0ca9760b50541446: No root crt list specified -- certificate will not be verified. 0ca9760b50541446: Sending ALPN list (1): hq-interop 0ca9760b50541446: Sending transport parameter TLS extension (85 bytes): 0ca9760b50541446: Extension list (85 bytes): 0ca9760b50541446: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 0ca9760b50541446: Extension type: 4 (initial_max_data), length 4, 80100000 0ca9760b50541446: Extension type: 8 (max_streams_bidi), length 2, 4200 0ca9760b50541446: Extension type: 1 (idle_timeout), length 4, 8002bf20 0ca9760b50541446: Extension type: 3 (max_packet_size), length 2, 45a0 0ca9760b50541446: Extension type: 9 (max_streams_uni), length 2, 4200 0ca9760b50541446: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 0ca9760b50541446: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 0ca9760b50541446: Extension type: 14 (active_connection_id_limit), length 1, 08 0ca9760b50541446: Extension type: 11 (max_ack_delay), length 1, 0a 0ca9760b50541446: Extension type: 15 (hcid), length 8, de170b11af95d8d6 0ca9760b50541446: Extension type: 430 (unknown), length 4, 8000a976 0ca9760b50541446: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 0ca9760b50541446: Extension type: 29016 (enable_time_stamp), length 1, 03 0ca9760b50541446: Extension type: 10930 (grease_quic_bit), length 0 0ca9760b50541446: Preparing GET on stream 0 for /htbudfkxxh 0ca9760b50541446: Sending packet type: 2 (initial), S0, Q1, Version 1, 0ca9760b50541446: <0ca9760b50541446>, , Seq: 94114, pl: 469 0ca9760b50541446: Token length: 50, Token: f088881c118b8b2250b58d5e1711e833... 0ca9760b50541446: Prepared 449 bytes 0ca9760b50541446: ping, 1 bytes 0ca9760b50541446: crypto_hs, offset 0, length 444: 010001b80303f759... 0ca9760b50541446: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 0ca9760b50541446: <0ca9760b50541446>, , Seq: 0, pl: 682 0ca9760b50541446: Prepared 662 bytes 0ca9760b50541446: stream 0, offset 0, length 17, fin = 1: 474554202f687462... 0ca9760b50541446: padding, 642 bytes 0ca9760b50541446: Sending 1252 bytes to 193.167.100.100:443 at T=0.001794 (1b8fc8a8) 0ca9760b50541446: Receiving 1252 bytes from 193.167.100.100:443 at T=0.035837 (1b904da3) ca9760b50541446: T= 0.035837, Keys unavailable, buffered packet type 6. 0ca9760b50541446: Receiving 311 bytes from 193.167.100.100:443 at T=0.036097 (1b904ea7) ca9760b50541446: T= 0.036097, Keys unavailable, buffered packet type 6. ca9760b50541446: T= 0.091487, Lost packet type 2, number 94114, size 529, DCID <>, reason: timer 0ca9760b50541446: Sending packet type: 2 (initial), S0, Q1, Version 1, 0ca9760b50541446: <0ca9760b50541446>, , Seq: 94115, pl: 469 0ca9760b50541446: Token length: 50, Token: f088881c118b8b2250b58d5e1711e833... 0ca9760b50541446: Prepared 449 bytes 0ca9760b50541446: ping, 1 bytes 0ca9760b50541446: crypto_hs, offset 0, length 444: 010001b80303f759... 0ca9760b50541446: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 0ca9760b50541446: <0ca9760b50541446>, , Seq: 1, pl: 682 0ca9760b50541446: Prepared 662 bytes 0ca9760b50541446: padding, 662 bytes 0ca9760b50541446: Sending 1252 bytes to 193.167.100.100:443 at T=0.091487 (1b912705) ca9760b50541446: T= 0.270900, Lost packet type 2, number 94115, size 529, DCID <>, reason: timer 0ca9760b50541446: Sending packet type: 2 (initial), S0, Q1, Version 1, 0ca9760b50541446: <0ca9760b50541446>, , Seq: 94116, pl: 469 0ca9760b50541446: Token length: 50, Token: f088881c118b8b2250b58d5e1711e833... 0ca9760b50541446: Prepared 449 bytes 0ca9760b50541446: ping, 1 bytes 0ca9760b50541446: crypto_hs, offset 0, length 444: 010001b80303f759... 0ca9760b50541446: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 0ca9760b50541446: <0ca9760b50541446>, , Seq: 2, pl: 682 0ca9760b50541446: Prepared 662 bytes 0ca9760b50541446: padding, 662 bytes 0ca9760b50541446: Sending 1252 bytes to 193.167.100.100:443 at T=0.270900 (1b93e3da) 0ca9760b50541446: Receiving 1252 bytes from 193.167.100.100:443 at T=0.303929 (1b9464df) 0ca9760b50541446: Receiving packet type: 2 (initial), S0, Q0, Version 1, 0ca9760b50541446: , <6a778937c434181d>, Seq: 108061, pl: 157 0ca9760b50541446: Token length: 0 0ca9760b50541446: Decrypted 137 bytes 0ca9760b50541446: ack_ecn (nb=0), 94114-94116, ect0=0, ect1=3, ce=0 0ca9760b50541446: padding, 126 bytes ca9760b50541446: T= 0.303929, Keys unavailable, buffered packet type 4. 0ca9760b50541446: Sending packet type: 2 (initial), S0, Q1, Version 1, 0ca9760b50541446: <6a778937c434181d>, , Seq: 94117, pl: 33 0ca9760b50541446: Token length: 50, Token: f088881c118b8b2250b58d5e1711e833... 0ca9760b50541446: Prepared 13 bytes 0ca9760b50541446: ping, 1 bytes 0ca9760b50541446: ack_ecn (nb=0), 108061, ect0=0, ect1=1, ce=0 0ca9760b50541446: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 0ca9760b50541446: <6a778937c434181d>, , Seq: 3, pl: 1118 0ca9760b50541446: Prepared 1098 bytes 0ca9760b50541446: padding, 1098 bytes 0ca9760b50541446: Sending 1252 bytes to 193.167.100.100:443 at T=0.348904 (1b95148e) 0ca9760b50541446: Receiving 1252 bytes from 193.167.100.100:443 at T=0.381765 (1b9594eb) 0ca9760b50541446: Receiving packet type: 2 (initial), S0, Q0, Version 1, 0ca9760b50541446: , <6a778937c434181d>, Seq: 108062, pl: 285 0ca9760b50541446: Token length: 0 0ca9760b50541446: Decrypted 265 bytes 0ca9760b50541446: crypto_hs, offset 0, length 129: 0200007d0303593f... 0ca9760b50541446: ack_ecn (nb=0), 94116-94117, ect0=0, ect1=4, ce=0 0ca9760b50541446: padding, 121 bytes 0ca9760b50541446: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 0ca9760b50541446: , <6a778937c434181d>, Seq: 4, pl: 916 0ca9760b50541446: Decrypted 896 bytes 0ca9760b50541446: ping, 1 bytes 0ca9760b50541446: padding, 895 bytes 0ca9760b50541446: Receiving 1069 bytes from 193.167.100.100:443 at T=0.382043 (1b959601) 0ca9760b50541446: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 0ca9760b50541446: , <6a778937c434181d>, Seq: 3, pl: 1044 0ca9760b50541446: Decrypted 1024 bytes 0ca9760b50541446: ping, 1 bytes 0ca9760b50541446: padding, 1023 bytes 0ca9760b50541446: Sending packet type: 4 (handshake), S0, Q1, Version 1, 0ca9760b50541446: <6a778937c434181d>, , Seq: 0, pl: 28 0ca9760b50541446: Prepared 8 bytes 0ca9760b50541446: ack_ecn (nb=0), 3-4, ect0=0, ect1=2, ce=0 0ca9760b50541446: Sending 53 bytes to 193.167.100.100:443 at T=0.382043 (1b959601) 0ca9760b50541446: Sending packet type: 4 (handshake), S0, Q1, Version 1, 0ca9760b50541446: <6a778937c434181d>, , Seq: 1, pl: 30 0ca9760b50541446: Prepared 10 bytes 0ca9760b50541446: ping, 1 bytes 0ca9760b50541446: ack_ecn (nb=0), 3-4, ect0=0, ect1=2, ce=0 0ca9760b50541446: Sending 55 bytes to 193.167.100.100:443 at T=0.451106 (1b96a3c8) 0ca9760b50541446: Receiving 55 bytes from 193.167.100.100:443 at T=0.482296 (1b971d9e) 0ca9760b50541446: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 0ca9760b50541446: , <6a778937c434181d>, Seq: 7, pl: 30 0ca9760b50541446: Decrypted 10 bytes 0ca9760b50541446: ping, 1 bytes 0ca9760b50541446: ack_ecn (nb=0), 1, ect0=0, ect1=1, ce=0 0ca9760b50541446: padding, 1 bytes ca9760b50541446: T= 0.482354, Lost packet type 4, number 0, size 37, DCID <6a778937c434181d>, reason: repeat 0ca9760b50541446: Sending packet type: 4 (handshake), S0, Q1, Version 1, 0ca9760b50541446: <6a778937c434181d>, , Seq: 2, pl: 31 0ca9760b50541446: Prepared 11 bytes 0ca9760b50541446: ping, 1 bytes 0ca9760b50541446: ack_ecn (nb=1), 7, 4, ect0=0, ect1=3, ce=0 0ca9760b50541446: Sending 56 bytes to 193.167.100.100:443 at T=0.482354 (1b971dd8) 0ca9760b50541446: Receiving 55 bytes from 193.167.100.100:443 at T=0.513182 (1b979644) 0ca9760b50541446: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 0ca9760b50541446: , <6a778937c434181d>, Seq: 8, pl: 30 0ca9760b50541446: Decrypted 10 bytes 0ca9760b50541446: ack_ecn (nb=0), 1-2, ect0=0, ect1=2, ce=0 0ca9760b50541446: padding, 2 bytes 0ca9760b50541446: Receiving 366 bytes from 193.167.100.100:443 at T=0.528505 (1b97d21f) 0ca9760b50541446: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 0ca9760b50541446: , <6a778937c434181d>, Seq: 9, pl: 286 0ca9760b50541446: Decrypted 266 bytes 0ca9760b50541446: crypto_hs, offset 0, length 177: 0800008900870000... 0ca9760b50541446: ack_ecn (nb=0), 1-2, ect0=0, ect1=2, ce=0 0ca9760b50541446: padding, 76 bytes 0ca9760b50541446: Received transport parameter TLS extension (106 bytes): 0ca9760b50541446: Extension list (106 bytes): 0ca9760b50541446: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 0ca9760b50541446: Extension type: 4 (initial_max_data), length 4, 80100000 0ca9760b50541446: Extension type: 8 (max_streams_bidi), length 2, 4200 0ca9760b50541446: Extension type: 1 (idle_timeout), length 4, 8002bf20 0ca9760b50541446: Extension type: 3 (max_packet_size), length 2, 45a0 0ca9760b50541446: Extension type: 9 (max_streams_uni), length 2, 4200 0ca9760b50541446: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 0ca9760b50541446: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 0ca9760b50541446: Extension type: 14 (active_connection_id_limit), length 1, 08 0ca9760b50541446: Extension type: 11 (max_ack_delay), length 1, 0a 0ca9760b50541446: Extension type: 15 (hcid), length 8, 6a778937c434181d 0ca9760b50541446: Extension type: 0 (ocid), length 8, 0ca9760b50541446 0ca9760b50541446: Extension type: 2 (stateless_reset_token), length 16, 4ea0f9a5b80380daafba06e50b29b94d 0ca9760b50541446: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 0ca9760b50541446: Extension type: 29016 (enable_time_stamp), length 1, 03 0ca9760b50541446: Extension type: 10930 (grease_quic_bit), length 0 0ca9760b50541446: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 0ca9760b50541446: , <6a778937c434181d>, Seq: 10, pl: 30 0ca9760b50541446: Decrypted 10 bytes 0ca9760b50541446: ping, 1 bytes 0ca9760b50541446: ack_ecn (nb=0), 1-2, ect0=0, ect1=2, ce=0 0ca9760b50541446: The session was properly resumed! 0ca9760b50541446: Zero RTT data is accepted! 0ca9760b50541446: Negotiated ALPN: hq-interop 0ca9760b50541446: Receiving 311 bytes from 193.167.100.100:443 at T=0.528759 (1b97d31d) 0ca9760b50541446: Receiving packet type: 6 (1rtt protected), S0, Q0, 0ca9760b50541446: , Seq: 1 (1), Phi: 0, 0ca9760b50541446: Decrypted 285 bytes 0ca9760b50541446: stream 0, offset 828, length 196, fin = 1: 021a340dea83fc2d... 0ca9760b50541446: padding, 83 bytes ca9760b50541446: T= 0.528759, cwin: 17119,flight: 3264,nb_ret: 3,rtt_min: 30828,rtt: 34181,rtt_var: 8036,max_ack_delay: 0,state: 10 0ca9760b50541446: Receiving 1252 bytes from 193.167.100.100:443 at T=0.528759 (1b97d31d) 0ca9760b50541446: Receiving packet type: 6 (1rtt protected), S0, Q1, 0ca9760b50541446: , Seq: 0 (0), Phi: 0, 0ca9760b50541446: Decrypted 1226 bytes 0ca9760b50541446: time_stamp: 52 0ca9760b50541446: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 0ca9760b50541446: crypto_hs, offset 0, length 133: 04000081000186a0... 0ca9760b50541446: new_token[50]: 0xfe3bafd1b02d1c4aacd2e189a010293c... 0ca9760b50541446: new_connection_id[1]: 0xd0b0a5ece4ca5f2f, 339456ad9b10eca63f8feef618cb33f2 0ca9760b50541446: new_connection_id[2]: 0xfcb681ff21eee799, d1b0fc1c551e5ec42e4b64bb451b7a2a 0ca9760b50541446: new_connection_id[3]: 0x2f1b26158f027d87, 979fb21756e5a4eb523aca0560e5663f 0ca9760b50541446: new_connection_id[4]: 0x93058586ef7985b0, 78dd0b69e5011310cc5030c2f7cc760c 0ca9760b50541446: new_connection_id[5]: 0x54f4a2e4b8f01cda, 71e6f06cbff5e7706ad4999b868a794e 0ca9760b50541446: new_connection_id[6]: 0xd2bdea2d01a7fd14, 983792226668430f22713d76b87e158e 0ca9760b50541446: new_connection_id[7]: 0x37e054cad69f9731, e6456f6bb1f1e4df8b93bf1c0e818885 0ca9760b50541446: stream 0, offset 0, length 828, fin = 0: c742c73120505c72... ca9760b50541446: T= 0.528759, cwin: 17810,flight: 2557,nb_ret: 3,rtt_min: 30828,rtt: 95779,rtt_var: 129223,max_ack_delay: 0,state: 10 0ca9760b50541446: Sending packet type: 4 (handshake), S0, Q0, Version 1, 0ca9760b50541446: <6a778937c434181d>, , Seq: 3, pl: 67 0ca9760b50541446: Prepared 47 bytes 0ca9760b50541446: ack_ecn (nb=0), 7-10, ect0=0, ect1=6, ce=0 0ca9760b50541446: crypto_hs, offset 0, length 36: 14000020e9b010df... 0ca9760b50541446: Sending packet type: 6 (1rtt protected), S1, Q1, 0ca9760b50541446: <6a778937c434181d>, Seq: 4 (4), Phi: 0, 0ca9760b50541446: Prepared 285 bytes 0ca9760b50541446: time_stamp: 66094 0ca9760b50541446: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 0ca9760b50541446: new_connection_id[1]: 0x4b7a0985f5f79e2b, 27fa2cca1991d600d913caff24853951 0ca9760b50541446: new_connection_id[2]: 0x76b1498f52600cf2, 196d430e164012e7206096735102e8a0 0ca9760b50541446: new_connection_id[3]: 0xdf008ff9bc215520, 6dcfa78a0cac1fb100831dd803879ee9 0ca9760b50541446: new_connection_id[4]: 0xeff394b6051c03da, 5e8aa184b8a3e574616d58d6747ff500 0ca9760b50541446: new_connection_id[5]: 0xa26ad2d70da34679, e321ca1fc093815f86c67f813ca6f692 0ca9760b50541446: new_connection_id[6]: 0x5b2a18e7de63fe02, dae0badf05c4779c014976cac396157c 0ca9760b50541446: new_connection_id[7]: 0x24c624077440e701, 600daab1b7c7bb81dbdc02c5ea38a814 0ca9760b50541446: padding, 72 bytes ca9760b50541446: T= 0.528759, cwin: 17810,flight: 2960,nb_ret: 3,rtt_min: 30828,rtt: 95779,rtt_var: 129223,max_ack_delay: 0,state: 13 0ca9760b50541446: Sending 403 bytes to 193.167.100.100:443 at T=0.528759 (1b97d31d) 0ca9760b50541446: Connection established. Version = 1, I-CID: ca9760b50541446, verified: 1 0ca9760b50541446: Receiving 311 bytes from 193.167.100.100:443 at T=0.929544 (1b9df0ae) 0ca9760b50541446: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 0ca9760b50541446: , <6a778937c434181d>, Seq: 11, pl: 286 0ca9760b50541446: Decrypted 266 bytes 0ca9760b50541446: crypto_hs, offset 0, length 177: 0800008900870000... 0ca9760b50541446: ack_ecn (nb=0), 1-2, ect0=0, ect1=2, ce=0 0ca9760b50541446: padding, 74 bytes 0ca9760b50541446: All done, Closing the connection. 0ca9760b50541446: Sending packet type: 6 (1rtt protected), S1, Q0, 0ca9760b50541446: <6a778937c434181d>, Seq: 5 (5), Phi: 0, 0ca9760b50541446: Prepared 20 bytes 0ca9760b50541446: time_stamp: 116205 0ca9760b50541446: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 0ca9760b50541446: application_close, Error 0x0000, Reason length 0 0ca9760b50541446: Sending 46 bytes to 193.167.100.100:443 at T=0.929646 (1b9df114) 0ca9760b50541446: Receiving 183 bytes from 193.167.100.100:443 at T=1.330540 (1ba40f12) 0ca9760b50541446: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 0ca9760b50541446: , <6a778937c434181d>, Seq: 12, pl: 158 0ca9760b50541446: Decrypted 138 bytes 0ca9760b50541446: ping, 1 bytes 0ca9760b50541446: ack_ecn (nb=0), 1-2, ect0=0, ect1=2, ce=0 0ca9760b50541446: padding, 126 bytes 0ca9760b50541446: Receiving 311 bytes from 193.167.100.100:443 at T=1.731802 (1baa2e80) 0ca9760b50541446: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 0ca9760b50541446: , <6a778937c434181d>, Seq: 13, pl: 286 0ca9760b50541446: Decrypted 266 bytes 0ca9760b50541446: crypto_hs, offset 0, length 177: 0800008900870000... 0ca9760b50541446: ack_ecn (nb=0), 1-2, ect0=0, ect1=2, ce=0 0ca9760b50541446: padding, 74 bytes 0ca9760b50541446: Out of 4 zero RTT packets, 1 were acked by the server. 0ca9760b50541446: Received 1024 bytes in 2.410299 seconds, 0.003399 Mbps. 0ca9760b50541446: Sent 17 bytes in 2.410299 seconds, 0.000056 Mbps.