e5c60650d135c242: No root crt list specified -- certificate will not be verified. e5c60650d135c242: Sending ALPN list (1): hq-interop e5c60650d135c242: Sending transport parameter TLS extension (85 bytes): e5c60650d135c242: Extension list (85 bytes): e5c60650d135c242: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 e5c60650d135c242: Extension type: 4 (initial_max_data), length 4, 80100000 e5c60650d135c242: Extension type: 8 (max_streams_bidi), length 2, 4200 e5c60650d135c242: Extension type: 1 (idle_timeout), length 4, 8002bf20 e5c60650d135c242: Extension type: 3 (max_packet_size), length 2, 45a0 e5c60650d135c242: Extension type: 9 (max_streams_uni), length 2, 4200 e5c60650d135c242: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 e5c60650d135c242: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff e5c60650d135c242: Extension type: 14 (active_connection_id_limit), length 1, 08 e5c60650d135c242: Extension type: 11 (max_ack_delay), length 1, 0a e5c60650d135c242: Extension type: 15 (hcid), length 8, cea844cbab792747 e5c60650d135c242: Extension type: 7157 (unknown), length 4, 8000c606 e5c60650d135c242: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 e5c60650d135c242: Extension type: 29016 (enable_time_stamp), length 1, 03 e5c60650d135c242: Extension type: 10930 (grease_quic_bit), length 0 e5c60650d135c242: Preparing GET on stream 0 for /scared-tangy-lemur e5c60650d135c242: Sending packet type: 2 (initial), S0, Q1, Version 1, e5c60650d135c242: , , Seq: 108864, pl: 469 e5c60650d135c242: Token length: 50, Token: d51e4ab38954f9f1ed75a6c3dc7cb2e1... e5c60650d135c242: Prepared 449 bytes e5c60650d135c242: ping, 1 bytes e5c60650d135c242: crypto_hs, offset 0, length 444: 010001b803037e62... e5c60650d135c242: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, e5c60650d135c242: , , Seq: 0, pl: 682 e5c60650d135c242: Prepared 662 bytes e5c60650d135c242: stream 0, offset 0, length 25, fin = 1: 474554202f736361... e5c60650d135c242: padding, 634 bytes e5c60650d135c242: Sending 1252 bytes to 193.167.100.100:443 at T=0.001918 (2458020d) e5c60650d135c242: Receiving 1252 bytes from 193.167.100.100:443 at T=0.036137 (245887b8) e5c60650d135c242: T= 0.036137, Keys unavailable, buffered packet type 6. e5c60650d135c242: Receiving 311 bytes from 193.167.100.100:443 at T=0.036401 (245888c0) e5c60650d135c242: T= 0.036401, Keys unavailable, buffered packet type 6. e5c60650d135c242: Receiving 1440 bytes from 193.167.100.100:443 at T=0.037582 (24588d5d) e5c60650d135c242: T= 0.037582, Keys unavailable, buffered packet type 6. e5c60650d135c242: T= 0.092363, Lost packet type 2, number 108864, size 529, DCID <>, reason: timer e5c60650d135c242: Sending packet type: 2 (initial), S0, Q1, Version 1, e5c60650d135c242: , , Seq: 108865, pl: 469 e5c60650d135c242: Token length: 50, Token: d51e4ab38954f9f1ed75a6c3dc7cb2e1... e5c60650d135c242: Prepared 449 bytes e5c60650d135c242: ping, 1 bytes e5c60650d135c242: crypto_hs, offset 0, length 444: 010001b803037e62... e5c60650d135c242: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, e5c60650d135c242: , , Seq: 1, pl: 682 e5c60650d135c242: Prepared 662 bytes e5c60650d135c242: padding, 662 bytes e5c60650d135c242: Sending 1252 bytes to 193.167.100.100:443 at T=0.092363 (2459635a) e5c60650d135c242: T= 0.273276, Lost packet type 2, number 108865, size 529, DCID <>, reason: timer e5c60650d135c242: Sending packet type: 2 (initial), S0, Q1, Version 1, e5c60650d135c242: , , Seq: 108866, pl: 469 e5c60650d135c242: Token length: 50, Token: d51e4ab38954f9f1ed75a6c3dc7cb2e1... e5c60650d135c242: Prepared 449 bytes e5c60650d135c242: ping, 1 bytes e5c60650d135c242: crypto_hs, offset 0, length 444: 010001b803037e62... e5c60650d135c242: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, e5c60650d135c242: , , Seq: 2, pl: 682 e5c60650d135c242: Prepared 662 bytes e5c60650d135c242: padding, 662 bytes e5c60650d135c242: Sending 1252 bytes to 193.167.100.100:443 at T=0.273276 (245c260b) e5c60650d135c242: Receiving 1252 bytes from 193.167.100.100:443 at T=0.285558 (245c5605) e5c60650d135c242: Receiving packet type: 2 (initial), S0, Q0, Version 1, e5c60650d135c242: , <7ffd8ee70d0546ff>, Seq: 77326, pl: 285 e5c60650d135c242: Token length: 0 e5c60650d135c242: Decrypted 265 bytes e5c60650d135c242: crypto_hs, offset 0, length 129: 0200007d030308ae... e5c60650d135c242: ack_ecn (nb=0), 108864, ect0=0, ect1=1, ce=0 e5c60650d135c242: padding, 118 bytes e5c60650d135c242: Receiving packet type: 4 (handshake), S0, Q0, Version 1, e5c60650d135c242: , <7ffd8ee70d0546ff>, Seq: 2, pl: 916 e5c60650d135c242: Decrypted 896 bytes e5c60650d135c242: ping, 1 bytes e5c60650d135c242: padding, 895 bytes e5c60650d135c242: Sending packet type: 4 (handshake), S0, Q1, Version 1, e5c60650d135c242: <7ffd8ee70d0546ff>, , Seq: 0, pl: 28 e5c60650d135c242: Prepared 8 bytes e5c60650d135c242: ack_ecn (nb=0), 2, ect0=0, ect1=1, ce=0 e5c60650d135c242: Sending 53 bytes to 193.167.100.100:443 at T=0.285846 (245c5725) e5c60650d135c242: Receiving 366 bytes from 193.167.100.100:443 at T=0.316831 (245cd02e) e5c60650d135c242: Receiving packet type: 4 (handshake), S0, Q0, Version 1, e5c60650d135c242: , <7ffd8ee70d0546ff>, Seq: 3, pl: 286 e5c60650d135c242: Decrypted 266 bytes e5c60650d135c242: crypto_hs, offset 0, length 177: 0800008900870000... e5c60650d135c242: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 e5c60650d135c242: padding, 77 bytes e5c60650d135c242: Received transport parameter TLS extension (106 bytes): e5c60650d135c242: Extension list (106 bytes): e5c60650d135c242: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 e5c60650d135c242: Extension type: 4 (initial_max_data), length 4, 80100000 e5c60650d135c242: Extension type: 8 (max_streams_bidi), length 2, 4200 e5c60650d135c242: Extension type: 1 (idle_timeout), length 4, 8002bf20 e5c60650d135c242: Extension type: 3 (max_packet_size), length 2, 45a0 e5c60650d135c242: Extension type: 9 (max_streams_uni), length 2, 4200 e5c60650d135c242: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 e5c60650d135c242: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff e5c60650d135c242: Extension type: 14 (active_connection_id_limit), length 1, 08 e5c60650d135c242: Extension type: 11 (max_ack_delay), length 1, 0a e5c60650d135c242: Extension type: 15 (hcid), length 8, 7ffd8ee70d0546ff e5c60650d135c242: Extension type: 0 (ocid), length 8, e5c60650d135c242 e5c60650d135c242: Extension type: 2 (stateless_reset_token), length 16, 6575f355d95262735fb9d64d4d2eb925 e5c60650d135c242: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 e5c60650d135c242: Extension type: 29016 (enable_time_stamp), length 1, 03 e5c60650d135c242: Extension type: 10930 (grease_quic_bit), length 0 e5c60650d135c242: Receiving packet type: 4 (handshake), S0, Q0, Version 1, e5c60650d135c242: , <7ffd8ee70d0546ff>, Seq: 4, pl: 30 e5c60650d135c242: Decrypted 10 bytes e5c60650d135c242: ping, 1 bytes e5c60650d135c242: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 e5c60650d135c242: padding, 1 bytes e5c60650d135c242: The session was properly resumed! e5c60650d135c242: Zero RTT data is accepted! e5c60650d135c242: Negotiated ALPN: hq-interop e5c60650d135c242: Receiving 1440 bytes from 193.167.100.100:443 at T=0.317067 (245cd11a) e5c60650d135c242: Receiving packet type: 6 (1rtt protected), S0, Q1, e5c60650d135c242: , Seq: 2 (2), Phi: 0, e5c60650d135c242: Decrypted 1414 bytes e5c60650d135c242: ping, 1 bytes e5c60650d135c242: padding, 1413 bytes e5c60650d135c242: T= 0.317067, cwin: 15926,flight: 2666,nb_ret: 2,rtt_min: 30985,rtt: 62562,rtt_var: 65591,max_ack_delay: 0,state: 10 e5c60650d135c242: Receiving 311 bytes from 193.167.100.100:443 at T=0.317067 (245cd11a) e5c60650d135c242: Receiving packet type: 6 (1rtt protected), S0, Q0, e5c60650d135c242: , Seq: 1 (1), Phi: 0, e5c60650d135c242: Decrypted 285 bytes e5c60650d135c242: stream 0, offset 826, length 198, fin = 1: e693f36bf9184f1e... e5c60650d135c242: padding, 81 bytes e5c60650d135c242: T= 0.317067, cwin: 15926,flight: 2666,nb_ret: 2,rtt_min: 30985,rtt: 62562,rtt_var: 65591,max_ack_delay: 0,state: 10 e5c60650d135c242: Receiving 1252 bytes from 193.167.100.100:443 at T=0.317067 (245cd11a) e5c60650d135c242: Receiving packet type: 6 (1rtt protected), S0, Q1, e5c60650d135c242: , Seq: 0 (0), Phi: 0, e5c60650d135c242: Decrypted 1226 bytes e5c60650d135c242: time_stamp: 66 e5c60650d135c242: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 e5c60650d135c242: crypto_hs, offset 0, length 133: 04000081000186a0... e5c60650d135c242: new_token[50]: 0xae08a6b42be874bf15b70aa57890d88c... e5c60650d135c242: new_connection_id[1]: 0x4c4a2685ca6f2062, cf5e5eddcab8d907eab58c34829be8a2 e5c60650d135c242: new_connection_id[2]: 0x1d2fa5acbcc9c8b4, e305fb5e0bd43f913aeeb3f37140b94f e5c60650d135c242: new_connection_id[3]: 0x40e91f7667567476, 50c1c1d8133e2718964b22ad9615528e e5c60650d135c242: new_connection_id[4]: 0x458e5721aac16f32, 03a127c47efc020c76a08e2497ed500b e5c60650d135c242: new_connection_id[5]: 0xa05428494a9a1b3a, a0e7de3f3044e9f0ab831da64e092273 e5c60650d135c242: new_connection_id[6]: 0x03e660b94b232e86, a4743c1598e15cfc85db4758a4f87ed1 e5c60650d135c242: new_connection_id[7]: 0x2f31acbfb0a34b8c, 346d0638f63c009a9f38815e0c43a5be e5c60650d135c242: stream 0, offset 0, length 826, fin = 0: 1b0ffee04b8ba60b... e5c60650d135c242: T= 0.317067, cwin: 16617,flight: 1959,nb_ret: 2,rtt_min: 30985,rtt: 94135,rtt_var: 112340,max_ack_delay: 0,state: 10 e5c60650d135c242: Sending packet type: 4 (handshake), S0, Q0, Version 1, e5c60650d135c242: <7ffd8ee70d0546ff>, , Seq: 1, pl: 67 e5c60650d135c242: Prepared 47 bytes e5c60650d135c242: ack_ecn (nb=0), 2-4, ect0=0, ect1=3, ce=0 e5c60650d135c242: crypto_hs, offset 0, length 36: 1400002039da8234... e5c60650d135c242: Sending packet type: 6 (1rtt protected), S1, Q0, e5c60650d135c242: <7ffd8ee70d0546ff>, Seq: 3 (3), Phi: 0, e5c60650d135c242: Prepared 285 bytes e5c60650d135c242: time_stamp: 39633 e5c60650d135c242: ack_ecn (nb=0), 0-2, ect0=0, ect1=3, ce=0 e5c60650d135c242: new_connection_id[1]: 0x034bcee71fec1dc4, 0829f95aaacaa97ee09d8d795a0e39aa e5c60650d135c242: new_connection_id[2]: 0xcdb28f289d4d34e1, b2c4cbada08b0954708748d81ce1ee0f e5c60650d135c242: new_connection_id[3]: 0x080d966c7e043bbb, 26a61888e195cac10efed0cbdd07437d e5c60650d135c242: new_connection_id[4]: 0x2848ab22ab7107ab, 210b2971d3b5ed986fdc9aeeee62f9a9 e5c60650d135c242: new_connection_id[5]: 0xda113e322fa04169, 7726f61c124b38f49301bf48271a5750 e5c60650d135c242: new_connection_id[6]: 0x252eb06df72768df, 165706b32d1673dea9e1d617d6d95d56 e5c60650d135c242: new_connection_id[7]: 0x5b876a9b6ee6e5fe, 8f9a24e2caaabb964abcaaed41068c0f e5c60650d135c242: padding, 72 bytes e5c60650d135c242: T= 0.317067, cwin: 16617,flight: 1817,nb_ret: 2,rtt_min: 30985,rtt: 94135,rtt_var: 112340,max_ack_delay: 0,state: 13 e5c60650d135c242: Sending 403 bytes to 193.167.100.100:443 at T=0.317067 (245cd11a) e5c60650d135c242: Connection established. Version = 1, I-CID: e5c60650d135c242, verified: 1 e5c60650d135c242: Receiving 55 bytes from 193.167.100.100:443 at T=0.348541 (245d4c0c) e5c60650d135c242: Receiving packet type: 6 (1rtt protected), S1, Q0, e5c60650d135c242: , Seq: 3 (3), Phi: 0, e5c60650d135c242: Decrypted 29 bytes e5c60650d135c242: time_stamp: 39368 e5c60650d135c242: ack_ecn (nb=1), 3, 0, ect0=0, ect1=2, ce=0 e5c60650d135c242: ack_frequency: S=0, P=2, uS=7963, Reordering threshold: 0 e5c60650d135c242: handshake_done e5c60650d135c242: padding, 5 bytes e5c60650d135c242: T= 0.348541, Lost packet type 5, number 1, size 691, DCID <7ffd8ee70d0546ff>, reason: repeat e5c60650d135c242: T= 0.348541, Lost packet type 5, number 2, size 691, DCID <7ffd8ee70d0546ff>, reason: repeat e5c60650d135c242: T= 0.348541, cwin: 15530,flight: 0,nb_ret: 4,rtt_min: 30985,rtt: 86276,rtt_var: 99972,max_ack_delay: 0,state: 14 e5c60650d135c242: All done, Closing the connection. e5c60650d135c242: Sending packet type: 6 (1rtt protected), S0, Q1, e5c60650d135c242: <7ffd8ee70d0546ff>, Seq: 4 (4), Phi: 0, e5c60650d135c242: Prepared 17 bytes e5c60650d135c242: time_stamp: 43580 e5c60650d135c242: ack_ecn (nb=0), 2-3, ect0=0, ect1=4, ce=0 e5c60650d135c242: application_close, Error 0x0000, Reason length 0 e5c60650d135c242: Sending 43 bytes to 193.167.100.100:443 at T=0.348645 (245d4c74) e5c60650d135c242: Receiving 30 bytes from 193.167.100.100:443 at T=0.379240 (245dc3f7) e5c60650d135c242: Receiving packet type: 6 (1rtt protected), S0, Q1, e5c60650d135c242: , Seq: 4 (4), Phi: 0, e5c60650d135c242: Decrypted 4 bytes e5c60650d135c242: connection_close, Error 0x0000, Reason length 0 e5c60650d135c242: Out of 3 zero RTT packets, 1 were acked by the server. e5c60650d135c242: Received 1024 bytes in 0.379340 seconds, 0.021595 Mbps. e5c60650d135c242: Sent 25 bytes in 0.379340 seconds, 0.000527 Mbps.