2aecc66fd5f59d68: No root crt list specified -- certificate will not be verified. 2aecc66fd5f59d68: Sending ALPN list (1): hq-interop 2aecc66fd5f59d68: Sending transport parameter TLS extension (85 bytes): 2aecc66fd5f59d68: Extension list (85 bytes): 2aecc66fd5f59d68: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 2aecc66fd5f59d68: Extension type: 4 (initial_max_data), length 4, 80100000 2aecc66fd5f59d68: Extension type: 8 (max_streams_bidi), length 2, 4200 2aecc66fd5f59d68: Extension type: 1 (idle_timeout), length 4, 8002bf20 2aecc66fd5f59d68: Extension type: 3 (max_packet_size), length 2, 45a0 2aecc66fd5f59d68: Extension type: 9 (max_streams_uni), length 2, 4200 2aecc66fd5f59d68: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 2aecc66fd5f59d68: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 2aecc66fd5f59d68: Extension type: 14 (active_connection_id_limit), length 1, 08 2aecc66fd5f59d68: Extension type: 11 (max_ack_delay), length 1, 0a 2aecc66fd5f59d68: Extension type: 15 (hcid), length 8, f2ae74fda20472c5 2aecc66fd5f59d68: Extension type: 1360 (unknown), length 4, 8000ecc6 2aecc66fd5f59d68: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 2aecc66fd5f59d68: Extension type: 29016 (enable_time_stamp), length 1, 03 2aecc66fd5f59d68: Extension type: 10930 (grease_quic_bit), length 0 2aecc66fd5f59d68: Preparing GET on stream 0 for /intense-warm-samurai 2aecc66fd5f59d68: Sending packet type: 2 (initial), S0, Q1, Version 1, 2aecc66fd5f59d68: <2aecc66fd5f59d68>, , Seq: 129353, pl: 469 2aecc66fd5f59d68: Token length: 50, Token: e4b27f3211d3e3de45ab3ffe33f7a8fb... 2aecc66fd5f59d68: Prepared 449 bytes 2aecc66fd5f59d68: ping, 1 bytes 2aecc66fd5f59d68: crypto_hs, offset 0, length 444: 010001b80303f417... 2aecc66fd5f59d68: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 2aecc66fd5f59d68: <2aecc66fd5f59d68>, , Seq: 0, pl: 682 2aecc66fd5f59d68: Prepared 662 bytes 2aecc66fd5f59d68: stream 0, offset 0, length 27, fin = 1: 474554202f696e74... 2aecc66fd5f59d68: padding, 632 bytes 2aecc66fd5f59d68: Sending 1252 bytes to 193.167.100.100:443 at T=0.001807 (24c48c0e) 2aecc66fd5f59d68: T= 0.252108, Lost packet type 2, number 129353, size 529, DCID <>, reason: timer 2aecc66fd5f59d68: Sending packet type: 2 (initial), S0, Q1, Version 1, 2aecc66fd5f59d68: <2aecc66fd5f59d68>, , Seq: 129354, pl: 469 2aecc66fd5f59d68: Token length: 50, Token: e4b27f3211d3e3de45ab3ffe33f7a8fb... 2aecc66fd5f59d68: Prepared 449 bytes 2aecc66fd5f59d68: ping, 1 bytes 2aecc66fd5f59d68: crypto_hs, offset 0, length 444: 010001b80303f417... 2aecc66fd5f59d68: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 2aecc66fd5f59d68: <2aecc66fd5f59d68>, , Seq: 1, pl: 682 2aecc66fd5f59d68: Prepared 662 bytes 2aecc66fd5f59d68: padding, 662 bytes 2aecc66fd5f59d68: Sending 1252 bytes to 193.167.100.100:443 at T=0.252108 (24c85dcb) 2aecc66fd5f59d68: Receiving 1252 bytes from 193.167.100.100:443 at T=0.285446 (24c8e005) 2aecc66fd5f59d68: Receiving packet type: 2 (initial), S0, Q0, Version 1, 2aecc66fd5f59d68: , , Seq: 112455, pl: 165 2aecc66fd5f59d68: Token length: 0 2aecc66fd5f59d68: Decrypted 145 bytes 2aecc66fd5f59d68: ack_ecn (nb=0), 129354, ect0=0, ect1=1, ce=0 2aecc66fd5f59d68: crypto_hs, offset 0, length 129: 0200007d03033283... 2aecc66fd5f59d68: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 2aecc66fd5f59d68: , , Seq: 0, pl: 201 2aecc66fd5f59d68: Decrypted 181 bytes 2aecc66fd5f59d68: crypto_hs, offset 0, length 177: 0800008900870000... 2aecc66fd5f59d68: Received transport parameter TLS extension (106 bytes): 2aecc66fd5f59d68: Extension list (106 bytes): 2aecc66fd5f59d68: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 2aecc66fd5f59d68: Extension type: 4 (initial_max_data), length 4, 80100000 2aecc66fd5f59d68: Extension type: 8 (max_streams_bidi), length 2, 4200 2aecc66fd5f59d68: Extension type: 1 (idle_timeout), length 4, 8002bf20 2aecc66fd5f59d68: Extension type: 3 (max_packet_size), length 2, 45a0 2aecc66fd5f59d68: Extension type: 9 (max_streams_uni), length 2, 4200 2aecc66fd5f59d68: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 2aecc66fd5f59d68: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 2aecc66fd5f59d68: Extension type: 14 (active_connection_id_limit), length 1, 08 2aecc66fd5f59d68: Extension type: 11 (max_ack_delay), length 1, 0a 2aecc66fd5f59d68: Extension type: 15 (hcid), length 8, aebbbdc9fa8beee2 2aecc66fd5f59d68: Extension type: 0 (ocid), length 8, 2aecc66fd5f59d68 2aecc66fd5f59d68: Extension type: 2 (stateless_reset_token), length 16, 9cd47c5c246c2c1006669d7727fa2d0e 2aecc66fd5f59d68: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 2aecc66fd5f59d68: Extension type: 29016 (enable_time_stamp), length 1, 03 2aecc66fd5f59d68: Extension type: 10930 (grease_quic_bit), length 0 2aecc66fd5f59d68: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 2aecc66fd5f59d68: , , Seq: 1, pl: 810 2aecc66fd5f59d68: Decrypted 790 bytes 2aecc66fd5f59d68: ping, 1 bytes 2aecc66fd5f59d68: padding, 789 bytes 2aecc66fd5f59d68: The session was properly resumed! 2aecc66fd5f59d68: Zero RTT data is accepted! 2aecc66fd5f59d68: Negotiated ALPN: hq-interop 2aecc66fd5f59d68: Receiving 439 bytes from 193.167.100.100:443 at T=0.285849 (24c8e198) 2aecc66fd5f59d68: Receiving packet type: 6 (1rtt protected), S0, Q1, 2aecc66fd5f59d68: , Seq: 0 (0), Phi: 0, 2aecc66fd5f59d68: Decrypted 413 bytes 2aecc66fd5f59d68: crypto_hs, offset 0, length 133: 04000081000186a0... 2aecc66fd5f59d68: new_token[50]: 0xb7ec43ed7d0eb7b64aa450a0a2bc65e1... 2aecc66fd5f59d68: new_connection_id[1]: 0x9187115a203f6ff7, 4d41beced01613e099a27dbf9fb4b914 2aecc66fd5f59d68: new_connection_id[2]: 0x18933c27c7ec9708, baf678251ddeb4efcaf2ff5e32825e6d 2aecc66fd5f59d68: new_connection_id[3]: 0xdb05454830bdad2c, f49c23a1701e43b7c43283f24431224e 2aecc66fd5f59d68: new_connection_id[4]: 0xaca9130cc93d09aa, d3f64c10427c5d11a317a278a58bdfcb 2aecc66fd5f59d68: new_connection_id[5]: 0xd8470a8c97a8c9a7, c51dcf46bf37b5226bc90a87e06b3ea2 2aecc66fd5f59d68: new_connection_id[6]: 0xd21cfc75e94ce00a, 3f92989d94c0b2b6b8dd1f4fab2cab2b 2aecc66fd5f59d68: new_connection_id[7]: 0x0225843c45d7a3f1, c2e7c7dd0a50d6f64014d2a20cadca61 2aecc66fd5f59d68: padding, 28 bytes 2aecc66fd5f59d68: T= 0.285849, cwin: 15889,flight: 1414,nb_ret: 1,rtt_min: 33338,rtt: 33338,rtt_var: 16669,max_ack_delay: 0,state: 10 2aecc66fd5f59d68: Sending packet type: 4 (handshake), S0, Q0, Version 1, 2aecc66fd5f59d68: , , Seq: 0, pl: 67 2aecc66fd5f59d68: Prepared 47 bytes 2aecc66fd5f59d68: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 2aecc66fd5f59d68: crypto_hs, offset 0, length 36: 14000020f1575242... 2aecc66fd5f59d68: T= 0.285934, Lost packet type 5, number 0, size 691, DCID , reason: timer 2aecc66fd5f59d68: Sending packet type: 6 (1rtt protected), S1, Q0, 2aecc66fd5f59d68: , Seq: 2 (2), Phi: 0, 2aecc66fd5f59d68: Prepared 285 bytes 2aecc66fd5f59d68: new_connection_id[1]: 0x0365a577e8c3c288, ed52c45f134863664b1503386d93ecf9 2aecc66fd5f59d68: new_connection_id[2]: 0x063c492ffe215995, 095ca212aef1cf42d108e54f5a57f01c 2aecc66fd5f59d68: new_connection_id[3]: 0xc23b203131e96094, cde5f018fee579b2f72b97c63764c669 2aecc66fd5f59d68: new_connection_id[4]: 0xbbe1850c4e388715, 9c399dd3d5b40a993bb1370c79a3fe0c 2aecc66fd5f59d68: new_connection_id[5]: 0x468c20ce0b3e726d, 6c90a204b527c46c97604c6ee268ab5a 2aecc66fd5f59d68: new_connection_id[6]: 0x965de2afb240d1a5, 58f0e535f0b263e1335248d8f17f6c4a 2aecc66fd5f59d68: new_connection_id[7]: 0x7c9e7190648ea105, 800acb0066790cc7c75d12df9b4c2729 2aecc66fd5f59d68: stream 0, offset 0, length 27, fin = 1: 474554202f696e74... 2aecc66fd5f59d68: padding, 59 bytes 2aecc66fd5f59d68: T= 0.285934, cwin: 15889,flight: 1110,nb_ret: 2,rtt_min: 33338,rtt: 33338,rtt_var: 16669,max_ack_delay: 0,state: 13 2aecc66fd5f59d68: Sending 403 bytes to 193.167.100.100:443 at T=0.285934 (24c8e1ed) 2aecc66fd5f59d68: Connection established. Version = 1, I-CID: 2aecc66fd5f59d68, verified: 1 2aecc66fd5f59d68: Sending packet type: 6 (1rtt protected), S1, Q0, 2aecc66fd5f59d68: , Seq: 3 (3), Phi: 0, 2aecc66fd5f59d68: Prepared 29 bytes 2aecc66fd5f59d68: time_stamp: 35865 2aecc66fd5f59d68: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 2aecc66fd5f59d68: padding, 14 bytes 2aecc66fd5f59d68: T= 0.286920, cwin: 15889,flight: 1165,nb_ret: 2,rtt_min: 33338,rtt: 33338,rtt_var: 16669,max_ack_delay: 0,state: 13 2aecc66fd5f59d68: Sending 55 bytes to 193.167.100.100:443 at T=0.286920 (24c8e5c7) 2aecc66fd5f59d68: Receiving 1440 bytes from 193.167.100.100:443 at T=0.286999 (24c8e616) 2aecc66fd5f59d68: Receiving packet type: 6 (1rtt protected), S0, Q0, 2aecc66fd5f59d68: , Seq: 1 (1), Phi: 0, 2aecc66fd5f59d68: Decrypted 1414 bytes 2aecc66fd5f59d68: ping, 1 bytes 2aecc66fd5f59d68: padding, 1413 bytes 2aecc66fd5f59d68: T= 0.286999, cwin: 15889,flight: 1165,nb_ret: 2,rtt_min: 33338,rtt: 33338,rtt_var: 16669,max_ack_delay: 0,state: 13 2aecc66fd5f59d68: Sending packet type: 6 (1rtt protected), S1, Q0, 2aecc66fd5f59d68: , Seq: 4 (4), Phi: 0, 2aecc66fd5f59d68: Prepared 29 bytes 2aecc66fd5f59d68: time_stamp: 36008 2aecc66fd5f59d68: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 2aecc66fd5f59d68: padding, 14 bytes 2aecc66fd5f59d68: T= 0.288068, cwin: 15889,flight: 1220,nb_ret: 2,rtt_min: 33338,rtt: 33338,rtt_var: 16669,max_ack_delay: 0,state: 13 2aecc66fd5f59d68: Sending 55 bytes to 193.167.100.100:443 at T=0.288068 (24c8ea43) 2aecc66fd5f59d68: T= 0.369409, Lost packet type 4, number 0, size 76, DCID , reason: timer 2aecc66fd5f59d68: Sending packet type: 4 (handshake), S0, Q0, Version 1, 2aecc66fd5f59d68: , , Seq: 1, pl: 158 2aecc66fd5f59d68: Prepared 138 bytes 2aecc66fd5f59d68: crypto_hs, offset 0, length 36: 14000020f1575242... 2aecc66fd5f59d68: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 2aecc66fd5f59d68: padding, 90 bytes 2aecc66fd5f59d68: T= 0.369409, cwin: 15889,flight: 1311,nb_ret: 3,rtt_min: 33338,rtt: 33338,rtt_var: 16669,max_ack_delay: 0,state: 13 2aecc66fd5f59d68: Sending 183 bytes to 193.167.100.100:443 at T=0.369409 (24ca2800) 2aecc66fd5f59d68: T= 0.454895, Lost packet type 5, number 1, size 691, DCID , reason: timer 2aecc66fd5f59d68: T= 0.454895, Lost packet type 6, number 2, size 295, DCID , reason: timer 2aecc66fd5f59d68: Sending packet type: 6 (1rtt protected), S1, Q0, 2aecc66fd5f59d68: , Seq: 5 (5), Phi: 0, 2aecc66fd5f59d68: Prepared 285 bytes 2aecc66fd5f59d68: new_connection_id[1]: 0x0365a577e8c3c288, ed52c45f134863664b1503386d93ecf9 2aecc66fd5f59d68: new_connection_id[2]: 0x063c492ffe215995, 095ca212aef1cf42d108e54f5a57f01c 2aecc66fd5f59d68: new_connection_id[3]: 0xc23b203131e96094, cde5f018fee579b2f72b97c63764c669 2aecc66fd5f59d68: new_connection_id[4]: 0xbbe1850c4e388715, 9c399dd3d5b40a993bb1370c79a3fe0c 2aecc66fd5f59d68: new_connection_id[5]: 0x468c20ce0b3e726d, 6c90a204b527c46c97604c6ee268ab5a 2aecc66fd5f59d68: new_connection_id[6]: 0x965de2afb240d1a5, 58f0e535f0b263e1335248d8f17f6c4a 2aecc66fd5f59d68: new_connection_id[7]: 0x7c9e7190648ea105, 800acb0066790cc7c75d12df9b4c2729 2aecc66fd5f59d68: time_stamp: 56861 2aecc66fd5f59d68: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 2aecc66fd5f59d68: stream 0, offset 0, length 27, fin = 1: 474554202f696e74... 2aecc66fd5f59d68: padding, 42 bytes 2aecc66fd5f59d68: T= 0.454895, cwin: 15889,flight: 604,nb_ret: 5,rtt_min: 33338,rtt: 33338,rtt_var: 16669,max_ack_delay: 0,state: 13 2aecc66fd5f59d68: Sending 311 bytes to 193.167.100.100:443 at T=0.454895 (24cb75ee) 2aecc66fd5f59d68: T= 0.536241, Lost packet type 4, number 1, size 167, DCID , reason: timer 2aecc66fd5f59d68: Sending packet type: 4 (handshake), S0, Q0, Version 1, 2aecc66fd5f59d68: , , Seq: 2, pl: 158 2aecc66fd5f59d68: Prepared 138 bytes 2aecc66fd5f59d68: crypto_hs, offset 0, length 36: 14000020f1575242... 2aecc66fd5f59d68: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 2aecc66fd5f59d68: padding, 88 bytes 2aecc66fd5f59d68: T= 0.536241, cwin: 15889,flight: 604,nb_ret: 6,rtt_min: 33338,rtt: 33338,rtt_var: 16669,max_ack_delay: 0,state: 13 2aecc66fd5f59d68: Sending 183 bytes to 193.167.100.100:443 at T=0.536241 (24ccb3b0) 2aecc66fd5f59d68: T= 0.621720, Lost packet type 6, number 3, size 39, DCID , reason: timer 2aecc66fd5f59d68: T= 0.621720, Lost packet type 6, number 4, size 39, DCID , reason: timer 2aecc66fd5f59d68: T= 0.621720, Lost packet type 6, number 5, size 295, DCID , reason: timer 2aecc66fd5f59d68: Sending packet type: 6 (1rtt protected), S1, Q1, 2aecc66fd5f59d68: , Seq: 6 (6), Phi: 0, 2aecc66fd5f59d68: Prepared 285 bytes 2aecc66fd5f59d68: new_connection_id[1]: 0x0365a577e8c3c288, ed52c45f134863664b1503386d93ecf9 2aecc66fd5f59d68: new_connection_id[2]: 0x063c492ffe215995, 095ca212aef1cf42d108e54f5a57f01c 2aecc66fd5f59d68: new_connection_id[3]: 0xc23b203131e96094, cde5f018fee579b2f72b97c63764c669 2aecc66fd5f59d68: new_connection_id[4]: 0xbbe1850c4e388715, 9c399dd3d5b40a993bb1370c79a3fe0c 2aecc66fd5f59d68: new_connection_id[5]: 0x468c20ce0b3e726d, 6c90a204b527c46c97604c6ee268ab5a 2aecc66fd5f59d68: new_connection_id[6]: 0x965de2afb240d1a5, 58f0e535f0b263e1335248d8f17f6c4a 2aecc66fd5f59d68: new_connection_id[7]: 0x7c9e7190648ea105, 800acb0066790cc7c75d12df9b4c2729 2aecc66fd5f59d68: time_stamp: 77715 2aecc66fd5f59d68: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 2aecc66fd5f59d68: stream 0, offset 0, length 27, fin = 1: 474554202f696e74... 2aecc66fd5f59d68: padding, 42 bytes 2aecc66fd5f59d68: T= 0.621720, cwin: 15889,flight: 494,nb_ret: 9,rtt_min: 33338,rtt: 33338,rtt_var: 16669,max_ack_delay: 0,state: 13 2aecc66fd5f59d68: Sending 311 bytes to 193.167.100.100:443 at T=0.621720 (24ce0197) 2aecc66fd5f59d68: Receiving 1079 bytes from 193.167.100.100:443 at T=0.653794 (24ce7ee1) 2aecc66fd5f59d68: Receiving packet type: 6 (1rtt protected), S1, Q0, 2aecc66fd5f59d68: , Seq: 3 (3), Phi: 0, 2aecc66fd5f59d68: Decrypted 1053 bytes 2aecc66fd5f59d68: time_stamp: 46129 2aecc66fd5f59d68: ack_ecn (nb=2), 6, 3-4, 1, ect0=0, ect1=4, ce=0 2aecc66fd5f59d68: stream 0, offset 0, length 1024, fin = 1: bf151a8b50c3176c... 2aecc66fd5f59d68: padding, 7 bytes 2aecc66fd5f59d68: T= 0.653794, cwin: 16184,flight: 0,nb_ret: 9,rtt_min: 32074,rtt: 33180,rtt_var: 12817,max_ack_delay: 0,state: 14 2aecc66fd5f59d68: All done, Closing the connection. 2aecc66fd5f59d68: Sending packet type: 6 (1rtt protected), S0, Q1, 2aecc66fd5f59d68: , Seq: 7 (7), Phi: 0, 2aecc66fd5f59d68: Prepared 19 bytes 2aecc66fd5f59d68: time_stamp: 81748 2aecc66fd5f59d68: ack_ecn (nb=1), 3, 1, ect0=0, ect1=3, ce=0 2aecc66fd5f59d68: application_close, Error 0x0000, Reason length 0 2aecc66fd5f59d68: Sending 45 bytes to 193.167.100.100:443 at T=0.653990 (24ce7fa5) 2aecc66fd5f59d68: Receiving 1079 bytes from 193.167.100.100:443 at T=0.665288 (24ceabc7) 2aecc66fd5f59d68: Receiving packet type: 6 (1rtt protected), S1, Q1, 2aecc66fd5f59d68: , Seq: 4 (4), Phi: 0, 2aecc66fd5f59d68: Decrypted 1053 bytes 2aecc66fd5f59d68: stream 0, offset 0, length 1024, fin = 1: bf151a8b50c3176c... 2aecc66fd5f59d68: padding, 25 bytes 2aecc66fd5f59d68: Receiving 1079 bytes from 193.167.100.100:443 at T=0.676839 (24ced8e6) 2aecc66fd5f59d68: Receiving packet type: 6 (1rtt protected), S1, Q1, 2aecc66fd5f59d68: , Seq: 5 (5), Phi: 0, 2aecc66fd5f59d68: Decrypted 1053 bytes 2aecc66fd5f59d68: stream 0, offset 0, length 1024, fin = 1: bf151a8b50c3176c... 2aecc66fd5f59d68: padding, 25 bytes 2aecc66fd5f59d68: Receiving 30 bytes from 193.167.100.100:443 at T=0.684580 (24cef723) 2aecc66fd5f59d68: Receiving packet type: 6 (1rtt protected), S0, Q0, 2aecc66fd5f59d68: , Seq: 6 (6), Phi: 0, 2aecc66fd5f59d68: Decrypted 4 bytes 2aecc66fd5f59d68: connection_close, Error 0x0000, Reason length 0 2aecc66fd5f59d68: Out of 2 zero RTT packets, 0 were acked by the server. 2aecc66fd5f59d68: Received 1024 bytes in 0.684687 seconds, 0.011965 Mbps. 2aecc66fd5f59d68: Sent 27 bytes in 0.684687 seconds, 0.000315 Mbps.