0.000 Creating connection with server4:443 with v1 0.078 Setting up connection for downloading https://server4:443/horgonrypc at 33:20.838 on ClientConnection[6acc4d5d115105b4/0f94652aedb5c185(V1) with server4/193.167.100.100:443] 0.080 Original destination connection id: 6acc4d5d115105b4 (scid: 0f94652aedb5c185) >- CryptoStream[I|ClientHello] 0.229 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.430/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.224 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.430 loss detection timeout handler running Sending probe 0, because no ack since 0.224. Current RTT: 100/25. 0.431 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.432 (Probe is an initial retransmit) 0.434 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.834/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.434 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.473 <- (1) Packet I|0|L|483|3 Token=[] AckFrame[1|Δ0] Padding(311) CryptoFrame[0,123] 0.481 probe count not reset on ack because handshake not yet confirmed 0.485 Retransmitting CryptoFrame[0,257] on level Initial 0.486 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.886/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.486 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) 0.488 Cwnd(-): 6000; inflight: 0 0.489 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.889/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 0.507 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.735/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.507 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 0.473 <- (1) Packet H|0|L|746|1 CryptoFrame[0,703] 0.511 - unknown transport parameter 0x1a81, size 7 >- CryptoStream[H|Finished] 0.535 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.764/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.535 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.541 Starting downloading https://server4:443/horgonrypc at 33:21.317 on ClientConnection[6acc4d5d115105b4/0f94652aedb5c185(V1) with server4/193.167.100.100:443] 0.542 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 0.473 <- (1) Packet A|0|S0|0f94652aedb5c185|51|1 NewConnectionIdFrame[1,<0|5569cffd|8fab1564c31543ec5659de6558bf3f48] 0.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.671/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.558 Discarding pn space Initial because first Handshake message is being sent 0.570 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.684/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.570 -> Packet A|0|S0|9d619c73|49|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ16] 0.684 loss detection timeout handler running Sending probe 0, because no ack since 0.535. Current RTT: 38/19. 0.684 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.684 (Probe is a handshake retransmit) 0.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.913/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.685 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 0.716 <- (2) Packet A|2|S0|0f94652aedb5c185|33|1 AckFrame[0|Δ113] 0.718 probe count not reset on ack because handshake not yet confirmed 0.718 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.946/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.717 <- (3) Packet A|3|S0|0f94652aedb5c185|1053|1 StreamFrame[0(CIB),0,1024,fin] 0.721 Finished downloading https://server4:443/horgonrypc at 33:21.497 on ClientConnection[6acc4d5d115105b4/0f94652aedb5c185(V1) with server4/193.167.100.100:443] 0.723 Closing ClientConnection[6acc4d5d115105b4/0f94652aedb5c185(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.726 Creating connection with server4:443 with v1 0.727 Setting up connection for downloading https://server4:443/uewzrlnxme at 33:21.503 on ClientConnection[2f1be33f25e4aae5/05a78961b722a923(V1) with server4/193.167.100.100:443] 0.727 Original destination connection id: 2f1be33f25e4aae5 (scid: 05a78961b722a923) >- CryptoStream[I|ClientHello] 0.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.725 -> Packet A|1|S0|9d619c73|32|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ5] reschedule loss detection timer for PTO over 199 millis, based on 0.932/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.731 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.765 <- (1) Packet I|0|L|476|3 Token=[] AckFrame[0|Δ0] Padding(304) CryptoFrame[0,123] 0.766 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.966/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.765 <- (1) Packet H|0|L|753|1 CryptoFrame[0,710] 0.771 - unknown transport parameter 0x06a5, size 13 0.771 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.868/Handshake, because peerAwaitingAddressValidation | RTT:33/16 0.771 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.765 <- (1) Packet A|0|S0|05a78961b722a923|51|1 NewConnectionIdFrame[1,<0|3e105250|4415870dc1a33855f8c62b867ba402c3] 0.778 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.875/Handshake, because peerAwaitingAddressValidation | RTT:33/16 0.778 Discarding pn space Initial because first Handshake message is being sent 0.778 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.875/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.778 -> Packet H|0|L|76|1 CryptoFrame[0,36] 0.779 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 0.779 Starting downloading https://server4:443/uewzrlnxme at 33:21.556 on ClientConnection[2f1be33f25e4aae5/05a78961b722a923(V1) with server4/193.167.100.100:443] 0.780 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.877/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.780 -> Packet A|0|S0|74f4f5a1|49|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ1] 0.811 <- (2) Packet A|1|S0|05a78961b722a923|1366|2 Padding(1338) PingFrame[] 0.811 <- (3) Packet A|2|S0|05a78961b722a923|256|3 CryptoFrame[0,135] NewTokenFrame[efd2cf2b6642ce3888093d2de6cabd39d9c6e9022f8d5a62e2b54d339975f3a527d3bcf5f65a9fcfd6d89e36eb341500d18bc22c8b5ebca2620819112aab5d12d6faf76fcfb47e61e13f0c5abdbcc84530212dfe3a44] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 0.815 State is set to Confirmed reschedule loss detection timer for PTO over 60 millis, based on 0.875/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 88 millis, based on 0.903/App, because ackElicitingInFlight | RTT:33/16 0.815 Discarding pn space Handshake because HandshakeDone is received 0.811 <- (4) Packet A|3|S0|05a78961b722a923|32|1 AckFrame[0|Δ0] 0.815 -> Packet A|1|S0|74f4f5a1|28|1 AckFrame[2-0|Δ3] 0.816 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 0.812 <- (5) Packet A|4|S0|05a78961b722a923|1053|1 StreamFrame[0(CIB),0,1024,fin] 0.817 Finished downloading https://server4:443/uewzrlnxme at 33:21.594 on ClientConnection[2f1be33f25e4aae5/05a78961b722a923(V1) with server4/193.167.100.100:443] 0.817 Closing ClientConnection[2f1be33f25e4aae5/05a78961b722a923(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.818 -> Packet A|2|S0|74f4f5a1|31|2 ConnectionCloseFrame[0|0|] AckFrame[4-1|Δ0] 0.818 Creating connection with server4:443 with v1 0.818 Setting up connection for downloading https://server4:443/xxodkchfay at 33:21.595 on ClientConnection[a161bbe4925db704/85a99c9780d205d0(V1) with server4/193.167.100.100:443] 0.818 Original destination connection id: a161bbe4925db704 (scid: 85a99c9780d205d0) >- CryptoStream[I|ClientHello] 0.821 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.021/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.821 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.977 <- (6) Packet A|6|S0|05a78961b722a923|256|3 CryptoFrame[0,135] NewTokenFrame[efd2cf2b6642ce3888093d2de6cabd39d9c6e9022f8d5a62e2b54d339975f3a527d3bcf5f65a9fcfd6d89e36eb341500d18bc22c8b5ebca2620819112aab5d12d6faf76fcfb47e61e13f0c5abdbcc84530212dfe3a44] HandshakeDoneFrame[] 0.980 -> Packet A|3|S0|74f4f5a1|31|2 ConnectionCloseFrame[0|0|] AckFrame[4-1|Δ0] 1.020 loss detection timeout handler running Sending probe 0, because no ack since 0.821. Current RTT: 100/25. 1.021 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.021 (Probe is an initial retransmit) 1.022 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.422/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.021 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.056 <- (1) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 1.061 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.261/Handshake, because peerAwaitingAddressValidation | RTT:100/25 1.061 Discarding pn space Initial because first Handshake message is being sent 1.061 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 1.261/Handshake, because peerAwaitingAddressValidation | RTT:100/25 1.061 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1157) 1.260 loss detection timeout handler running 1.261 Sending probe 0. Current RTT: 100/25. 1.261 Sending probe because peer awaiting address validation 1.261 (Probe is a handshake ping) 1.262 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 1.662/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.262 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 1.293 <- (2) Packet H|1|L|756|2 AckFrame[0|Δ0] CryptoFrame[0,708] 1.294 probe count not reset on ack because handshake not yet confirmed 1.295 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.295 - unknown transport parameter 0x098d, size 12 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 181 millis, based on 1.480/Handshake, because ackElicitingInFlight | RTT:31/15 1.298 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.299 Starting downloading https://server4:443/xxodkchfay at 33:22.076 on ClientConnection[a161bbe4925db704/85a99c9780d205d0(V1) with server4/193.167.100.100:443] 1.294 <- (3) Packet H|2|L|751|1 CryptoFrame[0,708] 1.301 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 179 millis, based on 1.480/Handshake, because ackElicitingInFlight | RTT:31/15 1.300 -> [Packet H|2|L|42|1 AckFrame[1|Δ0], Packet A|0|S0|84b55705|43|1 StreamFrame[0(CIB),0,17,fin]] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.302 -> Packet H|3|L|42|1 AckFrame[2-1|Δ0] 1.329 <- (4) Packet A|2|S0|85a99c9780d205d0|280|4 NewTokenFrame[e70af3dec29baa797f52ed5f99fed6b20aec84235b1239cd799e6893aa0aa7df4169524b14ca9f11ea1047650c0e3821b2467bccac06ceb6f82be7684d957fc7106d6477913da2516ce9e4cf39198d15ede9a1e22929] NewConnectionIdFrame[1,<0|520b9143|7fd4c1c2665c7f928b14e383bf0c568c] CryptoFrame[0,135] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 1.331 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 1.480/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 86 millis, based on 1.417/App, because ackElicitingInFlight | RTT:31/15 1.331 Discarding pn space Handshake because HandshakeDone is received 1.331 <- (5) Packet A|4|S0|85a99c9780d205d0|1366|2 Padding(1338) PingFrame[] 1.332 -> Packet A|1|S0|84b55705|29|1 AckFrame[4,2|Δ0] 1.417 loss detection timeout handler running Sending probe 0, because no ack since 1.300. Current RTT: 31/15. 1.417 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 233 millis, based on 1.652/App, because ackElicitingInFlight | RTT:31/15 1.418 -> Packet PA|2|S0|84b55705|43|1 StreamFrame[0(CIB),0,17,fin] 1.450 <- (6) Packet A|7|S0|85a99c9780d205d0|1053|1 StreamFrame[0(CIB),0,1024,fin] 1.451 Finished downloading https://server4:443/xxodkchfay at 33:22.227 on ClientConnection[a161bbe4925db704/85a99c9780d205d0(V1) with server4/193.167.100.100:443] 1.451 Closing ClientConnection[a161bbe4925db704/85a99c9780d205d0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.452 Creating connection with server4:443 with v1 1.451 -> Packet A|3|S0|84b55705|35|2 ConnectionCloseFrame[0|0|] AckFrame[7,4,2|Δ0] 1.452 Setting up connection for downloading https://server4:443/dxowhutljj at 33:22.229 on ClientConnection[172eb6115f73c213/8e06ccabcd218b3a(V1) with server4/193.167.100.100:443] 1.452 Original destination connection id: 172eb6115f73c213 (scid: 8e06ccabcd218b3a) >- CryptoStream[I|ClientHello] 1.454 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.654/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.454 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.576 <- (7) Packet A|10|S0|85a99c9780d205d0|1053|1 StreamFrame[0(CIB),0,1024,fin] 1.577 -> Packet A|4|S0|84b55705|35|2 ConnectionCloseFrame[0|0|] AckFrame[7,4,2|Δ0] 1.577 <- (8) Packet A|11|S0|85a99c9780d205d0|1409|2 Padding(1381) PingFrame[] 1.578 -> Packet A|5|S0|84b55705|35|2 ConnectionCloseFrame[0|0|] AckFrame[7,4,2|Δ0] 1.653 loss detection timeout handler running Sending probe 0, because no ack since 1.454. Current RTT: 100/25. 1.654 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.654 (Probe is an initial retransmit) 1.655 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.055/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.654 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.688 <- (1) Packet I|0|L|489|3 Token=[] AckFrame[1|Δ0] Padding(317) CryptoFrame[0,123] 1.689 probe count not reset on ack because handshake not yet confirmed 1.689 Retransmitting CryptoFrame[0,257] on level Initial 1.689 Cwnd(-): 6000; inflight: 0 1.689 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.089/Initial, because peerAwaitingAddressValidation | RTT:100/25 1.690 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 1.884/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.690 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 1.688 <- (1) Packet H|0|L|740|1 CryptoFrame[0,697] 1.693 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.693 - unknown transport parameter 0x1d4a, size 1 reschedule loss detection timer for PTO over 193 millis, based on 1.887/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.693 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 1.696 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.890/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.696 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.697 Starting downloading https://server4:443/dxowhutljj at 33:22.473 on ClientConnection[172eb6115f73c213/8e06ccabcd218b3a(V1) with server4/193.167.100.100:443] 1.697 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 1.688 <- (1) Packet A|0|S0|8e06ccabcd218b3a|51|1 NewConnectionIdFrame[1,<0|da68bc70|8988fa4d777913d37f0ee69d412b5638] 1.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.794/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.697 Discarding pn space Initial because first Handshake message is being sent 1.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.795/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.697 -> Packet A|0|S0|4f6088e0|43|1 StreamFrame[0(CIB),0,17,fin] 1.717 -> Packet A|1|S0|4f6088e0|28|1 AckFrame[0|Δ19] 1.727 <- (2) Packet A|1|S0|8e06ccabcd218b3a|259|3 HandshakeDoneFrame[] NewTokenFrame[a3c3a91630075d15b7cd6db200458dc48d47ac42c2fb6aa89d9dc3a9c7de4b8e3a2aef66fff1467d5dc54b41c30d9ff9b22f0f62fdb8727c733229f9a67627bb8b5abcc0821cf254d488e89fb81e94d3bb5d9758b1eb] CryptoFrame[0,138] 1.728 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 1.793/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 1.820/App, because ackElicitingInFlight | RTT:33/16 1.728 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 1.748 -> Packet A|2|S0|4f6088e0|28|1 AckFrame[1-0|Δ19] 1.820 loss detection timeout handler running Sending probe 0, because no ack since 1.697. Current RTT: 33/16. 1.821 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 2.067/App, because ackElicitingInFlight | RTT:33/16 1.821 -> Packet PA|3|S0|4f6088e0|43|1 StreamFrame[0(CIB),0,17,fin] 2.066 loss detection timeout handler running Sending probe 1, because no ack since 1.821. Current RTT: 33/16. 2.067 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 2.559/App, because ackElicitingInFlight | RTT:33/16 2.067 -> Packet PA|4|S0|4f6088e0|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 2.560/App, because ackElicitingInFlight | RTT:33/16 2.068 -> Packet PA|5|S0|4f6088e0|43|1 StreamFrame[0(CIB),0,17,fin] 2.100 <- (3) Packet A|4|S0|8e06ccabcd218b3a|1053|1 StreamFrame[0(CIB),0,1024,fin] 2.101 Finished downloading https://server4:443/dxowhutljj at 33:22.877 on ClientConnection[172eb6115f73c213/8e06ccabcd218b3a(V1) with server4/193.167.100.100:443] 2.101 Closing ClientConnection[172eb6115f73c213/8e06ccabcd218b3a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.101 Creating connection with server4:443 with v1 2.101 -> Packet A|6|S0|4f6088e0|33|2 ConnectionCloseFrame[0|0|] AckFrame[4,1-0|Δ0] 2.102 Setting up connection for downloading https://server4:443/xawuhreiqn at 33:22.879 on ClientConnection[d3e0fd83e36b66c6/883d4e73eab521e5(V1) with server4/193.167.100.100:443] 2.102 Original destination connection id: d3e0fd83e36b66c6 (scid: 883d4e73eab521e5) >- CryptoStream[I|ClientHello] 2.104 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.304/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.104 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.124 <- (4) Packet A|5|S0|8e06ccabcd218b3a|35|1 AckFrame[5-4,2|Δ25] 2.124 -> Packet A|7|S0|4f6088e0|33|2 ConnectionCloseFrame[0|0|] AckFrame[4,1-0|Δ0] 2.138 <- (1) Packet I|0|L|481|3 Token=[] AckFrame[0|Δ0] Padding(309) CryptoFrame[0,123] 2.138 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.339/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.138 <- (1) Packet H|0|L|748|1 CryptoFrame[0,705] 2.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.240/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.143 - unknown transport parameter 0x1e80, size 9 2.143 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 2.146 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.243/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.146 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.147 Starting downloading https://server4:443/xawuhreiqn at 33:22.923 on ClientConnection[d3e0fd83e36b66c6/883d4e73eab521e5(V1) with server4/193.167.100.100:443] 2.138 <- (1) Packet A|0|S0|883d4e73eab521e5|51|1 NewConnectionIdFrame[1,<0|264d8d12|54250b847a00afe43487738319a50fbc] 2.147 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.244/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.147 Discarding pn space Initial because first Handshake message is being sent 2.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.245/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.147 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|1ea433db|43|1 StreamFrame[0(CIB),0,17,fin]] 2.167 -> Packet A|1|S0|1ea433db|28|1 AckFrame[0|Δ19] 2.234 <- (5) Packet A|7|S0|8e06ccabcd218b3a|1053|1 StreamFrame[0(CIB),0,1024,fin] 2.235 -> Packet A|8|S0|4f6088e0|33|2 ConnectionCloseFrame[0|0|] AckFrame[4,1-0|Δ0] 2.235 <- (6) Packet A|8|S0|8e06ccabcd218b3a|1053|1 StreamFrame[0(CIB),0,1024,fin] 2.244 loss detection timeout handler running Sending probe 0, because no ack since 2.146. Current RTT: 33/16. 2.244 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.244 (Probe is a handshake retransmit) 2.244 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.438/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.244 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 2.275 <- (2) Packet A|2|S0|883d4e73eab521e5|283|4 CryptoFrame[0,138] NewTokenFrame[71f74778ba69421c25048af64ec098b064c3d0b2b10340adc0671788b4e38a2e7500f380a12c22c4d109eea6273ac30b1a505bf2e7a917e60f7ce0396529044167f4913151570a87cd4ba87fa836828e76c368040dbf] NewConnectionIdFrame[1,<0|264d8d12|54250b847a00afe43487738319a50fbc] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 2.277 State is set to Confirmed reschedule loss detection timer for PTO over 116 millis, based on 2.393/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 2.270/App, because ackElicitingInFlight | RTT:33/16 2.277 loss detection timeout handler running 2.277 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 2.147. Current RTT: 33/16. 2.277 (Probe is retransmit on level App) 2.276 <- (3) Packet A|4|S0|883d4e73eab521e5|33|1 AckFrame[1-0|Δ77] reschedule loss detection timer for PTO over 122 millis, based on 2.401/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 122 millis, based on 2.401/App, because ackElicitingInFlight | RTT:33/16 2.278 -> Packet PA|2|S0|1ea433db|43|1 StreamFrame[0(CIB),0,17,fin] 2.297 -> Packet A|3|S0|1ea433db|30|1 AckFrame[4,2|Δ19] 2.334 <- (4) Packet A|6|S0|883d4e73eab521e5|33|1 AckFrame[3-0|Δ6] 2.335 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.524 <- (5) Packet A|9|S0|883d4e73eab521e5|1053|1 StreamFrame[0(CIB),0,1024,fin] 2.525 Finished downloading https://server4:443/xawuhreiqn at 33:23.302 on ClientConnection[d3e0fd83e36b66c6/883d4e73eab521e5(V1) with server4/193.167.100.100:443] 2.525 Closing ClientConnection[d3e0fd83e36b66c6/883d4e73eab521e5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.525 <- (6) Packet A|10|S0|883d4e73eab521e5|1366|2 Padding(1338) PingFrame[] 2.526 Creating connection with server4:443 with v1 2.525 -> Packet A|4|S0|1ea433db|33|2 ConnectionCloseFrame[0|0|] AckFrame[9,6|Δ0] 2.526 -> Packet A|5|S0|1ea433db|33|2 ConnectionCloseFrame[0|0|] AckFrame[9,6|Δ0] 2.526 Setting up connection for downloading https://server4:443/bsyaikubgk at 33:23.303 on ClientConnection[78298daee41986d5/e556843bc61f5198(V1) with server4/193.167.100.100:443] 2.526 Original destination connection id: 78298daee41986d5 (scid: e556843bc61f5198) >- CryptoStream[I|ClientHello] 2.528 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.728/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.528 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.727 loss detection timeout handler running Sending probe 0, because no ack since 2.528. Current RTT: 100/25. 2.728 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.728 (Probe is an initial retransmit) 2.728 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.128/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.728 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.760 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 2.760 probe count not reset on ack because handshake not yet confirmed 2.761 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.161/Initial, because peerAwaitingAddressValidation | RTT:100/25 2.762 <- (2) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 2.765 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 2.856/Handshake, because peerAwaitingAddressValidation | RTT:31/15 2.765 Discarding pn space Initial because first Handshake message is being sent 2.766 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 2.857/Handshake, because peerAwaitingAddressValidation | RTT:31/15 2.765 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1157) 2.767 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.856 loss detection timeout handler running 2.856 Sending probe 0. Current RTT: 31/15. 2.856 Sending probe because peer awaiting address validation 2.856 (Probe is a handshake ping) 2.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 3.039/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 2.857 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 2.888 <- (4) Packet H|1|L|749|2 AckFrame[0|Δ0] CryptoFrame[0,701] 2.888 probe count not reset on ack because handshake not yet confirmed 2.889 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.889 - unknown transport parameter 0x0930, size 3 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 149 millis, based on 3.041/Handshake, because ackElicitingInFlight | RTT:31/11 2.891 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.892 Starting downloading https://server4:443/bsyaikubgk at 33:23.669 on ClientConnection[78298daee41986d5/e556843bc61f5198(V1) with server4/193.167.100.100:443] 2.888 <- (5) Packet H|2|L|744|1 CryptoFrame[0,701] 2.893 -> Packet H|2|L|42|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.893 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 148 millis, based on 3.041/Handshake, because ackElicitingInFlight | RTT:31/11 2.893 -> Packet A|0|S0|0aa67f8a|43|1 StreamFrame[0(CIB),0,17,fin] 2.893 -> Packet H|3|L|42|1 AckFrame[2-1|Δ0] 2.923 <- (6) Packet A|2|S0|e556843bc61f5198|280|4 NewTokenFrame[eb31a50305a1bb10cf81533b872538df7b274a0e87e2611d4c8f3b827e5d59624882b92b0b77c91093a28844b0ebb6264d03e1879004d67578e095c6710ff40a104784596156857f6bee5ff037c0896c93dba0d2c5c0] NewConnectionIdFrame[1,<0|1106bd7e|8709d0bdb90650ab58ce8e0045e2715c] HandshakeDoneFrame[] CryptoFrame[0,135] 2.923 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 3.041/Handshake, because ackElicitingInFlight | RTT:31/11 reschedule loss detection timer for PTO over 70 millis, based on 2.994/App, because ackElicitingInFlight | RTT:31/11 2.924 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 2.923 <- (7) Packet A|3|S0|e556843bc61f5198|280|4 NewConnectionIdFrame[1,<0|1106bd7e|8709d0bdb90650ab58ce8e0045e2715c] NewTokenFrame[eb31a50305a1bb10cf81533b872538df7b274a0e87e2611d4c8f3b827e5d59624882b92b0b77c91093a28844b0ebb6264d03e1879004d67578e095c6710ff40a104784596156857f6bee5ff037c0896c93dba0d2c5c0] HandshakeDoneFrame[] CryptoFrame[0,135] -< CryptoStream[A|NewSessionTicket] 2.925 -> Packet A|1|S0|0aa67f8a|27|1 AckFrame[3-2|Δ0] 2.994 loss detection timeout handler running Sending probe 0, because no ack since 2.893. Current RTT: 31/11. 2.994 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 201 millis, based on 3.196/App, because ackElicitingInFlight | RTT:31/11 2.994 -> Packet PA|2|S0|0aa67f8a|43|1 StreamFrame[0(CIB),0,17,fin] 3.196 loss detection timeout handler running Sending probe 1, because no ack since 2.994. Current RTT: 31/11. 3.196 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 403 millis, based on 3.600/App, because ackElicitingInFlight | RTT:31/11 3.196 -> Packet PA|3|S0|0aa67f8a|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 403 millis, based on 3.601/App, because ackElicitingInFlight | RTT:31/11 3.197 -> Packet PA|4|S0|0aa67f8a|43|1 StreamFrame[0(CIB),0,17,fin] 3.228 <- (8) Packet A|5|S0|e556843bc61f5198|32|1 AckFrame[4|Δ0] 3.229 Cwnd(-): 6000; inflight: 43 3.229 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 3.229 <- (9) Packet A|6|S0|e556843bc61f5198|1053|1 StreamFrame[0(CIB),0,1024,fin] 3.229 -> Packet A|5|S0|0aa67f8a|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3-2|Δ0] 3.229 loss detection timeout handler running 3.230 loss detection timeout handler running 3.230 loss detection timeout handler running 3.230 Finished downloading https://server4:443/bsyaikubgk at 33:24.006 on ClientConnection[78298daee41986d5/e556843bc61f5198(V1) with server4/193.167.100.100:443] 3.230 loss detection timeout handler running 3.230 Closing ClientConnection[78298daee41986d5/e556843bc61f5198(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.230 loss detection timeout handler running reschedule loss detection timer for PTO over 92 millis, based on 3.322/App, because ackElicitingInFlight | RTT:31/9 3.230 Creating connection with server4:443 with v1 3.230 -> Packet A|6|S0|0aa67f8a|33|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3-2|Δ0] 3.231 Setting up connection for downloading https://server4:443/xrulxfjgga at 33:24.008 on ClientConnection[bd370005c3efa281/901f763604c8bcf0(V1) with server4/193.167.100.100:443] 3.231 Original destination connection id: bd370005c3efa281 (scid: 901f763604c8bcf0) >- CryptoStream[I|ClientHello] 3.233 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.433/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.233 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.435 loss detection timeout handler running Sending probe 0, because no ack since 3.233. Current RTT: 100/25. 3.435 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.435 (Probe is an initial retransmit) 3.436 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.836/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.436 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.467 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 3.471 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.671/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.471 Discarding pn space Initial because first Handshake message is being sent 3.471 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.671/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.471 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 3.667 <- (2) Packet H|1|L|748|1 CryptoFrame[0,705] 3.667 - unknown transport parameter 0x192c, size 8 >- CryptoStream[H|Finished] 3.670 loss detection timeout handler running 3.670 Sending probe 0. Current RTT: 100/25. 3.670 Sending probe because peer awaiting address validation 3.670 (Probe is a handshake ping) 3.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.071/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.670 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.671 Starting downloading https://server4:443/xrulxfjgga at 33:24.448 on ClientConnection[bd370005c3efa281/901f763604c8bcf0(V1) with server4/193.167.100.100:443] 3.667 <- (3) Packet H|2|L|748|1 CryptoFrame[0,705] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.072/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.672 -> Packet PH|1|L|40|2 PingFrame[] Padding(2) 3.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.072/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.672 -> [Packet H|2|L|42|1 AckFrame[2-1|Δ0], Packet A|0|S0|2365c7b7|43|1 StreamFrame[0(CIB),0,17,fin]] 3.702 <- (4) Packet A|2|S0|901f763604c8bcf0|280|4 CryptoFrame[0,135] NewConnectionIdFrame[1,<0|d29edec9|4d74facf382943cd11e7c64e98608638] HandshakeDoneFrame[] NewTokenFrame[52c6e7d80202ce0542f388b4f4c256476433ed04da9b6c1889597b5fbb8a72027c6d561efc32b832986a5433464f9bebb0692c2125d54d97499f6e97fbc4f7a17b7be89693d1bf46998d80721c7bfc7e9bc713ad2e59] -< CryptoStream[A|NewSessionTicket] 3.703 State is set to Confirmed reschedule loss detection timer for PTO over 368 millis, based on 4.072/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 195 millis, based on 3.898/App, because ackElicitingInFlight | RTT:100/25 3.703 Discarding pn space Handshake because HandshakeDone is received 3.703 <- (5) Packet A|4|S0|901f763604c8bcf0|1366|2 Padding(1338) PingFrame[] 3.704 -> Packet A|1|S0|2365c7b7|29|1 AckFrame[4,2|Δ0] 3.739 <- (6) Packet A|5|S0|901f763604c8bcf0|280|4 CryptoFrame[0,135] NewConnectionIdFrame[1,<0|d29edec9|4d74facf382943cd11e7c64e98608638] NewTokenFrame[52c6e7d80202ce0542f388b4f4c256476433ed04da9b6c1889597b5fbb8a72027c6d561efc32b832986a5433464f9bebb0692c2125d54d97499f6e97fbc4f7a17b7be89693d1bf46998d80721c7bfc7e9bc713ad2e59] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 3.759 -> Packet A|2|S0|2365c7b7|30|1 AckFrame[5-4,2|Δ19] 3.863 <- (7) Packet A|7|S0|901f763604c8bcf0|280|4 NewConnectionIdFrame[1,<0|d29edec9|4d74facf382943cd11e7c64e98608638] CryptoFrame[0,135] HandshakeDoneFrame[] NewTokenFrame[52c6e7d80202ce0542f388b4f4c256476433ed04da9b6c1889597b5fbb8a72027c6d561efc32b832986a5433464f9bebb0692c2125d54d97499f6e97fbc4f7a17b7be89693d1bf46998d80721c7bfc7e9bc713ad2e59] -< CryptoStream[A|NewSessionTicket] 3.884 -> Packet A|3|S0|2365c7b7|32|1 AckFrame[7,5-4,2|Δ19] 3.898 loss detection timeout handler running Sending probe 0, because no ack since 3.672. Current RTT: 100/25. 3.898 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 451 millis, based on 4.350/App, because ackElicitingInFlight | RTT:100/25 3.898 -> Packet PA|4|S0|2365c7b7|43|1 StreamFrame[0(CIB),0,17,fin] 3.929 <- (8) Packet A|10|S0|901f763604c8bcf0|34|1 AckFrame[4-3,1|Δ0] 3.930 Cwnd(-): 6000; inflight: 0 3.930 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 3.930 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 115 millis, based on 4.046/App, because ackElicitingInFlight | RTT:30/15 3.930 -> Packet A|5|S0|2365c7b7|43|1 StreamFrame[0(CIB),0,17,fin] 3.930 <- (9) Packet A|11|S0|901f763604c8bcf0|1053|1 StreamFrame[0(CIB),0,1024,fin] 3.931 Finished downloading https://server4:443/xrulxfjgga at 33:24.707 on ClientConnection[bd370005c3efa281/901f763604c8bcf0(V1) with server4/193.167.100.100:443] 3.931 Closing ClientConnection[bd370005c3efa281/901f763604c8bcf0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.932 Creating connection with server4:443 with v1 3.931 -> Packet A|6|S0|2365c7b7|31|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 3.932 Setting up connection for downloading https://server4:443/lhqbdbyxgw at 33:24.709 on ClientConnection[b17cae4f2bbb14a9/1023a71d67dbddf3(V1) with server4/193.167.100.100:443] 3.932 Original destination connection id: b17cae4f2bbb14a9 (scid: 1023a71d67dbddf3) >- CryptoStream[I|ClientHello] 3.934 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.134/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.933 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.967 <- (1) Packet I|0|L|478|3 Token=[] AckFrame[0|Δ0] Padding(306) CryptoFrame[0,123] 3.968 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.168/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.967 <- (1) Packet H|0|L|751|1 CryptoFrame[0,708] 3.971 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.971 - unknown transport parameter 0x094f, size 12 reschedule loss detection timer for PTO over 96 millis, based on 4.068/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.971 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 3.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.071/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.974 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.974 Starting downloading https://server4:443/lhqbdbyxgw at 33:24.751 on ClientConnection[b17cae4f2bbb14a9/1023a71d67dbddf3(V1) with server4/193.167.100.100:443] 3.974 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 3.967 <- (1) Packet A|0|S0|1023a71d67dbddf3|51|1 NewConnectionIdFrame[1,<0|daa1afdb|484f9c538a2997e050dd121892900c74] 3.975 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.072/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.975 Discarding pn space Initial because first Handshake message is being sent 3.975 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.072/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.975 -> Packet A|0|S0|f3e99ee5|43|1 StreamFrame[0(CIB),0,17,fin] 3.994 -> Packet A|1|S0|f3e99ee5|28|1 AckFrame[0|Δ19] 4.071 loss detection timeout handler running Sending probe 0, because no ack since 3.974. Current RTT: 33/16. 4.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.071 (Probe is a handshake retransmit) 4.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.266/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.071 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 4.103 <- (2) Packet A|3|S0|1023a71d67dbddf3|283|4 NewTokenFrame[f2dbac71e957df38860c61bed765ca276eff881caf7fe1962009d46e738dbe45607e2b9e96a819a13504ca342e355015e7b194831de7896038410454955a236cd46fcbca8eb69f637ea48cd81a8562157fbf5f2343f6] NewConnectionIdFrame[1,<0|daa1afdb|484f9c538a2997e050dd121892900c74] CryptoFrame[0,138] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 4.104 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 4.221/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 4.098/App, because ackElicitingInFlight | RTT:33/16 4.104 loss detection timeout handler running 4.104 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 3.975. Current RTT: 33/16. 4.104 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 4.350/App, because ackElicitingInFlight | RTT:33/16 4.104 -> Packet PA|2|S0|f3e99ee5|43|1 StreamFrame[0(CIB),0,17,fin] 4.124 -> Packet A|3|S0|f3e99ee5|30|1 AckFrame[3,0|Δ19] 4.227 <- (3) Packet A|7|S0|1023a71d67dbddf3|1053|1 StreamFrame[0(CIB),0,1024,fin] 4.228 Finished downloading https://server4:443/lhqbdbyxgw at 33:25.004 on ClientConnection[b17cae4f2bbb14a9/1023a71d67dbddf3(V1) with server4/193.167.100.100:443] 4.228 Closing ClientConnection[b17cae4f2bbb14a9/1023a71d67dbddf3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.228 <- (4) Packet A|8|S0|1023a71d67dbddf3|1053|1 StreamFrame[0(CIB),0,1024,fin] 4.228 -> Packet A|4|S0|f3e99ee5|39|3 ConnectionCloseFrame[0|0|] AckFrame[7,3,0|Δ0] ConnectionCloseFrame[0|0|] 4.228 Creating connection with server4:443 with v1 4.229 Setting up connection for downloading https://server4:443/yuwntlzukd at 33:25.006 on ClientConnection[4a21a9b22a527164/df5ff439d3b254e8(V1) with server4/193.167.100.100:443] 4.229 Original destination connection id: 4a21a9b22a527164 (scid: df5ff439d3b254e8) >- CryptoStream[I|ClientHello] 4.231 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.431/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.231 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.265 <- (1) Packet I|0|L|484|3 Token=[] AckFrame[0|Δ0] Padding(312) CryptoFrame[0,123] 4.265 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.465/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.265 <- (1) Packet H|0|L|745|1 CryptoFrame[0,702] 4.268 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.365/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.268 - unknown transport parameter 0x12a2, size 4 4.268 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 4.271 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.368/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.271 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.271 Starting downloading https://server4:443/yuwntlzukd at 33:25.048 on ClientConnection[4a21a9b22a527164/df5ff439d3b254e8(V1) with server4/193.167.100.100:443] 4.271 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 4.265 <- (1) Packet A|0|S0|df5ff439d3b254e8|51|1 NewConnectionIdFrame[1,<0|95fe10fb|89b6285e22c355cb25d0c860d1f22d74] 4.272 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.369/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.272 Discarding pn space Initial because first Handshake message is being sent 4.272 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.369/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.272 -> Packet A|0|S0|2d394322|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 4.302 <- (2) Packet A|1|S0|df5ff439d3b254e8|259|3 CryptoFrame[0,138] NewTokenFrame[20381f0e5ffd36471fb8191ef8e1a4d4c9076e731e7406f0b89500307aef0d45f1a5f17d58c66ed61677d29e0931a31536914cb00e3c31f6527684c014283c5359d34ade00e4e3702c5818441d20c64016d3e9f7beca] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 4.303 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 4.368/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 4.395/App, because ackElicitingInFlight | RTT:33/16 4.303 Discarding pn space Handshake because HandshakeDone is received 4.303 <- (3) Packet A|2|S0|df5ff439d3b254e8|32|1 AckFrame[0|Δ0] 4.304 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.304 <- (4) Packet A|3|S0|df5ff439d3b254e8|1053|1 StreamFrame[0(CIB),0,1024,fin] 4.305 -> Packet A|1|S0|2d394322|28|1 AckFrame[3-1|Δ1] 4.305 Finished downloading https://server4:443/yuwntlzukd at 33:25.081 on ClientConnection[4a21a9b22a527164/df5ff439d3b254e8(V1) with server4/193.167.100.100:443] 4.305 Closing ClientConnection[4a21a9b22a527164/df5ff439d3b254e8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.305 -> Packet A|2|S0|2d394322|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 4.306 Creating connection with server4:443 with v1 4.306 Setting up connection for downloading https://server4:443/woystjcxnt at 33:25.083 on ClientConnection[6858aa364c8d44a8/044e8681394dc0c7(V1) with server4/193.167.100.100:443] 4.306 Original destination connection id: 6858aa364c8d44a8 (scid: 044e8681394dc0c7) >- CryptoStream[I|ClientHello] 4.308 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.508/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.308 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.507 loss detection timeout handler running Sending probe 0, because no ack since 4.308. Current RTT: 100/25. 4.508 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.508 (Probe is an initial retransmit) 4.508 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.908/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.508 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.542 <- (1) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 4.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.746/Handshake, because peerAwaitingAddressValidation | RTT:100/25 4.546 Discarding pn space Initial because first Handshake message is being sent 4.546 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 4.746/Handshake, because peerAwaitingAddressValidation | RTT:100/25 4.546 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1157) 4.742 <- (3) Packet H|1|L|745|1 CryptoFrame[0,702] 4.743 - unknown transport parameter 0x01ec, size 5 4.745 loss detection timeout handler running 4.745 Sending probe 0. Current RTT: 100/25. 4.745 Sending probe because peer awaiting address validation 4.745 (Probe is a handshake ping) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.746 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 5.146/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.746 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 4.747 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 5.147/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.747 Starting downloading https://server4:443/woystjcxnt at 33:25.524 on ClientConnection[6858aa364c8d44a8/044e8681394dc0c7(V1) with server4/193.167.100.100:443] 4.747 -> Packet H|1|L|81|2 AckFrame[1|Δ0] CryptoFrame[0,36] 4.747 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 5.148/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.747 -> Packet A|0|S0|c4cfbc2a|43|1 StreamFrame[0(CIB),0,17,fin] 4.943 <- (4) Packet H|4|L|745|1 CryptoFrame[0,702] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.944 -> Packet H|2|L|44|1 AckFrame[4,1|Δ0] 5.147 loss detection timeout handler running Sending probe 1, because no ack since 4.747. Current RTT: 100/25. 5.147 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.147 (Probe is a handshake retransmit) 5.147 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 5.947/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.147 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 5.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 5.948/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.148 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 5.179 <- (5) Packet A|2|S0|044e8681394dc0c7|280|4 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|70de38fd|79f6eabaef59b6c342143482487c7131] CryptoFrame[0,135] NewTokenFrame[2f57bf39f0840f6317d9466ae7e4e87ab2856626a0f4bc56f7365d0015b7464a60e357afee1660473e016ac2ccac5e89332f75d9392c86b679340a0b50351fe63779da54dec8c4ea92f67a65651bef68c95bfeba8376] 5.179 State is set to Confirmed reschedule loss detection timer for PTO over 472 millis, based on 5.651/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -206 millis, based on 4.973/App, because ackElicitingInFlight | RTT:100/25 5.179 loss detection timeout handler running 5.180 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 4.747. Current RTT: 100/25. 5.180 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 451 millis, based on 5.632/App, because ackElicitingInFlight | RTT:100/25 5.180 -> Packet PA|1|S0|c4cfbc2a|43|1 StreamFrame[0(CIB),0,17,fin] 5.179 <- (6) Packet A|3|S0|044e8681394dc0c7|280|4 CryptoFrame[0,135] HandshakeDoneFrame[] NewTokenFrame[2f57bf39f0840f6317d9466ae7e4e87ab2856626a0f4bc56f7365d0015b7464a60e357afee1660473e016ac2ccac5e89332f75d9392c86b679340a0b50351fe63779da54dec8c4ea92f67a65651bef68c95bfeba8376] NewConnectionIdFrame[1,<0|70de38fd|79f6eabaef59b6c342143482487c7131] -< CryptoStream[A|NewSessionTicket] 5.180 -> Packet A|2|S0|c4cfbc2a|27|1 AckFrame[3-2|Δ0] 5.180 <- (7) Packet A|4|S0|044e8681394dc0c7|1366|2 Padding(1338) PingFrame[] 5.200 -> Packet A|3|S0|c4cfbc2a|28|1 AckFrame[4-2|Δ19] 5.212 <- (8) Packet A|6|S0|044e8681394dc0c7|1053|1 StreamFrame[0(CIB),0,1024,fin] 5.212 Finished downloading https://server4:443/woystjcxnt at 33:25.989 on ClientConnection[6858aa364c8d44a8/044e8681394dc0c7(V1) with server4/193.167.100.100:443] 5.212 Closing ClientConnection[6858aa364c8d44a8/044e8681394dc0c7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.213 Creating connection with server4:443 with v1 5.213 -> Packet A|4|S0|c4cfbc2a|33|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-2|Δ0] 5.213 Setting up connection for downloading https://server4:443/zdcvhlomgp at 33:25.990 on ClientConnection[45c3ebbab72cebf4/7b97af7592aabcb5(V1) with server4/193.167.100.100:443] 5.213 Original destination connection id: 45c3ebbab72cebf4 (scid: 7b97af7592aabcb5) >- CryptoStream[I|ClientHello] 5.215 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.415/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.215 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.414 loss detection timeout handler running Sending probe 0, because no ack since 5.215. Current RTT: 100/25. 5.414 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.414 (Probe is an initial retransmit) 5.415 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.815/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.415 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.814 loss detection timeout handler running Sending probe 1, because no ack since 5.415. Current RTT: 100/25. 5.815 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.815 (Probe is an initial retransmit) 5.815 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.615/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.815 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.816 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.616/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.816 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.850 <- (1) Packet I|0|L|488|3 Token=[] AckFrame[3|Δ0] Padding(316) CryptoFrame[0,123] 5.850 probe count not reset on ack because handshake not yet confirmed 5.851 Retransmitting CryptoFrame[0,257] on level Initial 5.851 Cwnd(-): 6000; inflight: 1200 5.851 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 5.850 <- (1) Packet H|0|L|741|1 CryptoFrame[0,698] 5.854 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 5.854 - unknown transport parameter 0x139a, size 1 >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.857 Starting downloading https://server4:443/zdcvhlomgp at 33:26.633 on ClientConnection[45c3ebbab72cebf4/7b97af7592aabcb5(V1) with server4/193.167.100.100:443] 5.850 <- (1) Packet A|0|S0|7b97af7592aabcb5|51|1 NewConnectionIdFrame[1,<0|ba5d5bcc|9673df7f79c80d45ceb36f28e3d17222] 5.857 -> Packet H|0|L|76|1 CryptoFrame[0,36] 5.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.954/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.857 Discarding pn space Initial because first Handshake message is being sent 5.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.954/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.857 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|19b8a847|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 5.883 Discarding packet (45 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.954 loss detection timeout handler running Sending probe 0, because no ack since 5.857. Current RTT: 33/16. 5.954 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.954 (Probe is a handshake retransmit) 5.954 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.148/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.954 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 6.147 loss detection timeout handler running Sending probe 1, because no ack since 5.857. Current RTT: 33/16. 6.147 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.147 (Probe is a handshake retransmit) 6.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.536/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.148 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 6.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 6.537/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.149 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 6.180 <- (3) Packet A|2|S0|7b97af7592aabcb5|283|4 NewConnectionIdFrame[1,<0|ba5d5bcc|9673df7f79c80d45ceb36f28e3d17222] HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[f16ed329e06481d13ee43404d7c6f3cc4df10f6d6b0e0252ed6a5c48075cd66bc4c56b7a8124f5999a3c45d5cf1ed61fac5ab8a2eb68439e9616cf26d1a1cff5f6db5b9500dd134a39c3b150ce08147c7ee374ad943a] 6.181 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 6.349/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -200 millis, based on 5.980/App, because ackElicitingInFlight | RTT:33/16 6.181 loss detection timeout handler running 6.181 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 5.857. Current RTT: 33/16. 6.181 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] 6.180 <- (4) Packet A|4|S0|7b97af7592aabcb5|35|1 AckFrame[0|Δ291] reschedule loss detection timer for PTO over 245 millis, based on 6.427/App, because ackElicitingInFlight | RTT:33/16 6.181 -> Packet PA|1|S0|19b8a847|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 122 millis, based on 6.304/App, because ackElicitingInFlight | RTT:33/16 6.181 <- (5) Packet A|5|S0|7b97af7592aabcb5|1053|1 StreamFrame[0(CIB),0,1024,fin] 6.182 -> Packet A|2|S0|19b8a847|29|1 AckFrame[5-4,2|Δ0] 6.182 Finished downloading https://server4:443/zdcvhlomgp at 33:26.959 on ClientConnection[45c3ebbab72cebf4/7b97af7592aabcb5(V1) with server4/193.167.100.100:443] 6.182 Closing ClientConnection[45c3ebbab72cebf4/7b97af7592aabcb5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.182 -> Packet A|3|S0|19b8a847|33|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 6.183 Creating connection with server4:443 with v1 6.183 Setting up connection for downloading https://server4:443/wyivsmreyu at 33:26.960 on ClientConnection[33b7d5f464d93c86/5c08e833c93581a9(V1) with server4/193.167.100.100:443] 6.183 Original destination connection id: 33b7d5f464d93c86 (scid: 5c08e833c93581a9) >- CryptoStream[I|ClientHello] 6.185 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.385/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.185 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.218 <- (1) Packet I|0|L|485|3 Token=[] AckFrame[0|Δ0] Padding(313) CryptoFrame[0,123] 6.219 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.419/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.218 <- (1) Packet H|0|L|744|1 CryptoFrame[0,701] 6.221 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.318/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.222 - unknown transport parameter 0x0550, size 5 6.221 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 6.224 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.321/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.224 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.224 Starting downloading https://server4:443/wyivsmreyu at 33:27.001 on ClientConnection[33b7d5f464d93c86/5c08e833c93581a9(V1) with server4/193.167.100.100:443] 6.224 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 6.218 <- (1) Packet A|0|S0|5c08e833c93581a9|51|1 NewConnectionIdFrame[1,<0|6388107d|fb92914eccd89a14d0a6f1106444cce2] 6.225 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.225 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.322/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 6.322/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.225 Discarding pn space Initial because first Handshake message is being sent 6.225 -> Packet A|0|S0|118457c9|43|1 StreamFrame[0(CIB),0,17,fin] 6.244 -> Packet A|1|S0|118457c9|28|1 AckFrame[0|Δ19] 6.256 <- (2) Packet A|3|S0|5c08e833c93581a9|1053|1 StreamFrame[0(CIB),0,1024,fin] 6.257 Finished downloading https://server4:443/wyivsmreyu at 33:27.034 on ClientConnection[33b7d5f464d93c86/5c08e833c93581a9(V1) with server4/193.167.100.100:443] 6.257 Closing ClientConnection[33b7d5f464d93c86/5c08e833c93581a9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.258 Creating connection with server4:443 with v1 6.258 -> Packet A|2|S0|118457c9|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 6.258 Setting up connection for downloading https://server4:443/ozdyhzxdqx at 33:27.035 on ClientConnection[c86aa4d394ed20ee/cdee62edbd4acf98(V1) with server4/193.167.100.100:443] 6.258 Original destination connection id: c86aa4d394ed20ee (scid: cdee62edbd4acf98) >- CryptoStream[I|ClientHello] 6.260 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.460/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.259 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.293 <- (1) Packet I|0|L|479|3 Token=[] AckFrame[0|Δ0] Padding(307) CryptoFrame[0,123] 6.294 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.494/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.293 <- (1) Packet H|0|L|750|1 CryptoFrame[0,707] 6.297 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.297 - unknown transport parameter 0x0930, size 9 reschedule loss detection timer for PTO over 96 millis, based on 6.394/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.297 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 6.299 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.396/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.299 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.299 Starting downloading https://server4:443/ozdyhzxdqx at 33:27.076 on ClientConnection[c86aa4d394ed20ee/cdee62edbd4acf98(V1) with server4/193.167.100.100:443] 6.293 <- (1) Packet A|0|S0|cdee62edbd4acf98|51|1 NewConnectionIdFrame[1,<0|8716ec4f|b6562b2615e51dd0c4a69e481e4227bb] 6.300 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 6.300 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.397/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.300 Discarding pn space Initial because first Handshake message is being sent 6.300 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.397/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.300 -> Packet A|0|S0|d49ad7d5|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 6.330 <- (2) Packet A|1|S0|cdee62edbd4acf98|259|3 CryptoFrame[0,138] NewTokenFrame[3dbfd3a8832acffa01f3d5f0961714b04fa2f174176a2d9ac9e17d25067b898c3eef9f158e9b94a9fbe46db7b13ddc8e8601df3085a19f46239142f84ef3c62767031e5c561e8f67b7aee5ce961060dc6b91a99a839e] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 6.331 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 6.396/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 6.423/App, because ackElicitingInFlight | RTT:33/16 6.331 Discarding pn space Handshake because HandshakeDone is received 6.350 -> Packet A|1|S0|d49ad7d5|28|1 AckFrame[1-0|Δ19] 6.375 <- (3) Packet A|6|S0|5c08e833c93581a9|1053|1 StreamFrame[0(CIB),0,1024,fin] 6.376 -> Packet A|3|S0|118457c9|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,0|Δ0] 6.422 loss detection timeout handler running Sending probe 0, because no ack since 6.300. Current RTT: 33/16. 6.422 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 6.668/App, because ackElicitingInFlight | RTT:33/16 6.422 -> Packet PA|2|S0|d49ad7d5|43|1 StreamFrame[0(CIB),0,17,fin] 6.453 <- (3) Packet A|2|S0|cdee62edbd4acf98|32|1 AckFrame[2-1|Δ0] 6.454 Cwnd(-): 6000; inflight: 0 6.454 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.454 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 6.565/App, because ackElicitingInFlight | RTT:33/13 6.454 -> Packet A|3|S0|d49ad7d5|43|1 StreamFrame[0(CIB),0,17,fin] 6.454 <- (4) Packet A|3|S0|cdee62edbd4acf98|1053|1 StreamFrame[0(CIB),0,1024,fin] 6.455 Finished downloading https://server4:443/ozdyhzxdqx at 33:27.232 on ClientConnection[c86aa4d394ed20ee/cdee62edbd4acf98(V1) with server4/193.167.100.100:443] 6.455 Closing ClientConnection[c86aa4d394ed20ee/cdee62edbd4acf98(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.455 -> Packet A|4|S0|d49ad7d5|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 6.456 Creating connection with server4:443 with v1 6.456 Setting up connection for downloading https://server4:443/kpvwyenato at 33:27.233 on ClientConnection[ef2c41b5dca3ccc1/0599c8ece57f27ac(V1) with server4/193.167.100.100:443] 6.456 Original destination connection id: ef2c41b5dca3ccc1 (scid: 0599c8ece57f27ac) >- CryptoStream[I|ClientHello] 6.458 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.658/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.458 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.491 <- (1) Packet I|0|L|478|3 Token=[] AckFrame[0|Δ0] Padding(306) CryptoFrame[0,123] 6.492 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.692/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.491 <- (1) Packet H|0|L|751|1 CryptoFrame[0,708] 6.494 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.494 - unknown transport parameter 0x0360, size 12 reschedule loss detection timer for PTO over 96 millis, based on 6.591/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.494 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 6.496 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.593/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.496 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.497 Starting downloading https://server4:443/kpvwyenato at 33:27.274 on ClientConnection[ef2c41b5dca3ccc1/0599c8ece57f27ac(V1) with server4/193.167.100.100:443] 6.497 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 6.491 <- (1) Packet A|0|S0|0599c8ece57f27ac|51|1 NewConnectionIdFrame[1,<0|4ec6ea1d|214bc9d2a1fbd30271932f893f569180] 6.497 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.594/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.497 Discarding pn space Initial because first Handshake message is being sent 6.498 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.595/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.498 -> Packet A|0|S0|47b78a67|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 6.529 <- (2) Packet A|2|S0|0599c8ece57f27ac|256|3 CryptoFrame[0,135] NewTokenFrame[46f466e4e946215db9f49ff0b311f0b1ba95d79f3be93241cdaa13cd2dca1e8c60db379a27ea5ed1f9ea149ec0b707b08df04e8c436535fcba94c900f67c18b6ecefb4f866850229522fea6d7a83cc6997c1c409fde9] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 6.529 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 6.593/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 6.621/App, because ackElicitingInFlight | RTT:33/16 6.529 Discarding pn space Handshake because HandshakeDone is received 6.529 <- (3) Packet A|3|S0|0599c8ece57f27ac|32|1 AckFrame[0|Δ0] 6.530 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.530 <- (4) Packet A|4|S0|0599c8ece57f27ac|1053|1 StreamFrame[0(CIB),0,1024,fin] 6.530 Finished downloading https://server4:443/kpvwyenato at 33:27.307 on ClientConnection[ef2c41b5dca3ccc1/0599c8ece57f27ac(V1) with server4/193.167.100.100:443] 6.530 -> Packet A|1|S0|47b78a67|27|1 AckFrame[4-2|Δ0] 6.531 Closing ClientConnection[ef2c41b5dca3ccc1/0599c8ece57f27ac(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.531 -> Packet A|2|S0|47b78a67|31|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 6.531 Creating connection with server4:443 with v1 6.532 Setting up connection for downloading https://server4:443/vaizzisohj at 33:27.309 on ClientConnection[24583d899f48db23/e345d6a4d46b9eab(V1) with server4/193.167.100.100:443] 6.532 Original destination connection id: 24583d899f48db23 (scid: e345d6a4d46b9eab) >- CryptoStream[I|ClientHello] 6.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.734/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.533 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.567 <- (1) Packet I|0|L|486|3 Token=[] AckFrame[0|Δ0] Padding(314) CryptoFrame[0,123] 6.568 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.768/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.567 <- (1) Packet H|0|L|743|1 CryptoFrame[0,700] 6.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.571 - unknown transport parameter 0x03bd, size 3 reschedule loss detection timer for PTO over 96 millis, based on 6.668/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.570 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 6.573 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 6.670/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.573 -> Packet H|0|L|76|1 CryptoFrame[0,36] 6.574 Starting downloading https://server4:443/vaizzisohj at 33:27.350 on ClientConnection[24583d899f48db23/e345d6a4d46b9eab(V1) with server4/193.167.100.100:443] 6.567 <- (1) Packet A|0|S0|e345d6a4d46b9eab|51|1 NewConnectionIdFrame[1,<0|830fb444|e7a2e9321fbce6d96fff42471a2f646b] 6.574 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 6.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.671/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.574 Discarding pn space Initial because first Handshake message is being sent 6.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.671/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.574 -> Packet A|0|S0|e41da938|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 6.605 <- (2) Packet A|2|S0|e345d6a4d46b9eab|32|1 AckFrame[0|Δ0] 6.605 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.702/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.606 <- (3) Packet A|3|S0|e345d6a4d46b9eab|1053|1 StreamFrame[0(CIB),0,1024,fin] 6.606 Finished downloading https://server4:443/vaizzisohj at 33:27.383 on ClientConnection[24583d899f48db23/e345d6a4d46b9eab(V1) with server4/193.167.100.100:443] 6.606 Closing ClientConnection[24583d899f48db23/e345d6a4d46b9eab(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.607 -> Packet A|1|S0|e41da938|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 6.607 Creating connection with server4:443 with v1 6.608 Setting up connection for downloading https://server4:443/zofcxtheqs at 33:27.385 on ClientConnection[7472e4be6d0f61ef/1cb8f618f32257e4(V1) with server4/193.167.100.100:443] 6.608 Original destination connection id: 7472e4be6d0f61ef (scid: 1cb8f618f32257e4) >- CryptoStream[I|ClientHello] 6.609 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.809/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.609 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.643 <- (1) Packet I|0|L|474|3 Token=[] AckFrame[0|Δ0] Padding(302) CryptoFrame[0,123] 6.643 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.844/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.643 <- (1) Packet H|0|L|755|1 CryptoFrame[0,712] 6.646 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.646 - unknown transport parameter 0x177a, size 15 reschedule loss detection timer for PTO over 96 millis, based on 6.743/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.646 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 6.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.745/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.648 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.648 Starting downloading https://server4:443/zofcxtheqs at 33:27.425 on ClientConnection[7472e4be6d0f61ef/1cb8f618f32257e4(V1) with server4/193.167.100.100:443] 6.648 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 6.643 <- (1) Packet A|0|S0|1cb8f618f32257e4|51|1 NewConnectionIdFrame[1,<0|d6d1ffb7|8421c6c3ec213029026010b98943c34c] 6.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.746/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.649 Discarding pn space Initial because first Handshake message is being sent 6.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.746/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.649 -> Packet A|0|S0|b9558d93|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 6.745 loss detection timeout handler running Sending probe 0, because no ack since 6.648. Current RTT: 33/16. 6.745 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.745 (Probe is a handshake retransmit) 6.746 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 6.940/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.746 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 6.812 <- (2) Packet A|3|S0|1cb8f618f32257e4|51|1 NewConnectionIdFrame[1,<0|d6d1ffb7|8421c6c3ec213029026010b98943c34c] 6.812 <- (3) Packet A|4|S0|1cb8f618f32257e4|259|3 CryptoFrame[0,138] NewTokenFrame[9b41bfab6f2839038fcd623aad2724324893a2ecc6b6d82fa417e1374033707a0e7c1d70ff21dd477e8573acdf687ba37eeee3cf9e51aa17355cc8262a4c2fdd37a40991538887f90e29247e45a33bc81e32d90742a8] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 6.813 State is set to Confirmed reschedule loss detection timer for PTO over 82 millis, based on 6.895/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -40 millis, based on 6.772/App, because ackElicitingInFlight | RTT:33/16 6.813 Discarding pn space Handshake because HandshakeDone is received 6.813 loss detection timeout handler running Sending probe 0, because no ack since 6.649. Current RTT: 33/16. 6.813 (Probe is retransmit on level App) 6.813 -> Packet A|1|S0|b9558d93|29|1 AckFrame[4-3,0|Δ0] reschedule loss detection timer for PTO over 245 millis, based on 7.059/App, because ackElicitingInFlight | RTT:33/16 6.813 -> Packet PA|2|S0|b9558d93|43|1 StreamFrame[0(CIB),0,17,fin] 6.845 <- (4) Packet A|6|S0|1cb8f618f32257e4|1053|1 StreamFrame[0(CIB),0,1024,fin] 6.846 Finished downloading https://server4:443/zofcxtheqs at 33:27.622 on ClientConnection[7472e4be6d0f61ef/1cb8f618f32257e4(V1) with server4/193.167.100.100:443] 6.846 Closing ClientConnection[7472e4be6d0f61ef/1cb8f618f32257e4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.846 Creating connection with server4:443 with v1 6.846 -> Packet A|3|S0|b9558d93|35|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-3,0|Δ0] 6.847 Setting up connection for downloading https://server4:443/gvuonmgxab at 33:27.624 on ClientConnection[eb106e68ac61a77f/0359b14046d7629f(V1) with server4/193.167.100.100:443] 6.847 Original destination connection id: eb106e68ac61a77f (scid: 0359b14046d7629f) >- CryptoStream[I|ClientHello] 6.848 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.048/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.848 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.881 <- (1) Packet I|0|L|474|3 Token=[] AckFrame[0|Δ0] Padding(302) CryptoFrame[0,123] 6.882 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.082/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.881 <- (1) Packet H|0|L|755|1 CryptoFrame[0,712] 6.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.982/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.885 - unknown transport parameter 0x0f5d, size 15 6.884 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 6.887 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 6.984/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.887 -> Packet H|0|L|76|1 CryptoFrame[0,36] 6.887 Starting downloading https://server4:443/gvuonmgxab at 33:27.664 on ClientConnection[eb106e68ac61a77f/0359b14046d7629f(V1) with server4/193.167.100.100:443] 6.881 <- (1) Packet A|0|S0|0359b14046d7629f|51|1 NewConnectionIdFrame[1,<0|7d0d2cae|c45f7ff8a68f5b5716c7653844129aef] 6.887 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 6.887 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.888 Discarding pn space Initial because first Handshake message is being sent 6.888 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.888 -> Packet A|0|S0|f78eca7c|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 6.984 loss detection timeout handler running Sending probe 0, because no ack since 6.887. Current RTT: 33/16. 6.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.984 (Probe is a handshake retransmit) 6.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.178/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.984 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 7.016 <- (2) Packet A|2|S0|0359b14046d7629f|283|4 HandshakeDoneFrame[] CryptoFrame[0,138] NewConnectionIdFrame[1,<0|7d0d2cae|c45f7ff8a68f5b5716c7653844129aef] NewTokenFrame[afe507da0ef103f3971b53b69b4d713b297b14cf6575d2f080e028412f977f6225b7582f85adcc21265ef44cb032496fbb3664bae28814a3283f84d18f2117a6104783d05316f355282bdab0171e3ae841d7f664c299] 7.016 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 7.134/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -5 millis, based on 7.011/App, because ackElicitingInFlight | RTT:33/16 7.016 loss detection timeout handler running 7.016 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 6.888. Current RTT: 33/16. 7.016 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 245 millis, based on 7.263/App, because ackElicitingInFlight | RTT:33/16 7.017 -> Packet PA|1|S0|f78eca7c|43|1 StreamFrame[0(CIB),0,17,fin] 7.036 -> Packet A|2|S0|f78eca7c|30|1 AckFrame[2,0|Δ19] 7.048 <- (3) Packet A|5|S0|0359b14046d7629f|1053|1 StreamFrame[0(CIB),0,1024,fin] 7.049 Finished downloading https://server4:443/gvuonmgxab at 33:27.826 on ClientConnection[eb106e68ac61a77f/0359b14046d7629f(V1) with server4/193.167.100.100:443] 7.049 Closing ClientConnection[eb106e68ac61a77f/0359b14046d7629f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.049 -> Packet A|3|S0|f78eca7c|35|2 ConnectionCloseFrame[0|0|] AckFrame[5,2,0|Δ0] 7.050 Creating connection with server4:443 with v1 7.050 Setting up connection for downloading https://server4:443/jushxaudtt at 33:27.827 on ClientConnection[e0c1337be5b16925/e167106238aca880(V1) with server4/193.167.100.100:443] 7.050 Original destination connection id: e0c1337be5b16925 (scid: e167106238aca880) >- CryptoStream[I|ClientHello] 7.052 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.252/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.052 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.251 loss detection timeout handler running Sending probe 0, because no ack since 7.052. Current RTT: 100/25. 7.251 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.251 (Probe is an initial retransmit) 7.252 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.652/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.252 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.280 <- (4) Packet A|7|S0|0359b14046d7629f|283|4 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|7d0d2cae|c45f7ff8a68f5b5716c7653844129aef] NewTokenFrame[afe507da0ef103f3971b53b69b4d713b297b14cf6575d2f080e028412f977f6225b7582f85adcc21265ef44cb032496fbb3664bae28814a3283f84d18f2117a6104783d05316f355282bdab0171e3ae841d7f664c299] CryptoFrame[0,138] 7.281 -> Packet A|4|S0|f78eca7c|35|2 ConnectionCloseFrame[0|0|] AckFrame[5,2,0|Δ0] 7.281 <- (5) Packet A|8|S0|0359b14046d7629f|1053|1 StreamFrame[0(CIB),0,1024,fin] 7.281 -> Packet A|5|S0|f78eca7c|35|2 ConnectionCloseFrame[0|0|] AckFrame[5,2,0|Δ0] 7.282 <- (6) Packet A|9|S0|0359b14046d7629f|1366|2 Padding(1338) PingFrame[] 7.285 <- (1) Packet I|0|L|485|3 Token=[] AckFrame[1|Δ0] Padding(313) CryptoFrame[0,123] 7.285 probe count not reset on ack because handshake not yet confirmed 7.286 Retransmitting CryptoFrame[0,257] on level Initial 7.286 Cwnd(-): 6000; inflight: 0 7.286 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.686/Initial, because peerAwaitingAddressValidation | RTT:100/25 7.286 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 7.480/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.286 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 7.285 <- (1) Packet H|0|L|744|1 CryptoFrame[0,701] 7.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.483/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.289 - unknown transport parameter 0x0b01, size 5 7.288 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 7.292 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.486/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.285 <- (1) Packet A|0|S0|e167106238aca880|51|1 NewConnectionIdFrame[1,<0|286daa48|e1b9660f5bf507b8a4eade76a108da90] 7.292 Starting downloading https://server4:443/jushxaudtt at 33:28.069 on ClientConnection[e0c1337be5b16925/e167106238aca880(V1) with server4/193.167.100.100:443] 7.292 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.389/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.292 Discarding pn space Initial because first Handshake message is being sent 7.292 -> Packet H|0|L|76|1 CryptoFrame[0,36] 7.293 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.390/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.293 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|010da3d7|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 7.324 <- (2) Packet A|1|S0|e167106238aca880|1366|2 Padding(1338) PingFrame[] 7.324 <- (3) Packet A|2|S0|e167106238aca880|256|3 NewTokenFrame[3ec46fa6703aad8ba705a3c3ed4396a7923cf7e518bd8000f0c013c668d7c1848388ec5f85aa886d9d6ffc22ebe161cd99a6d852ad8ad6ff43570041a71a414fe2d01e67732c1bb69f463efbb9784ec81965005828da] HandshakeDoneFrame[] CryptoFrame[0,135] 7.324 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 7.389/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 7.416/App, because ackElicitingInFlight | RTT:33/16 7.325 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 7.324 <- (4) Packet A|3|S0|e167106238aca880|32|1 AckFrame[0|Δ0] 7.325 -> Packet A|1|S0|010da3d7|27|1 AckFrame[2-0|Δ0] 7.325 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.325 <- (5) Packet A|4|S0|e167106238aca880|1053|1 StreamFrame[0(CIB),0,1024,fin] 7.326 Finished downloading https://server4:443/jushxaudtt at 33:28.102 on ClientConnection[e0c1337be5b16925/e167106238aca880(V1) with server4/193.167.100.100:443] 7.326 Closing ClientConnection[e0c1337be5b16925/e167106238aca880(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.326 -> Packet A|2|S0|010da3d7|31|2 ConnectionCloseFrame[0|0|] AckFrame[4-1|Δ0] 7.326 Creating connection with server4:443 with v1 7.327 Setting up connection for downloading https://server4:443/jypyhsqyux at 33:28.103 on ClientConnection[da6d5a1179776798/3cd5a67eb993c995(V1) with server4/193.167.100.100:443] 7.327 Original destination connection id: da6d5a1179776798 (scid: 3cd5a67eb993c995) >- CryptoStream[I|ClientHello] 7.328 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.528/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.328 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.527 loss detection timeout handler running Sending probe 0, because no ack since 7.328. Current RTT: 100/25. 7.527 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.527 (Probe is an initial retransmit) 7.528 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.928/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.528 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.559 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 7.560 probe count not reset on ack because handshake not yet confirmed 7.560 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.960/Initial, because peerAwaitingAddressValidation | RTT:100/25 7.563 <- (2) Packet I|3|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 7.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 7.656/Handshake, because peerAwaitingAddressValidation | RTT:31/15 7.565 Discarding pn space Initial because first Handshake message is being sent 7.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 7.657/Handshake, because peerAwaitingAddressValidation | RTT:31/15 7.565 -> Packet I|2|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1155) 7.598 <- (3) Packet H|1|L|743|1 CryptoFrame[0,700] 7.598 - unknown transport parameter 0x0458, size 4 >- CryptoStream[H|Finished] 7.601 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 7.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 7.601 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.601 Starting downloading https://server4:443/jypyhsqyux at 33:28.378 on ClientConnection[da6d5a1179776798/3cd5a67eb993c995(V1) with server4/193.167.100.100:443] 7.598 <- (4) Packet H|2|L|743|1 CryptoFrame[0,700] 7.601 -> Packet H|1|L|42|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.602 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 7.693/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 7.602 -> [Packet H|2|L|42|1 AckFrame[2-1|Δ0], Packet A|0|S0|f38930c0|43|1 StreamFrame[0(CIB),0,17,fin]] 7.632 <- (5) Packet A|3|S0|3cd5a67eb993c995|283|4 NewConnectionIdFrame[1,<0|754aa1df|459ef9ef76cd6b3ee0bb63e81e707ddf] CryptoFrame[0,138] NewTokenFrame[e4b1729f1c157d0ce8bbd25a5f1124acc85c705df2ffcd08dd474a93456578b9366b8a4b215228442396a10200fe964f6226d2f00a26933f6311b05a1f18bf13c72b4ad7845f6fa38c82f2f3653bc7430139e571bad6] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 7.633 State is set to Confirmed reschedule loss detection timer for PTO over 58 millis, based on 7.692/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 85 millis, based on 7.719/App, because ackElicitingInFlight | RTT:31/15 7.633 Discarding pn space Handshake because HandshakeDone is received 7.633 <- (6) Packet A|4|S0|3cd5a67eb993c995|32|1 AckFrame[0|Δ0] 7.634 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.653 -> Packet A|1|S0|f38930c0|28|1 AckFrame[4-3|Δ19] 7.769 <- (7) Packet A|7|S0|3cd5a67eb993c995|1053|1 StreamFrame[0(CIB),0,1024,fin] 7.770 Finished downloading https://server4:443/jypyhsqyux at 33:28.547 on ClientConnection[da6d5a1179776798/3cd5a67eb993c995(V1) with server4/193.167.100.100:443] 7.770 Closing ClientConnection[da6d5a1179776798/3cd5a67eb993c995(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.770 -> Packet A|2|S0|f38930c0|33|2 ConnectionCloseFrame[0|0|] AckFrame[7,4-3|Δ0] 7.771 Creating connection with server4:443 with v1 7.771 Setting up connection for downloading https://server4:443/xwoccsaiwa at 33:28.548 on ClientConnection[e9c1c4d8e4a0fd6e/285c2c342227a3ca(V1) with server4/193.167.100.100:443] 7.771 Original destination connection id: e9c1c4d8e4a0fd6e (scid: 285c2c342227a3ca) >- CryptoStream[I|ClientHello] 7.773 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.973/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.773 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.806 <- (1) Packet I|0|L|485|3 Token=[] AckFrame[0|Δ0] Padding(313) CryptoFrame[0,123] 7.807 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.007/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.806 <- (1) Packet H|0|L|744|1 CryptoFrame[0,701] 7.809 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.906/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.809 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 7.810 - unknown transport parameter 0x07fa, size 3 >- CryptoStream[H|Finished] 7.812 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.909/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.812 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.813 Starting downloading https://server4:443/xwoccsaiwa at 33:28.589 on ClientConnection[e9c1c4d8e4a0fd6e/285c2c342227a3ca(V1) with server4/193.167.100.100:443] 7.806 <- (1) Packet A|0|S0|285c2c342227a3ca|51|1 NewConnectionIdFrame[1,<0|6c17db86|249bd5e37921c3c69c8c09964ec95b21] 7.813 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.910/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.813 Discarding pn space Initial because first Handshake message is being sent 7.813 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 7.813 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.910/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.813 -> Packet A|0|S0|fef75666|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 7.843 <- (2) Packet A|1|S0|285c2c342227a3ca|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[c5e1d8178ea3379f5523b1df7b526c20a56c5daf03a45093678f5b02438a0354d3e2a980278723b820f3ec5b303c1b6ac2d30923a510d72e6646599bf579cbd516c6be44f4f7914f070178da7038d10a9951ef879e7d] 7.844 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 7.909/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 7.936/App, because ackElicitingInFlight | RTT:33/16 7.844 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 7.863 -> Packet A|1|S0|fef75666|28|1 AckFrame[1-0|Δ19] 7.936 loss detection timeout handler running Sending probe 0, because no ack since 7.813. Current RTT: 33/16. 7.936 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 8.182/App, because ackElicitingInFlight | RTT:33/16 7.936 -> Packet PA|2|S0|fef75666|43|1 StreamFrame[0(CIB),0,17,fin] 8.039 <- (8) Packet A|10|S0|3cd5a67eb993c995|1053|1 StreamFrame[0(CIB),0,1024,fin] 8.039 -> Packet A|3|S0|f38930c0|33|2 ConnectionCloseFrame[0|0|] AckFrame[7,4-3|Δ0] 8.039 <- (9) Packet A|11|S0|3cd5a67eb993c995|1053|1 StreamFrame[0(CIB),0,1024,fin] 8.040 -> Packet A|4|S0|f38930c0|33|2 ConnectionCloseFrame[0|0|] AckFrame[7,4-3|Δ0] 8.041 <- (10) Packet A|12|S0|3cd5a67eb993c995|1366|2 Padding(1338) PingFrame[] 8.182 loss detection timeout handler running Sending probe 1, because no ack since 7.936. Current RTT: 33/16. 8.182 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 8.674/App, because ackElicitingInFlight | RTT:33/16 8.182 -> Packet PA|3|S0|fef75666|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 8.675/App, because ackElicitingInFlight | RTT:33/16 8.183 -> Packet PA|4|S0|fef75666|43|1 StreamFrame[0(CIB),0,17,fin] 8.674 loss detection timeout handler running Sending probe 2, because no ack since 8.183. Current RTT: 33/16. 8.675 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 983 millis, based on 9.659/App, because ackElicitingInFlight | RTT:33/16 8.675 -> Packet PA|5|S0|fef75666|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 983 millis, based on 9.660/App, because ackElicitingInFlight | RTT:33/16 8.676 -> Packet PA|6|S0|fef75666|43|1 StreamFrame[0(CIB),0,17,fin] 8.707 <- (3) Packet A|3|S0|285c2c342227a3ca|34|1 AckFrame[5,1|Δ0] 8.707 Cwnd(-): 6000; inflight: 43 8.708 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 91 millis, based on 8.799/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 106 millis, based on 8.815/App, because ackElicitingInFlight | RTT:33/12 8.708 <- (4) Packet A|4|S0|285c2c342227a3ca|1053|1 StreamFrame[0(CIB),0,1024,fin] 8.708 -> Packet A|7|S0|fef75666|43|1 StreamFrame[0(CIB),0,17,fin] 8.709 Finished downloading https://server4:443/xwoccsaiwa at 33:29.485 on ClientConnection[e9c1c4d8e4a0fd6e/285c2c342227a3ca(V1) with server4/193.167.100.100:443] 8.709 Closing ClientConnection[e9c1c4d8e4a0fd6e/285c2c342227a3ca(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.709 -> Packet A|8|S0|fef75666|31|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 8.709 Creating connection with server4:443 with v1 8.710 Setting up connection for downloading https://server4:443/wesixvpvdd at 33:29.487 on ClientConnection[ed41e3e27b01a25b/50eb6ceaac6fa6c9(V1) with server4/193.167.100.100:443] 8.710 Original destination connection id: ed41e3e27b01a25b (scid: 50eb6ceaac6fa6c9) >- CryptoStream[I|ClientHello] 8.712 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.912/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.712 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.745 <- (1) Packet I|0|L|480|3 Token=[] AckFrame[0|Δ0] Padding(308) CryptoFrame[0,123] 8.746 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.946/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.745 <- (1) Packet H|0|L|749|1 CryptoFrame[0,706] 8.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.748 - unknown transport parameter 0x0c37, size 10 reschedule loss detection timer for PTO over 96 millis, based on 8.845/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.748 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 8.751 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.751 -> Packet H|0|L|76|1 CryptoFrame[0,36] 8.745 <- (1) Packet A|0|S0|50eb6ceaac6fa6c9|51|1 NewConnectionIdFrame[1,<0|b76a33a1|3d4fde52a393fff02482b1573805b8bd] 8.751 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 8.751 Starting downloading https://server4:443/wesixvpvdd at 33:29.528 on ClientConnection[ed41e3e27b01a25b/50eb6ceaac6fa6c9(V1) with server4/193.167.100.100:443] 8.751 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.849/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.752 Discarding pn space Initial because first Handshake message is being sent 8.752 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.849/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.752 -> Packet A|0|S0|3ba5269c|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 8.848 loss detection timeout handler running Sending probe 0, because no ack since 8.751. Current RTT: 33/16. 8.848 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.848 (Probe is a handshake retransmit) 8.849 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 9.043/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.849 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 8.880 <- (2) Packet A|2|S0|50eb6ceaac6fa6c9|283|4 NewTokenFrame[fea3c156b070e157ebc566c90b88b69a23be5e45088d873e778eb96c3596a2950580e65cda3c3fb99ae54e18478b8b177b787e999b30cb09f147072591deb352dc850b116e06b8a87e6cdd8e992e42caf2829731a0a9] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|b76a33a1|3d4fde52a393fff02482b1573805b8bd] CryptoFrame[0,138] 8.881 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 8.998/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -5 millis, based on 8.875/App, because ackElicitingInFlight | RTT:33/16 8.881 Discarding pn space Handshake because HandshakeDone is received 8.881 loss detection timeout handler running Sending probe 0, because no ack since 8.752. Current RTT: 33/16. 8.881 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 245 millis, based on 9.127/App, because ackElicitingInFlight | RTT:33/16 8.881 -> Packet PA|1|S0|3ba5269c|43|1 StreamFrame[0(CIB),0,17,fin] 8.901 -> Packet A|2|S0|3ba5269c|30|1 AckFrame[2,0|Δ19] 8.938 <- (3) Packet A|6|S0|50eb6ceaac6fa6c9|33|1 AckFrame[2-0|Δ6] 8.939 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.115 <- (4) Packet A|8|S0|50eb6ceaac6fa6c9|283|4 NewConnectionIdFrame[1,<0|b76a33a1|3d4fde52a393fff02482b1573805b8bd] CryptoFrame[0,138] NewTokenFrame[fea3c156b070e157ebc566c90b88b69a23be5e45088d873e778eb96c3596a2950580e65cda3c3fb99ae54e18478b8b177b787e999b30cb09f147072591deb352dc850b116e06b8a87e6cdd8e992e42caf2829731a0a9] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 9.116 <- (5) Packet A|9|S0|50eb6ceaac6fa6c9|1053|1 StreamFrame[0(CIB),0,1024,fin] 9.116 -> Packet A|3|S0|3ba5269c|29|1 AckFrame[9-8,6|Δ0] 9.116 Finished downloading https://server4:443/wesixvpvdd at 33:29.893 on ClientConnection[ed41e3e27b01a25b/50eb6ceaac6fa6c9(V1) with server4/193.167.100.100:443] 9.116 Closing ClientConnection[ed41e3e27b01a25b/50eb6ceaac6fa6c9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.117 -> Packet A|4|S0|3ba5269c|33|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,6|Δ0] 9.117 Creating connection with server4:443 with v1 9.117 <- (6) Packet A|10|S0|50eb6ceaac6fa6c9|1366|2 Padding(1338) PingFrame[] 9.117 -> Packet A|5|S0|3ba5269c|33|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,6|Δ0] 9.118 Setting up connection for downloading https://server4:443/sfdhsjxfui at 33:29.894 on ClientConnection[ab3f035a99425fb8/debc37ba0e210118(V1) with server4/193.167.100.100:443] 9.118 Original destination connection id: ab3f035a99425fb8 (scid: debc37ba0e210118) >- CryptoStream[I|ClientHello] 9.119 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.319/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.119 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.152 <- (1) Packet I|0|L|478|3 Token=[] AckFrame[0|Δ0] Padding(306) CryptoFrame[0,123] 9.153 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.353/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.156 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.253/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.155 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 9.152 <- (1) Packet H|0|L|751|1 CryptoFrame[0,708] 9.156 - unknown transport parameter 0x131e, size 12 >- CryptoStream[H|Finished] 9.158 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.255/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.158 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.159 Starting downloading https://server4:443/sfdhsjxfui at 33:29.935 on ClientConnection[ab3f035a99425fb8/debc37ba0e210118(V1) with server4/193.167.100.100:443] 9.159 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 9.152 <- (1) Packet A|0|S0|debc37ba0e210118|51|1 NewConnectionIdFrame[1,<0|4604bf4c|f736ccee60cb6cfcab03c33ff80f4d3a] 9.159 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.256/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.159 Discarding pn space Initial because first Handshake message is being sent 9.159 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.256/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.159 -> Packet A|0|S0|bd995a8e|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 9.256 loss detection timeout handler running Sending probe 0, because no ack since 9.158. Current RTT: 33/16. 9.256 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.256 (Probe is a handshake retransmit) 9.256 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 9.450/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.256 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 9.323 <- (2) Packet A|3|S0|debc37ba0e210118|51|1 NewConnectionIdFrame[1,<0|4604bf4c|f736ccee60cb6cfcab03c33ff80f4d3a] 9.343 -> Packet A|1|S0|bd995a8e|30|1 AckFrame[3,0|Δ19] 9.449 loss detection timeout handler running Sending probe 1, because no ack since 9.159. Current RTT: 33/16. 9.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.450 (Probe is a handshake retransmit) 9.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.838/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.450 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 9.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.839/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.451 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 9.593 <- (3) Packet A|8|S0|debc37ba0e210118|1366|2 Padding(1338) PingFrame[] 9.613 -> Packet A|2|S0|bd995a8e|32|1 AckFrame[8,3,0|Δ19] 9.651 <- (4) Packet A|9|S0|debc37ba0e210118|283|4 CryptoFrame[0,138] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4604bf4c|f736ccee60cb6cfcab03c33ff80f4d3a] NewTokenFrame[7923d28d6379a53f2242575ec017a64c0fa75808cf25d1d29a287bccbb99eadf70b5ace51ba9cf4f677e64385a4d89e317600146d4a06b1f43f5759a82f69c254063434b6233266e75bcfd9b32b209b980c61a246123] -< CryptoStream[A|NewSessionTicket] 9.652 State is set to Confirmed reschedule loss detection timer for PTO over 0 millis, based on 9.651/App, because ackElicitingInFlight | RTT:33/16 9.652 loss detection timeout handler running Sending probe 2, because no ack since 9.159. Current RTT: 33/16. reschedule loss detection timer for PTO over -369 millis, based on 9.282/App, because ackElicitingInFlight | RTT:33/16 9.652 (Probe is retransmit on level App) 9.652 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 122 millis, based on 9.775/App, because ackElicitingInFlight | RTT:33/16 9.652 -> Packet PA|3|S0|bd995a8e|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 122 millis, based on 9.776/App, because ackElicitingInFlight | RTT:33/16 9.653 -> Packet PA|4|S0|bd995a8e|43|1 StreamFrame[0(CIB),0,17,fin] 9.672 -> Packet A|5|S0|bd995a8e|32|1 AckFrame[9-8,3,0|Δ19] 9.683 <- (5) Packet A|10|S0|debc37ba0e210118|32|1 AckFrame[3-2|Δ0] 9.684 Cwnd(-): 6000; inflight: 43 9.684 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 92 millis, based on 9.776/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 110 millis, based on 9.795/App, because ackElicitingInFlight | RTT:33/13 9.684 -> Packet A|6|S0|bd995a8e|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[9|Δ0] 9.710 <- (6) Packet A|12|S0|debc37ba0e210118|33|1 AckFrame[5-2|Δ7] reschedule loss detection timer for PTO over 84 millis, based on 9.795/App, because ackElicitingInFlight | RTT:33/13 9.740 <- (7) Packet A|13|S0|debc37ba0e210118|33|1 AckFrame[6-2|Δ25] 9.740 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.816 <- (8) Packet A|15|S0|debc37ba0e210118|1053|1 StreamFrame[0(CIB),0,1024,fin] 9.817 Finished downloading https://server4:443/sfdhsjxfui at 33:30.594 on ClientConnection[ab3f035a99425fb8/debc37ba0e210118(V1) with server4/193.167.100.100:443] 9.817 Closing ClientConnection[ab3f035a99425fb8/debc37ba0e210118(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.818 -> Packet A|7|S0|bd995a8e|35|2 ConnectionCloseFrame[0|0|] AckFrame[15,13-12,10|Δ0] 9.818 Creating connection with server4:443 with v1 9.818 <- (9) Packet A|17|S0|debc37ba0e210118|1409|2 Padding(1381) PingFrame[] 9.819 Setting up connection for downloading https://server4:443/qgzxeidhcl at 33:30.595 on ClientConnection[4fe2a9e3e19736c9/b15cfc564142aedd(V1) with server4/193.167.100.100:443] 9.819 Original destination connection id: 4fe2a9e3e19736c9 (scid: b15cfc564142aedd) 9.819 -> Packet A|8|S0|bd995a8e|35|2 ConnectionCloseFrame[0|0|] AckFrame[15,13-12,10|Δ0] >- CryptoStream[I|ClientHello] 9.820 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.020/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.820 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.853 <- (1) Packet I|0|L|480|3 Token=[] AckFrame[0|Δ0] Padding(308) CryptoFrame[0,123] 9.854 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.054/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.853 <- (1) Packet H|0|L|749|1 CryptoFrame[0,706] 9.856 - unknown transport parameter 0x0686, size 10 9.856 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.953/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.856 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 9.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.956/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.858 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.859 Starting downloading https://server4:443/qgzxeidhcl at 33:30.636 on ClientConnection[4fe2a9e3e19736c9/b15cfc564142aedd(V1) with server4/193.167.100.100:443] 9.853 <- (1) Packet A|0|S0|b15cfc564142aedd|51|1 NewConnectionIdFrame[1,<0|90e472a9|fbb8d0558464af9c454a6e25d3e94949] 9.859 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 9.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.956/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.859 Discarding pn space Initial because first Handshake message is being sent 9.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.956/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.859 -> Packet A|0|S0|09eb316a|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 9.955 loss detection timeout handler running Sending probe 0, because no ack since 9.858. Current RTT: 33/16. 9.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.956 (Probe is a handshake retransmit) 9.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.150/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.956 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 10.149 loss detection timeout handler running Sending probe 1, because no ack since 9.859. Current RTT: 33/16. 10.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.149 (Probe is a handshake retransmit) 10.150 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 10.538/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.150 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 10.151 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 10.539/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.151 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 10.174 <- (2) Packet H|3|L|749|1 CryptoFrame[0,706] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.175 <- (3) Packet H|4|L|749|1 CryptoFrame[0,706] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.175 -> Packet H|5|L|44|1 AckFrame[3,0|Δ0] 10.176 -> Packet H|6|L|44|1 AckFrame[4-3,0|Δ0] 10.181 <- (4) Packet A|2|S0|b15cfc564142aedd|283|4 NewConnectionIdFrame[1,<0|90e472a9|fbb8d0558464af9c454a6e25d3e94949] HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[498bd95a7153cbf1feea478b459cdc6d4a742b31ee7b84c8475851941d03b85596c36249ef0f3b073dd8f3f7d44cfff482c7bb41f5bba8925cbe8bc2b732d8fb8e0d4d42aeee8586b73e5afc88fd5a4e3a6044f59f7e] 10.181 State is set to Confirmed reschedule loss detection timer for PTO over 169 millis, based on 10.351/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -199 millis, based on 9.982/App, because ackElicitingInFlight | RTT:33/16 10.181 loss detection timeout handler running 10.182 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 9.859. Current RTT: 33/16. 10.182 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 245 millis, based on 10.428/App, because ackElicitingInFlight | RTT:33/16 10.182 -> Packet PA|1|S0|09eb316a|43|1 StreamFrame[0(CIB),0,17,fin] 10.181 <- (5) Packet A|3|S0|b15cfc564142aedd|283|4 HandshakeDoneFrame[] NewTokenFrame[498bd95a7153cbf1feea478b459cdc6d4a742b31ee7b84c8475851941d03b85596c36249ef0f3b073dd8f3f7d44cfff482c7bb41f5bba8925cbe8bc2b732d8fb8e0d4d42aeee8586b73e5afc88fd5a4e3a6044f59f7e] NewConnectionIdFrame[1,<0|90e472a9|fbb8d0558464af9c454a6e25d3e94949] CryptoFrame[0,138] -< CryptoStream[A|NewSessionTicket] 10.181 <- (6) Packet A|4|S0|b15cfc564142aedd|35|1 AckFrame[0|Δ290] 10.182 -> Packet A|2|S0|09eb316a|29|1 AckFrame[3-2,0|Δ0] reschedule loss detection timer for PTO over 122 millis, based on 10.305/App, because ackElicitingInFlight | RTT:33/16 10.182 <- (7) Packet A|5|S0|b15cfc564142aedd|1053|1 StreamFrame[0(CIB),0,1024,fin] 10.183 Finished downloading https://server4:443/qgzxeidhcl at 33:30.960 on ClientConnection[4fe2a9e3e19736c9/b15cfc564142aedd(V1) with server4/193.167.100.100:443] 10.183 Closing ClientConnection[4fe2a9e3e19736c9/b15cfc564142aedd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.183 -> Packet A|3|S0|09eb316a|31|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 10.183 Creating connection with server4:443 with v1 10.184 Setting up connection for downloading https://server4:443/fegthmvfba at 33:30.961 on ClientConnection[6aed6b2c6eb40c81/abd07adb3b1d2504(V1) with server4/193.167.100.100:443] 10.184 Original destination connection id: 6aed6b2c6eb40c81 (scid: abd07adb3b1d2504) >- CryptoStream[I|ClientHello] 10.186 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.386/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.186 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.238 <- (8) Packet A|6|S0|b15cfc564142aedd|33|1 AckFrame[1-0|Δ25] 10.238 -> Packet A|4|S0|09eb316a|31|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 10.385 loss detection timeout handler running Sending probe 0, because no ack since 10.186. Current RTT: 100/25. 10.385 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.385 (Probe is an initial retransmit) 10.386 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.786/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.385 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.620 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 10.623 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.823/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.623 Discarding pn space Initial because first Handshake message is being sent 10.623 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.823/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.623 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.623 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 10.820 <- (3) Packet H|1|L|745|1 CryptoFrame[0,702] 10.821 - unknown transport parameter 0x018f, size 5 10.822 loss detection timeout handler running 10.822 Sending probe 0. Current RTT: 100/25. 10.822 Sending probe because peer awaiting address validation 10.822 (Probe is a handshake ping) 10.822 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 11.223/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.822 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) >- CryptoStream[H|Finished] 10.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 11.223/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.823 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.823 Starting downloading https://server4:443/fegthmvfba at 33:31.600 on ClientConnection[6aed6b2c6eb40c81/abd07adb3b1d2504(V1) with server4/193.167.100.100:443] 10.824 -> Packet H|2|L|42|1 AckFrame[1|Δ0] 10.824 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 11.224/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.824 -> Packet A|0|S0|c1dafc0e|43|1 StreamFrame[0(CIB),0,17,fin] 10.853 <- (4) Packet H|3|L|44|1 AckFrame[0|Δ0] 10.854 probe count not reset on ack because handshake not yet confirmed 10.854 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 369 millis, based on 11.223/Handshake, because ackElicitingInFlight | RTT:100/25 10.854 <- (5) Packet A|2|S0|abd07adb3b1d2504|280|4 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c1892595|1ba1511c89d55ef4653d8d1183fd8a41] CryptoFrame[0,135] NewTokenFrame[c8169774e76905b37e73af921fe5e6d5fac764993f8b0c3dd0757d90ade1b003b8ba69154c4f941eb51e4202a814eca58ecdf0714b2416266b4a5cbce5c3cd3286e52699b2e815db94021b9b998632923a68df55f0a4] 10.854 State is set to Confirmed reschedule loss detection timer for PTO over 148 millis, based on 11.003/Handshake, because ackElicitingInFlight | RTT:30/15 reschedule loss detection timer for PTO over 85 millis, based on 10.940/App, because ackElicitingInFlight | RTT:30/15 10.855 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 10.854 <- (6) Packet A|3|S0|abd07adb3b1d2504|280|4 NewConnectionIdFrame[1,<0|c1892595|1ba1511c89d55ef4653d8d1183fd8a41] CryptoFrame[0,135] HandshakeDoneFrame[] NewTokenFrame[c8169774e76905b37e73af921fe5e6d5fac764993f8b0c3dd0757d90ade1b003b8ba69154c4f941eb51e4202a814eca58ecdf0714b2416266b4a5cbce5c3cd3286e52699b2e815db94021b9b998632923a68df55f0a4] -< CryptoStream[A|NewSessionTicket] 10.856 -> Packet A|1|S0|c1dafc0e|27|1 AckFrame[3-2|Δ0] 10.855 <- (7) Packet A|4|S0|abd07adb3b1d2504|1366|2 Padding(1338) PingFrame[] 10.875 -> Packet A|2|S0|c1dafc0e|28|1 AckFrame[4-2|Δ19] 10.940 loss detection timeout handler running Sending probe 0, because no ack since 10.824. Current RTT: 30/15. 10.940 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 11.172/App, because ackElicitingInFlight | RTT:30/15 10.940 -> Packet PA|3|S0|c1dafc0e|43|1 StreamFrame[0(CIB),0,17,fin] 11.172 loss detection timeout handler running Sending probe 1, because no ack since 10.940. Current RTT: 30/15. 11.172 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 463 millis, based on 11.636/App, because ackElicitingInFlight | RTT:30/15 11.172 -> Packet PA|4|S0|c1dafc0e|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 463 millis, based on 11.637/App, because ackElicitingInFlight | RTT:30/15 11.173 -> Packet PA|5|S0|c1dafc0e|43|1 StreamFrame[0(CIB),0,17,fin] 11.204 <- (8) Packet A|6|S0|abd07adb3b1d2504|1053|1 StreamFrame[0(CIB),0,1024,fin] 11.204 Finished downloading https://server4:443/fegthmvfba at 33:31.981 on ClientConnection[6aed6b2c6eb40c81/abd07adb3b1d2504(V1) with server4/193.167.100.100:443] 11.205 Closing ClientConnection[6aed6b2c6eb40c81/abd07adb3b1d2504(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.205 Creating connection with server4:443 with v1 11.205 -> Packet A|6|S0|c1dafc0e|33|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-2|Δ0] 11.206 Setting up connection for downloading https://server4:443/hntnstgnul at 33:31.983 on ClientConnection[6d6c904487241dd9/26dd132ebe32001e(V1) with server4/193.167.100.100:443] 11.206 Original destination connection id: 6d6c904487241dd9 (scid: 26dd132ebe32001e) >- CryptoStream[I|ClientHello] 11.207 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.407/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.207 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.240 <- (1) Packet I|0|L|484|3 Token=[] AckFrame[0|Δ0] Padding(312) CryptoFrame[0,123] 11.241 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.441/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 11.240 <- (1) Packet H|0|L|745|1 CryptoFrame[0,702] 11.243 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.340/Handshake, because peerAwaitingAddressValidation | RTT:33/16 11.243 - unknown transport parameter 0x0819, size 5 11.243 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 11.245 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.342/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.245 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.245 Starting downloading https://server4:443/hntnstgnul at 33:32.022 on ClientConnection[6d6c904487241dd9/26dd132ebe32001e(V1) with server4/193.167.100.100:443] 11.240 <- (1) Packet A|0|S0|26dd132ebe32001e|51|1 NewConnectionIdFrame[1,<0|5d3ee6f1|f880019e9e106a1d229ae326618beab5] 11.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.246 Discarding pn space Initial because first Handshake message is being sent 11.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.246 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|0320f8d4|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 11.277 <- (2) Packet A|1|S0|26dd132ebe32001e|1366|2 Padding(1338) PingFrame[] 11.277 <- (3) Packet A|2|S0|26dd132ebe32001e|256|3 CryptoFrame[0,135] HandshakeDoneFrame[] NewTokenFrame[21f9278fdc050cfddaa43da9dcdd3920a4414ad433441598e257ee5eead51092e95825343818ae376b943cc64989fc38782a223881a1f76e5ff3fd7f6a46be67aa13a6245d8f7d78d68cbb55248091449ae383fb62b4] -< CryptoStream[A|NewSessionTicket] 11.278 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 11.342/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 11.369/App, because ackElicitingInFlight | RTT:33/16 11.278 Discarding pn space Handshake because HandshakeDone is received 11.278 -> Packet A|1|S0|0320f8d4|27|1 AckFrame[2-0|Δ0] 11.369 loss detection timeout handler running Sending probe 0, because no ack since 11.246. Current RTT: 33/16. 11.369 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 11.616/App, because ackElicitingInFlight | RTT:33/16 11.370 -> Packet PA|2|S0|0320f8d4|43|1 StreamFrame[0(CIB),0,17,fin] 11.615 loss detection timeout handler running Sending probe 1, because no ack since 11.370. Current RTT: 33/16. 11.615 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 12.107/App, because ackElicitingInFlight | RTT:33/16 11.615 -> Packet PA|3|S0|0320f8d4|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 12.108/App, because ackElicitingInFlight | RTT:33/16 11.616 -> Packet PA|4|S0|0320f8d4|43|1 StreamFrame[0(CIB),0,17,fin] 11.647 <- (4) Packet A|3|S0|26dd132ebe32001e|1409|2 Padding(1381) PingFrame[] 11.647 <- (5) Packet A|4|S0|26dd132ebe32001e|34|1 AckFrame[3,1|Δ0] 11.648 Cwnd(-): 6000; inflight: 43 reschedule loss detection timer for PTO over 90 millis, based on 11.739/App, because ackElicitingInFlight | RTT:33/16 11.649 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 106 millis, based on 11.756/App, because ackElicitingInFlight | RTT:33/12 11.649 -> Packet A|5|S0|0320f8d4|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 11.705 <- (6) Packet A|7|S0|26dd132ebe32001e|35|1 AckFrame[5-3,1|Δ25] 11.705 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.756 <- (7) Packet A|10|S0|26dd132ebe32001e|1053|1 StreamFrame[0(CIB),0,1024,fin] 11.756 Finished downloading https://server4:443/hntnstgnul at 33:32.533 on ClientConnection[6d6c904487241dd9/26dd132ebe32001e(V1) with server4/193.167.100.100:443] 11.756 Closing ClientConnection[6d6c904487241dd9/26dd132ebe32001e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.757 Creating connection with server4:443 with v1 11.757 -> Packet A|6|S0|0320f8d4|35|2 ConnectionCloseFrame[0|0|] AckFrame[10,7,4|Δ0] 11.758 Setting up connection for downloading https://server4:443/xburzpsfyc at 33:32.534 on ClientConnection[c832116fc671b6ed/79f01090e5166891(V1) with server4/193.167.100.100:443] 11.758 Original destination connection id: c832116fc671b6ed (scid: 79f01090e5166891) >- CryptoStream[I|ClientHello] 11.759 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.959/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.759 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.958 loss detection timeout handler running Sending probe 0, because no ack since 11.759. Current RTT: 100/25. 11.958 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.958 (Probe is an initial retransmit) 11.959 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.359/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.959 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.992 <- (1) Packet I|0|L|474|3 Token=[] AckFrame[1|Δ0] Padding(302) CryptoFrame[0,123] 11.993 probe count not reset on ack because handshake not yet confirmed 11.993 Retransmitting CryptoFrame[0,257] on level Initial 11.993 Cwnd(-): 6000; inflight: 0 11.993 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.393/Initial, because peerAwaitingAddressValidation | RTT:100/25 11.993 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 12.187/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.993 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 11.992 <- (1) Packet H|0|L|755|1 CryptoFrame[0,712] 11.996 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.996 - unknown transport parameter 0x19a8, size 14 reschedule loss detection timer for PTO over 193 millis, based on 12.190/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.996 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 11.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 12.192/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.998 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.998 Starting downloading https://server4:443/xburzpsfyc at 33:32.775 on ClientConnection[c832116fc671b6ed/79f01090e5166891(V1) with server4/193.167.100.100:443] 11.998 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 11.992 <- (1) Packet A|0|S0|79f01090e5166891|51|1 NewConnectionIdFrame[1,<0|4c4c621f|beb63cf1bd39db95b1654dc0a4a7376b] 11.999 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.999 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.096/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 12.096/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.999 Discarding pn space Initial because first Handshake message is being sent 11.999 -> Packet A|0|S0|de8d7457|43|1 StreamFrame[0(CIB),0,17,fin] 12.018 -> Packet A|1|S0|de8d7457|28|1 AckFrame[0|Δ19] 12.095 loss detection timeout handler running Sending probe 0, because no ack since 11.998. Current RTT: 33/16. 12.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.095 (Probe is a handshake retransmit) 12.096 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 12.290/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.095 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 12.289 loss detection timeout handler running Sending probe 1, because no ack since 11.999. Current RTT: 33/16. 12.289 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.289 (Probe is a handshake retransmit) 12.289 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 12.677/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.289 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 12.290 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 12.678/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.290 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 12.362 <- (2) Packet A|5|S0|79f01090e5166891|283|4 NewTokenFrame[919109848e1740cc53ad7b0bcc22dec80ac571b4620c2f63fbae4b71e9590a264d3419172d04da0c0118e11980f8438a09733a45c88249be5a17ba1a50c1667e1c5dcf0f67e05f6c17ca3367c8dbf5ce2aee962ff3b2] CryptoFrame[0,138] NewConnectionIdFrame[1,<0|4c4c621f|beb63cf1bd39db95b1654dc0a4a7376b] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 12.363 State is set to Confirmed reschedule loss detection timer for PTO over 128 millis, based on 12.491/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -240 millis, based on 12.122/App, because ackElicitingInFlight | RTT:33/16 12.363 Discarding pn space Handshake because HandshakeDone is received 12.363 loss detection timeout handler running Sending probe 0, because no ack since 11.999. Current RTT: 33/16. 12.363 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 12.609/App, because ackElicitingInFlight | RTT:33/16 12.363 -> Packet PA|2|S0|de8d7457|43|1 StreamFrame[0(CIB),0,17,fin] 12.383 -> Packet A|3|S0|de8d7457|30|1 AckFrame[5,0|Δ19] 12.394 <- (3) Packet A|8|S0|79f01090e5166891|32|1 AckFrame[2-1|Δ0] 12.394 Cwnd(-): 3000; inflight: 0 12.394 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.394 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 110 millis, based on 12.505/App, because ackElicitingInFlight | RTT:33/13 12.394 -> Packet A|4|S0|de8d7457|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 12.450 <- (4) Packet A|10|S0|79f01090e5166891|33|1 AckFrame[4-1|Δ25] 12.451 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.864 <- (5) Packet A|12|S0|79f01090e5166891|283|4 CryptoFrame[0,138] HandshakeDoneFrame[] NewTokenFrame[919109848e1740cc53ad7b0bcc22dec80ac571b4620c2f63fbae4b71e9590a264d3419172d04da0c0118e11980f8438a09733a45c88249be5a17ba1a50c1667e1c5dcf0f67e05f6c17ca3367c8dbf5ce2aee962ff3b2] NewConnectionIdFrame[1,<0|4c4c621f|beb63cf1bd39db95b1654dc0a4a7376b] -< CryptoStream[A|NewSessionTicket] 12.884 -> Packet A|5|S0|de8d7457|32|1 AckFrame[12,10,8|Δ19] 13.037 <- (6) Packet A|17|S0|79f01090e5166891|1053|1 StreamFrame[0(CIB),0,1024,fin] 13.038 Finished downloading https://server4:443/xburzpsfyc at 33:33.814 on ClientConnection[c832116fc671b6ed/79f01090e5166891(V1) with server4/193.167.100.100:443] 13.038 Closing ClientConnection[c832116fc671b6ed/79f01090e5166891(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.038 Creating connection with server4:443 with v1 13.038 -> Packet A|6|S0|de8d7457|37|2 ConnectionCloseFrame[0|0|] AckFrame[17,12,10,8|Δ0] 13.039 Setting up connection for downloading https://server4:443/inryjqstcl at 33:33.815 on ClientConnection[a886f5ac1e04869c/bb2cbc82726bf34e(V1) with server4/193.167.100.100:443] 13.039 Original destination connection id: a886f5ac1e04869c (scid: bb2cbc82726bf34e) >- CryptoStream[I|ClientHello] 13.040 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.240/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.040 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.239 loss detection timeout handler running Sending probe 0, because no ack since 13.040. Current RTT: 100/25. 13.239 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.239 (Probe is an initial retransmit) 13.240 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.640/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.239 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.273 <- (1) Packet I|0|L|475|3 Token=[] AckFrame[1|Δ0] Padding(303) CryptoFrame[0,123] 13.274 probe count not reset on ack because handshake not yet confirmed 13.274 Retransmitting CryptoFrame[0,257] on level Initial 13.274 Cwnd(-): 6000; inflight: 0 13.274 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.674/Initial, because peerAwaitingAddressValidation | RTT:100/25 13.274 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 13.468/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.274 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 13.273 <- (1) Packet H|0|L|754|1 CryptoFrame[0,711] 13.276 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.470/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.276 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 13.276 - unknown transport parameter 0x1e80, size 14 >- CryptoStream[H|Finished] 13.279 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.473/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.279 -> Packet H|0|L|76|1 CryptoFrame[0,36] 13.279 Starting downloading https://server4:443/inryjqstcl at 33:34.056 on ClientConnection[a886f5ac1e04869c/bb2cbc82726bf34e(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.273 <- (1) Packet A|0|S0|bb2cbc82726bf34e|51|1 NewConnectionIdFrame[1,<0|74ae578a|b273cc608dea653b72b894aceba315fe] 13.280 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.474/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.280 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.280 -> Packet A|0|S0|14e1b51a|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 96 millis, based on 13.377/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.280 Discarding pn space Initial because first Handshake message is being sent 13.280 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 13.299 -> Packet A|1|S0|14e1b51a|28|1 AckFrame[0|Δ19] 13.376 loss detection timeout handler running Sending probe 0, because no ack since 13.279. Current RTT: 33/16. 13.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.376 (Probe is a handshake retransmit) 13.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.570/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.376 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 13.409 <- (2) Packet A|2|S0|bb2cbc82726bf34e|262|4 AckFrame[0|Δ97] CryptoFrame[0,135] NewTokenFrame[193b4028855dd4d4e863a6f8e33c94b253b68870ebc86b1e1f3579569fd2dab11b1a139d5d0ee687a72c30d9676aa508714f5980e737943a8cc4a3eefbcb2ab3c04265542b3043aea3b9bf029fa7714f0fd31968a5b7] HandshakeDoneFrame[] 13.409 probe count not reset on ack because handshake not yet confirmed 13.409 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 13.603/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket] 13.410 State is set to Confirmed reschedule loss detection timer for PTO over 290 millis, based on 13.700/Handshake, because ackElicitingInFlight | RTT:42/30 13.410 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.410 Discarding pn space Handshake because HandshakeDone is received 13.429 -> Packet A|2|S0|14e1b51a|30|1 AckFrame[2,0|Δ19] 13.608 <- (3) Packet A|5|S0|bb2cbc82726bf34e|51|1 NewConnectionIdFrame[1,<0|74ae578a|b273cc608dea653b72b894aceba315fe] 13.609 <- (4) Packet A|6|S0|bb2cbc82726bf34e|256|3 NewTokenFrame[193b4028855dd4d4e863a6f8e33c94b253b68870ebc86b1e1f3579569fd2dab11b1a139d5d0ee687a72c30d9676aa508714f5980e737943a8cc4a3eefbcb2ab3c04265542b3043aea3b9bf029fa7714f0fd31968a5b7] CryptoFrame[0,135] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 13.609 -> Packet A|3|S0|14e1b51a|31|1 AckFrame[6-5,2,0|Δ0] 14.010 <- (5) Packet A|8|S0|bb2cbc82726bf34e|1053|1 StreamFrame[0(CIB),0,1024,fin] 14.011 Finished downloading https://server4:443/inryjqstcl at 33:34.787 on ClientConnection[a886f5ac1e04869c/bb2cbc82726bf34e(V1) with server4/193.167.100.100:443] 14.011 Closing ClientConnection[a886f5ac1e04869c/bb2cbc82726bf34e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.012 Creating connection with server4:443 with v1 14.012 -> Packet A|4|S0|14e1b51a|38|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-5,2,0|Δ1] 14.012 Setting up connection for downloading https://server4:443/mcwhgrwefq at 33:34.789 on ClientConnection[76c8c6075a066a3d/0f13e35668c8c81e(V1) with server4/193.167.100.100:443] 14.012 Original destination connection id: 76c8c6075a066a3d (scid: 0f13e35668c8c81e) >- CryptoStream[I|ClientHello] 14.013 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.213/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.013 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.047 <- (1) Packet I|0|L|482|3 Token=[] AckFrame[0|Δ0] Padding(310) CryptoFrame[0,123] 14.047 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.247/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.047 <- (1) Packet H|0|L|747|1 CryptoFrame[0,704] 14.050 - unknown transport parameter 0x001b, size 8 14.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.147/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.050 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 14.052 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.149/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.052 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.052 Starting downloading https://server4:443/mcwhgrwefq at 33:34.829 on ClientConnection[76c8c6075a066a3d/0f13e35668c8c81e(V1) with server4/193.167.100.100:443] 14.047 <- (1) Packet A|0|S0|0f13e35668c8c81e|51|1 NewConnectionIdFrame[1,<0|c811dd5f|fee6127fb452be8f79cc0a80af74a8a1] 14.052 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 14.052 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.149/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.052 Discarding pn space Initial because first Handshake message is being sent 14.053 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.150/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.053 -> Packet A|0|S0|6a1c781d|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 14.083 <- (2) Packet A|1|S0|0f13e35668c8c81e|259|3 CryptoFrame[0,138] HandshakeDoneFrame[] NewTokenFrame[96bef4e08a184ff949d6b4bfa4bbaa54c545a1e50cae04e134acdeb79cf9d5d826a1da12454e96fc8ef939b4845d86f5be908568608dcc33093e8c8c33f0277aa716f785dd915ce5bab3ea75a8a597bf6591621970a8] -< CryptoStream[A|NewSessionTicket] 14.083 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 14.149/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 14.176/App, because ackElicitingInFlight | RTT:33/16 14.083 Discarding pn space Handshake because HandshakeDone is received 14.083 <- (3) Packet A|2|S0|0f13e35668c8c81e|32|1 AckFrame[0|Δ0] 14.084 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.084 <- (4) Packet A|3|S0|0f13e35668c8c81e|1053|1 StreamFrame[0(CIB),0,1024,fin] 14.085 -> Packet A|1|S0|6a1c781d|28|1 AckFrame[3-1|Δ1] 14.085 Finished downloading https://server4:443/mcwhgrwefq at 33:34.862 on ClientConnection[76c8c6075a066a3d/0f13e35668c8c81e(V1) with server4/193.167.100.100:443] 14.085 Closing ClientConnection[76c8c6075a066a3d/0f13e35668c8c81e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.085 -> Packet A|2|S0|6a1c781d|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 14.085 Creating connection with server4:443 with v1 14.086 Setting up connection for downloading https://server4:443/pglpwcihgy at 33:34.863 on ClientConnection[524de85430302f70/54d88d3ac0091993(V1) with server4/193.167.100.100:443] 14.086 Original destination connection id: 524de85430302f70 (scid: 54d88d3ac0091993) >- CryptoStream[I|ClientHello] 14.087 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.287/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.087 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.121 <- (1) Packet I|0|L|480|3 Token=[] AckFrame[0|Δ0] Padding(308) CryptoFrame[0,123] 14.121 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.321/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.121 <- (1) Packet H|0|L|749|1 CryptoFrame[0,706] 14.123 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.123 - unknown transport parameter 0x1a62, size 10 reschedule loss detection timer for PTO over 96 millis, based on 14.220/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.123 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 14.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.222/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.125 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.126 Starting downloading https://server4:443/pglpwcihgy at 33:34.903 on ClientConnection[524de85430302f70/54d88d3ac0091993(V1) with server4/193.167.100.100:443] 14.121 <- (1) Packet A|0|S0|54d88d3ac0091993|51|1 NewConnectionIdFrame[1,<0|76d4fba5|49a5f011521f74d4f41a71f48ecedff8] 14.126 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 14.126 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.223/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.126 Discarding pn space Initial because first Handshake message is being sent 14.126 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.223/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.126 -> Packet A|0|S0|a62ab6cc|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 14.200 <- (5) Packet A|5|S0|0f13e35668c8c81e|259|3 NewTokenFrame[96bef4e08a184ff949d6b4bfa4bbaa54c545a1e50cae04e134acdeb79cf9d5d826a1da12454e96fc8ef939b4845d86f5be908568608dcc33093e8c8c33f0277aa716f785dd915ce5bab3ea75a8a597bf6591621970a8] HandshakeDoneFrame[] CryptoFrame[0,138] 14.201 -> Packet A|3|S0|6a1c781d|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 14.201 <- (6) Packet A|6|S0|0f13e35668c8c81e|1053|1 StreamFrame[0(CIB),0,1024,fin] 14.202 -> Packet A|4|S0|6a1c781d|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 14.222 loss detection timeout handler running Sending probe 0, because no ack since 14.125. Current RTT: 33/16. 14.222 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.222 (Probe is a handshake retransmit) 14.223 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.417/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.223 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 14.254 <- (2) Packet A|2|S0|54d88d3ac0091993|283|4 NewConnectionIdFrame[1,<0|76d4fba5|49a5f011521f74d4f41a71f48ecedff8] HandshakeDoneFrame[] NewTokenFrame[fc2ab6b8b6441ae96f24c055715a0c0610b5e69f7066b14a7f5a4b029cb5083c778e6fc8d45dc8563baee8f900998157c81ce9e634697c9934a0e2bc4086f3aabeb0d1607df7b560ff17357920b884c548ff735c7cba] CryptoFrame[0,138] 14.254 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 14.372/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -5 millis, based on 14.249/App, because ackElicitingInFlight | RTT:33/16 14.254 Discarding pn space Handshake because HandshakeDone is received 14.254 loss detection timeout handler running Sending probe 0, because no ack since 14.126. Current RTT: 33/16. 14.254 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 245 millis, based on 14.501/App, because ackElicitingInFlight | RTT:33/16 14.255 -> Packet PA|1|S0|a62ab6cc|43|1 StreamFrame[0(CIB),0,17,fin] 14.254 <- (3) Packet A|4|S0|54d88d3ac0091993|33|1 AckFrame[0|Δ96] reschedule loss detection timer for PTO over 122 millis, based on 14.378/App, because ackElicitingInFlight | RTT:33/16 14.255 <- (4) Packet A|5|S0|54d88d3ac0091993|1053|1 StreamFrame[0(CIB),0,1024,fin] 14.255 -> Packet A|2|S0|a62ab6cc|29|1 AckFrame[5-4,2|Δ0] 14.256 Finished downloading https://server4:443/pglpwcihgy at 33:35.032 on ClientConnection[524de85430302f70/54d88d3ac0091993(V1) with server4/193.167.100.100:443] 14.256 Closing ClientConnection[524de85430302f70/54d88d3ac0091993(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.256 -> Packet A|3|S0|a62ab6cc|33|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 14.256 Creating connection with server4:443 with v1 14.257 Setting up connection for downloading https://server4:443/lchdvfqpeb at 33:35.034 on ClientConnection[11c083286bb7e55d/393824cb6ab17983(V1) with server4/193.167.100.100:443] 14.257 Original destination connection id: 11c083286bb7e55d (scid: 393824cb6ab17983) >- CryptoStream[I|ClientHello] 14.258 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.458/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.258 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.457 loss detection timeout handler running Sending probe 0, because no ack since 14.258. Current RTT: 100/25. 14.458 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.458 (Probe is an initial retransmit) 14.458 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.858/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.458 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.492 <- (1) Packet I|0|L|488|3 Token=[] AckFrame[1|Δ0] Padding(316) CryptoFrame[0,123] 14.492 probe count not reset on ack because handshake not yet confirmed 14.492 Retransmitting CryptoFrame[0,257] on level Initial 14.492 Cwnd(-): 6000; inflight: 0 14.492 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.892/Initial, because peerAwaitingAddressValidation | RTT:100/25 14.493 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 14.687/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.492 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 14.492 <- (1) Packet H|0|L|741|1 CryptoFrame[0,698] 14.495 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.689/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.495 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 14.495 - unknown transport parameter 0x0477, size 2 >- CryptoStream[H|Finished] 14.497 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.691/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.497 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.497 Starting downloading https://server4:443/lchdvfqpeb at 33:35.274 on ClientConnection[11c083286bb7e55d/393824cb6ab17983(V1) with server4/193.167.100.100:443] 14.497 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 14.492 <- (1) Packet A|0|S0|393824cb6ab17983|51|1 NewConnectionIdFrame[1,<0|f9630d70|b2b9034dae655f27812368922fc3d1d7] 14.497 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.594/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.497 Discarding pn space Initial because first Handshake message is being sent 14.497 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.594/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.497 -> Packet A|0|S0|292cb3c7|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 14.529 <- (2) Packet A|1|S0|393824cb6ab17983|1366|2 Padding(1338) PingFrame[] 14.529 <- (3) Packet A|2|S0|393824cb6ab17983|256|3 CryptoFrame[0,135] HandshakeDoneFrame[] NewTokenFrame[6afa0c6e5d7594f26f67ef818d0f6308a0d60a12741e8988b5175c5fdb303e4a575c33f9222d4b6a842bf8a44f9ff04b64bb31671f7576953e337f2cfafcde03daecfb4d5e1dd2b522c7e76fad5f65a87efaad2ef3cf] -< CryptoStream[A|NewSessionTicket] 14.529 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 14.594/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 14.620/App, because ackElicitingInFlight | RTT:33/16 14.529 Discarding pn space Handshake because HandshakeDone is received 14.530 -> Packet A|1|S0|292cb3c7|27|1 AckFrame[2-0|Δ0] 14.620 loss detection timeout handler running Sending probe 0, because no ack since 14.497. Current RTT: 33/16. 14.621 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 14.867/App, because ackElicitingInFlight | RTT:33/16 14.621 -> Packet PA|2|S0|292cb3c7|43|1 StreamFrame[0(CIB),0,17,fin] 14.652 <- (4) Packet A|3|S0|393824cb6ab17983|32|1 AckFrame[2-1|Δ0] 14.652 Cwnd(-): 3000; inflight: 0 14.652 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 14.652 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 14.763/App, because ackElicitingInFlight | RTT:33/13 14.652 -> Packet A|3|S0|292cb3c7|43|1 StreamFrame[0(CIB),0,17,fin] 14.763 loss detection timeout handler running Sending probe 0, because no ack since 14.652. Current RTT: 33/13. 14.763 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 14.985/App, because ackElicitingInFlight | RTT:33/13 14.763 -> Packet PA|4|S0|292cb3c7|43|1 StreamFrame[0(CIB),0,17,fin] 14.777 <- (5) Packet A|7|S0|393824cb6ab17983|1053|1 StreamFrame[0(CIB),0,1024,fin] 14.778 Finished downloading https://server4:443/lchdvfqpeb at 33:35.555 on ClientConnection[11c083286bb7e55d/393824cb6ab17983(V1) with server4/193.167.100.100:443] 14.778 Closing ClientConnection[11c083286bb7e55d/393824cb6ab17983(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.779 Creating connection with server4:443 with v1 14.779 -> Packet A|5|S0|292cb3c7|33|2 ConnectionCloseFrame[0|0|] AckFrame[7,3|Δ0] 14.779 <- (6) Packet A|8|S0|393824cb6ab17983|1409|2 Padding(1381) PingFrame[] 14.779 Setting up connection for downloading https://server4:443/nobyvszmcp at 33:35.556 on ClientConnection[01df0d1816418d17/f678074bc0e20225(V1) with server4/193.167.100.100:443] 14.779 Original destination connection id: 01df0d1816418d17 (scid: f678074bc0e20225) 14.779 -> Packet A|6|S0|292cb3c7|33|2 ConnectionCloseFrame[0|0|] AckFrame[7,3|Δ0] >- CryptoStream[I|ClientHello] 14.781 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.981/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.781 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.794 <- (7) Packet A|9|S0|393824cb6ab17983|34|1 AckFrame[4,2-1|Δ0] 14.795 -> Packet A|7|S0|292cb3c7|33|2 ConnectionCloseFrame[0|0|] AckFrame[7,3|Δ0] 14.814 <- (1) Packet I|0|L|477|3 Token=[] AckFrame[0|Δ0] Padding(305) CryptoFrame[0,123] 14.814 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.014/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.814 <- (1) Packet H|0|L|752|1 CryptoFrame[0,709] reschedule loss detection timer for PTO over 96 millis, based on 14.914/Handshake, because peerAwaitingAddressValidation | RTT:33/16 14.816 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 14.817 - unknown transport parameter 0x19a8, size 12 >- CryptoStream[H|Finished] 14.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.819 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.819 Starting downloading https://server4:443/nobyvszmcp at 33:35.596 on ClientConnection[01df0d1816418d17/f678074bc0e20225(V1) with server4/193.167.100.100:443] 14.814 <- (1) Packet A|0|S0|f678074bc0e20225|51|1 NewConnectionIdFrame[1,<0|9a17bde9|cbf0fc97224a56e9af11619e89ce52e8] 14.819 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 14.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.819 Discarding pn space Initial because first Handshake message is being sent 14.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.819 -> Packet A|0|S0|d33d3023|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 14.915 loss detection timeout handler running Sending probe 0, because no ack since 14.819. Current RTT: 33/16. 14.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.916 (Probe is a handshake retransmit) 14.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.110/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.916 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 14.920 <- (2) Packet H|1|L|752|1 CryptoFrame[0,709] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.920 -> Packet H|3|L|42|1 AckFrame[1-0|Δ0] 14.921 <- (3) Packet H|2|L|752|1 CryptoFrame[0,709] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.921 -> Packet H|4|L|42|1 AckFrame[2-0|Δ0] 14.947 <- (4) Packet A|2|S0|f678074bc0e20225|283|4 CryptoFrame[0,138] HandshakeDoneFrame[] NewTokenFrame[f1cb90323dbbebcc5924a70fb1dc8190d8f0cc59cdc5ecebc8c5d972fbf0c3d10fd3eea50c38833b45c671fa0b895a7aadd32d6760ef4cd2497c728da4f681c68becefd6f447a0659128d24f46f6945f9dcb0b0b4a68] NewConnectionIdFrame[1,<0|9a17bde9|cbf0fc97224a56e9af11619e89ce52e8] -< CryptoStream[A|NewSessionTicket] 14.947 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 15.065/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -5 millis, based on 14.942/App, because ackElicitingInFlight | RTT:33/16 14.948 Discarding pn space Handshake because HandshakeDone is received 14.948 loss detection timeout handler running Sending probe 0, because no ack since 14.819. Current RTT: 33/16. 14.948 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 15.194/App, because ackElicitingInFlight | RTT:33/16 14.948 -> Packet PA|1|S0|d33d3023|43|1 StreamFrame[0(CIB),0,17,fin] 14.948 <- (5) Packet A|5|S0|f678074bc0e20225|1053|1 StreamFrame[0(CIB),0,1024,fin] 14.948 -> Packet A|2|S0|d33d3023|31|1 AckFrame[5,2,0|Δ0] 14.949 Finished downloading https://server4:443/nobyvszmcp at 33:35.725 on ClientConnection[01df0d1816418d17/f678074bc0e20225(V1) with server4/193.167.100.100:443] 14.949 Closing ClientConnection[01df0d1816418d17/f678074bc0e20225(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.949 -> Packet A|3|S0|d33d3023|35|2 ConnectionCloseFrame[0|0|] AckFrame[5,2,0|Δ0] 14.949 Creating connection with server4:443 with v1 14.950 Setting up connection for downloading https://server4:443/pskdocvqmo at 33:35.726 on ClientConnection[eee4fec62fa98935/f80896e822458214(V1) with server4/193.167.100.100:443] 14.950 Original destination connection id: eee4fec62fa98935 (scid: f80896e822458214) >- CryptoStream[I|ClientHello] 14.951 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.151/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.951 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.150 loss detection timeout handler running Sending probe 0, because no ack since 14.951. Current RTT: 100/25. 15.150 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.150 (Probe is an initial retransmit) 15.151 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.551/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.151 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.183 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 15.183 probe count not reset on ack because handshake not yet confirmed 15.183 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.583/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.186 <- (2) Packet I|3|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 15.188 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 15.279/Handshake, because peerAwaitingAddressValidation | RTT:31/15 15.188 Discarding pn space Initial because first Handshake message is being sent 15.188 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 15.279/Handshake, because peerAwaitingAddressValidation | RTT:31/15 15.188 -> Packet I|2|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1155) 15.221 <- (3) Packet H|2|L|744|1 CryptoFrame[0,701] 15.222 - unknown transport parameter 0x060a, size 5 >- CryptoStream[H|Finished] 15.224 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 15.315/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 15.223 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.224 Starting downloading https://server4:443/pskdocvqmo at 33:36.001 on ClientConnection[eee4fec62fa98935/f80896e822458214(V1) with server4/193.167.100.100:443] 15.224 -> Packet H|1|L|42|1 AckFrame[2|Δ0] 15.224 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 15.315/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 15.224 -> Packet A|0|S0|fb5b14e3|43|1 StreamFrame[0(CIB),0,17,fin] 15.314 loss detection timeout handler running Sending probe 0, because no ack since 15.223. Current RTT: 31/15. 15.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.315 (Probe is a handshake retransmit) 15.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 15.497/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 15.315 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 15.346 <- (4) Packet A|3|S0|f80896e822458214|283|4 NewConnectionIdFrame[1,<0|955eed95|c3508c885df5e5b97d5f80049cf40736] HandshakeDoneFrame[] NewTokenFrame[163e3be6f120826ffe9f6045bcb21b5c9f6a11c4d54ebbe7731cc3b1308a4c9c25c2d1e94261b5095eb3f9a24ac59c8ef919259a7d8cc2009d8eb8bd5e367a538476f36563594c780ba2a198b88b155c73d1e2a09674] CryptoFrame[0,138] 15.347 State is set to Confirmed reschedule loss detection timer for PTO over 111 millis, based on 15.458/App, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over -5 millis, based on 15.341/App, because ackElicitingInFlight | RTT:31/15 15.347 loss detection timeout handler running 15.347 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 15.224. Current RTT: 31/15. 15.347 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] 15.346 <- (5) Packet A|4|S0|f80896e822458214|33|1 AckFrame[0|Δ91] reschedule loss detection timer for PTO over 233 millis, based on 15.581/App, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 116 millis, based on 15.464/App, because ackElicitingInFlight | RTT:31/15 15.347 -> Packet PA|1|S0|fb5b14e3|43|1 StreamFrame[0(CIB),0,17,fin] 15.367 -> Packet A|2|S0|fb5b14e3|28|1 AckFrame[4-3|Δ19] 15.403 <- (6) Packet A|7|S0|f80896e822458214|33|1 AckFrame[1-0|Δ25] 15.404 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.581 <- (7) Packet A|9|S0|f80896e822458214|283|4 NewConnectionIdFrame[1,<0|955eed95|c3508c885df5e5b97d5f80049cf40736] NewTokenFrame[163e3be6f120826ffe9f6045bcb21b5c9f6a11c4d54ebbe7731cc3b1308a4c9c25c2d1e94261b5095eb3f9a24ac59c8ef919259a7d8cc2009d8eb8bd5e367a538476f36563594c780ba2a198b88b155c73d1e2a09674] CryptoFrame[0,138] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 15.582 <- (8) Packet A|10|S0|f80896e822458214|1053|1 StreamFrame[0(CIB),0,1024,fin] 15.582 -> Packet A|3|S0|fb5b14e3|31|1 AckFrame[10-9,7,4-3|Δ0] 15.583 Finished downloading https://server4:443/pskdocvqmo at 33:36.359 on ClientConnection[eee4fec62fa98935/f80896e822458214(V1) with server4/193.167.100.100:443] 15.583 Closing ClientConnection[eee4fec62fa98935/f80896e822458214(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.583 -> Packet A|4|S0|fb5b14e3|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,7,4-3|Δ0] 15.583 Creating connection with server4:443 with v1 15.583 <- (9) Packet A|11|S0|f80896e822458214|1366|2 Padding(1338) PingFrame[] 15.584 -> Packet A|5|S0|fb5b14e3|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,7,4-3|Δ0] 15.584 Setting up connection for downloading https://server4:443/cvsugnuema at 33:36.361 on ClientConnection[d7d3e3c07c07052a/141a3a291eb5115a(V1) with server4/193.167.100.100:443] 15.584 Original destination connection id: d7d3e3c07c07052a (scid: 141a3a291eb5115a) >- CryptoStream[I|ClientHello] 15.585 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.785/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.585 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.613 <- (10) Packet A|12|S0|f80896e822458214|30|1 MaxStreamsFrame[B,101] 15.614 -> Packet A|6|S0|fb5b14e3|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,7,4-3|Δ0] 15.618 <- (1) Packet I|0|L|479|3 Token=[] AckFrame[0|Δ0] Padding(307) CryptoFrame[0,123] 15.619 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.819/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.618 <- (1) Packet H|0|L|750|1 CryptoFrame[0,707] 15.621 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.718/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.621 - unknown transport parameter 0x0b3f, size 10 15.621 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 15.624 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.721/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.624 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.625 Starting downloading https://server4:443/cvsugnuema at 33:36.401 on ClientConnection[d7d3e3c07c07052a/141a3a291eb5115a(V1) with server4/193.167.100.100:443] 15.618 <- (1) Packet A|0|S0|141a3a291eb5115a|51|1 NewConnectionIdFrame[1,<0|9044b5a1|06f809c08b29c987ccf834fa9c9c999a] 15.625 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.722/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.625 Discarding pn space Initial because first Handshake message is being sent 15.625 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 15.625 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.722/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.625 -> Packet A|0|S0|44f3ad82|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 15.655 <- (2) Packet A|1|S0|141a3a291eb5115a|259|3 NewTokenFrame[4b69648996a38eef0a1b4db7e46a4985bf0526265e1ece934139a386bd3dc754a2664aac4b772801474cee49ded1c11165f8d294cd657c3afdd7fa01b7b483629c9b5d128ee6d43e28fba8ed1f626ac0c6750e02349d] HandshakeDoneFrame[] CryptoFrame[0,138] 15.655 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 15.721/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 15.748/App, because ackElicitingInFlight | RTT:33/16 15.656 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 15.675 -> Packet A|1|S0|44f3ad82|28|1 AckFrame[1-0|Δ19] 15.748 loss detection timeout handler running Sending probe 0, because no ack since 15.625. Current RTT: 33/16. 15.748 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 15.994/App, because ackElicitingInFlight | RTT:33/16 15.748 -> Packet PA|2|S0|44f3ad82|43|1 StreamFrame[0(CIB),0,17,fin] 15.779 <- (3) Packet A|2|S0|141a3a291eb5115a|32|1 AckFrame[2-1|Δ0] 15.780 Cwnd(-): 6000; inflight: 0 15.780 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.780 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 15.891/App, because ackElicitingInFlight | RTT:33/13 15.780 -> Packet A|3|S0|44f3ad82|43|1 StreamFrame[0(CIB),0,17,fin] 15.780 <- (4) Packet A|3|S0|141a3a291eb5115a|1053|1 StreamFrame[0(CIB),0,1024,fin] 15.781 Finished downloading https://server4:443/cvsugnuema at 33:36.557 on ClientConnection[d7d3e3c07c07052a/141a3a291eb5115a(V1) with server4/193.167.100.100:443] 15.781 Closing ClientConnection[d7d3e3c07c07052a/141a3a291eb5115a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.781 -> Packet A|4|S0|44f3ad82|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 15.781 Creating connection with server4:443 with v1 15.782 Setting up connection for downloading https://server4:443/fxxttnsfjf at 33:36.558 on ClientConnection[a070235d655b24f8/63acf2750bdab571(V1) with server4/193.167.100.100:443] 15.782 Original destination connection id: a070235d655b24f8 (scid: 63acf2750bdab571) >- CryptoStream[I|ClientHello] 15.783 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.983/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.783 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.816 <- (1) Packet I|0|L|485|3 Token=[] AckFrame[0|Δ0] Padding(313) CryptoFrame[0,123] 15.817 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.017/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.816 <- (1) Packet H|0|L|744|1 CryptoFrame[0,701] 15.820 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.820 - unknown transport parameter 0x0303, size 4 reschedule loss detection timer for PTO over 96 millis, based on 15.917/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.820 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 15.822 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.919/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.822 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.822 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 15.816 <- (1) Packet A|0|S0|63acf2750bdab571|51|1 NewConnectionIdFrame[1,<0|74a7c129|545c66204ca920de292f87b644289aad] 15.822 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.919/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.822 Discarding pn space Initial because first Handshake message is being sent 15.822 Starting downloading https://server4:443/fxxttnsfjf at 33:36.599 on ClientConnection[a070235d655b24f8/63acf2750bdab571(V1) with server4/193.167.100.100:443] 15.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.920/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.823 -> Packet A|0|S0|ea265cbb|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 15.919 loss detection timeout handler running Sending probe 0, because no ack since 15.822. Current RTT: 33/16. 15.919 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.919 (Probe is a handshake retransmit) 15.919 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 16.113/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.919 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 15.951 <- (2) Packet A|2|S0|63acf2750bdab571|283|4 NewTokenFrame[0509312f677d98328c2f8d8f70e5236ee599b981cefdce529702d781a92159a8de539486992962e282f92828a08052887e8fe6dfb61137ff8e32719f1d76ef2ef4d2a532acb4403b7d3d7b974da4d6b85736e64c6505] CryptoFrame[0,138] NewConnectionIdFrame[1,<0|74a7c129|545c66204ca920de292f87b644289aad] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 15.951 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 16.069/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -5 millis, based on 15.946/App, because ackElicitingInFlight | RTT:33/16 15.951 loss detection timeout handler running 15.951 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 15.823. Current RTT: 33/16. 15.952 (Probe is retransmit on level App) 15.951 <- (3) Packet A|4|S0|63acf2750bdab571|33|1 AckFrame[0|Δ97] reschedule loss detection timer for PTO over 245 millis, based on 16.198/App, because ackElicitingInFlight | RTT:33/16 15.952 -> Packet PA|1|S0|ea265cbb|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 122 millis, based on 16.075/App, because ackElicitingInFlight | RTT:33/16 15.971 -> Packet A|2|S0|ea265cbb|30|1 AckFrame[4,2|Δ19] 16.074 loss detection timeout handler running Sending probe 0, because no ack since 15.952. Current RTT: 42/29. 16.074 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 367 millis, based on 16.442/App, because ackElicitingInFlight | RTT:42/29 16.074 -> Packet PA|3|S0|ea265cbb|43|1 StreamFrame[0(CIB),0,17,fin] 16.105 <- (4) Packet A|6|S0|63acf2750bdab571|34|1 AckFrame[3,0|Δ0] 16.106 Cwnd(-): 6000; inflight: 0 16.106 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.185 <- (5) Packet A|8|S0|63acf2750bdab571|283|4 HandshakeDoneFrame[] NewTokenFrame[0509312f677d98328c2f8d8f70e5236ee599b981cefdce529702d781a92159a8de539486992962e282f92828a08052887e8fe6dfb61137ff8e32719f1d76ef2ef4d2a532acb4403b7d3d7b974da4d6b85736e64c6505] CryptoFrame[0,138] NewConnectionIdFrame[1,<0|74a7c129|545c66204ca920de292f87b644289aad] -< CryptoStream[A|NewSessionTicket] 16.186 <- (6) Packet A|9|S0|63acf2750bdab571|1053|1 StreamFrame[0(CIB),0,1024,fin] 16.186 -> Packet A|4|S0|ea265cbb|33|1 AckFrame[9-8,6,4,2|Δ0] 16.186 Finished downloading https://server4:443/fxxttnsfjf at 33:36.963 on ClientConnection[a070235d655b24f8/63acf2750bdab571(V1) with server4/193.167.100.100:443] 16.186 Closing ClientConnection[a070235d655b24f8/63acf2750bdab571(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.186 -> Packet A|5|S0|ea265cbb|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,6,4,2|Δ0] 16.187 Creating connection with server4:443 with v1 16.187 Setting up connection for downloading https://server4:443/yhqdzjrbdo at 33:36.964 on ClientConnection[6ba4af038d453f1e/529dc0f8a79bc11e(V1) with server4/193.167.100.100:443] 16.187 Original destination connection id: 6ba4af038d453f1e (scid: 529dc0f8a79bc11e) >- CryptoStream[I|ClientHello] 16.188 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.389/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.188 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.388 loss detection timeout handler running Sending probe 0, because no ack since 16.188. Current RTT: 100/25. 16.388 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.388 (Probe is an initial retransmit) 16.388 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.788/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.388 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.422 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 16.425 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.625/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.425 Discarding pn space Initial because first Handshake message is being sent 16.425 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.425 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.625/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.425 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 16.624 loss detection timeout handler running 16.624 Sending probe 0. Current RTT: 100/25. 16.624 Sending probe because peer awaiting address validation 16.624 (Probe is a handshake ping) 16.624 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 17.025/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.624 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 16.655 <- (3) Packet H|3|L|44|1 AckFrame[0|Δ0] 16.656 probe count not reset on ack because handshake not yet confirmed 16.656 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.823 <- (4) Packet H|4|L|747|1 CryptoFrame[0,704] 16.824 - unknown transport parameter 0x13d8, size 7 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 179 millis, based on 17.006/Handshake, because ackElicitingInFlight | RTT:30/15 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.826 -> Packet H|1|L|81|2 CryptoFrame[0,36] AckFrame[3|Δ0] 16.827 Starting downloading https://server4:443/yhqdzjrbdo at 33:37.603 on ClientConnection[6ba4af038d453f1e/529dc0f8a79bc11e(V1) with server4/193.167.100.100:443] 16.827 -> Packet H|2|L|42|1 AckFrame[4-3|Δ0] 16.827 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 179 millis, based on 17.006/Handshake, because ackElicitingInFlight | RTT:30/15 16.827 -> Packet A|0|S0|461d592c|43|1 StreamFrame[0(CIB),0,17,fin] 17.006 loss detection timeout handler running Sending probe 1, because no ack since 16.826. Current RTT: 30/15. 17.007 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 17.007 (Probe is a handshake retransmit) 17.007 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 359 millis, based on 17.367/Handshake, because ackElicitingInFlight | RTT:30/15 17.007 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 17.008 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 359 millis, based on 17.368/Handshake, because ackElicitingInFlight | RTT:30/15 17.008 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 17.038 <- (5) Packet A|2|S0|529dc0f8a79bc11e|280|4 NewConnectionIdFrame[1,<0|257a315c|021c1166b17be3f97cc5f3895c99a98c] HandshakeDoneFrame[] CryptoFrame[0,135] NewTokenFrame[bd2785b2d38f2b8f96b579ea6bd9b65a3a7be10adbf41787d3b6d83709d2cda1b3cb68917c02be23fb8a209d6e80c27e064676cec396533a4633dc532068d317a17d2f8a34e14c806d32f403903fd88920703000853e] 17.039 State is set to Confirmed reschedule loss detection timer for PTO over 251 millis, based on 17.291/App, because ackElicitingInFlight | RTT:30/15 reschedule loss detection timer for PTO over -96 millis, based on 16.943/App, because ackElicitingInFlight | RTT:30/15 17.039 loss detection timeout handler running 17.039 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 16.827. Current RTT: 30/15. 17.039 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 231 millis, based on 17.272/App, because ackElicitingInFlight | RTT:30/15 17.040 -> Packet PA|1|S0|461d592c|43|1 StreamFrame[0(CIB),0,17,fin] 17.039 <- (6) Packet A|3|S0|529dc0f8a79bc11e|280|4 NewConnectionIdFrame[1,<0|257a315c|021c1166b17be3f97cc5f3895c99a98c] NewTokenFrame[bd2785b2d38f2b8f96b579ea6bd9b65a3a7be10adbf41787d3b6d83709d2cda1b3cb68917c02be23fb8a209d6e80c27e064676cec396533a4633dc532068d317a17d2f8a34e14c806d32f403903fd88920703000853e] HandshakeDoneFrame[] CryptoFrame[0,135] -< CryptoStream[A|NewSessionTicket] 17.040 <- (7) Packet A|4|S0|529dc0f8a79bc11e|1366|2 Padding(1338) PingFrame[] 17.040 -> Packet A|2|S0|461d592c|27|1 AckFrame[3-2|Δ0] 17.040 <- (8) Packet A|5|S0|529dc0f8a79bc11e|35|1 AckFrame[0|Δ180] reschedule loss detection timer for PTO over 115 millis, based on 17.156/App, because ackElicitingInFlight | RTT:30/15 17.060 -> Packet A|3|S0|461d592c|28|1 AckFrame[5-2|Δ19] 17.092 <- (9) Packet A|7|S0|529dc0f8a79bc11e|1409|2 Padding(1381) PingFrame[] 17.096 <- (10) Packet A|8|S0|529dc0f8a79bc11e|35|1 AckFrame[3,1-0|Δ5] 17.096 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.112 -> Packet A|4|S0|461d592c|28|1 AckFrame[8-7|Δ20] 17.144 <- (11) Packet A|9|S0|529dc0f8a79bc11e|1430|2 Padding(1402) PingFrame[] 17.145 <- (12) Packet A|10|S0|529dc0f8a79bc11e|1053|1 StreamFrame[0(CIB),0,1024,fin] 17.145 -> Packet A|5|S0|461d592c|27|1 AckFrame[10-7|Δ0] 17.146 Finished downloading https://server4:443/yhqdzjrbdo at 33:37.922 on ClientConnection[6ba4af038d453f1e/529dc0f8a79bc11e(V1) with server4/193.167.100.100:443] 17.146 Closing ClientConnection[6ba4af038d453f1e/529dc0f8a79bc11e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.146 -> Packet A|6|S0|461d592c|31|2 ConnectionCloseFrame[0|0|] AckFrame[10-7|Δ0] 17.146 Creating connection with server4:443 with v1 17.147 Setting up connection for downloading https://server4:443/iqybebtrwc at 33:37.924 on ClientConnection[31bd711528b44177/15207685b94e6a55(V1) with server4/193.167.100.100:443] 17.147 Original destination connection id: 31bd711528b44177 (scid: 15207685b94e6a55) >- CryptoStream[I|ClientHello] 17.148 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.348/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.148 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.176 <- (13) Packet A|11|S0|529dc0f8a79bc11e|30|1 MaxStreamsFrame[B,101] 17.177 -> Packet A|7|S0|461d592c|31|2 ConnectionCloseFrame[0|0|] AckFrame[10-7|Δ0] 17.347 loss detection timeout handler running Sending probe 0, because no ack since 17.148. Current RTT: 100/25. 17.348 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.348 (Probe is an initial retransmit) 17.348 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.748/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.348 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.747 loss detection timeout handler running Sending probe 1, because no ack since 17.348. Current RTT: 100/25. 17.747 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.747 (Probe is an initial retransmit) 17.748 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.548/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.748 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.749 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.549/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.749 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.781 <- (1) Packet I|0|L|488|3 Token=[] AckFrame[2|Δ0] Padding(316) CryptoFrame[0,123] 17.782 probe count not reset on ack because handshake not yet confirmed 17.782 Retransmitting CryptoFrame[0,257] on level Initial 17.782 Cwnd(-): 6000; inflight: 1200 17.782 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.582/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.782 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 18.170/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.782 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 17.781 <- (1) Packet H|0|L|741|1 CryptoFrame[0,698] 17.785 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.173/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.784 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 17.785 - unknown transport parameter 0x1c52, size 1 >- CryptoStream[H|Finished] 17.787 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 18.175/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.787 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.787 Starting downloading https://server4:443/iqybebtrwc at 33:38.564 on ClientConnection[31bd711528b44177/15207685b94e6a55(V1) with server4/193.167.100.100:443] 17.781 <- (1) Packet A|0|S0|15207685b94e6a55|51|1 NewConnectionIdFrame[1,<0|10595f7a|6fa010ee4316de0726832770ad4992c0] 17.787 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 17.787 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.884/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.787 Discarding pn space Initial because first Handshake message is being sent 17.787 Discarding packet (45 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 17.787 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.884/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.787 -> Packet A|0|S0|74540a15|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 17.818 <- (3) Packet A|1|S0|15207685b94e6a55|259|3 CryptoFrame[0,138] NewTokenFrame[804bd5820801c97fef187875362363b3402407de07b03eaee68dde8dbe6db8e8f7c5a9aa7f7408fb8ec77b6eb434018fa87153d70adf3354405aeeeb95eb63f574fce5b49d86592c7a04a9e8428b1ad93c2eb0a68078] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 17.818 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 17.884/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 17.910/App, because ackElicitingInFlight | RTT:33/16 17.818 Discarding pn space Handshake because HandshakeDone is received 17.837 -> Packet A|1|S0|74540a15|28|1 AckFrame[1-0|Δ19] 17.910 loss detection timeout handler running Sending probe 0, because no ack since 17.787. Current RTT: 33/16. 17.910 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 18.156/App, because ackElicitingInFlight | RTT:33/16 17.910 -> Packet PA|2|S0|74540a15|43|1 StreamFrame[0(CIB),0,17,fin] 18.074 <- (4) Packet A|5|S0|15207685b94e6a55|1053|1 StreamFrame[0(CIB),0,1024,fin] 18.075 Finished downloading https://server4:443/iqybebtrwc at 33:38.851 on ClientConnection[31bd711528b44177/15207685b94e6a55(V1) with server4/193.167.100.100:443] 18.075 Closing ClientConnection[31bd711528b44177/15207685b94e6a55(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.075 <- (5) Packet A|6|S0|15207685b94e6a55|1053|1 StreamFrame[0(CIB),0,1024,fin] 18.075 -> Packet A|3|S0|74540a15|37|3 ConnectionCloseFrame[0|0|] AckFrame[5,1-0|Δ0] ConnectionCloseFrame[0|0|] 18.075 Creating connection with server4:443 with v1 18.076 Setting up connection for downloading https://server4:443/bbuwhfwvso at 33:38.853 on ClientConnection[34d8c8716e03b761/a20903638dc0ab3d(V1) with server4/193.167.100.100:443] 18.076 Original destination connection id: 34d8c8716e03b761 (scid: a20903638dc0ab3d) 18.076 <- (6) Packet A|7|S0|15207685b94e6a55|1366|2 Padding(1338) PingFrame[] 18.076 -> Packet A|4|S0|74540a15|33|2 ConnectionCloseFrame[0|0|] AckFrame[5,1-0|Δ0] >- CryptoStream[I|ClientHello] 18.077 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.277/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.077 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.276 loss detection timeout handler running Sending probe 0, because no ack since 18.077. Current RTT: 100/25. 18.277 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.277 (Probe is an initial retransmit) 18.277 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.677/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.277 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.311 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 18.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.514/Handshake, because peerAwaitingAddressValidation | RTT:100/25 18.314 Discarding pn space Initial because first Handshake message is being sent 18.314 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 18.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.514/Handshake, because peerAwaitingAddressValidation | RTT:100/25 18.314 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 18.511 <- (3) Packet H|1|L|749|1 CryptoFrame[0,706] 18.512 - unknown transport parameter 0x1edd, size 9 18.513 loss detection timeout handler running 18.513 Sending probe 0. Current RTT: 100/25. 18.513 Sending probe because peer awaiting address validation 18.513 (Probe is a handshake ping) 18.513 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 18.913/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.513 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) >- CryptoStream[H|Finished] 18.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 18.914/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.514 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.515 Starting downloading https://server4:443/bbuwhfwvso at 33:39.292 on ClientConnection[34d8c8716e03b761/a20903638dc0ab3d(V1) with server4/193.167.100.100:443] 18.512 <- (4) Packet H|2|L|749|1 CryptoFrame[0,706] 18.515 -> Packet H|2|L|42|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.515 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 18.915/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.515 -> [Packet H|3|L|42|1 AckFrame[2-1|Δ0], Packet A|0|S0|86a4388b|43|1 StreamFrame[0(CIB),0,17,fin]] 18.914 loss detection timeout handler running Sending probe 1, because no ack since 18.514. Current RTT: 100/25. 18.914 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.915 (Probe is a handshake retransmit) 18.915 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 19.715/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.915 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 18.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 19.716/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.916 -> Packet PH|5|L|76|1 CryptoFrame[0,36] 18.946 <- (5) Packet A|2|S0|a20903638dc0ab3d|283|4 NewConnectionIdFrame[1,<0|bbd737ec|013eae0e22f24bca66e922f893271d93] NewTokenFrame[6f2cf0c30dd3845af3e24e9f4f47927fade876c29f2e2d3881d625dae52b432fe98afd40bba40440cec10ff39ce28350437badae2a6595666c0c7e5239ff2bc8ccb8697f87462ba71779abce9e2fb87cdc0a545fd9d8] CryptoFrame[0,138] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 18.947 State is set to Confirmed reschedule loss detection timer for PTO over 472 millis, based on 19.419/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -205 millis, based on 18.741/App, because ackElicitingInFlight | RTT:100/25 18.947 loss detection timeout handler running 18.947 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 18.515. Current RTT: 100/25. 18.947 (Probe is retransmit on level App) 18.947 <- (6) Packet A|4|S0|a20903638dc0ab3d|35|1 AckFrame[0|Δ400] reschedule loss detection timer for PTO over 225 millis, based on 19.173/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 225 millis, based on 19.173/App, because ackElicitingInFlight | RTT:100/25 18.947 -> Packet PA|1|S0|86a4388b|43|1 StreamFrame[0(CIB),0,17,fin] 18.947 <- (7) Packet A|5|S0|a20903638dc0ab3d|1053|1 StreamFrame[0(CIB),0,1024,fin] 18.948 -> Packet A|2|S0|86a4388b|29|1 AckFrame[5-4,2|Δ0] 18.948 Finished downloading https://server4:443/bbuwhfwvso at 33:39.725 on ClientConnection[34d8c8716e03b761/a20903638dc0ab3d(V1) with server4/193.167.100.100:443] 18.948 Closing ClientConnection[34d8c8716e03b761/a20903638dc0ab3d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.948 -> Packet A|3|S0|86a4388b|33|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 18.949 Creating connection with server4:443 with v1 18.949 Setting up connection for downloading https://server4:443/vzliqhanwh at 33:39.726 on ClientConnection[87668bdf57fcb191/10f6822068fb9b6b(V1) with server4/193.167.100.100:443] 18.949 Original destination connection id: 87668bdf57fcb191 (scid: 10f6822068fb9b6b) >- CryptoStream[I|ClientHello] 18.950 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.150/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.950 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.149 loss detection timeout handler running Sending probe 0, because no ack since 18.950. Current RTT: 100/25. 19.149 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.149 (Probe is an initial retransmit) 19.150 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.550/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.149 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.183 <- (1) Packet I|0|L|490|3 Token=[] AckFrame[1|Δ0] Padding(318) CryptoFrame[0,123] 19.183 probe count not reset on ack because handshake not yet confirmed 19.183 Retransmitting CryptoFrame[0,257] on level Initial 19.183 Cwnd(-): 6000; inflight: 0 19.183 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.583/Initial, because peerAwaitingAddressValidation | RTT:100/25 19.184 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 19.378/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.184 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 19.183 <- (1) Packet H|0|L|739|1 CryptoFrame[0,696] 19.186 - unknown transport parameter 0x0629, size 0 19.186 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.186 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 19.188 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.382/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.188 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.188 Starting downloading https://server4:443/vzliqhanwh at 33:39.965 on ClientConnection[87668bdf57fcb191/10f6822068fb9b6b(V1) with server4/193.167.100.100:443] 19.183 <- (1) Packet A|0|S0|10f6822068fb9b6b|51|1 NewConnectionIdFrame[1,<0|76f8c603|0a1f6d9582bbdb403c479cb007d61e45] 19.188 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.285/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.188 Discarding pn space Initial because first Handshake message is being sent 19.188 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.285/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.188 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|21cd293b|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 19.210 <- (8) Packet A|8|S0|a20903638dc0ab3d|283|4 NewConnectionIdFrame[1,<0|bbd737ec|013eae0e22f24bca66e922f893271d93] NewTokenFrame[6f2cf0c30dd3845af3e24e9f4f47927fade876c29f2e2d3881d625dae52b432fe98afd40bba40440cec10ff39ce28350437badae2a6595666c0c7e5239ff2bc8ccb8697f87462ba71779abce9e2fb87cdc0a545fd9d8] CryptoFrame[0,138] HandshakeDoneFrame[] 19.211 -> Packet A|4|S0|86a4388b|33|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 19.211 <- (9) Packet A|9|S0|a20903638dc0ab3d|1053|1 StreamFrame[0(CIB),0,1024,fin] 19.211 -> Packet A|5|S0|86a4388b|33|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 19.212 <- (10) Packet A|10|S0|a20903638dc0ab3d|1366|2 Padding(1338) PingFrame[] 19.215 Discarding packet (45 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.219 <- (3) Packet A|2|S0|10f6822068fb9b6b|32|1 AckFrame[0|Δ0] 19.219 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.316/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.316 loss detection timeout handler running Sending probe 0, because no ack since 19.188. Current RTT: 33/13. 19.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.316 (Probe is a handshake retransmit) 19.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 169 millis, based on 19.486/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/13 19.316 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 19.335 <- (4) Packet A|5|S0|10f6822068fb9b6b|259|3 CryptoFrame[0,138] HandshakeDoneFrame[] NewTokenFrame[b5d3bb6c33b36f9c20a44819b3ef9910252adeea8e6c3da786da8f6d326af73f3d6e77fec839d1ef8976e54a0378b7289c7860f63ceeb5bf55abfa47e8faa6e58c8ef0a596df540b5a84fb1d1933ed7405d2b5301f5e] -< CryptoStream[A|NewSessionTicket] 19.336 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 19.486/Handshake, because ackElicitingInFlight | RTT:33/13 19.336 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.336 Discarding pn space Handshake because HandshakeDone is received 19.336 <- (5) Packet A|6|S0|10f6822068fb9b6b|1053|1 StreamFrame[0(CIB),0,1024,fin] 19.337 -> Packet A|1|S0|21cd293b|29|1 AckFrame[6-5,2|Δ0] 19.337 Finished downloading https://server4:443/vzliqhanwh at 33:40.114 on ClientConnection[87668bdf57fcb191/10f6822068fb9b6b(V1) with server4/193.167.100.100:443] 19.337 Closing ClientConnection[87668bdf57fcb191/10f6822068fb9b6b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.337 -> Packet A|2|S0|21cd293b|33|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 19.338 Creating connection with server4:443 with v1 19.338 Setting up connection for downloading https://server4:443/gtukkmkdgk at 33:40.115 on ClientConnection[cf299a5a740f97f7/a6239493c669b2dd(V1) with server4/193.167.100.100:443] 19.338 Original destination connection id: cf299a5a740f97f7 (scid: a6239493c669b2dd) >- CryptoStream[I|ClientHello] 19.340 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.540/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.339 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.373 <- (1) Packet I|0|L|475|3 Token=[] AckFrame[0|Δ0] Padding(303) CryptoFrame[0,123] 19.373 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.573/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.373 <- (1) Packet H|0|L|754|1 CryptoFrame[0,711] 19.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.473/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.376 - unknown transport parameter 0x0a09, size 15 19.375 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 19.377 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.475/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.377 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.378 Starting downloading https://server4:443/gtukkmkdgk at 33:40.154 on ClientConnection[cf299a5a740f97f7/a6239493c669b2dd(V1) with server4/193.167.100.100:443] 19.373 <- (1) Packet A|0|S0|a6239493c669b2dd|51|1 NewConnectionIdFrame[1,<0|6a8cceef|7d9a45a611cca09b7e45977076260536] 19.378 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 19.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.475/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.378 Discarding pn space Initial because first Handshake message is being sent 19.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.475/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.378 -> Packet A|0|S0|f9e77b23|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 19.409 <- (2) Packet A|2|S0|a6239493c669b2dd|32|1 AckFrame[0|Δ0] 19.409 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.506/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.505 loss detection timeout handler running Sending probe 0, because no ack since 19.377. Current RTT: 33/13. 19.505 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.505 (Probe is a handshake retransmit) 19.505 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 169 millis, based on 19.675/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/13 19.505 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 19.525 <- (3) Packet A|5|S0|a6239493c669b2dd|259|3 CryptoFrame[0,138] NewTokenFrame[916e94099539d013c9b21a136bff623a42fe49dd0a84f2e0af3d48deb1a06ab8ca66585b1b09e1b31761ddb3d6e759b58e845e9986da0e107bac04649f3f80c6be5fa913e7c39c02915be88def5872aa18c4825444a0] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 19.525 State is set to Confirmed reschedule loss detection timer for PTO over 150 millis, based on 19.675/Handshake, because ackElicitingInFlight | RTT:33/13 19.525 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.525 Discarding pn space Handshake because HandshakeDone is received 19.544 -> Packet A|1|S0|f9e77b23|30|1 AckFrame[5,2|Δ19] 19.644 <- (4) Packet A|8|S0|a6239493c669b2dd|1053|1 StreamFrame[0(CIB),0,1024,fin] 19.645 Finished downloading https://server4:443/gtukkmkdgk at 33:40.422 on ClientConnection[cf299a5a740f97f7/a6239493c669b2dd(V1) with server4/193.167.100.100:443] 19.645 Closing ClientConnection[cf299a5a740f97f7/a6239493c669b2dd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.645 -> Packet A|2|S0|f9e77b23|35|2 ConnectionCloseFrame[0|0|] AckFrame[8,5,2|Δ0] 19.646 Creating connection with server4:443 with v1 19.646 <- (5) Packet A|9|S0|a6239493c669b2dd|1053|1 StreamFrame[0(CIB),0,1024,fin] 19.646 -> Packet A|3|S0|f9e77b23|35|2 ConnectionCloseFrame[0|0|] AckFrame[8,5,2|Δ0] 19.646 Setting up connection for downloading https://server4:443/caowcvkixa at 33:40.423 on ClientConnection[5c86ae7df0ad6f2e/7108b55f2da53ee9(V1) with server4/193.167.100.100:443] 19.646 Original destination connection id: 5c86ae7df0ad6f2e (scid: 7108b55f2da53ee9) >- CryptoStream[I|ClientHello] 19.648 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.848/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.648 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.739 <- (11) Packet A|12|S0|a20903638dc0ab3d|283|4 NewConnectionIdFrame[1,<0|bbd737ec|013eae0e22f24bca66e922f893271d93] NewTokenFrame[6f2cf0c30dd3845af3e24e9f4f47927fade876c29f2e2d3881d625dae52b432fe98afd40bba40440cec10ff39ce28350437badae2a6595666c0c7e5239ff2bc8ccb8697f87462ba71779abce9e2fb87cdc0a545fd9d8] HandshakeDoneFrame[] CryptoFrame[0,138] 19.739 -> Packet A|6|S0|86a4388b|33|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 19.739 <- (12) Packet A|13|S0|a20903638dc0ab3d|1053|1 StreamFrame[0(CIB),0,1024,fin] 19.847 loss detection timeout handler running Sending probe 0, because no ack since 19.648. Current RTT: 100/25. 19.847 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.847 (Probe is an initial retransmit) 19.847 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.247/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.847 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.082 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 20.084 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.284/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.085 Discarding pn space Initial because first Handshake message is being sent 20.085 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.285/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.085 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 20.281 <- (3) Packet H|1|L|742|1 CryptoFrame[0,699] 20.282 - unknown transport parameter 0x171d, size 2 20.284 loss detection timeout handler running 20.284 Sending probe 0. Current RTT: 100/25. 20.284 Sending probe because peer awaiting address validation 20.284 (Probe is a handshake ping) 20.284 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.684/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.284 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) >- CryptoStream[H|Finished] 20.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.685/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.285 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.285 Starting downloading https://server4:443/caowcvkixa at 33:41.062 on ClientConnection[5c86ae7df0ad6f2e/7108b55f2da53ee9(V1) with server4/193.167.100.100:443] 20.286 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.686/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.285 -> [Packet H|2|L|42|1 AckFrame[1|Δ0], Packet A|0|S0|baf9fddf|43|1 StreamFrame[0(CIB),0,17,fin]] 20.316 <- (4) Packet A|3|S0|7108b55f2da53ee9|280|4 CryptoFrame[0,135] NewTokenFrame[f647065b6eace1c9584adb900979240ac95acf71f73e495808c56d4313bbf14e24ed93f51e4a0ba089cd1e89c2dd58c0cb741aa33b880e0cd70b6103826f97e4c89439067834d8e31f6139cea4f11d39adb3df71dbd0] NewConnectionIdFrame[1,<0|cc4a2021|5dcf33fc59cbc6065ae6f3bc0e79f639] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 20.316 State is set to Confirmed reschedule loss detection timer for PTO over 368 millis, based on 20.685/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 195 millis, based on 20.511/App, because ackElicitingInFlight | RTT:100/25 20.316 Discarding pn space Handshake because HandshakeDone is received 20.317 <- (5) Packet A|4|S0|7108b55f2da53ee9|1366|2 Padding(1338) PingFrame[] 20.317 -> Packet A|1|S0|baf9fddf|27|1 AckFrame[4-3|Δ0] 20.318 <- (6) Packet A|6|S0|7108b55f2da53ee9|1053|1 StreamFrame[0(CIB),0,1024,fin] 20.318 Finished downloading https://server4:443/caowcvkixa at 33:41.095 on ClientConnection[5c86ae7df0ad6f2e/7108b55f2da53ee9(V1) with server4/193.167.100.100:443] 20.318 Closing ClientConnection[5c86ae7df0ad6f2e/7108b55f2da53ee9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.319 -> Packet A|2|S0|baf9fddf|33|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-3|Δ0] 20.319 Creating connection with server4:443 with v1 20.320 Setting up connection for downloading https://server4:443/wyscpalrao at 33:41.096 on ClientConnection[8b7e6deaca7d08f3/8b94387f0bacc44e(V1) with server4/193.167.100.100:443] 20.320 Original destination connection id: 8b7e6deaca7d08f3 (scid: 8b94387f0bacc44e) >- CryptoStream[I|ClientHello] 20.321 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.521/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.321 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.354 <- (1) Packet I|0|L|479|3 Token=[] AckFrame[0|Δ0] Padding(307) CryptoFrame[0,123] 20.355 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.555/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.354 <- (1) Packet H|0|L|750|1 CryptoFrame[0,707] 20.357 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.454/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.357 - unknown transport parameter 0x0ea3, size 10 20.357 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 20.359 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.456/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.359 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.359 Starting downloading https://server4:443/wyscpalrao at 33:41.136 on ClientConnection[8b7e6deaca7d08f3/8b94387f0bacc44e(V1) with server4/193.167.100.100:443] 20.354 <- (1) Packet A|0|S0|8b94387f0bacc44e|51|1 NewConnectionIdFrame[1,<0|8c74307f|fd2a865bf69e8596eb5b1d1f8ff03371] 20.360 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.457/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.360 Discarding pn space Initial because first Handshake message is being sent 20.360 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.457/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.360 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|6e9689c4|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 20.391 <- (2) Packet A|1|S0|8b94387f0bacc44e|1366|2 Padding(1338) PingFrame[] 20.411 -> Packet A|1|S0|6e9689c4|28|1 AckFrame[1-0|Δ19] 20.456 loss detection timeout handler running Sending probe 0, because no ack since 20.359. Current RTT: 33/16. 20.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.456 (Probe is a handshake retransmit) 20.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.650/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.456 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 20.570 <- (3) Packet A|4|S0|8b94387f0bacc44e|256|3 CryptoFrame[0,135] NewTokenFrame[94a92c5c49b0415a4d83852b9ac5eb8c6ded60c3c8ce547d773bda1b6c52e2533ca7c694abb61d637f44a0a73e4bba5e4801d274c2999d0d88d01316acdde6671f44f12edd2dc142ebed07d08ab97e6eab66dea9af63] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 20.571 State is set to Confirmed reschedule loss detection timer for PTO over 34 millis, based on 20.606/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -88 millis, based on 20.483/App, because ackElicitingInFlight | RTT:33/16 20.571 Discarding pn space Handshake because HandshakeDone is received 20.571 loss detection timeout handler running Sending probe 0, because no ack since 20.360. Current RTT: 33/16. 20.571 (Probe is retransmit on level App) 20.570 <- (4) Packet A|5|S0|8b94387f0bacc44e|256|3 CryptoFrame[0,135] HandshakeDoneFrame[] NewTokenFrame[94a92c5c49b0415a4d83852b9ac5eb8c6ded60c3c8ce547d773bda1b6c52e2533ca7c694abb61d637f44a0a73e4bba5e4801d274c2999d0d88d01316acdde6671f44f12edd2dc142ebed07d08ab97e6eab66dea9af63] -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 245 millis, based on 20.817/App, because ackElicitingInFlight | RTT:33/16 20.571 -> Packet PA|2|S0|6e9689c4|43|1 StreamFrame[0(CIB),0,17,fin] 20.572 -> Packet A|3|S0|6e9689c4|29|1 AckFrame[5-4,1-0|Δ0] 20.602 <- (5) Packet A|6|S0|8b94387f0bacc44e|32|1 AckFrame[2-1|Δ0] 20.603 Cwnd(-): 6000; inflight: 0 20.603 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 20.603 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 20.714/App, because ackElicitingInFlight | RTT:33/13 20.603 -> Packet A|4|S0|6e9689c4|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5-4|Δ0] 20.603 <- (6) Packet A|7|S0|8b94387f0bacc44e|1053|1 StreamFrame[0(CIB),0,1024,fin] 20.604 Finished downloading https://server4:443/wyscpalrao at 33:41.381 on ClientConnection[8b7e6deaca7d08f3/8b94387f0bacc44e(V1) with server4/193.167.100.100:443] 20.604 Closing ClientConnection[8b7e6deaca7d08f3/8b94387f0bacc44e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.604 -> Packet A|5|S0|6e9689c4|31|2 ConnectionCloseFrame[0|0|] AckFrame[7-4|Δ0] 20.604 Creating connection with server4:443 with v1 20.605 Setting up connection for downloading https://server4:443/nlblfjstfy at 33:41.382 on ClientConnection[58b8c8d8643d6948/85ace7e9c7de6be8(V1) with server4/193.167.100.100:443] 20.605 Original destination connection id: 58b8c8d8643d6948 (scid: 85ace7e9c7de6be8) >- CryptoStream[I|ClientHello] 20.608 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.808/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.608 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.642 <- (1) Packet I|0|L|475|3 Token=[] AckFrame[0|Δ0] Padding(303) CryptoFrame[0,123] 20.643 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.843/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.642 <- (1) Packet H|0|L|754|1 CryptoFrame[0,711] 20.645 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.742/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.645 - unknown transport parameter 0x0cf1, size 14 20.645 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 20.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.744/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.647 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.647 Starting downloading https://server4:443/nlblfjstfy at 33:41.424 on ClientConnection[58b8c8d8643d6948/85ace7e9c7de6be8(V1) with server4/193.167.100.100:443] 20.642 <- (1) Packet A|0|S0|85ace7e9c7de6be8|51|1 NewConnectionIdFrame[1,<0|b624db60|25e674b84128cb6f1a54788ab4878e0e] 20.647 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 20.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.745/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.648 Discarding pn space Initial because first Handshake message is being sent 20.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.745/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.648 -> Packet A|0|S0|bebcefe0|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 20.661 <- (7) Packet A|8|S0|8b94387f0bacc44e|1409|2 Padding(1381) PingFrame[] 20.661 <- (8) Packet A|9|S0|8b94387f0bacc44e|33|1 AckFrame[4-1|Δ25] 20.661 -> Packet A|6|S0|6e9689c4|31|2 ConnectionCloseFrame[0|0|] AckFrame[7-4|Δ0] 20.662 -> Packet A|7|S0|6e9689c4|31|2 ConnectionCloseFrame[0|0|] AckFrame[7-4|Δ0] 20.678 <- (2) Packet A|1|S0|85ace7e9c7de6be8|259|3 CryptoFrame[0,138] NewTokenFrame[1a6d681c0137f135ce41f2e27e9dedc976b9dd7ee5f812a5e7025aac675d1ff6eb125e8560b4551d75e5bcd5ba713bbc331d90246db79533f1240798070cdfeaff8f108dc91dc054901f0a99358fa4ed7eab5cdb1a8c] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 20.679 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 20.744/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 20.771/App, because ackElicitingInFlight | RTT:33/16 20.679 Discarding pn space Handshake because HandshakeDone is received 20.698 -> Packet A|1|S0|bebcefe0|28|1 AckFrame[1-0|Δ19] 20.771 loss detection timeout handler running Sending probe 0, because no ack since 20.648. Current RTT: 33/16. 20.771 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 21.017/App, because ackElicitingInFlight | RTT:33/16 20.771 -> Packet PA|2|S0|bebcefe0|43|1 StreamFrame[0(CIB),0,17,fin] 20.811 <- (3) Packet A|3|S0|85ace7e9c7de6be8|51|1 NewConnectionIdFrame[1,<0|b624db60|25e674b84128cb6f1a54788ab4878e0e] 20.811 <- (4) Packet A|4|S0|85ace7e9c7de6be8|259|3 CryptoFrame[0,138] NewTokenFrame[1a6d681c0137f135ce41f2e27e9dedc976b9dd7ee5f812a5e7025aac675d1ff6eb125e8560b4551d75e5bcd5ba713bbc331d90246db79533f1240798070cdfeaff8f108dc91dc054901f0a99358fa4ed7eab5cdb1a8c] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 20.811 -> Packet A|3|S0|bebcefe0|29|1 AckFrame[4-3,1-0|Δ0] 21.016 loss detection timeout handler running Sending probe 1, because no ack since 20.771. Current RTT: 33/16. 21.016 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 21.509/App, because ackElicitingInFlight | RTT:33/16 21.017 -> Packet PA|4|S0|bebcefe0|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 21.510/App, because ackElicitingInFlight | RTT:33/16 21.018 -> Packet PA|5|S0|bebcefe0|43|1 StreamFrame[0(CIB),0,17,fin] 21.049 <- (5) Packet A|5|S0|85ace7e9c7de6be8|1366|2 Padding(1338) PingFrame[] 21.049 <- (6) Packet A|6|S0|85ace7e9c7de6be8|32|1 AckFrame[4-3|Δ0] 21.050 Cwnd(-): 6000; inflight: 43 21.050 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 21.141/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 106 millis, based on 21.157/App, because ackElicitingInFlight | RTT:33/12 21.050 -> Packet A|6|S0|bebcefe0|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 21.074 <- (7) Packet A|8|S0|85ace7e9c7de6be8|33|1 AckFrame[5-3|Δ25] reschedule loss detection timer for PTO over 82 millis, based on 21.157/App, because ackElicitingInFlight | RTT:33/12 21.106 <- (8) Packet A|9|S0|85ace7e9c7de6be8|33|1 AckFrame[6-3|Δ25] 21.106 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.156 <- (9) Packet A|12|S0|85ace7e9c7de6be8|1053|1 StreamFrame[0(CIB),0,1024,fin] 21.157 Finished downloading https://server4:443/nlblfjstfy at 33:41.933 on ClientConnection[58b8c8d8643d6948/85ace7e9c7de6be8(V1) with server4/193.167.100.100:443] 21.157 Closing ClientConnection[58b8c8d8643d6948/85ace7e9c7de6be8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.157 -> Packet A|7|S0|bebcefe0|35|2 ConnectionCloseFrame[0|0|] AckFrame[12,9-8,6|Δ0] 21.157 Creating connection with server4:443 with v1 21.158 Setting up connection for downloading https://server4:443/jpyqnwnhww at 33:41.935 on ClientConnection[f40e459a88eceba5/20a9a969b3b2bf09(V1) with server4/193.167.100.100:443] 21.158 Original destination connection id: f40e459a88eceba5 (scid: 20a9a969b3b2bf09) >- CryptoStream[I|ClientHello] 21.159 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.359/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.159 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.358 loss detection timeout handler running Sending probe 0, because no ack since 21.159. Current RTT: 100/25. 21.358 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.358 (Probe is an initial retransmit) 21.359 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.759/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.359 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.367 <- (10) Packet A|14|S0|85ace7e9c7de6be8|1053|1 StreamFrame[0(CIB),0,1024,fin] 21.367 -> Packet A|8|S0|bebcefe0|35|2 ConnectionCloseFrame[0|0|] AckFrame[12,9-8,6|Δ0] 21.367 <- (11) Packet A|15|S0|85ace7e9c7de6be8|1053|1 StreamFrame[0(CIB),0,1024,fin] 21.368 -> Packet A|9|S0|bebcefe0|35|2 ConnectionCloseFrame[0|0|] AckFrame[12,9-8,6|Δ0] 21.392 <- (1) Packet I|0|L|486|3 Token=[] AckFrame[1|Δ0] Padding(314) CryptoFrame[0,123] 21.392 probe count not reset on ack because handshake not yet confirmed 21.393 Retransmitting CryptoFrame[0,257] on level Initial 21.393 Cwnd(-): 6000; inflight: 0 21.393 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.793/Initial, because peerAwaitingAddressValidation | RTT:100/25 21.393 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 21.587/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.393 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 21.392 <- (1) Packet H|0|L|743|1 CryptoFrame[0,700] 21.395 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.589/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.395 - unknown transport parameter 0x0e27, size 2 21.395 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 21.397 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.591/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.397 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.392 <- (1) Packet A|0|S0|20a9a969b3b2bf09|51|1 NewConnectionIdFrame[1,<0|4aa6d457|e5c11a6fb20cb45b9bc1250db6da3c23] 21.397 Starting downloading https://server4:443/jpyqnwnhww at 33:42.174 on ClientConnection[f40e459a88eceba5/20a9a969b3b2bf09(V1) with server4/193.167.100.100:443] 21.397 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.397 -> Packet H|1|L|42|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 21.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.398 Discarding pn space Initial because first Handshake message is being sent 21.398 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.495/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.398 -> Packet A|0|S0|bd5fda6e|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 21.494 loss detection timeout handler running Sending probe 0, because no ack since 21.397. Current RTT: 33/16. 21.494 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.494 (Probe is a handshake retransmit) 21.494 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.689/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.494 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 21.526 <- (2) Packet A|3|S0|20a9a969b3b2bf09|283|4 NewConnectionIdFrame[1,<0|4aa6d457|e5c11a6fb20cb45b9bc1250db6da3c23] HandshakeDoneFrame[] NewTokenFrame[e04259f28952bcd6cc96da974fa4d841413c8791b90f352c0dd352053804a215194d12db0b28d38f10b7746a0d433153956a5ec3c945d51869081d79fe8edc44f635696ac96a4491b9237b6462db03251c25b1d29f9f] CryptoFrame[0,138] 21.526 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 21.644/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -5 millis, based on 21.521/App, because ackElicitingInFlight | RTT:33/16 21.527 loss detection timeout handler running 21.527 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 21.398. Current RTT: 33/16. 21.527 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 245 millis, based on 21.773/App, because ackElicitingInFlight | RTT:33/16 21.527 -> Packet PA|1|S0|bd5fda6e|43|1 StreamFrame[0(CIB),0,17,fin] 21.526 <- (3) Packet A|4|S0|20a9a969b3b2bf09|33|1 AckFrame[0|Δ97] reschedule loss detection timer for PTO over 122 millis, based on 21.650/App, because ackElicitingInFlight | RTT:33/16 21.527 <- (4) Packet A|5|S0|20a9a969b3b2bf09|1053|1 StreamFrame[0(CIB),0,1024,fin] 21.528 -> Packet A|2|S0|bd5fda6e|27|1 AckFrame[5-3|Δ0] 21.528 Finished downloading https://server4:443/jpyqnwnhww at 33:42.305 on ClientConnection[f40e459a88eceba5/20a9a969b3b2bf09(V1) with server4/193.167.100.100:443] 21.528 Closing ClientConnection[f40e459a88eceba5/20a9a969b3b2bf09(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.528 -> Packet A|3|S0|bd5fda6e|31|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 21.528 Creating connection with server4:443 with v1 21.529 Setting up connection for downloading https://server4:443/mpzctogkwk at 33:42.306 on ClientConnection[2332fdca433c5df2/2d820de0da3b58a1(V1) with server4/193.167.100.100:443] 21.529 Original destination connection id: 2332fdca433c5df2 (scid: 2d820de0da3b58a1) >- CryptoStream[I|ClientHello] 21.531 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.731/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.531 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.558 <- (5) Packet A|6|S0|20a9a969b3b2bf09|30|1 MaxStreamsFrame[B,101] 21.559 -> Packet A|4|S0|bd5fda6e|31|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 21.564 <- (1) Packet I|0|L|485|3 Token=[] AckFrame[0|Δ0] Padding(313) CryptoFrame[0,123] 21.565 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.765/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.564 <- (1) Packet H|0|L|744|1 CryptoFrame[0,701] 21.568 - unknown transport parameter 0x1e80, size 4 21.568 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.665/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.568 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 21.570 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.667/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.570 -> Packet H|0|L|76|1 CryptoFrame[0,36] 21.570 Starting downloading https://server4:443/mpzctogkwk at 33:42.347 on ClientConnection[2332fdca433c5df2/2d820de0da3b58a1(V1) with server4/193.167.100.100:443] 21.570 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 21.564 <- (1) Packet A|0|S0|2d820de0da3b58a1|51|1 NewConnectionIdFrame[1,<0|adf04401|db8c0a51c9b4fbb3a7172ae256f53ad8] 21.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.668/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.571 Discarding pn space Initial because first Handshake message is being sent 21.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.668/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.571 -> Packet A|0|S0|e379cf26|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 21.601 <- (2) Packet A|1|S0|2d820de0da3b58a1|259|3 NewTokenFrame[c5683b6e19abf722dfa90fa8111fa5b5c02035b1bacf0dca596828b8fa83a775ad44751af57f2f4ec479767c90a40e64ee2ee6eb5ea16c7a8a70744ee8e7abdb042a19d7d738f7260704fcc37344220bdf0d18f027fa] CryptoFrame[0,138] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 21.602 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 21.667/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 21.694/App, because ackElicitingInFlight | RTT:33/16 21.602 Discarding pn space Handshake because HandshakeDone is received 21.602 <- (3) Packet A|2|S0|2d820de0da3b58a1|32|1 AckFrame[0|Δ0] 21.603 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.603 <- (4) Packet A|3|S0|2d820de0da3b58a1|1053|1 StreamFrame[0(CIB),0,1024,fin] 21.603 -> Packet A|1|S0|e379cf26|27|1 AckFrame[3-1|Δ0] 21.603 Finished downloading https://server4:443/mpzctogkwk at 33:42.380 on ClientConnection[2332fdca433c5df2/2d820de0da3b58a1(V1) with server4/193.167.100.100:443] 21.603 Closing ClientConnection[2332fdca433c5df2/2d820de0da3b58a1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.604 Creating connection with server4:443 with v1 21.604 -> Packet A|2|S0|e379cf26|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 21.604 Setting up connection for downloading https://server4:443/vfhvfdtfqu at 33:42.381 on ClientConnection[6212e78a67e22b97/69eb77a16e9f5cc6(V1) with server4/193.167.100.100:443] 21.604 Original destination connection id: 6212e78a67e22b97 (scid: 69eb77a16e9f5cc6) >- CryptoStream[I|ClientHello] 21.605 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.805/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.605 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.634 <- (5) Packet A|4|S0|2d820de0da3b58a1|30|1 MaxStreamsFrame[B,101] 21.634 -> Packet A|3|S0|e379cf26|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 21.639 <- (1) Packet I|0|L|480|3 Token=[] AckFrame[0|Δ0] Padding(308) CryptoFrame[0,123] 21.639 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.839/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.639 <- (1) Packet H|0|L|749|1 CryptoFrame[0,706] 21.641 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.738/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.641 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 21.641 - unknown transport parameter 0x0838, size 10 >- CryptoStream[H|Finished] 21.643 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.643 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.639 <- (1) Packet A|0|S0|69eb77a16e9f5cc6|51|1 NewConnectionIdFrame[1,<0|1cd8a508|c07a14dbd5d9e903fa4988cec1717038] 21.644 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 21.644 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.741/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.644 Discarding pn space Initial because first Handshake message is being sent 21.644 Starting downloading https://server4:443/vfhvfdtfqu at 33:42.421 on ClientConnection[6212e78a67e22b97/69eb77a16e9f5cc6(V1) with server4/193.167.100.100:443] 21.644 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.741/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.644 -> Packet A|0|S0|b0d4e185|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 21.675 <- (2) Packet A|1|S0|69eb77a16e9f5cc6|259|3 CryptoFrame[0,138] NewTokenFrame[e0ec46f6cec2fb51b181464d2912416590edc79ece1ad76c981390e956a8244b02072e732a84bc6737d8ad6191bae6fe771aa2bcb8f482ed0632cf21dab7e92b142b5d6e370761c52b154634bf31ab890549c70e0664] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 21.675 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 21.740/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 21.767/App, because ackElicitingInFlight | RTT:33/16 21.675 Discarding pn space Handshake because HandshakeDone is received 21.694 -> Packet A|1|S0|b0d4e185|28|1 AckFrame[1-0|Δ19] 21.767 loss detection timeout handler running Sending probe 0, because no ack since 21.644. Current RTT: 33/16. 21.767 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 22.014/App, because ackElicitingInFlight | RTT:33/16 21.768 -> Packet PA|2|S0|b0d4e185|43|1 StreamFrame[0(CIB),0,17,fin] 21.806 <- (3) Packet A|3|S0|69eb77a16e9f5cc6|51|1 NewConnectionIdFrame[1,<0|1cd8a508|c07a14dbd5d9e903fa4988cec1717038] 21.806 <- (4) Packet A|4|S0|69eb77a16e9f5cc6|259|3 NewTokenFrame[e0ec46f6cec2fb51b181464d2912416590edc79ece1ad76c981390e956a8244b02072e732a84bc6737d8ad6191bae6fe771aa2bcb8f482ed0632cf21dab7e92b142b5d6e370761c52b154634bf31ab890549c70e0664] CryptoFrame[0,138] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 21.807 -> Packet A|3|S0|b0d4e185|29|1 AckFrame[4-3,1-0|Δ0] 22.013 loss detection timeout handler running Sending probe 1, because no ack since 21.768. Current RTT: 33/16. 22.013 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 22.505/App, because ackElicitingInFlight | RTT:33/16 22.013 -> Packet PA|4|S0|b0d4e185|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 22.506/App, because ackElicitingInFlight | RTT:33/16 22.014 -> Packet PA|5|S0|b0d4e185|43|1 StreamFrame[0(CIB),0,17,fin] 22.045 <- (5) Packet A|5|S0|69eb77a16e9f5cc6|1366|2 Padding(1338) PingFrame[] 22.046 <- (6) Packet A|7|S0|69eb77a16e9f5cc6|1053|1 StreamFrame[0(CIB),0,1024,fin] 22.047 -> Packet A|6|S0|b0d4e185|31|1 AckFrame[7,5-3,1-0|Δ0] 22.047 Finished downloading https://server4:443/vfhvfdtfqu at 33:42.823 on ClientConnection[6212e78a67e22b97/69eb77a16e9f5cc6(V1) with server4/193.167.100.100:443] 22.047 Closing ClientConnection[6212e78a67e22b97/69eb77a16e9f5cc6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.047 -> Packet A|7|S0|b0d4e185|35|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-3,1-0|Δ0] 22.047 Creating connection with server4:443 with v1 22.048 Setting up connection for downloading https://server4:443/hlkwufbodt at 33:42.825 on ClientConnection[fd3455a1839df65d/a3ecc0469da30a24(V1) with server4/193.167.100.100:443] 22.048 Original destination connection id: fd3455a1839df65d (scid: a3ecc0469da30a24) >- CryptoStream[I|ClientHello] 22.049 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.249/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.049 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.083 <- (1) Packet I|0|L|475|3 Token=[] AckFrame[0|Δ0] Padding(303) CryptoFrame[0,123] 22.083 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.283/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.083 <- (1) Packet H|0|L|754|1 CryptoFrame[0,711] 22.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.085 - unknown transport parameter 0x056f, size 13 reschedule loss detection timer for PTO over 96 millis, based on 22.182/Handshake, because peerAwaitingAddressValidation | RTT:33/16 22.085 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 22.087 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.184/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.087 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.087 Starting downloading https://server4:443/hlkwufbodt at 33:42.864 on ClientConnection[fd3455a1839df65d/a3ecc0469da30a24(V1) with server4/193.167.100.100:443] 22.083 <- (1) Packet A|0|S0|a3ecc0469da30a24|51|1 NewConnectionIdFrame[1,<0|70b60c35|de40d40d13bec8dd223aadcdf17d6551] 22.088 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.185/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.088 Discarding pn space Initial because first Handshake message is being sent 22.087 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 22.088 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 22.185/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.088 -> Packet A|0|S0|7356a04c|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 22.118 <- (2) Packet A|1|S0|a3ecc0469da30a24|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[6b9fb41d62c3672cec3c5bdb022ecdecb1b169e44748bbf6f20e29fd0a8b0c57dee6035e48bbb4781b2af127ed537ff5adc2354a282dd390b6eda77f5aa50bed69c018a62080e95ef293b43ac0761892ad6c9e5ec467] 22.119 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 22.184/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 22.211/App, because ackElicitingInFlight | RTT:33/16 22.119 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 22.138 -> Packet A|1|S0|7356a04c|28|1 AckFrame[1-0|Δ19] 22.163 <- (7) Packet A|11|S0|69eb77a16e9f5cc6|1053|1 StreamFrame[0(CIB),0,1024,fin] 22.163 -> Packet A|8|S0|b0d4e185|35|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-3,1-0|Δ0] 22.211 loss detection timeout handler running Sending probe 0, because no ack since 22.088. Current RTT: 33/16. 22.211 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 22.457/App, because ackElicitingInFlight | RTT:33/16 22.211 -> Packet PA|2|S0|7356a04c|43|1 StreamFrame[0(CIB),0,17,fin] 22.267 <- (3) Packet A|7|S0|a3ecc0469da30a24|33|1 AckFrame[2-0|Δ25] 22.267 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.394 <- (8) Packet A|13|S0|69eb77a16e9f5cc6|1053|1 StreamFrame[0(CIB),0,1024,fin] 22.395 -> Packet A|9|S0|b0d4e185|35|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-3,1-0|Δ0] 22.477 <- (4) Packet A|9|S0|a3ecc0469da30a24|1053|1 StreamFrame[0(CIB),0,1024,fin] 22.477 Finished downloading https://server4:443/hlkwufbodt at 33:43.254 on ClientConnection[fd3455a1839df65d/a3ecc0469da30a24(V1) with server4/193.167.100.100:443] 22.478 Closing ClientConnection[fd3455a1839df65d/a3ecc0469da30a24(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.478 -> Packet A|3|S0|7356a04c|33|2 ConnectionCloseFrame[0|0|] AckFrame[9,7|Δ0] 22.478 Creating connection with server4:443 with v1 22.479 Setting up connection for downloading https://server4:443/hxubyivoxi at 33:43.255 on ClientConnection[14ac0d6ee8fbf4b1/01fbe7b29f92e966(V1) with server4/193.167.100.100:443] 22.479 Original destination connection id: 14ac0d6ee8fbf4b1 (scid: 01fbe7b29f92e966) 22.479 <- (5) Packet A|11|S0|a3ecc0469da30a24|1366|2 Padding(1338) PingFrame[] 22.479 -> Packet A|4|S0|7356a04c|33|2 ConnectionCloseFrame[0|0|] AckFrame[9,7|Δ0] >- CryptoStream[I|ClientHello] 22.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.680/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.480 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.679 loss detection timeout handler running Sending probe 0, because no ack since 22.480. Current RTT: 100/25. 22.679 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.679 (Probe is an initial retransmit) 22.680 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.080/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.679 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.714 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 22.716 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 22.916/Handshake, because peerAwaitingAddressValidation | RTT:100/25 22.716 Discarding pn space Initial because first Handshake message is being sent 22.716 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 22.716 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 22.916/Handshake, because peerAwaitingAddressValidation | RTT:100/25 22.716 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 22.913 <- (3) Packet H|1|L|744|1 CryptoFrame[0,701] 22.914 - unknown transport parameter 0x0c37, size 3 22.916 loss detection timeout handler running 22.916 Sending probe 0. Current RTT: 100/25. 22.916 Sending probe because peer awaiting address validation 22.916 (Probe is a handshake ping) 22.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 23.316/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 >- CryptoStream[H|Finished] 22.916 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 23.316/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.916 Starting downloading https://server4:443/hxubyivoxi at 33:43.693 on ClientConnection[14ac0d6ee8fbf4b1/01fbe7b29f92e966(V1) with server4/193.167.100.100:443] 22.916 -> Packet H|1|L|76|1 CryptoFrame[0,36] 22.914 <- (4) Packet H|2|L|744|1 CryptoFrame[0,701] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.916 -> Packet H|2|L|42|1 AckFrame[1|Δ0] 22.917 -> Packet H|3|L|42|1 AckFrame[2-1|Δ0] 22.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 23.317/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.917 -> Packet A|0|S0|7d16a3ae|43|1 StreamFrame[0(CIB),0,17,fin] 23.316 loss detection timeout handler running Sending probe 1, because no ack since 22.916. Current RTT: 100/25. 23.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.316 (Probe is a handshake retransmit) 23.317 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 24.117/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.316 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 23.318 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 24.118/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.317 -> Packet PH|5|L|76|1 CryptoFrame[0,36] 23.348 <- (5) Packet A|2|S0|01fbe7b29f92e966|283|4 CryptoFrame[0,138] NewTokenFrame[cd814a22b65408104df9a3d450355c713e2752328ee34e2a0394a4b085ef4fd9d74f928c3457bff0ab78446fb64b4114574fe4a7f2e7ba43eb96ea6d71a8567e0f4a14b987358c4ca3bf3efc7907db9f51d9f511d50e] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c8b57015|6ff1a563d8b230322ff7ec83ab3c64e0] -< CryptoStream[A|NewSessionTicket] 23.349 State is set to Confirmed reschedule loss detection timer for PTO over 472 millis, based on 23.821/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -205 millis, based on 23.143/App, because ackElicitingInFlight | RTT:100/25 23.349 Discarding pn space Handshake because HandshakeDone is received 23.349 loss detection timeout handler running Sending probe 0, because no ack since 22.917. Current RTT: 100/25. 23.349 (Probe is retransmit on level App) 23.348 <- (6) Packet A|3|S0|01fbe7b29f92e966|283|4 CryptoFrame[0,138] NewTokenFrame[cd814a22b65408104df9a3d450355c713e2752328ee34e2a0394a4b085ef4fd9d74f928c3457bff0ab78446fb64b4114574fe4a7f2e7ba43eb96ea6d71a8567e0f4a14b987358c4ca3bf3efc7907db9f51d9f511d50e] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|c8b57015|6ff1a563d8b230322ff7ec83ab3c64e0] reschedule loss detection timer for PTO over 451 millis, based on 23.801/App, because ackElicitingInFlight | RTT:100/25 -< CryptoStream[A|NewSessionTicket] 23.349 -> Packet PA|1|S0|7d16a3ae|43|1 StreamFrame[0(CIB),0,17,fin] 23.348 <- (7) Packet A|4|S0|01fbe7b29f92e966|35|1 AckFrame[0|Δ400] 23.349 -> Packet A|2|S0|7d16a3ae|27|1 AckFrame[3-2|Δ0] reschedule loss detection timer for PTO over 225 millis, based on 23.575/App, because ackElicitingInFlight | RTT:100/25 23.349 <- (8) Packet A|5|S0|01fbe7b29f92e966|1053|1 StreamFrame[0(CIB),0,1024,fin] 23.350 Finished downloading https://server4:443/hxubyivoxi at 33:44.127 on ClientConnection[14ac0d6ee8fbf4b1/01fbe7b29f92e966(V1) with server4/193.167.100.100:443] 23.350 Closing ClientConnection[14ac0d6ee8fbf4b1/01fbe7b29f92e966(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.350 -> Packet A|3|S0|7d16a3ae|31|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 23.351 Creating connection with server4:443 with v1 23.351 Setting up connection for downloading https://server4:443/jqxtrpoefs at 33:44.128 on ClientConnection[cef60b8d9713ff5c/e2394c4c1ee963fa(V1) with server4/193.167.100.100:443] 23.351 Original destination connection id: cef60b8d9713ff5c (scid: e2394c4c1ee963fa) >- CryptoStream[I|ClientHello] 23.352 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.552/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.352 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.551 loss detection timeout handler running Sending probe 0, because no ack since 23.352. Current RTT: 100/25. 23.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.552 (Probe is an initial retransmit) 23.552 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.952/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.552 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.587 <- (1) Packet I|3|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 23.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 23.790/Handshake, because peerAwaitingAddressValidation | RTT:100/25 23.590 Discarding pn space Initial because first Handshake message is being sent 23.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 23.790/Handshake, because peerAwaitingAddressValidation | RTT:100/25 23.590 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1157) 23.789 loss detection timeout handler running 23.789 Sending probe 0. Current RTT: 100/25. 23.789 Sending probe because peer awaiting address validation 23.789 (Probe is a handshake ping) 23.789 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 24.189/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.789 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 24.188 loss detection timeout handler running Sending probe 1, because no ack since 23.789. Current RTT: 100/25. 24.188 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.189 (Probe is a handshake ping) 24.189 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 24.989/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.189 -> Packet PH|1|L|40|2 PingFrame[] Padding(2) 24.190 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 24.990/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.190 -> Packet PH|2|L|40|2 PingFrame[] Padding(2) 24.222 <- (2) Packet H|4|L|744|1 CryptoFrame[0,701] 24.222 - unknown transport parameter 0x05eb, size 4 >- CryptoStream[H|Finished] 24.225 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 25.025/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.225 -> Packet H|3|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.225 Starting downloading https://server4:443/jqxtrpoefs at 33:45.002 on ClientConnection[cef60b8d9713ff5c/e2394c4c1ee963fa(V1) with server4/193.167.100.100:443] 24.225 -> Packet H|4|L|42|1 AckFrame[4|Δ0] 24.225 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 25.025/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.225 -> Packet A|0|S0|ea5ada27|43|1 StreamFrame[0(CIB),0,17,fin] 24.256 <- (3) Packet A|2|S0|e2394c4c1ee963fa|280|4 HandshakeDoneFrame[] NewTokenFrame[a9ac61937bf0129c6af2e4c7d768c5d660edc86a2b6e60e0bb20424efc877690ef58caa564269f356391e3c6f9e488bfdc2a8a406ae57c4cb32ee9149f3a32492cbea7a9bcc0daf3dc5f73809d27a9a4060f4663fe02] NewConnectionIdFrame[1,<0|6bd1ea70|3f2657dc3c6c865778693ae045a36790] CryptoFrame[0,135] 24.256 State is set to Confirmed reschedule loss detection timer for PTO over 768 millis, based on 25.025/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 24.451/App, because ackElicitingInFlight | RTT:100/25 24.257 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 24.257 <- (4) Packet A|5|S0|e2394c4c1ee963fa|32|1 AckFrame[0|Δ0] 24.257 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.258 <- (5) Packet A|6|S0|e2394c4c1ee963fa|1053|1 StreamFrame[0(CIB),0,1024,fin] 24.258 -> Packet A|1|S0|ea5ada27|30|1 AckFrame[6-5,2|Δ1] 24.259 Finished downloading https://server4:443/jqxtrpoefs at 33:45.035 on ClientConnection[cef60b8d9713ff5c/e2394c4c1ee963fa(V1) with server4/193.167.100.100:443] 24.259 Closing ClientConnection[cef60b8d9713ff5c/e2394c4c1ee963fa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.259 -> Packet A|2|S0|ea5ada27|33|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 24.259 Creating connection with server4:443 with v1 24.260 Setting up connection for downloading https://server4:443/osflyvteie at 33:45.037 on ClientConnection[2454d8fe67d11329/120a4ff3554f92ac(V1) with server4/193.167.100.100:443] 24.260 Original destination connection id: 2454d8fe67d11329 (scid: 120a4ff3554f92ac) >- CryptoStream[I|ClientHello] 24.261 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.461/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.261 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.290 <- (6) Packet A|7|S0|e2394c4c1ee963fa|283|5 NewTokenFrame[a9ac61937bf0129c6af2e4c7d768c5d660edc86a2b6e60e0bb20424efc877690ef58caa564269f356391e3c6f9e488bfdc2a8a406ae57c4cb32ee9149f3a32492cbea7a9bcc0daf3dc5f73809d27a9a4060f4663fe02] CryptoFrame[0,135] NewConnectionIdFrame[1,<0|6bd1ea70|3f2657dc3c6c865778693ae045a36790] HandshakeDoneFrame[] MaxStreamsFrame[B,101] 24.290 -> Packet A|3|S0|ea5ada27|33|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 24.460 loss detection timeout handler running Sending probe 0, because no ack since 24.261. Current RTT: 100/25. 24.460 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.460 (Probe is an initial retransmit) 24.461 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.861/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.461 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.493 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 24.493 probe count not reset on ack because handshake not yet confirmed 24.493 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.893/Initial, because peerAwaitingAddressValidation | RTT:100/25 24.495 <- (2) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 24.497 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.593/Handshake, because peerAwaitingAddressValidation | RTT:32/16 24.497 Discarding pn space Initial because first Handshake message is being sent 24.497 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.497 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.593/Handshake, because peerAwaitingAddressValidation | RTT:32/16 24.497 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1157) 24.592 loss detection timeout handler running 24.592 Sending probe 0. Current RTT: 32/16. 24.592 Sending probe because peer awaiting address validation 24.592 (Probe is a handshake ping) 24.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 24.785/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.593 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 24.624 <- (4) Packet H|1|L|747|2 AckFrame[0|Δ0] CryptoFrame[0,699] 24.625 probe count not reset on ack because handshake not yet confirmed 24.625 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.625 - unknown transport parameter 0x19e6, size 3 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 159 millis, based on 24.787/Handshake, because ackElicitingInFlight | RTT:32/12 24.627 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.628 Starting downloading https://server4:443/osflyvteie at 33:45.404 on ClientConnection[2454d8fe67d11329/120a4ff3554f92ac(V1) with server4/193.167.100.100:443] 24.625 <- (5) Packet H|2|L|742|1 CryptoFrame[0,699] 24.628 -> Packet H|2|L|42|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.628 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 159 millis, based on 24.787/Handshake, because ackElicitingInFlight | RTT:32/12 24.628 -> [Packet H|3|L|42|1 AckFrame[2-1|Δ0], Packet A|0|S0|ea81120a|43|1 StreamFrame[0(CIB),0,17,fin]] 24.787 loss detection timeout handler running Sending probe 1, because no ack since 24.627. Current RTT: 32/12. 24.787 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 24.787 (Probe is a handshake retransmit) 24.788 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 319 millis, based on 25.107/Handshake, because ackElicitingInFlight | RTT:32/12 24.787 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 24.789 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 319 millis, based on 25.109/Handshake, because ackElicitingInFlight | RTT:32/12 24.789 -> Packet PH|5|L|76|1 CryptoFrame[0,36] 24.819 <- (6) Packet A|2|S0|120a4ff3554f92ac|283|4 CryptoFrame[0,138] NewConnectionIdFrame[1,<0|151997f0|aef9b45334e9f565d194efc426ca218f] NewTokenFrame[1af7c2082187cb04174ec5e608908098e80233f5099c966126c6b49991c141aab0b612b66bceedbaaed6d37c1b6eb7ee093ad8c98b1202841e22e17f285eea8df578bab357babeec6aaa262e997f04d73d8ee356405d] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 24.820 State is set to Confirmed reschedule loss detection timer for PTO over 232 millis, based on 25.052/App, because ackElicitingInFlight | RTT:32/12 reschedule loss detection timer for PTO over -85 millis, based on 24.734/App, because ackElicitingInFlight | RTT:32/12 24.820 Discarding pn space Handshake because HandshakeDone is received 24.820 loss detection timeout handler running Sending probe 0, because no ack since 24.628. Current RTT: 32/12. 24.819 <- (7) Packet A|4|S0|120a4ff3554f92ac|35|1 AckFrame[0|Δ160] 24.820 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 105 millis, based on 24.926/App, because ackElicitingInFlight | RTT:32/12 24.820 -> Packet PA|1|S0|ea81120a|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 105 millis, based on 24.926/App, because ackElicitingInFlight | RTT:32/12 24.820 <- (8) Packet A|5|S0|120a4ff3554f92ac|1053|1 StreamFrame[0(CIB),0,1024,fin] 24.821 -> Packet A|2|S0|ea81120a|29|1 AckFrame[5-4,2|Δ0] 24.821 Finished downloading https://server4:443/osflyvteie at 33:45.598 on ClientConnection[2454d8fe67d11329/120a4ff3554f92ac(V1) with server4/193.167.100.100:443] 24.821 Closing ClientConnection[2454d8fe67d11329/120a4ff3554f92ac(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.821 -> Packet A|3|S0|ea81120a|33|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 24.821 Creating connection with server4:443 with v1 24.822 Setting up connection for downloading https://server4:443/dfkfxkzoqp at 33:45.599 on ClientConnection[01eec6bc84cd442f/0485023a5adf740f(V1) with server4/193.167.100.100:443] 24.822 Original destination connection id: 01eec6bc84cd442f (scid: 0485023a5adf740f) >- CryptoStream[I|ClientHello] 24.823 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.023/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.823 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.851 <- (9) Packet A|6|S0|120a4ff3554f92ac|30|1 MaxStreamsFrame[B,101] 24.852 -> Packet A|4|S0|ea81120a|33|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 24.856 <- (1) Packet I|0|L|475|3 Token=[] AckFrame[0|Δ0] Padding(303) CryptoFrame[0,123] 24.857 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.057/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.956/Handshake, because peerAwaitingAddressValidation | RTT:33/16 24.856 <- (1) Packet H|0|L|754|1 CryptoFrame[0,711] 24.859 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 24.859 - unknown transport parameter 0x1989, size 15 >- CryptoStream[H|Finished] 24.861 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.958/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.861 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.861 Starting downloading https://server4:443/dfkfxkzoqp at 33:45.638 on ClientConnection[01eec6bc84cd442f/0485023a5adf740f(V1) with server4/193.167.100.100:443] 24.856 <- (1) Packet A|0|S0|0485023a5adf740f|51|1 NewConnectionIdFrame[1,<0|4823cb28|7c6c8294dcbcead6a446ef4cb3e550d2] 24.861 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 24.861 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.958/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.861 Discarding pn space Initial because first Handshake message is being sent 24.862 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 24.959/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.861 -> Packet A|0|S0|399ac9dd|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 24.892 <- (2) Packet A|1|S0|0485023a5adf740f|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[c03c6984679b7c7c02c8800656bc7dc961973a3653b70752f7a6b5e8bc1eb17d2d77fdf2eb30a74735539650501417fd34f05d6684801101a652e5688ebd63141b6f881b11423aa5e3c07854c9db47ab157a377a01b1] 24.892 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 24.958/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 24.984/App, because ackElicitingInFlight | RTT:33/16 24.892 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 24.912 -> Packet A|1|S0|399ac9dd|28|1 AckFrame[1-0|Δ19] 24.984 loss detection timeout handler running Sending probe 0, because no ack since 24.861. Current RTT: 33/16. 24.985 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 25.231/App, because ackElicitingInFlight | RTT:33/16 24.985 -> Packet PA|2|S0|399ac9dd|43|1 StreamFrame[0(CIB),0,17,fin] 25.016 <- (3) Packet A|2|S0|0485023a5adf740f|32|1 AckFrame[2-1|Δ0] 25.016 Cwnd(-): 6000; inflight: 0 25.016 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 25.016 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 25.127/App, because ackElicitingInFlight | RTT:33/13 25.016 -> Packet A|3|S0|399ac9dd|43|1 StreamFrame[0(CIB),0,17,fin] 25.017 <- (4) Packet A|3|S0|0485023a5adf740f|1053|1 StreamFrame[0(CIB),0,1024,fin] 25.017 Finished downloading https://server4:443/dfkfxkzoqp at 33:45.794 on ClientConnection[01eec6bc84cd442f/0485023a5adf740f(V1) with server4/193.167.100.100:443] 25.017 Closing ClientConnection[01eec6bc84cd442f/0485023a5adf740f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.017 -> Packet A|4|S0|399ac9dd|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0]