0.000 Creating connection with server4:443 with v1 0.084 Setting up connection for downloading https://server4:443/wozkdmjbqi at 41:24.723 on ClientConnection[31f22b980e63b29a/6358b48ee389470e(V1) with server4/193.167.100.100:443] 0.086 Original destination connection id: 31f22b980e63b29a (scid: 6358b48ee389470e) >- CryptoStream[I|ClientHello] 0.263 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.463/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.254 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.296 <- (1) Packet I|0|L|483|3 Token=[] AckFrame[0|Δ0] Padding(311) CryptoFrame[0,123] 0.314 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.514/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.340 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 0.461/Handshake, because peerAwaitingAddressValidation | RTT:41/20 0.338 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 0.296 <- (1) Packet H|0|L|746|1 CryptoFrame[0,703] 0.345 - unknown transport parameter 0x1e61, size 7 >- CryptoStream[H|Finished] 0.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 0.497/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 0.376 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.380 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 0.382 Starting downloading https://server4:443/wozkdmjbqi at 41:25.038 on ClientConnection[31f22b980e63b29a/6358b48ee389470e(V1) with server4/193.167.100.100:443] 0.296 <- (1) Packet A|0|S0|6358b48ee389470e|51|1 NewConnectionIdFrame[1,<0|d8163375|c22d9bd8931748daced871a1e45a03b3] 0.405 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 118 millis, based on 0.527/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 0.408 Discarding pn space Initial because first Handshake message is being sent 0.412 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 120 millis, based on 0.533/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 0.412 -> Packet A|0|S0|661a77d9|49|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ10] 0.526 <- (2) Packet H|1|L|746|1 CryptoFrame[0,703] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.526 <- (3) Packet H|2|L|746|1 CryptoFrame[0,703] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.532 loss detection timeout handler running Sending probe 0, because no ack since 0.376. Current RTT: 41/20. 0.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.532 -> Packet H|2|L|42|1 AckFrame[1-0|Δ0] 0.534 -> Packet H|3|L|42|1 AckFrame[2-0|Δ0] 0.535 (Probe is a handshake retransmit) 0.536 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 241 millis, based on 0.778/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 0.536 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 0.567 <- (4) Packet A|2|S0|6358b48ee389470e|283|4 NewConnectionIdFrame[1,<0|d8163375|c22d9bd8931748daced871a1e45a03b3] NewTokenFrame[a449b3a5f0723d960fe02a5f02f7396d8294200e5ffcde3154fb309190d824172ac1c8e66cc8cb59f1aceea494d8f6b7ad89510cd4b0e95f206b3bc80a095d8bafe303d350f70388b4024970d010d486b3158da1671a] CryptoFrame[0,138] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 0.573 State is set to Confirmed reschedule loss detection timer for PTO over 132 millis, based on 0.706/App, because ackElicitingInFlight | RTT:41/20 reschedule loss detection timer for PTO over -14 millis, based on 0.559/App, because ackElicitingInFlight | RTT:41/20 0.573 loss detection timeout handler running 0.574 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 0.412. Current RTT: 41/20. 0.574 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 293 millis, based on 0.869/App, because ackElicitingInFlight | RTT:41/20 0.568 <- (5) Packet A|3|S0|6358b48ee389470e|283|4 NewTokenFrame[a449b3a5f0723d960fe02a5f02f7396d8294200e5ffcde3154fb309190d824172ac1c8e66cc8cb59f1aceea494d8f6b7ad89510cd4b0e95f206b3bc80a095d8bafe303d350f70388b4024970d010d486b3158da1671a] NewConnectionIdFrame[1,<0|d8163375|c22d9bd8931748daced871a1e45a03b3] CryptoFrame[0,138] HandshakeDoneFrame[] 0.575 -> Packet PA|1|S0|661a77d9|43|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 0.568 <- (6) Packet A|4|S0|6358b48ee389470e|33|1 AckFrame[0|Δ124] 0.577 -> Packet A|2|S0|661a77d9|30|1 AckFrame[3-2,0|Δ2] reschedule loss detection timer for PTO over 143 millis, based on 0.722/App, because ackElicitingInFlight | RTT:41/20 0.721 loss detection timeout handler running Sending probe 0, because no ack since 0.575. Current RTT: 52/37. 0.722 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 451 millis, based on 1.175/App, because ackElicitingInFlight | RTT:52/37 0.723 -> Packet PA|3|S0|661a77d9|43|1 StreamFrame[0(CIB),0,17,fin] 0.818 <- (7) Packet A|7|S0|6358b48ee389470e|1053|1 StreamFrame[0(CIB),0,1024,fin] 0.819 <- (8) Packet A|8|S0|6358b48ee389470e|1053|1 StreamFrame[0(CIB),0,1024,fin] 0.820 -> Packet A|4|S0|661a77d9|29|1 AckFrame[8-7,4-2|Δ0] 0.822 Finished downloading https://server4:443/wozkdmjbqi at 41:25.477 on ClientConnection[31f22b980e63b29a/6358b48ee389470e(V1) with server4/193.167.100.100:443] 0.823 Closing ClientConnection[31f22b980e63b29a/6358b48ee389470e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.825 Creating connection with server4:443 with v1 0.826 Setting up connection for downloading https://server4:443/dardkoqojf at 41:25.482 on ClientConnection[e8e9a8abf5e4350e/a14cc4d7c3338375(V1) with server4/193.167.100.100:443] 0.827 Original destination connection id: e8e9a8abf5e4350e (scid: a14cc4d7c3338375) 0.825 -> Packet A|5|S0|661a77d9|33|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,4-2|Δ0] >- CryptoStream[I|ClientHello] 0.831 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.031/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.830 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.851 <- (9) Packet A|9|S0|6358b48ee389470e|30|1 MaxStreamsFrame[B,101] 0.855 -> Packet A|6|S0|661a77d9|33|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,4-2|Δ0] 0.864 <- (1) Packet I|0|L|483|3 Token=[] AckFrame[0|Δ0] Padding(311) CryptoFrame[0,123] 0.865 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.065/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.871 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.864 <- (1) Packet H|0|L|746|1 CryptoFrame[0,703] reschedule loss detection timer for PTO over 96 millis, based on 0.968/Handshake, because peerAwaitingAddressValidation | RTT:33/16 0.871 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 0.872 - unknown transport parameter 0x16c0, size 6 >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.878 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.864 <- (1) Packet A|0|S0|a14cc4d7c3338375|51|1 NewConnectionIdFrame[1,<0|bce013c8|140f40b00c33797a85b75c58c805d352] 0.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.976/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.879 Discarding pn space Initial because first Handshake message is being sent 0.879 Starting downloading https://server4:443/dardkoqojf at 41:25.535 on ClientConnection[e8e9a8abf5e4350e/a14cc4d7c3338375(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 0.975/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.878 -> Packet H|0|L|76|1 CryptoFrame[0,36] 0.881 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.978/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.880 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|ddf849eb|49|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ1]] 0.977 loss detection timeout handler running Sending probe 0, because no ack since 0.878. Current RTT: 33/16. 0.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.978 (Probe is a handshake retransmit) 0.978 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.173/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.978 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 1.172 loss detection timeout handler running Sending probe 1, because no ack since 0.880. Current RTT: 33/16. 1.172 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.172 (Probe is a handshake retransmit) 1.173 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 1.561/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.173 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 1.174 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 1.562/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.174 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 1.205 <- (2) Packet A|2|S0|a14cc4d7c3338375|283|4 NewTokenFrame[db0463fa11129ee1bc2a0d2c038ae0415fc67016c3f792f8b125c9b83cd84a1fb611eb11bf7c6ca5b7ed01f1cc9f8aaa5d4a07c8509860c0698fa64d6681269c24a7786e00e5e8d9862f273fe9dbd283bd20f29a98eb] HandshakeDoneFrame[] CryptoFrame[0,138] NewConnectionIdFrame[1,<0|bce013c8|140f40b00c33797a85b75c58c805d352] 1.206 State is set to Confirmed reschedule loss detection timer for PTO over 166 millis, based on 1.372/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -202 millis, based on 1.003/App, because ackElicitingInFlight | RTT:33/16 1.206 loss detection timeout handler running 1.206 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 0.880. Current RTT: 33/16. 1.206 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 245 millis, based on 1.453/App, because ackElicitingInFlight | RTT:33/16 1.207 -> Packet PA|1|S0|ddf849eb|43|1 StreamFrame[0(CIB),0,17,fin] 1.227 -> Packet A|2|S0|ddf849eb|30|1 AckFrame[2,0|Δ19] 1.452 loss detection timeout handler running Sending probe 1, because no ack since 1.207. Current RTT: 33/16. 1.453 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 1.945/App, because ackElicitingInFlight | RTT:33/16 1.453 -> Packet PA|3|S0|ddf849eb|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 1.946/App, because ackElicitingInFlight | RTT:33/16 1.454 -> Packet PA|4|S0|ddf849eb|43|1 StreamFrame[0(CIB),0,17,fin] 1.475 <- (3) Packet A|7|S0|a14cc4d7c3338375|283|4 CryptoFrame[0,138] NewTokenFrame[db0463fa11129ee1bc2a0d2c038ae0415fc67016c3f792f8b125c9b83cd84a1fb611eb11bf7c6ca5b7ed01f1cc9f8aaa5d4a07c8509860c0698fa64d6681269c24a7786e00e5e8d9862f273fe9dbd283bd20f29a98eb] NewConnectionIdFrame[1,<0|bce013c8|140f40b00c33797a85b75c58c805d352] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 1.476 <- (4) Packet A|8|S0|a14cc4d7c3338375|1053|1 StreamFrame[0(CIB),0,1024,fin] 1.477 Finished downloading https://server4:443/dardkoqojf at 41:26.133 on ClientConnection[e8e9a8abf5e4350e/a14cc4d7c3338375(V1) with server4/193.167.100.100:443] 1.478 Closing ClientConnection[e8e9a8abf5e4350e/a14cc4d7c3338375(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.477 -> Packet A|5|S0|ddf849eb|31|1 AckFrame[8-7,2,0|Δ0] 1.478 Creating connection with server4:443 with v1 1.478 -> Packet A|6|S0|ddf849eb|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,2,0|Δ0] 1.479 Setting up connection for downloading https://server4:443/vdelkdvmfv at 41:26.135 on ClientConnection[8a87f86679f0e1b8/ca42392a8ed38dc9(V1) with server4/193.167.100.100:443] 1.479 Original destination connection id: 8a87f86679f0e1b8 (scid: ca42392a8ed38dc9) >- CryptoStream[I|ClientHello] 1.482 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.682/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.481 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.508 <- (5) Packet A|10|S0|a14cc4d7c3338375|39|2 AckFrame[5,3-2,0|Δ0] MaxStreamsFrame[B,101] 1.509 -> Packet A|7|S0|ddf849eb|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,2,0|Δ0] 1.515 <- (1) Packet I|0|L|489|3 Token=[] AckFrame[0|Δ0] Padding(317) CryptoFrame[0,123] 1.517 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.717/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.515 <- (1) Packet H|0|L|740|1 CryptoFrame[0,697] 1.522 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.522 - unknown transport parameter 0x10d1, size 1 reschedule loss detection timer for PTO over 96 millis, based on 1.619/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.522 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 1.526 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.623/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.526 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.527 Starting downloading https://server4:443/vdelkdvmfv at 41:26.183 on ClientConnection[8a87f86679f0e1b8/ca42392a8ed38dc9(V1) with server4/193.167.100.100:443] 1.515 <- (1) Packet A|0|S0|ca42392a8ed38dc9|51|1 NewConnectionIdFrame[1,<0|4eed2c5f|273e45c6a5ba769054f49485052b4335] 1.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.625/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.528 Discarding pn space Initial because first Handshake message is being sent 1.529 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.626/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.528 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|ab97cf4f|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 1.557 <- (2) Packet A|1|S0|ca42392a8ed38dc9|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[a090b55e166236974fe71a6e056c336383c70b53448db45b4539d01a8c6429180e3b95b661cf6c670e3a78047b25f5628bcef8cea7f4cb93bb10cc82f4986377ef4ca49a01e5fa5df8257747484f2a42cfef62f024ec] 1.559 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 1.623/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 1.651/App, because ackElicitingInFlight | RTT:33/16 1.559 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 1.560 <- (3) Packet A|2|S0|ca42392a8ed38dc9|32|1 AckFrame[0|Δ0] 1.561 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.580 -> Packet A|1|S0|ab97cf4f|28|1 AckFrame[2-1|Δ19] 1.691 <- (4) Packet A|5|S0|ca42392a8ed38dc9|259|3 CryptoFrame[0,138] NewTokenFrame[a090b55e166236974fe71a6e056c336383c70b53448db45b4539d01a8c6429180e3b95b661cf6c670e3a78047b25f5628bcef8cea7f4cb93bb10cc82f4986377ef4ca49a01e5fa5df8257747484f2a42cfef62f024ec] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 1.692 <- (5) Packet A|6|S0|ca42392a8ed38dc9|1053|1 StreamFrame[0(CIB),0,1024,fin] 1.694 -> Packet A|2|S0|ab97cf4f|29|1 AckFrame[6-5,2-1|Δ0] 1.694 Finished downloading https://server4:443/vdelkdvmfv at 41:26.350 on ClientConnection[8a87f86679f0e1b8/ca42392a8ed38dc9(V1) with server4/193.167.100.100:443] 1.695 Closing ClientConnection[8a87f86679f0e1b8/ca42392a8ed38dc9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.696 Creating connection with server4:443 with v1 1.696 -> Packet A|3|S0|ab97cf4f|33|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2-1|Δ0] 1.697 Setting up connection for downloading https://server4:443/sxgekjwwfu at 41:26.352 on ClientConnection[3c258a3bae51d34f/c31369c56baed1cc(V1) with server4/193.167.100.100:443] 1.697 Original destination connection id: 3c258a3bae51d34f (scid: c31369c56baed1cc) >- CryptoStream[I|ClientHello] 1.699 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.899/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.699 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.733 <- (1) Packet I|0|L|477|3 Token=[] AckFrame[0|Δ0] Padding(305) CryptoFrame[0,123] 1.734 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.934/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.733 <- (1) Packet H|0|L|752|1 CryptoFrame[0,709] 1.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.834/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.738 - unknown transport parameter 0x0e08, size 12 1.737 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 1.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.838/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.741 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.742 Starting downloading https://server4:443/sxgekjwwfu at 41:26.398 on ClientConnection[3c258a3bae51d34f/c31369c56baed1cc(V1) with server4/193.167.100.100:443] 1.733 <- (1) Packet A|0|S0|c31369c56baed1cc|51|1 NewConnectionIdFrame[1,<0|2bc96c24|34e704601924d83291e0bf794d273df3] 1.742 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.840/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.743 Discarding pn space Initial because first Handshake message is being sent 1.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.840/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.743 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|e43f8286|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 1.840 loss detection timeout handler running Sending probe 0, because no ack since 1.741. Current RTT: 33/16. 1.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.840 (Probe is a handshake retransmit) 1.841 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.035/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.841 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 1.872 <- (2) Packet A|1|S0|c31369c56baed1cc|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[84d8843dfb59b9e92eb84e584f39855798f0eb6ee49b6ca2f23b20ac435d77fc9c6d3093de10e30d31bfb302c3a4db05f9e51e89edb7cacf14b9315e9fc690f6bacaa232087c08afd00bbd4027275ae763780ce34b31] 1.873 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 1.989/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 1.866/App, because ackElicitingInFlight | RTT:33/16 1.874 loss detection timeout handler running 1.874 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 1.743. Current RTT: 33/16. 1.874 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 245 millis, based on 2.120/App, because ackElicitingInFlight | RTT:33/16 1.872 <- (3) Packet A|2|S0|c31369c56baed1cc|33|1 AckFrame[0|Δ97] 1.874 -> Packet PA|1|S0|e43f8286|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 122 millis, based on 1.997/App, because ackElicitingInFlight | RTT:33/16 1.873 <- (4) Packet A|3|S0|c31369c56baed1cc|1053|1 StreamFrame[0(CIB),0,1024,fin] 1.875 -> Packet A|2|S0|e43f8286|28|1 AckFrame[3-1|Δ1] 1.876 Finished downloading https://server4:443/sxgekjwwfu at 41:26.531 on ClientConnection[3c258a3bae51d34f/c31369c56baed1cc(V1) with server4/193.167.100.100:443] 1.876 Closing ClientConnection[3c258a3bae51d34f/c31369c56baed1cc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.876 -> Packet A|3|S0|e43f8286|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 1.877 Creating connection with server4:443 with v1 1.877 Setting up connection for downloading https://server4:443/xvhbfpbjmn at 41:26.533 on ClientConnection[004ad08e8e909d66/fd4c276178ae93b0(V1) with server4/193.167.100.100:443] 1.877 Original destination connection id: 004ad08e8e909d66 (scid: fd4c276178ae93b0) >- CryptoStream[I|ClientHello] 1.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.080/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.880 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.906 <- (5) Packet A|4|S0|c31369c56baed1cc|35|2 AckFrame[2-0|Δ0] MaxStreamsFrame[B,101] 1.907 -> Packet A|4|S0|e43f8286|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 2.079 loss detection timeout handler running Sending probe 0, because no ack since 1.880. Current RTT: 100/25. 2.080 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.080 (Probe is an initial retransmit) 2.081 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.481/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.080 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.114 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 2.118 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.318/Handshake, because peerAwaitingAddressValidation | RTT:100/25 2.118 Discarding pn space Initial because first Handshake message is being sent 2.118 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.318/Handshake, because peerAwaitingAddressValidation | RTT:100/25 2.118 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 2.120 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.314 <- (3) Packet H|1|L|750|1 CryptoFrame[0,707] 2.315 - unknown transport parameter 0x13d8, size 10 2.317 loss detection timeout handler running 2.318 Sending probe 0. Current RTT: 100/25. 2.318 Sending probe because peer awaiting address validation 2.318 (Probe is a handshake ping) >- CryptoStream[H|Finished] 2.319 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 2.719/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.319 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.315 <- (4) Packet H|2|L|750|1 CryptoFrame[0,707] 2.320 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 2.720/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.320 Starting downloading https://server4:443/xvhbfpbjmn at 41:26.975 on ClientConnection[004ad08e8e909d66/fd4c276178ae93b0(V1) with server4/193.167.100.100:443] 2.319 -> Packet H|1|L|76|1 CryptoFrame[0,36] 2.320 -> Packet H|2|L|42|1 AckFrame[2-1|Δ0] 2.321 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 2.721/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.321 -> Packet A|0|S0|8d9e3fc9|43|1 StreamFrame[0(CIB),0,17,fin] 2.350 <- (5) Packet H|3|L|44|1 AckFrame[0|Δ0] 2.350 probe count not reset on ack because handshake not yet confirmed 2.351 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 368 millis, based on 2.719/Handshake, because ackElicitingInFlight | RTT:100/25 2.350 <- (6) Packet A|2|S0|fd4c276178ae93b0|280|4 CryptoFrame[0,135] NewTokenFrame[93c974fbb8c8fb320141c5656004aa91c05e116dd5a1826a56c1943038c754ebb6c215aeed6f7164c8bfc4b45337b9f93ee8ca78da896f00c610283efff7d1c4a29df746cd860bc8db5e02c7dc5104b23849118f8d51] NewConnectionIdFrame[1,<0|60e4c52a|ba226135af9b4784e81fddb83b1010cc] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 2.352 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 2.501/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 85 millis, based on 2.438/App, because ackElicitingInFlight | RTT:31/15 2.352 Discarding pn space Handshake because HandshakeDone is received 2.351 <- (7) Packet A|3|S0|fd4c276178ae93b0|280|4 NewConnectionIdFrame[1,<0|60e4c52a|ba226135af9b4784e81fddb83b1010cc] NewTokenFrame[93c974fbb8c8fb320141c5656004aa91c05e116dd5a1826a56c1943038c754ebb6c215aeed6f7164c8bfc4b45337b9f93ee8ca78da896f00c610283efff7d1c4a29df746cd860bc8db5e02c7dc5104b23849118f8d51] HandshakeDoneFrame[] CryptoFrame[0,135] -< CryptoStream[A|NewSessionTicket] 2.352 <- (8) Packet A|5|S0|fd4c276178ae93b0|32|1 AckFrame[0|Δ0] 2.353 -> Packet A|1|S0|8d9e3fc9|27|1 AckFrame[3-2|Δ0] 2.353 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.353 <- (9) Packet A|6|S0|fd4c276178ae93b0|1053|1 StreamFrame[0(CIB),0,1024,fin] 2.354 Finished downloading https://server4:443/xvhbfpbjmn at 41:27.010 on ClientConnection[004ad08e8e909d66/fd4c276178ae93b0(V1) with server4/193.167.100.100:443] 2.354 Closing ClientConnection[004ad08e8e909d66/fd4c276178ae93b0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.355 -> Packet A|2|S0|8d9e3fc9|33|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3-2|Δ0] 2.355 Creating connection with server4:443 with v1 2.356 Setting up connection for downloading https://server4:443/lzyrimonbp at 41:27.011 on ClientConnection[2d66d107ad4f58a1/7a266dc5b6b88434(V1) with server4/193.167.100.100:443] 2.356 Original destination connection id: 2d66d107ad4f58a1 (scid: 7a266dc5b6b88434) >- CryptoStream[I|ClientHello] 2.358 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.558/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.357 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.391 <- (1) Packet I|0|L|482|3 Token=[] AckFrame[0|Δ0] Padding(310) CryptoFrame[0,123] 2.392 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.592/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.391 <- (1) Packet H|0|L|747|1 CryptoFrame[0,704] 2.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.493/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.396 - unknown transport parameter 0x0e84, size 8 2.396 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 2.400 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.497/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.400 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.401 Starting downloading https://server4:443/lzyrimonbp at 41:27.056 on ClientConnection[2d66d107ad4f58a1/7a266dc5b6b88434(V1) with server4/193.167.100.100:443] 2.401 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 2.391 <- (1) Packet A|0|S0|7a266dc5b6b88434|51|1 NewConnectionIdFrame[1,<0|291e84bf|9a5345cb94af0fb51c9c186b3b8c539f] 2.401 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.498/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.401 Discarding pn space Initial because first Handshake message is being sent 2.401 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.498/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.401 -> Packet A|0|S0|eccc60c9|43|1 StreamFrame[0(CIB),0,17,fin] 2.421 -> Packet A|1|S0|eccc60c9|28|1 AckFrame[0|Δ19] 2.432 <- (2) Packet A|1|S0|7a266dc5b6b88434|1366|2 Padding(1338) PingFrame[] 2.432 <- (3) Packet A|2|S0|7a266dc5b6b88434|256|3 CryptoFrame[0,135] NewTokenFrame[fd80ec35ce6b7ac6d9ff08737f661a621c6ad8c210679ad461b7bc4e94468bdebfd03f6d36df678e7f3ed6459a211fcc32c91ca75980b1f9e15106d266224d6958079d6428d27e16ca60f2c3493bf7e9c0cc6a2a5393] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 2.434 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 2.497/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 2.524/App, because ackElicitingInFlight | RTT:33/16 2.434 Discarding pn space Handshake because HandshakeDone is received 2.432 <- (4) Packet A|3|S0|7a266dc5b6b88434|32|1 AckFrame[0|Δ0] 2.435 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.434 -> Packet A|2|S0|eccc60c9|28|1 AckFrame[2-0|Δ1] 2.433 <- (5) Packet A|4|S0|7a266dc5b6b88434|1053|1 StreamFrame[0(CIB),0,1024,fin] 2.435 Finished downloading https://server4:443/lzyrimonbp at 41:27.091 on ClientConnection[2d66d107ad4f58a1/7a266dc5b6b88434(V1) with server4/193.167.100.100:443] 2.435 Closing ClientConnection[2d66d107ad4f58a1/7a266dc5b6b88434(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.436 Creating connection with server4:443 with v1 2.436 -> Packet A|3|S0|eccc60c9|31|2 ConnectionCloseFrame[0|0|] AckFrame[4-0|Δ0] 2.437 Setting up connection for downloading https://server4:443/wwcqbjzief at 41:27.093 on ClientConnection[32853a6d784ca384/1df18ee7b3ab756b(V1) with server4/193.167.100.100:443] 2.437 Original destination connection id: 32853a6d784ca384 (scid: 1df18ee7b3ab756b) >- CryptoStream[I|ClientHello] 2.439 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.639/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.439 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.472 <- (1) Packet I|0|L|490|3 Token=[] AckFrame[0|Δ0] Padding(318) CryptoFrame[0,123] 2.473 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.673/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.472 <- (1) Packet H|0|L|739|1 CryptoFrame[0,696] 2.476 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.573/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.477 - unknown transport parameter 0x0838, size 0 2.476 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 2.483 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.580/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.483 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.484 Starting downloading https://server4:443/wwcqbjzief at 41:27.139 on ClientConnection[32853a6d784ca384/1df18ee7b3ab756b(V1) with server4/193.167.100.100:443] 2.472 <- (1) Packet A|0|S0|1df18ee7b3ab756b|51|1 NewConnectionIdFrame[1,<0|9c940a74|3313e724e288681c3634617948b8eaae] 2.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.581/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.484 Discarding pn space Initial because first Handshake message is being sent 2.485 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.582/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.484 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|8093f3aa|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 2.514 <- (2) Packet A|1|S0|1df18ee7b3ab756b|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[46ff5cebd3a4662a0a1648adb064487be33cf952d55fbfd083b0a01166e57993b40592e221a2d7766f500e67639fd9177a89d475fc26faf40b6d1de186210a028e1d9d3ca92c8677238efa744b8eb776b64ad1fff718] 2.515 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 2.580/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 2.607/App, because ackElicitingInFlight | RTT:33/16 2.515 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 2.516 <- (3) Packet A|3|S0|1df18ee7b3ab756b|1053|1 StreamFrame[0(CIB),0,1024,fin] 2.517 Finished downloading https://server4:443/wwcqbjzief at 41:27.173 on ClientConnection[32853a6d784ca384/1df18ee7b3ab756b(V1) with server4/193.167.100.100:443] 2.517 -> Packet A|1|S0|8093f3aa|30|1 AckFrame[3,1-0|Δ1] 2.517 Closing ClientConnection[32853a6d784ca384/1df18ee7b3ab756b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.518 Creating connection with server4:443 with v1 2.518 -> Packet A|2|S0|8093f3aa|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 2.519 Setting up connection for downloading https://server4:443/pnnywdhczl at 41:27.174 on ClientConnection[d4199e1edb273363/f21cba45b2e66293(V1) with server4/193.167.100.100:443] 2.519 Original destination connection id: d4199e1edb273363 (scid: f21cba45b2e66293) >- CryptoStream[I|ClientHello] 2.521 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.721/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.521 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.548 <- (4) Packet A|4|S0|1df18ee7b3ab756b|30|1 MaxStreamsFrame[B,101] 2.549 -> Packet A|3|S0|8093f3aa|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 2.720 loss detection timeout handler running Sending probe 0, because no ack since 2.521. Current RTT: 100/25. 2.720 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.720 (Probe is an initial retransmit) 2.721 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.121/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.721 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.120 loss detection timeout handler running Sending probe 1, because no ack since 2.721. Current RTT: 100/25. 3.121 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.121 (Probe is an initial retransmit) 3.121 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.921/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.121 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.122 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.922/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.122 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.155 <- (1) Packet I|0|L|478|3 Token=[] AckFrame[2|Δ0] Padding(306) CryptoFrame[0,123] 3.156 probe count not reset on ack because handshake not yet confirmed 3.157 Retransmitting CryptoFrame[0,257] on level Initial 3.158 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.958/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.158 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) 3.159 Cwnd(-): 6000; inflight: 2400 3.159 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.959/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 3.162 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.155 <- (1) Packet H|0|L|751|1 CryptoFrame[0,708] reschedule loss detection timer for PTO over 387 millis, based on 3.551/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.162 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 3.163 - unknown transport parameter 0x1e61, size 13 >- CryptoStream[H|Finished] 3.166 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 3.554/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.166 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.167 Starting downloading https://server4:443/pnnywdhczl at 41:27.822 on ClientConnection[d4199e1edb273363/f21cba45b2e66293(V1) with server4/193.167.100.100:443] 3.167 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 3.155 <- (1) Packet A|0|S0|f21cba45b2e66293|51|1 NewConnectionIdFrame[1,<0|71a67268|132c2269b1549880b8a4ae73c9cdb9a2] 3.167 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.264/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.167 Discarding pn space Initial because first Handshake message is being sent 3.168 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.265/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.167 -> Packet A|0|S0|30db3eb7|43|1 StreamFrame[0(CIB),0,17,fin] 3.187 -> Packet A|1|S0|30db3eb7|28|1 AckFrame[0|Δ19] 3.197 <- (2) Packet A|1|S0|f21cba45b2e66293|259|3 CryptoFrame[0,138] NewTokenFrame[e52012d1c21e865a12233f087c4903f7714974e85c66ba3cbaa842e9f34b9ea0b3f9d156f0bd2e3e9dcbd0929bf4b75eeedc1fcb4daeab017ee49b5231bb27b9d13d933a34aabeeb9aac72bc09110e34a7f65c8d9f4f] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 3.198 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 3.263/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 3.290/App, because ackElicitingInFlight | RTT:33/16 3.198 Discarding pn space Handshake because HandshakeDone is received 3.199 <- (3) Packet A|3|S0|f21cba45b2e66293|1053|1 StreamFrame[0(CIB),0,1024,fin] 3.200 Finished downloading https://server4:443/pnnywdhczl at 41:27.855 on ClientConnection[d4199e1edb273363/f21cba45b2e66293(V1) with server4/193.167.100.100:443] 3.200 -> Packet A|2|S0|30db3eb7|30|1 AckFrame[3,1-0|Δ1] 3.200 Closing ClientConnection[d4199e1edb273363/f21cba45b2e66293(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.201 -> Packet A|3|S0|30db3eb7|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 3.201 Creating connection with server4:443 with v1 3.202 Setting up connection for downloading https://server4:443/jtpzjjirlq at 41:27.857 on ClientConnection[95638fae473b94fd/9a90c758ca0bf063(V1) with server4/193.167.100.100:443] 3.202 Original destination connection id: 95638fae473b94fd (scid: 9a90c758ca0bf063) >- CryptoStream[I|ClientHello] 3.204 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.404/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.204 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.403 loss detection timeout handler running Sending probe 0, because no ack since 3.204. Current RTT: 100/25. 3.404 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.404 (Probe is an initial retransmit) 3.404 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.804/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.404 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.438 <- (1) Packet I|0|L|487|3 Token=[] AckFrame[1|Δ0] Padding(315) CryptoFrame[0,123] 3.439 probe count not reset on ack because handshake not yet confirmed 3.439 Retransmitting CryptoFrame[0,257] on level Initial 3.439 Cwnd(-): 6000; inflight: 0 3.439 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.839/Initial, because peerAwaitingAddressValidation | RTT:100/25 3.440 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.840/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.439 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 3.443 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.438 <- (1) Packet H|0|L|742|1 CryptoFrame[0,699] reschedule loss detection timer for PTO over 193 millis, based on 3.637/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.443 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 3.443 - unknown transport parameter 0x0a47, size 3 >- CryptoStream[H|Finished] 3.446 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.640/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.446 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.447 Starting downloading https://server4:443/jtpzjjirlq at 41:28.102 on ClientConnection[95638fae473b94fd/9a90c758ca0bf063(V1) with server4/193.167.100.100:443] 3.438 <- (1) Packet A|0|S0|9a90c758ca0bf063|51|1 NewConnectionIdFrame[1,<0|1ebd374f|0110471f0f61c93f3a71d58fb31ac358] 3.447 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.544/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.447 Discarding pn space Initial because first Handshake message is being sent 3.448 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.545/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.448 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|3fa5ccc9|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 3.472 Discarding packet (45 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.477 <- (3) Packet A|1|S0|9a90c758ca0bf063|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[deb21dab354146a5d43be93d83cc8288c60dda2b44524601f60014c2a46810fd572f4f8a3c735d87a272bb885998975267ddfb16f8f6eae4e8f409bd89507a1a58a5e06f87d0098123766479db1c451b8d82ed904e22] 3.478 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 3.543/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 3.571/App, because ackElicitingInFlight | RTT:33/16 3.478 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 3.479 <- (4) Packet A|3|S0|9a90c758ca0bf063|1053|1 StreamFrame[0(CIB),0,1024,fin] 3.480 Finished downloading https://server4:443/jtpzjjirlq at 41:28.136 on ClientConnection[95638fae473b94fd/9a90c758ca0bf063(V1) with server4/193.167.100.100:443] 3.480 -> Packet A|1|S0|3fa5ccc9|30|1 AckFrame[3,1-0|Δ1] 3.481 Closing ClientConnection[95638fae473b94fd/9a90c758ca0bf063(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.481 -> Packet A|2|S0|3fa5ccc9|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 3.481 Creating connection with server4:443 with v1 3.482 Setting up connection for downloading https://server4:443/xenplvusel at 41:28.138 on ClientConnection[dd8ae5a787e88e6c/c6e43dee76b5b6cd(V1) with server4/193.167.100.100:443] 3.482 Original destination connection id: dd8ae5a787e88e6c (scid: c6e43dee76b5b6cd) >- CryptoStream[I|ClientHello] 3.484 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.684/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.484 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.511 <- (5) Packet A|4|S0|9a90c758ca0bf063|30|1 MaxStreamsFrame[B,101] 3.512 -> Packet A|3|S0|3fa5ccc9|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 3.517 <- (1) Packet I|0|L|480|3 Token=[] AckFrame[0|Δ0] Padding(308) CryptoFrame[0,123] 3.518 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.718/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.517 <- (1) Packet H|0|L|749|1 CryptoFrame[0,706] 3.522 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.619/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.522 - unknown transport parameter 0x0629, size 10 3.522 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 3.525 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.622/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.525 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.526 Starting downloading https://server4:443/xenplvusel at 41:28.181 on ClientConnection[dd8ae5a787e88e6c/c6e43dee76b5b6cd(V1) with server4/193.167.100.100:443] 3.517 <- (1) Packet A|0|S0|c6e43dee76b5b6cd|51|1 NewConnectionIdFrame[1,<0|a7a987dc|f5b8e622dca2dd407439057a7d28de60] 3.526 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.623/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.526 Discarding pn space Initial because first Handshake message is being sent 3.526 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.623/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.526 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|16346738|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 3.623 loss detection timeout handler running Sending probe 0, because no ack since 3.525. Current RTT: 33/16. 3.623 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.623 (Probe is a handshake retransmit) 3.624 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.818/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.623 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 3.757 <- (2) Packet A|4|S0|c6e43dee76b5b6cd|51|1 NewConnectionIdFrame[1,<0|a7a987dc|f5b8e622dca2dd407439057a7d28de60] 3.757 <- (3) Packet A|5|S0|c6e43dee76b5b6cd|256|3 CryptoFrame[0,135] NewTokenFrame[85c1d22d3fb8da61050afae122314d9fbe8c45f2ab87659906260955e6577f717fc6edb75b4780b27660f8671c7ab74d65d934807054b77695b7442d222b87629adec193d2dfcb7f2917926465433dc2a08515556ae4] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 3.758 State is set to Confirmed reschedule loss detection timer for PTO over 13 millis, based on 3.772/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -109 millis, based on 3.649/App, because ackElicitingInFlight | RTT:33/16 3.759 loss detection timeout handler running 3.759 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 3.526. Current RTT: 33/16. 3.759 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 4.005/App, because ackElicitingInFlight | RTT:33/16 3.759 -> Packet PA|1|S0|16346738|51|2 AckFrame[5-4,0|Δ1] StreamFrame[0(CIB),0,17,fin] 3.791 <- (4) Packet A|6|S0|c6e43dee76b5b6cd|1323|2 Padding(1295) PingFrame[] 3.791 <- (5) Packet A|7|S0|c6e43dee76b5b6cd|32|1 AckFrame[1|Δ0] 3.793 Cwnd(-): 6000; inflight: 0 3.793 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.793 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 3.792 <- (6) Packet A|8|S0|c6e43dee76b5b6cd|1053|1 StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 106 millis, based on 3.900/App, because ackElicitingInFlight | RTT:33/12 3.793 -> Packet A|2|S0|16346738|49|2 StreamFrame[0(CIB),0,17,fin] AckFrame[6|Δ1] 3.794 Finished downloading https://server4:443/xenplvusel at 41:28.449 on ClientConnection[dd8ae5a787e88e6c/c6e43dee76b5b6cd(V1) with server4/193.167.100.100:443] 3.794 Closing ClientConnection[dd8ae5a787e88e6c/c6e43dee76b5b6cd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.794 -> Packet A|3|S0|16346738|31|2 ConnectionCloseFrame[0|0|] AckFrame[8-6|Δ0] 3.794 Creating connection with server4:443 with v1 3.795 Setting up connection for downloading https://server4:443/tfwszbtbgp at 41:28.451 on ClientConnection[797e13d43990816a/9db3f5959060d259(V1) with server4/193.167.100.100:443] 3.795 Original destination connection id: 797e13d43990816a (scid: 9db3f5959060d259) >- CryptoStream[I|ClientHello] 3.797 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.997/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.797 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.996 loss detection timeout handler running Sending probe 0, because no ack since 3.797. Current RTT: 100/25. 3.996 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.997 (Probe is an initial retransmit) 3.997 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.397/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.997 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.029 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 4.030 probe count not reset on ack because handshake not yet confirmed 4.030 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.430/Initial, because peerAwaitingAddressValidation | RTT:100/25 4.031 <- (2) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 4.034 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.130/Handshake, because peerAwaitingAddressValidation | RTT:32/16 4.034 Discarding pn space Initial because first Handshake message is being sent 4.034 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.034 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.130/Handshake, because peerAwaitingAddressValidation | RTT:32/16 4.034 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1157) 4.130 loss detection timeout handler running 4.130 Sending probe 0. Current RTT: 32/16. 4.130 Sending probe because peer awaiting address validation 4.130 (Probe is a handshake ping) 4.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 4.323/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.130 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 4.163 <- (4) Packet H|2|L|746|1 CryptoFrame[0,703] 4.164 - unknown transport parameter 0x0341, size 7 >- CryptoStream[H|Finished] 4.167 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 4.359/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.166 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.167 Starting downloading https://server4:443/tfwszbtbgp at 41:28.823 on ClientConnection[797e13d43990816a/9db3f5959060d259(V1) with server4/193.167.100.100:443] 4.167 -> Packet H|2|L|42|1 AckFrame[2|Δ0] 4.168 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 4.360/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.168 -> Packet A|0|S0|b186d252|43|1 StreamFrame[0(CIB),0,17,fin] 4.199 <- (5) Packet A|5|S0|9db3f5959060d259|32|1 AckFrame[0|Δ0] 4.200 probe count not reset on ack because handshake not yet confirmed 4.200 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 4.392/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.200 <- (6) Packet A|6|S0|9db3f5959060d259|1053|1 StreamFrame[0(CIB),0,1024,fin] 4.201 Finished downloading https://server4:443/tfwszbtbgp at 41:28.857 on ClientConnection[797e13d43990816a/9db3f5959060d259(V1) with server4/193.167.100.100:443] 4.201 Closing ClientConnection[797e13d43990816a/9db3f5959060d259(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.202 -> Packet A|1|S0|b186d252|31|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 4.202 Creating connection with server4:443 with v1 4.202 Setting up connection for downloading https://server4:443/vkemchvsya at 41:28.858 on ClientConnection[a61f4d0ba23cb7a1/6e7048168d816360(V1) with server4/193.167.100.100:443] 4.202 Original destination connection id: a61f4d0ba23cb7a1 (scid: 6e7048168d816360) >- CryptoStream[I|ClientHello] 4.204 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.404/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.204 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.238 <- (1) Packet I|0|L|480|3 Token=[] AckFrame[0|Δ0] Padding(308) CryptoFrame[0,123] 4.238 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.438/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.238 <- (1) Packet H|0|L|749|1 CryptoFrame[0,706] 4.242 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.339/Handshake, because peerAwaitingAddressValidation | RTT:33/16 4.242 - unknown transport parameter 0x0648, size 11 4.242 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 4.244 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.342/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.244 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.245 Starting downloading https://server4:443/vkemchvsya at 41:28.901 on ClientConnection[a61f4d0ba23cb7a1/6e7048168d816360(V1) with server4/193.167.100.100:443] 4.238 <- (1) Packet A|0|S0|6e7048168d816360|51|1 NewConnectionIdFrame[1,<0|59c68bce|567248007c2fca5cc705cfc764e0830f] 4.245 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 4.245 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.342/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.245 Discarding pn space Initial because first Handshake message is being sent 4.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.245 -> Packet A|0|S0|649bcb69|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 4.342 loss detection timeout handler running Sending probe 0, because no ack since 4.244. Current RTT: 33/16. 4.342 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.342 (Probe is a handshake retransmit) 4.342 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.537/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.342 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 4.374 <- (2) Packet A|2|S0|6e7048168d816360|283|4 NewTokenFrame[f151f861a13793d7311ea6455602e0e162032a2d98a5863a28ba4a98cf65a745fb701b3630557263a3ba648e3d64509ac10b8821dc55955fae20d5f4d5aced3c272f3f96d61c481e5c1ac352f0f158be738fdc711f4c] HandshakeDoneFrame[] CryptoFrame[0,138] NewConnectionIdFrame[1,<0|59c68bce|567248007c2fca5cc705cfc764e0830f] 4.375 State is set to Confirmed reschedule loss detection timer for PTO over 116 millis, based on 4.491/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 4.368/App, because ackElicitingInFlight | RTT:33/16 4.375 Discarding pn space Handshake because HandshakeDone is received 4.375 loss detection timeout handler running Sending probe 0, because no ack since 4.245. Current RTT: 33/16. 4.375 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 245 millis, based on 4.621/App, because ackElicitingInFlight | RTT:33/16 4.374 <- (3) Packet A|3|S0|6e7048168d816360|283|4 CryptoFrame[0,138] NewConnectionIdFrame[1,<0|59c68bce|567248007c2fca5cc705cfc764e0830f] HandshakeDoneFrame[] NewTokenFrame[f151f861a13793d7311ea6455602e0e162032a2d98a5863a28ba4a98cf65a745fb701b3630557263a3ba648e3d64509ac10b8821dc55955fae20d5f4d5aced3c272f3f96d61c481e5c1ac352f0f158be738fdc711f4c] 4.375 -> Packet PA|1|S0|649bcb69|43|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 4.374 <- (4) Packet A|4|S0|6e7048168d816360|33|1 AckFrame[0|Δ97] 4.376 -> Packet A|2|S0|649bcb69|29|1 AckFrame[3-2,0|Δ0] reschedule loss detection timer for PTO over 122 millis, based on 4.498/App, because ackElicitingInFlight | RTT:33/16 4.375 <- (5) Packet A|5|S0|6e7048168d816360|1053|1 StreamFrame[0(CIB),0,1024,fin] 4.377 Finished downloading https://server4:443/vkemchvsya at 41:29.032 on ClientConnection[a61f4d0ba23cb7a1/6e7048168d816360(V1) with server4/193.167.100.100:443] 4.377 Closing ClientConnection[a61f4d0ba23cb7a1/6e7048168d816360(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.377 -> Packet A|3|S0|649bcb69|31|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 4.378 Creating connection with server4:443 with v1 4.378 Setting up connection for downloading https://server4:443/klkmsjtdqe at 41:29.034 on ClientConnection[7ef6ab932594c3ba/fbd4ab838578da50(V1) with server4/193.167.100.100:443] 4.378 Original destination connection id: 7ef6ab932594c3ba (scid: fbd4ab838578da50) >- CryptoStream[I|ClientHello] 4.380 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.580/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.380 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.579 loss detection timeout handler running Sending probe 0, because no ack since 4.380. Current RTT: 100/25. 4.580 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.580 (Probe is an initial retransmit) 4.580 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.980/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.580 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.612 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 4.613 probe count not reset on ack because handshake not yet confirmed 4.613 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.013/Initial, because peerAwaitingAddressValidation | RTT:100/25 4.814 Discarding packet (750 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 5.012 loss detection timeout handler running Sending probe 1, because no ack since 4.580. Current RTT: 32/16. 5.012 Sending probe because peer awaiting address validation 5.012 (Probe is Initial ping, because there is no Initial data to retransmit) 5.013 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 5.397/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.013 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1159) 5.396 loss detection timeout handler running Sending probe 2, because no ack since 5.013. Current RTT: 32/16. 5.397 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.397 (Probe is Initial ping, because there is no Initial data to retransmit) 5.397 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 6.165/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.397 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1159) 5.398 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 6.166/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.398 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1159) 5.415 <- (3) Packet I|4|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 5.418 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 5.514/Handshake, because peerAwaitingAddressValidation | RTT:32/16 5.419 Discarding pn space Initial because first Handshake message is being sent 5.419 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.419 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 5.515/Handshake, because peerAwaitingAddressValidation | RTT:32/16 5.419 -> Packet I|5|L|1201|2 Token=[] AckFrame[4,1|Δ0] Padding(1155) 5.514 loss detection timeout handler running 5.514 Sending probe 0. Current RTT: 32/16. 5.514 Sending probe because peer awaiting address validation 5.514 (Probe is a handshake ping) 5.515 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 5.707/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.515 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 5.547 <- (5) Packet H|4|L|750|1 CryptoFrame[0,707] 5.548 - unknown transport parameter 0x1abf, size 12 >- CryptoStream[H|Finished] 5.551 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 5.743/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.551 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.551 Starting downloading https://server4:443/klkmsjtdqe at 41:30.207 on ClientConnection[7ef6ab932594c3ba/fbd4ab838578da50(V1) with server4/193.167.100.100:443] 5.551 -> Packet H|2|L|42|1 AckFrame[4|Δ0] 5.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 5.744/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.552 -> Packet A|0|S0|93b92f72|43|1 StreamFrame[0(CIB),0,17,fin] 5.743 loss detection timeout handler running Sending probe 1, because no ack since 5.551. Current RTT: 32/16. 5.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.743 (Probe is a handshake retransmit) 5.744 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 6.128/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.744 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 5.745 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 6.129/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.745 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 5.775 <- (6) Packet A|2|S0|fbd4ab838578da50|283|4 NewConnectionIdFrame[1,<0|9d2ecc5b|f4688044ec8f5cfca8ffef23e59014ff] NewTokenFrame[541c8089cb08a4ec5512d411e33e6fbeddc54669399da42d557e4de6a8e4a1d9903fddf902750242c32b0c98fc8fde9afa8e946b0dd031530a4dc52f7b2dd211e7d67eccff076ab535200e0b54f2ca4e577ea6d7fa78] HandshakeDoneFrame[] CryptoFrame[0,138] 5.776 State is set to Confirmed reschedule loss detection timer for PTO over 263 millis, based on 6.040/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -102 millis, based on 5.674/App, because ackElicitingInFlight | RTT:32/16 5.776 Discarding pn space Handshake because HandshakeDone is received 5.777 loss detection timeout handler running Sending probe 0, because no ack since 5.552. Current RTT: 32/16. 5.777 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] 5.776 <- (7) Packet A|3|S0|fbd4ab838578da50|283|4 NewConnectionIdFrame[1,<0|9d2ecc5b|f4688044ec8f5cfca8ffef23e59014ff] CryptoFrame[0,138] HandshakeDoneFrame[] NewTokenFrame[541c8089cb08a4ec5512d411e33e6fbeddc54669399da42d557e4de6a8e4a1d9903fddf902750242c32b0c98fc8fde9afa8e946b0dd031530a4dc52f7b2dd211e7d67eccff076ab535200e0b54f2ca4e577ea6d7fa78] reschedule loss detection timer for PTO over 243 millis, based on 6.021/App, because ackElicitingInFlight | RTT:32/16 -< CryptoStream[A|NewSessionTicket] 5.777 -> Packet PA|1|S0|93b92f72|43|1 StreamFrame[0(CIB),0,17,fin] 5.776 <- (8) Packet A|4|S0|fbd4ab838578da50|35|1 AckFrame[0|Δ192] reschedule loss detection timer for PTO over 121 millis, based on 5.899/App, because ackElicitingInFlight | RTT:32/16 5.776 <- (9) Packet A|5|S0|fbd4ab838578da50|1053|1 StreamFrame[0(CIB),0,1024,fin] 5.777 -> Packet A|2|S0|93b92f72|27|1 AckFrame[3-2|Δ0] 5.778 Finished downloading https://server4:443/klkmsjtdqe at 41:30.434 on ClientConnection[7ef6ab932594c3ba/fbd4ab838578da50(V1) with server4/193.167.100.100:443] 5.778 Closing ClientConnection[7ef6ab932594c3ba/fbd4ab838578da50(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.779 -> Packet A|3|S0|93b92f72|31|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 5.779 Creating connection with server4:443 with v1 5.780 Setting up connection for downloading https://server4:443/navvtfuauo at 41:30.435 on ClientConnection[b2c8964473c4c5f5/37b895aec4dff21e(V1) with server4/193.167.100.100:443] 5.780 Original destination connection id: b2c8964473c4c5f5 (scid: 37b895aec4dff21e) >- CryptoStream[I|ClientHello] 5.781 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.981/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.781 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.815 <- (1) Packet I|0|L|488|3 Token=[] AckFrame[0|Δ0] Padding(316) CryptoFrame[0,123] 5.816 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.016/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.815 <- (1) Packet H|0|L|741|1 CryptoFrame[0,698] 5.819 - unknown transport parameter 0x0740, size 1 5.819 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.916/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.818 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 5.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.919/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.821 -> Packet H|0|L|76|1 CryptoFrame[0,36] 5.822 Starting downloading https://server4:443/navvtfuauo at 41:30.477 on ClientConnection[b2c8964473c4c5f5/37b895aec4dff21e(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.822 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.919/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.815 <- (1) Packet A|0|S0|37b895aec4dff21e|51|1 NewConnectionIdFrame[1,<0|e88d6070|12430211ab44972e16a600cd9f1bff27] 5.822 -> Packet A|0|S0|d38ad7bc|43|1 StreamFrame[0(CIB),0,17,fin] 5.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.920/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.823 Discarding pn space Initial because first Handshake message is being sent 5.823 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 5.842 -> Packet A|1|S0|d38ad7bc|28|1 AckFrame[0|Δ19] 5.853 <- (2) Packet A|2|S0|37b895aec4dff21e|32|1 AckFrame[0|Δ0] 5.854 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.951/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.854 <- (3) Packet A|3|S0|37b895aec4dff21e|1053|1 StreamFrame[0(CIB),0,1024,fin] 5.855 Finished downloading https://server4:443/navvtfuauo at 41:30.511 on ClientConnection[b2c8964473c4c5f5/37b895aec4dff21e(V1) with server4/193.167.100.100:443] 5.855 Closing ClientConnection[b2c8964473c4c5f5/37b895aec4dff21e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.856 Creating connection with server4:443 with v1 5.856 -> Packet A|2|S0|d38ad7bc|33|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 5.856 Setting up connection for downloading https://server4:443/kuwkgfpfth at 41:30.512 on ClientConnection[c309d787b2e6f306/3cd0810de8fb8a90(V1) with server4/193.167.100.100:443] 5.856 Original destination connection id: c309d787b2e6f306 (scid: 3cd0810de8fb8a90) >- CryptoStream[I|ClientHello] 5.858 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.058/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.858 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.892 <- (1) Packet I|0|L|478|3 Token=[] AckFrame[0|Δ0] Padding(306) CryptoFrame[0,123] 5.892 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.093/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.892 <- (1) Packet H|0|L|751|1 CryptoFrame[0,708] 5.895 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.992/Handshake, because peerAwaitingAddressValidation | RTT:33/16 5.895 - unknown transport parameter 0x112e, size 12 5.895 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 5.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 5.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.898 -> Packet H|0|L|76|1 CryptoFrame[0,36] 5.898 Starting downloading https://server4:443/kuwkgfpfth at 41:30.554 on ClientConnection[c309d787b2e6f306/3cd0810de8fb8a90(V1) with server4/193.167.100.100:443] 5.892 <- (1) Packet A|0|S0|3cd0810de8fb8a90|51|1 NewConnectionIdFrame[1,<0|aee649cc|6f63d06547da76f6288b47a1444a13ad] 5.898 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 5.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.996/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.899 Discarding pn space Initial because first Handshake message is being sent 5.899 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.996/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.899 -> Packet A|0|S0|141ff2ac|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 5.930 <- (2) Packet A|2|S0|3cd0810de8fb8a90|256|3 CryptoFrame[0,135] HandshakeDoneFrame[] NewTokenFrame[5b08302037a8b7b85c18aca19e98cde1a2290d7364854236d6be92107e985705c280fd42983e23301f6f720a4281b9fb6ac22a319c1e6c9cdd02676aa044bd07b6aba19d4b0c07d55de800a5c8cca2c1530b9fb9a0fc] -< CryptoStream[A|NewSessionTicket] 5.931 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 5.995/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 6.022/App, because ackElicitingInFlight | RTT:33/16 5.931 Discarding pn space Handshake because HandshakeDone is received 5.951 -> Packet A|1|S0|141ff2ac|30|1 AckFrame[2,0|Δ19] 6.021 loss detection timeout handler running Sending probe 0, because no ack since 5.899. Current RTT: 33/16. 6.022 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 6.268/App, because ackElicitingInFlight | RTT:33/16 6.022 -> Packet PA|2|S0|141ff2ac|43|1 StreamFrame[0(CIB),0,17,fin] 6.267 loss detection timeout handler running Sending probe 1, because no ack since 6.022. Current RTT: 33/16. 6.267 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 6.760/App, because ackElicitingInFlight | RTT:33/16 6.268 -> Packet PA|3|S0|141ff2ac|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 6.761/App, because ackElicitingInFlight | RTT:33/16 6.269 -> Packet PA|4|S0|141ff2ac|43|1 StreamFrame[0(CIB),0,17,fin] 6.300 <- (3) Packet A|4|S0|3cd0810de8fb8a90|1053|1 StreamFrame[0(CIB),0,1024] 6.300 <- (4) Packet A|5|S0|3cd0810de8fb8a90|31|1 StreamFrame[0(CIB),1024,0,fin] 6.301 Finished downloading https://server4:443/kuwkgfpfth at 41:30.956 on ClientConnection[c309d787b2e6f306/3cd0810de8fb8a90(V1) with server4/193.167.100.100:443] 6.301 Closing ClientConnection[c309d787b2e6f306/3cd0810de8fb8a90(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.301 -> Packet A|5|S0|141ff2ac|31|1 AckFrame[5-4,2,0|Δ0] 6.301 -> Packet A|6|S0|141ff2ac|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2,0|Δ0] 6.301 <- (5) Packet A|6|S0|3cd0810de8fb8a90|1323|2 Padding(1295) PingFrame[] 6.301 Creating connection with server4:443 with v1 6.302 -> Packet A|7|S0|141ff2ac|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2,0|Δ0] 6.302 Setting up connection for downloading https://server4:443/zcbmdqqmyi at 41:30.958 on ClientConnection[68a6b291f5dc732e/5a1fa9dd6488b84a(V1) with server4/193.167.100.100:443] 6.302 Original destination connection id: 68a6b291f5dc732e (scid: 5a1fa9dd6488b84a) >- CryptoStream[I|ClientHello] 6.304 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.504/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.303 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.325 <- (6) Packet A|7|S0|3cd0810de8fb8a90|35|1 AckFrame[4-3,1|Δ25] 6.325 -> Packet A|8|S0|141ff2ac|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2,0|Δ0] 6.337 <- (1) Packet I|0|L|482|3 Token=[] AckFrame[0|Δ0] Padding(310) CryptoFrame[0,123] 6.338 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.538/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.337 <- (1) Packet H|0|L|747|1 CryptoFrame[0,704] 6.340 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.437/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.340 - unknown transport parameter 0x10d1, size 7 6.340 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 6.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.440/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.343 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.343 Starting downloading https://server4:443/zcbmdqqmyi at 41:30.999 on ClientConnection[68a6b291f5dc732e/5a1fa9dd6488b84a(V1) with server4/193.167.100.100:443] 6.337 <- (1) Packet A|0|S0|5a1fa9dd6488b84a|51|1 NewConnectionIdFrame[1,<0|c3269bc5|950c6dd8dee24f4a47ccd29a73a6c8ae] 6.343 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 6.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.440/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.343 Discarding pn space Initial because first Handshake message is being sent 6.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.441/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.344 -> Packet A|0|S0|3b575d53|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 6.374 <- (2) Packet A|1|S0|5a1fa9dd6488b84a|259|3 HandshakeDoneFrame[] NewTokenFrame[2f072a7089f4aff1cd7def7e20e608231bd3a2deac4f2c4a93edc4d57c8a90ef2f7faef94eac29f6b102678dd3bc4cba1e7568a1dddd2510fb894cff0ce0fe47968b38a9f3dad7457dc76a882fa294e0936735fd90fb] CryptoFrame[0,138] 6.374 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 6.440/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 6.467/App, because ackElicitingInFlight | RTT:33/16 6.374 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 6.375 <- (3) Packet A|3|S0|5a1fa9dd6488b84a|1053|1 StreamFrame[0(CIB),0,1024,fin] 6.376 -> Packet A|1|S0|3b575d53|30|1 AckFrame[3,1-0|Δ1] 6.376 Finished downloading https://server4:443/zcbmdqqmyi at 41:31.032 on ClientConnection[68a6b291f5dc732e/5a1fa9dd6488b84a(V1) with server4/193.167.100.100:443] 6.376 Closing ClientConnection[68a6b291f5dc732e/5a1fa9dd6488b84a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.376 -> Packet A|2|S0|3b575d53|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 6.377 Creating connection with server4:443 with v1 6.377 Setting up connection for downloading https://server4:443/kpfmbhfnev at 41:31.033 on ClientConnection[b4d2b953ffb41697/573b5648c0a0c3ef(V1) with server4/193.167.100.100:443] 6.377 Original destination connection id: b4d2b953ffb41697 (scid: 573b5648c0a0c3ef) >- CryptoStream[I|ClientHello] 6.379 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.579/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.379 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.407 <- (4) Packet A|4|S0|5a1fa9dd6488b84a|30|1 MaxStreamsFrame[B,101] 6.407 -> Packet A|3|S0|3b575d53|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 6.412 <- (1) Packet I|0|L|477|3 Token=[] AckFrame[0|Δ0] Padding(305) CryptoFrame[0,123] 6.412 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.613/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.412 <- (1) Packet H|0|L|752|1 CryptoFrame[0,709] 6.415 - unknown transport parameter 0x1853, size 12 6.415 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.512/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.415 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 6.418 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.515/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.418 -> Packet H|0|L|76|1 CryptoFrame[0,36] 6.418 Starting downloading https://server4:443/kpfmbhfnev at 41:31.074 on ClientConnection[b4d2b953ffb41697/573b5648c0a0c3ef(V1) with server4/193.167.100.100:443] 6.418 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 6.412 <- (1) Packet A|0|S0|573b5648c0a0c3ef|51|1 NewConnectionIdFrame[1,<0|aba71531|220f1591ac7c6806db2eb35c0f8bb8a6] 6.418 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.515/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.418 Discarding pn space Initial because first Handshake message is being sent 6.419 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.516/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.419 -> Packet A|0|S0|0ec6cda2|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 6.449 <- (2) Packet A|1|S0|573b5648c0a0c3ef|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[838b0f4bbcd7b8f8f04cec6ba4c967b03e235339b44f058d9d4369ddf54ee1d3e0942a1fe264716e6cd20bd5c23c7eba344c07ed5d67ccef332453d2de108725e3ce17f07c4910f3407e2c7e6c5dc3d9421b75c2fe51] 6.449 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 6.515/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 6.542/App, because ackElicitingInFlight | RTT:33/16 6.450 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 6.469 -> Packet A|1|S0|0ec6cda2|28|1 AckFrame[1-0|Δ19] 6.542 loss detection timeout handler running Sending probe 0, because no ack since 6.419. Current RTT: 33/16. 6.542 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 6.788/App, because ackElicitingInFlight | RTT:33/16 6.542 -> Packet PA|2|S0|0ec6cda2|43|1 StreamFrame[0(CIB),0,17,fin] 6.788 loss detection timeout handler running Sending probe 1, because no ack since 6.542. Current RTT: 33/16. 6.788 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 7.280/App, because ackElicitingInFlight | RTT:33/16 6.788 -> Packet PA|3|S0|0ec6cda2|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 7.281/App, because ackElicitingInFlight | RTT:33/16 6.789 -> Packet PA|4|S0|0ec6cda2|43|1 StreamFrame[0(CIB),0,17,fin] 6.820 <- (3) Packet A|2|S0|573b5648c0a0c3ef|1366|2 Padding(1338) PingFrame[] 6.820 <- (4) Packet A|3|S0|573b5648c0a0c3ef|34|1 AckFrame[3,1|Δ0] 6.822 Cwnd(-): 6000; inflight: 43 6.822 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 6.912/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 106 millis, based on 6.929/App, because ackElicitingInFlight | RTT:33/12 6.822 -> Packet A|5|S0|0ec6cda2|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 6.821 <- (5) Packet A|4|S0|573b5648c0a0c3ef|1053|1 StreamFrame[0(CIB),0,1024,fin] 6.823 Finished downloading https://server4:443/kpfmbhfnev at 41:31.478 on ClientConnection[b4d2b953ffb41697/573b5648c0a0c3ef(V1) with server4/193.167.100.100:443] 6.823 Closing ClientConnection[b4d2b953ffb41697/573b5648c0a0c3ef(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.823 -> Packet A|6|S0|0ec6cda2|31|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 6.823 Creating connection with server4:443 with v1 6.824 Setting up connection for downloading https://server4:443/nstlwvjjqe at 41:31.479 on ClientConnection[84d636394d5f5a5b/9897d2b9a31ba13a(V1) with server4/193.167.100.100:443] 6.824 Original destination connection id: 84d636394d5f5a5b (scid: 9897d2b9a31ba13a) >- CryptoStream[I|ClientHello] 6.826 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.026/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.826 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.025 loss detection timeout handler running Sending probe 0, because no ack since 6.826. Current RTT: 100/25. 7.025 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.025 (Probe is an initial retransmit) 7.026 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.426/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.025 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.057 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 7.058 probe count not reset on ack because handshake not yet confirmed 7.058 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.458/Initial, because peerAwaitingAddressValidation | RTT:100/25 7.060 <- (2) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 7.062 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 7.153/Handshake, because peerAwaitingAddressValidation | RTT:31/15 7.062 Discarding pn space Initial because first Handshake message is being sent 7.062 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.062 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 7.153/Handshake, because peerAwaitingAddressValidation | RTT:31/15 7.062 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1157) 7.153 loss detection timeout handler running 7.153 Sending probe 0. Current RTT: 31/15. 7.153 Sending probe because peer awaiting address validation 7.153 (Probe is a handshake ping) 7.153 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 7.335/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 7.153 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 7.185 <- (4) Packet H|2|L|744|1 CryptoFrame[0,701] 7.186 - unknown transport parameter 0x08d3, size 5 >- CryptoStream[H|Finished] 7.189 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 7.371/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 7.189 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.189 Starting downloading https://server4:443/nstlwvjjqe at 41:31.845 on ClientConnection[84d636394d5f5a5b/9897d2b9a31ba13a(V1) with server4/193.167.100.100:443] 7.190 -> Packet H|2|L|42|1 AckFrame[2|Δ0] 7.190 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 7.372/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 7.190 -> Packet A|0|S0|592bec16|43|1 StreamFrame[0(CIB),0,17,fin] 7.221 <- (5) Packet A|2|S0|9897d2b9a31ba13a|280|4 CryptoFrame[0,135] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|ad5756c2|9389578fd9ea74db072aeec31832cfa4] NewTokenFrame[de154df5a9c69e8864b3669372bc548754da45ba1b7475aae1ae1ec542548eeb1858efc18bc87658bf5470c46e1ff0dc6655dff68b83ee48c368331d33ac3ca01a9eab38ca49d8ce213898c3c4c670e2b0a9abe11e3d] -< CryptoStream[A|NewSessionTicket] 7.221 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 7.371/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 85 millis, based on 7.307/App, because ackElicitingInFlight | RTT:31/15 7.222 Discarding pn space Handshake because HandshakeDone is received 7.221 <- (6) Packet A|3|S0|9897d2b9a31ba13a|280|4 HandshakeDoneFrame[] NewTokenFrame[de154df5a9c69e8864b3669372bc548754da45ba1b7475aae1ae1ec542548eeb1858efc18bc87658bf5470c46e1ff0dc6655dff68b83ee48c368331d33ac3ca01a9eab38ca49d8ce213898c3c4c670e2b0a9abe11e3d] NewConnectionIdFrame[1,<0|ad5756c2|9389578fd9ea74db072aeec31832cfa4] CryptoFrame[0,135] -< CryptoStream[A|NewSessionTicket] 7.222 <- (7) Packet A|4|S0|9897d2b9a31ba13a|1366|2 Padding(1338) PingFrame[] 7.222 -> Packet A|1|S0|592bec16|27|1 AckFrame[3-2|Δ0] 7.222 <- (8) Packet A|5|S0|9897d2b9a31ba13a|32|1 AckFrame[0|Δ0] 7.223 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.242 -> Packet A|2|S0|592bec16|28|1 AckFrame[5-2|Δ19] 7.274 <- (9) Packet A|7|S0|9897d2b9a31ba13a|1409|2 Padding(1381) PingFrame[] 7.294 -> Packet A|3|S0|592bec16|30|1 AckFrame[7,5-2|Δ19] 7.326 <- (10) Packet A|8|S0|9897d2b9a31ba13a|1053|1 StreamFrame[0(CIB),0,1024,fin] 7.327 Finished downloading https://server4:443/nstlwvjjqe at 41:31.983 on ClientConnection[84d636394d5f5a5b/9897d2b9a31ba13a(V1) with server4/193.167.100.100:443] 7.327 Closing ClientConnection[84d636394d5f5a5b/9897d2b9a31ba13a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.327 -> Packet A|4|S0|592bec16|33|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5-2|Δ0] 7.328 Creating connection with server4:443 with v1 7.328 Setting up connection for downloading https://server4:443/bzzipxygqn at 41:31.984 on ClientConnection[05069ff3ff97db1b/6be7849d9a1f75e4(V1) with server4/193.167.100.100:443] 7.328 Original destination connection id: 05069ff3ff97db1b (scid: 6be7849d9a1f75e4) >- CryptoStream[I|ClientHello] 7.330 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.530/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.330 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.363 <- (1) Packet I|0|L|482|3 Token=[] AckFrame[0|Δ0] Padding(310) CryptoFrame[0,123] 7.364 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.564/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.363 <- (1) Packet H|0|L|747|1 CryptoFrame[0,704] 7.367 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.464/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.367 - unknown transport parameter 0x131e, size 8 7.367 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 7.369 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 7.466/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.369 -> Packet H|0|L|76|1 CryptoFrame[0,36] 7.369 Starting downloading https://server4:443/bzzipxygqn at 41:32.025 on ClientConnection[05069ff3ff97db1b/6be7849d9a1f75e4(V1) with server4/193.167.100.100:443] 7.369 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 7.363 <- (1) Packet A|0|S0|6be7849d9a1f75e4|51|1 NewConnectionIdFrame[1,<0|d6c258e8|373ae48252ddcb185b07007fd391ae78] 7.370 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.467/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.370 Discarding pn space Initial because first Handshake message is being sent 7.370 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.467/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.370 -> Packet A|0|S0|c29a1556|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 7.400 <- (2) Packet A|1|S0|6be7849d9a1f75e4|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[79e1062c1b891ac5f7ebb21eec4a520b3451195d0b19e08c44bfb486f1ee1a48c1aa7036692d87916be201b4c602bf0970d16233e126019d00b66e24f83bffbe2abdf84c6d3886c1cacb2d81b3389e07e603f6f9440c] 7.401 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 7.466/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 7.493/App, because ackElicitingInFlight | RTT:33/16 7.401 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 7.421 -> Packet A|1|S0|c29a1556|28|1 AckFrame[1-0|Δ19] 7.492 loss detection timeout handler running Sending probe 0, because no ack since 7.370. Current RTT: 33/16. 7.493 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 7.739/App, because ackElicitingInFlight | RTT:33/16 7.493 -> Packet PA|2|S0|c29a1556|43|1 StreamFrame[0(CIB),0,17,fin] 7.738 loss detection timeout handler running Sending probe 1, because no ack since 7.493. Current RTT: 33/16. 7.738 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 8.231/App, because ackElicitingInFlight | RTT:33/16 7.739 -> Packet PA|3|S0|c29a1556|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 8.232/App, because ackElicitingInFlight | RTT:33/16 7.740 -> Packet PA|4|S0|c29a1556|43|1 StreamFrame[0(CIB),0,17,fin] 7.771 <- (3) Packet A|2|S0|6be7849d9a1f75e4|1366|2 Padding(1338) PingFrame[] 7.771 <- (4) Packet A|3|S0|6be7849d9a1f75e4|34|1 AckFrame[3,1|Δ0] 7.772 Cwnd(-): 6000; inflight: 43 7.772 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 7.863/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 106 millis, based on 7.879/App, because ackElicitingInFlight | RTT:33/12 7.772 <- (5) Packet A|4|S0|6be7849d9a1f75e4|1053|1 StreamFrame[0(CIB),0,1024,fin] 7.772 -> Packet A|5|S0|c29a1556|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 7.773 Finished downloading https://server4:443/bzzipxygqn at 41:32.428 on ClientConnection[05069ff3ff97db1b/6be7849d9a1f75e4(V1) with server4/193.167.100.100:443] 7.773 Closing ClientConnection[05069ff3ff97db1b/6be7849d9a1f75e4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.773 -> Packet A|6|S0|c29a1556|31|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 7.773 Creating connection with server4:443 with v1 7.774 Setting up connection for downloading https://server4:443/edunnhllbw at 41:32.430 on ClientConnection[df632b9d0c03e42a/bfc0e2139c223110(V1) with server4/193.167.100.100:443] 7.774 Original destination connection id: df632b9d0c03e42a (scid: bfc0e2139c223110) >- CryptoStream[I|ClientHello] 7.776 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.976/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.775 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.803 <- (6) Packet A|5|S0|6be7849d9a1f75e4|36|1 AckFrame[5,3,1|Δ0] 7.803 -> Packet A|7|S0|c29a1556|31|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 7.809 <- (1) Packet I|0|L|484|3 Token=[] AckFrame[0|Δ0] Padding(312) CryptoFrame[0,123] 7.809 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.010/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.809 <- (1) Packet H|0|L|745|1 CryptoFrame[0,702] 7.812 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.909/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.812 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 7.813 - unknown transport parameter 0x1aa0, size 7 >- CryptoStream[H|Finished] 7.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.913/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.816 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.816 Starting downloading https://server4:443/edunnhllbw at 41:32.472 on ClientConnection[df632b9d0c03e42a/bfc0e2139c223110(V1) with server4/193.167.100.100:443] 7.809 <- (1) Packet A|0|S0|bfc0e2139c223110|51|1 NewConnectionIdFrame[1,<0|8e8f3d26|f0ec0cfa23a5cfd2dbb1eae61a9b65a8] 7.816 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 7.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.914/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.817 Discarding pn space Initial because first Handshake message is being sent 7.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.914/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.817 -> Packet A|0|S0|3fc005d8|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 7.913 loss detection timeout handler running Sending probe 0, because no ack since 7.816. Current RTT: 33/16. 7.913 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.913 (Probe is a handshake retransmit) 7.914 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.108/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.914 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 7.981 <- (2) Packet A|4|S0|bfc0e2139c223110|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[76a19056017c585b459c780e057b0a262d49cd2cebd99d311ada49b7741913a2a4d1c5068b04ceb6b87e5cf04e46129b031d878da85ec21a7ed3b88fa9a25050c26c2bb5692dd5b8b4d99d12b413c9e344f8e8f9e2a7] 7.982 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 8.063/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -41 millis, based on 7.940/App, because ackElicitingInFlight | RTT:33/16 7.982 Discarding pn space Handshake because HandshakeDone is received 7.982 loss detection timeout handler running Sending probe 0, because no ack since 7.817. Current RTT: 33/16. 7.982 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 245 millis, based on 8.228/App, because ackElicitingInFlight | RTT:33/16 7.982 -> Packet PA|1|S0|3fc005d8|43|1 StreamFrame[0(CIB),0,17,fin] 8.002 -> Packet A|2|S0|3fc005d8|30|1 AckFrame[4,0|Δ19] 8.013 <- (3) Packet A|5|S0|bfc0e2139c223110|32|1 AckFrame[1|Δ0] 8.014 Cwnd(-): 6000; inflight: 0 8.014 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 8.014 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 8.125/App, because ackElicitingInFlight | RTT:33/13 8.014 -> Packet A|3|S0|3fc005d8|50|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4,0|Δ0] 8.041 <- (4) Packet A|8|S0|bfc0e2139c223110|51|1 NewConnectionIdFrame[1,<0|8e8f3d26|f0ec0cfa23a5cfd2dbb1eae61a9b65a8] 8.061 -> Packet A|4|S0|3fc005d8|32|1 AckFrame[8,5-4,0|Δ19] 8.124 loss detection timeout handler running Sending probe 0, because no ack since 8.014. Current RTT: 33/13. 8.124 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 8.347/App, because ackElicitingInFlight | RTT:33/13 8.125 -> Packet PA|5|S0|3fc005d8|43|1 StreamFrame[0(CIB),0,17,fin] 8.175 <- (5) Packet A|11|S0|bfc0e2139c223110|1053|1 StreamFrame[0(CIB),0,1024,fin] 8.175 <- (6) Packet A|12|S0|bfc0e2139c223110|51|1 NewConnectionIdFrame[1,<0|8e8f3d26|f0ec0cfa23a5cfd2dbb1eae61a9b65a8] 8.176 Finished downloading https://server4:443/edunnhllbw at 41:32.831 on ClientConnection[df632b9d0c03e42a/bfc0e2139c223110(V1) with server4/193.167.100.100:443] 8.176 Closing ClientConnection[df632b9d0c03e42a/bfc0e2139c223110(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.176 -> Packet A|6|S0|3fc005d8|33|1 AckFrame[12-11,8,5-4,0|Δ0] 8.176 -> Packet A|7|S0|3fc005d8|37|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,8,5-4,0|Δ0] 8.177 Creating connection with server4:443 with v1 8.178 Setting up connection for downloading https://server4:443/cxusrwkoxt at 41:32.833 on ClientConnection[4f6e0806cd51be2a/16449b307d5a2bc3(V1) with server4/193.167.100.100:443] 8.178 Original destination connection id: 4f6e0806cd51be2a (scid: 16449b307d5a2bc3) >- CryptoStream[I|ClientHello] 8.179 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.379/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.179 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.207 <- (7) Packet A|13|S0|bfc0e2139c223110|30|1 MaxStreamsFrame[B,101] 8.208 -> Packet A|8|S0|3fc005d8|37|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,8,5-4,0|Δ0] 8.378 loss detection timeout handler running Sending probe 0, because no ack since 8.179. Current RTT: 100/25. 8.379 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.379 (Probe is an initial retransmit) 8.379 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.779/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.379 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.413 <- (1) Packet I|0|L|476|3 Token=[] AckFrame[1|Δ0] Padding(304) CryptoFrame[0,123] 8.413 probe count not reset on ack because handshake not yet confirmed 8.414 Retransmitting CryptoFrame[0,257] on level Initial 8.414 Cwnd(-): 6000; inflight: 0 8.414 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.814/Initial, because peerAwaitingAddressValidation | RTT:100/25 8.414 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 8.608/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.414 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 8.413 <- (1) Packet H|0|L|753|1 CryptoFrame[0,710] 8.417 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.611/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.417 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 8.418 - unknown transport parameter 0x0477, size 13 >- CryptoStream[H|Finished] 8.421 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.615/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.421 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.421 Starting downloading https://server4:443/cxusrwkoxt at 41:33.077 on ClientConnection[4f6e0806cd51be2a/16449b307d5a2bc3(V1) with server4/193.167.100.100:443] 8.413 <- (1) Packet A|0|S0|16449b307d5a2bc3|51|1 NewConnectionIdFrame[1,<0|fa17e183|c6ba7216e94aabcf60ca6016b254db1f] 8.421 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 8.421 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.518/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.422 Discarding pn space Initial because first Handshake message is being sent 8.422 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.519/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.422 -> Packet A|0|S0|0d847b51|43|1 StreamFrame[0(CIB),0,17,fin] 8.441 -> Packet A|1|S0|0d847b51|28|1 AckFrame[0|Δ19] 8.446 Discarding packet (45 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.453 <- (3) Packet A|1|S0|16449b307d5a2bc3|1366|2 Padding(1338) PingFrame[] 8.472 -> Packet A|2|S0|0d847b51|28|1 AckFrame[1-0|Δ19] 8.518 loss detection timeout handler running Sending probe 0, because no ack since 8.421. Current RTT: 33/16. 8.518 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.518 (Probe is a handshake retransmit) 8.518 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.712/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.518 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 8.633 <- (4) Packet A|4|S0|16449b307d5a2bc3|256|3 HandshakeDoneFrame[] NewTokenFrame[4bec43cc5232eaad547211bfff4780b9842f293d22a263dab7ebeaaa8da38f4f70d21709e10626272d2f3d36c478585de4b53230d171abc3edba8d22b72bb45beb533e5951c30264ce0ee54765b36132b04ef350a299] CryptoFrame[0,135] 8.633 State is set to Confirmed reschedule loss detection timer for PTO over 34 millis, based on 8.668/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -89 millis, based on 8.545/App, because ackElicitingInFlight | RTT:33/16 8.634 Discarding pn space Handshake because HandshakeDone is received 8.634 loss detection timeout handler running Sending probe 0, because no ack since 8.422. Current RTT: 33/16. 8.634 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] 8.633 <- (5) Packet A|5|S0|16449b307d5a2bc3|256|3 HandshakeDoneFrame[] CryptoFrame[0,135] NewTokenFrame[4bec43cc5232eaad547211bfff4780b9842f293d22a263dab7ebeaaa8da38f4f70d21709e10626272d2f3d36c478585de4b53230d171abc3edba8d22b72bb45beb533e5951c30264ce0ee54765b36132b04ef350a299] reschedule loss detection timer for PTO over 245 millis, based on 8.880/App, because ackElicitingInFlight | RTT:33/16 8.634 -> Packet PA|3|S0|0d847b51|43|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 8.634 -> Packet A|4|S0|0d847b51|29|1 AckFrame[5-4,1-0|Δ0] 8.665 <- (6) Packet A|6|S0|16449b307d5a2bc3|32|1 AckFrame[3-2|Δ0] 8.666 Cwnd(-): 3000; inflight: 0 8.666 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.666 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 110 millis, based on 8.777/App, because ackElicitingInFlight | RTT:33/13 8.666 -> Packet A|5|S0|0d847b51|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5-4|Δ0] 8.723 <- (7) Packet A|8|S0|16449b307d5a2bc3|1409|2 Padding(1381) PingFrame[] 8.743 -> Packet A|6|S0|0d847b51|30|1 AckFrame[8,6-4|Δ19] 8.776 loss detection timeout handler running Sending probe 0, because no ack since 8.666. Current RTT: 33/13. 8.776 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 8.999/App, because ackElicitingInFlight | RTT:33/13 8.777 -> Packet PA|7|S0|0d847b51|43|1 StreamFrame[0(CIB),0,17,fin] 8.833 <- (8) Packet A|11|S0|16449b307d5a2bc3|33|1 AckFrame[7-2|Δ25] 8.834 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.937 <- (9) Packet A|13|S0|16449b307d5a2bc3|1053|1 StreamFrame[0(CIB),0,1024,fin] 8.938 Finished downloading https://server4:443/cxusrwkoxt at 41:33.594 on ClientConnection[4f6e0806cd51be2a/16449b307d5a2bc3(V1) with server4/193.167.100.100:443] 8.938 Closing ClientConnection[4f6e0806cd51be2a/16449b307d5a2bc3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.939 -> Packet A|8|S0|0d847b51|33|2 ConnectionCloseFrame[0|0|] AckFrame[13,11|Δ0] 8.939 Creating connection with server4:443 with v1 8.939 Setting up connection for downloading https://server4:443/wnjirffzoc at 41:33.595 on ClientConnection[1bbcfa15fcd195b5/dae3a611a28aebda(V1) with server4/193.167.100.100:443] 8.939 Original destination connection id: 1bbcfa15fcd195b5 (scid: dae3a611a28aebda) >- CryptoStream[I|ClientHello] 8.941 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.141/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.941 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.140 loss detection timeout handler running Sending probe 0, because no ack since 8.941. Current RTT: 100/25. 9.140 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.140 (Probe is an initial retransmit) 9.141 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.541/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.141 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.175 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 9.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.379/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.179 Discarding pn space Initial because first Handshake message is being sent 9.179 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.379/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.179 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 9.375 <- (3) Packet H|2|L|747|1 CryptoFrame[0,704] 9.376 - unknown transport parameter 0x0b20, size 8 >- CryptoStream[H|Finished] 9.379 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 199 millis, based on 9.579/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.378 -> Packet H|0|L|76|1 CryptoFrame[0,36] 9.379 Starting downloading https://server4:443/wnjirffzoc at 41:34.034 on ClientConnection[1bbcfa15fcd195b5/dae3a611a28aebda(V1) with server4/193.167.100.100:443] 9.379 -> Packet H|1|L|42|1 AckFrame[2|Δ0] 9.379 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.579/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.379 -> Packet A|0|S0|8682df25|43|1 StreamFrame[0(CIB),0,17,fin] 9.579 loss detection timeout handler running Sending probe 0, because no ack since 9.378. Current RTT: 100/25. 9.579 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.579 (Probe is a handshake retransmit) 9.579 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 9.979/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.579 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 9.978 loss detection timeout handler running Sending probe 1, because no ack since 9.379. Current RTT: 100/25. 9.979 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.979 (Probe is a handshake retransmit) 9.979 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 10.779/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.979 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 9.980 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 10.780/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.980 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 10.010 <- (4) Packet A|2|S0|dae3a611a28aebda|283|4 NewConnectionIdFrame[1,<0|8363cbf2|9cc49263e1724e1e1138ebffa345a5c0] NewTokenFrame[e5b8a6ecb908125a1e13cc5ab38a51e507272a02ea21aad433e7db5df77bfbb2e2e6d82ad2b8fa89d7d774126dddad83aa624d9309707f48f72c71baf6114fc3fe67d776a5c1c9d8b15e5e65dc00c0baf321740b8911] HandshakeDoneFrame[] CryptoFrame[0,138] 10.011 State is set to Confirmed reschedule loss detection timer for PTO over 272 millis, based on 10.283/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -405 millis, based on 9.605/App, because ackElicitingInFlight | RTT:100/25 10.011 Discarding pn space Handshake because HandshakeDone is received 10.011 loss detection timeout handler running Sending probe 0, because no ack since 9.379. Current RTT: 100/25. 10.011 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 451 millis, based on 10.463/App, because ackElicitingInFlight | RTT:100/25 10.011 -> Packet PA|1|S0|8682df25|43|1 StreamFrame[0(CIB),0,17,fin] 10.031 -> Packet A|2|S0|8682df25|28|1 AckFrame[2|Δ19] 10.277 <- (5) Packet A|7|S0|dae3a611a28aebda|283|4 NewTokenFrame[e5b8a6ecb908125a1e13cc5ab38a51e507272a02ea21aad433e7db5df77bfbb2e2e6d82ad2b8fa89d7d774126dddad83aa624d9309707f48f72c71baf6114fc3fe67d776a5c1c9d8b15e5e65dc00c0baf321740b8911] NewConnectionIdFrame[1,<0|8363cbf2|9cc49263e1724e1e1138ebffa345a5c0] HandshakeDoneFrame[] CryptoFrame[0,138] -< CryptoStream[A|NewSessionTicket] 10.278 <- (6) Packet A|8|S0|dae3a611a28aebda|1053|1 StreamFrame[0(CIB),0,1024,fin] 10.279 -> Packet A|3|S0|8682df25|29|1 AckFrame[8-7,2|Δ0] 10.279 Finished downloading https://server4:443/wnjirffzoc at 41:34.935 on ClientConnection[1bbcfa15fcd195b5/dae3a611a28aebda(V1) with server4/193.167.100.100:443] 10.279 Closing ClientConnection[1bbcfa15fcd195b5/dae3a611a28aebda(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.279 <- (7) Packet A|9|S0|dae3a611a28aebda|1366|2 Padding(1338) PingFrame[] 10.280 Creating connection with server4:443 with v1 10.280 -> Packet A|4|S0|8682df25|37|3 ConnectionCloseFrame[0|0|] AckFrame[8-7,2|Δ0] ConnectionCloseFrame[0|0|] 10.281 Setting up connection for downloading https://server4:443/edzwubbdvm at 41:34.936 on ClientConnection[61e709fcb57c67d9/21b8607a9e0de1da(V1) with server4/193.167.100.100:443] 10.281 Original destination connection id: 61e709fcb57c67d9 (scid: 21b8607a9e0de1da) >- CryptoStream[I|ClientHello] 10.282 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.482/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.282 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.310 <- (8) Packet A|10|S0|dae3a611a28aebda|30|1 MaxStreamsFrame[B,101] 10.310 -> Packet A|5|S0|8682df25|33|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,2|Δ0] 10.481 loss detection timeout handler running Sending probe 0, because no ack since 10.282. Current RTT: 100/25. 10.481 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.481 (Probe is an initial retransmit) 10.482 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.882/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.482 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.515 <- (1) Packet I|0|L|489|3 Token=[] AckFrame[1|Δ0] Padding(317) CryptoFrame[0,123] 10.516 probe count not reset on ack because handshake not yet confirmed 10.516 Retransmitting CryptoFrame[0,257] on level Initial 10.516 Cwnd(-): 6000; inflight: 0 10.516 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.916/Initial, because peerAwaitingAddressValidation | RTT:100/25 10.516 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 10.711/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.516 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 10.515 <- (1) Packet H|0|L|740|1 CryptoFrame[0,697] 10.519 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.713/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.519 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 10.519 - unknown transport parameter 0x0113, size 2 >- CryptoStream[H|Finished] 10.521 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 10.715/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.521 -> Packet H|0|L|76|1 CryptoFrame[0,36] 10.522 Starting downloading https://server4:443/edzwubbdvm at 41:35.177 on ClientConnection[61e709fcb57c67d9/21b8607a9e0de1da(V1) with server4/193.167.100.100:443] 10.522 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 10.515 <- (1) Packet A|0|S0|21b8607a9e0de1da|51|1 NewConnectionIdFrame[1,<0|3e2d9759|a4262ea6ab6f663b617812921617f860] 10.522 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.619/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.522 Discarding pn space Initial because first Handshake message is being sent 10.522 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 10.619/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.522 -> Packet A|0|S0|b993c36b|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 10.552 <- (2) Packet A|1|S0|21b8607a9e0de1da|259|3 NewTokenFrame[7de52a1edc13c306791269a60d0d3c4073a02ef32824c591429df0202c25dc3e0f0ad3859ba4a4d4c281b5f43dba05e0b68b44b21888bfeae3fdb239ed606b42657193d686d534fc205bd75b7af423221d71d6e22ed6] HandshakeDoneFrame[] CryptoFrame[0,138] 10.553 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 10.618/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 10.645/App, because ackElicitingInFlight | RTT:33/16 10.553 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 10.553 <- (3) Packet A|2|S0|21b8607a9e0de1da|32|1 AckFrame[0|Δ0] 10.554 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.573 -> Packet A|1|S0|b993c36b|28|1 AckFrame[2-1|Δ19] 10.672 <- (4) Packet A|5|S0|21b8607a9e0de1da|1053|1 StreamFrame[0(CIB),0,1024,fin] 10.673 Finished downloading https://server4:443/edzwubbdvm at 41:35.328 on ClientConnection[61e709fcb57c67d9/21b8607a9e0de1da(V1) with server4/193.167.100.100:443] 10.673 Closing ClientConnection[61e709fcb57c67d9/21b8607a9e0de1da(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.673 <- (5) Packet A|6|S0|21b8607a9e0de1da|1053|1 StreamFrame[0(CIB),0,1024,fin] 10.673 Receiving frame for non-existent stream 0 10.673 -> Packet A|2|S0|b993c36b|33|2 AckFrame[6-5,2-1|Δ0] ConnectionCloseFrame[0|0|] 10.674 Creating connection with server4:443 with v1 10.675 Setting up connection for downloading https://server4:443/ypbdbndqxz at 41:35.330 on ClientConnection[71167ff7c8dd14f0/a13ea9543c412ffb(V1) with server4/193.167.100.100:443] 10.675 Original destination connection id: 71167ff7c8dd14f0 (scid: a13ea9543c412ffb) >- CryptoStream[I|ClientHello] 10.676 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.876/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.676 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.876 loss detection timeout handler running Sending probe 0, because no ack since 10.676. Current RTT: 100/25. 10.876 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.876 (Probe is an initial retransmit) 10.876 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.276/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.876 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.910 <- (1) Packet I|0|L|486|3 Token=[] AckFrame[1|Δ0] Padding(314) CryptoFrame[0,123] 10.910 probe count not reset on ack because handshake not yet confirmed 10.911 Retransmitting CryptoFrame[0,257] on level Initial 10.911 Cwnd(-): 6000; inflight: 0 10.911 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.311/Initial, because peerAwaitingAddressValidation | RTT:100/25 10.911 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 11.105/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.911 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 10.910 <- (1) Packet H|0|L|743|1 CryptoFrame[0,700] 10.913 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.913 - unknown transport parameter 0x1799, size 5 reschedule loss detection timer for PTO over 193 millis, based on 11.107/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.913 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 10.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.110/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.916 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.916 Starting downloading https://server4:443/ypbdbndqxz at 41:35.572 on ClientConnection[71167ff7c8dd14f0/a13ea9543c412ffb(V1) with server4/193.167.100.100:443] 10.910 <- (1) Packet A|0|S0|a13ea9543c412ffb|51|1 NewConnectionIdFrame[1,<0|c44aee81|42fa8607769888944ea3baba2c7623d7] 10.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.013/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.916 Discarding pn space Initial because first Handshake message is being sent 10.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.014/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 10.917 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|df717020|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 11.013 loss detection timeout handler running Sending probe 0, because no ack since 10.916. Current RTT: 33/16. 11.013 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.013 (Probe is a handshake retransmit) 11.013 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 11.207/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.013 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 11.045 <- (2) Packet A|1|S0|a13ea9543c412ffb|259|3 CryptoFrame[0,138] NewTokenFrame[f636b0de98edbee3094103cd1eefb5067fbd8a8c2fcdcb2e49122bbcecdaf2c165acb12ef504edf8b1a82c889102601197715810631852449cb502b6d4d0db36303274fd57b5ac46870c530990bbe3aa6c9e86c0ce89] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 11.045 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 11.163/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -5 millis, based on 11.040/App, because ackElicitingInFlight | RTT:33/16 11.046 Discarding pn space Handshake because HandshakeDone is received 11.046 loss detection timeout handler running Sending probe 0, because no ack since 10.917. Current RTT: 33/16. 11.046 (Probe is retransmit on level App) 11.046 <- (3) Packet A|3|S0|a13ea9543c412ffb|1053|1 StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 245 millis, based on 11.292/App, because ackElicitingInFlight | RTT:33/16 11.046 -> Packet PA|1|S0|df717020|43|1 StreamFrame[0(CIB),0,17,fin] 11.046 Finished downloading https://server4:443/ypbdbndqxz at 41:35.702 on ClientConnection[71167ff7c8dd14f0/a13ea9543c412ffb(V1) with server4/193.167.100.100:443] 11.046 Closing ClientConnection[71167ff7c8dd14f0/a13ea9543c412ffb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.046 -> Packet A|2|S0|df717020|29|1 AckFrame[3,1-0|Δ0] 11.047 Creating connection with server4:443 with v1 11.047 -> Packet A|3|S0|df717020|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 11.047 Setting up connection for downloading https://server4:443/jhisckcniv at 41:35.703 on ClientConnection[ea456fe8c9b60c9c/079c1b6fc18fbf9d(V1) with server4/193.167.100.100:443] 11.047 Original destination connection id: ea456fe8c9b60c9c (scid: 079c1b6fc18fbf9d) >- CryptoStream[I|ClientHello] 11.049 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.249/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.049 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.077 <- (4) Packet A|4|S0|a13ea9543c412ffb|35|2 AckFrame[2-0|Δ0] MaxStreamsFrame[B,101] 11.078 -> Packet A|4|S0|df717020|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 11.248 loss detection timeout handler running Sending probe 0, because no ack since 11.049. Current RTT: 100/25. 11.248 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.248 (Probe is an initial retransmit) 11.249 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.649/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.249 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.280 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 11.281 probe count not reset on ack because handshake not yet confirmed 11.281 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.681/Initial, because peerAwaitingAddressValidation | RTT:100/25 11.284 <- (2) Packet I|3|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 11.286 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 11.377/Handshake, because peerAwaitingAddressValidation | RTT:31/15 11.286 Discarding pn space Initial because first Handshake message is being sent 11.286 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 11.377/Handshake, because peerAwaitingAddressValidation | RTT:31/15 11.286 -> Packet I|2|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1155) 11.376 loss detection timeout handler running 11.376 Sending probe 0. Current RTT: 31/15. 11.376 Sending probe because peer awaiting address validation 11.376 (Probe is a handshake ping) 11.377 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 11.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 11.377 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 11.558 loss detection timeout handler running Sending probe 1, because no ack since 11.377. Current RTT: 31/15. 11.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.558 (Probe is a handshake ping) 11.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 11.923/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 11.558 -> Packet PH|1|L|40|2 PingFrame[] Padding(2) 11.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 363 millis, based on 11.924/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 11.559 -> Packet PH|2|L|40|2 PingFrame[] Padding(2) 11.590 <- (3) Packet H|3|L|44|1 AckFrame[2|Δ0] 11.591 probe count not reset on ack because handshake not yet confirmed 11.591 Cwnd(-): 6000; inflight: 40 11.592 loss detection timeout handler running 11.592 loss detection timeout handler running 11.592 loss detection timeout handler running 11.592 loss detection timeout handler running 11.592 loss detection timeout handler running 11.592 loss detection timeout handler running 11.592 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.683 <- (4) Packet H|4|L|748|1 CryptoFrame[0,705] 11.684 - unknown transport parameter 0x04d4, size 10 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 315 millis, based on 12.002/Handshake, because ackElicitingInFlight | RTT:31/12 11.686 -> Packet H|3|L|81|2 CryptoFrame[0,36] AckFrame[3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.687 Starting downloading https://server4:443/jhisckcniv at 41:36.342 on ClientConnection[ea456fe8c9b60c9c/079c1b6fc18fbf9d(V1) with server4/193.167.100.100:443] 11.687 -> Packet H|4|L|42|1 AckFrame[4-3|Δ0] 11.684 <- (5) Packet H|5|L|748|1 CryptoFrame[0,705] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.687 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 314 millis, based on 12.002/Handshake, because ackElicitingInFlight | RTT:31/12 11.687 -> Packet A|0|S0|74e293f7|43|1 StreamFrame[0(CIB),0,17,fin] 11.688 -> Packet H|5|L|42|1 AckFrame[5-3|Δ0] 12.001 loss detection timeout handler running Sending probe 2, because no ack since 11.686. Current RTT: 31/12. 12.002 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 12.002 (Probe is a handshake retransmit) 12.002 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 631 millis, based on 12.634/Handshake, because ackElicitingInFlight | RTT:31/12 12.002 -> Packet PH|6|L|76|1 CryptoFrame[0,36] 12.003 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 631 millis, based on 12.635/Handshake, because ackElicitingInFlight | RTT:31/12 12.003 -> Packet PH|7|L|76|1 CryptoFrame[0,36] 12.034 <- (6) Packet A|3|S0|079c1b6fc18fbf9d|283|4 CryptoFrame[0,138] HandshakeDoneFrame[] NewTokenFrame[16fe233e03acdc382e6390092db81bf6c9cd691ed08f0d473889e34cd3b4f3ee9d19d55e549d34dd7dd77ceec7c3d89903db57245eb799d84e402f227fc15c46a57f7e233b60e4f88776e1f38382a3939e5d08a451f7] NewConnectionIdFrame[1,<0|7706152b|4b7042062fd7fecaa44dd222a2d4faa6] -< CryptoStream[A|NewSessionTicket] 12.034 State is set to Confirmed reschedule loss detection timer for PTO over 493 millis, based on 12.527/App, because ackElicitingInFlight | RTT:31/12 reschedule loss detection timer for PTO over -242 millis, based on 11.792/App, because ackElicitingInFlight | RTT:31/12 12.034 loss detection timeout handler running 12.034 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 11.687. Current RTT: 31/12. 12.035 (Probe is retransmit on level App) 12.035 <- (7) Packet A|5|S0|079c1b6fc18fbf9d|1053|1 StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 209 millis, based on 12.245/App, because ackElicitingInFlight | RTT:31/12 12.035 -> Packet PA|1|S0|74e293f7|43|1 StreamFrame[0(CIB),0,17,fin] 12.035 -> Packet A|2|S0|74e293f7|29|1 AckFrame[5,3|Δ0] 12.035 Finished downloading https://server4:443/jhisckcniv at 41:36.691 on ClientConnection[ea456fe8c9b60c9c/079c1b6fc18fbf9d(V1) with server4/193.167.100.100:443] 12.035 Closing ClientConnection[ea456fe8c9b60c9c/079c1b6fc18fbf9d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.036 Creating connection with server4:443 with v1 12.036 -> Packet A|3|S0|74e293f7|33|2 ConnectionCloseFrame[0|0|] AckFrame[5,3|Δ0] 12.037 Setting up connection for downloading https://server4:443/fhcsjaludr at 41:36.692 on ClientConnection[f56da0114bb48801/2b0a1d6194615714(V1) with server4/193.167.100.100:443] 12.037 Original destination connection id: f56da0114bb48801 (scid: 2b0a1d6194615714) >- CryptoStream[I|ClientHello] 12.038 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.238/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.038 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.237 loss detection timeout handler running Sending probe 0, because no ack since 12.038. Current RTT: 100/25. 12.237 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.237 (Probe is an initial retransmit) 12.238 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.638/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.238 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.272 <- (1) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 12.275 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.475/Handshake, because peerAwaitingAddressValidation | RTT:100/25 12.275 Discarding pn space Initial because first Handshake message is being sent 12.275 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 12.275 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.475/Handshake, because peerAwaitingAddressValidation | RTT:100/25 12.275 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1157) 12.471 <- (3) Packet H|1|L|739|1 CryptoFrame[0,696] 12.472 - unknown transport parameter 0x0b5e, size 1 12.474 loss detection timeout handler running >- CryptoStream[H|Finished] 12.474 Sending probe 0. Current RTT: 100/25. 12.474 Sending probe because peer awaiting address validation 12.474 (Probe is a handshake ping) 12.475 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.875/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.474 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.475 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.875/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.472 <- (4) Packet H|2|L|739|1 CryptoFrame[0,696] 12.475 -> Packet PH|1|L|40|2 PingFrame[] Padding(2) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.475 -> Packet H|2|L|42|1 AckFrame[1|Δ0] 12.475 Starting downloading https://server4:443/fhcsjaludr at 41:37.131 on ClientConnection[f56da0114bb48801/2b0a1d6194615714(V1) with server4/193.167.100.100:443] 12.475 -> Packet H|3|L|42|1 AckFrame[2-1|Δ0] 12.476 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 12.876/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.476 -> Packet A|0|S0|ad1dbba0|43|1 StreamFrame[0(CIB),0,17,fin] 12.506 <- (5) Packet H|3|L|44|1 AckFrame[1|Δ0] 12.506 probe count not reset on ack because handshake not yet confirmed 12.587 loss detection timeout handler running 12.587 Retransmitting CryptoFrame[0,36] on level Handshake 12.587 Cwnd(-): 6000; inflight: 43 12.587 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 12.587 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 12.587 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 181 millis, based on 12.769/Handshake, because ackElicitingInFlight | RTT:31/15 12.587 -> Packet H|4|L|81|2 CryptoFrame[0,36] AckFrame[3-1|Δ0] 12.619 <- (6) Packet A|4|S0|2b0a1d6194615714|33|1 AckFrame[0|Δ111] reschedule loss detection timer for PTO over 58 millis, based on 12.678/Handshake, because ackElicitingInFlight | RTT:31/15 12.620 <- (7) Packet A|5|S0|2b0a1d6194615714|1053|1 StreamFrame[0(CIB),0,1024,fin] 12.620 Finished downloading https://server4:443/fhcsjaludr at 41:37.276 on ClientConnection[f56da0114bb48801/2b0a1d6194615714(V1) with server4/193.167.100.100:443] 12.620 Closing ClientConnection[f56da0114bb48801/2b0a1d6194615714(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.621 -> Packet A|1|S0|ad1dbba0|31|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 12.621 Creating connection with server4:443 with v1 12.621 Setting up connection for downloading https://server4:443/ijcurtvwvp at 41:37.277 on ClientConnection[cb2c00da4ae54ee9/d2c776741461a956(V1) with server4/193.167.100.100:443] 12.622 Original destination connection id: cb2c00da4ae54ee9 (scid: d2c776741461a956) >- CryptoStream[I|ClientHello] 12.623 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.823/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.623 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.822 loss detection timeout handler running Sending probe 0, because no ack since 12.623. Current RTT: 100/25. 12.822 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.822 (Probe is an initial retransmit) 12.823 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.223/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.823 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.859 <- (1) Packet I|3|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 12.862 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.062/Handshake, because peerAwaitingAddressValidation | RTT:100/25 12.862 Discarding pn space Initial because first Handshake message is being sent 12.862 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.062/Handshake, because peerAwaitingAddressValidation | RTT:100/25 12.862 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1157) 12.881 <- (8) Packet A|7|S0|2b0a1d6194615714|283|4 CryptoFrame[0,138] NewTokenFrame[22b6331a70540f84de4415bcbec9055ca926c68404fa3274e8e14729ba2bbd4650acd06054e53136901beabb92daa6a5146a5002d4edc13c07cdbc9a68953f796f890bf1bf536caba706405910d3534a93d278f5620a] NewConnectionIdFrame[1,<0|32f5ea8c|9029d495b2f2f60facdd1c9fe6aab19e] HandshakeDoneFrame[] 12.882 -> Packet A|2|S0|ad1dbba0|31|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 12.882 <- (9) Packet A|8|S0|2b0a1d6194615714|1053|1 StreamFrame[0(CIB),0,1024,fin] 12.883 -> Packet A|3|S0|ad1dbba0|31|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 13.058 <- (2) Packet H|2|L|752|1 CryptoFrame[0,709] 13.058 - unknown transport parameter 0x0cb3, size 13 >- CryptoStream[H|Finished] 13.061 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.061 loss detection timeout handler running Sending probe 0, because no ack since 13.061. Current RTT: 100/25. 13.061 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.261/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.061 (Probe is a handshake retransmit) -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.061 Starting downloading https://server4:443/ijcurtvwvp at 41:37.717 on ClientConnection[cb2c00da4ae54ee9/d2c776741461a956(V1) with server4/193.167.100.100:443] 13.061 -> Packet H|0|L|76|1 CryptoFrame[0,36] 13.062 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 13.462/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.062 -> Packet PH|1|L|81|2 AckFrame[2|Δ0] CryptoFrame[0,36] 13.062 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 13.462/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.062 -> Packet A|0|S0|0de216ee|43|1 StreamFrame[0(CIB),0,17,fin] 13.092 <- (3) Packet A|2|S0|d2c776741461a956|280|4 NewConnectionIdFrame[1,<0|a6e9209a|b5daf04eff4fa552728055dbb1a681e6] CryptoFrame[0,135] HandshakeDoneFrame[] NewTokenFrame[977a6d2889b8739128e75527aa26aa481ee444f996badec252b6bad858769877f101b77fe14a865f439da519db157798dadbed433c696499dc291e35693f89dba1b931e23bd336952be37175dff87ead3755bbc3e1ac] -< CryptoStream[A|NewSessionTicket] 13.093 State is set to Confirmed reschedule loss detection timer for PTO over 368 millis, based on 13.462/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 13.288/App, because ackElicitingInFlight | RTT:100/25 13.094 Discarding pn space Handshake because HandshakeDone is received 13.093 <- (4) Packet A|3|S0|d2c776741461a956|280|4 NewTokenFrame[977a6d2889b8739128e75527aa26aa481ee444f996badec252b6bad858769877f101b77fe14a865f439da519db157798dadbed433c696499dc291e35693f89dba1b931e23bd336952be37175dff87ead3755bbc3e1ac] NewConnectionIdFrame[1,<0|a6e9209a|b5daf04eff4fa552728055dbb1a681e6] CryptoFrame[0,135] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 13.094 <- (5) Packet A|5|S0|d2c776741461a956|32|1 AckFrame[0|Δ0] 13.094 -> Packet A|1|S0|0de216ee|27|1 AckFrame[3-2|Δ0] 13.094 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.218 <- (6) Packet A|8|S0|d2c776741461a956|1053|1 StreamFrame[0(CIB),0,1024,fin] 13.219 <- (7) Packet A|9|S0|d2c776741461a956|1053|1 StreamFrame[0(CIB),0,1024,fin] 13.219 Receiving frame for non-existent stream 0 13.219 Finished downloading https://server4:443/ijcurtvwvp at 41:37.875 on ClientConnection[cb2c00da4ae54ee9/d2c776741461a956(V1) with server4/193.167.100.100:443] 13.219 Closing ClientConnection[cb2c00da4ae54ee9/d2c776741461a956(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.220 -> Packet A|2|S0|0de216ee|31|1 AckFrame[9-8,5,3-2|Δ0] 13.220 -> Packet A|3|S0|0de216ee|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,5,3-2|Δ0] 13.220 Creating connection with server4:443 with v1 13.221 Setting up connection for downloading https://server4:443/jqchezlmch at 41:37.876 on ClientConnection[bede8d45eaad9062/f87dbc9411256918(V1) with server4/193.167.100.100:443] 13.221 Original destination connection id: bede8d45eaad9062 (scid: f87dbc9411256918) >- CryptoStream[I|ClientHello] 13.222 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.422/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.222 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.256 <- (1) Packet I|0|L|476|3 Token=[] AckFrame[0|Δ0] Padding(304) CryptoFrame[0,123] 13.256 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.456/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.256 <- (1) Packet H|0|L|753|1 CryptoFrame[0,710] 13.259 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.259 - unknown transport parameter 0x1264, size 14 reschedule loss detection timer for PTO over 96 millis, based on 13.356/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.259 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 13.261 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.359/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.261 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.262 Starting downloading https://server4:443/jqchezlmch at 41:37.917 on ClientConnection[bede8d45eaad9062/f87dbc9411256918(V1) with server4/193.167.100.100:443] 13.256 <- (1) Packet A|0|S0|f87dbc9411256918|51|1 NewConnectionIdFrame[1,<0|cbac5451|1b860f4bc2a936e34bb9d0c0094e850f] 13.262 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 13.262 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.359/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.262 Discarding pn space Initial because first Handshake message is being sent 13.262 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.359/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.262 -> Packet A|0|S0|cdf69071|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 13.294 <- (2) Packet A|1|S0|f87dbc9411256918|1366|2 Padding(1338) PingFrame[] 13.294 <- (3) Packet A|2|S0|f87dbc9411256918|256|3 HandshakeDoneFrame[] NewTokenFrame[1df080097b60c3db11981d658db9adcb7c611c6486be1fab3dce4527079c7329aa4730f139c8937d9a60e09bf8d9737cd2076ca9389c6290faebdf9916dd16149d60326bf120f4ed93d3d4ddafa030bb82ca9e568e07] CryptoFrame[0,135] 13.294 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 13.358/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 13.385/App, because ackElicitingInFlight | RTT:33/16 13.295 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 13.295 -> Packet A|1|S0|cdf69071|27|1 AckFrame[2-0|Δ0] 13.385 loss detection timeout handler running Sending probe 0, because no ack since 13.262. Current RTT: 33/16. 13.385 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 13.631/App, because ackElicitingInFlight | RTT:33/16 13.385 -> Packet PA|2|S0|cdf69071|43|1 StreamFrame[0(CIB),0,17,fin] 13.416 <- (4) Packet A|3|S0|f87dbc9411256918|32|1 AckFrame[2-1|Δ0] 13.417 Cwnd(-): 6000; inflight: 0 13.417 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.417 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 13.528/App, because ackElicitingInFlight | RTT:33/13 13.417 -> Packet A|3|S0|cdf69071|43|1 StreamFrame[0(CIB),0,17,fin] 13.474 <- (5) Packet A|5|S0|f87dbc9411256918|1409|2 Padding(1381) PingFrame[] 13.474 <- (6) Packet A|6|S0|f87dbc9411256918|33|1 AckFrame[3-1|Δ25] 13.475 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.494 -> Packet A|4|S0|cdf69071|30|1 AckFrame[6-5,3|Δ19] 13.652 <- (7) Packet A|9|S0|f87dbc9411256918|1053|1 StreamFrame[0(CIB),0,1024,fin] 13.653 Finished downloading https://server4:443/jqchezlmch at 41:38.308 on ClientConnection[bede8d45eaad9062/f87dbc9411256918(V1) with server4/193.167.100.100:443] 13.653 Closing ClientConnection[bede8d45eaad9062/f87dbc9411256918(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.653 <- (8) Packet A|10|S0|f87dbc9411256918|1053|1 StreamFrame[0(CIB),0,1024,fin] 13.653 Creating connection with server4:443 with v1 13.653 -> Packet A|5|S0|cdf69071|39|3 ConnectionCloseFrame[0|0|] AckFrame[9,6-5,3|Δ0] ConnectionCloseFrame[0|0|] 13.654 <- (9) Packet A|11|S0|f87dbc9411256918|1430|2 Padding(1402) PingFrame[] 13.654 Setting up connection for downloading https://server4:443/usbwxtoyug at 41:38.310 on ClientConnection[2874278e99ff18f1/32c2fb74544f17b7(V1) with server4/193.167.100.100:443] 13.654 Original destination connection id: 2874278e99ff18f1 (scid: 32c2fb74544f17b7) 13.654 -> Packet A|6|S0|cdf69071|35|2 ConnectionCloseFrame[0|0|] AckFrame[9,6-5,3|Δ0] >- CryptoStream[I|ClientHello] 13.656 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.856/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.656 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.855 loss detection timeout handler running Sending probe 0, because no ack since 13.656. Current RTT: 100/25. 13.855 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.855 (Probe is an initial retransmit) 13.856 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.256/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.855 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.887 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 13.888 probe count not reset on ack because handshake not yet confirmed 13.888 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.288/Initial, because peerAwaitingAddressValidation | RTT:100/25 14.090 Discarding packet (752 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 14.287 loss detection timeout handler running Sending probe 1, because no ack since 13.855. Current RTT: 32/16. 14.287 Sending probe because peer awaiting address validation 14.287 (Probe is Initial ping, because there is no Initial data to retransmit) 14.288 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 14.672/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.288 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1159) 14.320 <- (3) Packet I|4|L|45|1 Token=[] AckFrame[2-0|Δ0] 14.320 probe count not reset on ack because handshake not yet confirmed 14.321 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 14.705/Initial, because peerAwaitingAddressValidation | RTT:32/16 14.691 <- (4) Packet I|5|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 14.694 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 14.774/Handshake, because peerAwaitingAddressValidation | RTT:32/12 14.694 Discarding pn space Initial because first Handshake message is being sent 14.694 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 14.694 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 14.774/Handshake, because peerAwaitingAddressValidation | RTT:32/12 14.694 -> Packet I|3|L|1201|2 Token=[] AckFrame[5-4,1|Δ0] Padding(1155) 14.773 loss detection timeout handler running 14.773 Sending probe 0. Current RTT: 32/12. 14.773 Sending probe because peer awaiting address validation 14.773 (Probe is a handshake ping) 14.774 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 159 millis, based on 14.934/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 14.774 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 14.933 loss detection timeout handler running Sending probe 1, because no ack since 14.774. Current RTT: 32/12. 14.933 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.933 (Probe is a handshake ping) 14.934 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 319 millis, based on 15.254/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 14.933 -> Packet PH|1|L|40|2 PingFrame[] Padding(2) 14.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 319 millis, based on 15.255/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 14.934 -> Packet PH|2|L|40|2 PingFrame[] Padding(2) 15.206 <- (6) Packet H|5|L|752|1 CryptoFrame[0,709] 15.207 - unknown transport parameter 0x1de5, size 13 >- CryptoStream[H|Finished] 15.209 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 319 millis, based on 15.529/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 15.209 -> Packet H|3|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.210 Starting downloading https://server4:443/usbwxtoyug at 41:39.865 on ClientConnection[2874278e99ff18f1/32c2fb74544f17b7(V1) with server4/193.167.100.100:443] 15.207 <- (7) Packet H|6|L|752|1 CryptoFrame[0,709] 15.210 -> Packet H|4|L|42|1 AckFrame[5|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.210 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 319 millis, based on 15.530/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 15.210 -> [Packet H|5|L|42|1 AckFrame[6-5|Δ0], Packet A|0|S0|0ac72564|43|1 StreamFrame[0(CIB),0,17,fin]] 15.241 <- (8) Packet A|2|S0|32c2fb74544f17b7|280|4 NewTokenFrame[3fa8064ccb47dd749ea3f23bae9ccf9d0f6ee2a5dd2eb797993c9b41ca848491fd281ddf902a00a612cfb2202a0bf968a2b4fde78381d3ee58d98ca4f02d1c9d570723268c39c1b01f3e09dfeee09e118371b4a5552e] CryptoFrame[0,135] HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|a2b4b69f|fe5b9ffc2b4e7d87c489c4cc0310281c] -< CryptoStream[A|NewSessionTicket] 15.241 State is set to Confirmed reschedule loss detection timer for PTO over 287 millis, based on 15.529/Handshake, because ackElicitingInFlight | RTT:32/12 reschedule loss detection timer for PTO over 74 millis, based on 15.316/App, because ackElicitingInFlight | RTT:32/12 15.242 Discarding pn space Handshake because HandshakeDone is received 15.241 <- (9) Packet A|4|S0|32c2fb74544f17b7|280|4 HandshakeDoneFrame[] CryptoFrame[0,135] NewTokenFrame[3fa8064ccb47dd749ea3f23bae9ccf9d0f6ee2a5dd2eb797993c9b41ca848491fd281ddf902a00a612cfb2202a0bf968a2b4fde78381d3ee58d98ca4f02d1c9d570723268c39c1b01f3e09dfeee09e118371b4a5552e] NewConnectionIdFrame[1,<0|a2b4b69f|fe5b9ffc2b4e7d87c489c4cc0310281c] -< CryptoStream[A|NewSessionTicket] 15.242 -> Packet A|1|S0|0ac72564|29|1 AckFrame[4,2|Δ0] 15.242 <- (10) Packet A|5|S0|32c2fb74544f17b7|1366|2 Padding(1338) PingFrame[] 15.242 <- (11) Packet A|6|S0|32c2fb74544f17b7|32|1 AckFrame[0|Δ0] 15.243 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.262 -> Packet A|2|S0|0ac72564|30|1 AckFrame[6-4,2|Δ19] 15.365 <- (12) Packet A|9|S0|32c2fb74544f17b7|1053|1 StreamFrame[0(CIB),0,1024,fin] 15.366 <- (13) Packet A|10|S0|32c2fb74544f17b7|1053|1 StreamFrame[0(CIB),0,1024,fin] 15.366 Receiving frame for non-existent stream 0 15.366 Finished downloading https://server4:443/usbwxtoyug at 41:40.022 on ClientConnection[2874278e99ff18f1/32c2fb74544f17b7(V1) with server4/193.167.100.100:443] 15.366 Closing ClientConnection[2874278e99ff18f1/32c2fb74544f17b7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.366 -> Packet A|3|S0|0ac72564|31|1 AckFrame[10-9,6-4,2|Δ0] 15.367 -> Packet A|4|S0|0ac72564|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,6-4,2|Δ0] 15.367 Creating connection with server4:443 with v1 15.368 Setting up connection for downloading https://server4:443/cinyjzrpgf at 41:40.023 on ClientConnection[54466cdbce48cdfc/f3a2ac976307ca95(V1) with server4/193.167.100.100:443] 15.368 Original destination connection id: 54466cdbce48cdfc (scid: f3a2ac976307ca95) >- CryptoStream[I|ClientHello] 15.369 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.569/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.369 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.397 <- (14) Packet A|11|S0|32c2fb74544f17b7|30|1 MaxStreamsFrame[B,101] 15.398 -> Packet A|5|S0|0ac72564|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,6-4,2|Δ0] 15.505 <- (15) Packet A|13|S0|32c2fb74544f17b7|30|1 MaxStreamsFrame[B,101] 15.506 -> Packet A|6|S0|0ac72564|35|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,6-4,2|Δ0] 15.506 <- (16) Packet A|15|S0|32c2fb74544f17b7|1409|2 Padding(1381) PingFrame[] 15.568 loss detection timeout handler running Sending probe 0, because no ack since 15.369. Current RTT: 100/25. 15.568 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.568 (Probe is an initial retransmit) 15.569 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.969/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.569 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.603 <- (1) Packet I|0|L|487|3 Token=[] AckFrame[1|Δ0] Padding(315) CryptoFrame[0,123] 15.603 probe count not reset on ack because handshake not yet confirmed 15.604 Retransmitting CryptoFrame[0,257] on level Initial 15.604 Cwnd(-): 6000; inflight: 0 15.604 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.004/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.604 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 15.808/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.604 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 15.603 <- (1) Packet H|0|L|742|1 CryptoFrame[0,699] 15.606 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 15.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.606 - unknown transport parameter 0x0151, size 3 15.606 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 15.608 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 15.812/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.608 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.609 Starting downloading https://server4:443/cinyjzrpgf at 41:40.264 on ClientConnection[54466cdbce48cdfc/f3a2ac976307ca95(V1) with server4/193.167.100.100:443] 15.603 <- (1) Packet A|0|S0|f3a2ac976307ca95|51|1 NewConnectionIdFrame[1,<0|c08a75c0|4e645b48b4460d180d7a69f86235c821] 15.609 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.609 Discarding pn space Initial because first Handshake message is being sent 15.609 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 15.609 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.712/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.609 -> Packet A|0|S0|a1df8658|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 15.636 Discarding packet (45 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.711 loss detection timeout handler running Sending probe 0, because no ack since 15.608. Current RTT: 34/17. 15.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.711 (Probe is a handshake retransmit) 15.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 15.915/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.711 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 15.914 loss detection timeout handler running Sending probe 1, because no ack since 15.609. Current RTT: 34/17. 15.915 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.915 (Probe is a handshake retransmit) 15.915 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 16.323/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.915 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 15.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 16.324/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.916 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 15.947 <- (3) Packet A|3|S0|f3a2ac976307ca95|280|4 HandshakeDoneFrame[] NewTokenFrame[619552f542c87698b72d86c746eb0f0168ff24bf3cf61270529bc208b20422083d67729971041dc38d33d15057bfd8cc2608e20d5033f9f5af163e5ae7a3930649abe285ed94b7c2e7c32d986f76999df499ab201908] CryptoFrame[0,135] NewConnectionIdFrame[1,<0|c08a75c0|4e645b48b4460d180d7a69f86235c821] 15.947 State is set to Confirmed reschedule loss detection timer for PTO over 174 millis, based on 16.121/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -209 millis, based on 15.737/App, because ackElicitingInFlight | RTT:34/17 15.947 Discarding pn space Handshake because HandshakeDone is received 15.947 loss detection timeout handler running Sending probe 0, because no ack since 15.609. Current RTT: 34/17. 15.947 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 255 millis, based on 16.203/App, because ackElicitingInFlight | RTT:34/17 15.947 -> Packet PA|1|S0|a1df8658|43|1 StreamFrame[0(CIB),0,17,fin] 15.948 <- (4) Packet A|4|S0|f3a2ac976307ca95|1366|2 Padding(1338) PingFrame[] 15.948 <- (5) Packet A|5|S0|f3a2ac976307ca95|35|1 AckFrame[0|Δ306] 15.948 -> Packet A|2|S0|a1df8658|29|1 AckFrame[4-3,0|Δ0] reschedule loss detection timer for PTO over 126 millis, based on 16.075/App, because ackElicitingInFlight | RTT:34/17 16.071 <- (6) Packet A|8|S0|f3a2ac976307ca95|1053|1 StreamFrame[0(CIB),0,1024,fin] 16.072 Finished downloading https://server4:443/cinyjzrpgf at 41:40.728 on ClientConnection[54466cdbce48cdfc/f3a2ac976307ca95(V1) with server4/193.167.100.100:443] 16.072 Closing ClientConnection[54466cdbce48cdfc/f3a2ac976307ca95(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.073 -> Packet A|3|S0|a1df8658|33|2 ConnectionCloseFrame[0|0|] AckFrame[8,5-3|Δ0] 16.073 Creating connection with server4:443 with v1 16.074 Setting up connection for downloading https://server4:443/jzihadvmtb at 41:40.729 on ClientConnection[85d24cfe81b3d482/0639d186e68bc6f7(V1) with server4/193.167.100.100:443] 16.074 Original destination connection id: 85d24cfe81b3d482 (scid: 0639d186e68bc6f7) >- CryptoStream[I|ClientHello] 16.075 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.275/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.075 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.108 <- (1) Packet I|0|L|475|3 Token=[] AckFrame[0|Δ0] Padding(303) CryptoFrame[0,123] 16.109 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.309/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.108 <- (1) Packet H|0|L|754|1 CryptoFrame[0,711] 16.112 - unknown transport parameter 0x0bbb, size 15 16.112 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.209/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.112 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 16.115 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.212/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.114 -> Packet H|0|L|76|1 CryptoFrame[0,36] 16.115 Starting downloading https://server4:443/jzihadvmtb at 41:40.770 on ClientConnection[85d24cfe81b3d482/0639d186e68bc6f7(V1) with server4/193.167.100.100:443] 16.108 <- (1) Packet A|0|S0|0639d186e68bc6f7|51|1 NewConnectionIdFrame[1,<0|471b3ec3|c3bcf4d35d1cafc2b93869a16701ed0f] 16.115 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 16.115 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.212/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.115 Discarding pn space Initial because first Handshake message is being sent 16.115 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.212/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.115 -> Packet A|0|S0|d1f10015|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 16.146 <- (2) Packet A|1|S0|0639d186e68bc6f7|259|3 CryptoFrame[0,138] NewTokenFrame[92159ebd09f14049b6288c02a035f7fdf4600ceec54e584af3b39b953c24e03ad00f11f1f4e5469b1ebc6c4aa0f6911a13d4cf5d0bb4806b94f99cd76bf22da450d7329706a4cb38695f6f06e491b996f7a9e75cb30c] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 16.146 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 16.211/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 16.238/App, because ackElicitingInFlight | RTT:33/16 16.146 Discarding pn space Handshake because HandshakeDone is received 16.147 <- (3) Packet A|3|S0|0639d186e68bc6f7|1053|1 StreamFrame[0(CIB),0,1024,fin] 16.147 -> Packet A|1|S0|d1f10015|29|1 AckFrame[3,1-0|Δ0] 16.148 Finished downloading https://server4:443/jzihadvmtb at 41:40.803 on ClientConnection[85d24cfe81b3d482/0639d186e68bc6f7(V1) with server4/193.167.100.100:443] 16.148 Closing ClientConnection[85d24cfe81b3d482/0639d186e68bc6f7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.148 -> Packet A|2|S0|d1f10015|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 16.149 Creating connection with server4:443 with v1 16.149 Setting up connection for downloading https://server4:443/dwyuzrnibx at 41:40.805 on ClientConnection[659d8f07119901bc/f9bf6716a5eba100(V1) with server4/193.167.100.100:443] 16.149 Original destination connection id: 659d8f07119901bc (scid: f9bf6716a5eba100) >- CryptoStream[I|ClientHello] 16.151 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.351/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.151 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.185 <- (1) Packet I|0|L|489|3 Token=[] AckFrame[0|Δ0] Padding(317) CryptoFrame[0,123] 16.186 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.386/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.185 <- (1) Packet H|0|L|740|1 CryptoFrame[0,697] 16.189 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.189 - unknown transport parameter 0x0bbb, size 1 reschedule loss detection timer for PTO over 96 millis, based on 16.286/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.188 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 16.191 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.288/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.191 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.191 Starting downloading https://server4:443/dwyuzrnibx at 41:40.847 on ClientConnection[659d8f07119901bc/f9bf6716a5eba100(V1) with server4/193.167.100.100:443] 16.185 <- (1) Packet A|0|S0|f9bf6716a5eba100|51|1 NewConnectionIdFrame[1,<0|c5cf1343|48d1b1fce87b65406c2f04edc7e6d47b] 16.191 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 16.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.289/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.192 Discarding pn space Initial because first Handshake message is being sent 16.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.289/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.192 -> Packet A|0|S0|3b3659c3|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 16.222 <- (2) Packet A|1|S0|f9bf6716a5eba100|259|3 NewTokenFrame[2c7c4ef82d4d38e66fe97cf6a846ae166e2cb9af80253db99ae53ee70a7a4265267b72c3f50e60cb233e3a31dfcc207972dea8d1ea7812f334790b1ec580525c22e80645a7c17bfe1603f6f678b372fe9e1188ab88e3] HandshakeDoneFrame[] CryptoFrame[0,138] 16.222 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 16.288/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 16.315/App, because ackElicitingInFlight | RTT:33/16 16.223 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 16.224 <- (3) Packet A|3|S0|f9bf6716a5eba100|1053|1 StreamFrame[0(CIB),0,1024,fin] 16.224 -> Packet A|1|S0|3b3659c3|30|1 AckFrame[3,1-0|Δ1] 16.224 Finished downloading https://server4:443/dwyuzrnibx at 41:40.880 on ClientConnection[659d8f07119901bc/f9bf6716a5eba100(V1) with server4/193.167.100.100:443] 16.224 Closing ClientConnection[659d8f07119901bc/f9bf6716a5eba100(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.225 -> Packet A|2|S0|3b3659c3|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 16.225 Creating connection with server4:443 with v1 16.226 Setting up connection for downloading https://server4:443/iwbdkyiiph at 41:40.881 on ClientConnection[c798e85be988532b/0dbb472ffe572b73(V1) with server4/193.167.100.100:443] 16.226 Original destination connection id: c798e85be988532b (scid: 0dbb472ffe572b73) >- CryptoStream[I|ClientHello] 16.227 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.427/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.227 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.287 <- (4) Packet A|8|S0|0639d186e68bc6f7|30|1 MaxStreamsFrame[B,101] 16.288 -> Packet A|3|S0|d1f10015|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 16.319 <- (7) Packet A|11|S0|f3a2ac976307ca95|1053|1 StreamFrame[0(CIB),0,1024,fin] 16.320 -> Packet A|4|S0|a1df8658|33|2 ConnectionCloseFrame[0|0|] AckFrame[8,5-3|Δ0] 16.320 <- (8) Packet A|12|S0|f3a2ac976307ca95|1053|1 StreamFrame[0(CIB),0,1024,fin] 16.320 -> Packet A|5|S0|a1df8658|33|2 ConnectionCloseFrame[0|0|] AckFrame[8,5-3|Δ0] 16.321 <- (9) Packet A|13|S0|f3a2ac976307ca95|1409|2 Padding(1381) PingFrame[] 16.343 <- (4) Packet A|5|S0|f9bf6716a5eba100|259|3 HandshakeDoneFrame[] NewTokenFrame[2c7c4ef82d4d38e66fe97cf6a846ae166e2cb9af80253db99ae53ee70a7a4265267b72c3f50e60cb233e3a31dfcc207972dea8d1ea7812f334790b1ec580525c22e80645a7c17bfe1603f6f678b372fe9e1188ab88e3] CryptoFrame[0,138] 16.343 -> Packet A|3|S0|3b3659c3|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 16.426 loss detection timeout handler running Sending probe 0, because no ack since 16.227. Current RTT: 100/25. 16.427 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.427 (Probe is an initial retransmit) 16.427 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.827/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.427 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.459 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 16.460 probe count not reset on ack because handshake not yet confirmed 16.460 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.860/Initial, because peerAwaitingAddressValidation | RTT:100/25 16.461 <- (2) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 16.464 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 16.560/Handshake, because peerAwaitingAddressValidation | RTT:32/16 16.464 Discarding pn space Initial because first Handshake message is being sent 16.464 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 16.560/Handshake, because peerAwaitingAddressValidation | RTT:32/16 16.464 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1157) 16.503 <- (5) Packet A|10|S0|0639d186e68bc6f7|30|1 MaxStreamsFrame[B,101] 16.504 -> Packet A|4|S0|d1f10015|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 16.559 loss detection timeout handler running 16.559 Sending probe 0. Current RTT: 32/16. 16.559 Sending probe because peer awaiting address validation 16.559 (Probe is a handshake ping) 16.560 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 16.752/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.559 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 16.661 <- (3) Packet H|2|L|754|1 CryptoFrame[0,711] 16.662 - unknown transport parameter 0x07bc, size 15 >- CryptoStream[H|Finished] 16.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 16.857/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.665 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.665 Starting downloading https://server4:443/iwbdkyiiph at 41:41.321 on ClientConnection[c798e85be988532b/0dbb472ffe572b73(V1) with server4/193.167.100.100:443] 16.665 -> Packet H|2|L|42|1 AckFrame[2|Δ0] 16.666 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 16.858/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.666 -> Packet A|0|S0|0b2c883f|43|1 StreamFrame[0(CIB),0,17,fin] 16.696 <- (4) Packet A|2|S0|0dbb472ffe572b73|280|4 NewTokenFrame[1095e9d65803de2d006a0915a4a22314a591fa6d37cc0db29711c0502ca59486be3ee511fe904b12d544c60cc56e999934bc34b7b5782fc6f0bbfdb061f2c86668a5bf1cc0efd10a034da67fcb601602f43359c52b95] NewConnectionIdFrame[1,<0|4dfdc6f9|ebd5413cfe44cb5c5efb302382ab6475] HandshakeDoneFrame[] CryptoFrame[0,135] 16.697 State is set to Confirmed reschedule loss detection timer for PTO over 159 millis, based on 16.857/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 16.788/App, because ackElicitingInFlight | RTT:32/16 16.697 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 16.696 <- (5) Packet A|3|S0|0dbb472ffe572b73|280|4 HandshakeDoneFrame[] NewConnectionIdFrame[1,<0|4dfdc6f9|ebd5413cfe44cb5c5efb302382ab6475] NewTokenFrame[1095e9d65803de2d006a0915a4a22314a591fa6d37cc0db29711c0502ca59486be3ee511fe904b12d544c60cc56e999934bc34b7b5782fc6f0bbfdb061f2c86668a5bf1cc0efd10a034da67fcb601602f43359c52b95] CryptoFrame[0,135] -< CryptoStream[A|NewSessionTicket] 16.697 <- (6) Packet A|4|S0|0dbb472ffe572b73|1366|2 Padding(1338) PingFrame[] 16.698 -> Packet A|1|S0|0b2c883f|27|1 AckFrame[3-2|Δ0] 16.717 -> Packet A|2|S0|0b2c883f|28|1 AckFrame[4-2|Δ19] 16.787 loss detection timeout handler running Sending probe 0, because no ack since 16.666. Current RTT: 32/16. 16.787 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 17.031/App, because ackElicitingInFlight | RTT:32/16 16.787 -> Packet PA|3|S0|0b2c883f|43|1 StreamFrame[0(CIB),0,17,fin] 16.815 <- (10) Packet A|16|S0|f3a2ac976307ca95|1053|1 StreamFrame[0(CIB),0,1024,fin] 16.815 -> Packet A|6|S0|a1df8658|33|2 ConnectionCloseFrame[0|0|] AckFrame[8,5-3|Δ0] 17.031 loss detection timeout handler running Sending probe 1, because no ack since 16.787. Current RTT: 32/16. 17.031 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 17.519/App, because ackElicitingInFlight | RTT:32/16 17.031 -> Packet PA|4|S0|0b2c883f|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 17.520/App, because ackElicitingInFlight | RTT:32/16 17.032 -> Packet PA|5|S0|0b2c883f|43|1 StreamFrame[0(CIB),0,17,fin] 17.064 <- (7) Packet A|5|S0|0dbb472ffe572b73|1409|2 Padding(1381) PingFrame[] 17.064 <- (8) Packet A|6|S0|0dbb472ffe572b73|34|1 AckFrame[5,2-1|Δ0] 17.065 Cwnd(-): 6000; inflight: 43 17.065 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 17.065 <- (9) Packet A|7|S0|0dbb472ffe572b73|1053|1 StreamFrame[0(CIB),0,1024,fin] 17.066 -> Packet A|6|S0|0b2c883f|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 17.066 Finished downloading https://server4:443/iwbdkyiiph at 41:41.722 on ClientConnection[c798e85be988532b/0dbb472ffe572b73(V1) with server4/193.167.100.100:443] 17.066 Closing ClientConnection[c798e85be988532b/0dbb472ffe572b73(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.067 -> Packet A|7|S0|0b2c883f|31|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 17.067 Creating connection with server4:443 with v1 17.067 Setting up connection for downloading https://server4:443/xxjpocdtux at 41:41.723 on ClientConnection[be19fc14d1ccf153/3756bb6403f08c34(V1) with server4/193.167.100.100:443] 17.067 Original destination connection id: be19fc14d1ccf153 (scid: 3756bb6403f08c34) >- CryptoStream[I|ClientHello] 17.068 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.269/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.068 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.268 loss detection timeout handler running Sending probe 0, because no ack since 17.068. Current RTT: 100/25. 17.268 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.268 (Probe is an initial retransmit) 17.268 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.668/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.268 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.302 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 17.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.506/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.306 Discarding pn space Initial because first Handshake message is being sent 17.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.506/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.306 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 17.505 loss detection timeout handler running 17.505 Sending probe 0. Current RTT: 100/25. 17.505 Sending probe because peer awaiting address validation 17.505 (Probe is a handshake ping) 17.506 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 17.906/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.506 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 17.537 <- (2) Packet H|1|L|759|2 AckFrame[0|Δ0] CryptoFrame[0,711] 17.538 probe count not reset on ack because handshake not yet confirmed 17.538 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.538 - unknown transport parameter 0x02e4, size 15 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 181 millis, based on 17.723/Handshake, because ackElicitingInFlight | RTT:31/15 17.541 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.541 Starting downloading https://server4:443/xxjpocdtux at 41:42.197 on ClientConnection[be19fc14d1ccf153/3756bb6403f08c34(V1) with server4/193.167.100.100:443] 17.541 -> Packet H|2|L|42|1 AckFrame[1|Δ0] 17.542 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 180 millis, based on 17.723/Handshake, because ackElicitingInFlight | RTT:31/15 17.542 -> Packet A|0|S0|a747e376|43|1 StreamFrame[0(CIB),0,17,fin] 17.722 loss detection timeout handler running Sending probe 1, because no ack since 17.541. Current RTT: 31/15. 17.722 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 17.722 (Probe is a handshake retransmit) 17.723 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 363 millis, based on 18.086/Handshake, because ackElicitingInFlight | RTT:31/15 17.722 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 17.724 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 363 millis, based on 18.087/Handshake, because ackElicitingInFlight | RTT:31/15 17.723 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 17.755 <- (3) Packet A|2|S0|3756bb6403f08c34|280|4 NewTokenFrame[919167fa446905995591a85eb9cf22de75c78061f947a0446d74f1cb8bf576df5364afc694e8d36676fdd86eeb9a6197d3dcdac7b68881cf3f10fa3324bb1e78a6fc7589486f7dc823f0b04bc126a6e82db4ac683b20] CryptoFrame[0,135] NewConnectionIdFrame[1,<0|da0c82da|acdc417ee4161bf437eb547c8ce1b32e] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 17.755 State is set to Confirmed reschedule loss detection timer for PTO over 254 millis, based on 18.010/App, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over -96 millis, based on 17.659/App, because ackElicitingInFlight | RTT:31/15 17.755 Discarding pn space Handshake because HandshakeDone is received 17.756 loss detection timeout handler running Sending probe 0, because no ack since 17.542. Current RTT: 31/15. 17.756 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 233 millis, based on 17.990/App, because ackElicitingInFlight | RTT:31/15 17.756 -> Packet PA|1|S0|a747e376|43|1 StreamFrame[0(CIB),0,17,fin] 17.756 <- (4) Packet A|4|S0|3756bb6403f08c34|1366|2 Padding(1338) PingFrame[] 17.756 -> Packet A|2|S0|a747e376|29|1 AckFrame[4,2|Δ0] 17.757 <- (5) Packet A|6|S0|3756bb6403f08c34|1053|1 StreamFrame[0(CIB),0,1024,fin] 17.757 Finished downloading https://server4:443/xxjpocdtux at 41:42.413 on ClientConnection[be19fc14d1ccf153/3756bb6403f08c34(V1) with server4/193.167.100.100:443] 17.758 Closing ClientConnection[be19fc14d1ccf153/3756bb6403f08c34(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.758 -> Packet A|3|S0|a747e376|35|2 ConnectionCloseFrame[0|0|] AckFrame[6,4,2|Δ0] 17.758 Creating connection with server4:443 with v1 17.759 Setting up connection for downloading https://server4:443/ahjorapcri at 41:42.414 on ClientConnection[bd61e4880f87fe17/37f1689f0670b731(V1) with server4/193.167.100.100:443] 17.759 Original destination connection id: bd61e4880f87fe17 (scid: 37f1689f0670b731) >- CryptoStream[I|ClientHello] 17.760 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.960/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.760 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.959 loss detection timeout handler running Sending probe 0, because no ack since 17.760. Current RTT: 100/25. 17.960 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.960 (Probe is an initial retransmit) 17.960 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.360/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.960 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.995 <- (1) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 17.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.198/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.998 Discarding pn space Initial because first Handshake message is being sent 17.998 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.198/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.998 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1157) 18.031 <- (2) Packet H|2|L|742|1 CryptoFrame[0,699] 18.032 - unknown transport parameter 0x0dca, size 3 >- CryptoStream[H|Finished] 18.034 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.234/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.034 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.035 Starting downloading https://server4:443/ahjorapcri at 41:42.690 on ClientConnection[bd61e4880f87fe17/37f1689f0670b731(V1) with server4/193.167.100.100:443] 18.035 -> Packet H|1|L|42|1 AckFrame[2|Δ0] 18.035 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.235/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.035 -> Packet A|0|S0|f3666213|43|1 StreamFrame[0(CIB),0,17,fin] 18.065 <- (3) Packet A|2|S0|37f1689f0670b731|283|4 CryptoFrame[0,138] NewConnectionIdFrame[1,<0|6e2e5cfb|a9ed2df38413766b449daef31dcf35ea] NewTokenFrame[ae53e772a178fde72957d8816714c72ee965b6af48ef2f499a4465b02321f1d5ecf4135f62dceeeb465a601627ff925f838e1d8e5d3dd8b629838a98738afb45e7186aec1442caff2f736056dbe526775843b1d11995] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 18.066 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 18.234/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 18.261/App, because ackElicitingInFlight | RTT:100/25 18.066 Discarding pn space Handshake because HandshakeDone is received 18.066 <- (4) Packet A|4|S0|37f1689f0670b731|32|1 AckFrame[0|Δ0] 18.067 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.086 -> Packet A|1|S0|f3666213|30|1 AckFrame[4,2|Δ19] 18.337 <- (5) Packet A|7|S0|37f1689f0670b731|283|4 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[ae53e772a178fde72957d8816714c72ee965b6af48ef2f499a4465b02321f1d5ecf4135f62dceeeb465a601627ff925f838e1d8e5d3dd8b629838a98738afb45e7186aec1442caff2f736056dbe526775843b1d11995] NewConnectionIdFrame[1,<0|6e2e5cfb|a9ed2df38413766b449daef31dcf35ea] -< CryptoStream[A|NewSessionTicket] 18.338 <- (6) Packet A|8|S0|37f1689f0670b731|1053|1 StreamFrame[0(CIB),0,1024,fin] 18.338 Finished downloading https://server4:443/ahjorapcri at 41:42.994 on ClientConnection[bd61e4880f87fe17/37f1689f0670b731(V1) with server4/193.167.100.100:443] 18.338 Closing ClientConnection[bd61e4880f87fe17/37f1689f0670b731(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.338 -> Packet A|2|S0|f3666213|31|1 AckFrame[8-7,4,2|Δ0] 18.339 -> Packet A|3|S0|f3666213|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,4,2|Δ0] 18.339 Creating connection with server4:443 with v1 18.339 <- (7) Packet A|9|S0|37f1689f0670b731|1366|2 Padding(1338) PingFrame[] 18.340 Setting up connection for downloading https://server4:443/yfojlesaya at 41:42.995 on ClientConnection[782e08ec5ce30a71/16d0c0e070e8bc3a(V1) with server4/193.167.100.100:443] 18.340 Original destination connection id: 782e08ec5ce30a71 (scid: 16d0c0e070e8bc3a) 18.340 -> Packet A|4|S0|f3666213|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,4,2|Δ0] >- CryptoStream[I|ClientHello] 18.341 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.541/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.341 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.369 <- (8) Packet A|10|S0|37f1689f0670b731|30|1 MaxStreamsFrame[B,101] 18.370 -> Packet A|5|S0|f3666213|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,4,2|Δ0] 18.375 <- (1) Packet I|0|L|479|3 Token=[] AckFrame[0|Δ0] Padding(307) CryptoFrame[0,123] 18.375 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.575/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.375 <- (1) Packet H|0|L|750|1 CryptoFrame[0,707] 18.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.475/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.378 - unknown transport parameter 0x1815, size 11 18.378 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 18.380 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.477/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.380 -> Packet H|0|L|76|1 CryptoFrame[0,36] 18.380 Starting downloading https://server4:443/yfojlesaya at 41:43.036 on ClientConnection[782e08ec5ce30a71/16d0c0e070e8bc3a(V1) with server4/193.167.100.100:443] 18.375 <- (1) Packet A|0|S0|16d0c0e070e8bc3a|51|1 NewConnectionIdFrame[1,<0|b0fe2785|8bdbf96b71699d2dbbe8eae7ab89ade1] 18.380 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 18.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.478/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.381 Discarding pn space Initial because first Handshake message is being sent 18.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.478/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.381 -> Packet A|0|S0|490fd802|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 18.411 <- (2) Packet A|1|S0|16d0c0e070e8bc3a|259|3 NewTokenFrame[e0146609d2a172afcb8cf367ee3332f131fc9426acb9cc80d6977ca34de262ad5c343bfb3e53e388c1900ce15932475c05f88407da117185a2772fa0b8dfda4ec820ea9229e6ae847f8dcc78a9cf3d176a694afc9a26] HandshakeDoneFrame[] CryptoFrame[0,138] 18.412 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 18.477/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 18.504/App, because ackElicitingInFlight | RTT:33/16 18.412 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 18.431 -> Packet A|1|S0|490fd802|28|1 AckFrame[1-0|Δ19] 18.504 loss detection timeout handler running Sending probe 0, because no ack since 18.381. Current RTT: 33/16. 18.504 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 18.750/App, because ackElicitingInFlight | RTT:33/16 18.504 -> Packet PA|2|S0|490fd802|43|1 StreamFrame[0(CIB),0,17,fin] 18.536 <- (3) Packet A|2|S0|16d0c0e070e8bc3a|32|1 AckFrame[2-1|Δ0] 18.536 Cwnd(-): 6000; inflight: 0 18.536 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 18.536 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 18.647/App, because ackElicitingInFlight | RTT:33/13 18.536 <- (4) Packet A|3|S0|16d0c0e070e8bc3a|1053|1 StreamFrame[0(CIB),0,1024,fin] 18.536 -> Packet A|3|S0|490fd802|43|1 StreamFrame[0(CIB),0,17,fin] 18.537 Finished downloading https://server4:443/yfojlesaya at 41:43.193 on ClientConnection[782e08ec5ce30a71/16d0c0e070e8bc3a(V1) with server4/193.167.100.100:443] 18.537 Closing ClientConnection[782e08ec5ce30a71/16d0c0e070e8bc3a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.538 -> Packet A|4|S0|490fd802|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 18.538 Creating connection with server4:443 with v1 18.538 Setting up connection for downloading https://server4:443/eekrztobjg at 41:43.194 on ClientConnection[72f115143fa52a69/435bc361fa05b57a(V1) with server4/193.167.100.100:443] 18.538 Original destination connection id: 72f115143fa52a69 (scid: 435bc361fa05b57a) >- CryptoStream[I|ClientHello] 18.540 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.740/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.540 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.592 <- (5) Packet A|4|S0|16d0c0e070e8bc3a|33|1 AckFrame[3-1|Δ25] 18.593 -> Packet A|5|S0|490fd802|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 18.669 <- (6) Packet A|6|S0|16d0c0e070e8bc3a|1053|1 StreamFrame[0(CIB),0,1024,fin] 18.669 -> Packet A|6|S0|490fd802|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 18.670 <- (7) Packet A|7|S0|16d0c0e070e8bc3a|1053|1 StreamFrame[0(CIB),0,1024,fin] 18.671 <- (8) Packet A|8|S0|16d0c0e070e8bc3a|1366|2 Padding(1338) PingFrame[] 18.671 -> Packet A|7|S0|490fd802|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 18.739 loss detection timeout handler running Sending probe 0, because no ack since 18.540. Current RTT: 100/25. 18.739 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.739 (Probe is an initial retransmit) 18.740 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.140/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.740 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.772 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 18.772 probe count not reset on ack because handshake not yet confirmed 18.772 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.172/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.774 <- (2) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 18.777 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 18.873/Handshake, because peerAwaitingAddressValidation | RTT:32/16 18.777 Discarding pn space Initial because first Handshake message is being sent 18.777 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 18.777 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 18.873/Handshake, because peerAwaitingAddressValidation | RTT:32/16 18.777 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1157) 18.872 loss detection timeout handler running 18.872 Sending probe 0. Current RTT: 32/16. 18.872 Sending probe because peer awaiting address validation 18.872 (Probe is a handshake ping) 18.873 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 19.065/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 18.872 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 18.974 <- (4) Packet H|2|L|748|1 CryptoFrame[0,705] 18.974 - unknown transport parameter 0x17f6, size 9 >- CryptoStream[H|Finished] 18.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 19.169/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 18.977 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.977 Starting downloading https://server4:443/eekrztobjg at 41:43.633 on ClientConnection[72f115143fa52a69/435bc361fa05b57a(V1) with server4/193.167.100.100:443] 18.977 -> Packet H|2|L|42|1 AckFrame[2|Δ0] 18.978 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 19.170/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 18.978 -> Packet A|0|S0|f9daa609|43|1 StreamFrame[0(CIB),0,17,fin] 19.169 loss detection timeout handler running Sending probe 1, because no ack since 18.977. Current RTT: 32/16. 19.169 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.169 (Probe is a handshake retransmit) 19.169 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 19.553/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.169 -> Packet PH|3|L|76|1 CryptoFrame[0,36] 19.170 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 19.554/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.170 -> Packet PH|4|L|76|1 CryptoFrame[0,36] 19.201 <- (5) Packet A|2|S0|435bc361fa05b57a|283|4 HandshakeDoneFrame[] NewTokenFrame[ce4cab9191d1eb8e45e66938d8b0d05ccb794f787230f2e16b76fa9c45ac8c1caa3cf31e0cf46ad45a918ddd97ffd8cde8a76dbfddd20af3217031724abac34bf5ede2133434a809358a4be5de5aa41cb885eb672b8d] NewConnectionIdFrame[1,<0|9299145b|b39eac825055ba892b75cbfb69644c9f] CryptoFrame[0,138] 19.201 State is set to Confirmed reschedule loss detection timer for PTO over 264 millis, based on 19.466/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -101 millis, based on 19.100/App, because ackElicitingInFlight | RTT:32/16 19.201 Discarding pn space Handshake because HandshakeDone is received 19.201 loss detection timeout handler running Sending probe 0, because no ack since 18.978. Current RTT: 32/16. 19.202 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] 19.201 <- (6) Packet A|4|S0|435bc361fa05b57a|35|1 AckFrame[0|Δ192] reschedule loss detection timer for PTO over 243 millis, based on 19.446/App, because ackElicitingInFlight | RTT:32/16 19.202 -> Packet PA|1|S0|f9daa609|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 121 millis, based on 19.324/App, because ackElicitingInFlight | RTT:32/16 19.202 <- (7) Packet A|5|S0|435bc361fa05b57a|1053|1 StreamFrame[0(CIB),0,1024,fin] 19.203 Finished downloading https://server4:443/eekrztobjg at 41:43.858 on ClientConnection[72f115143fa52a69/435bc361fa05b57a(V1) with server4/193.167.100.100:443] 19.203 Closing ClientConnection[72f115143fa52a69/435bc361fa05b57a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.203 -> Packet A|2|S0|f9daa609|29|1 AckFrame[5-4,2|Δ0] 19.203 -> Packet A|3|S0|f9daa609|33|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 19.203 Creating connection with server4:443 with v1 19.204 Setting up connection for downloading https://server4:443/qhakxepqeq at 41:43.860 on ClientConnection[16883d37bb221435/dcbf4af1ddd11168(V1) with server4/193.167.100.100:443] 19.204 Original destination connection id: 16883d37bb221435 (scid: dcbf4af1ddd11168) >- CryptoStream[I|ClientHello] 19.205 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.405/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.205 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.234 <- (8) Packet A|6|S0|435bc361fa05b57a|35|2 AckFrame[2-0|Δ0] MaxStreamsFrame[B,101] 19.234 -> Packet A|4|S0|f9daa609|33|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2|Δ0] 19.238 <- (1) Packet I|0|L|486|3 Token=[] AckFrame[0|Δ0] Padding(314) CryptoFrame[0,123] 19.239 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.439/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.238 <- (1) Packet H|0|L|743|1 CryptoFrame[0,700] 19.243 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.340/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.243 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 19.243 - unknown transport parameter 0x0a66, size 3 >- CryptoStream[H|Finished] 19.245 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.342/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.245 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.246 Starting downloading https://server4:443/qhakxepqeq at 41:43.901 on ClientConnection[16883d37bb221435/dcbf4af1ddd11168(V1) with server4/193.167.100.100:443] 19.238 <- (1) Packet A|0|S0|dcbf4af1ddd11168|51|1 NewConnectionIdFrame[1,<0|7f76091a|5b27aef24005762036936de2ddeddeca] 19.246 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 19.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.246 Discarding pn space Initial because first Handshake message is being sent 19.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.246 -> Packet A|0|S0|e4893745|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 19.277 <- (2) Packet A|1|S0|dcbf4af1ddd11168|259|3 HandshakeDoneFrame[] NewTokenFrame[1ea11dc4aba54b093da41644f7d353072a43c731ce2ce7ce044a8623a076e3e40f1d5af3805ed9d618b49195bf67f3d14031074c02caa90c4d5c217ecfee7a317a990238bf8c73dd9ddba15793324eb6121ade8fd0b8] CryptoFrame[0,138] 19.277 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 19.342/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 19.369/App, because ackElicitingInFlight | RTT:33/16 19.277 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 19.278 <- (3) Packet A|3|S0|dcbf4af1ddd11168|1053|1 StreamFrame[0(CIB),0,1024,fin] 19.278 -> Packet A|1|S0|e4893745|29|1 AckFrame[3,1-0|Δ0] 19.278 Finished downloading https://server4:443/qhakxepqeq at 41:43.934 on ClientConnection[16883d37bb221435/dcbf4af1ddd11168(V1) with server4/193.167.100.100:443] 19.278 Closing ClientConnection[16883d37bb221435/dcbf4af1ddd11168(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.279 -> Packet A|2|S0|e4893745|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 19.279 Creating connection with server4:443 with v1 19.280 Setting up connection for downloading https://server4:443/xsfaaoxsmi at 41:43.935 on ClientConnection[792e08afbadf6e22/0ea2d669798c964b(V1) with server4/193.167.100.100:443] 19.280 Original destination connection id: 792e08afbadf6e22 (scid: 0ea2d669798c964b) >- CryptoStream[I|ClientHello] 19.281 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.481/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.281 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.314 <- (1) Packet I|0|L|476|3 Token=[] AckFrame[0|Δ0] Padding(304) CryptoFrame[0,123] 19.315 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.515/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.314 <- (1) Packet H|0|L|753|1 CryptoFrame[0,710] 19.317 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.414/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.317 - unknown transport parameter 0x1b1c, size 14 19.317 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 19.319 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.319 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.319 Starting downloading https://server4:443/xsfaaoxsmi at 41:43.975 on ClientConnection[792e08afbadf6e22/0ea2d669798c964b(V1) with server4/193.167.100.100:443] 19.314 <- (1) Packet A|0|S0|0ea2d669798c964b|51|1 NewConnectionIdFrame[1,<0|bb77c542|22ca2e5eaa98125856b3328c6e03484c] 19.319 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.319 Discarding pn space Initial because first Handshake message is being sent 19.320 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.417/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.320 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|ed6d2b84|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 19.350 <- (2) Packet A|1|S0|0ea2d669798c964b|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[d1281a46f2b19b55cc81e34a40de6110c87c7b40555086fd9be96ad88b56219a0e0753e58344dbf5793247ab3fbafa78bed2581a12037b93036134acefc5a416b07816ee03e87fa56842b7ff07e3bbfe38c60e7e734b] 19.350 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 19.416/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 92 millis, based on 19.443/App, because ackElicitingInFlight | RTT:33/16 19.350 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 19.370 -> Packet A|1|S0|ed6d2b84|28|1 AckFrame[1-0|Δ19] 19.398 <- (4) Packet A|5|S0|dcbf4af1ddd11168|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[1ea11dc4aba54b093da41644f7d353072a43c731ce2ce7ce044a8623a076e3e40f1d5af3805ed9d618b49195bf67f3d14031074c02caa90c4d5c217ecfee7a317a990238bf8c73dd9ddba15793324eb6121ade8fd0b8] 19.399 -> Packet A|3|S0|e4893745|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 19.399 <- (5) Packet A|6|S0|dcbf4af1ddd11168|1053|1 StreamFrame[0(CIB),0,1024,fin] 19.399 -> Packet A|4|S0|e4893745|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 19.442 loss detection timeout handler running Sending probe 0, because no ack since 19.320. Current RTT: 33/16. 19.443 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 19.689/App, because ackElicitingInFlight | RTT:33/16 19.443 -> Packet PA|2|S0|ed6d2b84|43|1 StreamFrame[0(CIB),0,17,fin] 19.688 loss detection timeout handler running Sending probe 1, because no ack since 19.443. Current RTT: 33/16. 19.688 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 491 millis, based on 20.181/App, because ackElicitingInFlight | RTT:33/16 19.689 -> Packet PA|3|S0|ed6d2b84|43|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 491 millis, based on 20.182/App, because ackElicitingInFlight | RTT:33/16 19.690 -> Packet PA|4|S0|ed6d2b84|43|1 StreamFrame[0(CIB),0,17,fin] 19.721 <- (3) Packet A|3|S0|0ea2d669798c964b|34|1 AckFrame[3,1|Δ0] 19.722 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.722 Cwnd(-): 6000; inflight: 43 reschedule loss detection timer for PTO over 90 millis, based on 19.813/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 106 millis, based on 19.829/App, because ackElicitingInFlight | RTT:33/12 19.722 -> Packet A|5|S0|ed6d2b84|43|1 StreamFrame[0(CIB),0,17,fin] 19.722 <- (4) Packet A|4|S0|0ea2d669798c964b|1053|1 StreamFrame[0(CIB),0,1024,fin] 19.723 Finished downloading https://server4:443/xsfaaoxsmi at 41:44.378 on ClientConnection[792e08afbadf6e22/0ea2d669798c964b(V1) with server4/193.167.100.100:443] 19.723 Closing ClientConnection[792e08afbadf6e22/0ea2d669798c964b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.723 -> Packet A|6|S0|ed6d2b84|31|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 19.723 Creating connection with server4:443 with v1 19.724 Setting up connection for downloading https://server4:443/lexcosjtgf at 41:44.379 on ClientConnection[cd85e08948d2d868/3bb0f543b44c3899(V1) with server4/193.167.100.100:443] 19.724 Original destination connection id: cd85e08948d2d868 (scid: 3bb0f543b44c3899) >- CryptoStream[I|ClientHello] 19.725 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.925/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.725 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.746 <- (5) Packet A|5|S0|0ea2d669798c964b|35|1 AckFrame[4-3,1|Δ25] 19.746 -> Packet A|7|S0|ed6d2b84|31|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 19.759 <- (1) Packet I|0|L|477|3 Token=[] AckFrame[0|Δ0] Padding(305) CryptoFrame[0,123] 19.759 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.959/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.759 <- (1) Packet H|0|L|752|1 CryptoFrame[0,709] 19.763 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.860/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.762 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 19.763 - unknown transport parameter 0x0322, size 13 >- CryptoStream[H|Finished] 19.766 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.863/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.766 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.766 Starting downloading https://server4:443/lexcosjtgf at 41:44.422 on ClientConnection[cd85e08948d2d868/3bb0f543b44c3899(V1) with server4/193.167.100.100:443] 19.759 <- (1) Packet A|0|S0|3bb0f543b44c3899|51|1 NewConnectionIdFrame[1,<0|85d2a648|aa291ba58e40b44f31661b0c145f24c3] 19.766 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.863/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.766 Discarding pn space Initial because first Handshake message is being sent 19.766 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 19.767 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.864/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.767 -> Packet A|0|S0|8d7a81ba|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 19.797 <- (2) Packet A|1|S0|3bb0f543b44c3899|259|3 NewTokenFrame[3f0753eb157583664f9f8e066976b77bd9c0e27e3999130aee47f022ab30537341d9a270c9424ccdad8284b3eb4414e40d7ed2c11d69fdec2c49349da4585c970646d69669ea35744d8ffbfa46cb63f0b07032236fa7] CryptoFrame[0,138] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 19.798 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 19.863/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 19.890/App, because ackElicitingInFlight | RTT:33/16 19.798 Discarding pn space Handshake because HandshakeDone is received 19.797 <- (3) Packet A|2|S0|3bb0f543b44c3899|32|1 AckFrame[0|Δ0] 19.798 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.798 <- (4) Packet A|3|S0|3bb0f543b44c3899|1053|1 StreamFrame[0(CIB),0,1024,fin] 19.799 -> Packet A|1|S0|8d7a81ba|27|1 AckFrame[3-1|Δ0] 19.799 Finished downloading https://server4:443/lexcosjtgf at 41:44.455 on ClientConnection[cd85e08948d2d868/3bb0f543b44c3899(V1) with server4/193.167.100.100:443] 19.799 Closing ClientConnection[cd85e08948d2d868/3bb0f543b44c3899(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.799 -> Packet A|2|S0|8d7a81ba|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 19.800 Creating connection with server4:443 with v1 19.800 Setting up connection for downloading https://server4:443/efxmvidqnc at 41:44.456 on ClientConnection[84d96b6c86bbd0b2/0b6206dad287eb1a(V1) with server4/193.167.100.100:443] 19.800 Original destination connection id: 84d96b6c86bbd0b2 (scid: 0b6206dad287eb1a) >- CryptoStream[I|ClientHello] 19.802 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.002/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.802 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.001 loss detection timeout handler running Sending probe 0, because no ack since 19.802. Current RTT: 100/25. 20.001 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.001 (Probe is an initial retransmit) 20.002 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.402/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.001 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.037 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 20.040 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.240/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.040 Discarding pn space Initial because first Handshake message is being sent 20.040 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.040 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.240/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.040 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 20.239 loss detection timeout handler running 20.239 Sending probe 0. Current RTT: 100/25. 20.239 Sending probe because peer awaiting address validation 20.239 (Probe is a handshake ping) 20.240 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.640/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.239 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 20.271 <- (3) Packet H|1|L|752|2 AckFrame[0|Δ0] CryptoFrame[0,704] 20.272 probe count not reset on ack because handshake not yet confirmed 20.272 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.272 - unknown transport parameter 0x1ebe, size 8 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 181 millis, based on 20.457/Handshake, because ackElicitingInFlight | RTT:31/15 20.275 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.276 Starting downloading https://server4:443/efxmvidqnc at 41:44.931 on ClientConnection[84d96b6c86bbd0b2/0b6206dad287eb1a(V1) with server4/193.167.100.100:443] 20.272 <- (4) Packet H|2|L|747|1 CryptoFrame[0,704] 20.276 -> Packet H|2|L|42|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.276 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 180 millis, based on 20.457/Handshake, because ackElicitingInFlight | RTT:31/15 20.276 -> [Packet H|3|L|42|1 AckFrame[2-1|Δ0], Packet A|0|S0|37e732eb|43|1 StreamFrame[0(CIB),0,17,fin]] 20.307 <- (5) Packet A|2|S0|0b6206dad287eb1a|280|4 NewTokenFrame[916ebef6b6039f56bea9bc0b0e47edee4f2ddb07c30256d0357e1fc403ed53acf719c24847ec151f07e00386d1586f971e7641caaaa209a547de539551fc4e9e8f0ca3ae08686c8773aec082f1cd40f822dc213d0e3f] CryptoFrame[0,135] NewConnectionIdFrame[1,<0|644e1213|1c5da91428d1bbba780d9234b8802939] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 20.308 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 20.457/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 85 millis, based on 20.393/App, because ackElicitingInFlight | RTT:31/15 20.308 Discarding pn space Handshake because HandshakeDone is received 20.307 <- (6) Packet A|3|S0|0b6206dad287eb1a|280|4 NewTokenFrame[916ebef6b6039f56bea9bc0b0e47edee4f2ddb07c30256d0357e1fc403ed53acf719c24847ec151f07e00386d1586f971e7641caaaa209a547de539551fc4e9e8f0ca3ae08686c8773aec082f1cd40f822dc213d0e3f] HandshakeDoneFrame[] CryptoFrame[0,135] NewConnectionIdFrame[1,<0|644e1213|1c5da91428d1bbba780d9234b8802939] -< CryptoStream[A|NewSessionTicket] 20.308 -> Packet A|1|S0|37e732eb|27|1 AckFrame[3-2|Δ0] 20.393 loss detection timeout handler running Sending probe 0, because no ack since 20.276. Current RTT: 31/15. 20.393 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 233 millis, based on 20.627/App, because ackElicitingInFlight | RTT:31/15 20.393 -> Packet PA|2|S0|37e732eb|43|1 StreamFrame[0(CIB),0,17,fin] 20.432 <- (7) Packet A|8|S0|0b6206dad287eb1a|1059|2 AckFrame[2-0|Δ7] StreamFrame[0(CIB),0,1024,fin] 20.433 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.433 <- (8) Packet A|9|S0|0b6206dad287eb1a|1053|1 StreamFrame[0(CIB),0,1024,fin] 20.434 Finished downloading https://server4:443/efxmvidqnc at 41:45.089 on ClientConnection[84d96b6c86bbd0b2/0b6206dad287eb1a(V1) with server4/193.167.100.100:443] 20.434 -> Packet A|3|S0|37e732eb|27|1 AckFrame[9-8|Δ0] 20.434 Closing ClientConnection[84d96b6c86bbd0b2/0b6206dad287eb1a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.434 -> Packet A|4|S0|37e732eb|31|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 20.434 Creating connection with server4:443 with v1 20.435 Setting up connection for downloading https://server4:443/yvcuexzyns at 41:45.091 on ClientConnection[67f739d0ec6c212e/7610639d15628b41(V1) with server4/193.167.100.100:443] 20.435 Original destination connection id: 67f739d0ec6c212e (scid: 7610639d15628b41) >- CryptoStream[I|ClientHello] 20.437 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.637/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.437 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.465 <- (9) Packet A|10|S0|0b6206dad287eb1a|30|1 MaxStreamsFrame[B,101] 20.465 -> Packet A|5|S0|37e732eb|31|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 20.470 <- (1) Packet I|0|L|483|3 Token=[] AckFrame[0|Δ0] Padding(311) CryptoFrame[0,123] 20.471 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.671/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.470 <- (1) Packet H|0|L|746|1 CryptoFrame[0,703] 20.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.570/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.473 - unknown transport parameter 0x0740, size 8 20.473 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 20.476 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.573/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.476 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.476 Starting downloading https://server4:443/yvcuexzyns at 41:45.132 on ClientConnection[67f739d0ec6c212e/7610639d15628b41(V1) with server4/193.167.100.100:443] 20.470 <- (1) Packet A|0|S0|7610639d15628b41|51|1 NewConnectionIdFrame[1,<0|5785e399|b1e1e8843e07c798bbdcb68e921e6646] 20.476 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 20.477 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.477 Discarding pn space Initial because first Handshake message is being sent 20.477 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.477 -> Packet A|0|S0|b4193c3a|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 20.507 <- (2) Packet A|1|S0|7610639d15628b41|259|3 NewTokenFrame[15f6de1dbf177baa56281e415f7f7e202b5f987b7fabf4fd9ce1313771bcf1789ed738e9820537dde99b46c0608fba24bf4a6a09381561784f6e99d7e8976b5f4d68d1a444e6808b664eabf1e8a95ee6581bcf6ec489] HandshakeDoneFrame[] CryptoFrame[0,138] 20.508 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 20.573/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 20.600/App, because ackElicitingInFlight | RTT:33/16 20.508 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 20.508 <- (3) Packet A|2|S0|7610639d15628b41|32|1 AckFrame[0|Δ0] 20.509 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.509 <- (4) Packet A|3|S0|7610639d15628b41|1053|1 StreamFrame[0(CIB),0,1024,fin] 20.509 -> Packet A|1|S0|b4193c3a|27|1 AckFrame[3-1|Δ0] 20.509 Finished downloading https://server4:443/yvcuexzyns at 41:45.165 on ClientConnection[67f739d0ec6c212e/7610639d15628b41(V1) with server4/193.167.100.100:443] 20.510 Closing ClientConnection[67f739d0ec6c212e/7610639d15628b41(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.510 -> Packet A|2|S0|b4193c3a|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 20.510 Creating connection with server4:443 with v1 20.511 Setting up connection for downloading https://server4:443/xhsnipdnfx at 41:45.167 on ClientConnection[c91e0f7ab4cf5370/2fb0ffd4fee1bf96(V1) with server4/193.167.100.100:443] 20.511 Original destination connection id: c91e0f7ab4cf5370 (scid: 2fb0ffd4fee1bf96) >- CryptoStream[I|ClientHello] 20.513 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.713/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.513 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.540 <- (5) Packet A|4|S0|7610639d15628b41|30|1 MaxStreamsFrame[B,101] 20.541 -> Packet A|3|S0|b4193c3a|31|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 20.712 loss detection timeout handler running Sending probe 0, because no ack since 20.513. Current RTT: 100/25. 20.712 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.712 (Probe is an initial retransmit) 20.713 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.113/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.712 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.746 <- (1) Packet I|0|L|479|3 Token=[] AckFrame[1|Δ0] Padding(307) CryptoFrame[0,123] 20.747 probe count not reset on ack because handshake not yet confirmed 20.747 Retransmitting CryptoFrame[0,257] on level Initial 20.747 Cwnd(-): 6000; inflight: 0 20.747 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.147/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.748 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 20.942/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.747 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(900) -< CryptoStream[I|ServerHello] 20.746 <- (1) Packet H|0|L|750|1 CryptoFrame[0,707] 20.751 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.945/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.751 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) 20.751 - unknown transport parameter 0x08b4, size 11 >- CryptoStream[H|Finished] 20.754 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.948/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.754 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.754 Starting downloading https://server4:443/xhsnipdnfx at 41:45.410 on ClientConnection[c91e0f7ab4cf5370/2fb0ffd4fee1bf96(V1) with server4/193.167.100.100:443] 20.746 <- (1) Packet A|0|S0|2fb0ffd4fee1bf96|51|1 NewConnectionIdFrame[1,<0|29a5ee98|5050d5f60b751e1975b5bb59824e90ba] 20.754 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.851/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.755 Discarding pn space Initial because first Handshake message is being sent 20.755 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.852/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.755 -> [Packet H|1|L|42|1 AckFrame[0|Δ0], Packet A|0|S0|3ad0bd87|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 20.786 <- (2) Packet A|1|S0|2fb0ffd4fee1bf96|1366|2 Padding(1338) PingFrame[] 20.787 <- (3) Packet A|4|S0|2fb0ffd4fee1bf96|1053|1 StreamFrame[0(CIB),0,1024,fin] 20.787 -> Packet A|1|S0|3ad0bd87|29|1 AckFrame[4,1-0|Δ0] 20.787 Finished downloading https://server4:443/xhsnipdnfx at 41:45.443 on ClientConnection[c91e0f7ab4cf5370/2fb0ffd4fee1bf96(V1) with server4/193.167.100.100:443] 20.788 Closing ClientConnection[c91e0f7ab4cf5370/2fb0ffd4fee1bf96(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.788 -> Packet A|2|S0|3ad0bd87|33|2 ConnectionCloseFrame[0|0|] AckFrame[4,1-0|Δ0] 20.788 Creating connection with server4:443 with v1 20.789 Setting up connection for downloading https://server4:443/pdcqonukvl at 41:45.444 on ClientConnection[debde581821ddb9f/4b6554c747ca3d22(V1) with server4/193.167.100.100:443] 20.789 Original destination connection id: debde581821ddb9f (scid: 4b6554c747ca3d22) >- CryptoStream[I|ClientHello] 20.790 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.990/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.790 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.989 loss detection timeout handler running Sending probe 0, because no ack since 20.790. Current RTT: 100/25. 20.989 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.990 (Probe is an initial retransmit) 20.990 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.390/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.990 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.225 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 21.228 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.428/Handshake, because peerAwaitingAddressValidation | RTT:100/25 21.228 Discarding pn space Initial because first Handshake message is being sent 21.228 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.228 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.428/Handshake, because peerAwaitingAddressValidation | RTT:100/25 21.228 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 21.424 <- (3) Packet H|1|L|745|1 CryptoFrame[0,702] 21.425 - unknown transport parameter 0x10b2, size 7 21.427 loss detection timeout handler running 21.427 Sending probe 0. Current RTT: 100/25. 21.427 Sending probe because peer awaiting address validation 21.427 (Probe is a handshake ping) 21.428 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.828/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.427 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 21.428 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.828/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.428 -> Packet H|1|L|76|1 CryptoFrame[0,36] >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.429 Starting downloading https://server4:443/pdcqonukvl at 41:46.084 on ClientConnection[debde581821ddb9f/4b6554c747ca3d22(V1) with server4/193.167.100.100:443] 21.429 -> Packet H|2|L|42|1 AckFrame[1|Δ0] 21.429 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.829/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.429 -> Packet A|0|S0|a7f24c4b|43|1 StreamFrame[0(CIB),0,17,fin] 21.459 <- (4) Packet H|3|L|44|1 AckFrame[0|Δ0] 21.459 probe count not reset on ack because handshake not yet confirmed 21.460 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 368 millis, based on 21.828/Handshake, because ackElicitingInFlight | RTT:100/25 21.459 <- (5) Packet A|2|S0|4b6554c747ca3d22|280|4 NewTokenFrame[1ff4b02a75c52ee6e53d04ae2e135d5c9b9bad229daae717bc05bcf67468d7427a7a0207d0438ed06238ee3bf3241b8937088e5a1d24991a079c56d5e2fa9557f0ea646abe0a753187a34d03f82f14272686253cdddd] NewConnectionIdFrame[1,<0|e14b9840|2210cb7cf8f9255a516cc6b06d4a09b4] HandshakeDoneFrame[] CryptoFrame[0,135] 21.460 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 21.610/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 85 millis, based on 21.546/App, because ackElicitingInFlight | RTT:31/15 21.460 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 21.459 <- (6) Packet A|3|S0|4b6554c747ca3d22|280|4 NewConnectionIdFrame[1,<0|e14b9840|2210cb7cf8f9255a516cc6b06d4a09b4] HandshakeDoneFrame[] CryptoFrame[0,135] NewTokenFrame[1ff4b02a75c52ee6e53d04ae2e135d5c9b9bad229daae717bc05bcf67468d7427a7a0207d0438ed06238ee3bf3241b8937088e5a1d24991a079c56d5e2fa9557f0ea646abe0a753187a34d03f82f14272686253cdddd] -< CryptoStream[A|NewSessionTicket] 21.461 <- (7) Packet A|4|S0|4b6554c747ca3d22|1366|2 Padding(1338) PingFrame[] 21.461 -> Packet A|1|S0|a7f24c4b|27|1 AckFrame[3-2|Δ0] 21.461 <- (8) Packet A|5|S0|4b6554c747ca3d22|32|1 AckFrame[0|Δ0] 21.462 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.481 -> Packet A|2|S0|a7f24c4b|28|1 AckFrame[5-2|Δ19] 21.586 <- (9) Packet A|8|S0|4b6554c747ca3d22|1053|1 StreamFrame[0(CIB),0,1024,fin] 21.587 Finished downloading https://server4:443/pdcqonukvl at 41:46.242 on ClientConnection[debde581821ddb9f/4b6554c747ca3d22(V1) with server4/193.167.100.100:443] 21.587 Closing ClientConnection[debde581821ddb9f/4b6554c747ca3d22(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.587 -> Packet A|3|S0|a7f24c4b|33|2 ConnectionCloseFrame[0|0|] AckFrame[8,5-2|Δ0] 21.588 Creating connection with server4:443 with v1 21.588 Setting up connection for downloading https://server4:443/kugkeewdgm at 41:46.244 on ClientConnection[ead11a90557ff6a8/11e3bedb91cde882(V1) with server4/193.167.100.100:443] 21.588 Original destination connection id: ead11a90557ff6a8 (scid: 11e3bedb91cde882) >- CryptoStream[I|ClientHello] 21.590 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.790/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.589 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.623 <- (1) Packet I|0|L|477|3 Token=[] AckFrame[0|Δ0] Padding(305) CryptoFrame[0,123] 21.624 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.824/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.623 <- (1) Packet H|0|L|752|1 CryptoFrame[0,709] 21.626 - unknown transport parameter 0x0cb3, size 14 21.626 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.723/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.626 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 21.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.725/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.628 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.629 Starting downloading https://server4:443/kugkeewdgm at 41:46.284 on ClientConnection[ead11a90557ff6a8/11e3bedb91cde882(V1) with server4/193.167.100.100:443] 21.623 <- (1) Packet A|0|S0|11e3bedb91cde882|51|1 NewConnectionIdFrame[1,<0|8ba4d77b|f249b0a80acb6d35000ca2eb23fd9b07] 21.629 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 21.629 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.726/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.629 Discarding pn space Initial because first Handshake message is being sent 21.629 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.726/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.629 -> Packet A|0|S0|5fb44a13|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 21.660 <- (2) Packet A|1|S0|11e3bedb91cde882|259|3 HandshakeDoneFrame[] CryptoFrame[0,138] NewTokenFrame[040b218ae3ff34076385effce67863a63dbba65d6af2aaa39977d95bbfa12109b5d3663a336bbb6945b2a7b1a46a4c29a167b3e00de95627de4adda76688f1d67792d0de77c8eeefe4553dd178928f1b575565f1f7c3] 21.660 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 21.725/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 21.752/App, because ackElicitingInFlight | RTT:33/16 21.660 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 21.661 <- (3) Packet A|3|S0|11e3bedb91cde882|1053|1 StreamFrame[0(CIB),0,1024,fin] 21.662 -> Packet A|1|S0|5fb44a13|29|1 AckFrame[3,1-0|Δ0] 21.662 Finished downloading https://server4:443/kugkeewdgm at 41:46.317 on ClientConnection[ead11a90557ff6a8/11e3bedb91cde882(V1) with server4/193.167.100.100:443] 21.662 Closing ClientConnection[ead11a90557ff6a8/11e3bedb91cde882(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.662 -> Packet A|2|S0|5fb44a13|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 21.662 Creating connection with server4:443 with v1 21.663 Setting up connection for downloading https://server4:443/fhwdunqdhl at 41:46.319 on ClientConnection[68c7f20b504df15d/aed588aa430dddbb(V1) with server4/193.167.100.100:443] 21.663 Original destination connection id: 68c7f20b504df15d (scid: aed588aa430dddbb) >- CryptoStream[I|ClientHello] 21.664 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.864/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.664 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.693 <- (4) Packet A|4|S0|11e3bedb91cde882|30|1 MaxStreamsFrame[B,101] 21.693 -> Packet A|3|S0|5fb44a13|33|2 ConnectionCloseFrame[0|0|] AckFrame[3,1-0|Δ0] 21.863 loss detection timeout handler running Sending probe 0, because no ack since 21.664. Current RTT: 100/25. 21.864 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.864 (Probe is an initial retransmit) 21.864 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.264/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.864 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.896 <- (1) Packet I|1|L|45|1 Token=[] AckFrame[1-0|Δ0] 21.896 probe count not reset on ack because handshake not yet confirmed 21.897 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.297/Initial, because peerAwaitingAddressValidation | RTT:100/25 21.898 <- (2) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 21.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 21.996/Handshake, because peerAwaitingAddressValidation | RTT:32/16 21.900 Discarding pn space Initial because first Handshake message is being sent 21.900 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.901 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 21.997/Handshake, because peerAwaitingAddressValidation | RTT:32/16 21.900 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1157) 21.996 loss detection timeout handler running 21.996 Sending probe 0. Current RTT: 32/16. 21.996 Sending probe because peer awaiting address validation 21.996 (Probe is a handshake ping) 21.996 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 22.188/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 21.996 -> Packet PH|0|L|40|2 PingFrame[] Padding(2) 22.028 <- (4) Packet H|1|L|757|2 AckFrame[0|Δ0] CryptoFrame[0,709] 22.028 probe count not reset on ack because handshake not yet confirmed 22.029 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.029 - unknown transport parameter 0x171d, size 13 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 159 millis, based on 22.191/Handshake, because ackElicitingInFlight | RTT:32/12 22.031 -> Packet H|1|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.028 <- (5) Packet H|2|L|752|1 CryptoFrame[0,709] 22.031 Starting downloading https://server4:443/fhwdunqdhl at 41:46.687 on ClientConnection[68c7f20b504df15d/aed588aa430dddbb(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.031 -> Packet H|2|L|42|1 AckFrame[1|Δ0] 22.031 -> Packet H|3|L|42|1 AckFrame[2-1|Δ0] 22.032 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 158 millis, based on 22.191/Handshake, because ackElicitingInFlight | RTT:32/12 22.032 -> Packet A|0|S0|9814e27d|43|1 StreamFrame[0(CIB),0,17,fin] 22.062 <- (6) Packet A|2|S0|aed588aa430dddbb|280|4 NewConnectionIdFrame[1,<0|3b245aa5|b0adbfd3a3e9152d24c0d377bdef8ac2] CryptoFrame[0,135] NewTokenFrame[f23cb815179c2a1e6ff8e2a46921a76dee3dc0db259421e41e4003dacddadc58814c5b31ce387543ccf93728d380eb9ecdfc7c02c67d6f841de96e6c43bc2387555b0ce655547bb5d8d6dd2d46872e4aac6f373b7679] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 22.063 State is set to Confirmed reschedule loss detection timer for PTO over 127 millis, based on 22.191/Handshake, because ackElicitingInFlight | RTT:32/12 reschedule loss detection timer for PTO over 74 millis, based on 22.138/App, because ackElicitingInFlight | RTT:32/12 22.063 Discarding pn space Handshake because HandshakeDone is received 22.062 <- (7) Packet A|3|S0|aed588aa430dddbb|280|4 CryptoFrame[0,135] HandshakeDoneFrame[] NewTokenFrame[f23cb815179c2a1e6ff8e2a46921a76dee3dc0db259421e41e4003dacddadc58814c5b31ce387543ccf93728d380eb9ecdfc7c02c67d6f841de96e6c43bc2387555b0ce655547bb5d8d6dd2d46872e4aac6f373b7679] NewConnectionIdFrame[1,<0|3b245aa5|b0adbfd3a3e9152d24c0d377bdef8ac2] -< CryptoStream[A|NewSessionTicket] 22.064 -> Packet A|1|S0|9814e27d|27|1 AckFrame[3-2|Δ0] 22.064 <- (8) Packet A|5|S0|aed588aa430dddbb|1366|2 Padding(1338) PingFrame[] 22.083 -> Packet A|2|S0|9814e27d|30|1 AckFrame[5,3-2|Δ19] 22.137 loss detection timeout handler running Sending probe 0, because no ack since 22.032. Current RTT: 32/12. 22.137 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 211 millis, based on 22.350/App, because ackElicitingInFlight | RTT:32/12 22.138 -> Packet PA|3|S0|9814e27d|43|1 StreamFrame[0(CIB),0,17,fin] 22.169 <- (9) Packet A|6|S0|aed588aa430dddbb|34|1 AckFrame[3,1|Δ0] 22.169 Cwnd(-): 6000; inflight: 0 22.169 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 22.169 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 93 millis, based on 22.264/App, because ackElicitingInFlight | RTT:32/9 22.170 -> Packet A|4|S0|9814e27d|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 22.170 <- (10) Packet A|7|S0|aed588aa430dddbb|1053|1 StreamFrame[0(CIB),0,1024,fin] 22.170 Finished downloading https://server4:443/fhwdunqdhl at 41:46.826 on ClientConnection[68c7f20b504df15d/aed588aa430dddbb(V1) with server4/193.167.100.100:443] 22.170 Closing ClientConnection[68c7f20b504df15d/aed588aa430dddbb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.171 -> Packet A|5|S0|9814e27d|31|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 22.171 Creating connection with server4:443 with v1 22.171 Setting up connection for downloading https://server4:443/cjjhzlyund at 41:46.827 on ClientConnection[897e9c3b3a573826/4d07e43eec27d527(V1) with server4/193.167.100.100:443] 22.171 Original destination connection id: 897e9c3b3a573826 (scid: 4d07e43eec27d527) >- CryptoStream[I|ClientHello] 22.175 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.375/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.175 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.374 loss detection timeout handler running Sending probe 0, because no ack since 22.175. Current RTT: 100/25. 22.374 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.374 (Probe is an initial retransmit) 22.375 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.775/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.375 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.774 loss detection timeout handler running Sending probe 1, because no ack since 22.375. Current RTT: 100/25. 22.774 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.774 (Probe is an initial retransmit) 22.775 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.575/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.774 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.776 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.576/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.775 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.010 <- (1) Packet I|1|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 23.013 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 23.213/Handshake, because peerAwaitingAddressValidation | RTT:100/25 23.013 Discarding pn space Initial because first Handshake message is being sent 23.013 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 23.213/Handshake, because peerAwaitingAddressValidation | RTT:100/25 23.013 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1157) 23.210 <- (2) Packet H|2|L|747|1 CryptoFrame[0,704] 23.211 - unknown transport parameter 0x096e, size 7 23.213 loss detection timeout handler running 23.213 Sending probe 0. Current RTT: 100/25. >- CryptoStream[H|Finished] 23.213 Sending probe because peer awaiting address validation 23.213 (Probe is a handshake ping) 23.213 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 23.613/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.213 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.213 Starting downloading https://server4:443/cjjhzlyund at 41:47.869 on ClientConnection[897e9c3b3a573826/4d07e43eec27d527(V1) with server4/193.167.100.100:443] 23.213 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 23.613/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.213 -> Packet PH|1|L|40|2 PingFrame[] Padding(2) 23.213 -> Packet H|2|L|42|1 AckFrame[2|Δ0] 23.214 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 23.614/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.214 -> Packet A|0|S0|421c3f42|43|1 StreamFrame[0(CIB),0,17,fin] 23.246 <- (3) Packet A|4|S0|4d07e43eec27d527|1366|2 Padding(1338) PingFrame[] 23.266 -> Packet A|1|S0|421c3f42|28|1 AckFrame[4|Δ19] 23.304 <- (4) Packet A|5|S0|4d07e43eec27d527|280|4 NewConnectionIdFrame[1,<0|b122ad55|8315f37cec39d9d80446556fb3abcdf8] NewTokenFrame[954f95c54f86254518b7a693b2bd909170127319328dab4facac098c3d4b1e8fa5c67495dcad6c0d761e7e8c7845cd6daaf1517edae7843045aa49a398587fae1f2f77507c5f2c300f4e778b5290c4776fc5310963ca] CryptoFrame[0,135] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 23.305 State is set to Confirmed reschedule loss detection timer for PTO over 308 millis, based on 23.613/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 134 millis, based on 23.440/App, because ackElicitingInFlight | RTT:100/25 23.305 Discarding pn space Handshake because HandshakeDone is received 23.324 -> Packet A|2|S0|421c3f42|28|1 AckFrame[5-4|Δ19] 23.439 loss detection timeout handler running Sending probe 0, because no ack since 23.214. Current RTT: 100/25. 23.439 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 451 millis, based on 23.891/App, because ackElicitingInFlight | RTT:100/25 23.439 -> Packet PA|3|S0|421c3f42|43|1 StreamFrame[0(CIB),0,17,fin] 23.472 <- (5) Packet A|7|S0|4d07e43eec27d527|1053|1 StreamFrame[0(CIB),0,1024,fin] 23.472 Finished downloading https://server4:443/cjjhzlyund at 41:48.128 on ClientConnection[897e9c3b3a573826/4d07e43eec27d527(V1) with server4/193.167.100.100:443] 23.472 Closing ClientConnection[897e9c3b3a573826/4d07e43eec27d527(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.473 Creating connection with server4:443 with v1 23.473 -> Packet A|4|S0|421c3f42|33|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4|Δ0] 23.474 Setting up connection for downloading https://server4:443/vyyiebvucf at 41:48.129 on ClientConnection[1d6cfce9402cafe3/67caa0d4b43b65b4(V1) with server4/193.167.100.100:443] 23.474 Original destination connection id: 1d6cfce9402cafe3 (scid: 67caa0d4b43b65b4) >- CryptoStream[I|ClientHello] 23.475 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.675/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.475 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.509 <- (1) Packet I|0|L|488|3 Token=[] AckFrame[0|Δ0] Padding(316) CryptoFrame[0,123] 23.509 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.709/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.509 <- (1) Packet H|0|L|741|1 CryptoFrame[0,698] 23.512 - unknown transport parameter 0x1625, size 3 23.512 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.609/Handshake, because peerAwaitingAddressValidation | RTT:33/16 23.512 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 23.514 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.611/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.514 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.514 Starting downloading https://server4:443/vyyiebvucf at 41:48.170 on ClientConnection[1d6cfce9402cafe3/67caa0d4b43b65b4(V1) with server4/193.167.100.100:443] 23.509 <- (1) Packet A|0|S0|67caa0d4b43b65b4|51|1 NewConnectionIdFrame[1,<0|4c7ed00a|95bc5977284abf87fe9bb2547b4f3c4b] 23.514 -> Packet H|1|L|42|1 AckFrame[0|Δ0] 23.515 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.515 Discarding pn space Initial because first Handshake message is being sent 23.515 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.515 -> Packet A|0|S0|8752049f|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 23.611 loss detection timeout handler running Sending probe 0, because no ack since 23.514. Current RTT: 33/16. 23.611 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.611 (Probe is a handshake retransmit) 23.612 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 23.806/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.611 -> Packet PH|2|L|76|1 CryptoFrame[0,36] 23.643 <- (2) Packet A|3|S0|67caa0d4b43b65b4|283|4 NewTokenFrame[977a1310d3abe855e75b56d152e5a006527f3f16586bf56ba207d0841b3b02dfd5ac4c7ac8e28a02de1aabc4159693b60c1684fae6237538b96e91b27351fae24523398f5e26061e0d4ad575b52c6fba10150dd9de81] NewConnectionIdFrame[1,<0|4c7ed00a|95bc5977284abf87fe9bb2547b4f3c4b] CryptoFrame[0,138] HandshakeDoneFrame[] -< CryptoStream[A|NewSessionTicket] 23.644 State is set to Confirmed reschedule loss detection timer for PTO over 116 millis, based on 23.761/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 23.638/App, because ackElicitingInFlight | RTT:33/16 23.644 Discarding pn space Handshake because HandshakeDone is received 23.644 loss detection timeout handler running Sending probe 0, because no ack since 23.515. Current RTT: 33/16. 23.644 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 245 millis, based on 23.890/App, because ackElicitingInFlight | RTT:33/16 23.644 -> Packet PA|1|S0|8752049f|43|1 StreamFrame[0(CIB),0,17,fin] 23.664 -> Packet A|2|S0|8752049f|30|1 AckFrame[3,0|Δ19] 23.701 <- (3) Packet A|6|S0|67caa0d4b43b65b4|33|1 AckFrame[2-0|Δ6] 23.702 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 23.765 <- (4) Packet A|8|S0|67caa0d4b43b65b4|1053|1 StreamFrame[0(CIB),0,1024,fin] 23.766 Finished downloading https://server4:443/vyyiebvucf at 41:48.422 on ClientConnection[1d6cfce9402cafe3/67caa0d4b43b65b4(V1) with server4/193.167.100.100:443] 23.766 Closing ClientConnection[1d6cfce9402cafe3/67caa0d4b43b65b4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.767 -> Packet A|3|S0|8752049f|33|2 ConnectionCloseFrame[0|0|] AckFrame[8,6|Δ0] 23.767 Creating connection with server4:443 with v1 23.767 Setting up connection for downloading https://server4:443/wyefkiswny at 41:48.423 on ClientConnection[68ccf038c0d50aec/0fa2a0caf50f95ca(V1) with server4/193.167.100.100:443] 23.767 Original destination connection id: 68ccf038c0d50aec (scid: 0fa2a0caf50f95ca) >- CryptoStream[I|ClientHello] 23.769 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.969/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.768 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.802 <- (1) Packet I|0|L|491|3 Token=[] AckFrame[0|Δ0] Padding(319) CryptoFrame[0,123] 23.803 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.003/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.802 <- (1) Packet H|0|L|738|1 CryptoFrame[0,695] 23.805 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.805 - unknown transport parameter 0x110f, size 0 reschedule loss detection timer for PTO over 96 millis, based on 23.902/Handshake, because peerAwaitingAddressValidation | RTT:33/16 23.805 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1157) >- CryptoStream[H|Finished] 23.807 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.904/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.807 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.807 Starting downloading https://server4:443/wyefkiswny at 41:48.463 on ClientConnection[68ccf038c0d50aec/0fa2a0caf50f95ca(V1) with server4/193.167.100.100:443] 23.802 <- (1) Packet A|0|S0|0fa2a0caf50f95ca|51|1 NewConnectionIdFrame[1,<0|f75d2330|4e9daba7c07221ccf5c26863f53db761] 23.807 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.807 -> Packet H|1|L|42|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 23.904/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.807 Discarding pn space Initial because first Handshake message is being sent 23.808 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.905/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.808 -> Packet A|0|S0|8b79e13a|48|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 23.839 <- (2) Packet A|1|S0|0fa2a0caf50f95ca|1366|2 Padding(1338) PingFrame[] 23.839 <- (3) Packet A|2|S0|0fa2a0caf50f95ca|256|3 HandshakeDoneFrame[] CryptoFrame[0,135] NewTokenFrame[00a7b74a7047d2a62d068e11e6d1c03d4c90f40c8504ee92b96ebbe128da8595a7182dba59d4090394af6e8e0b16d6703131c66873e058bc0f39866f1e529320634915c59c47d97ee0ac614ad7ce90d675e82d822acd] 23.840 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 23.904/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 23.931/App, because ackElicitingInFlight | RTT:33/16 23.840 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 23.840 <- (4) Packet A|4|S0|0fa2a0caf50f95ca|1053|1 StreamFrame[0(CIB),0,1024,fin] 23.840 -> Packet A|1|S0|8b79e13a|27|1 AckFrame[2-0|Δ0] 23.841 Finished downloading https://server4:443/wyefkiswny at 41:48.496 on ClientConnection[68ccf038c0d50aec/0fa2a0caf50f95ca(V1) with server4/193.167.100.100:443] 23.841 Closing ClientConnection[68ccf038c0d50aec/0fa2a0caf50f95ca(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.841 -> Packet A|2|S0|8b79e13a|33|2 ConnectionCloseFrame[0|0|] AckFrame[4,2-0|Δ0] 23.841 Creating connection with server4:443 with v1 23.842 Setting up connection for downloading https://server4:443/lvysepkubr at 41:48.498 on ClientConnection[5579b3dd8a375957/cae8decb637e6cd8(V1) with server4/193.167.100.100:443] 23.842 Original destination connection id: 5579b3dd8a375957 (scid: cae8decb637e6cd8) >- CryptoStream[I|ClientHello] 23.843 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.043/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.843 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.042 loss detection timeout handler running Sending probe 0, because no ack since 23.843. Current RTT: 100/25. 24.043 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.043 (Probe is an initial retransmit) 24.043 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.443/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.043 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.077 <- (1) Packet I|2|L|1280|2 Token=[] Padding(1113) CryptoFrame[0,123] -< CryptoStream[I|ServerHello] 24.080 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.280/Handshake, because peerAwaitingAddressValidation | RTT:100/25 24.080 Discarding pn space Initial because first Handshake message is being sent 24.080 Discarding packet (1280 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.080 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.280/Handshake, because peerAwaitingAddressValidation | RTT:100/25 24.080 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1157) 24.277 <- (3) Packet H|1|L|751|1 CryptoFrame[0,708] 24.277 - unknown transport parameter 0x1093, size 13 24.279 loss detection timeout handler running 24.279 Sending probe 0. Current RTT: 100/25. 24.279 Sending probe because peer awaiting address validation >- CryptoStream[H|Finished] 24.279 (Probe is a handshake ping) 24.280 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 24.680/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.279 -> Packet H|0|L|76|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.280 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 24.680/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.280 Starting downloading https://server4:443/lvysepkubr at 41:48.936 on ClientConnection[5579b3dd8a375957/cae8decb637e6cd8(V1) with server4/193.167.100.100:443] 24.280 -> Packet PH|1|L|40|2 PingFrame[] Padding(2) 24.277 <- (4) Packet H|2|L|751|1 CryptoFrame[0,708] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.280 -> Packet H|2|L|42|1 AckFrame[1|Δ0] 24.280 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 24.680/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.280 -> [Packet H|3|L|42|1 AckFrame[2-1|Δ0], Packet A|0|S0|d790d256|43|1 StreamFrame[0(CIB),0,17,fin]] 24.311 <- (5) Packet A|3|S0|cae8decb637e6cd8|280|4 NewConnectionIdFrame[1,<0|8c04eb55|7b0698f896f2d9c2cc1b4e31f7451616] NewTokenFrame[d4bb862d6a0197a301bb9d6976e8637704f09f5d88297f285a4ebc28b95a36204b24fec4c7faa65c5dab96baf388eb4523c0122f6755b8a6daa331c971ce0645b6a05ae1fa45d3d09010f6b8542b7fea6d9d94685de4] HandshakeDoneFrame[] CryptoFrame[0,135] 24.312 State is set to Confirmed reschedule loss detection timer for PTO over 367 millis, based on 24.680/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 24.506/App, because ackElicitingInFlight | RTT:100/25 24.312 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket] 24.312 <- (6) Packet A|5|S0|cae8decb637e6cd8|32|1 AckFrame[0|Δ0] 24.313 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.313 <- (7) Packet A|6|S0|cae8decb637e6cd8|1053|1 StreamFrame[0(CIB),0,1024,fin] 24.314 -> Packet A|1|S0|d790d256|30|1 AckFrame[6-5,3|Δ1] 24.314 Finished downloading https://server4:443/lvysepkubr at 41:48.969 on ClientConnection[5579b3dd8a375957/cae8decb637e6cd8(V1) with server4/193.167.100.100:443] 24.314 Closing ClientConnection[5579b3dd8a375957/cae8decb637e6cd8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.314 -> Packet A|2|S0|d790d256|33|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3|Δ0]