635e (scid: 5c1e194edd0822a1) >- CryptoStream[I|ClientHello] 15.109 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.309/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.109 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.198 <- (8) Packet A|9|S0|f01f7d62cf98ff57|1400|2 PingFrame[] Padding(1373) 15.199 -> Packet A|5|S0|3c2b93b673097a63|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 15.309 loss detection timeout handler running Sending probe 0, because no ack since 15.109. Current RTT: 100/25. 15.309 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.309 (Probe is an initial retransmit) 15.309 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.709/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.309 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.343 <- (1) Packet I|115348|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 15.343 probe count not reset on ack because handshake not yet confirmed 15.343 Retransmitting CryptoFrame[0,257] on level Initial 15.344 Cwnd(-): 6000; inflight: 0 15.344 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.744/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.344 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 15.538/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.344 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 15.343 <- (1) Packet H|0|L|749|1 CryptoFrame[0,700] 15.346 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.540/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.346 -> Packet I|3|L|1201|2 Token=[] AckFrame[115348|Δ0] Padding(1150) >- CryptoStream[H|Finished] 15.348 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.543/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.348 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.349 Starting downloading https://server4:443/jzvfogadaq at 54:20.667 on ClientConnection[b4b3cf30f959635e/5c1e194edd0822a1(V1) with server4/193.167.100.100:443] 15.343 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 15.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.446/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.349 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 15.349 Discarding pn space Initial because first Handshake message is being sent 15.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.447/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.349 -> [Packet H|2|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|c7003e8a6d556be5|47|1 StreamFrame[0(CIB),0,17,fin]] 15.377 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.382 <- (3) Packet A|2|S0|5c1e194edd0822a1|55|2 HandshakeDoneFrame[] Padding(28) 15.383 State is set to Confirmed reschedule loss detection timer for PTO over 62 millis, based on 15.445/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 73 millis, based on 15.456/App, because ackElicitingInFlight | RTT:33/16 15.383 Discarding pn space Handshake because HandshakeDone is received 15.402 -> Packet A|1|S0|c7003e8a6d556be5|32|1 AckFrame[2|Δ19] 15.456 loss detection timeout handler running Sending probe 0, because no ack since 15.349. Current RTT: 33/16. 15.456 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 15.670/App, because ackElicitingInFlight | RTT:33/16 15.456 -> Packet PA|2|S0|c7003e8a6d556be5|47|1 StreamFrame[0(CIB),0,17,fin] 15.488 <- (4) Packet A|3|S0|5c1e194edd0822a1|1079|3 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 15.489 Cwnd(-): 3000; inflight: 0 15.489 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.489 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 94 millis, based on 15.584/App, because ackElicitingInFlight | RTT:33/13 15.489 -> Packet A|3|S0|c7003e8a6d556be5|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 15.490 Finished downloading https://server4:443/jzvfogadaq at 54:20.808 on ClientConnection[b4b3cf30f959635e/5c1e194edd0822a1(V1) with server4/193.167.100.100:443] 15.490 Closing ClientConnection[b4b3cf30f959635e/5c1e194edd0822a1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.490 -> Packet A|4|S0|c7003e8a6d556be5|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 15.490 Creating connection with server4:443 with v1 15.491 Setting up connection for downloading https://server4:443/xrcwjshbkk at 54:20.810 on ClientConnection[51f6230c06562211/c0de9411b93902c9(V1) with server4/193.167.100.100:443] 15.491 Original destination connection id: 51f6230c06562211 (scid: c0de9411b93902c9) >- CryptoStream[I|ClientHello] 15.493 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.693/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.492 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.498 <- (5) Packet A|4|S0|5c1e194edd0822a1|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 15.499 -> Packet A|5|S0|c7003e8a6d556be5|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 15.509 <- (6) Packet A|5|S0|5c1e194edd0822a1|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 15.509 -> Packet A|6|S0|c7003e8a6d556be5|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 15.519 <- (7) Packet A|6|S0|5c1e194edd0822a1|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 15.521 <- (8) Packet A|7|S0|5c1e194edd0822a1|30|1 ConnectionCloseFrame[0|0|] 15.526 <- (1) Packet I|69583|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.526 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.726/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.526 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 15.529 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.626/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.528 -> Packet I|1|L|1201|2 Token=[] AckFrame[69583|Δ0] Padding(1150) >- CryptoStream[H|Finished] 15.531 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.628/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.531 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.526 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 15.531 Starting downloading https://server4:443/xrcwjshbkk at 54:20.850 on ClientConnection[51f6230c06562211/c0de9411b93902c9(V1) with server4/193.167.100.100:443] 15.531 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.628/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.531 Discarding pn space Initial because first Handshake message is being sent 15.531 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 15.531 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 15.532 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.629/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.532 -> Packet A|0|S0|b56d4c7aa669fc42|47|1 StreamFrame[0(CIB),0,17,fin] 15.562 <- (2) Packet A|2|S0|c0de9411b93902c9|55|2 HandshakeDoneFrame[] Padding(28) 15.562 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 15.628/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 15.639/App, because ackElicitingInFlight | RTT:33/16 15.562 Discarding pn space Handshake because HandshakeDone is received 15.563 <- (3) Packet A|3|S0|c0de9411b93902c9|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 15.564 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.564 -> Packet A|1|S0|b56d4c7aa669fc42|32|1 AckFrame[3-2|Δ1] 15.564 Finished downloading https://server4:443/xrcwjshbkk at 54:20.883 on ClientConnection[51f6230c06562211/c0de9411b93902c9(V1) with server4/193.167.100.100:443] 15.565 Closing ClientConnection[51f6230c06562211/c0de9411b93902c9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.565 Creating connection with server4:443 with v1 15.565 -> Packet A|2|S0|b56d4c7aa669fc42|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 15.566 Setting up connection for downloading https://server4:443/lwgxahgnkj at 54:20.884 on ClientConnection[ed6a44c5e99ad34e/f864f42cd65df108(V1) with server4/193.167.100.100:443] 15.566 Original destination connection id: ed6a44c5e99ad34e (scid: f864f42cd65df108) >- CryptoStream[I|ClientHello] 15.567 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.767/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.567 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.595 <- (4) Packet A|4|S0|c0de9411b93902c9|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 15.595 <- (5) Packet A|5|S0|c0de9411b93902c9|311|4 CryptoFrame[0,133] NewTokenFrame[9f02f36520a84883b965dccc0eea18dcf87d92052654736059e66a58352c067ebf8197c2378c9f4c4fafa573630e0c084da4] NewConnectionIdFrame[1,<0|4b8c161920c0671a|5c45316b58db11606657f3e2932a5f80] Padding(68) 15.596 -> Packet A|3|S0|b56d4c7aa669fc42|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 15.596 -> Packet A|4|S0|b56d4c7aa669fc42|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 15.596 <- (6) Packet A|7|S0|c0de9411b93902c9|30|1 ConnectionCloseFrame[0|0|] 15.600 <- (1) Packet I|98454|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.601 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.801/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.600 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 15.604 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.701/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.603 -> Packet I|1|L|1201|2 Token=[] AckFrame[98454|Δ0] Padding(1150) >- CryptoStream[H|Finished] 15.606 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.703/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.606 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.607 Starting downloading https://server4:443/lwgxahgnkj at 54:20.925 on ClientConnection[ed6a44c5e99ad34e/f864f42cd65df108(V1) with server4/193.167.100.100:443] 15.600 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 15.607 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 15.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.704/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.607 Discarding pn space Initial because first Handshake message is being sent 15.607 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 15.601 <- (2) Packet A|0|S0|f864f42cd65df108|311|4 CryptoFrame[0,133] NewTokenFrame[c0ba1cb0d0b276e48208423a1b7bda6edf7382ec215ed60746384661973fc2f3fcf12d64febc26f4b7ee3c2d5f281dbe22b9] NewConnectionIdFrame[1,<0|5e2f09d23767cda8|a2ad7e1feb7536eae16299d466dcd464] Padding(68) 15.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 96 millis, based on 15.704/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.607 -> Packet A|0|S0|4646c2e2519410e7|47|1 StreamFrame[0(CIB),0,17,fin] 15.627 -> Packet A|1|S0|4646c2e2519410e7|32|1 AckFrame[0|Δ19] 15.639 <- (3) Packet A|3|S0|f864f42cd65df108|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 15.639 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.736/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.640 Finished downloading https://server4:443/lwgxahgnkj at 54:20.958 on ClientConnection[ed6a44c5e99ad34e/f864f42cd65df108(V1) with server4/193.167.100.100:443] 15.640 Closing ClientConnection[ed6a44c5e99ad34e/f864f42cd65df108(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.640 -> Packet A|2|S0|4646c2e2519410e7|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 15.641 Creating connection with server4:443 with v1 15.641 Setting up connection for downloading https://server4:443/kgecgoaizc at 54:20.960 on ClientConnection[3a469fbcdb21127c/0e693145b43619d2(V1) with server4/193.167.100.100:443] 15.641 Original destination connection id: 3a469fbcdb21127c (scid: 0e693145b43619d2) >- CryptoStream[I|ClientHello] 15.643 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.843/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.643 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.649 <- (4) Packet A|4|S0|f864f42cd65df108|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 15.649 -> Packet A|3|S0|4646c2e2519410e7|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 15.659 <- (5) Packet A|6|S0|f864f42cd65df108|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 15.659 -> Packet A|4|S0|4646c2e2519410e7|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 15.669 <- (6) Packet A|7|S0|f864f42cd65df108|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 15.671 <- (7) Packet A|8|S0|f864f42cd65df108|30|1 ConnectionCloseFrame[0|0|] 15.676 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 15.842 loss detection timeout handler running Sending probe 0, because no ack since 15.643. Current RTT: 100/25. 15.842 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.842 (Probe is an initial retransmit) 15.843 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.243/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.842 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.126 <- (2) Packet I|93622|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ250] Padding(2) -< CryptoStream[I|ServerHello] 16.129 probe count not reset on ack because handshake not yet confirmed 16.129 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 16.529/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.126 <- (2) Packet H|3|L|1069|2 PingFrame[] Padding(1023) 16.129 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.129 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 846 millis, based on 16.976/Handshake, because peerAwaitingAddressValidation | RTT:283/141 reschedule loss detection timer for PTO over 846 millis, based on 16.976/Handshake, because peerAwaitingAddressValidation | RTT:283/141 16.129 Discarding pn space Initial because first Handshake message is being sent 16.129 -> Packet I|2|L|1201|2 Token=[] AckFrame[93622|Δ0] Padding(1150) 16.130 -> Packet H|0|L|46|1 AckFrame[3|Δ0] 16.627 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.975 loss detection timeout handler running 16.976 Sending probe 0. Current RTT: 283/141. 16.976 Sending probe because peer awaiting address validation 16.976 (Probe is a handshake ping) 16.976 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1693 millis, based on 18.670/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:283/141 16.976 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 18.669 loss detection timeout handler running Sending probe 1, because no ack since 16.976. Current RTT: 283/141. 18.669 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.669 (Probe is a handshake ping) 18.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3387 millis, based on 22.058/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:283/141 18.670 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 18.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3387 millis, based on 22.059/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:283/141 18.671 -> Packet PH|3|L|44|2 PingFrame[] Padding(2) 18.701 <- (4) Packet H|5|L|55|3 PingFrame[] AckFrame[2|Δ0] Padding(4) 18.701 probe count not reset on ack because handshake not yet confirmed 18.701 Cwnd(-): 6000; inflight: 44 reschedule loss detection timer for PTO over 3357 millis, based on 22.059/Handshake, because ackElicitingInFlight | RTT:283/141 18.701 <- (5) Packet H|6|L|55|2 AckFrame[3-2|Δ0] Padding(5) 18.702 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.702 -> Packet H|4|L|48|1 AckFrame[5,3|Δ0] 18.733 <- (6) Packet H|7|L|55|3 PingFrame[] AckFrame[4-3|Δ0] Padding(4) 18.734 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.733 <- (6) Packet H|8|L|823|3 CryptoFrame[0,702] AckFrame[4-3|Δ0] Padding(67) 18.734 -> Packet H|5|L|46|1 AckFrame[7-6|Δ0] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 950 millis, based on 19.688/Handshake, because ackElicitingInFlight | RTT:223/182 18.737 -> Packet H|6|L|85|2 CryptoFrame[0,36] AckFrame[7-6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.737 Starting downloading https://server4:443/kgecgoaizc at 54:24.056 on ClientConnection[3a469fbcdb21127c/0e693145b43619d2(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 950 millis, based on 19.688/Handshake, because ackElicitingInFlight | RTT:223/182 18.737 -> Packet H|7|L|46|1 AckFrame[8-6|Δ0] 18.738 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 949 millis, based on 19.688/Handshake, because ackElicitingInFlight | RTT:223/182 18.738 -> Packet A|0|S0|cfca46824d85a14a|47|1 StreamFrame[0(CIB),0,17,fin] 19.687 loss detection timeout handler running Sending probe 0, because no ack since 18.737. Current RTT: 223/182. 19.687 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 19.687 (Probe is a handshake retransmit) 19.688 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 1901 millis, based on 21.589/Handshake, because ackElicitingInFlight | RTT:223/182 19.687 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 19.719 <- (7) Packet A|2|S0|0e693145b43619d2|311|5 CryptoFrame[0,133] NewTokenFrame[9a46c98233ae9d66830d4e807195da8652d95d5e27da508b0e2f579fb13d40e7344baa93a288dfcb9fa30c31a05776729572] NewConnectionIdFrame[1,<0|7fe5d154260e8df2|64af027bdcf0d82411712b3af6861897] AckFrame[0|Δ950] Padding(60) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 917 millis, based on 20.638/Handshake, because ackElicitingInFlight | RTT:223/182 19.720 <- (8) Packet A|3|S0|0e693145b43619d2|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 19.721 State is set to Confirmed reschedule loss detection timer for PTO over 1579 millis, based on 21.300/Handshake, because ackElicitingInFlight | RTT:317/324 19.721 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.721 Discarding pn space Handshake because HandshakeDone is received 19.721 -> Packet A|1|S0|cfca46824d85a14a|31|1 AckFrame[3-2|Δ0] 19.721 Finished downloading https://server4:443/kgecgoaizc at 54:25.040 on ClientConnection[3a469fbcdb21127c/0e693145b43619d2(V1) with server4/193.167.100.100:443] 19.721 Closing ClientConnection[3a469fbcdb21127c/0e693145b43619d2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.722 -> Packet A|2|S0|cfca46824d85a14a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 19.722 Creating connection with server4:443 with v1 19.722 Setting up connection for downloading https://server4:443/yokqcryjoe at 54:25.041 on ClientConnection[87e1070e6256507f/14b6a03b1f1b2075(V1) with server4/193.167.100.100:443] 19.723 Original destination connection id: 87e1070e6256507f (scid: 14b6a03b1f1b2075) >- CryptoStream[I|ClientHello] 19.724 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.924/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.724 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.753 <- (9) Packet A|6|S0|0e693145b43619d2|30|1 ConnectionCloseFrame[0|0|] 19.923 loss detection timeout handler running Sending probe 0, because no ack since 19.724. Current RTT: 100/25. 19.923 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.923 (Probe is an initial retransmit) 19.924 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.324/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.924 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.323 loss detection timeout handler running Sending probe 1, because no ack since 19.924. Current RTT: 100/25. 20.323 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.323 (Probe is an initial retransmit) 20.324 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.124/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.324 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.325 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.125/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.325 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.358 <- (1) Packet I|82620|L|179|2 Token=[] AckFrame[3|Δ0] CryptoFrame[0,123] 20.359 probe count not reset on ack because handshake not yet confirmed 20.359 Retransmitting CryptoFrame[0,257] on level Initial 20.359 Cwnd(-): 6000; inflight: 1200 20.359 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 20.358 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 20.362 -> Packet I|5|L|1201|2 Token=[] AckFrame[82620|Δ0] Padding(1150) >- CryptoStream[H|Finished] 20.365 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.358 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 20.366 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.463/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.366 Discarding pn space Initial because first Handshake message is being sent 20.366 Starting downloading https://server4:443/yokqcryjoe at 54:25.684 on ClientConnection[87e1070e6256507f/14b6a03b1f1b2075(V1) with server4/193.167.100.100:443] 20.358 <- (2) Packet A|0|S0|14b6a03b1f1b2075|311|4 CryptoFrame[0,133] NewTokenFrame[a158d3d98bac1a422acb19cc6ce3222c1b8f33fd5f6da8748d7ed63e2c4c830add0e925f9ba0762d114951ed35f966e46635] NewConnectionIdFrame[1,<0|62a410475059d81c|42fcc03b5a8be7ebc5c9fa47f3610bd3] Padding(68) -< CryptoStream[A|NewSessionTicket] 20.366 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 20.367 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.464/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.367 -> [Packet H|2|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|f1abdd6b00442bee|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 20.392 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.463 loss detection timeout handler running Sending probe 0, because no ack since 20.365. Current RTT: 33/16. 20.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.463 (Probe is a handshake retransmit) 20.464 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.658/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.463 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 20.496 <- (4) Packet A|2|S0|14b6a03b1f1b2075|1079|4 AckFrame[0|Δ97] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(18) 20.496 probe count not reset on ack because handshake not yet confirmed 20.497 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.691/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.497 State is set to Confirmed reschedule loss detection timer for PTO over 326 millis, based on 20.823/Handshake, because ackElicitingInFlight | RTT:44/34 20.497 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.497 Discarding pn space Handshake because HandshakeDone is received 20.497 <- (5) Packet A|3|S0|14b6a03b1f1b2075|1400|2 PingFrame[] Padding(1373) 20.497 Finished downloading https://server4:443/yokqcryjoe at 54:25.816 on ClientConnection[87e1070e6256507f/14b6a03b1f1b2075(V1) with server4/193.167.100.100:443] 20.497 Closing ClientConnection[87e1070e6256507f/14b6a03b1f1b2075(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.497 -> Packet A|1|S0|f1abdd6b00442bee|31|1 AckFrame[3-2|Δ0] 20.498 -> Packet A|2|S0|f1abdd6b00442bee|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 20.498 Creating connection with server4:443 with v1 20.499 Setting up connection for downloading https://server4:443/fvrcmaelyi at 54:25.817 on ClientConnection[80461cf0320a4cd9/33304a2a3fd64e63(V1) with server4/193.167.100.100:443] 20.499 Original destination connection id: 80461cf0320a4cd9 (scid: 33304a2a3fd64e63) >- CryptoStream[I|ClientHello] 20.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.700/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.500 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.506 <- (6) Packet A|4|S0|14b6a03b1f1b2075|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 20.506 -> Packet A|3|S0|f1abdd6b00442bee|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 20.699 loss detection timeout handler running Sending probe 0, because no ack since 20.500. Current RTT: 100/25. 20.699 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.699 (Probe is an initial retransmit) 20.700 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.100/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.700 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.885 <- (7) Packet A|6|S0|14b6a03b1f1b2075|1400|2 PingFrame[] Padding(1373) 20.886 -> Packet A|4|S0|f1abdd6b00442bee|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 21.099 loss detection timeout handler running Sending probe 1, because no ack since 20.700. Current RTT: 100/25. 21.099 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.099 (Probe is an initial retransmit) 21.100 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.900/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.100 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.101 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.901/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.101 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.133 <- (1) Packet I|95401|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[2-1|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 21.137 probe count not reset on ack because handshake not yet confirmed 21.137 Retransmitting CryptoFrame[0,257] on level Initial 21.137 Cwnd(-): 6000; inflight: 1200 21.137 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 21.937/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.137 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.525/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.133 <- (1) Packet H|2|L|1069|2 CryptoFrame[0,702] Padding(318) 21.137 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.137 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.525/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.137 -> Packet I|5|L|1201|2 Token=[] AckFrame[95401|Δ0] Padding(1150) >- CryptoStream[H|Finished] 21.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.528/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.140 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.237/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.140 Discarding pn space Initial because first Handshake message is being sent 21.140 Starting downloading https://server4:443/fvrcmaelyi at 54:26.459 on ClientConnection[80461cf0320a4cd9/33304a2a3fd64e63(V1) with server4/193.167.100.100:443] 21.140 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.141 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.238/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.141 -> [Packet H|1|L|46|1 AckFrame[2|Δ0], Packet A|0|S0|850a78c7b2d18025|47|1 StreamFrame[0(CIB),0,17,fin]] 21.170 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.170 <- (4) Packet H|5|L|55|2 PingFrame[] Padding(9) 21.171 -> Packet H|2|L|48|1 AckFrame[5,2|Δ0] 21.171 <- (5) Packet A|2|S0|33304a2a3fd64e63|311|4 CryptoFrame[0,133] NewTokenFrame[bef4baf40d82093b7520168b38b9e35d161e8272d2eb198ef0d5bf25e3dfbc7a3b2246e7932ea2248591cf6ced1941baa1f2] NewConnectionIdFrame[1,<0|f0b35688f905bc09|778b0fe06957e1155b13f4be9c0e1522] Padding(68) -< CryptoStream[A|NewSessionTicket] 21.179 <- (6) Packet A|3|S0|33304a2a3fd64e63|1079|4 AckFrame[0|Δ6] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(18) 21.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.277/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.180 State is set to Confirmed reschedule loss detection timer for PTO over 45 millis, based on 21.226/Handshake, because ackElicitingInFlight | RTT:34/13 21.180 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.180 Discarding pn space Handshake because HandshakeDone is received 21.181 -> Packet A|1|S0|850a78c7b2d18025|32|1 AckFrame[3-2|Δ9] 21.181 Finished downloading https://server4:443/fvrcmaelyi at 54:26.499 on ClientConnection[80461cf0320a4cd9/33304a2a3fd64e63(V1) with server4/193.167.100.100:443] 21.181 Closing ClientConnection[80461cf0320a4cd9/33304a2a3fd64e63(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.181 -> Packet A|2|S0|850a78c7b2d18025|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 21.182 Creating connection with server4:443 with v1 21.182 Setting up connection for downloading https://server4:443/yomrlsyepe at 54:26.501 on ClientConnection[a75cf90492dd10c3/e462ac10fb7556f9(V1) with server4/193.167.100.100:443] 21.182 Original destination connection id: a75cf90492dd10c3 (scid: e462ac10fb7556f9) >- CryptoStream[I|ClientHello] 21.183 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.383/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.183 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.213 <- (7) Packet A|5|S0|33304a2a3fd64e63|1400|2 PingFrame[] Padding(1373) 21.213 <- (8) Packet A|6|S0|33304a2a3fd64e63|30|1 ConnectionCloseFrame[0|0|] 21.214 -> Packet A|3|S0|850a78c7b2d18025|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 21.216 <- (1) Packet I|97377|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.217 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.417/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.216 <- (1) Packet H|0|L|749|1 CryptoFrame[0,700] 21.220 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.317/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.220 -> Packet I|1|L|1201|2 Token=[] AckFrame[97377|Δ0] Padding(1150) >- CryptoStream[H|Finished] 21.222 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.319/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.222 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.216 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 21.223 Starting downloading https://server4:443/yomrlsyepe at 54:26.541 on ClientConnection[a75cf90492dd10c3/e462ac10fb7556f9(V1) with server4/193.167.100.100:443] 21.223 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 21.223 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.320/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.223 Discarding pn space Initial because first Handshake message is being sent 21.223 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 21.223 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.320/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.223 -> Packet A|0|S0|a3b56a1deb9ac999|47|1 StreamFrame[0(CIB),0,17,fin] 21.319 loss detection timeout handler running Sending probe 0, because no ack since 21.222. Current RTT: 33/16. 21.319 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.319 (Probe is a handshake retransmit) 21.320 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.514/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.320 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 21.504 <- (2) Packet A|3|S0|e462ac10fb7556f9|311|4 CryptoFrame[0,133] NewTokenFrame[ffcf1ff12ebe95cd3aa673d7aab0e542440b65f19e1937957beaeb95770eee15c3b7ec357fe9813a446a4fcf3f9c52ba204f] NewConnectionIdFrame[1,<0|d58f5634c79ecae6|08b08712fc076a964d2b83dd3656fba3] Padding(68) -< CryptoStream[A|NewSessionTicket] 21.513 loss detection timeout handler running Sending probe 1, because no ack since 21.223. Current RTT: 33/16. 21.513 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.513 (Probe is a handshake retransmit) 21.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.902/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.513 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 21.515 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.903/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.514 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 21.525 -> Packet A|1|S0|a3b56a1deb9ac999|32|1 AckFrame[3|Δ19] 21.556 <- (3) Packet A|5|S0|e462ac10fb7556f9|55|2 HandshakeDoneFrame[] Padding(28) 21.556 State is set to Confirmed reschedule loss detection timer for PTO over 94 millis, based on 21.651/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -226 millis, based on 21.330/App, because ackElicitingInFlight | RTT:33/16 21.557 Discarding pn space Handshake because HandshakeDone is received 21.557 loss detection timeout handler running Sending probe 0, because no ack since 21.223. Current RTT: 33/16. 21.557 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 21.771/App, because ackElicitingInFlight | RTT:33/16 21.557 <- (4) Packet A|6|S0|e462ac10fb7556f9|1400|2 PingFrame[] Padding(1373) 21.557 -> Packet PA|2|S0|a3b56a1deb9ac999|47|1 StreamFrame[0(CIB),0,17,fin] 21.557 -> Packet A|3|S0|a3b56a1deb9ac999|33|1 AckFrame[6-5,3|Δ0] 21.770 loss detection timeout handler running Sending probe 1, because no ack since 21.557. Current RTT: 33/16. 21.770 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 427 millis, based on 22.199/App, because ackElicitingInFlight | RTT:33/16 21.771 -> Packet PA|4|S0|a3b56a1deb9ac999|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 427 millis, based on 22.200/App, because ackElicitingInFlight | RTT:33/16 21.772 -> Packet PA|5|S0|a3b56a1deb9ac999|47|1 StreamFrame[0(CIB),0,17,fin] 21.814 <- (5) Packet A|8|S0|e462ac10fb7556f9|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 21.814 Finished downloading https://server4:443/yomrlsyepe at 54:27.133 on ClientConnection[a75cf90492dd10c3/e462ac10fb7556f9(V1) with server4/193.167.100.100:443] 21.814 Closing ClientConnection[a75cf90492dd10c3/e462ac10fb7556f9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.815 -> Packet A|6|S0|a3b56a1deb9ac999|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-5,3|Δ0] 21.815 Creating connection with server4:443 with v1 21.816 Setting up connection for downloading https://server4:443/rlksvxjuhw at 54:27.134 on ClientConnection[f1c129f1fce8ba1e/b0ea0a01fd63f171(V1) with server4/193.167.100.100:443] 21.816 Original destination connection id: f1c129f1fce8ba1e (scid: b0ea0a01fd63f171) >- CryptoStream[I|ClientHello] 21.817 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.017/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.817 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.824 <- (6) Packet A|9|S0|e462ac10fb7556f9|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 21.824 -> Packet A|7|S0|a3b56a1deb9ac999|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-5,3|Δ0] 21.834 <- (7) Packet A|10|S0|e462ac10fb7556f9|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 21.834 -> Packet A|8|S0|a3b56a1deb9ac999|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-5,3|Δ0] 21.844 <- (8) Packet A|11|S0|e462ac10fb7556f9|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 21.850 <- (1) Packet I|97525|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.851 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.051/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.850 <- (1) Packet H|0|L|749|1 CryptoFrame[0,700] 21.853 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.950/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.853 -> Packet I|1|L|1201|2 Token=[] AckFrame[97525|Δ0] Padding(1150) 21.854 <- (9) Packet A|12|S0|e462ac10fb7556f9|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 21.854 -> Packet A|9|S0|a3b56a1deb9ac999|39|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-5,3|Δ0] 21.855 <- (10) Packet A|13|S0|e462ac10fb7556f9|30|1 ConnectionCloseFrame[0|0|] >- CryptoStream[H|Finished] 21.856 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.953/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.856 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.850 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 21.856 Starting downloading https://server4:443/rlksvxjuhw at 54:27.175 on ClientConnection[f1c129f1fce8ba1e/b0ea0a01fd63f171(V1) with server4/193.167.100.100:443] 21.856 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 21.856 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.953/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.856 Discarding pn space Initial because first Handshake message is being sent 21.856 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 21.851 <- (2) Packet A|0|S0|b0ea0a01fd63f171|311|4 CryptoFrame[0,133] NewTokenFrame[99e76ab896c760c274042f192ebdc7536955e04de9ea0cd9ddab900185277a51f8053682507adafc9153440703c5edeeda14] NewConnectionIdFrame[1,<0|ad36d110859f551d|659fbbc7284fcfebefe1df6d3fb98d9d] Padding(68) 21.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.954/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.857 -> Packet A|0|S0|b6c113f755716137|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 21.876 -> Packet A|1|S0|b6c113f755716137|32|1 AckFrame[0|Δ19] 21.887 <- (3) Packet A|2|S0|b0ea0a01fd63f171|55|2 HandshakeDoneFrame[] Padding(28) 21.887 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 21.953/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 21.964/App, because ackElicitingInFlight | RTT:33/16 21.887 Discarding pn space Handshake because HandshakeDone is received 21.907 -> Packet A|2|S0|b6c113f755716137|34|1 AckFrame[2,0|Δ19] 21.963 loss detection timeout handler running Sending probe 0, because no ack since 21.857. Current RTT: 33/16. 21.963 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 22.178/App, because ackElicitingInFlight | RTT:33/16 21.964 -> Packet PA|3|S0|b6c113f755716137|47|1 StreamFrame[0(CIB),0,17,fin] 22.001 <- (4) Packet A|3|S0|b0ea0a01fd63f171|55|3 HandshakeDoneFrame[] AckFrame[1|Δ93] Padding(22) 22.002 Cwnd(-): 6000; inflight: 47 22.002 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 68 millis, based on 22.071/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 106 millis, based on 22.109/App, because ackElicitingInFlight | RTT:33/16 22.002 -> Packet A|4|S0|b6c113f755716137|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 22.021 -> Packet A|5|S0|b6c113f755716137|32|1 AckFrame[3-2|Δ19] 22.064 <- (5) Packet A|8|S0|b0ea0a01fd63f171|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 22.065 Finished downloading https://server4:443/rlksvxjuhw at 54:27.384 on ClientConnection[f1c129f1fce8ba1e/b0ea0a01fd63f171(V1) with server4/193.167.100.100:443] 22.065 Closing ClientConnection[f1c129f1fce8ba1e/b0ea0a01fd63f171(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.066 -> Packet A|6|S0|b6c113f755716137|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3-2|Δ0] 22.066 Creating connection with server4:443 with v1 22.066 Setting up connection for downloading https://server4:443/zbgfnbxabq at 54:27.385 on ClientConnection[b14636b76904550f/ad19bb2bee3e98e6(V1) with server4/193.167.100.100:443] 22.067 Original destination connection id: b14636b76904550f (scid: ad19bb2bee3e98e6) >- CryptoStream[I|ClientHello] 22.068 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.268/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.068 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.074 <- (6) Packet A|9|S0|b0ea0a01fd63f171|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 22.075 -> Packet A|7|S0|b6c113f755716137|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3-2|Δ0] 22.084 <- (7) Packet A|10|S0|b0ea0a01fd63f171|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 22.085 -> Packet A|8|S0|b6c113f755716137|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,3-2|Δ0] 22.094 <- (8) Packet A|11|S0|b0ea0a01fd63f171|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 22.101 <- (1) Packet I|119565|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.102 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.302/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.101 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 22.104 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.201/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.104 -> Packet I|1|L|1201|2 Token=[] AckFrame[119565|Δ0] Padding(1150) 22.105 <- (9) Packet A|13|S0|b0ea0a01fd63f171|30|1 ConnectionCloseFrame[0|0|] >- CryptoStream[H|Finished] 22.107 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.204/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.107 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.101 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 22.107 Starting downloading https://server4:443/zbgfnbxabq at 54:27.426 on ClientConnection[b14636b76904550f/ad19bb2bee3e98e6(V1) with server4/193.167.100.100:443] 22.107 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.204/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.107 Discarding pn space Initial because first Handshake message is being sent 22.107 -> Packet H|1|L|46|1 AckFrame[1-0|Δ0] 22.108 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.205/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.108 -> Packet A|0|S0|0e917fb71c651e2e|47|1 StreamFrame[0(CIB),0,17,fin] 22.139 <- (2) Packet A|3|S0|ad19bb2bee3e98e6|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 22.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.237/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.141 Finished downloading https://server4:443/zbgfnbxabq at 54:27.459 on ClientConnection[b14636b76904550f/ad19bb2bee3e98e6(V1) with server4/193.167.100.100:443] 22.141 Closing ClientConnection[b14636b76904550f/ad19bb2bee3e98e6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.141 -> Packet A|1|S0|0e917fb71c651e2e|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 22.141 Creating connection with server4:443 with v1 22.142 Setting up connection for downloading https://server4:443/wwhzsvlena at 54:27.460 on ClientConnection[8e0126cbc3545730/d0baa5fe9cfa731d(V1) with server4/193.167.100.100:443] 22.142 Original destination connection id: 8e0126cbc3545730 (scid: d0baa5fe9cfa731d) >- CryptoStream[I|ClientHello] 22.143 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.343/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.143 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.149 <- (3) Packet A|4|S0|ad19bb2bee3e98e6|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 22.150 -> Packet A|2|S0|0e917fb71c651e2e|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 22.159 <- (4) Packet A|5|S0|ad19bb2bee3e98e6|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 22.160 -> Packet A|3|S0|0e917fb71c651e2e|35|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 22.169 <- (5) Packet A|6|S0|ad19bb2bee3e98e6|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 22.172 <- (6) Packet A|7|S0|ad19bb2bee3e98e6|30|1 ConnectionCloseFrame[0|0|] 22.176 <- (1) Packet I|103794|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.177 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.377/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.176 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 22.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.276/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.179 -> Packet I|1|L|1201|2 Token=[] AckFrame[103794|Δ0] Padding(1150) >- CryptoStream[H|Finished] 22.182 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.279/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.182 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.183 Starting downloading https://server4:443/wwhzsvlena at 54:27.501 on ClientConnection[8e0126cbc3545730/d0baa5fe9cfa731d(V1) with server4/193.167.100.100:443] 22.176 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 22.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.280/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.183 Discarding pn space Initial because first Handshake message is being sent 22.177 <- (2) Packet A|0|S0|d0baa5fe9cfa731d|311|4 CryptoFrame[0,133] NewTokenFrame[bfdde7105f47ff56f775038408da400dfcef2a3b53582008e38f854631808afa6a2186b4badca86ff67c8a72fee3eea62e4d] NewConnectionIdFrame[1,<0|b16a77d09ece2efe|2cab1bb084467b288e691a55b235d0dd] Padding(68) -< CryptoStream[A|NewSessionTicket] 22.183 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 22.184 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.281/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.184 -> [Packet H|2|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|f44db56d733454bd|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 22.213 <- (3) Packet A|2|S0|d0baa5fe9cfa731d|55|2 HandshakeDoneFrame[] Padding(28) 22.214 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 22.279/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 22.291/App, because ackElicitingInFlight | RTT:33/16 22.214 Discarding pn space Handshake because HandshakeDone is received 22.215 <- (4) Packet A|3|S0|d0baa5fe9cfa731d|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 22.216 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.216 -> Packet A|1|S0|f44db56d733454bd|32|1 AckFrame[3-2|Δ2] 22.216 Finished downloading https://server4:443/wwhzsvlena at 54:27.535 on ClientConnection[8e0126cbc3545730/d0baa5fe9cfa731d(V1) with server4/193.167.100.100:443] 22.216 Closing ClientConnection[8e0126cbc3545730/d0baa5fe9cfa731d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.217 -> Packet A|2|S0|f44db56d733454bd|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 22.217 Creating connection with server4:443 with v1 22.218 Setting up connection for downloading https://server4:443/xsgbrsxgdf at 54:27.536 on ClientConnection[8ddc1def268a3029/19aff3c0770ff2a1(V1) with server4/193.167.100.100:443] 22.218 Original destination connection id: 8ddc1def268a3029 (scid: 19aff3c0770ff2a1) >- CryptoStream[I|ClientHello] 22.219 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.419/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.219 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.225 <- (5) Packet A|4|S0|d0baa5fe9cfa731d|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 22.226 -> Packet A|3|S0|f44db56d733454bd|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 22.246 <- (6) Packet A|6|S0|d0baa5fe9cfa731d|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 22.246 -> Packet A|4|S0|f44db56d733454bd|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 22.248 <- (7) Packet A|7|S0|d0baa5fe9cfa731d|1400|2 PingFrame[] Padding(1373) 22.248 <- (8) Packet A|8|S0|d0baa5fe9cfa731d|30|1 ConnectionCloseFrame[0|0|] 22.252 <- (1) Packet I|110164|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.253 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.453/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.252 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 22.255 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.352/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.255 -> Packet I|1|L|1201|2 Token=[] AckFrame[110164|Δ0] Padding(1150) >- CryptoStream[H|Finished] 22.258 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.355/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.258 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.252 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 22.258 Starting downloading https://server4:443/xsgbrsxgdf at 54:27.577 on ClientConnection[8ddc1def268a3029/19aff3c0770ff2a1(V1) with server4/193.167.100.100:443] 22.258 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.355/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.258 Discarding pn space Initial because first Handshake message is being sent 22.258 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 22.259 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 22.259 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.356/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.259 -> Packet A|0|S0|76c7ef7897310c6a|47|1 StreamFrame[0(CIB),0,17,fin] 22.355 loss detection timeout handler running Sending probe 0, because no ack since 22.258. Current RTT: 33/16. 22.355 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.355 (Probe is a handshake retransmit) 22.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.550/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.356 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 22.387 <- (2) Packet A|2|S0|19aff3c0770ff2a1|311|5 CryptoFrame[0,133] NewTokenFrame[c0dc137500834e78dd77d1ff7d0f155bd34008c0b1379d968edbc1a92fa56027ed18e34e9ec4fa44ad5ecaa31dc6093d53e8] NewConnectionIdFrame[1,<0|fe4de0dbb28b2f4e|1932b20693ee348de4efc06bb5fe9a3a] AckFrame[0|Δ96] Padding(62) -< CryptoStream[A|NewSessionTicket] 22.388 probe count not reset on ack because handshake not yet confirmed 22.388 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.582/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.388 <- (3) Packet A|3|S0|19aff3c0770ff2a1|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 22.388 State is set to Confirmed reschedule loss detection timer for PTO over 319 millis, based on 22.708/Handshake, because ackElicitingInFlight | RTT:44/33 22.388 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.388 Discarding pn space Handshake because HandshakeDone is received 22.389 -> Packet A|1|S0|76c7ef7897310c6a|31|1 AckFrame[3-2|Δ0] 22.389 Finished downloading https://server4:443/xsgbrsxgdf at 54:27.707 on ClientConnection[8ddc1def268a3029/19aff3c0770ff2a1(V1) with server4/193.167.100.100:443] 22.389 Closing ClientConnection[8ddc1def268a3029/19aff3c0770ff2a1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.389 -> Packet A|2|S0|76c7ef7897310c6a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 22.389 Creating connection with server4:443 with v1 22.390 Setting up connection for downloading https://server4:443/uqdhjkorxl at 54:27.708 on ClientConnection[1047424c39e7a7ab/b09b8c434eaf4278(V1) with server4/193.167.100.100:443] 22.390 Original destination connection id: 1047424c39e7a7ab (scid: b09b8c434eaf4278) >- CryptoStream[I|ClientHello] 22.391 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.591/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.391 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.424 <- (1) Packet I|111396|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 22.425 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.625/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.424 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 22.428 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.525/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.428 -> Packet I|1|L|1201|2 Token=[] AckFrame[111396|Δ0] Padding(1150) >- CryptoStream[H|Finished] 22.430 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.527/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.430 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.431 Starting downloading https://server4:443/uqdhjkorxl at 54:27.749 on ClientConnection[1047424c39e7a7ab/b09b8c434eaf4278(V1) with server4/193.167.100.100:443] 22.424 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 22.431 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 22.431 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.528/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.431 Discarding pn space Initial because first Handshake message is being sent 22.431 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 22.425 <- (2) Packet A|0|S0|b09b8c434eaf4278|311|4 CryptoFrame[0,133] NewTokenFrame[e40979f9025113b1a5687fd0602e600c6cfcbcd06767dcd02205bcc9b89e045c4ecf610136c19c0cf563297d270fa28dfc77] NewConnectionIdFrame[1,<0|784d17ea86443de1|254cecf84576880212d799d463cb7997] Padding(68) 22.431 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.528/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.431 -> Packet A|0|S0|d83a4efbd544f3f1|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 22.451 -> Packet A|1|S0|d83a4efbd544f3f1|32|1 AckFrame[0|Δ19] 22.527 loss detection timeout handler running Sending probe 0, because no ack since 22.430. Current RTT: 33/16. 22.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.528 (Probe is a handshake retransmit) 22.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 22.722/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.528 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 22.576 <- (4) Packet A|5|S0|19aff3c0770ff2a1|311|5 CryptoFrame[0,133] NewTokenFrame[c0dc137500834e78dd77d1ff7d0f155bd34008c0b1379d968edbc1a92fa56027ed18e34e9ec4fa44ad5ecaa31dc6093d53e8] NewConnectionIdFrame[1,<0|fe4de0dbb28b2f4e|1932b20693ee348de4efc06bb5fe9a3a] AckFrame[0|Δ285] Padding(60) 22.576 -> Packet A|3|S0|76c7ef7897310c6a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 22.608 <- (5) Packet A|7|S0|19aff3c0770ff2a1|30|1 ConnectionCloseFrame[0|0|] 22.695 <- (3) Packet A|5|S0|b09b8c434eaf4278|55|3 HandshakeDoneFrame[] AckFrame[1-0|Δ212] Padding(20) 22.695 State is set to Confirmed reschedule loss detection timer for PTO over -50 millis, based on 22.645/App, because ackElicitingInFlight | RTT:33/16 22.695 loss detection timeout handler running Sending probe 1, because no ack since 22.431. Current RTT: 33/16. reschedule loss detection timer for PTO over -157 millis, based on 22.538/App, because ackElicitingInFlight | RTT:33/16 22.695 Discarding pn space Handshake because HandshakeDone is received 22.696 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 106 millis, based on 22.803/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 106 millis, based on 22.803/App, because ackElicitingInFlight | RTT:33/16 22.696 -> Packet PA|2|S0|d83a4efbd544f3f1|47|1 StreamFrame[0(CIB),0,17,fin] 22.696 <- (4) Packet A|6|S0|b09b8c434eaf4278|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 22.696 -> Packet A|3|S0|d83a4efbd544f3f1|31|1 AckFrame[6-5|Δ0] 22.696 Finished downloading https://server4:443/uqdhjkorxl at 54:28.015 on ClientConnection[1047424c39e7a7ab/b09b8c434eaf4278(V1) with server4/193.167.100.100:443] 22.696 Closing ClientConnection[1047424c39e7a7ab/b09b8c434eaf4278(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.697 -> Packet A|4|S0|d83a4efbd544f3f1|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 22.697 Creating connection with server4:443 with v1 22.698 Setting up connection for downloading https://server4:443/onuzofxuas at 54:28.016 on ClientConnection[e0ea1c379569a876/d22976ad03801c3d(V1) with server4/193.167.100.100:443] 22.698 Original destination connection id: e0ea1c379569a876 (scid: d22976ad03801c3d) >- CryptoStream[I|ClientHello] 22.699 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.899/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.699 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.727 <- (5) Packet A|8|S0|b09b8c434eaf4278|55|2 AckFrame[2-0|Δ0] Padding(24) 22.727 -> Packet A|5|S0|d83a4efbd544f3f1|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 22.727 <- (6) Packet A|9|S0|b09b8c434eaf4278|30|1 ConnectionCloseFrame[0|0|] 22.898 loss detection timeout handler running Sending probe 0, because no ack since 22.699. Current RTT: 100/25. 22.898 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.898 (Probe is an initial retransmit) 22.899 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.299/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.899 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.298 loss detection timeout handler running Sending probe 1, because no ack since 22.899. Current RTT: 100/25. 23.298 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.298 (Probe is an initial retransmit) 23.299 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.099/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.299 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.300 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.100/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.300 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.332 <- (1) Packet I|124891|L|179|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 23.333 probe count not reset on ack because handshake not yet confirmed 23.333 Retransmitting CryptoFrame[0,257] on level Initial 23.333 Cwnd(-): 6000; inflight: 1200 23.333 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.133/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.334 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 23.722/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.334 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 23.332 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 23.337 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 23.725/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.336 -> Packet I|5|L|1201|2 Token=[] AckFrame[124891|Δ0] Padding(1150) >- CryptoStream[H|Finished] 23.339 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 23.727/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.339 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.332 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 23.339 Starting downloading https://server4:443/onuzofxuas at 54:28.658 on ClientConnection[e0ea1c379569a876/d22976ad03801c3d(V1) with server4/193.167.100.100:443] 23.339 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 23.340 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.437/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.340 Discarding pn space Initial because first Handshake message is being sent 23.340 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 23.332 <- (2) Packet A|0|S0|d22976ad03801c3d|311|4 CryptoFrame[0,133] NewTokenFrame[8313af2154241e481869e1b787e33cb0b26308e29acd8ed5ddeb66836a7023d0784fffcb1081229108525a3f211fd9cb8aa5] NewConnectionIdFrame[1,<0|8fb4eedb5fcef5f4|47df1be86049fbf9c3643a3f88326daf] Padding(68) -< CryptoStream[A|NewSessionTicket] 23.340 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.437/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.340 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 23.340 -> Packet A|0|S0|ed0303e0d00ed46a|47|1 StreamFrame[0(CIB),0,17,fin] 23.359 -> Packet A|1|S0|ed0303e0d00ed46a|32|1 AckFrame[0|Δ19] 23.405 <- (4) Packet A|3|S0|d22976ad03801c3d|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 23.406 State is set to Confirmed reschedule loss detection timer for PTO over 29 millis, based on 23.436/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 40 millis, based on 23.447/App, because ackElicitingInFlight | RTT:33/16 23.406 Discarding pn space Handshake because HandshakeDone is received 23.407 Finished downloading https://server4:443/onuzofxuas at 54:28.725 on ClientConnection[e0ea1c379569a876/d22976ad03801c3d(V1) with server4/193.167.100.100:443] 23.407 Closing ClientConnection[e0ea1c379569a876/d22976ad03801c3d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.407 -> Packet A|2|S0|ed0303e0d00ed46a|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 23.407 Creating connection with server4:443 with v1 23.408 Setting up connection for downloading https://server4:443/bwqayumnks at 54:28.726 on ClientConnection[8f744fb9c2095abd/686f03c2bb1a7cb1(V1) with server4/193.167.100.100:443] 23.408 Original destination connection id: 8f744fb9c2095abd (scid: 686f03c2bb1a7cb1) >- CryptoStream[I|ClientHello] 23.409 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.609/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.409 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.437 <- (5) Packet A|4|S0|d22976ad03801c3d|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 23.437 -> Packet A|3|S0|ed0303e0d00ed46a|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 23.443 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 23.608 loss detection timeout handler running Sending probe 0, because no ack since 23.409. Current RTT: 100/25. 23.608 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.608 (Probe is an initial retransmit) 23.609 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.009/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.609 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.008 loss detection timeout handler running Sending probe 1, because no ack since 23.609. Current RTT: 100/25. 24.008 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.008 (Probe is an initial retransmit) 24.008 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.808/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.008 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.009 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 24.809/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.009 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.041 <- (2) Packet I|100966|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[2,0|Δ0] Padding(3) -< CryptoStream[I|ServerHello] 24.044 probe count not reset on ack because handshake not yet confirmed 24.044 Cwnd(-): 6000; inflight: 1200 24.045 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 24.845/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.041 <- (2) Packet H|2|L|1069|2 CryptoFrame[0,701] Padding(319) 24.045 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 24.433/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.045 -> Packet I|4|L|1201|2 Token=[] AckFrame[100966|Δ0] Padding(1150) >- CryptoStream[H|Finished] 24.047 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 24.435/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.047 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.048 Starting downloading https://server4:443/bwqayumnks at 54:29.366 on ClientConnection[8f744fb9c2095abd/686f03c2bb1a7cb1(V1) with server4/193.167.100.100:443] 24.048 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 24.048 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.145/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.048 Discarding pn space Initial because first Handshake message is being sent 24.048 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.146/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.049 -> Packet A|0|S0|2da19bc00d874319|47|1 StreamFrame[0(CIB),0,17,fin] 24.077 <- (4) Packet H|4|L|55|2 PingFrame[] Padding(9) 24.077 -> Packet H|2|L|48|1 AckFrame[4,2|Δ0] 24.108 <- (5) Packet H|5|L|55|3 PingFrame[] AckFrame[2-1|Δ0] Padding(4) 24.109 Retransmitting CryptoFrame[0,36] on level Handshake 24.109 Cwnd(-): 3000; inflight: 47 24.109 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 24.109 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 24.109 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 24.206/Handshake, because ackElicitingInFlight | RTT:33/16 24.109 -> Packet H|3|L|80|1 CryptoFrame[0,36] 24.109 -> Packet H|4|L|46|1 AckFrame[5|Δ0] 24.206 loss detection timeout handler running Sending probe 0, because no ack since 24.049. Current RTT: 33/16. 24.206 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 24.206 (Probe is a handshake retransmit) 24.206 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 193 millis, based on 24.400/Handshake, because ackElicitingInFlight | RTT:33/16 24.206 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 24.238 <- (6) Packet A|2|S0|686f03c2bb1a7cb1|311|5 CryptoFrame[0,133] NewTokenFrame[b2bcc3e4d6f3c32971ef885d904020631730a66480b89d6f2b2f0247a7dfe6cafc9973861e94bb1851dbe5812c5edfb5a52b] NewConnectionIdFrame[1,<0|2a882980471266fc|915097e4cd3c5367cfe905fabfd1d756] AckFrame[0|Δ158] Padding(60) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 64 millis, based on 24.303/Handshake, because ackElicitingInFlight | RTT:33/16 24.238 <- (7) Packet A|3|S0|686f03c2bb1a7cb1|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 24.239 State is set to Confirmed reschedule loss detection timer for PTO over 213 millis, based on 24.453/Handshake, because ackElicitingInFlight | RTT:51/49 24.239 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.239 Discarding pn space Handshake because HandshakeDone is received 24.239 -> Packet A|1|S0|2da19bc00d874319|31|1 AckFrame[3-2|Δ0] 24.240 Finished downloading https://server4:443/bwqayumnks at 54:29.558 on ClientConnection[8f744fb9c2095abd/686f03c2bb1a7cb1(V1) with server4/193.167.100.100:443] 24.240 Closing ClientConnection[8f744fb9c2095abd/686f03c2bb1a7cb1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.240 -> Packet A|2|S0|2da19bc00d874319|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 24.240 Creating connection with server4:443 with v1 24.241 Setting up connection for downloading https://server4:443/zvnhzyrbdm at 54:29.559 on ClientConnection[19e7481f01061e3a/e85fd00945cfb3f2(V1) with server4/193.167.100.100:443] 24.241 Original destination connection id: 19e7481f01061e3a (scid: e85fd00945cfb3f2) >- CryptoStream[I|ClientHello] 24.242 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.442/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.242 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.275 <- (1) Packet I|113271|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.276 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.476/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.275 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 24.279 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.376/Handshake, because peerAwaitingAddressValidation | RTT:33/16 24.279 -> Packet I|1|L|1201|2 Token=[] AckFrame[113271|Δ0] Padding(1150) >- CryptoStream[H|Finished] 24.281 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.378/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.281 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.275 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 24.281 Starting downloading https://server4:443/zvnhzyrbdm at 54:29.600 on ClientConnection[19e7481f01061e3a/e85fd00945cfb3f2(V1) with server4/193.167.100.100:443] 24.281 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 24.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.379/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.282 Discarding pn space Initial because first Handshake message is being sent 24.282 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 24.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.379/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.282 -> Packet A|0|S0|f1864851f1465c07|47|1 StreamFrame[0(CIB),0,17,fin] 24.378 loss detection timeout handler running Sending probe 0, because no ack since 24.281. Current RTT: 33/16. 24.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.378 (Probe is a handshake retransmit) 24.379 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 24.573/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.379 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 24.419 <- (8) Packet A|5|S0|686f03c2bb1a7cb1|311|5 CryptoFrame[0,133] NewTokenFrame[b2bcc3e4d6f3c32971ef885d904020631730a66480b89d6f2b2f0247a7dfe6cafc9973861e94bb1851dbe5812c5edfb5a52b] NewConnectionIdFrame[1,<0|2a882980471266fc|915097e4cd3c5367cfe905fabfd1d756] AckFrame[0|Δ339] Padding(60) 24.420 -> Packet A|3|S0|2da19bc00d874319|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 24.572 loss detection timeout handler running Sending probe 1, because no ack since 24.282. Current RTT: 33/16. 24.572 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.572 (Probe is a handshake retransmit) 24.573 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 24.961/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.572 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 24.573 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 24.961/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.573 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 24.961 loss detection timeout handler running Sending probe 2, because no ack since 24.282. Current RTT: 33/16. 24.961 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.961 (Probe is a handshake retransmit) 24.961 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 25.737/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.961 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 24.962 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 25.738/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.962 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 25.737 loss detection timeout handler running Sending probe 3, because no ack since 24.282. Current RTT: 33/16. 25.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.737 (Probe is a handshake retransmit) 25.738 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1551 millis, based on 27.290/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.738 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 25.739 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1551 millis, based on 27.291/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.739 -> Packet PH|9|L|80|1 CryptoFrame[0,36] 26.063 <- (2) Packet A|7|S0|e85fd00945cfb3f2|311|4 CryptoFrame[0,133] NewTokenFrame[f2e6daf894048e19e06ced0c3d61d8a22098eaae2132a31e40c1434a743a41f6d5336d05cfe8c6ffe02d45c15c26d1c009f4] NewConnectionIdFrame[1,<0|caf9dcbe46023e61|883abe0ff113780b3d73ff970fcc1ff2] Padding(68) -< CryptoStream[A|NewSessionTicket] 26.084 -> Packet A|1|S0|f1864851f1465c07|32|1 AckFrame[7|Δ19] 26.115 <- (3) Packet A|8|S0|e85fd00945cfb3f2|55|2 HandshakeDoneFrame[] Padding(28) 26.115 State is set to Confirmed reschedule loss detection timer for PTO over -121 millis, based on 25.994/App, because ackElicitingInFlight | RTT:33/16 26.115 loss detection timeout handler running Sending probe 4, because no ack since 24.282. Current RTT: 33/16. reschedule loss detection timer for PTO over -1726 millis, based on 24.389/App, because ackElicitingInFlight | RTT:33/16 26.115 (Probe is retransmit on level App) 26.115 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 106 millis, based on 26.223/App, because ackElicitingInFlight | RTT:33/16 26.116 -> Packet PA|2|S0|f1864851f1465c07|47|1 StreamFrame[0(CIB),0,17,fin] 26.116 <- (4) Packet A|9|S0|e85fd00945cfb3f2|1400|2 PingFrame[] Padding(1373) 26.116 -> Packet A|3|S0|f1864851f1465c07|31|1 AckFrame[9-7|Δ0] reschedule loss detection timer for PTO over 106 millis, based on 26.224/App, because ackElicitingInFlight | RTT:33/16 26.117 -> Packet PA|4|S0|f1864851f1465c07|47|1 StreamFrame[0(CIB),0,17,fin] 26.148 <- (5) Packet A|10|S0|e85fd00945cfb3f2|1079|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 26.148 Cwnd(-): 6000; inflight: 47 26.148 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 75 millis, based on 26.224/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 26.239/App, because ackElicitingInFlight | RTT:33/12 26.148 <- (6) Packet A|11|S0|e85fd00945cfb3f2|55|2 AckFrame[4-1|Δ0] Padding(24) 26.148 -> Packet A|5|S0|f1864851f1465c07|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[9-8|Δ0] reschedule loss detection timer for PTO over 90 millis, based on 26.239/App, because ackElicitingInFlight | RTT:33/12 26.149 Finished downloading https://server4:443/zvnhzyrbdm at 54:31.467 on ClientConnection[19e7481f01061e3a/e85fd00945cfb3f2(V1) with server4/193.167.100.100:443] 26.149 Closing ClientConnection[19e7481f01061e3a/e85fd00945cfb3f2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.150 Creating connection with server4:443 with v1 26.149 -> Packet A|6|S0|f1864851f1465c07|35|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 26.150 Setting up connection for downloading https://server4:443/xzcbgjeujc at 54:31.469 on ClientConnection[064b2c0810273236/a1ccee57d9ca16c6(V1) with server4/193.167.100.100:443] 26.150 Original destination connection id: 064b2c0810273236 (scid: a1ccee57d9ca16c6) >- CryptoStream[I|ClientHello] 26.152 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.352/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.151 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.158 <- (7) Packet A|12|S0|e85fd00945cfb3f2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 26.158 -> Packet A|7|S0|f1864851f1465c07|35|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 26.168 <- (8) Packet A|13|S0|e85fd00945cfb3f2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 26.168 -> Packet A|8|S0|f1864851f1465c07|35|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 26.178 <- (9) Packet A|14|S0|e85fd00945cfb3f2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 26.180 <- (10) Packet A|16|S0|e85fd00945cfb3f2|31|1 ConnectionCloseFrame[0|0|] 26.351 loss detection timeout handler running Sending probe 0, because no ack since 26.151. Current RTT: 100/25. 26.351 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.351 (Probe is an initial retransmit) 26.351 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.751/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.351 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.385 <- (1) Packet I|110657|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 26.386 probe count not reset on ack because handshake not yet confirmed 26.386 Retransmitting CryptoFrame[0,257] on level Initial 26.386 Cwnd(-): 6000; inflight: 0 26.386 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.786/Initial, because peerAwaitingAddressValidation | RTT:100/25 26.386 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 26.580/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.386 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 26.388 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.385 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] reschedule loss detection timer for PTO over 193 millis, based on 26.582/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.388 -> Packet I|3|L|1201|2 Token=[] AckFrame[110657|Δ0] Padding(1150) >- CryptoStream[H|Finished] 26.391 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 26.585/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.390 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.385 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 26.391 Starting downloading https://server4:443/xzcbgjeujc at 54:31.709 on ClientConnection[064b2c0810273236/a1ccee57d9ca16c6(V1) with server4/193.167.100.100:443] 26.391 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 26.391 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.488/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.391 Discarding pn space Initial because first Handshake message is being sent 26.391 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 26.385 <- (2) Packet A|0|S0|a1ccee57d9ca16c6|311|4 CryptoFrame[0,133] NewTokenFrame[caaa29b39fbc352f51709fadf384793d89534206d8b405d9865baadf69f31b51387b09296de86996742c6dc081a7f6f967b1] NewConnectionIdFrame[1,<0|c85dbd7558b92c1b|7c812118d1f15083019f35feba83fd8e] Padding(68) 26.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.489/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket] 26.391 -> Packet A|0|S0|ecf72c74ccb8d05e|47|1 StreamFrame[0(CIB),0,17,fin] 26.411 -> Packet A|1|S0|ecf72c74ccb8d05e|32|1 AckFrame[0|Δ19] 26.419 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.425 <- (4) Packet A|2|S0|a1ccee57d9ca16c6|1079|4 AckFrame[0|Δ2] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(18) 26.426 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 26.523/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 26.427 State is set to Confirmed reschedule loss detection timer for PTO over 44 millis, based on 26.471/Handshake, because ackElicitingInFlight | RTT:33/12 26.427 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 26.427 Discarding pn space Handshake because HandshakeDone is received 26.427 Finished downloading https://server4:443/xzcbgjeujc at 54:31.746 on ClientConnection[064b2c0810273236/a1ccee57d9ca16c6(V1) with server4/193.167.100.100:443] 26.427 Closing ClientConnection[064b2c0810273236/a1ccee57d9ca16c6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.427 -> Packet A|2|S0|ecf72c74ccb8d05e|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 26.428 Creating connection with server4:443 with v1 26.428 Setting up connection for downloading https://server4:443/urfefdjppx at 54:31.747 on ClientConnection[dce1d8d58b808895/cb89378437fb74ee(V1) with server4/193.167.100.100:443] 26.428 Original destination connection id: dce1d8d58b808895 (scid: cb89378437fb74ee) >- CryptoStream[I|ClientHello] 26.430 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.630/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.430 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.436 <- (5) Packet A|3|S0|a1ccee57d9ca16c6|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 26.436 -> Packet A|3|S0|ecf72c74ccb8d05e|37|2 ConnectionCloseFrame[0|0|] AckFrame[2,0|Δ0] 26.458 <- (6) Packet A|6|S0|a1ccee57d9ca16c6|30|1 ConnectionCloseFrame[0|0|] 26.629 loss detection timeout handler running Sending probe 0, because no ack since 26.430. Current RTT: 100/25. 26.629 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.629 (Probe is an initial retransmit) 26.630 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.030/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.629 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.029 loss detection timeout handler running Sending probe 1, because no ack since 26.629. Current RTT: 100/25. 27.029 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.029 (Probe is an initial retransmit) 27.029 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.829/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.029 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.030 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.830/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.030 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.063 <- (1) Packet I|109022|L|178|2 Token=[] AckFrame[3-2|Δ0] CryptoFrame[0,123] 27.064 probe count not reset on ack because handshake not yet confirmed 27.064 Retransmitting CryptoFrame[0,257] on level Initial 27.064 Cwnd(-): 6000; inflight: 0 27.064 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 27.864/Initial, because peerAwaitingAddressValidation | RTT:100/25 27.064 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 27.448/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.064 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 27.063 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 27.067 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 27.451/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.066 -> Packet I|5|L|1201|2 Token=[] AckFrame[109022|Δ0] Padding(1150) >- CryptoStream[H|Finished] 27.069 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 27.453/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.069 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.063 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 27.069 Starting downloading https://server4:443/urfefdjppx at 54:32.388 on ClientConnection[dce1d8d58b808895/cb89378437fb74ee(V1) with server4/193.167.100.100:443] 27.069 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 27.165/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.069 Discarding pn space Initial because first Handshake message is being sent 27.063 <- (2) Packet A|0|S0|cb89378437fb74ee|311|4 CryptoFrame[0,133] NewTokenFrame[94aa39dff214a6c76e9c76993537237f38ea4af50d9817578bdac034c8311505af4e302b5b860173a01d0f584049542f5670] NewConnectionIdFrame[1,<0|de5d3f555f6598e0|677f962c1952485e8aad50796063dd9e] Padding(68) 27.070 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 27.166/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[A|NewSessionTicket] 27.070 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|6160d51caa1ee2e4|47|1 StreamFrame[0(CIB),0,17,fin]] 27.089 -> Packet A|1|S0|6160d51caa1ee2e4|32|1 AckFrame[0|Δ19] 27.165 loss detection timeout handler running Sending probe 0, because no ack since 27.069. Current RTT: 32/16. 27.165 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.165 (Probe is a handshake retransmit) 27.165 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 27.357/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.165 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 27.178 <- (3) Packet H|2|L|823|2 CryptoFrame[0,701] Padding(73) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.179 -> Packet H|3|L|46|1 AckFrame[2-0|Δ0] 27.196 <- (4) Packet A|2|S0|cb89378437fb74ee|55|2 HandshakeDoneFrame[] Padding(28) 27.197 State is set to Confirmed reschedule loss detection timer for PTO over 85 millis, based on 27.282/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -21 millis, based on 27.176/App, because ackElicitingInFlight | RTT:32/16 27.197 Discarding pn space Handshake because HandshakeDone is received 27.197 loss detection timeout handler running Sending probe 0, because no ack since 27.070. Current RTT: 32/16. 27.197 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 211 millis, based on 27.409/App, because ackElicitingInFlight | RTT:32/16 27.197 -> Packet PA|2|S0|6160d51caa1ee2e4|47|1 StreamFrame[0(CIB),0,17,fin] 27.197 <- (5) Packet A|3|S0|cb89378437fb74ee|1400|2 PingFrame[] Padding(1373) 27.198 -> Packet A|3|S0|6160d51caa1ee2e4|33|1 AckFrame[3-2,0|Δ0] 27.229 <- (6) Packet A|4|S0|cb89378437fb74ee|1079|3 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 27.230 Cwnd(-): 3000; inflight: 0 27.230 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 27.230 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 89 millis, based on 27.320/App, because ackElicitingInFlight | RTT:32/12 27.230 -> Packet A|4|S0|6160d51caa1ee2e4|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-2|Δ0] 27.230 Finished downloading https://server4:443/urfefdjppx at 54:32.549 on ClientConnection[dce1d8d58b808895/cb89378437fb74ee(V1) with server4/193.167.100.100:443] 27.230 Closing ClientConnection[dce1d8d58b808895/cb89378437fb74ee(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.231 -> Packet A|5|S0|6160d51caa1ee2e4|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 27.231 Creating connection with server4:443 with v1 27.232 Setting up connection for downloading https://server4:443/sfrtcpqosp at 54:32.550 on ClientConnection[11be0bca12bc3f00/2c241d755e2ff586(V1) with server4/193.167.100.100:443] 27.232 Original destination connection id: 11be0bca12bc3f00 (scid: 2c241d755e2ff586) >- CryptoStream[I|ClientHello] 27.233 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.433/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.233 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.259 <- (7) Packet A|7|S0|cb89378437fb74ee|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 27.260 -> Packet A|6|S0|6160d51caa1ee2e4|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 27.260 <- (8) Packet A|8|S0|cb89378437fb74ee|55|2 AckFrame[4-1|Δ0] Padding(24) 27.261 -> Packet A|7|S0|6160d51caa1ee2e4|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 27.269 <- (9) Packet A|9|S0|cb89378437fb74ee|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 27.290 <- (10) Packet A|12|S0|cb89378437fb74ee|30|1 ConnectionCloseFrame[0|0|] 27.432 loss detection timeout handler running Sending probe 0, because no ack since 27.233. Current RTT: 100/25. 27.432 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.432 (Probe is an initial retransmit) 27.433 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.833/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.433 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.466 <- (1) Packet I|67777|L|179|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 27.467 probe count not reset on ack because handshake not yet confirmed 27.467 Retransmitting CryptoFrame[0,257] on level Initial 27.467 Cwnd(-): 6000; inflight: 0 27.467 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.867/Initial, because peerAwaitingAddressValidation | RTT:100/25 27.467 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 27.661/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.467 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 27.466 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 27.469 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 27.664/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.469 -> Packet I|3|L|1201|2 Token=[] AckFrame[67777|Δ0] Padding(1150) >- CryptoStream[H|Finished] 27.472 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 27.666/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.472 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.466 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 27.473 Starting downloading https://server4:443/sfrtcpqosp at 54:32.791 on ClientConnection[11be0bca12bc3f00/2c241d755e2ff586(V1) with server4/193.167.100.100:443] 27.473 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 27.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.570/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.473 Discarding pn space Initial because first Handshake message is being sent 27.473 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 27.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.570/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.473 -> Packet A|0|S0|e7631e61f2dc6876|47|1 StreamFrame[0(CIB),0,17,fin] 27.506 <- (2) Packet A|2|S0|2c241d755e2ff586|55|2 HandshakeDoneFrame[] Padding(28) 27.506 State is set to Confirmed reschedule loss detection timer for PTO over 62 millis, based on 27.569/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 73 millis, based on 27.580/App, because ackElicitingInFlight | RTT:33/16 27.507 Discarding pn space Handshake because HandshakeDone is received 27.526 -> Packet A|1|S0|e7631e61f2dc6876|32|1 AckFrame[2|Δ19] 27.557 <- (3) Packet A|3|S0|2c241d755e2ff586|311|4 CryptoFrame[0,133] NewTokenFrame[dfbaf477a32f564e566747501f2906e2de96fe7b2018e346d9281c1f0ff8cbf8e7e33564dbeeff1d12bd4138599cb697c74f] NewConnectionIdFrame[1,<0|2ce0d107aebec7f1|d0536f0a379de702c9fe51f563d88f32] Padding(68) -< CryptoStream[A|NewSessionTicket] 27.558 <- (4) Packet A|4|S0|2c241d755e2ff586|1400|2 PingFrame[] Padding(1373) 27.559 -> Packet A|2|S0|e7631e61f2dc6876|31|1 AckFrame[4-2|Δ0] 27.580 loss detection timeout handler running Sending probe 0, because no ack since 27.473. Current RTT: 33/16. 27.580 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 213 millis, based on 27.794/App, because ackElicitingInFlight | RTT:33/16 27.580 -> Packet PA|3|S0|e7631e61f2dc6876|47|1 StreamFrame[0(CIB),0,17,fin] 27.622 <- (5) Packet A|6|S0|2c241d755e2ff586|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 27.623 Finished downloading https://server4:443/sfrtcpqosp at 54:32.941 on ClientConnection[11be0bca12bc3f00/2c241d755e2ff586(V1) with server4/193.167.100.100:443] 27.623 Closing ClientConnection[11be0bca12bc3f00/2c241d755e2ff586(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.624 -> Packet A|4|S0|e7631e61f2dc6876|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-2|Δ0] 27.624 Creating connection with server4:443 with v1 27.625 Setting up connection for downloading https://server4:443/vjmbhwpmze at 54:32.943 on ClientConnection[0ad98763c91766bb/4e3a751cfb95fdea(V1) with server4/193.167.100.100:443] 27.625 Original destination connection id: 0ad98763c91766bb (scid: 4e3a751cfb95fdea) >- CryptoStream[I|ClientHello] 27.626 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.826/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.626 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.642 <- (6) Packet A|8|S0|2c241d755e2ff586|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 27.643 -> Packet A|5|S0|e7631e61f2dc6876|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-2|Δ0] 27.654 <- (7) Packet A|10|S0|2c241d755e2ff586|30|1 ConnectionCloseFrame[0|0|] 27.659 <- (1) Packet I|85320|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 27.660 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.860/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.659 <- (1) Packet H|0|L|749|1 CryptoFrame[0,700] 27.662 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.759/Handshake, because peerAwaitingAddressValidation | RTT:33/16 27.662 -> Packet I|1|L|1201|2 Token=[] AckFrame[85320|Δ0] Padding(1150) >- CryptoStream[H|Finished] 27.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.762/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.664 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.659 <- (1) Packet H|1|L|324|2 PingFrame[] Padding(278) 27.665 Starting downloading https://server4:443/vjmbhwpmze at 54:32.983 on ClientConnection[0ad98763c91766bb/4e3a751cfb95fdea(V1) with server4/193.167.100.100:443] 27.665 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 27.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.762/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.665 Discarding pn space Initial because first Handshake message is being sent 27.665 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 27.660 <- (2) Packet A|0|S0|4e3a751cfb95fdea|311|4 CryptoFrame[0,133] NewTokenFrame[98619a93aad84a7daad7eeef47c10f2800b9dad6f5f7b103890feae90adc68b4ab60d2b27344bc25a8857ac5b8ece6c13f10] NewConnectionIdFrame[1,<0|6204702edae932fb|11d7f54102fc8915b82f0159c47e3701] Padding(68) 27.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.762/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.665 -> Packet A|0|S0|fb55fd1b62920524|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 27.685 -> Packet A|1|S0|fb55fd1b62920524|32|1 AckFrame[0|Δ19] 27.697 <- (3) Packet A|3|S0|4e3a751cfb95fdea|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 27.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.794/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.698 Finished downloading https://server4:443/vjmbhwpmze at 54:33.016 on ClientConnection[0ad98763c91766bb/4e3a751cfb95fdea(V1) with server4/193.167.100.100:443] 27.698 Closing ClientConnection[0ad98763c91766bb/4e3a751cfb95fdea(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.698 -> Packet A|2|S0|fb55fd1b62920524|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 27.698 Creating connection with server4:443 with v1 27.699 Setting up connection for downloading https://server4:443/daqljtiuqb at 54:33.018 on ClientConnection[a43a2fe941d782c2/0d5ea404b526e8c2(V1) with server4/193.167.100.100:443] 27.699 Original destination connection id: a43a2fe941d782c2 (scid: 0d5ea404b526e8c2) >- CryptoStream[I|ClientHello] 27.703 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.903/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.702 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.707 <- (4) Packet A|4|S0|4e3a751cfb95fdea|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 27.707 -> Packet A|3|S0|fb55fd1b62920524|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 27.718 <- (5) Packet A|5|S0|4e3a751cfb95fdea|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 27.718 -> Packet A|4|S0|fb55fd1b62920524|37|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 27.736 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 27.738 <- (6) Packet A|7|S0|4e3a751cfb95fdea|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 27.738 <- (7) Packet A|8|S0|4e3a751cfb95fdea|30|1 ConnectionCloseFrame[0|0|] 27.902 loss detection timeout handler running Sending probe 0, because no ack since 27.702. Current RTT: 100/25. 27.902 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.902 (Probe is an initial retransmit) 27.902 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.303/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.902 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.936 <- (2) Packet I|90292|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 27.938 probe count not reset on ack because handshake not yet confirmed 27.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 28.339/Handshake, because peerAwaitingAddressValidation | RTT:100/25 27.936 <- (2) Packet H|2|L|1069|2 PingFrame[] Padding(1023) 27.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.036/Handshake, because peerAwaitingAddressValidation | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 28.036/Handshake, because peerAwaitingAddressValidation | RTT:33/16 27.939 Discarding pn space Initial because first Handshake message is being sent 27.939 -> Packet I|2|L|1201|2 Token=[] AckFrame[90292|Δ0] Padding(1150) 27.939 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 27.972 <- (3) Packet H|3|L|823|3 CryptoFrame[0,701] AckFrame[0|Δ0] Padding(68) >- CryptoStream[H|Finished] 27.975 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.072/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.975 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[2|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.976 Starting downloading https://server4:443/daqljtiuqb at 54:33.294 on ClientConnection[a43a2fe941d782c2/0d5ea404b526e8c2(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 28.072/Handshake, because ackElicitingInFlight | RTT:33/16 27.972 <- (3) Packet H|4|L|55|3 PingFrame[] AckFrame[0|Δ0] Padding(4) reschedule loss detection timer for PTO over 95 millis, based on 28.072/Handshake, because ackElicitingInFlight | RTT:33/16 27.976 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 95 millis, based on 28.072/Handshake, because ackElicitingInFlight | RTT:33/16 27.976 -> [Packet H|2|L|46|1 AckFrame[4-3|Δ0], Packet A|0|S0|abd8753279c0aad2|47|1 StreamFrame[0(CIB),0,17,fin]] 28.071 loss detection timeout handler running Sending probe 0, because no ack since 27.975. Current RTT: 33/16. 28.072 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 28.072 (Probe is a handshake retransmit) 28.072 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 193 millis, based on 28.266/Handshake, because ackElicitingInFlight | RTT:33/16 28.072 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 28.103 <- (4) Packet A|2|S0|0d5ea404b526e8c2|311|4 CryptoFrame[0,133] NewTokenFrame[9375732f7d71a7a1fb6b67e297b691859cff7faa2aebedce4caa08ff70f0a867ef287d08366f9b1904cc6cb0afcb29f3e4f8] NewConnectionIdFrame[1,<0|cf0348af4b8f3c60|412159e1e64463034aa176b7cca5c61d] Padding(68) -< CryptoStream[A|NewSessionTicket] 28.123 -> Packet A|1|S0|abd8753279c0aad2|32|1 AckFrame[2|Δ19] 28.265 loss detection timeout handler running Sending probe 1, because no ack since 27.976. Current RTT: 33/16. 28.265 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 28.265 (Probe is a handshake retransmit) 28.266 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 387 millis, based on 28.653/Handshake, because ackElicitingInFlight | RTT:33/16 28.265 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 28.267 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 387 millis, based on 28.655/Handshake, because ackElicitingInFlight | RTT:33/16 28.267 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 28.654 loss detection timeout handler running Sending probe 2, because no ack since 27.976. Current RTT: 33/16. 28.654 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 28.654 (Probe is a handshake retransmit) 28.654 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 775 millis, based on 29.430/Handshake, because ackElicitingInFlight | RTT:33/16 28.654 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 28.655 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 775 millis, based on 29.431/Handshake, because ackElicitingInFlight | RTT:33/16 28.655 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 29.430 loss detection timeout handler running Sending probe 3, because no ack since 27.976. Current RTT: 33/16. 29.431 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 29.431 (Probe is a handshake retransmit) 29.431 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 1551 millis, based on 30.983/Handshake, because ackElicitingInFlight | RTT:33/16 29.431 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 29.432 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 1551 millis, based on 30.984/Handshake, because ackElicitingInFlight | RTT:33/16 29.432 -> Packet PH|9|L|80|1 CryptoFrame[0,36] 29.635 <- (5) Packet A|8|S0|0d5ea404b526e8c2|311|4 CryptoFrame[0,133] NewTokenFrame[9375732f7d71a7a1fb6b67e297b691859cff7faa2aebedce4caa08ff70f0a867ef287d08366f9b1904cc6cb0afcb29f3e4f8] NewConnectionIdFrame[1,<0|cf0348af4b8f3c60|412159e1e64463034aa176b7cca5c61d] Padding(68) -< CryptoStream[A|NewSessionTicket] 29.655 -> Packet A|2|S0|abd8753279c0aad2|34|1 AckFrame[8,2|Δ19] 30.350 <- (6) Packet A|10|S0|0d5ea404b526e8c2|55|2 HandshakeDoneFrame[] Padding(28) 30.350 State is set to Confirmed reschedule loss detection timer for PTO over -661 millis, based on 29.688/App, because ackElicitingInFlight | RTT:33/16 30.350 loss detection timeout handler running Sending probe 4, because no ack since 27.976. Current RTT: 33/16. reschedule loss detection timer for PTO over -2267 millis, based on 28.083/App, because ackElicitingInFlight | RTT:33/16 30.350 Discarding pn space Handshake because HandshakeDone is received 30.350 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 106 millis, based on 30.457/App, because ackElicitingInFlight | RTT:33/16 30.350 -> Packet PA|3|S0|abd8753279c0aad2|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 106 millis, based on 30.458/App, because ackElicitingInFlight | RTT:33/16 30.351 -> Packet PA|4|S0|abd8753279c0aad2|47|1 StreamFrame[0(CIB),0,17,fin] 30.370 -> Packet A|5|S0|abd8753279c0aad2|36|1 AckFrame[10,8,2|Δ19] 30.381 <- (7) Packet A|12|S0|0d5ea404b526e8c2|55|2 AckFrame[3|Δ0] Padding(24) 30.382 Cwnd(-): 6000; inflight: 47 30.382 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 76 millis, based on 30.458/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 94 millis, based on 30.477/App, because ackElicitingInFlight | RTT:33/13 30.382 -> Packet A|6|S0|abd8753279c0aad2|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[10,8,2|Δ0] 30.402 <- (8) Packet A|13|S0|0d5ea404b526e8c2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 30.402 Finished downloading https://server4:443/daqljtiuqb at 54:35.721 on ClientConnection[a43a2fe941d782c2/0d5ea404b526e8c2(V1) with server4/193.167.100.100:443] 30.403 Closing ClientConnection[a43a2fe941d782c2/0d5ea404b526e8c2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.403 -> Packet A|7|S0|abd8753279c0aad2|41|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,10,8,2|Δ0] 30.403 Creating connection with server4:443 with v1 30.404 Setting up connection for downloading https://server4:443/jqekcsoldx at 54:35.723 on ClientConnection[1424604b1578b89b/fcc0cad89d8f394b(V1) with server4/193.167.100.100:443] 30.404 Original destination connection id: 1424604b1578b89b (scid: fcc0cad89d8f394b) >- CryptoStream[I|ClientHello] 30.406 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.606/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.405 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.412 <- (9) Packet A|15|S0|0d5ea404b526e8c2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 30.412 -> Packet A|8|S0|abd8753279c0aad2|41|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,10,8,2|Δ0] 30.414 <- (10) Packet A|16|S0|0d5ea404b526e8c2|55|2 AckFrame[6-5,3|Δ1] Padding(20) 30.414 -> Packet A|9|S0|abd8753279c0aad2|41|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,10,8,2|Δ0] 30.422 <- (11) Packet A|17|S0|0d5ea404b526e8c2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(24) 30.432 <- (12) Packet A|18|S0|0d5ea404b526e8c2|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(24) 30.432 -> Packet A|10|S0|abd8753279c0aad2|41|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,10,8,2|Δ0] 30.434 <- (13) Packet A|19|S0|0d5ea404b526e8c2|31|1 ConnectionCloseFrame[0|0|] 30.439 <- (1) Packet I|119669|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 30.439 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.639/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 30.439 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 30.442 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.539/Handshake, because peerAwaitingAddressValidation | RTT:33/16 30.441 -> Packet I|1|L|1201|2 Token=[] AckFrame[119669|Δ0] Padding(1150) >- CryptoStream[H|Finished] 30.444 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.541/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.444 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.439 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 30.444 Starting downloading https://server4:443/jqekcsoldx at 54:35.763 on ClientConnection[1424604b1578b89b/fcc0cad89d8f394b(V1) with server4/193.167.100.100:443] 30.444 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.541/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.444 Discarding pn space Initial because first Handshake message is being sent 30.439 <- (2) Packet A|0|S0|fcc0cad89d8f394b|311|4 CryptoFrame[0,133] NewTokenFrame[9778552a83c37cfbc11acdecbc3b4c654f6ffa0015266b58582bfd7b6b0ea0872fd956806ab1e415a42b790bbf480d70374b] NewConnectionIdFrame[1,<0|26ffb92e68c15d23|d8086a317eb338184350b8d604891bf2] Padding(68) -< CryptoStream[A|NewSessionTicket] 30.445 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.542/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.445 -> [Packet H|1|L|46|1 AckFrame[1-0|Δ0], Packet A|0|S0|edf13674bb319462|47|1 StreamFrame[0(CIB),0,17,fin]] 30.464 -> Packet A|1|S0|edf13674bb319462|32|1 AckFrame[0|Δ19] 30.475 <- (3) Packet A|2|S0|fcc0cad89d8f394b|55|2 HandshakeDoneFrame[] Padding(28) 30.475 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 30.541/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 30.552/App, because ackElicitingInFlight | RTT:33/16 30.475 Discarding pn space Handshake because HandshakeDone is received 30.476 <- (4) Packet A|3|S0|fcc0cad89d8f394b|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 30.477 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 30.477 -> Packet A|2|S0|edf13674bb319462|34|1 AckFrame[3-2,0|Δ1] 30.477 Finished downloading https://server4:443/jqekcsoldx at 54:35.796 on ClientConnection[1424604b1578b89b/fcc0cad89d8f394b(V1) with server4/193.167.100.100:443] 30.477 Closing ClientConnection[1424604b1578b89b/fcc0cad89d8f394b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.478 Creating connection with server4:443 with v1 30.478 -> Packet A|3|S0|edf13674bb319462|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 30.479 Setting up connection for downloading https://server4:443/chizoebqms at 54:35.797 on ClientConnection[1a97211a38c9b258/6b7e4bc6d30fb4cd(V1) with server4/193.167.100.100:443] 30.479 Original destination connection id: 1a97211a38c9b258 (scid: 6b7e4bc6d30fb4cd) >- CryptoStream[I|ClientHello] 30.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.680/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.480 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.486 <- (5) Packet A|4|S0|fcc0cad89d8f394b|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 30.487 -> Packet A|4|S0|edf13674bb319462|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 30.497 <- (6) Packet A|5|S0|fcc0cad89d8f394b|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 30.497 -> Packet A|5|S0|edf13674bb319462|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 30.507 <- (7) Packet A|6|S0|fcc0cad89d8f394b|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 30.509 <- (8) Packet A|7|S0|fcc0cad89d8f394b|1400|2 PingFrame[] Padding(1373) 30.509 -> Packet A|6|S0|edf13674bb319462|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 30.514 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 30.679 loss detection timeout handler running Sending probe 0, because no ack since 30.480. Current RTT: 100/25. 30.679 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.679 (Probe is an initial retransmit) 30.680 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.080/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.680 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.963 <- (2) Packet I|73715|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ250] Padding(2) -< CryptoStream[I|ServerHello] 30.966 probe count not reset on ack because handshake not yet confirmed 30.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 31.366/Handshake, because peerAwaitingAddressValidation | RTT:100/25 30.963 <- (2) Packet H|3|L|1069|2 PingFrame[] Padding(1023) 30.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1693 millis, based on 32.660/Handshake, because peerAwaitingAddressValidation | RTT:283/141 reschedule loss detection timer for PTO over 846 millis, based on 31.813/Handshake, because peerAwaitingAddressValidation | RTT:283/141 30.966 Discarding pn space Initial because first Handshake message is being sent 30.966 -> Packet I|2|L|1201|2 Token=[] AckFrame[73715|Δ0] Padding(1150) 30.966 -> Packet H|0|L|46|1 AckFrame[3|Δ0] 31.114 <- (3) Packet H|7|L|823|3 CryptoFrame[0,701] AckFrame[0|Δ115] Padding(67) >- CryptoStream[H|Finished] 31.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 846 millis, based on 31.964/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:283/141 31.117 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 846 millis, based on 31.964/Handshake, because ackElicitingInFlight | RTT:283/141 31.118 Starting downloading https://server4:443/chizoebqms at 54:36.436 on ClientConnection[1a97211a38c9b258/6b7e4bc6d30fb4cd(V1) with server4/193.167.100.100:443] 31.118 -> Packet H|2|L|46|1 AckFrame[7|Δ0] 31.118 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 845 millis, based on 31.964/Handshake, because ackElicitingInFlight | RTT:283/141 31.118 -> Packet A|0|S0|3305f9f8eb24dc0a|47|1 StreamFrame[0(CIB),0,17,fin] 31.148 <- (4) Packet A|2|S0|6b7e4bc6d30fb4cd|311|4 CryptoFrame[0,133] NewTokenFrame[934cf2682d3a28cb8a0ab342e6ca54794d56118b81959d64a3915756147e8069588882960a4db8408da082ee41958fafcca5] NewConnectionIdFrame[1,<0|9e2907fc0fc61d29|f9664a992bcd4972f2ba5d64066fbd79] Padding(68) -< CryptoStream[A|NewSessionTicket] 31.152 <- (5) Packet A|5|S0|6b7e4bc6d30fb4cd|55|2 AckFrame[0|Δ3] Padding(23) reschedule loss detection timer for PTO over 811 millis, based on 31.964/Handshake, because ackElicitingInFlight | RTT:283/141 31.169 -> Packet A|1|S0|3305f9f8eb24dc0a|34|1 AckFrame[5,2|Δ19] 31.963 loss detection timeout handler running Sending probe 0, because no ack since 31.117. Current RTT: 252/168. 31.963 (Probe is a handshake retransmit) reschedule loss detection timer for PTO over 1847 millis, based on 33.812/Handshake, because ackElicitingInFlight | RTT:252/168 31.964 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 32.189 <- (6) Packet A|10|S0|6b7e4bc6d30fb4cd|55|3 HandshakeDoneFrame[] AckFrame[0|Δ1040] Padding(20) 32.189 State is set to Confirmed reschedule loss detection timer for PTO over 1622 millis, based on 33.812/Handshake, because ackElicitingInFlight | RTT:252/168 32.190 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 32.190 Discarding pn space Handshake because HandshakeDone is received 32.190 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 32.209 -> Packet A|2|S0|3305f9f8eb24dc0a|36|1 AckFrame[10,5,2|Δ19] 32.241 <- (7) Packet A|11|S0|6b7e4bc6d30fb4cd|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 32.242 Finished downloading https://server4:443/chizoebqms at 54:37.561 on ClientConnection[1a97211a38c9b258/6b7e4bc6d30fb4cd(V1) with server4/193.167.100.100:443] 32.242 Closing ClientConnection[1a97211a38c9b258/6b7e4bc6d30fb4cd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.243 -> Packet A|3|S0|3305f9f8eb24dc0a|39|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,5,2|Δ0] 32.243 Creating connection with server4:443 with v1 32.243 Setting up connection for downloading https://server4:443/xdauvbchsu at 54:37.562 on ClientConnection[aa0463487a75db1f/f734a3726871683f(V1) with server4/193.167.100.100:443] 32.243 Original destination connection id: aa0463487a75db1f (scid: f734a3726871683f) >- CryptoStream[I|ClientHello] 32.245 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.445/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.245 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.251 <- (8) Packet A|13|S0|6b7e4bc6d30fb4cd|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 32.252 -> Packet A|4|S0|3305f9f8eb24dc0a|39|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,5,2|Δ0] 32.261 <- (9) Packet A|14|S0|6b7e4bc6d30fb4cd|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 32.262 -> Packet A|5|S0|3305f9f8eb24dc0a|39|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,5,2|Δ0] 32.271 <- (10) Packet A|15|S0|6b7e4bc6d30fb4cd|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 32.273 <- (11) Packet A|16|S0|6b7e4bc6d30fb4cd|31|1 ConnectionCloseFrame[0|0|] 32.278 <- (1) Packet I|81153|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 32.278 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.478/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 32.278 <- (1) Packet H|0|L|751|1 CryptoFrame[0,702] 32.281 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 32.378/Handshake, because peerAwaitingAddressValidation | RTT:33/16 32.280 -> Packet I|1|L|1201|2 Token=[] AckFrame[81153|Δ0] Padding(1150) >- CryptoStream[H|Finished] 32.283 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 32.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 32.283 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.278 <- (1) Packet H|1|L|322|2 PingFrame[] Padding(276) 32.283 Starting downloading https://server4:443/xdauvbchsu at 54:37.602 on ClientConnection[aa0463487a75db1f/f734a3726871683f(V1) with server4/193.167.100.100:443] 32.283 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 32.283 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 32.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 32.283 Discarding pn space Initial because first Handshake message is being sent 32.283 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 32.284 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 32.381/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 32.283 -> Packet A|0|S0|058dd5f01f016719|47|1 StreamFrame[0(CIB),0,17,fin] 32.314 <- (2) Packet A|2|S0|f734a3726871683f|55|2 HandshakeDoneFrame[] Padding(28) 32.314 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 32.380/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 76 millis, based on 32.390/App, because ackElicitingInFlight | RTT:33/16 32.314 Discarding pn space Handshake because HandshakeDone is received 32.315 <- (3) Packet A|3|S0|f734a3726871683f|1079|3 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] Padding(20) 32.315 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 32.316 -> Packet A|1|S0|058dd5f01f016719|32|1 AckFrame[3-2|Δ1] 32.316 Finished downloading https://server4:443/xdauvbchsu at 54:37.634 on ClientConnection[aa0463487a75db1f/f734a3726871683f(V1) with server4/193.167.100.100:443] 32.316 Closing ClientConnection[aa0463487a75db1f/f734a3726871683f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.316 -> Packet A|2|S0|058dd5f01f016719|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 32.317 Creating connection with server4:443 with v1 32.317 Setting up connection for downloading https://server4:443/sfweypqkdl at 54:37.636 on ClientConnection[ce69fe9fb2b52363/9edf8de563a2bbec(V1) with server4/193.167.100.100:443] 32.317 Original destination connection id: ce69fe9fb2b52363 (scid: 9edf8de563a2bbec) >- CryptoStream[I|ClientHello] 32.318 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.518/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.318 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.347 <- (4) Packet A|5|S0|f734a3726871683f|311|4 CryptoFrame[0,133] NewTokenFrame[a79e086201392d3b9a6b4bea96833f2dc67fd3021f5d5c9e9304084a8e6d5b9330afba7c305cb40683d9bff6231f7436f1ce] NewConnectionIdFrame[1,<0|4b6829e4e081120e|1377a3035cbdb5e3150aac11903e9df3] Padding(68) 32.347 -> Packet A|3|S0|058dd5f01f016719|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 32.348 <- (5) Packet A|6|S0|f734a3726871683f|1400|2 PingFrame[] Padding(1373) 32.348 <- (6) Packet A|7|S0|f734a3726871683f|30|1 ConnectionCloseFrame[0|0|] 32.348 -> Packet A|4|S0|058dd5f01f016719|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 32.351 <- (1) Packet I|76827|L|179|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 32.352 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.552/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 32.351 <- (1) Packet H|0|L|750|1 CryptoFrame[0,701] 32.354 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 32.451/Handshake, because peerAwaitingAddressValidation | RTT:33/16 32.354 -> Packet I|1|L|1201|2 Token=[] AckFrame[76827|Δ0] Padding(1150) >- CryptoStream[H|Finished] 32.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 32.453/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 32.356 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.357 Starting downloading https://server4:443/sfweypqkdl at 54:37.675 on ClientConnection[ce69fe9fb2b52363/9edf8de563a2bbec(V1) with server4/193.167.100.100:443] 32.351 <- (1) Packet H|1|L|323|2 PingFrame[] Padding(277) 32.357 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 32.357 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 32.454/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 32.357 Discarding pn space Initial because first Handshake message is being sent 32.357 -> Packet H|2|L|46|1 AckFrame[1-0|Δ0] 32.352 <- (2) Packet A|0|S0|9edf8de563a2bbec|311|4 CryptoFrame[0,133] NewTokenFrame[ecb9c1ae5c15884b5ff8cac23ee72f063c4d53aa4ee65e98d17b432cac6043f6fca5b8a5ccf72588b1a57667ae87cfc83925] NewConnectionIdFrame[1,<0|5de77b55701bdfa3|6cb8a60ee6533ee4971570f47f0f55a6] Padding(68) 32.357 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 32.454/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket] 32.357 -> Packet A|0|S0|20bedbf55b5157c3|47|1 StreamFrame[0(CIB),0,17,fin] 32.377 -> Packet A|1|S0|20bedbf55b5157c3|32|1 AckFrame[0|Δ19] 32.453 loss detection timeout handler running Sending probe 0, because no ack since 32.356. Current RTT: 33/16. 32.453 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.453 (Probe is a handshake retransmit) 32.454 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 32.648/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 32.454 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 32.647 loss detection timeout handler running Sending probe 1, because no ack since 32.357. Current RTT: 33/16. 32.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.647 (Probe is a handshake retransmit) 32.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 33.035/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 32.647 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 32.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 33.036/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 32.648 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 32.858 <- (3) Packet A|6|S0|9edf8de563a2bbec|55|3 HandshakeDoneFrame[] AckFrame[1|Δ450] Padding(20) 32.859 State is set to Confirmed reschedule loss detection timer for PTO over -73 millis, based on 32.785/App, because ackElicitingInFlight | RTT:33/16 32.859 loss detection timeout handler running Sending probe 2, because no ack since 32.357. Current RTT: 33/16. reschedule loss detection timer for PTO over -287 millis, based on 32.571/App, because ackElicitingInFlight | RTT:33/16 32.859 Discarding pn space Handshake because HandshakeDone is received 32.859 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 106 millis, based on 32.966/App, because ackElicitingInFlight | RTT:33/16 32.859 -> Packet PA|2|S0|20bedbf55b5157c3|47|1 StreamFrame[0(CIB),0,17,fin] 32.859 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 32.859 Cwnd(-): 6000; inflight: 47 reschedule loss detection timer for PTO over 106 millis, based on 32.966/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 106 millis, based on 32.966/App, because ackElicitingInFlight | RTT:33/16 32.859 -> Packet A|3|S0|20bedbf55b5157c3|47|1 StreamFrame[0(CIB),0,17,fin] 32.879 -> Packet A|4|S0|20bedbf55b5157c3|32|1 AckFrame[6|Δ19] 32.890 <- (4) Packet A|8|S0|9edf8de563a2bbec|55|2 AckFrame[3-1|Δ0] Padding(24) 32.891 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.389 <- (5) Packet A|10|S0|9edf8de563a2bbec|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 33.390 Finished downloading https://server4:443/sfweypqkdl at 54:38.708 on ClientConnection[ce69fe9fb2b52363/9edf8de563a2bbec(V1) with server4/193.167.100.100:443] 33.390 Closing ClientConnection[ce69fe9fb2b52363/9edf8de563a2bbec(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.390 -> Packet A|5|S0|20bedbf55b5157c3|39|2 ConnectionCloseFrame[0|0|] AckFrame[10,8,6|Δ0] 33.391 Creating connection with server4:443 with v1 33.391 Setting up connection for downloading https://server4:443/spqfjwbdpz at 54:38.710 on ClientConnection[8631745ca0a9e9e2/640ebcf62a82b9ca(V1) with server4/193.167.100.100:443] 33.391 Original destination connection id: 8631745ca0a9e9e2 (scid: 640ebcf62a82b9ca) >- CryptoStream[I|ClientHello] 33.393 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.593/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.392 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.426 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 33.592 loss detection timeout handler running Sending probe 0, because no ack since 33.392. Current RTT: 100/25. 33.592 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 33.592 (Probe is an initial retransmit) 33.592 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 33.992/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.592 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.625 <- (2) Packet I|90869|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[1-0|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 33.628 probe count not reset on ack because handshake not yet confirmed 33.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 34.028/Handshake, because peerAwaitingAddressValidation | RTT:100/25 33.625 <- (2) Packet H|2|L|1069|2 PingFrame[] Padding(1023) 33.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 33.820/Handshake, because peerAwaitingAddressValidation | RTT:32/16 reschedule loss detection timer for PTO over 95 millis, based on 33.724/Handshake, because peerAwaitingAddressValidation | RTT:32/16 33.628 Discarding pn space Initial because first Handshake message is being sent 33.628 -> Packet I|2|L|1201|2 Token=[] AckFrame[90869|Δ0] Padding(1150) 33.628 -> Packet H|0|L|46|1 AckFrame[2|Δ0] 33.723 loss detection timeout handler running 33.723 Sending probe 0. Current RTT: 32/16. 33.723 Sending probe because peer awaiting address validation 33.723 (Probe is a handshake ping) 33.724 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 33.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 33.724 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 33.915 loss detection timeout handler running Sending probe 1, because no ack since 33.724. Current RTT: 32/16. 33.915 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.915 (Probe is a handshake ping) 33.915 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 34.299/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 33.915 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 33.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 34.300/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 33.916 -> Packet PH|3|L|44|2 PingFrame[] Padding(2) 33.947 <- (3) Packet H|6|L|55|2 AckFrame[3,0|Δ0] Padding(3) 33.948 probe count not reset on ack because handshake not yet confirmed 33.948 Cwnd(-): 6000; inflight: 44 33.951 loss detection timeout handler running 33.951 loss detection timeout handler running 33.951 loss detection timeout handler running 33.951 loss detection timeout handler running 33.951 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 34.352 <- (4) Packet H|8|L|823|3 CryptoFrame[0,702] AckFrame[3|Δ403] Padding(64) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 335 millis, based on 34.690/Handshake, because ackElicitingInFlight | RTT:32/13 34.354 -> Packet H|4|L|85|2 CryptoFrame[0,36] AckFrame[6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 34.355 Starting downloading https://server4:443/spqfjwbdpz at 54:39.673 on ClientConnection[8631745ca0a9e9e2/640ebcf62a82b9ca(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 83 millis, based on 34.438/Handshake, because ackElicitingInFlight | RTT:32/13 34.355 -> Packet H|5|L|48|1 AckFrame[8,6|Δ0] 34.355 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 82 millis, based on 34.438/Handshake, because ackElicitingInFlight | RTT:32/13 34.355 -> Packet A|0|S0|56ca3beb92cab300|47|1 StreamFrame[0(CIB),0,17,fin] 34.386 <- (5) Packet A|2|S0|640ebcf62a82b9ca|311|4 CryptoFrame[0,133] NewTokenFrame[8cad18c477f39cdd15c9359c42127b1bf4d2ed9a4d0ae9728f08de75326ddbebd1457c35853350f77ca23784ab2ecd55d747] NewConnectionIdFrame[1,<0|5f9e2255f0d2751d|bad294a4c484f3722af731579e04dd1d] Padding(68) -< CryptoStream[A|NewSessionTicket] 34.386 <- (6) Packet A|3|S0|640ebcf62a82b9ca|55|2 HandshakeDoneFrame[] Padding(28) 34.386 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 34.438/Handshake, because ackElicitingInFlight | RTT:32/13 reschedule loss detection timer for PTO over 62 millis, based on 34.449/App, because ackElicitingInFlight | RTT:32/13 34.387 Discarding pn space Handshake because HandshakeDone is received 34.387 -> Packet A|1|S0|56ca3beb92cab300|31|1 AckFrame[3-2|Δ0] 34.389 <- (7) Packet A|5|S0|640ebcf62a82b9ca|55|2 AckFrame[0|Δ3] Padding(23) 34.389 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 35.277 <- (8) Packet A|7|S0|640ebcf62a82b9ca|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) 35.278 Finished downloading https://server4:443/spqfjwbdpz at 54:40.596 on ClientConnection[8631745ca0a9e9e2/640ebcf62a82b9ca(V1) with server4/193.167.100.100:443] 35.278 Closing ClientConnection[8631745ca0a9e9e2/640ebcf62a82b9ca(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 35.278 -> Packet A|2|S0|56ca3beb92cab300|39|2 ConnectionCloseFrame[0|0|] AckFrame[7,5,3-2|Δ0] 35.278 Creating connection with server4:443 with v1 35.279 Setting up connection for downloading https://server4:443/fpupdcqanm at 54:40.598 on ClientConnection[5b369bf02000e8f2/5760323ce091d198(V1) with server4/193.167.100.100:443] 35.279 Original destination connection id: 5b369bf02000e8f2 (scid: 5760323ce091d198) >- CryptoStream[I|ClientHello] 35.281 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.481/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.281 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.480 loss detection timeout handler running Sending probe 0, because no ack since 35.281. Current RTT: 100/25. 35.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 35.480 (Probe is an initial retransmit) 35.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 35.881/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.480 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.880 loss detection timeout handler running Sending probe 1, because no ack since 35.480. Current RTT: 100/25. 35.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 35.880 (Probe is an initial retransmit) 35.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 36.680/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.880 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.881 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 36.681/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.881 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.913 <- (1) Packet I|72482|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[2-0|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 35.916 probe count not reset on ack because handshake not yet confirmed 35.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 36.717/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.913 <- (1) Packet H|4|L|1069|2 PingFrame[] Padding(1023) 35.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 36.305/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 35.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 36.014/Handshake, because peerAwaitingAddressValidation | RTT:33/16 35.917 Discarding pn space Initial because first Handshake message is being sent 35.917 -> Packet I|4|L|1201|2 Token=[] AckFrame[72482|Δ0] Padding(1150) 35.917 -> Packet H|0|L|46|1 AckFrame[4|Δ0] 35.950 <- (2) Packet H|7|L|55|3 PingFrame[] AckFrame[0|Δ0] Padding(4) 35.950 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 35.950 <- (2) Packet H|8|L|55|3 PingFrame[] AckFrame[0|Δ0] Padding(4) 35.950 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 35.950 -> Packet H|1|L|46|1 AckFrame[7|Δ0] 35.950 -> Packet H|2|L|46|1 AckFrame[8-7|Δ0] 35.982 <- (3) Packet H|9|L|823|3 CryptoFrame[0,701] AckFrame[2,0|Δ0] Padding(66) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 96 millis, based on 36.082/Handshake, because ackElicitingInFlight | RTT:33/16 35.985 -> Packet H|3|L|85|2 CryptoFrame[0,36] AckFrame[8-7|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.985 Starting downloading https://server4:443/fpupdcqanm at 54:41.304 on ClientConnection[5b369bf02000e8f2/5760323ce091d198(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 36.082/Handshake, because ackElicitingInFlight | RTT:33/16 35.985 -> Packet H|4|L|46|1 AckFrame[9|Δ0] 35.986 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 95 millis, based on 36.082/Handshake, because ackElicitingInFlight | RTT:33/16 35.986 -> Packet A|0|S0|40acd88c2afb3d0f|47|1 StreamFrame[0(CIB),0,17,fin] 36.016 <- (4) Packet A|2|S0|5760323ce091d198|311|4 CryptoFrame[0,133] NewTokenFrame[dfc4ad29c18c56416677b020b093c345ef86900d4c6cbcff47c34d40727b3ed9b43a6e9937922eb6f0aced791a0be35630f3] NewConnectionIdFrame[1,<0|b289290e60c7dae5|8b313f2ac13a482b0acb1ab209ac3b21] Padding(68) -< CryptoStream[A|NewSessionTicket] 36.036 -> Packet A|1|S0|40acd88c2afb3d0f|32|1 AckFrame[2|Δ19] 36.081 loss detection timeout handler running Sending probe 0, because no ack since 35.985. Current RTT: 33/16. 36.081 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 36.081 (Probe is a handshake retransmit) 36.081 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 193 millis, based on 36.275/Handshake, because ackElicitingInFlight | RTT:33/16 36.081 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 36.210 <- (5) Packet A|6|S0|5760323ce091d198|311|5 CryptoFrame[0,133] NewTokenFrame[dfc4ad29c18c56416677b020b093c345ef86900d4c6cbcff47c34d40727b3ed9b43a6e9937922eb6f0aced791a0be35630f3] NewConnectionIdFrame[1,<0|b289290e60c7dae5|8b313f2ac13a482b0acb1ab209ac3b21] AckFrame[0|Δ193] Padding(60) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over -32 millis, based on 36.178/Handshake, because ackElicitingInFlight | RTT:33/16 36.211 loss detection timeout handler running Sending probe 0, because no ack since 35.986. Current RTT: 56/57. 36.211 (Probe is a handshake retransmit) 36.211 <- (6) Packet A|7|S0|5760323ce091d198|1079|2 StreamFrame[0(CIB),0,1024,fin] Padding(25) reschedule loss detection timer for PTO over 567 millis, based on 36.779/Handshake, because ackElicitingInFlight | RTT:56/57 36.211 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 36.211 -> Packet A|2|S0|40acd88c2afb3d0f|33|1 AckFrame[7-6,2|Δ0] 36.211 Finished downloading https://server4:443/fpupdcqanm at 54:41.530 on ClientConnection[5b369bf02000e8f2/5760323ce091d198(V1) with server4/193.167.100.100:443] 36.211 Closing ClientConnection[5b369bf02000e8f2/5760323ce091d198(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 36.212 -> Packet A|3|S0|40acd88c2afb3d0f|37|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,2|Δ0] 36.212 Creating connection with server4:443 with v1 36.213 Setting up connection for downloading https://server4:443/etatkbcaxs at 54:41.531 on ClientConnection[596a654a2fa74d44/66c64cdb559fc923(V1) with server4/193.167.100.100:443] 36.213 Original destination connection id: 596a654a2fa74d44 (scid: 66c64cdb559fc923) >- CryptoStream[I|ClientHello] 36.214 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.414/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.214 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.413 loss detection timeout handler running Sending probe 0, because no ack since 36.214. Current RTT: 100/25. 36.413 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 36.413 (Probe is an initial retransmit) 36.414 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 36.814/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.414 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.448 Discarding packet (311 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 36.813 loss detection timeout handler running Sending probe 1, because no ack since 36.414. Current RTT: 100/25. 36.813 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 36.813 (Probe is an initial retransmit) 36.813 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 37.613/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.813 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.814 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 37.614/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.814 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.847 <- (2) Packet I|88685|L|183|3 Token=[] CryptoFrame[0,123] AckFrame[3-1|Δ0] Padding(5) -< CryptoStream[I|ServerHello] 36.850 probe count not reset on ack because handshake not yet confirmed 36.850 Retransmitting CryptoFrame[0,257] on level Initial 36.850 Cwnd(-): 6000; inflight: 0 36.850 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 37.650/Handshake, because peerAwaitingAddressValidation | RTT:100/25 36.851 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 37.239/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 36.850 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.847 <- (2) Packet H|3|L|1069|2 PingFrame[] Padding(1023) 36.851 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 36.851 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 36.948/Handshake, because peerAwaitingAddressValidation | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 36.948/Handshake, because peerAwaitingAddressValidation | RTT:33/16 36.851 Discarding pn space Initial because first Handshake message is being sent 36.851 -> Packet I|5|L|1201|2 Token=[] AckFrame[88685|Δ0] Padding(1150) 36.851 -> Packet H|0|L|46|1 AckFrame[3|Δ0] 36.884 Discarding packet (1252 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 36.913 <- (4) Packet H|6|L|823|3 CryptoFrame[0,701] AckFrame[0|Δ29] Padding(67) >- CryptoStream[H|Finished] 36.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 37.014/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 36.917 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 36.917 Starting downloading https://server4:443/etatkbcaxs at 54:42.236 on ClientConnection[596a654a2fa74d44/66c64cdb559fc923(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 37.014/Handshake, because ackElicitingInFlight | RTT:33/16 36.918 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 95 millis, based on 37.014/Handshake, because ackElicitingInFlight | RTT:33/16 36.918 -> [Packet H|2|L|46|1 AckFrame[6|Δ0], Packet A|0|S0|f1f274cdac83a08e|47|1 StreamFrame[0(CIB),0,17,fin]] 36.949 <- (5) Packet H|7|L|55|3 PingFrame[] AckFrame[2,0|Δ0] Padding(2) 36.949 <- (6) Packet H|8|L|55|3 PingFrame[] AckFrame[2,0|Δ0] Padding(1) 36.950 -> Packet H|3|L|46|1 AckFrame[7|Δ0] 36.950 -> Packet H|4|L|46|1 AckFrame[8-7|Δ0] 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.953 loss detection timeout handler running 36.954 loss detection timeout handler running 36.954 loss detection timeout handler running 36.954 loss detection timeout handler running 36.954 Retransmitting CryptoFrame[0,36] on level Handshake 36.954 Cwnd(-): 3000; inflight: 47 36.954 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 36.954 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 36.954 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 96 millis, based on 37.051/Handshake, because ackElicitingInFlight | RTT:33/16 36.954 -> Packet H|5|L|85|2 CryptoFrame[0,36] AckFrame[8-7|Δ0] 36.985 <- (7) Packet A|2|S0|66c64cdb559fc923|311|5 CryptoFrame[0,133] NewTokenFrame[9f8e1a5a3b63c1b78308f19cc59c11733b58cdd2525f5c01aa09d4673f7141625d294a96fbdfe4d18e8f5b32fcea34af5ad6] NewConnectionIdFrame[1,<0|79cecb52e65a5753|7be98eb84a2b274b4f40f7b3e7398497] AckFrame[0|Δ36] Padding(62) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 64 millis, based on 37.051/Handshake, because ackElicitingInFlight | RTT:33/16 36.986 <- (8) Packet A|3|S0|66c64cdb559fc923|1079|3 HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] Padding(24) 36.986 State is set to Confirmed reschedule loss detection timer for PTO over 75 millis, based on 37.062/Handshake, because ackElicitingInFlight | RTT:36/18 36.986 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 36.986 Discarding pn space Handshake because HandshakeDone is received 36.987 -> Packet A|1|S0|f1f274cdac83a08e|31|1 AckFrame[3-2|Δ0] 36.987 Finished downloading https://server4:443/etatkbcaxs at 54:42.305 on ClientConnection[596a654a2fa74d44/66c64cdb559fc923(V1) with server4/193.167.100.100:443] 36.987 Closing ClientConnection[596a654a2fa74d44/66c64cdb559fc923(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 36.987 -> Packet A|2|S0|f1f274cdac83a08e|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0]