0.000 Creating connection with server4:443 with v1 0.079 Setting up connection for downloading https://server4:443/wnjyjbgruo at 40:16.967 on ClientConnection[980ad9fc74032a97/79c84ef6d912ab21(V1) with server4/193.167.100.100:443] 0.081 Original destination connection id: 980ad9fc74032a97 (scid: 79c84ef6d912ab21) >- CryptoStream[I|ClientHello] 0.255 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.456/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.251 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.456 loss detection timeout handler running Sending probe 0, because no ack since 0.251. Current RTT: 100/25. 0.457 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.459 (Probe is an initial retransmit) 0.462 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.862/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.461 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.494 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 0.506 probe count not reset on ack because handshake not yet confirmed 0.511 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.911/Initial, because peerAwaitingAddressValidation | RTT:100/25 0.911 loss detection timeout handler running Sending probe 1, because no ack since 0.461. Current RTT: 33/16. 0.911 Sending probe because peer awaiting address validation 0.911 (Probe is Initial ping, because there is no Initial data to retransmit) 0.913 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 1.301/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.912 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 0.945 <- (2) Packet I|3|L|60|1 Token=[] AckFrame[2-0|Δ0] 0.946 probe count not reset on ack because handshake not yet confirmed 0.946 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 1.334/Initial, because peerAwaitingAddressValidation | RTT:33/16 1.290 <- (3) Packet I|4|L|190|2 Token=[] AckFrame[2-0|Δ344] CryptoFrame[0,123] 1.291 probe count not reset on ack because handshake not yet confirmed 1.291 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 323 millis, based on 1.615/Initial, because peerAwaitingAddressValidation | RTT:33/12 -< CryptoStream[I|ServerHello] 1.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 1.387/Handshake, because peerAwaitingAddressValidation | RTT:33/12 reschedule loss detection timer for PTO over 80 millis, based on 1.387/Handshake, because peerAwaitingAddressValidation | RTT:33/12 1.305 -> Packet I|3|L|1201|2 Token=[] AckFrame[4-2|Δ0] Padding(1141) 1.306 Discarding pn space Initial because first Handshake message is being sent 1.340 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.339 <- (5) Packet H|6|L|753|1 CryptoFrame[0,695] >- CryptoStream[H|Finished] 1.368 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 1.449/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 1.368 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.373 -> Packet H|1|L|58|1 AckFrame[6|Δ0] 1.373 Starting downloading https://server4:443/wnjyjbgruo at 40:18.276 on ClientConnection[980ad9fc74032a97/79c84ef6d912ab21(V1) with server4/193.167.100.100:443] 1.394 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 1.475/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 1.394 -> Packet A|0|S0|a7636af101de2140beae5411d4bd907a93d408d8|59|1 StreamFrame[0(CIB),0,17,fin] 1.400 <- (6) Packet A|7|S0|79c84ef6d912ab21|467|3 NewConnectionIdFrame[1,<0|029a90a1cc3778bebec5e9b6a73ecabc5d14a5b3|7a1b2488e7a50b1c27719b1deb9ab314] HandshakeDoneFrame[] CryptoFrame[0,396] 1.408 State is set to Confirmed reschedule loss detection timer for PTO over 41 millis, based on 1.449/Handshake, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 89 millis, based on 1.500/App, because ackElicitingInFlight | RTT:33/12 1.411 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.426 <- (7) Packet A|8|S0|79c84ef6d912ab21|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 1.428 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.428 -> Packet A|1|S0|a7636af101de2140beae5411d4bd907a93d408d8|44|1 AckFrame[8-7|Δ15] 1.430 Finished downloading https://server4:443/wnjyjbgruo at 40:18.332 on ClientConnection[980ad9fc74032a97/79c84ef6d912ab21(V1) with server4/193.167.100.100:443] 1.431 Closing ClientConnection[980ad9fc74032a97/79c84ef6d912ab21(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.434 Creating connection with server4:443 with v1 1.435 Setting up connection for downloading https://server4:443/uadjshvdby at 40:18.338 on ClientConnection[9d477753e5c7eb09/1da786a957ed36d0(V1) with server4/193.167.100.100:443] 1.435 Original destination connection id: 9d477753e5c7eb09 (scid: 1da786a957ed36d0) >- CryptoStream[I|ClientHello] 1.438 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.638/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.438 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.434 -> Packet A|2|S0|a7636af101de2140beae5411d4bd907a93d408d8|47|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 1.637 loss detection timeout handler running Sending probe 0, because no ack since 1.438. Current RTT: 100/25. 1.638 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.638 (Probe is an initial retransmit) 1.639 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.039/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.638 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.038 loss detection timeout handler running Sending probe 1, because no ack since 1.638. Current RTT: 100/25. 2.038 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.038 (Probe is an initial retransmit) 2.039 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.839/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.039 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.040 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.840/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.040 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.072 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[2-1|Δ0] 2.073 probe count not reset on ack because handshake not yet confirmed 2.074 Retransmitting CryptoFrame[0,257] on level Initial 2.075 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.875/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.075 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) 2.075 Cwnd(-): 6000; inflight: 2400 2.076 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.876/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.672 <- (2) Packet I|4|L|190|2 Token=[] AckFrame[3-1|Δ598] CryptoFrame[0,123] 2.673 probe count not reset on ack because handshake not yet confirmed 2.673 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 3.057/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[I|ServerHello] 2.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 754 millis, based on 3.432/Handshake, because peerAwaitingAddressValidation | RTT:107/162 2.677 Discarding pn space Initial because first Handshake message is being sent 2.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 754 millis, based on 3.432/Handshake, because peerAwaitingAddressValidation | RTT:107/162 2.677 -> Packet I|5|L|1201|2 Token=[] AckFrame[4,2|Δ0] Padding(1139) 3.431 loss detection timeout handler running 3.432 Sending probe 0. Current RTT: 107/162. 3.432 Sending probe because peer awaiting address validation 3.432 (Probe is a handshake ping) 3.433 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1509 millis, based on 4.944/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:107/162 3.433 -> Packet PH|0|L|56|2 PingFrame[] Padding(2) 3.464 <- (3) Packet H|5|L|59|1 AckFrame[0|Δ0] 3.465 probe count not reset on ack because handshake not yet confirmed 3.465 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.670 <- (4) Packet H|6|L|761|2 AckFrame[0|Δ205] CryptoFrame[0,695] 3.671 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 661 millis, based on 4.337/Handshake, because ackElicitingInFlight | RTT:98/141 3.675 -> Packet H|1|L|97|2 CryptoFrame[0,36] AckFrame[5|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.676 Starting downloading https://server4:443/uadjshvdby at 40:20.579 on ClientConnection[9d477753e5c7eb09/1da786a957ed36d0(V1) with server4/193.167.100.100:443] 3.670 <- (5) Packet H|7|L|63|2 AckFrame[0|Δ205] PingFrame[] reschedule loss detection timer for PTO over 660 millis, based on 4.337/Handshake, because ackElicitingInFlight | RTT:98/141 3.677 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 659 millis, based on 4.337/Handshake, because ackElicitingInFlight | RTT:98/141 3.677 -> [Packet H|2|L|58|1 AckFrame[6-5|Δ0], Packet A|0|S0|4d9ffebedde3cb77bb5a3c6de363963c73f93641|59|1 StreamFrame[0(CIB),0,17,fin]] 3.678 -> Packet H|3|L|58|1 AckFrame[7-5|Δ0] 4.336 loss detection timeout handler running Sending probe 0, because no ack since 3.675. Current RTT: 98/141. 4.337 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 4.337 (Probe is a handshake retransmit) 4.338 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 1323 millis, based on 5.662/Handshake, because ackElicitingInFlight | RTT:98/141 4.338 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 4.369 <- (6) Packet A|8|S0|1da786a957ed36d0|467|3 NewConnectionIdFrame[1,<0|7b8e32812628c765e8fd7ec7b7162b4fdea34bfb|5a08869bfa2420c44f46a4f4df525bbc] HandshakeDoneFrame[] CryptoFrame[0,396] 4.370 State is set to Confirmed reschedule loss detection timer for PTO over 680 millis, based on 5.051/App, because ackElicitingInFlight | RTT:98/141 4.371 loss detection timeout handler running reschedule loss detection timer for PTO over -6 millis, based on 4.364/App, because ackElicitingInFlight | RTT:98/141 Sending probe 0, because no ack since 3.677. Current RTT: 98/141. 4.371 Discarding pn space Handshake because HandshakeDone is received 4.371 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 1373 millis, based on 5.746/App, because ackElicitingInFlight | RTT:98/141 4.372 -> Packet PA|1|S0|4d9ffebedde3cb77bb5a3c6de363963c73f93641|59|1 StreamFrame[0(CIB),0,17,fin] 4.392 -> Packet A|2|S0|4d9ffebedde3cb77bb5a3c6de363963c73f93641|44|1 AckFrame[8|Δ20] 4.403 <- (7) Packet A|9|S0|1da786a957ed36d0|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 4.405 Cwnd(-): 3000; inflight: 0 4.405 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.405 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 606 millis, based on 5.012/App, because ackElicitingInFlight | RTT:90/123 4.405 Finished downloading https://server4:443/uadjshvdby at 40:21.309 on ClientConnection[9d477753e5c7eb09/1da786a957ed36d0(V1) with server4/193.167.100.100:443] 4.405 -> Packet A|3|S0|4d9ffebedde3cb77bb5a3c6de363963c73f93641|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8|Δ0] 4.406 Closing ClientConnection[9d477753e5c7eb09/1da786a957ed36d0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.406 -> Packet A|4|S0|4d9ffebedde3cb77bb5a3c6de363963c73f93641|47|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 4.406 Creating connection with server4:443 with v1 4.407 Setting up connection for downloading https://server4:443/zcqppgiapw at 40:21.310 on ClientConnection[8cf4a87c4a9ca9c5/26c4954160231b21(V1) with server4/193.167.100.100:443] 4.407 Original destination connection id: 8cf4a87c4a9ca9c5 (scid: 26c4954160231b21) >- CryptoStream[I|ClientHello] 4.410 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.610/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.409 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.436 <- (8) Packet A|10|S0|1da786a957ed36d0|31|1 AckFrame[3-1|Δ0] 4.437 -> Packet A|5|S0|4d9ffebedde3cb77bb5a3c6de363963c73f93641|47|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 4.609 loss detection timeout handler running Sending probe 0, because no ack since 4.409. Current RTT: 100/25. 4.609 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.609 (Probe is an initial retransmit) 4.610 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.010/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.610 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.009 loss detection timeout handler running Sending probe 1, because no ack since 4.610. Current RTT: 100/25. 5.009 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.009 (Probe is an initial retransmit) 5.010 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.810/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.010 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.811/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.011 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.043 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 5.044 probe count not reset on ack because handshake not yet confirmed 5.044 Retransmitting CryptoFrame[0,257] on level Initial 5.044 Cwnd(-): 6000; inflight: 1200 5.044 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.844/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.044 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 5.433/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.044 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 5.043 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 5.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 5.437/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.049 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 5.053 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 5.441/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.053 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.054 Starting downloading https://server4:443/zcqppgiapw at 40:21.958 on ClientConnection[8cf4a87c4a9ca9c5/26c4954160231b21(V1) with server4/193.167.100.100:443] 5.054 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.151/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.055 Discarding pn space Initial because first Handshake message is being sent 5.055 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 5.152/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.055 -> [Packet H|1|L|58|1 AckFrame[1|Δ0], Packet A|0|S0|3b9ee40aa8a142182865794b9378d87b3c23e3c4|59|1 StreamFrame[0(CIB),0,17,fin]] 5.151 loss detection timeout handler running Sending probe 0, because no ack since 5.053. Current RTT: 33/16. 5.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.152 (Probe is a handshake retransmit) 5.152 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 5.346/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 5.152 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 5.227 <- (2) Packet A|4|S0|26c4954160231b21|467|3 NewConnectionIdFrame[1,<0|f98305696d5aceeeb34919f34867a5f0fb4cdae9|5cfb3dab5a537413224e78025eae605b] HandshakeDoneFrame[] CryptoFrame[0,396] 5.228 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 5.299/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -51 millis, based on 5.177/App, because ackElicitingInFlight | RTT:33/16 5.229 loss detection timeout handler running 5.229 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 5.055. Current RTT: 33/16. 5.229 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 5.473/App, because ackElicitingInFlight | RTT:33/16 5.229 -> Packet PA|1|S0|3b9ee40aa8a142182865794b9378d87b3c23e3c4|59|1 StreamFrame[0(CIB),0,17,fin] 5.249 -> Packet A|2|S0|3b9ee40aa8a142182865794b9378d87b3c23e3c4|44|1 AckFrame[4|Δ19] 5.279 <- (3) Packet A|5|S0|26c4954160231b21|66|1 NewConnectionIdFrame[1,<0|f98305696d5aceeeb34919f34867a5f0fb4cdae9|5cfb3dab5a537413224e78025eae605b] 5.299 -> Packet A|3|S0|3b9ee40aa8a142182865794b9378d87b3c23e3c4|44|1 AckFrame[5-4|Δ19] 5.472 loss detection timeout handler running Sending probe 1, because no ack since 5.229. Current RTT: 33/16. 5.473 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 5.961/App, because ackElicitingInFlight | RTT:33/16 5.473 -> Packet PA|4|S0|3b9ee40aa8a142182865794b9378d87b3c23e3c4|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 5.962/App, because ackElicitingInFlight | RTT:33/16 5.474 -> Packet PA|5|S0|3b9ee40aa8a142182865794b9378d87b3c23e3c4|59|1 StreamFrame[0(CIB),0,17,fin] 5.637 <- (4) Packet A|7|S0|26c4954160231b21|1065|2 AckFrame[5,3-2|Δ131] StreamFrame[0(CIB),0,1024,fin] 5.638 Cwnd(-): 3000; inflight: 0 5.638 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 5.639 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 222 millis, based on 5.862/App, because ackElicitingInFlight | RTT:46/38 5.639 Finished downloading https://server4:443/zcqppgiapw at 40:22.542 on ClientConnection[8cf4a87c4a9ca9c5/26c4954160231b21(V1) with server4/193.167.100.100:443] 5.639 -> Packet A|6|S0|3b9ee40aa8a142182865794b9378d87b3c23e3c4|59|1 StreamFrame[0(CIB),0,17,fin] 5.639 Closing ClientConnection[8cf4a87c4a9ca9c5/26c4954160231b21(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.640 Creating connection with server4:443 with v1 5.640 -> Packet A|7|S0|3b9ee40aa8a142182865794b9378d87b3c23e3c4|47|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 5.641 Setting up connection for downloading https://server4:443/lomvkceuoy at 40:22.544 on ClientConnection[4cf9362a915a0841/e5ee0b31cdc52c30(V1) with server4/193.167.100.100:443] 5.641 Original destination connection id: 4cf9362a915a0841 (scid: e5ee0b31cdc52c30) >- CryptoStream[I|ClientHello] 5.643 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.843/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.643 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.842 loss detection timeout handler running Sending probe 0, because no ack since 5.643. Current RTT: 100/25. 5.842 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.842 (Probe is an initial retransmit) 5.843 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.243/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.843 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.242 loss detection timeout handler running Sending probe 1, because no ack since 5.843. Current RTT: 100/25. 6.242 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.242 (Probe is an initial retransmit) 6.243 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.043/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.242 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.244 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.044/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.243 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.275 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[2-1|Δ0] 6.276 probe count not reset on ack because handshake not yet confirmed 6.276 Retransmitting CryptoFrame[0,257] on level Initial 6.276 Cwnd(-): 6000; inflight: 1200 6.276 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.076/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.277 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 6.661/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 6.276 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) 6.660 loss detection timeout handler running Sending probe 2, because no ack since 6.276. Current RTT: 32/16. 6.660 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.660 (Probe is an initial retransmit) 6.661 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 7.429/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 6.661 -> Packet PI|5|L|1212|2 Token=[] CryptoFrame[0,257] Padding(896) 6.662 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 7.430/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 6.662 -> Packet PI|6|L|1212|2 Token=[] CryptoFrame[0,257] Padding(896) 6.694 <- (2) Packet I|4|L|64|1 Token=[] AckFrame[6,4,2-1|Δ0] 6.695 probe count not reset on ack because handshake not yet confirmed 6.696 loss detection timeout handler running 6.696 loss detection timeout handler running 6.697 loss detection timeout handler running 6.697 loss detection timeout handler running 6.697 Cwnd(-): 3000; inflight: 0 6.697 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 7.337/Initial, because peerAwaitingAddressValidation | RTT:32/12 6.876 <- (3) Packet I|5|L|194|2 Token=[] AckFrame[6,4,2-1|Δ181] CryptoFrame[0,123] 6.877 probe count not reset on ack because handshake not yet confirmed 6.877 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 7.517/Initial, because peerAwaitingAddressValidation | RTT:32/12 -< CryptoStream[I|ServerHello] 6.880 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 6.960/Handshake, because peerAwaitingAddressValidation | RTT:32/12 6.880 Discarding pn space Initial because first Handshake message is being sent 6.881 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 6.961/Handshake, because peerAwaitingAddressValidation | RTT:32/12 6.880 -> Packet I|7|L|1201|2 Token=[] AckFrame[5-4,2|Δ0] Padding(1139) 6.913 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.914 <- (5) Packet H|7|L|754|1 CryptoFrame[0,696] >- CryptoStream[H|Finished] 6.918 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 6.998/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 6.918 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.919 Starting downloading https://server4:443/lomvkceuoy at 40:23.822 on ClientConnection[4cf9362a915a0841/e5ee0b31cdc52c30(V1) with server4/193.167.100.100:443] 6.919 -> Packet H|1|L|58|1 AckFrame[7|Δ0] 6.919 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 7.000/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 6.919 -> Packet A|0|S0|0e5bc4480edbbb7c46f1a84e6b5869464b31367e|59|1 StreamFrame[0(CIB),0,17,fin] 6.950 <- (6) Packet A|8|S0|e5ee0b31cdc52c30|467|3 NewConnectionIdFrame[1,<0|2c1d705c2f4a70a252223ac4bf16d81fca5bd49c|9193a159ed496c5f1211bd3c6c28a3ce] HandshakeDoneFrame[] CryptoFrame[0,396] 6.950 State is set to Confirmed reschedule loss detection timer for PTO over 47 millis, based on 6.998/Handshake, because ackElicitingInFlight | RTT:32/12 reschedule loss detection timer for PTO over 73 millis, based on 7.024/App, because ackElicitingInFlight | RTT:32/12 6.951 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.971 -> Packet A|1|S0|0e5bc4480edbbb7c46f1a84e6b5869464b31367e|44|1 AckFrame[8|Δ19] 7.024 loss detection timeout handler running Sending probe 0, because no ack since 6.919. Current RTT: 32/12. 7.024 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 209 millis, based on 7.235/App, because ackElicitingInFlight | RTT:32/12 7.025 -> Packet PA|2|S0|0e5bc4480edbbb7c46f1a84e6b5869464b31367e|59|1 StreamFrame[0(CIB),0,17,fin] 7.234 loss detection timeout handler running Sending probe 1, because no ack since 7.025. Current RTT: 32/12. 7.234 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 419 millis, based on 7.655/App, because ackElicitingInFlight | RTT:32/12 7.235 -> Packet PA|3|S0|0e5bc4480edbbb7c46f1a84e6b5869464b31367e|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 419 millis, based on 7.656/App, because ackElicitingInFlight | RTT:32/12 7.236 -> Packet PA|4|S0|0e5bc4480edbbb7c46f1a84e6b5869464b31367e|59|1 StreamFrame[0(CIB),0,17,fin] 7.403 <- (7) Packet A|10|S0|e5ee0b31cdc52c30|1065|2 AckFrame[3,1|Δ136] StreamFrame[0(CIB),0,1024,fin] 7.404 Cwnd(-): 2400; inflight: 59 7.404 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over -63 millis, based on 7.341/App, because ackElicitingInFlight | RTT:32/12 7.404 loss detection timeout handler running Sending probe 0, because no ack since 7.236. Current RTT: 46/37. reschedule loss detection timer for PTO over 218 millis, based on 7.623/App, because ackElicitingInFlight | RTT:46/37 7.405 (Probe is retransmit on level App) 7.404 -> Packet A|5|S0|0e5bc4480edbbb7c46f1a84e6b5869464b31367e|59|1 StreamFrame[0(CIB),0,17,fin] 7.405 Finished downloading https://server4:443/lomvkceuoy at 40:24.308 on ClientConnection[4cf9362a915a0841/e5ee0b31cdc52c30(V1) with server4/193.167.100.100:443] 7.405 Closing ClientConnection[4cf9362a915a0841/e5ee0b31cdc52c30(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.405 -> Packet PA|6|S0|0e5bc4480edbbb7c46f1a84e6b5869464b31367e|59|1 StreamFrame[0(CIB),0,17,fin] 7.406 Creating connection with server4:443 with v1 7.405 -> Packet A|7|S0|0e5bc4480edbbb7c46f1a84e6b5869464b31367e|47|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 7.406 Setting up connection for downloading https://server4:443/bzxzazxhtm at 40:24.310 on ClientConnection[4eca1671e7ae8ccb/73d6cc4561c034fe(V1) with server4/193.167.100.100:443] 7.406 Original destination connection id: 4eca1671e7ae8ccb (scid: 73d6cc4561c034fe) >- CryptoStream[I|ClientHello] 7.408 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.608/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.408 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.435 <- (8) Packet A|11|S0|e5ee0b31cdc52c30|35|1 AckFrame[5,3,1|Δ0] 7.436 -> Packet A|8|S0|0e5bc4480edbbb7c46f1a84e6b5869464b31367e|47|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 7.441 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 7.442 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.642/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.441 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 7.445 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.542/Handshake, because peerAwaitingAddressValidation | RTT:33/16 7.445 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 7.448 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.545/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.448 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.449 Starting downloading https://server4:443/bzxzazxhtm at 40:24.352 on ClientConnection[4eca1671e7ae8ccb/73d6cc4561c034fe(V1) with server4/193.167.100.100:443] 7.449 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.546/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.449 Discarding pn space Initial because first Handshake message is being sent 7.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.547/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.449 -> [Packet H|1|L|58|1 AckFrame[1|Δ0], Packet A|0|S0|57bbe60c7435d2d5b7bb5f8bb855a82839ace634|59|1 StreamFrame[0(CIB),0,17,fin]] 7.546 loss detection timeout handler running Sending probe 0, because no ack since 7.448. Current RTT: 33/16. 7.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.546 (Probe is a handshake retransmit) 7.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 7.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.546 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 7.614 <- (2) Packet A|3|S0|73d6cc4561c034fe|467|3 NewConnectionIdFrame[1,<0|3764ba8a4a405552f2bdfa10e7e8da9e80603da4|fb051a3f229ed959e7861cf669a814df] HandshakeDoneFrame[] CryptoFrame[0,396] 7.615 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 7.693/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -43 millis, based on 7.571/App, because ackElicitingInFlight | RTT:33/16 7.615 loss detection timeout handler running 7.615 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 7.449. Current RTT: 33/16. 7.615 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 7.859/App, because ackElicitingInFlight | RTT:33/16 7.615 -> Packet PA|1|S0|57bbe60c7435d2d5b7bb5f8bb855a82839ace634|59|1 StreamFrame[0(CIB),0,17,fin] 7.635 -> Packet A|2|S0|57bbe60c7435d2d5b7bb5f8bb855a82839ace634|44|1 AckFrame[3|Δ19] 7.647 <- (3) Packet A|4|S0|73d6cc4561c034fe|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 7.648 Cwnd(-): 6000; inflight: 0 7.648 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.648 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 7.758/App, because ackElicitingInFlight | RTT:33/13 7.648 Finished downloading https://server4:443/bzxzazxhtm at 40:24.552 on ClientConnection[4eca1671e7ae8ccb/73d6cc4561c034fe(V1) with server4/193.167.100.100:443] 7.648 -> Packet A|3|S0|57bbe60c7435d2d5b7bb5f8bb855a82839ace634|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 7.648 Closing ClientConnection[4eca1671e7ae8ccb/73d6cc4561c034fe(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.649 Creating connection with server4:443 with v1 7.649 -> Packet A|4|S0|57bbe60c7435d2d5b7bb5f8bb855a82839ace634|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 7.649 Setting up connection for downloading https://server4:443/jzwhxbwxxs at 40:24.553 on ClientConnection[b48744705a02637e/0fd45f8ecef29df2(V1) with server4/193.167.100.100:443] 7.649 Original destination connection id: b48744705a02637e (scid: 0fd45f8ecef29df2) >- CryptoStream[I|ClientHello] 7.651 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.851/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.651 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.666 <- (4) Packet A|5|S0|73d6cc4561c034fe|66|1 NewConnectionIdFrame[1,<0|3764ba8a4a405552f2bdfa10e7e8da9e80603da4|fb051a3f229ed959e7861cf669a814df] 7.666 -> Packet A|5|S0|57bbe60c7435d2d5b7bb5f8bb855a82839ace634|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 7.850 loss detection timeout handler running Sending probe 0, because no ack since 7.651. Current RTT: 100/25. 7.850 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.850 (Probe is an initial retransmit) 7.851 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.251/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.851 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.884 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 7.884 probe count not reset on ack because handshake not yet confirmed 7.885 Retransmitting CryptoFrame[0,257] on level Initial 7.885 Cwnd(-): 6000; inflight: 0 7.885 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.285/Initial, because peerAwaitingAddressValidation | RTT:100/25 7.885 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 8.079/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.885 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 7.884 <- (1) Packet H|1|L|753|1 CryptoFrame[0,695] 7.889 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.083/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.888 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 7.892 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.086/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.892 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.892 Starting downloading https://server4:443/jzwhxbwxxs at 40:24.796 on ClientConnection[b48744705a02637e/0fd45f8ecef29df2(V1) with server4/193.167.100.100:443] 7.892 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.989/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.892 Discarding pn space Initial because first Handshake message is being sent 7.893 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.990/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.893 -> [Packet H|1|L|58|1 AckFrame[1|Δ0], Packet A|0|S0|3eb788a8522e1ba34cf45e28d68081d143799c6c|59|1 StreamFrame[0(CIB),0,17,fin]] 7.918 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.989 loss detection timeout handler running Sending probe 0, because no ack since 7.892. Current RTT: 33/16. 7.989 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.989 (Probe is a handshake retransmit) 7.990 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.184/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.990 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 8.183 loss detection timeout handler running Sending probe 1, because no ack since 7.893. Current RTT: 33/16. 8.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.183 (Probe is a handshake retransmit) 8.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 8.571/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.183 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 8.184 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 8.572/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.184 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 8.215 <- (3) Packet A|3|S0|0fd45f8ecef29df2|467|3 NewConnectionIdFrame[1,<0|3a853891c8cd699fba243c560c6b10f1d1be26f0|ff19eb9a7fb189932ce36d92ff8c282f] HandshakeDoneFrame[] CryptoFrame[0,396] 8.215 State is set to Confirmed reschedule loss detection timer for PTO over 165 millis, based on 8.381/App, because ackElicitingInFlight | RTT:33/16 8.216 loss detection timeout handler running reschedule loss detection timer for PTO over -200 millis, based on 8.015/App, because ackElicitingInFlight | RTT:33/16 Sending probe 0, because no ack since 7.893. Current RTT: 33/16. 8.216 Discarding pn space Handshake because HandshakeDone is received 8.216 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 8.460/App, because ackElicitingInFlight | RTT:33/16 8.216 -> Packet PA|1|S0|3eb788a8522e1ba34cf45e28d68081d143799c6c|59|1 StreamFrame[0(CIB),0,17,fin] 8.236 -> Packet A|2|S0|3eb788a8522e1ba34cf45e28d68081d143799c6c|44|1 AckFrame[3|Δ19] 8.248 <- (4) Packet A|4|S0|0fd45f8ecef29df2|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 8.248 Cwnd(-): 3000; inflight: 0 8.248 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 8.248 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 8.358/App, because ackElicitingInFlight | RTT:33/13 8.248 -> Packet A|3|S0|3eb788a8522e1ba34cf45e28d68081d143799c6c|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 8.249 Finished downloading https://server4:443/jzwhxbwxxs at 40:25.152 on ClientConnection[b48744705a02637e/0fd45f8ecef29df2(V1) with server4/193.167.100.100:443] 8.249 Closing ClientConnection[b48744705a02637e/0fd45f8ecef29df2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.249 -> Packet A|4|S0|3eb788a8522e1ba34cf45e28d68081d143799c6c|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 8.253 Creating connection with server4:443 with v1 8.254 Setting up connection for downloading https://server4:443/cawznrdnyv at 40:25.157 on ClientConnection[82c481804a40043f/c686f1b9014936e4(V1) with server4/193.167.100.100:443] 8.254 Original destination connection id: 82c481804a40043f (scid: c686f1b9014936e4) >- CryptoStream[I|ClientHello] 8.256 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.456/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.256 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.280 <- (5) Packet A|5|S0|0fd45f8ecef29df2|31|1 AckFrame[3-1|Δ0] 8.280 -> Packet A|5|S0|3eb788a8522e1ba34cf45e28d68081d143799c6c|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 8.289 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.289 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.490/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.289 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 8.294 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.391/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.293 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 8.297 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.394/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.297 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.298 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.298 Starting downloading https://server4:443/cawznrdnyv at 40:25.201 on ClientConnection[82c481804a40043f/c686f1b9014936e4(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 8.395/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.298 Discarding pn space Initial because first Handshake message is being sent 8.298 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 8.299 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.396/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.298 -> Packet A|0|S0|4413c9db58ae4da0bd0e949e34f7883722ec4d1e|59|1 StreamFrame[0(CIB),0,17,fin] 8.328 <- (2) Packet A|2|S0|c686f1b9014936e4|467|3 NewConnectionIdFrame[1,<0|a773b462818e258faf59aed7f1c20b497bac667a|99ae87a264bc20dd2c925d5b3e3111bb] HandshakeDoneFrame[] CryptoFrame[0,396] 8.329 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 8.394/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 8.420/App, because ackElicitingInFlight | RTT:33/16 8.329 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 8.348 -> Packet A|1|S0|4413c9db58ae4da0bd0e949e34f7883722ec4d1e|44|1 AckFrame[2|Δ19] 8.420 loss detection timeout handler running Sending probe 0, because no ack since 8.298. Current RTT: 33/16. 8.420 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 8.664/App, because ackElicitingInFlight | RTT:33/16 8.420 -> Packet PA|2|S0|4413c9db58ae4da0bd0e949e34f7883722ec4d1e|59|1 StreamFrame[0(CIB),0,17,fin] 8.451 <- (3) Packet A|4|S0|c686f1b9014936e4|31|1 AckFrame[2-0|Δ0] 8.452 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.509 <- (4) Packet A|5|S0|c686f1b9014936e4|1061|2 AckFrame[2-0|Δ57] StreamFrame[0(CIB),0,1024,fin] 8.510 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.510 Finished downloading https://server4:443/cawznrdnyv at 40:25.413 on ClientConnection[82c481804a40043f/c686f1b9014936e4(V1) with server4/193.167.100.100:443] 8.510 Closing ClientConnection[82c481804a40043f/c686f1b9014936e4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.510 -> Packet A|3|S0|4413c9db58ae4da0bd0e949e34f7883722ec4d1e|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 8.511 Creating connection with server4:443 with v1 8.511 Setting up connection for downloading https://server4:443/cgpnvmnlbv at 40:25.415 on ClientConnection[0b5a881db8ecaa59/b0ce3f53650400b6(V1) with server4/193.167.100.100:443] 8.511 Original destination connection id: 0b5a881db8ecaa59 (scid: b0ce3f53650400b6) >- CryptoStream[I|ClientHello] 8.513 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.713/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.513 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.712 loss detection timeout handler running Sending probe 0, because no ack since 8.513. Current RTT: 100/25. 8.712 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.712 (Probe is an initial retransmit) 8.713 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.113/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.713 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.112 loss detection timeout handler running Sending probe 1, because no ack since 8.713. Current RTT: 100/25. 9.112 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.112 (Probe is an initial retransmit) 9.113 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.913/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.112 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.114 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.914/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.113 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.146 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 9.146 probe count not reset on ack because handshake not yet confirmed 9.147 Retransmitting CryptoFrame[0,257] on level Initial 9.147 Cwnd(-): 6000; inflight: 1200 9.147 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 9.947/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.147 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 9.535/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.147 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 9.150 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.146 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] reschedule loss detection timer for PTO over 387 millis, based on 9.538/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.150 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 9.153 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 9.541/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.153 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.154 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.154 Starting downloading https://server4:443/cgpnvmnlbv at 40:26.057 on ClientConnection[0b5a881db8ecaa59/b0ce3f53650400b6(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 9.251/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.154 Discarding pn space Initial because first Handshake message is being sent 9.154 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 9.155 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.252/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.155 -> Packet A|0|S0|0b3d8dbe0b6c7af714864eb6800ed8a9d9a0182c|59|1 StreamFrame[0(CIB),0,17,fin] 9.180 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.251 loss detection timeout handler running Sending probe 0, because no ack since 9.153. Current RTT: 33/16. 9.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.251 (Probe is a handshake retransmit) 9.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 9.446/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.251 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 9.283 <- (3) Packet A|4|S0|b0ce3f53650400b6|467|3 NewConnectionIdFrame[1,<0|925a361f100d8c6d181456e1c529011b074f0586|81b0ae9d40f715bc5120a855024ded86] HandshakeDoneFrame[] CryptoFrame[0,396] 9.283 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 9.399/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 9.277/App, because ackElicitingInFlight | RTT:33/16 9.283 loss detection timeout handler running 9.283 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 9.155. Current RTT: 33/16. 9.284 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 9.528/App, because ackElicitingInFlight | RTT:33/16 9.284 -> Packet PA|1|S0|0b3d8dbe0b6c7af714864eb6800ed8a9d9a0182c|59|1 StreamFrame[0(CIB),0,17,fin] 9.303 -> Packet A|2|S0|0b3d8dbe0b6c7af714864eb6800ed8a9d9a0182c|44|1 AckFrame[4|Δ19] 9.315 <- (4) Packet A|5|S0|b0ce3f53650400b6|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 9.316 Cwnd(-): 3000; inflight: 0 9.316 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 9.316 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 9.426/App, because ackElicitingInFlight | RTT:33/13 9.316 -> Packet A|3|S0|0b3d8dbe0b6c7af714864eb6800ed8a9d9a0182c|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4|Δ0] 9.316 Finished downloading https://server4:443/cgpnvmnlbv at 40:26.220 on ClientConnection[0b5a881db8ecaa59/b0ce3f53650400b6(V1) with server4/193.167.100.100:443] 9.317 Closing ClientConnection[0b5a881db8ecaa59/b0ce3f53650400b6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.317 Creating connection with server4:443 with v1 9.317 -> Packet A|4|S0|0b3d8dbe0b6c7af714864eb6800ed8a9d9a0182c|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 9.318 Setting up connection for downloading https://server4:443/skfhiymutf at 40:26.221 on ClientConnection[06e77bf1ad268ec7/64f87cb368376170(V1) with server4/193.167.100.100:443] 9.318 Original destination connection id: 06e77bf1ad268ec7 (scid: 64f87cb368376170) >- CryptoStream[I|ClientHello] 9.320 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.520/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.320 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.347 <- (5) Packet A|6|S0|b0ce3f53650400b6|33|1 AckFrame[3,1|Δ0] 9.347 -> Packet A|5|S0|0b3d8dbe0b6c7af714864eb6800ed8a9d9a0182c|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 9.353 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 9.354 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.554/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 9.353 <- (1) Packet H|1|L|753|1 CryptoFrame[0,695] 9.357 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.454/Handshake, because peerAwaitingAddressValidation | RTT:33/16 9.357 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 9.360 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.457/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.360 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.361 Starting downloading https://server4:443/skfhiymutf at 40:26.264 on ClientConnection[06e77bf1ad268ec7/64f87cb368376170(V1) with server4/193.167.100.100:443] 9.361 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 9.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.362 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.459/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 96 millis, based on 9.459/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.362 Discarding pn space Initial because first Handshake message is being sent 9.361 -> Packet A|0|S0|da6c582d4765814684a530f9318a34d978cf54b7|59|1 StreamFrame[0(CIB),0,17,fin] 9.391 <- (2) Packet A|2|S0|64f87cb368376170|467|3 NewConnectionIdFrame[1,<0|86ebd273c8c39d550d556841da32327da2530e45|a405366333cb60d0fee4937033140c04] HandshakeDoneFrame[] CryptoFrame[0,396] 9.392 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 9.457/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 9.483/App, because ackElicitingInFlight | RTT:33/16 9.392 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.412 -> Packet A|1|S0|da6c582d4765814684a530f9318a34d978cf54b7|44|1 AckFrame[2|Δ19] 9.483 loss detection timeout handler running Sending probe 0, because no ack since 9.361. Current RTT: 33/16. 9.483 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 9.727/App, because ackElicitingInFlight | RTT:33/16 9.483 -> Packet PA|2|S0|da6c582d4765814684a530f9318a34d978cf54b7|59|1 StreamFrame[0(CIB),0,17,fin] 9.527 <- (3) Packet A|5|S0|64f87cb368376170|1061|2 AckFrame[2-0|Δ12] StreamFrame[0(CIB),0,1024,fin] 9.528 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.529 Finished downloading https://server4:443/skfhiymutf at 40:26.432 on ClientConnection[06e77bf1ad268ec7/64f87cb368376170(V1) with server4/193.167.100.100:443] 9.529 Closing ClientConnection[06e77bf1ad268ec7/64f87cb368376170(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.529 -> Packet A|3|S0|da6c582d4765814684a530f9318a34d978cf54b7|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 9.529 Creating connection with server4:443 with v1 9.530 Setting up connection for downloading https://server4:443/bcqmapsyig at 40:26.433 on ClientConnection[37b6fc72de0cd9d7/5decd8473d0d9683(V1) with server4/193.167.100.100:443] 9.530 Original destination connection id: 37b6fc72de0cd9d7 (scid: 5decd8473d0d9683) >- CryptoStream[I|ClientHello] 9.532 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.732/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.531 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.731 loss detection timeout handler running Sending probe 0, because no ack since 9.531. Current RTT: 100/25. 9.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.731 (Probe is an initial retransmit) 9.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.131/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.731 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.764 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 9.765 probe count not reset on ack because handshake not yet confirmed 9.765 Retransmitting CryptoFrame[0,257] on level Initial 9.765 Cwnd(-): 6000; inflight: 0 9.765 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.165/Initial, because peerAwaitingAddressValidation | RTT:100/25 9.765 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 9.960/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.765 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 9.764 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 9.769 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 9.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.768 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 9.772 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 9.966/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.771 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.772 Starting downloading https://server4:443/bcqmapsyig at 40:26.675 on ClientConnection[37b6fc72de0cd9d7/5decd8473d0d9683(V1) with server4/193.167.100.100:443] 9.772 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.869/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.772 Discarding pn space Initial because first Handshake message is being sent 9.772 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 9.773 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.870/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.773 -> Packet A|0|S0|4e849d1918fa38973dcab8ec38f869c0fd7ca721|59|1 StreamFrame[0(CIB),0,17,fin] 9.804 <- (2) Packet A|3|S0|5decd8473d0d9683|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 9.805 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 9.902/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 9.805 Finished downloading https://server4:443/bcqmapsyig at 40:26.708 on ClientConnection[37b6fc72de0cd9d7/5decd8473d0d9683(V1) with server4/193.167.100.100:443] 9.805 Closing ClientConnection[37b6fc72de0cd9d7/5decd8473d0d9683(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.805 -> Packet A|1|S0|4e849d1918fa38973dcab8ec38f869c0fd7ca721|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 9.806 Creating connection with server4:443 with v1 9.806 Setting up connection for downloading https://server4:443/kpzvikvlmk at 40:26.710 on ClientConnection[95bcac60593b000d/e9e8f8c8b3e24b1a(V1) with server4/193.167.100.100:443] 9.806 Original destination connection id: 95bcac60593b000d (scid: e9e8f8c8b3e24b1a) >- CryptoStream[I|ClientHello] 9.808 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.008/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.808 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.007 loss detection timeout handler running Sending probe 0, because no ack since 9.808. Current RTT: 100/25. 10.007 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.007 (Probe is an initial retransmit) 10.007 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.407/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.007 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.040 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 10.041 probe count not reset on ack because handshake not yet confirmed 10.041 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.441/Initial, because peerAwaitingAddressValidation | RTT:100/25 10.440 loss detection timeout handler running Sending probe 1, because no ack since 10.007. Current RTT: 32/16. 10.440 Sending probe because peer awaiting address validation 10.440 (Probe is Initial ping, because there is no Initial data to retransmit) 10.440 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 10.824/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 10.440 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 10.473 <- (2) Packet I|3|L|60|1 Token=[] AckFrame[2-0|Δ0] 10.473 probe count not reset on ack because handshake not yet confirmed 10.474 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 10.858/Initial, because peerAwaitingAddressValidation | RTT:32/16 10.857 loss detection timeout handler running Sending probe 2, because no ack since 10.440. Current RTT: 32/12. 10.857 Sending probe because peer awaiting address validation 10.857 (Probe is Initial ping, because there is no Initial data to retransmit) 10.857 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 11.497/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 10.857 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 11.497 loss detection timeout handler running Sending probe 3, because no ack since 10.857. Current RTT: 32/12. 11.497 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.497 (Probe is Initial ping, because there is no Initial data to retransmit) 11.497 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 12.777/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 11.497 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 11.498 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 12.778/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 11.498 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 11.531 <- (3) Packet I|7|L|60|1 Token=[] AckFrame[5-0|Δ0] 11.532 probe count not reset on ack because handshake not yet confirmed 11.532 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 12.812/Initial, because peerAwaitingAddressValidation | RTT:32/12 11.839 Discarding packet (753 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 11.840 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 12.811 loss detection timeout handler running Sending probe 4, because no ack since 11.498. Current RTT: 32/9. 12.811 Sending probe because peer awaiting address validation 12.811 (Probe is Initial ping, because there is no Initial data to retransmit) 12.812 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 14.988/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 12.812 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 12.844 <- (6) Packet I|10|L|60|1 Token=[] AckFrame[6-0|Δ0] 12.845 probe count not reset on ack because handshake not yet confirmed 12.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 15.021/Initial, because peerAwaitingAddressValidation | RTT:32/9 14.838 <- (7) Packet I|11|L|190|2 Token=[] AckFrame[6-0|Δ1993] CryptoFrame[0,123] 14.839 probe count not reset on ack because handshake not yet confirmed 14.839 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1919 millis, based on 16.759/Initial, because peerAwaitingAddressValidation | RTT:32/7 -< CryptoStream[I|ServerHello] 14.841 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 59 millis, based on 14.901/Handshake, because peerAwaitingAddressValidation | RTT:32/7 14.841 Discarding pn space Initial because first Handshake message is being sent 14.842 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 59 millis, based on 14.902/Handshake, because peerAwaitingAddressValidation | RTT:32/7 14.842 -> Packet I|7|L|1201|2 Token=[] AckFrame[11-10,7,3-2|Δ0] Padding(1137) 14.901 loss detection timeout handler running 14.901 Sending probe 0. Current RTT: 32/7. 14.901 Sending probe because peer awaiting address validation 14.901 (Probe is a handshake ping) 14.901 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 15.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 14.901 -> Packet PH|0|L|56|2 PingFrame[] Padding(2) 14.932 <- (8) Packet H|15|L|59|1 AckFrame[0|Δ0] 14.933 probe count not reset on ack because handshake not yet confirmed 14.933 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.092 <- (9) Packet H|16|L|761|2 AckFrame[0|Δ159] CryptoFrame[0,695] 15.093 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 55 millis, based on 15.151/Handshake, because ackElicitingInFlight | RTT:32/6 15.095 -> Packet H|1|L|97|2 CryptoFrame[0,36] AckFrame[15|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.096 Starting downloading https://server4:443/kpzvikvlmk at 40:31.999 on ClientConnection[95bcac60593b000d/e9e8f8c8b3e24b1a(V1) with server4/193.167.100.100:443] 15.092 <- (10) Packet H|17|L|63|2 AckFrame[0|Δ159] PingFrame[] reschedule loss detection timer for PTO over 55 millis, based on 15.151/Handshake, because ackElicitingInFlight | RTT:32/6 15.097 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 54 millis, based on 15.151/Handshake, because ackElicitingInFlight | RTT:32/6 15.096 -> [Packet H|2|L|58|1 AckFrame[17-15|Δ0], Packet A|0|S0|4438d74c04a455b3d1e19421f84226eb46d8b17c|59|1 StreamFrame[0(CIB),0,17,fin]] 15.127 <- (11) Packet A|18|S0|e9e8f8c8b3e24b1a|467|3 NewConnectionIdFrame[1,<0|2807e05d97ddf4afebcd2c9047baeb386ee7baf2|0fc81909c7d47c282142adac27f9e3cf] HandshakeDoneFrame[] CryptoFrame[0,396] 15.127 State is set to Confirmed reschedule loss detection timer for PTO over 24 millis, based on 15.151/Handshake, because ackElicitingInFlight | RTT:32/6 reschedule loss detection timer for PTO over 50 millis, based on 15.177/App, because ackElicitingInFlight | RTT:32/6 15.127 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 15.147 -> Packet A|1|S0|4438d74c04a455b3d1e19421f84226eb46d8b17c|44|1 AckFrame[18|Δ19] 15.177 loss detection timeout handler running Sending probe 0, because no ack since 15.096. Current RTT: 32/6. 15.177 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 161 millis, based on 15.339/App, because ackElicitingInFlight | RTT:32/6 15.177 -> Packet PA|2|S0|4438d74c04a455b3d1e19421f84226eb46d8b17c|59|1 StreamFrame[0(CIB),0,17,fin] 15.209 <- (12) Packet A|19|S0|e9e8f8c8b3e24b1a|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 15.210 Cwnd(-): 6000; inflight: 0 15.210 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.210 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 76 millis, based on 15.287/App, because ackElicitingInFlight | RTT:32/5 15.210 -> Packet A|3|S0|4438d74c04a455b3d1e19421f84226eb46d8b17c|59|1 StreamFrame[0(CIB),0,17,fin] 15.210 Finished downloading https://server4:443/kpzvikvlmk at 40:32.114 on ClientConnection[95bcac60593b000d/e9e8f8c8b3e24b1a(V1) with server4/193.167.100.100:443] 15.210 Closing ClientConnection[95bcac60593b000d/e9e8f8c8b3e24b1a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.211 -> Packet A|4|S0|4438d74c04a455b3d1e19421f84226eb46d8b17c|47|2 ConnectionCloseFrame[0|0|] AckFrame[19|Δ0] 15.211 Creating connection with server4:443 with v1 15.212 Setting up connection for downloading https://server4:443/fqzmzgdaxx at 40:32.115 on ClientConnection[cc8ccad71ff932b9/cd2990d2c237d61b(V1) with server4/193.167.100.100:443] 15.212 Original destination connection id: cc8ccad71ff932b9 (scid: cd2990d2c237d61b) >- CryptoStream[I|ClientHello] 15.213 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.413/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.213 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.246 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.247 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.447/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.246 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 15.249 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.346/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.249 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 15.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.348/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.251 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.252 Starting downloading https://server4:443/fqzmzgdaxx at 40:32.155 on ClientConnection[cc8ccad71ff932b9/cd2990d2c237d61b(V1) with server4/193.167.100.100:443] 15.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.252 Discarding pn space Initial because first Handshake message is being sent 15.252 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 15.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.252 -> Packet A|0|S0|4edee08b0b871032e3fec2f2bcc98a870993c826|59|1 StreamFrame[0(CIB),0,17,fin] 15.348 loss detection timeout handler running Sending probe 0, because no ack since 15.251. Current RTT: 33/16. 15.348 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.348 (Probe is a handshake retransmit) 15.349 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.543/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.349 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 15.380 <- (2) Packet A|2|S0|cd2990d2c237d61b|467|3 NewConnectionIdFrame[1,<0|4423732a50d1b493e86e3b34a6d4f68c49a68373|df6f13be30c2c98db84b54c737a9f389] HandshakeDoneFrame[] CryptoFrame[0,396] 15.380 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 15.496/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 15.374/App, because ackElicitingInFlight | RTT:33/16 15.381 Discarding pn space Handshake because HandshakeDone is received 15.381 loss detection timeout handler running Sending probe 0, because no ack since 15.252. Current RTT: 33/16. 15.381 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 15.625/App, because ackElicitingInFlight | RTT:33/16 15.381 -> Packet PA|1|S0|4edee08b0b871032e3fec2f2bcc98a870993c826|59|1 StreamFrame[0(CIB),0,17,fin] 15.400 -> Packet A|2|S0|4edee08b0b871032e3fec2f2bcc98a870993c826|44|1 AckFrame[2|Δ19] 15.412 <- (3) Packet A|3|S0|cd2990d2c237d61b|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 15.413 Cwnd(-): 6000; inflight: 0 15.413 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 15.413 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 15.523/App, because ackElicitingInFlight | RTT:33/13 15.413 -> Packet A|3|S0|4edee08b0b871032e3fec2f2bcc98a870993c826|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 15.414 Finished downloading https://server4:443/fqzmzgdaxx at 40:32.317 on ClientConnection[cc8ccad71ff932b9/cd2990d2c237d61b(V1) with server4/193.167.100.100:443] 15.414 Closing ClientConnection[cc8ccad71ff932b9/cd2990d2c237d61b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.414 -> Packet A|4|S0|4edee08b0b871032e3fec2f2bcc98a870993c826|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 15.415 Creating connection with server4:443 with v1 15.415 Setting up connection for downloading https://server4:443/dxjntmsygw at 40:32.319 on ClientConnection[990d6f6260d8ac1a/0bd894c22ea97483(V1) with server4/193.167.100.100:443] 15.415 Original destination connection id: 990d6f6260d8ac1a (scid: 0bd894c22ea97483) >- CryptoStream[I|ClientHello] 15.417 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.617/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.417 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.444 <- (4) Packet A|4|S0|cd2990d2c237d61b|31|1 AckFrame[3-1|Δ0] 15.444 -> Packet A|5|S0|4edee08b0b871032e3fec2f2bcc98a870993c826|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 15.616 loss detection timeout handler running Sending probe 0, because no ack since 15.417. Current RTT: 100/25. 15.616 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.616 (Probe is an initial retransmit) 15.616 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.016/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.616 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.649 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 15.650 probe count not reset on ack because handshake not yet confirmed 15.650 Retransmitting CryptoFrame[0,257] on level Initial 15.650 Cwnd(-): 6000; inflight: 0 15.650 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.050/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.650 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 15.844/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.650 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 15.649 <- (1) Packet H|1|L|753|1 CryptoFrame[0,695] 15.653 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.847/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.653 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 15.655 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.849/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.655 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.656 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.656 Starting downloading https://server4:443/dxjntmsygw at 40:32.559 on ClientConnection[990d6f6260d8ac1a/0bd894c22ea97483(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 15.753/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.656 Discarding pn space Initial because first Handshake message is being sent 15.656 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 15.656 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.753/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.656 -> Packet A|0|S0|65abb202cc8a193ec57d9607e9179c1a9f6fe47c|59|1 StreamFrame[0(CIB),0,17,fin] 15.683 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.752 loss detection timeout handler running Sending probe 0, because no ack since 15.655. Current RTT: 33/16. 15.752 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.752 (Probe is a handshake retransmit) 15.753 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.947/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.752 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 15.946 loss detection timeout handler running Sending probe 1, because no ack since 15.656. Current RTT: 33/16. 15.946 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.946 (Probe is a handshake retransmit) 15.946 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.334/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.946 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 15.947 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 16.335/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.947 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 16.334 loss detection timeout handler running Sending probe 2, because no ack since 15.656. Current RTT: 33/16. 16.334 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.334 (Probe is a handshake retransmit) 16.335 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 17.111/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.335 -> Packet PH|5|L|92|1 CryptoFrame[0,36] 16.336 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 17.112/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.336 -> Packet PH|6|L|92|1 CryptoFrame[0,36] 16.712 <- (3) Packet A|5|S0|0bd894c22ea97483|475|4 AckFrame[0|Δ1025] NewConnectionIdFrame[1,<0|767dc54c331733eedce56a0819343a8479665241|c39d9a8dc43b82f393318bde0b0942c2] HandshakeDoneFrame[] CryptoFrame[0,396] 16.713 probe count not reset on ack because handshake not yet confirmed 16.713 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 17.489/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.713 State is set to Confirmed reschedule loss detection timer for PTO over 9270 millis, based on 25.984/Handshake, because ackElicitingInFlight | RTT:158/262 16.714 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.714 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 16.733 -> Packet A|1|S0|65abb202cc8a193ec57d9607e9179c1a9f6fe47c|44|1 AckFrame[5|Δ19] 16.946 <- (4) Packet A|7|S0|0bd894c22ea97483|1103|3 AckFrame[1|Δ181] NewConnectionIdFrame[1,<0|767dc54c331733eedce56a0819343a8479665241|c39d9a8dc43b82f393318bde0b0942c2] StreamFrame[0(CIB),0,1024,fin] 16.947 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.947 Finished downloading https://server4:443/dxjntmsygw at 40:33.851 on ClientConnection[990d6f6260d8ac1a/0bd894c22ea97483(V1) with server4/193.167.100.100:443] 16.947 Closing ClientConnection[990d6f6260d8ac1a/0bd894c22ea97483(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.948 -> Packet A|2|S0|65abb202cc8a193ec57d9607e9179c1a9f6fe47c|47|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 16.948 Creating connection with server4:443 with v1 16.949 Setting up connection for downloading https://server4:443/arqyaulexb at 40:33.852 on ClientConnection[8547d2ebed59338f/d7ca633e2b08aafd(V1) with server4/193.167.100.100:443] 16.949 Original destination connection id: 8547d2ebed59338f (scid: d7ca633e2b08aafd) >- CryptoStream[I|ClientHello] 16.950 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.150/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.950 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.149 loss detection timeout handler running Sending probe 0, because no ack since 16.950. Current RTT: 100/25. 17.149 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.149 (Probe is an initial retransmit) 17.150 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.550/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.149 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.549 loss detection timeout handler running Sending probe 1, because no ack since 17.149. Current RTT: 100/25. 17.549 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.549 (Probe is an initial retransmit) 17.549 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.349/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.549 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.350/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.550 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.582 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 17.583 probe count not reset on ack because handshake not yet confirmed 17.583 Retransmitting CryptoFrame[0,257] on level Initial 17.583 Cwnd(-): 6000; inflight: 1200 17.583 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.383/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.583 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 17.971/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.583 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 17.582 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 17.586 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 17.974/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.586 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 17.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 17.977/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.588 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.686/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.589 Discarding pn space Initial because first Handshake message is being sent 17.589 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 17.589 Starting downloading https://server4:443/arqyaulexb at 40:34.492 on ClientConnection[8547d2ebed59338f/d7ca633e2b08aafd(V1) with server4/193.167.100.100:443] 17.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.687/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.590 -> Packet A|0|S0|8b291b62c36a329d6d98514f4cfc87ad53c5e4aa|59|1 StreamFrame[0(CIB),0,17,fin] 17.616 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 17.621 <- (3) Packet A|4|S0|d7ca633e2b08aafd|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 17.622 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.719/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.622 Finished downloading https://server4:443/arqyaulexb at 40:34.526 on ClientConnection[8547d2ebed59338f/d7ca633e2b08aafd(V1) with server4/193.167.100.100:443] 17.622 Closing ClientConnection[8547d2ebed59338f/d7ca633e2b08aafd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.623 Creating connection with server4:443 with v1 17.623 -> Packet A|1|S0|8b291b62c36a329d6d98514f4cfc87ad53c5e4aa|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 17.623 Setting up connection for downloading https://server4:443/deglwlrtlo at 40:34.527 on ClientConnection[281cfa06808dd7af/f8bf07953dc2dc3a(V1) with server4/193.167.100.100:443] 17.623 Original destination connection id: 281cfa06808dd7af (scid: f8bf07953dc2dc3a) >- CryptoStream[I|ClientHello] 17.625 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.825/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.624 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.657 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 17.658 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.858/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.657 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 17.660 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.757/Handshake, because peerAwaitingAddressValidation | RTT:33/16 17.660 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.662 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.759/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.662 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.662 Starting downloading https://server4:443/deglwlrtlo at 40:34.566 on ClientConnection[281cfa06808dd7af/f8bf07953dc2dc3a(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 17.759/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.662 Discarding pn space Initial because first Handshake message is being sent 17.662 -> Packet H|0|L|92|1 CryptoFrame[0,36] 17.662 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 17.663 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.760/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.663 -> Packet A|0|S0|f696f0ad1fe1d52ae3816449aef01d0db4674c9f|59|1 StreamFrame[0(CIB),0,17,fin] 17.694 <- (2) Packet A|3|S0|f8bf07953dc2dc3a|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 17.695 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.792/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.695 Finished downloading https://server4:443/deglwlrtlo at 40:34.598 on ClientConnection[281cfa06808dd7af/f8bf07953dc2dc3a(V1) with server4/193.167.100.100:443] 17.695 Closing ClientConnection[281cfa06808dd7af/f8bf07953dc2dc3a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.695 -> Packet A|1|S0|f696f0ad1fe1d52ae3816449aef01d0db4674c9f|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 17.695 Creating connection with server4:443 with v1 17.696 Setting up connection for downloading https://server4:443/vhrbgnhgxu at 40:34.599 on ClientConnection[4dba9566a76b3feb/63794a0d6eb52214(V1) with server4/193.167.100.100:443] 17.696 Original destination connection id: 4dba9566a76b3feb (scid: 63794a0d6eb52214) >- CryptoStream[I|ClientHello] 17.697 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.897/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.697 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.730 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 17.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.931/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.730 <- (1) Packet H|1|L|753|1 CryptoFrame[0,695] 17.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.830/Handshake, because peerAwaitingAddressValidation | RTT:33/16 17.733 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 17.735 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.832/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.735 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.736 Starting downloading https://server4:443/vhrbgnhgxu at 40:34.639 on ClientConnection[4dba9566a76b3feb/63794a0d6eb52214(V1) with server4/193.167.100.100:443] 17.736 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.833/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.736 Discarding pn space Initial because first Handshake message is being sent 17.736 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 17.736 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.833/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.736 -> Packet A|0|S0|3b2751148f1e66a62ff7f2ccb9f10135c91277de|59|1 StreamFrame[0(CIB),0,17,fin] 17.766 <- (2) Packet A|2|S0|63794a0d6eb52214|467|3 NewConnectionIdFrame[1,<0|ad03fe220925ee3f26901e229cea08f4f09fe298|0a281659745f56ff4cefb2d059ef8d56] HandshakeDoneFrame[] CryptoFrame[0,396] 17.767 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 17.832/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 17.858/App, because ackElicitingInFlight | RTT:33/16 17.767 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.768 <- (3) Packet A|3|S0|63794a0d6eb52214|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 17.768 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.768 Finished downloading https://server4:443/vhrbgnhgxu at 40:34.672 on ClientConnection[4dba9566a76b3feb/63794a0d6eb52214(V1) with server4/193.167.100.100:443] 17.768 -> Packet A|1|S0|3b2751148f1e66a62ff7f2ccb9f10135c91277de|43|1 AckFrame[3-2|Δ0] 17.768 Closing ClientConnection[4dba9566a76b3feb/63794a0d6eb52214(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.769 Creating connection with server4:443 with v1 17.769 -> Packet A|2|S0|3b2751148f1e66a62ff7f2ccb9f10135c91277de|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 17.769 Setting up connection for downloading https://server4:443/bclkqckjqc at 40:34.673 on ClientConnection[5452ae9be423ac36/5812596da365cae7(V1) with server4/193.167.100.100:443] 17.769 Original destination connection id: 5452ae9be423ac36 (scid: 5812596da365cae7) >- CryptoStream[I|ClientHello] 17.771 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.971/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.771 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.970 loss detection timeout handler running Sending probe 0, because no ack since 17.771. Current RTT: 100/25. 17.970 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.970 (Probe is an initial retransmit) 17.971 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.371/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.971 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.370 loss detection timeout handler running Sending probe 1, because no ack since 17.971. Current RTT: 100/25. 18.370 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.370 (Probe is an initial retransmit) 18.370 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.170/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.370 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.371 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.171/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.371 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.403 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[2-1|Δ0] 18.403 probe count not reset on ack because handshake not yet confirmed 18.404 Retransmitting CryptoFrame[0,257] on level Initial 18.404 Cwnd(-): 6000; inflight: 1200 18.404 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.204/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.404 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 18.788/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 18.404 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) 18.436 <- (2) Packet I|3|L|62|1 Token=[] AckFrame[4,2-1|Δ0] 18.437 probe count not reset on ack because handshake not yet confirmed 18.437 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 18.821/Initial, because peerAwaitingAddressValidation | RTT:32/16 18.820 loss detection timeout handler running Sending probe 2, because no ack since 18.404. Current RTT: 32/12. 18.820 Sending probe because peer awaiting address validation 18.820 (Probe is Initial ping, because there is no Initial data to retransmit) 18.821 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 19.461/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 18.820 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 19.004 <- (3) Packet I|4|L|192|2 Token=[] AckFrame[4,2-1|Δ567] CryptoFrame[0,123] 19.004 probe count not reset on ack because handshake not yet confirmed 19.004 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 19.644/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 -< CryptoStream[I|ServerHello] 19.007 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 19.087/Handshake, because peerAwaitingAddressValidation | RTT:32/12 19.007 Discarding pn space Initial because first Handshake message is being sent 19.007 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 19.087/Handshake, because peerAwaitingAddressValidation | RTT:32/12 19.007 -> Packet I|6|L|1201|2 Token=[] AckFrame[4-2|Δ0] Padding(1141) 19.086 loss detection timeout handler running 19.086 Sending probe 0. Current RTT: 32/12. 19.086 Sending probe because peer awaiting address validation 19.086 (Probe is a handshake ping) 19.087 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 159 millis, based on 19.247/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 19.087 -> Packet PH|0|L|56|2 PingFrame[] Padding(2) 19.117 <- (4) Packet H|7|L|59|1 AckFrame[0|Δ0] 19.118 probe count not reset on ack because handshake not yet confirmed 19.118 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.257 <- (5) Packet H|8|L|763|2 AckFrame[0|Δ138] CryptoFrame[0,697] 19.257 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 71 millis, based on 19.332/Handshake, because ackElicitingInFlight | RTT:32/10 19.260 -> Packet H|1|L|97|2 CryptoFrame[0,36] AckFrame[7|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.261 Starting downloading https://server4:443/bclkqckjqc at 40:36.164 on ClientConnection[5452ae9be423ac36/5812596da365cae7(V1) with server4/193.167.100.100:443] 19.257 <- (6) Packet H|9|L|63|2 AckFrame[0|Δ138] PingFrame[] 19.261 -> Packet H|2|L|58|1 AckFrame[8-7|Δ0] reschedule loss detection timer for PTO over 71 millis, based on 19.332/Handshake, because ackElicitingInFlight | RTT:32/10 19.261 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 70 millis, based on 19.332/Handshake, because ackElicitingInFlight | RTT:32/10 19.261 -> Packet A|0|S0|3503c11f054af0127c3ced005333f5a95d81f930|59|1 StreamFrame[0(CIB),0,17,fin] 19.262 -> Packet H|3|L|58|1 AckFrame[9-7|Δ0] 19.292 <- (7) Packet A|10|S0|5812596da365cae7|467|3 NewConnectionIdFrame[1,<0|be30030ebd4845dc8739bce0a10c0a27b68b74ec|73920ca9434991a798fbba9543565e00] HandshakeDoneFrame[] CryptoFrame[0,396] 19.292 State is set to Confirmed reschedule loss detection timer for PTO over 40 millis, based on 19.332/Handshake, because ackElicitingInFlight | RTT:32/10 reschedule loss detection timer for PTO over 66 millis, based on 19.358/App, because ackElicitingInFlight | RTT:32/10 19.292 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 19.293 <- (8) Packet A|11|S0|5812596da365cae7|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 19.293 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.293 -> Packet A|1|S0|3503c11f054af0127c3ced005333f5a95d81f930|43|1 AckFrame[11-10|Δ0] 19.293 Finished downloading https://server4:443/bclkqckjqc at 40:36.197 on ClientConnection[5452ae9be423ac36/5812596da365cae7(V1) with server4/193.167.100.100:443] 19.293 Closing ClientConnection[5452ae9be423ac36/5812596da365cae7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.294 -> Packet A|2|S0|3503c11f054af0127c3ced005333f5a95d81f930|47|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 19.294 Creating connection with server4:443 with v1 19.294 Setting up connection for downloading https://server4:443/euslmilcub at 40:36.198 on ClientConnection[2e23f3f9c4b81c88/7995e8184665b5a4(V1) with server4/193.167.100.100:443] 19.295 Original destination connection id: 2e23f3f9c4b81c88 (scid: 7995e8184665b5a4) >- CryptoStream[I|ClientHello] 19.296 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.496/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.296 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.329 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.329 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.530/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.329 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 19.332 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.429/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.332 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 19.335 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 19.432/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.335 Starting downloading https://server4:443/euslmilcub at 40:36.238 on ClientConnection[2e23f3f9c4b81c88/7995e8184665b5a4(V1) with server4/193.167.100.100:443] 19.335 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.335 -> Packet H|0|L|92|1 CryptoFrame[0,36] reschedule loss detection timer for PTO over 96 millis, based on 19.432/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.335 Discarding pn space Initial because first Handshake message is being sent 19.335 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 19.335 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.432/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.335 -> Packet A|0|S0|77b9e54f01fe7161c0839d10d33103699af698b8|59|1 StreamFrame[0(CIB),0,17,fin] 19.431 loss detection timeout handler running Sending probe 0, because no ack since 19.335. Current RTT: 33/16. 19.432 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.432 (Probe is a handshake retransmit) 19.432 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.626/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.432 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 19.436 <- (2) Packet H|2|L|755|1 CryptoFrame[0,697] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.438 -> Packet H|3|L|58|1 AckFrame[2-1|Δ0] 19.463 <- (3) Packet A|3|S0|7995e8184665b5a4|467|3 NewConnectionIdFrame[1,<0|6ffc17e5d8697f494e08f4ecdc540a16f8ed95ca|62d9833fd376715b73fbbde0dcb2d1fc] HandshakeDoneFrame[] CryptoFrame[0,396] 19.463 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 19.579/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 19.457/App, because ackElicitingInFlight | RTT:33/16 19.464 Discarding pn space Handshake because HandshakeDone is received 19.464 loss detection timeout handler running Sending probe 0, because no ack since 19.335. Current RTT: 33/16. 19.464 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 19.708/App, because ackElicitingInFlight | RTT:33/16 19.464 -> Packet PA|1|S0|77b9e54f01fe7161c0839d10d33103699af698b8|59|1 StreamFrame[0(CIB),0,17,fin] 19.483 -> Packet A|2|S0|77b9e54f01fe7161c0839d10d33103699af698b8|44|1 AckFrame[3|Δ19] 19.495 <- (4) Packet A|4|S0|7995e8184665b5a4|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 19.496 Cwnd(-): 6000; inflight: 0 19.496 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.496 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 19.606/App, because ackElicitingInFlight | RTT:33/13 19.496 -> Packet A|3|S0|77b9e54f01fe7161c0839d10d33103699af698b8|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 19.496 Finished downloading https://server4:443/euslmilcub at 40:36.400 on ClientConnection[2e23f3f9c4b81c88/7995e8184665b5a4(V1) with server4/193.167.100.100:443] 19.496 Closing ClientConnection[2e23f3f9c4b81c88/7995e8184665b5a4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.496 -> Packet A|4|S0|77b9e54f01fe7161c0839d10d33103699af698b8|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 19.497 Creating connection with server4:443 with v1 19.497 Setting up connection for downloading https://server4:443/wbfqzbmype at 40:36.401 on ClientConnection[457b7cf1fdab3db3/24a06dfab1d26331(V1) with server4/193.167.100.100:443] 19.497 Original destination connection id: 457b7cf1fdab3db3 (scid: 24a06dfab1d26331) >- CryptoStream[I|ClientHello] 19.499 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.699/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.499 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.698 loss detection timeout handler running Sending probe 0, because no ack since 19.499. Current RTT: 100/25. 19.698 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.698 (Probe is an initial retransmit) 19.698 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.098/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.698 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.098 loss detection timeout handler running Sending probe 1, because no ack since 19.698. Current RTT: 100/25. 20.098 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.098 (Probe is an initial retransmit) 20.098 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.898/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.098 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.099 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 20.899/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.099 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.898 loss detection timeout handler running Sending probe 2, because no ack since 20.099. Current RTT: 100/25. 20.898 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.898 (Probe is an initial retransmit) 20.899 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 22.499/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.899 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.900 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 22.500/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.900 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.130 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 22.499 loss detection timeout handler running Sending probe 3, because no ack since 20.900. Current RTT: 100/25. 22.499 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.499 (Probe is an initial retransmit) 22.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3199 millis, based on 25.700/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.499 -> Packet PI|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3199 millis, based on 25.701/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.500 -> Packet PI|7|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.532 <- (2) Packet I|5|L|62|1 Token=[] AckFrame[6,2|Δ0] 22.533 probe count not reset on ack because handshake not yet confirmed 22.533 Retransmitting CryptoFrame[0,257] on level Initial 22.533 Cwnd(-): 6000; inflight: 1200 22.533 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3199 millis, based on 25.733/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.533 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1535 millis, based on 24.069/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.533 -> Packet I|8|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) 22.533 <- (3) Packet I|6|L|62|1 Token=[] AckFrame[7-6,2|Δ0] 22.533 probe count not reset on ack because handshake not yet confirmed 22.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1535 millis, based on 24.070/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.566 <- (4) Packet I|7|L|62|1 Token=[] AckFrame[8-6,2|Δ0] 22.566 probe count not reset on ack because handshake not yet confirmed 22.566 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 23.846/Initial, because peerAwaitingAddressValidation | RTT:32/12 23.845 loss detection timeout handler running Sending probe 4, because no ack since 22.533. Current RTT: 32/9. 23.845 Sending probe because peer awaiting address validation 23.845 (Probe is Initial ping, because there is no Initial data to retransmit) 23.846 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 26.022/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 23.846 -> Packet PI|9|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 23.879 <- (5) Packet I|8|L|62|1 Token=[] AckFrame[9-6,2|Δ0] 23.879 probe count not reset on ack because handshake not yet confirmed 23.879 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 26.055/Initial, because peerAwaitingAddressValidation | RTT:32/9 25.130 <- (6) Packet I|10|L|66|2 Token=[] AckFrame[9-6,2|Δ1250] PingFrame[] 25.131 probe count not reset on ack because handshake not yet confirmed 25.131 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1919 millis, based on 27.051/Initial, because peerAwaitingAddressValidation | RTT:32/7 25.131 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1919 millis, based on 27.051/Initial, because peerAwaitingAddressValidation | RTT:32/7 25.131 -> Packet I|10|L|1201|2 Token=[] AckFrame[10,8-5|Δ0] Padding(1139) 27.050 loss detection timeout handler running Sending probe 5, because no ack since 23.846. Current RTT: 32/7. 27.051 Sending probe because peer awaiting address validation 27.051 (Probe is Initial ping, because there is no Initial data to retransmit) 27.051 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 30.891/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 27.051 -> Packet PI|11|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 30.126 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 30.890 loss detection timeout handler running Sending probe 6, because no ack since 27.051. Current RTT: 32/7. 30.890 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.890 (Probe is Initial ping, because there is no Initial data to retransmit) 30.891 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 7679 millis, based on 38.571/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 30.891 -> Packet PI|12|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 30.892 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 7679 millis, based on 38.572/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 30.892 -> Packet PI|13|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 30.924 <- (8) Packet I|14|L|66|1 Token=[] AckFrame[13,11,9-6,2|Δ0] 30.925 probe count not reset on ack because handshake not yet confirmed 30.925 Cwnd(-): 3000; inflight: 1201 30.926 loss detection timeout handler running 30.926 loss detection timeout handler running 30.926 loss detection timeout handler running 30.926 loss detection timeout handler running 30.926 loss detection timeout handler running 30.926 loss detection timeout handler running 30.926 loss detection timeout handler running 30.926 loss detection timeout handler running 30.926 loss detection timeout handler running 30.926 loss detection timeout handler running 30.926 loss detection timeout handler running 30.926 loss detection timeout handler running 30.927 loss detection timeout handler running 30.927 loss detection timeout handler running 30.927 loss detection timeout handler running 30.927 loss detection timeout handler running 30.927 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 6655 millis, based on 37.583/Initial, because peerAwaitingAddressValidation | RTT:32/5 37.582 loss detection timeout handler running Sending probe 7, because no ack since 30.892. Current RTT: 32/5. 37.582 Sending probe because peer awaiting address validation 37.582 (Probe is Initial ping, because there is no Initial data to retransmit) 37.583 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 13311 millis, based on 50.895/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 37.583 -> Packet PI|14|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 41.117 <- (9) Packet I|15|L|196|2 Token=[] AckFrame[13,11,9-6,2|Δ10192] CryptoFrame[0,123] 41.118 probe count not reset on ack because handshake not yet confirmed 41.118 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 13311 millis, based on 54.430/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 -< CryptoStream[I|ServerHello] 41.121 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 51 millis, based on 41.173/Handshake, because peerAwaitingAddressValidation | RTT:32/5 41.121 Discarding pn space Initial because first Handshake message is being sent 41.121 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 51 millis, based on 41.173/Handshake, because peerAwaitingAddressValidation | RTT:32/5 41.121 -> Packet I|15|L|1201|2 Token=[] AckFrame[15-14,10,8-5|Δ0] Padding(1137) 41.154 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 41.154 <- (11) Packet H|18|L|753|1 CryptoFrame[0,695] >- CryptoStream[H|Finished] 41.157 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 51 millis, based on 41.209/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 41.157 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 41.157 Starting downloading https://server4:443/wbfqzbmype at 40:58.061 on ClientConnection[457b7cf1fdab3db3/24a06dfab1d26331(V1) with server4/193.167.100.100:443] 41.157 -> Packet H|1|L|58|1 AckFrame[18|Δ0] 41.158 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 51 millis, based on 41.210/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 41.158 -> Packet A|0|S0|8ae927e3c5e051f5afbaa92df45096bad951434d|59|1 StreamFrame[0(CIB),0,17,fin] 41.209 loss detection timeout handler running Sending probe 0, because no ack since 41.157. Current RTT: 32/5. 41.209 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 41.209 (Probe is a handshake retransmit) 41.209 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 103 millis, based on 41.313/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 41.209 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 41.312 loss detection timeout handler running Sending probe 1, because no ack since 41.158. Current RTT: 32/5. 41.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 41.312 (Probe is a handshake retransmit) 41.313 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 207 millis, based on 41.521/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 41.313 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 41.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 207 millis, based on 41.522/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 41.314 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 41.501 <- (12) Packet A|20|S0|24a06dfab1d26331|467|3 NewConnectionIdFrame[1,<0|3a4ba188cf6b917d89cf5941ef1e70224f1f5b63|57163fa3a8812c411419b296812b0b65] HandshakeDoneFrame[] CryptoFrame[0,396] 41.502 State is set to Confirmed reschedule loss detection timer for PTO over -36 millis, based on 41.466/App, because ackElicitingInFlight | RTT:32/5 41.502 loss detection timeout handler running Sending probe 2, because no ack since 41.158. Current RTT: 32/5. 41.502 (Probe is a handshake ping) reschedule loss detection timer for PTO over -267 millis, based on 41.235/App, because ackElicitingInFlight | RTT:32/5 41.502 Discarding pn space Handshake because HandshakeDone is received 41.502 Attempt to send probe on discarded space (Handshake) => ignoring -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 41.503 Attempt to send probe on discarded space (Handshake) => ignoring 41.504 loss detection timeout handler running Sending probe 0, because no ack since 41.158. Current RTT: 32/5. 41.505 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 153 millis, based on 41.659/App, because ackElicitingInFlight | RTT:32/5 41.505 -> Packet PA|1|S0|8ae927e3c5e051f5afbaa92df45096bad951434d|59|1 StreamFrame[0(CIB),0,17,fin] 41.522 -> Packet A|2|S0|8ae927e3c5e051f5afbaa92df45096bad951434d|44|1 AckFrame[20|Δ19] 41.658 loss detection timeout handler running Sending probe 1, because no ack since 41.505. Current RTT: 32/5. 41.658 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 307 millis, based on 41.966/App, because ackElicitingInFlight | RTT:32/5 41.658 -> Packet PA|3|S0|8ae927e3c5e051f5afbaa92df45096bad951434d|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 307 millis, based on 41.967/App, because ackElicitingInFlight | RTT:32/5 41.659 -> Packet PA|4|S0|8ae927e3c5e051f5afbaa92df45096bad951434d|59|1 StreamFrame[0(CIB),0,17,fin] 41.690 <- (13) Packet A|21|S0|24a06dfab1d26331|1060|2 AckFrame[3|Δ0] StreamFrame[0(CIB),0,1024,fin] 41.690 Cwnd(-): 2400; inflight: 59 41.690 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 45 millis, based on 41.736/App, because ackElicitingInFlight | RTT:32/5 reschedule loss detection timer for PTO over 72 millis, based on 41.764/App, because ackElicitingInFlight | RTT:32/4 41.691 -> Packet A|5|S0|8ae927e3c5e051f5afbaa92df45096bad951434d|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[20|Δ0] 41.691 Finished downloading https://server4:443/wbfqzbmype at 40:58.594 on ClientConnection[457b7cf1fdab3db3/24a06dfab1d26331(V1) with server4/193.167.100.100:443] 41.691 Closing ClientConnection[457b7cf1fdab3db3/24a06dfab1d26331(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 41.691 -> Packet A|6|S0|8ae927e3c5e051f5afbaa92df45096bad951434d|47|2 ConnectionCloseFrame[0|0|] AckFrame[21-20|Δ0] 41.692 Creating connection with server4:443 with v1 41.692 Setting up connection for downloading https://server4:443/yraqyojaxk at 40:58.596 on ClientConnection[9863df347d268d16/b6522d4c87ca775b(V1) with server4/193.167.100.100:443] 41.692 Original destination connection id: 9863df347d268d16 (scid: b6522d4c87ca775b) >- CryptoStream[I|ClientHello] 41.694 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 41.894/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.694 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.893 loss detection timeout handler running Sending probe 0, because no ack since 41.694. Current RTT: 100/25. 41.894 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 41.894 (Probe is an initial retransmit) 41.894 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 42.294/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.894 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.293 loss detection timeout handler running Sending probe 1, because no ack since 41.894. Current RTT: 100/25. 42.293 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 42.293 (Probe is an initial retransmit) 42.293 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 43.093/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.293 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.294 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 43.094/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.294 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.326 <- (1) Packet I|2|L|62|1 Token=[] AckFrame[2,0|Δ0] 42.326 probe count not reset on ack because handshake not yet confirmed 42.327 Cwnd(-): 6000; inflight: 1200 42.327 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 43.127/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.327 <- (2) Packet I|3|L|62|1 Token=[] AckFrame[3-2,0|Δ0] 42.327 probe count not reset on ack because handshake not yet confirmed 42.327 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 42.711/Initial, because peerAwaitingAddressValidation | RTT:32/16 42.710 loss detection timeout handler running Sending probe 2, because no ack since 42.294. Current RTT: 32/12. 42.711 Sending probe because peer awaiting address validation 42.711 (Probe is Initial ping, because there is no Initial data to retransmit) 42.711 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 43.351/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 42.711 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 42.744 <- (3) Packet I|5|L|62|1 Token=[] AckFrame[4-2,0|Δ0] 42.744 probe count not reset on ack because handshake not yet confirmed 42.744 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 43.384/Initial, because peerAwaitingAddressValidation | RTT:32/12 43.383 loss detection timeout handler running Sending probe 3, because no ack since 42.711. Current RTT: 32/9. 43.383 Sending probe because peer awaiting address validation 43.383 (Probe is Initial ping, because there is no Initial data to retransmit) 43.383 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1087 millis, based on 44.471/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 43.383 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 43.725 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 44.471 loss detection timeout handler running Sending probe 4, because no ack since 43.383. Current RTT: 32/9. 44.471 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 44.471 (Probe is Initial ping, because there is no Initial data to retransmit) 44.471 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 46.647/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 44.471 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 44.472 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 46.648/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 44.472 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 44.504 <- (5) Packet I|9|L|62|1 Token=[] AckFrame[6-2,0|Δ0] 44.504 probe count not reset on ack because handshake not yet confirmed 44.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 46.681/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 46.680 loss detection timeout handler running Sending probe 5, because no ack since 44.472. Current RTT: 32/7. 46.680 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 46.680 (Probe is Initial ping, because there is no Initial data to retransmit) 46.680 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 50.520/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 46.680 -> Packet PI|8|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 46.681 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 50.521/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 46.681 -> Packet PI|9|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 46.714 <- (6) Packet I|10|L|64|1 Token=[] AckFrame[9,6-2,0|Δ0] 46.714 probe count not reset on ack because handshake not yet confirmed 46.714 Cwnd(-): 3000; inflight: 1201 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 loss detection timeout handler running 46.716 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3327 millis, based on 50.044/Initial, because peerAwaitingAddressValidation | RTT:32/5 46.724 <- (7) Packet I|11|L|192|2 Token=[] AckFrame[9,6-2,0|Δ10] CryptoFrame[0,123] 46.725 probe count not reset on ack because handshake not yet confirmed 46.725 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3327 millis, based on 50.053/Initial, because peerAwaitingAddressValidation | RTT:32/5 -< CryptoStream[I|ServerHello] 46.727 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 51 millis, based on 46.779/Handshake, because peerAwaitingAddressValidation | RTT:32/5 46.727 Discarding pn space Initial because first Handshake message is being sent 46.727 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 46.727 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 51 millis, based on 46.779/Handshake, because peerAwaitingAddressValidation | RTT:32/5 46.727 -> Packet I|10|L|1201|2 Token=[] AckFrame[11-9,5,3-2|Δ0] Padding(1137) 46.779 loss detection timeout handler running 46.779 Sending probe 0. Current RTT: 32/5. 46.779 Sending probe because peer awaiting address validation 46.779 (Probe is a handshake ping) 46.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 103 millis, based on 46.883/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 46.779 -> Packet PH|0|L|56|2 PingFrame[] Padding(2) 46.882 loss detection timeout handler running Sending probe 1, because no ack since 46.779. Current RTT: 32/5. 46.882 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 46.882 (Probe is a handshake ping) 46.882 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 207 millis, based on 47.091/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 46.882 -> Packet PH|1|L|56|2 PingFrame[] Padding(2) 46.884 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 207 millis, based on 47.092/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 46.883 -> Packet PH|2|L|56|2 PingFrame[] Padding(2) 46.913 <- (9) Packet H|16|L|59|1 AckFrame[1-0|Δ0] 46.914 probe count not reset on ack because handshake not yet confirmed reschedule loss detection timer for PTO over 177 millis, based on 47.091/Handshake, because ackElicitingInFlight | RTT:32/5 46.975 <- (10) Packet H|19|L|61|2 AckFrame[2-0|Δ60] PingFrame[] 46.975 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 46.976 -> Packet H|3|L|60|1 AckFrame[19,16|Δ0] 47.007 <- (11) Packet H|20|L|760|2 AckFrame[3|Δ0] CryptoFrame[0,697] 47.007 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 110 millis, based on 47.121/Handshake, because ackElicitingInFlight | RTT:39/18 47.010 -> Packet H|4|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 47.011 Starting downloading https://server4:443/yraqyojaxk at 41:03.914 on ClientConnection[9863df347d268d16/b6522d4c87ca775b(V1) with server4/193.167.100.100:443] 47.011 -> Packet H|5|L|58|1 AckFrame[20|Δ0] 47.011 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 109 millis, based on 47.121/Handshake, because ackElicitingInFlight | RTT:39/18 47.011 -> Packet A|0|S0|3927d3597d0035d72a2c6b66c97a1f4e4c39dfe3|59|1 StreamFrame[0(CIB),0,17,fin] 47.120 loss detection timeout handler running Sending probe 0, because no ack since 47.010. Current RTT: 39/18. 47.120 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 47.120 (Probe is a handshake retransmit) 47.121 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 221 millis, based on 47.343/Handshake, because ackElicitingInFlight | RTT:39/18 47.121 -> Packet PH|6|L|92|1 CryptoFrame[0,36] 47.152 <- (12) Packet A|22|S0|b6522d4c87ca775b|467|3 NewConnectionIdFrame[1,<0|7643b8c3fa3ab9b26b8fc7e235c42509f5c9c51d|bc329811e752ed8c23327c575cda75f3] HandshakeDoneFrame[] CryptoFrame[0,396] 47.152 State is set to Confirmed reschedule loss detection timer for PTO over 130 millis, based on 47.283/App, because ackElicitingInFlight | RTT:39/18 reschedule loss detection timer for PTO over -5 millis, based on 47.147/App, because ackElicitingInFlight | RTT:39/18 47.152 Discarding pn space Handshake because HandshakeDone is received 47.152 loss detection timeout handler running Sending probe 0, because no ack since 47.011. Current RTT: 39/18. 47.152 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 271 millis, based on 47.425/App, because ackElicitingInFlight | RTT:39/18 47.153 -> Packet PA|1|S0|3927d3597d0035d72a2c6b66c97a1f4e4c39dfe3|59|1 StreamFrame[0(CIB),0,17,fin] 47.172 -> Packet A|2|S0|3927d3597d0035d72a2c6b66c97a1f4e4c39dfe3|44|1 AckFrame[22|Δ19] 47.424 loss detection timeout handler running Sending probe 1, because no ack since 47.153. Current RTT: 39/18. 47.424 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 543 millis, based on 47.968/App, because ackElicitingInFlight | RTT:39/18 47.424 -> Packet PA|3|S0|3927d3597d0035d72a2c6b66c97a1f4e4c39dfe3|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 543 millis, based on 47.969/App, because ackElicitingInFlight | RTT:39/18 47.425 -> Packet PA|4|S0|3927d3597d0035d72a2c6b66c97a1f4e4c39dfe3|59|1 StreamFrame[0(CIB),0,17,fin] 47.456 <- (13) Packet A|23|S0|b6522d4c87ca775b|1060|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] 47.456 Cwnd(-): 2400; inflight: 59 47.456 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 104 millis, based on 47.561/App, because ackElicitingInFlight | RTT:39/18 reschedule loss detection timer for PTO over 126 millis, based on 47.584/App, because ackElicitingInFlight | RTT:38/16 47.456 <- (14) Packet A|24|S0|b6522d4c87ca775b|31|1 AckFrame[4-2|Δ0] 47.457 -> Packet A|5|S0|3927d3597d0035d72a2c6b66c97a1f4e4c39dfe3|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 126 millis, based on 47.584/App, because ackElicitingInFlight | RTT:38/16 47.457 Finished downloading https://server4:443/yraqyojaxk at 41:04.360 on ClientConnection[9863df347d268d16/b6522d4c87ca775b(V1) with server4/193.167.100.100:443] 47.457 Closing ClientConnection[9863df347d268d16/b6522d4c87ca775b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 47.458 Creating connection with server4:443 with v1 47.458 -> Packet A|6|S0|3927d3597d0035d72a2c6b66c97a1f4e4c39dfe3|47|2 ConnectionCloseFrame[0|0|] AckFrame[24-23|Δ0] 47.458 Setting up connection for downloading https://server4:443/qrochhpfzq at 41:04.362 on ClientConnection[80560f5bcccaa2b6/ca3bcf4464a6dea5(V1) with server4/193.167.100.100:443] 47.458 Original destination connection id: 80560f5bcccaa2b6 (scid: ca3bcf4464a6dea5) >- CryptoStream[I|ClientHello] 47.460 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 47.660/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 47.460 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 47.659 loss detection timeout handler running Sending probe 0, because no ack since 47.460. Current RTT: 100/25. 47.659 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 47.659 (Probe is an initial retransmit) 47.660 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 48.060/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 47.660 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 47.693 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 47.693 probe count not reset on ack because handshake not yet confirmed 47.693 Retransmitting CryptoFrame[0,257] on level Initial 47.693 Cwnd(-): 6000; inflight: 0 47.694 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 48.094/Initial, because peerAwaitingAddressValidation | RTT:100/25 47.694 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 47.888/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.694 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 47.693 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 47.696 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 47.890/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.696 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 47.698 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 47.892/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.698 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 47.698 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 47.698 Starting downloading https://server4:443/qrochhpfzq at 41:04.602 on ClientConnection[80560f5bcccaa2b6/ca3bcf4464a6dea5(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 47.795/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.698 Discarding pn space Initial because first Handshake message is being sent 47.698 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 47.699 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 47.796/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.699 -> Packet A|0|S0|e6a693c199ba781ce9a93869366434a35a936fd5|59|1 StreamFrame[0(CIB),0,17,fin] 47.729 <- (2) Packet A|3|S0|ca3bcf4464a6dea5|467|3 NewConnectionIdFrame[1,<0|691d02085088cee37b63edf7fd052728fa0a9a52|3b2e9921eb19bd5f5088646d826304af] HandshakeDoneFrame[] CryptoFrame[0,396] 47.729 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 47.795/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 47.821/App, because ackElicitingInFlight | RTT:33/16 47.729 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 47.749 -> Packet A|1|S0|e6a693c199ba781ce9a93869366434a35a936fd5|44|1 AckFrame[3|Δ19] 47.821 loss detection timeout handler running Sending probe 0, because no ack since 47.699. Current RTT: 33/16. 47.821 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 48.065/App, because ackElicitingInFlight | RTT:33/16 47.821 -> Packet PA|2|S0|e6a693c199ba781ce9a93869366434a35a936fd5|59|1 StreamFrame[0(CIB),0,17,fin] 47.866 <- (3) Packet A|6|S0|ca3bcf4464a6dea5|1061|2 AckFrame[2-0|Δ13] StreamFrame[0(CIB),0,1024,fin] 47.866 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 47.866 Finished downloading https://server4:443/qrochhpfzq at 41:04.770 on ClientConnection[80560f5bcccaa2b6/ca3bcf4464a6dea5(V1) with server4/193.167.100.100:443] 47.867 Closing ClientConnection[80560f5bcccaa2b6/ca3bcf4464a6dea5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 47.867 -> Packet A|3|S0|e6a693c199ba781ce9a93869366434a35a936fd5|47|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 47.867 Creating connection with server4:443 with v1 47.868 Setting up connection for downloading https://server4:443/nuvnhlsjxl at 41:04.771 on ClientConnection[baea7500237397ed/cc56aff3b794abab(V1) with server4/193.167.100.100:443] 47.868 Original destination connection id: baea7500237397ed (scid: cc56aff3b794abab) >- CryptoStream[I|ClientHello] 47.869 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.069/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 47.869 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 47.902 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 47.903 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.103/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 47.905 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.002/Handshake, because peerAwaitingAddressValidation | RTT:33/16 47.905 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) 47.902 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] >- CryptoStream[H|Finished] 47.908 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.005/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.908 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 47.908 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 47.908 Starting downloading https://server4:443/nuvnhlsjxl at 41:04.812 on ClientConnection[baea7500237397ed/cc56aff3b794abab(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 48.005/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.908 Discarding pn space Initial because first Handshake message is being sent 47.909 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.006/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 47.909 -> [Packet H|1|L|58|1 AckFrame[1|Δ0], Packet A|0|S0|1e72af3d576e9c31594c54badeb9e104b3a5aca9|59|1 StreamFrame[0(CIB),0,17,fin]] 47.939 <- (2) Packet A|2|S0|cc56aff3b794abab|467|3 NewConnectionIdFrame[1,<0|cc5435c1e4a5a7435f4e647254cf2a99247d99b8|e9252d065f1804035bc26a53210ae668] HandshakeDoneFrame[] CryptoFrame[0,396] 47.939 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 48.005/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 48.031/App, because ackElicitingInFlight | RTT:33/16 47.940 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 47.959 -> Packet A|1|S0|1e72af3d576e9c31594c54badeb9e104b3a5aca9|44|1 AckFrame[2|Δ19] 48.031 loss detection timeout handler running Sending probe 0, because no ack since 47.909. Current RTT: 33/16. 48.031 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 48.275/App, because ackElicitingInFlight | RTT:33/16 48.031 -> Packet PA|2|S0|1e72af3d576e9c31594c54badeb9e104b3a5aca9|59|1 StreamFrame[0(CIB),0,17,fin] 48.195 <- (3) Packet A|4|S0|cc56aff3b794abab|1063|2 AckFrame[2-1|Δ132] StreamFrame[0(CIB),0,1024,fin] 48.196 Cwnd(-): 6000; inflight: 0 48.196 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 48.196 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 226 millis, based on 48.423/App, because ackElicitingInFlight | RTT:46/39 48.196 -> Packet A|3|S0|1e72af3d576e9c31594c54badeb9e104b3a5aca9|59|1 StreamFrame[0(CIB),0,17,fin] 48.196 Finished downloading https://server4:443/nuvnhlsjxl at 41:05.100 on ClientConnection[baea7500237397ed/cc56aff3b794abab(V1) with server4/193.167.100.100:443] 48.196 Closing ClientConnection[baea7500237397ed/cc56aff3b794abab(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 48.197 Creating connection with server4:443 with v1 48.197 -> Packet A|4|S0|1e72af3d576e9c31594c54badeb9e104b3a5aca9|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 48.197 Setting up connection for downloading https://server4:443/mgqyberfcg at 41:05.101 on ClientConnection[c985494c037c0fad/6fd93e1ed770c73d(V1) with server4/193.167.100.100:443] 48.197 Original destination connection id: c985494c037c0fad (scid: 6fd93e1ed770c73d) >- CryptoStream[I|ClientHello] 48.198 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.398/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.198 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 48.227 <- (4) Packet A|5|S0|cc56aff3b794abab|31|1 AckFrame[3-1|Δ0] 48.227 -> Packet A|5|S0|1e72af3d576e9c31594c54badeb9e104b3a5aca9|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 48.398 loss detection timeout handler running Sending probe 0, because no ack since 48.198. Current RTT: 100/25. 48.398 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 48.398 (Probe is an initial retransmit) 48.398 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 48.798/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.398 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 48.797 loss detection timeout handler running Sending probe 1, because no ack since 48.398. Current RTT: 100/25. 48.797 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 48.797 (Probe is an initial retransmit) 48.798 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 49.598/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.797 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 48.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 49.599/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.798 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 48.831 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 48.831 probe count not reset on ack because handshake not yet confirmed 48.831 Retransmitting CryptoFrame[0,257] on level Initial 48.831 Cwnd(-): 6000; inflight: 1200 48.831 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 49.631/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.831 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 49.219/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.831 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 48.831 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 48.834 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 49.222/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.833 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 48.836 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 49.224/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.836 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 48.836 Starting downloading https://server4:443/mgqyberfcg at 41:05.740 on ClientConnection[c985494c037c0fad/6fd93e1ed770c73d(V1) with server4/193.167.100.100:443] 48.836 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.933/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.836 Discarding pn space Initial because first Handshake message is being sent 48.836 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 48.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.934/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.837 -> Packet A|0|S0|740832514387b195139045081a29c13fa1fca9e0|59|1 StreamFrame[0(CIB),0,17,fin] 48.864 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 48.867 <- (3) Packet A|4|S0|6fd93e1ed770c73d|467|3 NewConnectionIdFrame[1,<0|fb66ba1949f5dab010aae431322aba5c9c68d3ac|69d656df3093c44093724de0412ad20c] HandshakeDoneFrame[] CryptoFrame[0,396] 48.868 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 48.933/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 48.959/App, because ackElicitingInFlight | RTT:33/16 48.868 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 48.868 <- (4) Packet A|5|S0|6fd93e1ed770c73d|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 48.869 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 48.869 Finished downloading https://server4:443/mgqyberfcg at 41:05.773 on ClientConnection[c985494c037c0fad/6fd93e1ed770c73d(V1) with server4/193.167.100.100:443] 48.869 -> Packet A|1|S0|740832514387b195139045081a29c13fa1fca9e0|43|1 AckFrame[5-4|Δ0] 48.869 Closing ClientConnection[c985494c037c0fad/6fd93e1ed770c73d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 48.869 -> Packet A|2|S0|740832514387b195139045081a29c13fa1fca9e0|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 48.870 Creating connection with server4:443 with v1 48.870 Setting up connection for downloading https://server4:443/ehbxorusgt at 41:05.774 on ClientConnection[161c66695fe45cee/173ccf4c7e160e22(V1) with server4/193.167.100.100:443] 48.870 Original destination connection id: 161c66695fe45cee (scid: 173ccf4c7e160e22) >- CryptoStream[I|ClientHello] 48.871 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 49.071/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.871 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 49.071 loss detection timeout handler running Sending probe 0, because no ack since 48.871. Current RTT: 100/25. 49.071 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 49.071 (Probe is an initial retransmit) 49.071 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 49.471/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 49.071 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 49.104 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 49.104 probe count not reset on ack because handshake not yet confirmed 49.104 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 49.504/Initial, because peerAwaitingAddressValidation | RTT:100/25 49.503 loss detection timeout handler running Sending probe 1, because no ack since 49.071. Current RTT: 32/16. 49.503 Sending probe because peer awaiting address validation 49.503 (Probe is Initial ping, because there is no Initial data to retransmit) 49.504 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 49.888/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 49.504 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 49.887 loss detection timeout handler running Sending probe 2, because no ack since 49.504. Current RTT: 32/16. 49.887 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 49.887 (Probe is Initial ping, because there is no Initial data to retransmit) 49.887 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 50.655/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 49.887 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 49.888 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 50.656/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 49.888 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 49.921 <- (2) Packet I|5|L|62|1 Token=[] AckFrame[4,2-0|Δ0] 49.921 probe count not reset on ack because handshake not yet confirmed 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 loss detection timeout handler running 49.923 Cwnd(-): 6000; inflight: 0 49.923 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 50.563/Initial, because peerAwaitingAddressValidation | RTT:32/12 50.563 loss detection timeout handler running Sending probe 3, because no ack since 49.888. Current RTT: 32/12. 50.563 Sending probe because peer awaiting address validation 50.563 (Probe is Initial ping, because there is no Initial data to retransmit) 50.563 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 51.843/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 50.563 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 50.596 <- (3) Packet I|6|L|62|1 Token=[] AckFrame[5-4,2-0|Δ0] 50.596 probe count not reset on ack because handshake not yet confirmed 50.596 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 51.876/Initial, because peerAwaitingAddressValidation | RTT:32/12 50.903 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 51.876 loss detection timeout handler running Sending probe 4, because no ack since 50.563. Current RTT: 32/9. 51.876 Sending probe because peer awaiting address validation 51.876 (Probe is Initial ping, because there is no Initial data to retransmit) 51.876 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 54.052/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 51.876 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 51.909 <- (5) Packet I|9|L|62|1 Token=[] AckFrame[6-4,2-0|Δ0] 51.909 probe count not reset on ack because handshake not yet confirmed 51.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 54.086/Initial, because peerAwaitingAddressValidation | RTT:32/9 53.903 <- (6) Packet I|11|L|66|2 Token=[] AckFrame[6-4,2-0|Δ1993] PingFrame[] 53.904 probe count not reset on ack because handshake not yet confirmed 53.904 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1919 millis, based on 55.824/Initial, because peerAwaitingAddressValidation | RTT:32/7 53.904 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1919 millis, based on 55.824/Initial, because peerAwaitingAddressValidation | RTT:32/7 53.904 -> Packet I|7|L|1201|2 Token=[] AckFrame[11,9,6-5,2|Δ0] Padding(1135) 55.823 loss detection timeout handler running Sending probe 5, because no ack since 51.876. Current RTT: 32/7. 55.823 Sending probe because peer awaiting address validation 55.824 (Probe is Initial ping, because there is no Initial data to retransmit) 55.824 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 59.664/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 55.824 -> Packet PI|8|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 58.899 Discarding packet (754 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 58.899 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 59.663 loss detection timeout handler running Sending probe 6, because no ack since 55.824. Current RTT: 32/7. 59.663 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 59.663 (Probe is Initial ping, because there is no Initial data to retransmit) 59.664 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 7679 millis, based on 67.344/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 59.664 -> Packet PI|9|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 59.665 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 7679 millis, based on 67.345/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 59.665 -> Packet PI|10|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 59.696 <- (9) Packet I|15|L|64|1 Token=[] AckFrame[9-8,6-4,2-0|Δ0] 59.697 probe count not reset on ack because handshake not yet confirmed 59.697 Cwnd(-): 3000; inflight: 1201 59.697 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 7679 millis, based on 67.377/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 67.376 loss detection timeout handler running Sending probe 7, because no ack since 59.665. Current RTT: 32/5. 67.376 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 67.376 (Probe is Initial ping, because there is no Initial data to retransmit) 67.377 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 13311 millis, based on 80.689/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 67.377 -> Packet PI|11|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 67.378 Bytes in flight exceeds congestion window: 3603 > 3000 67.378 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 13311 millis, based on 80.690/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 67.378 -> Packet PI|12|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 67.410 <- (10) Packet I|16|L|66|1 Token=[] AckFrame[12,9-8,6-4,2-0|Δ0] 67.411 probe count not reset on ack because handshake not yet confirmed 67.415 Cwnd(+): 3480 (CongestionAvoidance); inflight: 3603 67.415 Cwnd(-): 2400; inflight: 0 67.415 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 13311 millis, based on 80.727/Initial, because peerAwaitingAddressValidation | RTT:32/5 69.889 <- (11) Packet I|17|L|196|2 Token=[] AckFrame[12,9-8,6-4,2-0|Δ2478] CryptoFrame[0,123] 69.890 probe count not reset on ack because handshake not yet confirmed 69.890 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 12287 millis, based on 82.178/Initial, because peerAwaitingAddressValidation | RTT:32/4 -< CryptoStream[I|ServerHello] 69.892 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 47 millis, based on 69.940/Handshake, because peerAwaitingAddressValidation | RTT:32/4 69.893 Discarding pn space Initial because first Handshake message is being sent 69.893 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 69.893 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 47 millis, based on 69.941/Handshake, because peerAwaitingAddressValidation | RTT:32/4 69.893 -> Packet I|13|L|1201|2 Token=[] AckFrame[17-15,11,9,6-5,2|Δ0] Padding(1133) 69.925 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 69.926 <- (14) Packet H|20|L|754|1 CryptoFrame[0,696] >- CryptoStream[H|Finished] 69.928 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 47 millis, based on 69.976/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/4 69.928 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 69.929 Starting downloading https://server4:443/ehbxorusgt at 41:26.832 on ClientConnection[161c66695fe45cee/173ccf4c7e160e22(V1) with server4/193.167.100.100:443] 69.929 -> Packet H|1|L|58|1 AckFrame[20|Δ0] 69.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 47 millis, based on 69.978/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/4 69.929 -> Packet A|0|S0|d68f01bb14c32188b24a5885e2a8c16f72fe4bc2|59|1 StreamFrame[0(CIB),0,17,fin] 69.977 loss detection timeout handler running Sending probe 0, because no ack since 69.928. Current RTT: 32/4. 69.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 69.977 (Probe is a handshake retransmit) 69.977 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 70.073/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/4 69.977 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 70.072 loss detection timeout handler running Sending probe 1, because no ack since 69.929. Current RTT: 32/4. 70.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 70.072 (Probe is a handshake retransmit) 70.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 70.264/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/4 70.072 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 70.073 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 70.265/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/4 70.073 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 70.265 loss detection timeout handler running Sending probe 2, because no ack since 69.929. Current RTT: 32/4. 70.265 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 70.265 (Probe is a handshake retransmit) 70.265 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 70.649/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/4 70.265 -> Packet PH|5|L|92|1 CryptoFrame[0,36] 70.266 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 70.650/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/4 70.266 -> Packet PH|6|L|92|1 CryptoFrame[0,36] 70.649 loss detection timeout handler running Sending probe 3, because no ack since 69.929. Current RTT: 32/4. 70.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 70.649 (Probe is a handshake retransmit) 70.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 71.418/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/4 70.649 -> Packet PH|7|L|92|1 CryptoFrame[0,36] 70.651 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 71.419/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/4 70.650 -> Packet PH|8|L|92|1 CryptoFrame[0,36] 70.761 <- (15) Packet A|23|S0|173ccf4c7e160e22|507|4 NewConnectionIdFrame[1,<0|61199718430afedd9cfd6cb2800dd5d6116fbbc6|f9de3bb02ec9548acbd4a86ecd7e6143] NewConnectionIdFrame[1,<0|61199718430afedd9cfd6cb2800dd5d6116fbbc6|f9de3bb02ec9548acbd4a86ecd7e6143] HandshakeDoneFrame[] CryptoFrame[0,396] 70.761 State is set to Confirmed reschedule loss detection timer for PTO over 336 millis, based on 71.097/App, because ackElicitingInFlight | RTT:32/4 reschedule loss detection timer for PTO over -758 millis, based on 70.002/App, because ackElicitingInFlight | RTT:32/4 70.761 Discarding pn space Handshake because HandshakeDone is received 70.761 loss detection timeout handler running Sending probe 0, because no ack since 69.929. Current RTT: 32/4. 70.762 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 145 millis, based on 70.908/App, because ackElicitingInFlight | RTT:32/4 70.762 -> Packet PA|1|S0|d68f01bb14c32188b24a5885e2a8c16f72fe4bc2|59|1 StreamFrame[0(CIB),0,17,fin] 70.781 -> Packet A|2|S0|d68f01bb14c32188b24a5885e2a8c16f72fe4bc2|44|1 AckFrame[23|Δ19] 70.793 <- (16) Packet A|25|S0|173ccf4c7e160e22|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 70.794 Cwnd(-): 2400; inflight: 0 70.794 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 70.794 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 68 millis, based on 70.863/App, because ackElicitingInFlight | RTT:32/3 70.794 -> Packet A|3|S0|d68f01bb14c32188b24a5885e2a8c16f72fe4bc2|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[23|Δ0] 70.794 Finished downloading https://server4:443/ehbxorusgt at 41:27.698 on ClientConnection[161c66695fe45cee/173ccf4c7e160e22(V1) with server4/193.167.100.100:443] 70.795 Closing ClientConnection[161c66695fe45cee/173ccf4c7e160e22(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 70.795 -> Packet A|4|S0|d68f01bb14c32188b24a5885e2a8c16f72fe4bc2|49|2 ConnectionCloseFrame[0|0|] AckFrame[25,23|Δ0] 70.795 Creating connection with server4:443 with v1 70.796 Setting up connection for downloading https://server4:443/mjhqrlkqgo at 41:27.699 on ClientConnection[76b0b43ab93f2e05/712cd1dfe4c2b747(V1) with server4/193.167.100.100:443] 70.796 Original destination connection id: 76b0b43ab93f2e05 (scid: 712cd1dfe4c2b747) >- CryptoStream[I|ClientHello] 70.797 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 70.997/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 70.797 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 70.825 <- (17) Packet A|26|S0|173ccf4c7e160e22|113|3 AckFrame[3,1|Δ0] NewConnectionIdFrame[1,<0|61199718430afedd9cfd6cb2800dd5d6116fbbc6|f9de3bb02ec9548acbd4a86ecd7e6143] NewConnectionIdFrame[1,<0|61199718430afedd9cfd6cb2800dd5d6116fbbc6|f9de3bb02ec9548acbd4a86ecd7e6143] 70.825 -> Packet A|5|S0|d68f01bb14c32188b24a5885e2a8c16f72fe4bc2|49|2 ConnectionCloseFrame[0|0|] AckFrame[25,23|Δ0] 70.996 loss detection timeout handler running Sending probe 0, because no ack since 70.797. Current RTT: 100/25. 70.996 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 70.996 (Probe is an initial retransmit) 70.996 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 71.396/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 70.996 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 71.396 loss detection timeout handler running Sending probe 1, because no ack since 70.996. Current RTT: 100/25. 71.396 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 71.396 (Probe is an initial retransmit) 71.396 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 72.196/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 71.396 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 71.397 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 72.197/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 71.397 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 71.430 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[3-2|Δ0] 71.431 probe count not reset on ack because handshake not yet confirmed 71.431 Retransmitting CryptoFrame[0,257] on level Initial 71.431 Cwnd(-): 6000; inflight: 0 71.431 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 72.231/Initial, because peerAwaitingAddressValidation | RTT:100/25 71.431 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 71.819/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 71.431 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) 71.463 <- (2) Packet I|3|L|60|1 Token=[] AckFrame[4-2|Δ0] 71.464 probe count not reset on ack because handshake not yet confirmed 71.464 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 71.852/Initial, because peerAwaitingAddressValidation | RTT:33/16 71.851 loss detection timeout handler running Sending probe 2, because no ack since 71.431. Current RTT: 33/12. 71.851 Sending probe because peer awaiting address validation 71.851 (Probe is Initial ping, because there is no Initial data to retransmit) 71.851 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 72.499/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 71.851 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 71.884 <- (3) Packet I|4|L|60|1 Token=[] AckFrame[5-2|Δ0] 71.884 probe count not reset on ack because handshake not yet confirmed 71.884 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 72.532/Initial, because peerAwaitingAddressValidation | RTT:33/12 72.430 <- (4) Packet I|5|L|190|2 Token=[] AckFrame[5-2|Δ545] CryptoFrame[0,123] 72.430 probe count not reset on ack because handshake not yet confirmed 72.430 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 551 millis, based on 72.982/Initial, because peerAwaitingAddressValidation | RTT:33/9 -< CryptoStream[I|ServerHello] 72.432 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 68 millis, based on 72.501/Handshake, because peerAwaitingAddressValidation | RTT:33/9 72.432 Discarding pn space Initial because first Handshake message is being sent 72.432 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 68 millis, based on 72.502/Handshake, because peerAwaitingAddressValidation | RTT:33/9 72.432 -> Packet I|6|L|1201|2 Token=[] AckFrame[5-2|Δ0] Padding(1141) 72.466 <- (5) Packet H|7|L|755|1 CryptoFrame[0,697] >- CryptoStream[H|Finished] 72.468 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 68 millis, based on 72.537/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/9 72.468 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 72.469 Starting downloading https://server4:443/mjhqrlkqgo at 41:29.372 on ClientConnection[76b0b43ab93f2e05/712cd1dfe4c2b747(V1) with server4/193.167.100.100:443] 72.469 -> Packet H|1|L|58|1 AckFrame[7|Δ0] 72.469 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 68 millis, based on 72.538/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/9 72.469 -> Packet A|0|S0|b9abae224fa315f389eb76b707da393807f3de61|59|1 StreamFrame[0(CIB),0,17,fin] 72.499 <- (6) Packet A|8|S0|712cd1dfe4c2b747|467|3 NewConnectionIdFrame[1,<0|8ccde60814f1a3042485d2bbf9f47992ab7c0276|21815f9524b58ba4926deea5ea580941] HandshakeDoneFrame[] CryptoFrame[0,396] 72.500 State is set to Confirmed reschedule loss detection timer for PTO over 37 millis, based on 72.537/Handshake, because ackElicitingInFlight | RTT:33/9 reschedule loss detection timer for PTO over 63 millis, based on 72.563/App, because ackElicitingInFlight | RTT:33/9 72.500 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 72.501 <- (7) Packet A|9|S0|712cd1dfe4c2b747|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 72.501 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 72.501 -> Packet A|1|S0|b9abae224fa315f389eb76b707da393807f3de61|44|1 AckFrame[9-8|Δ1] 72.501 Finished downloading https://server4:443/mjhqrlkqgo at 41:29.405 on ClientConnection[76b0b43ab93f2e05/712cd1dfe4c2b747(V1) with server4/193.167.100.100:443] 72.501 Closing ClientConnection[76b0b43ab93f2e05/712cd1dfe4c2b747(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 72.502 -> Packet A|2|S0|b9abae224fa315f389eb76b707da393807f3de61|47|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 72.502 Creating connection with server4:443 with v1 72.502 Setting up connection for downloading https://server4:443/rsnznmarnp at 41:29.406 on ClientConnection[43d7e2315a090ef2/3c2234a7e0a201e3(V1) with server4/193.167.100.100:443] 72.502 Original destination connection id: 43d7e2315a090ef2 (scid: 3c2234a7e0a201e3) >- CryptoStream[I|ClientHello] 72.504 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 72.704/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 72.503 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 72.536 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 72.537 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 72.737/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 72.536 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 72.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 72.635/Handshake, because peerAwaitingAddressValidation | RTT:32/16 72.539 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 72.541 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 72.637/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 72.541 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 72.541 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 72.637/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 72.541 Discarding pn space Initial because first Handshake message is being sent 72.541 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 72.541 Starting downloading https://server4:443/rsnznmarnp at 41:29.444 on ClientConnection[43d7e2315a090ef2/3c2234a7e0a201e3(V1) with server4/193.167.100.100:443] 72.542 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 72.638/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 72.542 -> Packet A|0|S0|c89c25674498664a7df1995c6fc9a146e3d50dc0|59|1 StreamFrame[0(CIB),0,17,fin] 72.572 <- (2) Packet A|2|S0|3c2234a7e0a201e3|467|3 NewConnectionIdFrame[1,<0|894bd12f2b59dfb39e836d89ca81a2d9b0c7b612|247c7ebd2c85e4e8fb2919ff34b9e3b2] HandshakeDoneFrame[] CryptoFrame[0,396] 72.572 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 72.637/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 72.663/App, because ackElicitingInFlight | RTT:32/16 72.572 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 72.592 -> Packet A|1|S0|c89c25674498664a7df1995c6fc9a146e3d50dc0|44|1 AckFrame[2|Δ19] 72.662 loss detection timeout handler running Sending probe 0, because no ack since 72.542. Current RTT: 32/16. 72.663 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 72.905/App, because ackElicitingInFlight | RTT:32/16 72.663 -> Packet PA|2|S0|c89c25674498664a7df1995c6fc9a146e3d50dc0|59|1 StreamFrame[0(CIB),0,17,fin] 72.703 <- (3) Packet A|4|S0|3c2234a7e0a201e3|473|4 AckFrame[0|Δ130] NewConnectionIdFrame[1,<0|894bd12f2b59dfb39e836d89ca81a2d9b0c7b612|247c7ebd2c85e4e8fb2919ff34b9e3b2] HandshakeDoneFrame[] CryptoFrame[0,396] reschedule loss detection timer for PTO over 80 millis, based on 72.784/App, because ackElicitingInFlight | RTT:32/16 -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 72.723 -> Packet A|3|S0|c89c25674498664a7df1995c6fc9a146e3d50dc0|46|1 AckFrame[4,2|Δ19] 72.754 <- (4) Packet A|5|S0|3c2234a7e0a201e3|1060|2 AckFrame[3|Δ0] StreamFrame[0(CIB),0,1024,fin] 72.755 Finished downloading https://server4:443/rsnznmarnp at 41:29.658 on ClientConnection[43d7e2315a090ef2/3c2234a7e0a201e3(V1) with server4/193.167.100.100:443] 72.755 Closing ClientConnection[43d7e2315a090ef2/3c2234a7e0a201e3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 72.755 -> Packet A|4|S0|c89c25674498664a7df1995c6fc9a146e3d50dc0|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 72.756 Creating connection with server4:443 with v1 72.756 Setting up connection for downloading https://server4:443/sdsuphlzil at 41:29.659 on ClientConnection[a563794611dc446b/ebae9006b5ff8bd5(V1) with server4/193.167.100.100:443] 72.756 Original destination connection id: a563794611dc446b (scid: ebae9006b5ff8bd5) >- CryptoStream[I|ClientHello] 72.757 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 72.957/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 72.757 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 72.790 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 72.790 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 72.990/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 72.790 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 72.793 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.890/Handshake, because peerAwaitingAddressValidation | RTT:33/16 72.792 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 72.795 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.892/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 72.795 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 72.795 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.892/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 72.795 Discarding pn space Initial because first Handshake message is being sent 72.795 Starting downloading https://server4:443/sdsuphlzil at 41:29.698 on ClientConnection[a563794611dc446b/ebae9006b5ff8bd5(V1) with server4/193.167.100.100:443] 72.795 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 72.796 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 72.893/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 72.795 -> Packet A|0|S0|16724186c6b57df5a3b26c52952192cd349403d6|59|1 StreamFrame[0(CIB),0,17,fin] 72.892 loss detection timeout handler running Sending probe 0, because no ack since 72.795. Current RTT: 33/16. 72.892 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 72.892 (Probe is a handshake retransmit) 72.892 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 73.086/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 72.892 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 72.923 <- (2) Packet A|2|S0|ebae9006b5ff8bd5|467|3 NewConnectionIdFrame[1,<0|4857a8e2ce503dea6f81d27ab610141be88929eb|7c64c850ac09fd196419f716dc3540ab] HandshakeDoneFrame[] CryptoFrame[0,396] 72.924 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 73.039/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 72.917/App, because ackElicitingInFlight | RTT:33/16 72.924 Discarding pn space Handshake because HandshakeDone is received 72.924 loss detection timeout handler running Sending probe 0, because no ack since 72.795. Current RTT: 33/16. 72.924 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 73.168/App, because ackElicitingInFlight | RTT:33/16 72.924 -> Packet PA|1|S0|16724186c6b57df5a3b26c52952192cd349403d6|59|1 StreamFrame[0(CIB),0,17,fin] 72.944 -> Packet A|2|S0|16724186c6b57df5a3b26c52952192cd349403d6|44|1 AckFrame[2|Δ19] 73.168 loss detection timeout handler running Sending probe 1, because no ack since 72.924. Current RTT: 33/16. 73.168 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 73.656/App, because ackElicitingInFlight | RTT:33/16 73.168 -> Packet PA|3|S0|16724186c6b57df5a3b26c52952192cd349403d6|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 73.657/App, because ackElicitingInFlight | RTT:33/16 73.169 -> Packet PA|4|S0|16724186c6b57df5a3b26c52952192cd349403d6|59|1 StreamFrame[0(CIB),0,17,fin] 73.656 loss detection timeout handler running Sending probe 2, because no ack since 73.169. Current RTT: 33/16. 73.656 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 975 millis, based on 74.632/App, because ackElicitingInFlight | RTT:33/16 73.656 -> Packet PA|5|S0|16724186c6b57df5a3b26c52952192cd349403d6|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 975 millis, based on 74.634/App, because ackElicitingInFlight | RTT:33/16 73.658 -> Packet PA|6|S0|16724186c6b57df5a3b26c52952192cd349403d6|59|1 StreamFrame[0(CIB),0,17,fin] 73.687 <- (3) Packet A|4|S0|ebae9006b5ff8bd5|31|1 AckFrame[5-4|Δ0] 73.688 Cwnd(-): 6000; inflight: 59 73.688 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 91 millis, based on 73.780/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 109 millis, based on 73.798/App, because ackElicitingInFlight | RTT:33/13 73.688 -> Packet A|7|S0|16724186c6b57df5a3b26c52952192cd349403d6|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 73.719 <- (4) Packet A|6|S0|ebae9006b5ff8bd5|31|1 AckFrame[7-4|Δ0] 73.719 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 75.616 <- (5) Packet A|7|S0|ebae9006b5ff8bd5|1063|2 AckFrame[7-4|Δ1896] StreamFrame[0(CIB),0,1024,fin] 75.616 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 75.617 Finished downloading https://server4:443/sdsuphlzil at 41:32.520 on ClientConnection[a563794611dc446b/ebae9006b5ff8bd5(V1) with server4/193.167.100.100:443] 75.617 Closing ClientConnection[a563794611dc446b/ebae9006b5ff8bd5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 75.617 -> Packet A|8|S0|16724186c6b57df5a3b26c52952192cd349403d6|49|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4|Δ0] 75.618 Creating connection with server4:443 with v1 75.618 Setting up connection for downloading https://server4:443/ucffbfvnpw at 41:32.521 on ClientConnection[b8bcf55d39f4d07d/df6d63430f4d0148(V1) with server4/193.167.100.100:443] 75.618 Original destination connection id: b8bcf55d39f4d07d (scid: df6d63430f4d0148) >- CryptoStream[I|ClientHello] 75.619 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 75.819/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 75.619 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 75.652 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 75.652 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 75.852/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 75.652 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 75.654 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 75.751/Handshake, because peerAwaitingAddressValidation | RTT:32/16 75.654 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 75.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 75.753/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 75.656 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 75.657 Starting downloading https://server4:443/ucffbfvnpw at 41:32.560 on ClientConnection[b8bcf55d39f4d07d/df6d63430f4d0148(V1) with server4/193.167.100.100:443] 75.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 75.753/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 75.657 Discarding pn space Initial because first Handshake message is being sent 75.657 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 75.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 75.753/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 75.657 -> Packet A|0|S0|c645f5054b2449e4280017acdd4303cf9cfb80fb|59|1 StreamFrame[0(CIB),0,17,fin] 75.688 <- (2) Packet A|2|S0|df6d63430f4d0148|467|3 NewConnectionIdFrame[1,<0|da047e2a4998879114ab5bdfdfc85938403e73d3|bbfbf2517ad2333af2ceee3716c39f2e] HandshakeDoneFrame[] CryptoFrame[0,396] 75.688 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 75.752/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 75.778/App, because ackElicitingInFlight | RTT:32/16 75.688 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 75.708 -> Packet A|1|S0|c645f5054b2449e4280017acdd4303cf9cfb80fb|44|1 AckFrame[2|Δ19] 75.777 loss detection timeout handler running Sending probe 0, because no ack since 75.657. Current RTT: 32/16. 75.777 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 76.020/App, because ackElicitingInFlight | RTT:32/16 75.778 -> Packet PA|2|S0|c645f5054b2449e4280017acdd4303cf9cfb80fb|59|1 StreamFrame[0(CIB),0,17,fin] 75.808 <- (3) Packet A|4|S0|df6d63430f4d0148|31|1 AckFrame[2-0|Δ0] 75.809 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 75.819 <- (4) Packet A|5|S0|df6d63430f4d0148|1061|2 AckFrame[2-0|Δ10] StreamFrame[0(CIB),0,1024,fin] 75.820 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 75.820 Finished downloading https://server4:443/ucffbfvnpw at 41:32.723 on ClientConnection[b8bcf55d39f4d07d/df6d63430f4d0148(V1) with server4/193.167.100.100:443] 75.820 Closing ClientConnection[b8bcf55d39f4d07d/df6d63430f4d0148(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 75.820 -> Packet A|3|S0|c645f5054b2449e4280017acdd4303cf9cfb80fb|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 75.820 Creating connection with server4:443 with v1 75.821 Setting up connection for downloading https://server4:443/pvocynofrw at 41:32.724 on ClientConnection[2c2dd67e976bc51d/c0e1f3fed9c88fc9(V1) with server4/193.167.100.100:443] 75.821 Original destination connection id: 2c2dd67e976bc51d (scid: c0e1f3fed9c88fc9) >- CryptoStream[I|ClientHello] 75.822 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 76.022/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 75.822 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 75.855 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 75.855 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 76.055/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 75.855 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 75.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 75.954/Handshake, because peerAwaitingAddressValidation | RTT:33/16 75.857 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 75.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 75.956/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 75.859 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 75.860 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 75.860 Starting downloading https://server4:443/pvocynofrw at 41:32.763 on ClientConnection[2c2dd67e976bc51d/c0e1f3fed9c88fc9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 75.957/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 75.860 Discarding pn space Initial because first Handshake message is being sent 75.860 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 75.860 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 75.957/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 75.860 -> Packet A|0|S0|f7c53e31351b8f81cc0a8d500777daa7beff4e00|59|1 StreamFrame[0(CIB),0,17,fin] 75.956 loss detection timeout handler running Sending probe 0, because no ack since 75.859. Current RTT: 33/16. 75.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 75.956 (Probe is a handshake retransmit) 75.957 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 76.151/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 75.956 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 75.988 <- (2) Packet A|2|S0|c0e1f3fed9c88fc9|467|3 NewConnectionIdFrame[1,<0|1c94da9c417d877933559be794fdc6871db27c14|b3eb283c8ba48793cb54dc86e0b3dfcb] HandshakeDoneFrame[] CryptoFrame[0,396] 75.988 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 76.104/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 75.982/App, because ackElicitingInFlight | RTT:33/16 75.988 Discarding pn space Handshake because HandshakeDone is received 75.988 loss detection timeout handler running Sending probe 0, because no ack since 75.860. Current RTT: 33/16. 75.988 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 76.232/App, because ackElicitingInFlight | RTT:33/16 75.988 -> Packet PA|1|S0|f7c53e31351b8f81cc0a8d500777daa7beff4e00|59|1 StreamFrame[0(CIB),0,17,fin] 76.008 -> Packet A|2|S0|f7c53e31351b8f81cc0a8d500777daa7beff4e00|44|1 AckFrame[2|Δ19] 76.020 <- (3) Packet A|3|S0|c0e1f3fed9c88fc9|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 76.020 Cwnd(-): 6000; inflight: 0 76.020 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 76.020 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 76.131/App, because ackElicitingInFlight | RTT:33/13 76.021 -> Packet A|3|S0|f7c53e31351b8f81cc0a8d500777daa7beff4e00|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 76.021 Finished downloading https://server4:443/pvocynofrw at 41:32.924 on ClientConnection[2c2dd67e976bc51d/c0e1f3fed9c88fc9(V1) with server4/193.167.100.100:443] 76.021 Closing ClientConnection[2c2dd67e976bc51d/c0e1f3fed9c88fc9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 76.021 Creating connection with server4:443 with v1 76.021 -> Packet A|4|S0|f7c53e31351b8f81cc0a8d500777daa7beff4e00|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 76.022 Setting up connection for downloading https://server4:443/mciykikxqd at 41:32.925 on ClientConnection[c39894d182db4505/d97193fdd5463491(V1) with server4/193.167.100.100:443] 76.022 Original destination connection id: c39894d182db4505 (scid: d97193fdd5463491) >- CryptoStream[I|ClientHello] 76.023 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 76.223/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 76.023 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 76.051 <- (4) Packet A|4|S0|c0e1f3fed9c88fc9|31|1 AckFrame[3-1|Δ0] 76.052 -> Packet A|5|S0|f7c53e31351b8f81cc0a8d500777daa7beff4e00|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 76.222 loss detection timeout handler running Sending probe 0, because no ack since 76.023. Current RTT: 100/25. 76.222 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 76.222 (Probe is an initial retransmit) 76.223 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 76.623/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 76.223 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 76.256 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 76.256 probe count not reset on ack because handshake not yet confirmed 76.256 Retransmitting CryptoFrame[0,257] on level Initial 76.257 Cwnd(-): 6000; inflight: 0 76.257 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 76.657/Initial, because peerAwaitingAddressValidation | RTT:100/25 76.257 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 76.451/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 76.257 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 76.256 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 76.259 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 76.453/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 76.259 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 76.261 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 76.455/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 76.261 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 76.262 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 76.262 Starting downloading https://server4:443/mciykikxqd at 41:33.165 on ClientConnection[c39894d182db4505/d97193fdd5463491(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 76.359/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 76.262 Discarding pn space Initial because first Handshake message is being sent 76.262 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 76.262 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 76.359/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 76.262 -> Packet A|0|S0|1d3c283743d9fee74f1a6f1cc87559dd0796e76e|59|1 StreamFrame[0(CIB),0,17,fin] 76.358 loss detection timeout handler running Sending probe 0, because no ack since 76.261. Current RTT: 33/16. 76.358 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 76.358 (Probe is a handshake retransmit) 76.359 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 76.553/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 76.359 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 76.426 <- (2) Packet A|3|S0|d97193fdd5463491|467|3 NewConnectionIdFrame[1,<0|bd9e5fc5b7bcd95f0663778d36abbd5dbe503a2c|86882cb479054280918215b4f1e24681] HandshakeDoneFrame[] CryptoFrame[0,396] 76.426 State is set to Confirmed reschedule loss detection timer for PTO over 79 millis, based on 76.506/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -42 millis, based on 76.384/App, because ackElicitingInFlight | RTT:33/16 76.427 Discarding pn space Handshake because HandshakeDone is received 76.427 loss detection timeout handler running Sending probe 0, because no ack since 76.262. Current RTT: 33/16. 76.427 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 76.671/App, because ackElicitingInFlight | RTT:33/16 76.427 -> Packet PA|1|S0|1d3c283743d9fee74f1a6f1cc87559dd0796e76e|59|1 StreamFrame[0(CIB),0,17,fin] 76.446 -> Packet A|2|S0|1d3c283743d9fee74f1a6f1cc87559dd0796e76e|44|1 AckFrame[3|Δ19] 76.477 <- (3) Packet A|4|S0|d97193fdd5463491|66|1 NewConnectionIdFrame[1,<0|bd9e5fc5b7bcd95f0663778d36abbd5dbe503a2c|86882cb479054280918215b4f1e24681] 76.496 -> Packet A|3|S0|1d3c283743d9fee74f1a6f1cc87559dd0796e76e|44|1 AckFrame[4-3|Δ19] 76.670 loss detection timeout handler running Sending probe 1, because no ack since 76.427. Current RTT: 33/16. 76.670 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 77.158/App, because ackElicitingInFlight | RTT:33/16 76.670 -> Packet PA|4|S0|1d3c283743d9fee74f1a6f1cc87559dd0796e76e|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 77.159/App, because ackElicitingInFlight | RTT:33/16 76.671 -> Packet PA|5|S0|1d3c283743d9fee74f1a6f1cc87559dd0796e76e|59|1 StreamFrame[0(CIB),0,17,fin] 77.091 <- (4) Packet A|8|S0|d97193fdd5463491|37|2 AckFrame[5,3-2|Δ388] PingFrame[] 77.092 Cwnd(-): 3000; inflight: 0 77.092 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 77.092 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 510 millis, based on 77.603/App, because ackElicitingInFlight | RTT:78/102 77.092 -> Packet A|6|S0|1d3c283743d9fee74f1a6f1cc87559dd0796e76e|59|1 StreamFrame[0(CIB),0,17,fin] 77.111 -> Packet A|7|S0|1d3c283743d9fee74f1a6f1cc87559dd0796e76e|44|1 AckFrame[8|Δ19] 77.123 <- (5) Packet A|9|S0|d97193fdd5463491|33|1 AckFrame[6-5,3-2|Δ0] 77.123 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 77.143 <- (6) Packet A|10|S0|d97193fdd5463491|1060|2 AckFrame[7-6|Δ0] StreamFrame[0(CIB),0,1024,fin] 77.143 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 77.143 Finished downloading https://server4:443/mciykikxqd at 41:34.047 on ClientConnection[c39894d182db4505/d97193fdd5463491(V1) with server4/193.167.100.100:443] 77.144 Closing ClientConnection[c39894d182db4505/d97193fdd5463491(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 77.144 -> Packet A|8|S0|1d3c283743d9fee74f1a6f1cc87559dd0796e76e|47|2 ConnectionCloseFrame[0|0|] AckFrame[10-9|Δ0] 77.144 Creating connection with server4:443 with v1 77.145 Setting up connection for downloading https://server4:443/vzopchjldp at 41:34.048 on ClientConnection[2ef16bf534e4090a/c716bd7ccdc21f55(V1) with server4/193.167.100.100:443] 77.145 Original destination connection id: 2ef16bf534e4090a (scid: c716bd7ccdc21f55) >- CryptoStream[I|ClientHello] 77.146 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 77.346/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 77.146 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 77.345 loss detection timeout handler running Sending probe 0, because no ack since 77.146. Current RTT: 100/25. 77.345 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 77.345 (Probe is an initial retransmit) 77.345 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 77.745/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 77.345 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 77.744 loss detection timeout handler running Sending probe 1, because no ack since 77.345. Current RTT: 100/25. 77.745 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 77.745 (Probe is an initial retransmit) 77.745 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 78.545/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 77.745 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 77.746 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 78.546/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 77.746 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 77.777 <- (1) Packet I|3|L|60|1 Token=[] AckFrame[2-0|Δ0] 77.778 probe count not reset on ack because handshake not yet confirmed 77.778 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 78.578/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 77.778 <- (2) Packet I|4|L|60|1 Token=[] AckFrame[3-0|Δ0] 77.779 probe count not reset on ack because handshake not yet confirmed 77.779 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 78.163/Initial, because peerAwaitingAddressValidation | RTT:32/16 78.162 loss detection timeout handler running Sending probe 2, because no ack since 77.746. Current RTT: 32/12. 78.162 Sending probe because peer awaiting address validation 78.162 (Probe is Initial ping, because there is no Initial data to retransmit) 78.162 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 78.802/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 78.162 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 78.179 <- (3) Packet I|5|L|190|2 Token=[] AckFrame[3-0|Δ400] CryptoFrame[0,123] 78.179 probe count not reset on ack because handshake not yet confirmed 78.179 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 78.819/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 -< CryptoStream[I|ServerHello] 78.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 78.261/Handshake, because peerAwaitingAddressValidation | RTT:32/12 78.181 Discarding pn space Initial because first Handshake message is being sent 78.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 78.261/Handshake, because peerAwaitingAddressValidation | RTT:32/12 78.181 -> Packet I|5|L|1201|2 Token=[] AckFrame[5-3|Δ0] Padding(1141) 78.214 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 78.260 loss detection timeout handler running 78.261 Sending probe 0. Current RTT: 32/12. 78.261 Sending probe because peer awaiting address validation 78.261 (Probe is a handshake ping) 78.261 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 159 millis, based on 78.421/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 78.261 -> Packet PH|0|L|56|2 PingFrame[] Padding(2) 78.292 <- (5) Packet H|9|L|59|1 AckFrame[0|Δ0] 78.292 probe count not reset on ack because handshake not yet confirmed 78.292 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 78.424 <- (6) Packet H|10|L|763|2 AckFrame[0|Δ132] CryptoFrame[0,697] 78.425 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 71 millis, based on 78.499/Handshake, because ackElicitingInFlight | RTT:32/10 78.427 -> Packet H|1|L|97|2 CryptoFrame[0,36] AckFrame[9|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 78.427 Starting downloading https://server4:443/vzopchjldp at 41:35.331 on ClientConnection[2ef16bf534e4090a/c716bd7ccdc21f55(V1) with server4/193.167.100.100:443] 78.427 -> Packet H|2|L|58|1 AckFrame[10-9|Δ0] 78.425 <- (7) Packet H|11|L|63|2 AckFrame[0|Δ132] PingFrame[] reschedule loss detection timer for PTO over 71 millis, based on 78.499/Handshake, because ackElicitingInFlight | RTT:32/10 78.428 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 70 millis, based on 78.499/Handshake, because ackElicitingInFlight | RTT:32/10 78.428 -> Packet A|0|S0|f0751cdcf75cda98a95e52f02b84b821cbadbf4f|59|1 StreamFrame[0(CIB),0,17,fin] 78.428 -> Packet H|3|L|58|1 AckFrame[11-9|Δ0] 78.498 loss detection timeout handler running Sending probe 0, because no ack since 78.427. Current RTT: 32/10. 78.498 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 78.498 (Probe is a handshake retransmit) 78.498 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 143 millis, based on 78.642/Handshake, because ackElicitingInFlight | RTT:32/10 78.498 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 78.530 <- (8) Packet A|12|S0|c716bd7ccdc21f55|467|3 NewConnectionIdFrame[1,<0|d069cd50b84b12b09fb351d50b1dfec5764b4018|06fbe052bd5515a06baeda4b0cb4b463] HandshakeDoneFrame[] CryptoFrame[0,396] 78.530 State is set to Confirmed reschedule loss detection timer for PTO over 91 millis, based on 78.622/App, because ackElicitingInFlight | RTT:32/10 reschedule loss detection timer for PTO over -5 millis, based on 78.525/App, because ackElicitingInFlight | RTT:32/10 78.530 loss detection timeout handler running 78.530 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 78.428. Current RTT: 32/10. 78.530 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 193 millis, based on 78.724/App, because ackElicitingInFlight | RTT:32/10 -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 78.530 -> Packet PA|1|S0|f0751cdcf75cda98a95e52f02b84b821cbadbf4f|59|1 StreamFrame[0(CIB),0,17,fin] 78.550 -> Packet A|2|S0|f0751cdcf75cda98a95e52f02b84b821cbadbf4f|44|1 AckFrame[12|Δ19] 78.724 loss detection timeout handler running Sending probe 1, because no ack since 78.530. Current RTT: 32/10. 78.724 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 387 millis, based on 79.112/App, because ackElicitingInFlight | RTT:32/10 78.724 -> Packet PA|3|S0|f0751cdcf75cda98a95e52f02b84b821cbadbf4f|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 387 millis, based on 79.113/App, because ackElicitingInFlight | RTT:32/10 78.725 -> Packet PA|4|S0|f0751cdcf75cda98a95e52f02b84b821cbadbf4f|59|1 StreamFrame[0(CIB),0,17,fin] 78.756 <- (9) Packet A|14|S0|c716bd7ccdc21f55|1060|2 AckFrame[4|Δ0] StreamFrame[0(CIB),0,1024,fin] 78.757 Cwnd(-): 6000; inflight: 59 78.757 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 78.757 -> Packet A|5|S0|f0751cdcf75cda98a95e52f02b84b821cbadbf4f|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[12|Δ0] 78.757 Finished downloading https://server4:443/vzopchjldp at 41:35.661 on ClientConnection[2ef16bf534e4090a/c716bd7ccdc21f55(V1) with server4/193.167.100.100:443] 78.757 Closing ClientConnection[2ef16bf534e4090a/c716bd7ccdc21f55(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 78.758 -> Packet A|6|S0|f0751cdcf75cda98a95e52f02b84b821cbadbf4f|49|2 ConnectionCloseFrame[0|0|] AckFrame[14,12|Δ0] 78.758 Creating connection with server4:443 with v1 78.758 Setting up connection for downloading https://server4:443/ddimhtknom at 41:35.662 on ClientConnection[938d85d2469e968b/a57ce03c263cf376(V1) with server4/193.167.100.100:443] 78.758 Original destination connection id: 938d85d2469e968b (scid: a57ce03c263cf376) >- CryptoStream[I|ClientHello] 78.760 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 78.960/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 78.760 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 78.788 <- (10) Packet A|15|S0|c716bd7ccdc21f55|31|1 AckFrame[5-4|Δ0] 78.788 -> Packet A|7|S0|f0751cdcf75cda98a95e52f02b84b821cbadbf4f|49|2 ConnectionCloseFrame[0|0|] AckFrame[14,12|Δ0] 78.793 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 78.793 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 78.993/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 78.793 <- (1) Packet H|1|L|753|1 CryptoFrame[0,695] 78.795 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 78.891/Handshake, because peerAwaitingAddressValidation | RTT:32/16 78.795 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 78.797 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 78.893/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 78.797 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 78.798 Starting downloading https://server4:443/ddimhtknom at 41:35.701 on ClientConnection[938d85d2469e968b/a57ce03c263cf376(V1) with server4/193.167.100.100:443] 78.798 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 78.894/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 78.798 Discarding pn space Initial because first Handshake message is being sent 78.798 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 78.798 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 78.894/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 78.798 -> Packet A|0|S0|6f71670575c15d1e200d710cb42b5ff64dba5c2a|59|1 StreamFrame[0(CIB),0,17,fin] 78.893 loss detection timeout handler running Sending probe 0, because no ack since 78.797. Current RTT: 32/16. 78.893 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 78.893 (Probe is a handshake retransmit) 78.893 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 79.085/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 78.893 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 79.085 loss detection timeout handler running Sending probe 1, because no ack since 78.798. Current RTT: 32/16. 79.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 79.085 (Probe is a handshake retransmit) 79.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 79.469/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 79.085 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 79.086 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 79.470/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 79.086 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 79.469 loss detection timeout handler running Sending probe 2, because no ack since 78.798. Current RTT: 32/16. 79.469 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 79.469 (Probe is a handshake retransmit) 79.470 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 80.238/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 79.469 -> Packet PH|5|L|92|1 CryptoFrame[0,36] 79.471 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 80.239/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 79.470 -> Packet PH|6|L|92|1 CryptoFrame[0,36] 79.853 <- (2) Packet A|3|S0|a57ce03c263cf376|467|3 NewConnectionIdFrame[1,<0|4f2d4a74024b415649855870d821c5d86070a3ef|ca02f2b4ccb503e795dce564c878fcf2] HandshakeDoneFrame[] CryptoFrame[0,396] 79.854 State is set to Confirmed reschedule loss detection timer for PTO over -88 millis, based on 79.766/App, because ackElicitingInFlight | RTT:32/16 79.854 loss detection timeout handler running Sending probe 3, because no ack since 78.798. Current RTT: 32/16. reschedule loss detection timer for PTO over -935 millis, based on 78.919/App, because ackElicitingInFlight | RTT:32/16 79.854 (Probe is retransmit on level App) 79.854 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 120 millis, based on 79.976/App, because ackElicitingInFlight | RTT:32/16 79.855 -> Packet PA|1|S0|6f71670575c15d1e200d710cb42b5ff64dba5c2a|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 120 millis, based on 79.977/App, because ackElicitingInFlight | RTT:32/16 79.856 -> Packet PA|2|S0|6f71670575c15d1e200d710cb42b5ff64dba5c2a|59|1 StreamFrame[0(CIB),0,17,fin] 79.874 -> Packet A|3|S0|6f71670575c15d1e200d710cb42b5ff64dba5c2a|44|1 AckFrame[3|Δ19] 79.905 <- (3) Packet A|4|S0|a57ce03c263cf376|66|1 NewConnectionIdFrame[1,<0|4f2d4a74024b415649855870d821c5d86070a3ef|ca02f2b4ccb503e795dce564c878fcf2] 79.924 -> Packet A|4|S0|6f71670575c15d1e200d710cb42b5ff64dba5c2a|44|1 AckFrame[4-3|Δ19] 79.976 loss detection timeout handler running Sending probe 0, because no ack since 79.856. Current RTT: 32/16. 79.976 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 80.218/App, because ackElicitingInFlight | RTT:32/16 79.976 -> Packet PA|5|S0|6f71670575c15d1e200d710cb42b5ff64dba5c2a|59|1 StreamFrame[0(CIB),0,17,fin] 80.217 loss detection timeout handler running Sending probe 1, because no ack since 79.976. Current RTT: 32/16. 80.217 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 80.702/App, because ackElicitingInFlight | RTT:32/16 80.218 -> Packet PA|6|S0|6f71670575c15d1e200d710cb42b5ff64dba5c2a|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 80.703/App, because ackElicitingInFlight | RTT:32/16 80.219 -> Packet PA|7|S0|6f71670575c15d1e200d710cb42b5ff64dba5c2a|59|1 StreamFrame[0(CIB),0,17,fin] 80.249 <- (4) Packet A|6|S0|a57ce03c263cf376|1062|2 AckFrame[6,3|Δ0] StreamFrame[0(CIB),0,1024,fin] 80.250 Cwnd(-): 6000; inflight: 59 80.250 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 89 millis, based on 80.340/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 104 millis, based on 80.355/App, because ackElicitingInFlight | RTT:32/12 80.250 -> Packet A|8|S0|6f71670575c15d1e200d710cb42b5ff64dba5c2a|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4|Δ0] 80.250 Finished downloading https://server4:443/ddimhtknom at 41:37.154 on ClientConnection[938d85d2469e968b/a57ce03c263cf376(V1) with server4/193.167.100.100:443] 80.251 Closing ClientConnection[938d85d2469e968b/a57ce03c263cf376(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 80.251 -> Packet A|9|S0|6f71670575c15d1e200d710cb42b5ff64dba5c2a|49|2 ConnectionCloseFrame[0|0|] AckFrame[6,4|Δ0] 80.251 Creating connection with server4:443 with v1 80.252 Setting up connection for downloading https://server4:443/ohhmiqmdis at 41:37.155 on ClientConnection[987cea0b6be105e7/04b87f293dc0eaaa(V1) with server4/193.167.100.100:443] 80.252 Original destination connection id: 987cea0b6be105e7 (scid: 04b87f293dc0eaaa) >- CryptoStream[I|ClientHello] 80.253 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 80.453/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 80.253 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 80.286 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 80.286 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 80.486/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 80.286 <- (1) Packet H|1|L|753|1 CryptoFrame[0,695] 80.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 80.384/Handshake, because peerAwaitingAddressValidation | RTT:32/16 80.288 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 80.291 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 80.387/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 80.290 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 80.291 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 80.291 Starting downloading https://server4:443/ohhmiqmdis at 41:37.194 on ClientConnection[987cea0b6be105e7/04b87f293dc0eaaa(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 80.387/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 80.291 Discarding pn space Initial because first Handshake message is being sent 80.291 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 80.291 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 80.387/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 80.291 -> Packet A|0|S0|25d9f6ad4cff7b9d9b0463eb15dc467fa3f7e826|59|1 StreamFrame[0(CIB),0,17,fin] 80.323 <- (2) Packet A|3|S0|04b87f293dc0eaaa|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 80.323 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 80.419/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 80.323 Finished downloading https://server4:443/ohhmiqmdis at 41:37.227 on ClientConnection[987cea0b6be105e7/04b87f293dc0eaaa(V1) with server4/193.167.100.100:443] 80.323 Closing ClientConnection[987cea0b6be105e7/04b87f293dc0eaaa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 80.324 Creating connection with server4:443 with v1 80.324 -> Packet A|1|S0|25d9f6ad4cff7b9d9b0463eb15dc467fa3f7e826|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 80.324 Setting up connection for downloading https://server4:443/xwmttvrutn at 41:37.228 on ClientConnection[66605569bb73a873/a775ce28a1526623(V1) with server4/193.167.100.100:443] 80.324 Original destination connection id: 66605569bb73a873 (scid: a775ce28a1526623) >- CryptoStream[I|ClientHello] 80.325 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 80.525/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 80.325 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 80.358 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 80.359 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 80.559/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 80.358 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 80.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 80.458/Handshake, because peerAwaitingAddressValidation | RTT:33/16 80.361 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 80.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 80.460/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 80.363 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 80.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 80.363 Starting downloading https://server4:443/xwmttvrutn at 41:37.266 on ClientConnection[66605569bb73a873/a775ce28a1526623(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 80.460/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 80.363 Discarding pn space Initial because first Handshake message is being sent 80.363 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 80.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 80.460/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 80.363 -> Packet A|0|S0|5dc74e01254868c7b24ec51859fb48feee70f3a6|59|1 StreamFrame[0(CIB),0,17,fin] 80.394 <- (2) Packet A|2|S0|a775ce28a1526623|467|3 NewConnectionIdFrame[1,<0|7d6d4bb5b6c4af09f1f3a9c1878ca1ec05c29531|e24b9b3a4d4695de544e3af365cb3713] HandshakeDoneFrame[] CryptoFrame[0,396] 80.394 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 80.460/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 80.485/App, because ackElicitingInFlight | RTT:33/16 80.394 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 80.414 -> Packet A|1|S0|5dc74e01254868c7b24ec51859fb48feee70f3a6|44|1 AckFrame[2|Δ19] 80.484 loss detection timeout handler running Sending probe 0, because no ack since 80.363. Current RTT: 33/16. 80.485 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 80.729/App, because ackElicitingInFlight | RTT:33/16 80.485 -> Packet PA|2|S0|5dc74e01254868c7b24ec51859fb48feee70f3a6|59|1 StreamFrame[0(CIB),0,17,fin] 80.728 loss detection timeout handler running Sending probe 1, because no ack since 80.485. Current RTT: 33/16. 80.728 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 81.216/App, because ackElicitingInFlight | RTT:33/16 80.728 -> Packet PA|3|S0|5dc74e01254868c7b24ec51859fb48feee70f3a6|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 81.217/App, because ackElicitingInFlight | RTT:33/16 80.729 -> Packet PA|4|S0|5dc74e01254868c7b24ec51859fb48feee70f3a6|59|1 StreamFrame[0(CIB),0,17,fin] 80.760 <- (3) Packet A|5|S0|a775ce28a1526623|33|1 AckFrame[4,1-0|Δ0] 80.760 Cwnd(-): 6000; inflight: 59 80.765 loss detection timeout handler running 80.765 loss detection timeout handler running 80.765 loss detection timeout handler running 80.765 loss detection timeout handler running 80.765 loss detection timeout handler running 80.765 loss detection timeout handler running 80.765 loss detection timeout handler running 80.765 loss detection timeout handler running 80.765 loss detection timeout handler running 80.765 loss detection timeout handler running 80.765 loss detection timeout handler running 80.765 loss detection timeout handler running 80.765 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 80.788 <- (4) Packet A|6|S0|a775ce28a1526623|1063|2 AckFrame[4,1-0|Δ27] StreamFrame[0(CIB),0,1024,fin] 80.789 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 80.788 <- (5) Packet A|7|S0|a775ce28a1526623|35|2 AckFrame[4,1-0|Δ27] PingFrame[] 80.789 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 80.789 Finished downloading https://server4:443/xwmttvrutn at 41:37.692 on ClientConnection[66605569bb73a873/a775ce28a1526623(V1) with server4/193.167.100.100:443] 80.789 Closing ClientConnection[66605569bb73a873/a775ce28a1526623(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 80.789 -> Packet A|5|S0|5dc74e01254868c7b24ec51859fb48feee70f3a6|43|1 AckFrame[7-5|Δ0] 80.789 -> Packet A|6|S0|5dc74e01254868c7b24ec51859fb48feee70f3a6|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 80.790 Creating connection with server4:443 with v1 80.790 Setting up connection for downloading https://server4:443/ufnisofbuh at 41:37.694 on ClientConnection[af84b2429db28a2c/fd3068c49202f34b(V1) with server4/193.167.100.100:443] 80.790 Original destination connection id: af84b2429db28a2c (scid: fd3068c49202f34b) >- CryptoStream[I|ClientHello] 80.792 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 80.992/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 80.791 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 80.820 <- (6) Packet A|8|S0|a775ce28a1526623|31|1 AckFrame[5|Δ0] 80.820 -> Packet A|7|S0|5dc74e01254868c7b24ec51859fb48feee70f3a6|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 80.991 loss detection timeout handler running Sending probe 0, because no ack since 80.791. Current RTT: 100/25. 80.991 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 80.991 (Probe is an initial retransmit) 80.991 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 81.391/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 80.991 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 81.390 loss detection timeout handler running Sending probe 1, because no ack since 80.991. Current RTT: 100/25. 81.390 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 81.390 (Probe is an initial retransmit) 81.391 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 82.191/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 81.391 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 81.392 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 82.192/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 81.392 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 81.423 <- (1) Packet I|2|L|62|1 Token=[] AckFrame[2,0|Δ0] 81.424 probe count not reset on ack because handshake not yet confirmed 81.424 Cwnd(-): 6000; inflight: 1200 81.424 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 82.224/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 81.825 <- (2) Packet I|3|L|192|2 Token=[] AckFrame[2,0|Δ401] CryptoFrame[0,123] 81.825 probe count not reset on ack because handshake not yet confirmed 81.825 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 82.209/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[I|ServerHello] 81.827 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 81.923/Handshake, because peerAwaitingAddressValidation | RTT:32/16 81.827 Discarding pn space Initial because first Handshake message is being sent 81.827 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 81.923/Handshake, because peerAwaitingAddressValidation | RTT:32/16 81.827 -> Packet I|4|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1141) 81.860 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 81.861 <- (4) Packet H|5|L|753|1 CryptoFrame[0,695] >- CryptoStream[H|Finished] 81.863 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 81.959/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 81.863 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 81.864 Starting downloading https://server4:443/ufnisofbuh at 41:38.767 on ClientConnection[af84b2429db28a2c/fd3068c49202f34b(V1) with server4/193.167.100.100:443] 81.864 -> Packet H|1|L|58|1 AckFrame[5|Δ0] 81.864 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 81.960/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 81.864 -> Packet A|0|S0|9b1a5a648c76fe37de9b8d2b99edaf5fbdb18e9a|59|1 StreamFrame[0(CIB),0,17,fin] 81.895 <- (5) Packet A|7|S0|fd3068c49202f34b|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 81.896 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 81.992/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 81.896 Finished downloading https://server4:443/ufnisofbuh at 41:38.800 on ClientConnection[af84b2429db28a2c/fd3068c49202f34b(V1) with server4/193.167.100.100:443] 81.896 Closing ClientConnection[af84b2429db28a2c/fd3068c49202f34b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 81.897 -> Packet A|1|S0|9b1a5a648c76fe37de9b8d2b99edaf5fbdb18e9a|47|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 81.897 Creating connection with server4:443 with v1 81.897 Setting up connection for downloading https://server4:443/adsoxalxgz at 41:38.801 on ClientConnection[f0675696d2eeea1c/5b7f3baf9b98a7b2(V1) with server4/193.167.100.100:443] 81.897 Original destination connection id: f0675696d2eeea1c (scid: 5b7f3baf9b98a7b2) >- CryptoStream[I|ClientHello] 81.899 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 82.099/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 81.898 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 81.931 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 81.932 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 82.132/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 81.931 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 81.934 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 82.031/Handshake, because peerAwaitingAddressValidation | RTT:33/16 81.934 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 81.936 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 82.033/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 81.936 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 81.936 Starting downloading https://server4:443/adsoxalxgz at 41:38.840 on ClientConnection[f0675696d2eeea1c/5b7f3baf9b98a7b2(V1) with server4/193.167.100.100:443] 81.936 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 82.033/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 81.936 Discarding pn space Initial because first Handshake message is being sent 81.936 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 81.936 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 82.034/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 81.936 -> Packet A|0|S0|9582eb670d61c2912913aa595fa017f3fe4ecd54|59|1 StreamFrame[0(CIB),0,17,fin] 81.967 <- (2) Packet A|2|S0|5b7f3baf9b98a7b2|467|3 NewConnectionIdFrame[1,<0|045f87f7a0f57289f95e453d47d9b2234173356e|2bdad90c6f4137c27b71f55a90581d1d] HandshakeDoneFrame[] CryptoFrame[0,396] 81.967 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 82.033/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 82.058/App, because ackElicitingInFlight | RTT:33/16 81.968 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 81.968 <- (3) Packet A|3|S0|5b7f3baf9b98a7b2|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 81.968 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 81.968 -> Packet A|1|S0|9582eb670d61c2912913aa595fa017f3fe4ecd54|43|1 AckFrame[3-2|Δ0] 81.969 Finished downloading https://server4:443/adsoxalxgz at 41:38.872 on ClientConnection[f0675696d2eeea1c/5b7f3baf9b98a7b2(V1) with server4/193.167.100.100:443] 81.969 Closing ClientConnection[f0675696d2eeea1c/5b7f3baf9b98a7b2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 81.969 -> Packet A|2|S0|9582eb670d61c2912913aa595fa017f3fe4ecd54|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 81.969 Creating connection with server4:443 with v1 81.969 Setting up connection for downloading https://server4:443/loaknnbjwz at 41:38.873 on ClientConnection[1376745ba2323711/7e6d1ce3ca543e76(V1) with server4/193.167.100.100:443] 81.969 Original destination connection id: 1376745ba2323711 (scid: 7e6d1ce3ca543e76) >- CryptoStream[I|ClientHello] 81.971 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 82.171/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 81.970 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 82.170 loss detection timeout handler running Sending probe 0, because no ack since 81.970. Current RTT: 100/25. 82.170 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 82.170 (Probe is an initial retransmit) 82.170 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 82.570/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 82.170 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 82.203 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 82.203 probe count not reset on ack because handshake not yet confirmed 82.203 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 82.603/Initial, because peerAwaitingAddressValidation | RTT:100/25 82.602 loss detection timeout handler running Sending probe 1, because no ack since 82.170. Current RTT: 32/16. 82.602 Sending probe because peer awaiting address validation 82.602 (Probe is Initial ping, because there is no Initial data to retransmit) 82.602 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 82.986/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 82.602 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 82.986 loss detection timeout handler running Sending probe 2, because no ack since 82.602. Current RTT: 32/16. 82.986 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 82.986 (Probe is Initial ping, because there is no Initial data to retransmit) 82.986 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 83.754/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 82.986 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 82.987 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 83.755/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 82.987 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 83.018 <- (2) Packet I|4|L|62|1 Token=[] AckFrame[3,1-0|Δ0] 83.019 probe count not reset on ack because handshake not yet confirmed 83.019 Cwnd(-): 6000; inflight: 1201 83.019 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 83.787/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 83.019 <- (3) Packet I|5|L|62|1 Token=[] AckFrame[4-3,1-0|Δ0] 83.020 probe count not reset on ack because handshake not yet confirmed 83.020 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 83.660/Initial, because peerAwaitingAddressValidation | RTT:32/12 83.659 loss detection timeout handler running Sending probe 3, because no ack since 82.987. Current RTT: 32/9. 83.659 Sending probe because peer awaiting address validation 83.659 (Probe is Initial ping, because there is no Initial data to retransmit) 83.659 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1087 millis, based on 84.747/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 83.659 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 84.003 Discarding packet (754 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 84.003 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 84.746 loss detection timeout handler running Sending probe 4, because no ack since 83.659. Current RTT: 32/9. 84.746 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 84.746 (Probe is Initial ping, because there is no Initial data to retransmit) 84.747 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 86.923/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 84.747 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 84.748 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 86.924/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 84.748 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 84.780 <- (6) Packet I|9|L|64|1 Token=[] AckFrame[7-6,4-3,1-0|Δ0] 84.781 probe count not reset on ack because handshake not yet confirmed 84.781 Cwnd(-): 3000; inflight: 0 84.781 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 86.957/Initial, because peerAwaitingAddressValidation | RTT:32/9 86.956 loss detection timeout handler running Sending probe 5, because no ack since 84.748. Current RTT: 32/7. 86.956 Sending probe because peer awaiting address validation 86.956 (Probe is Initial ping, because there is no Initial data to retransmit) 86.957 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 90.797/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 86.956 -> Packet PI|8|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 86.989 <- (7) Packet I|10|L|64|1 Token=[] AckFrame[8-6,4-3,1-0|Δ0] 86.990 probe count not reset on ack because handshake not yet confirmed 86.990 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 90.830/Initial, because peerAwaitingAddressValidation | RTT:32/7 87.001 <- (8) Packet I|12|L|66|2 Token=[] AckFrame[8-6,4-3,1-0|Δ10] PingFrame[] 87.001 probe count not reset on ack because handshake not yet confirmed 87.001 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3327 millis, based on 90.329/Initial, because peerAwaitingAddressValidation | RTT:32/5 87.001 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3327 millis, based on 90.329/Initial, because peerAwaitingAddressValidation | RTT:32/5 87.001 -> Packet I|9|L|1201|2 Token=[] AckFrame[12,10-9,5-4,2|Δ0] Padding(1135) 90.328 loss detection timeout handler running Sending probe 6, because no ack since 86.956. Current RTT: 32/5. 90.328 Sending probe because peer awaiting address validation 90.328 (Probe is Initial ping, because there is no Initial data to retransmit) 90.329 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 6655 millis, based on 96.985/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 90.329 -> Packet PI|10|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 90.361 <- (9) Packet I|13|L|66|1 Token=[] AckFrame[10,8-6,4-3,1-0|Δ0] 90.362 probe count not reset on ack because handshake not yet confirmed 90.362 Cwnd(-): 2400; inflight: 0 90.362 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 6655 millis, based on 97.018/Initial, because peerAwaitingAddressValidation | RTT:32/5 97.017 loss detection timeout handler running Sending probe 7, because no ack since 90.329. Current RTT: 32/4. 97.017 Sending probe because peer awaiting address validation 97.017 (Probe is Initial ping, because there is no Initial data to retransmit) 97.018 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 12287 millis, based on 109.306/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/4 97.018 -> Packet PI|11|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 102.989 <- (10) Packet I|17|L|196|2 Token=[] AckFrame[11-10,8-6,4-3,1-0|Δ5938] CryptoFrame[0,123] 102.990 probe count not reset on ack because handshake not yet confirmed 102.990 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 12287 millis, based on 115.278/Initial, because peerAwaitingAddressValidation | RTT:32/4 -< CryptoStream[I|ServerHello] 102.992 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 6725 millis, based on 109.718/Handshake, because peerAwaitingAddressValidation | RTT:774/1488 102.992 Discarding pn space Initial because first Handshake message is being sent 102.992 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 102.992 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 6725 millis, based on 109.718/Handshake, because peerAwaitingAddressValidation | RTT:774/1488 102.992 -> Packet I|12|L|1201|2 Token=[] AckFrame[17,13-12,10-9,5-4,2|Δ0] Padding(1133) 103.204 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 103.453 <- (13) Packet H|23|L|754|1 CryptoFrame[0,696] >- CryptoStream[H|Finished] 103.455 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 6725 millis, based on 110.181/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:774/1488 103.455 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 103.456 Starting downloading https://server4:443/loaknnbjwz at 42:00.359 on ClientConnection[1376745ba2323711/7e6d1ce3ca543e76(V1) with server4/193.167.100.100:443] 103.453 <- (14) Packet H|24|L|58|2 PingFrame[] Padding(3) 103.456 -> Packet H|1|L|58|1 AckFrame[23|Δ0] 103.456 -> Packet H|2|L|58|1 AckFrame[24-23|Δ0] 103.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 6725 millis, based on 110.182/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:774/1488 103.456 -> Packet A|0|S0|14f86b553beefc935d7f128465f8ed1026f149f7|59|1 StreamFrame[0(CIB),0,17,fin] 104.544 <- (15) Packet A|26|S0|7e6d1ce3ca543e76|467|3 NewConnectionIdFrame[1,<0|26923ba3a212fed9ac6c5be579738b2e3e9893ac|d2486eb316dafe0c9b274084ace85b83] HandshakeDoneFrame[] CryptoFrame[0,396] 104.546 State is set to Confirmed reschedule loss detection timer for PTO over 5635 millis, based on 110.181/Handshake, because ackElicitingInFlight | RTT:774/1488 reschedule loss detection timer for PTO over 5661 millis, based on 110.207/App, because ackElicitingInFlight | RTT:774/1488 104.546 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 104.544 <- (16) Packet A|27|S0|7e6d1ce3ca543e76|30|2 PingFrame[] Padding(3) 104.547 -> Packet A|1|S0|14f86b553beefc935d7f128465f8ed1026f149f7|43|1 AckFrame[27-26|Δ0] 106.656 <- (17) Packet A|28|S0|7e6d1ce3ca543e76|507|4 NewConnectionIdFrame[1,<0|26923ba3a212fed9ac6c5be579738b2e3e9893ac|d2486eb316dafe0c9b274084ace85b83] NewConnectionIdFrame[1,<0|26923ba3a212fed9ac6c5be579738b2e3e9893ac|d2486eb316dafe0c9b274084ace85b83] HandshakeDoneFrame[] CryptoFrame[0,396] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 106.656 <- (18) Packet A|29|S0|7e6d1ce3ca543e76|30|2 PingFrame[] Padding(3) 106.657 -> Packet A|2|S0|14f86b553beefc935d7f128465f8ed1026f149f7|43|1 AckFrame[29-26|Δ0] 110.207 loss detection timeout handler running Sending probe 0, because no ack since 103.456. Current RTT: 774/1488. 110.207 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 13501 millis, based on 123.710/App, because ackElicitingInFlight | RTT:774/1488 110.208 -> Packet PA|3|S0|14f86b553beefc935d7f128465f8ed1026f149f7|59|1 StreamFrame[0(CIB),0,17,fin] 110.239 <- (19) Packet A|30|S0|7e6d1ce3ca543e76|1060|2 AckFrame[3|Δ0] StreamFrame[0(CIB),0,1024,fin] 110.240 Cwnd(-): 2400; inflight: 0 110.240 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 110.240 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 5913 millis, based on 116.154/App, because ackElicitingInFlight | RTT:681/1302 110.240 -> Packet A|4|S0|14f86b553beefc935d7f128465f8ed1026f149f7|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[29-26|Δ0] 110.241 Finished downloading https://server4:443/loaknnbjwz at 42:07.144 on ClientConnection[1376745ba2323711/7e6d1ce3ca543e76(V1) with server4/193.167.100.100:443] 110.241 Closing ClientConnection[1376745ba2323711/7e6d1ce3ca543e76(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 110.241 -> Packet A|5|S0|14f86b553beefc935d7f128465f8ed1026f149f7|47|2 ConnectionCloseFrame[0|0|] AckFrame[30-26|Δ0] 110.241 Creating connection with server4:443 with v1 110.242 Setting up connection for downloading https://server4:443/ashoaceeby at 42:07.145 on ClientConnection[ddc739f8254604d1/8636044ccfcd32f5(V1) with server4/193.167.100.100:443] 110.242 Original destination connection id: ddc739f8254604d1 (scid: 8636044ccfcd32f5) >- CryptoStream[I|ClientHello] 110.243 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 110.443/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 110.243 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 110.271 <- (20) Packet A|31|S0|7e6d1ce3ca543e76|71|2 AckFrame[4-3|Δ0] NewConnectionIdFrame[1,<0|26923ba3a212fed9ac6c5be579738b2e3e9893ac|d2486eb316dafe0c9b274084ace85b83] 110.271 -> Packet A|6|S0|14f86b553beefc935d7f128465f8ed1026f149f7|47|2 ConnectionCloseFrame[0|0|] AckFrame[30-26|Δ0] 110.276 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 110.276 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 110.476/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 110.276 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 110.278 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 110.375/Handshake, because peerAwaitingAddressValidation | RTT:33/16 110.278 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 110.280 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 110.377/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 110.280 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 110.281 Starting downloading https://server4:443/ashoaceeby at 42:07.184 on ClientConnection[ddc739f8254604d1/8636044ccfcd32f5(V1) with server4/193.167.100.100:443] 110.281 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 110.378/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 110.281 Discarding pn space Initial because first Handshake message is being sent 110.281 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 110.281 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 110.378/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 110.281 -> Packet A|0|S0|8de86564bc5cb1b888c608ec736dd3120fa8be52|59|1 StreamFrame[0(CIB),0,17,fin] 110.311 <- (2) Packet A|2|S0|8636044ccfcd32f5|467|3 NewConnectionIdFrame[1,<0|5d37af0b4f766906f159a636d19b9af075231d8e|eceacf47a3d4a1c60925bb6ba88321d2] HandshakeDoneFrame[] CryptoFrame[0,396] 110.312 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 110.377/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 110.403/App, because ackElicitingInFlight | RTT:33/16 110.312 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 110.331 -> Packet A|1|S0|8de86564bc5cb1b888c608ec736dd3120fa8be52|44|1 AckFrame[2|Δ19] 110.403 loss detection timeout handler running Sending probe 0, because no ack since 110.281. Current RTT: 33/16. 110.403 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 110.647/App, because ackElicitingInFlight | RTT:33/16 110.403 -> Packet PA|2|S0|8de86564bc5cb1b888c608ec736dd3120fa8be52|59|1 StreamFrame[0(CIB),0,17,fin] 110.443 <- (3) Packet A|5|S0|8636044ccfcd32f5|1061|2 AckFrame[2-0|Δ8] StreamFrame[0(CIB),0,1024,fin] 110.443 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 110.444 Finished downloading https://server4:443/ashoaceeby at 42:07.347 on ClientConnection[ddc739f8254604d1/8636044ccfcd32f5(V1) with server4/193.167.100.100:443] 110.444 Closing ClientConnection[ddc739f8254604d1/8636044ccfcd32f5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 110.444 -> Packet A|3|S0|8de86564bc5cb1b888c608ec736dd3120fa8be52|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 110.444 Creating connection with server4:443 with v1 110.445 Setting up connection for downloading https://server4:443/gpfradzmst at 42:07.348 on ClientConnection[60ca38ab8b99aa1a/90b0d435eeff8345(V1) with server4/193.167.100.100:443] 110.445 Original destination connection id: 60ca38ab8b99aa1a (scid: 90b0d435eeff8345) >- CryptoStream[I|ClientHello] 110.446 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 110.646/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 110.446 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 110.645 loss detection timeout handler running Sending probe 0, because no ack since 110.446. Current RTT: 100/25. 110.645 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 110.645 (Probe is an initial retransmit) 110.645 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 111.045/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 110.645 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 110.678 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 110.678 probe count not reset on ack because handshake not yet confirmed 110.678 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 111.078/Initial, because peerAwaitingAddressValidation | RTT:100/25 111.077 loss detection timeout handler running Sending probe 1, because no ack since 110.645. Current RTT: 32/16. 111.077 Sending probe because peer awaiting address validation 111.078 (Probe is Initial ping, because there is no Initial data to retransmit) 111.078 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 111.462/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 111.078 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 111.461 loss detection timeout handler running Sending probe 2, because no ack since 111.078. Current RTT: 32/16. 111.461 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 111.461 (Probe is Initial ping, because there is no Initial data to retransmit) 111.461 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 112.229/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 111.461 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 111.462 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 112.230/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 111.462 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 111.479 <- (2) Packet I|3|L|190|2 Token=[] AckFrame[1-0|Δ801] CryptoFrame[0,123] 111.479 probe count not reset on ack because handshake not yet confirmed 111.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 112.248/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[I|ServerHello] 111.482 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 111.578/Handshake, because peerAwaitingAddressValidation | RTT:32/16 111.482 Discarding pn space Initial because first Handshake message is being sent 111.482 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 111.578/Handshake, because peerAwaitingAddressValidation | RTT:32/16 111.482 -> Packet I|5|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1141) 111.494 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 111.495 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 111.515 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 111.515 <- (6) Packet H|7|L|755|1 CryptoFrame[0,697] >- CryptoStream[H|Finished] 111.518 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 111.614/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 111.518 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 111.518 Starting downloading https://server4:443/gpfradzmst at 42:08.422 on ClientConnection[60ca38ab8b99aa1a/90b0d435eeff8345(V1) with server4/193.167.100.100:443] 111.518 -> Packet H|1|L|58|1 AckFrame[7|Δ0] 111.519 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 111.615/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 111.519 -> Packet A|0|S0|d5dec371825b88e2a8ddad45d3fbd14a71eeb9a8|59|1 StreamFrame[0(CIB),0,17,fin] 111.549 <- (7) Packet A|8|S0|90b0d435eeff8345|467|3 NewConnectionIdFrame[1,<0|d0af079e2ee943996d08a12c92d68eb99a5aa4e3|c55ae14428c6c070dcf461b718272fcf] HandshakeDoneFrame[] CryptoFrame[0,396] 111.550 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 111.614/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 111.640/App, because ackElicitingInFlight | RTT:32/16 111.550 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 111.569 -> Packet A|1|S0|d5dec371825b88e2a8ddad45d3fbd14a71eeb9a8|44|1 AckFrame[8|Δ19] 111.640 loss detection timeout handler running Sending probe 0, because no ack since 111.519. Current RTT: 32/16. 111.640 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 111.882/App, because ackElicitingInFlight | RTT:32/16 111.640 -> Packet PA|2|S0|d5dec371825b88e2a8ddad45d3fbd14a71eeb9a8|59|1 StreamFrame[0(CIB),0,17,fin] 111.671 <- (8) Packet A|10|S0|90b0d435eeff8345|31|1 AckFrame[2-0|Δ0] 111.671 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 111.682 <- (9) Packet A|11|S0|90b0d435eeff8345|1061|2 AckFrame[2-0|Δ10] StreamFrame[0(CIB),0,1024,fin] 111.682 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 111.682 Finished downloading https://server4:443/gpfradzmst at 42:08.586 on ClientConnection[60ca38ab8b99aa1a/90b0d435eeff8345(V1) with server4/193.167.100.100:443] 111.682 Closing ClientConnection[60ca38ab8b99aa1a/90b0d435eeff8345(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 111.682 -> Packet A|3|S0|d5dec371825b88e2a8ddad45d3fbd14a71eeb9a8|47|2 ConnectionCloseFrame[0|0|] AckFrame[11-10|Δ0] 111.683 Creating connection with server4:443 with v1 111.683 Setting up connection for downloading https://server4:443/hppohghlol at 42:08.586 on ClientConnection[43b92cafefcde600/35502316277cc3a6(V1) with server4/193.167.100.100:443] 111.683 Original destination connection id: 43b92cafefcde600 (scid: 35502316277cc3a6) >- CryptoStream[I|ClientHello] 111.684 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 111.884/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 111.684 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 111.883 loss detection timeout handler running Sending probe 0, because no ack since 111.684. Current RTT: 100/25. 111.883 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 111.883 (Probe is an initial retransmit) 111.884 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 112.284/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 111.884 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 111.916 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 111.917 probe count not reset on ack because handshake not yet confirmed 111.917 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 112.317/Initial, because peerAwaitingAddressValidation | RTT:100/25 112.316 loss detection timeout handler running Sending probe 1, because no ack since 111.884. Current RTT: 32/16. 112.316 Sending probe because peer awaiting address validation 112.316 (Probe is Initial ping, because there is no Initial data to retransmit) 112.316 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 112.700/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 112.316 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 112.699 loss detection timeout handler running Sending probe 2, because no ack since 112.316. Current RTT: 32/16. 112.700 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 112.700 (Probe is Initial ping, because there is no Initial data to retransmit) 112.700 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 113.468/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 112.700 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 112.701 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 113.469/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 112.701 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 112.733 <- (2) Packet I|6|L|60|1 Token=[] AckFrame[4-0|Δ0] 112.734 probe count not reset on ack because handshake not yet confirmed 112.734 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 113.502/Initial, because peerAwaitingAddressValidation | RTT:32/16 113.501 loss detection timeout handler running Sending probe 3, because no ack since 112.701. Current RTT: 32/12. 113.501 Sending probe because peer awaiting address validation 113.501 (Probe is Initial ping, because there is no Initial data to retransmit) 113.502 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 114.782/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 113.501 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 113.716 Discarding packet (755 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 113.717 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 114.781 loss detection timeout handler running Sending probe 4, because no ack since 113.501. Current RTT: 32/12. 114.781 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 114.781 (Probe is Initial ping, because there is no Initial data to retransmit) 114.781 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2559 millis, based on 117.341/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 114.781 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 114.782 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2559 millis, based on 117.342/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 114.782 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 114.814 <- (5) Packet I|9|L|62|1 Token=[] AckFrame[6,4-0|Δ0] 114.814 probe count not reset on ack because handshake not yet confirmed 114.814 Cwnd(-): 6000; inflight: 1201 114.814 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2559 millis, based on 117.374/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 114.815 <- (6) Packet I|10|L|62|1 Token=[] AckFrame[7-6,4-0|Δ0] 114.815 probe count not reset on ack because handshake not yet confirmed 114.815 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 116.991/Initial, because peerAwaitingAddressValidation | RTT:32/9 116.715 <- (7) Packet I|11|L|192|2 Token=[] AckFrame[7-6,4-0|Δ1900] CryptoFrame[0,123] 116.716 probe count not reset on ack because handshake not yet confirmed 116.716 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1919 millis, based on 118.636/Initial, because peerAwaitingAddressValidation | RTT:32/7 -< CryptoStream[I|ServerHello] 116.718 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 59 millis, based on 116.778/Handshake, because peerAwaitingAddressValidation | RTT:32/7 116.718 Discarding pn space Initial because first Handshake message is being sent 116.718 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 116.718 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 59 millis, based on 116.778/Handshake, because peerAwaitingAddressValidation | RTT:32/7 116.718 -> Packet I|8|L|1201|2 Token=[] AckFrame[11-9,6,2|Δ0] Padding(1137) 116.751 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 116.777 loss detection timeout handler running 116.777 Sending probe 0. Current RTT: 32/7. 116.777 Sending probe because peer awaiting address validation 116.778 (Probe is a handshake ping) 116.778 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 119 millis, based on 116.898/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 116.778 -> Packet PH|0|L|56|2 PingFrame[] Padding(2) 116.897 loss detection timeout handler running Sending probe 1, because no ack since 116.778. Current RTT: 32/7. 116.897 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 116.897 (Probe is a handshake ping) 116.897 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 239 millis, based on 117.137/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 116.897 -> Packet PH|1|L|56|2 PingFrame[] Padding(2) 116.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 239 millis, based on 117.138/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 116.898 -> Packet PH|2|L|56|2 PingFrame[] Padding(2) 116.929 <- (10) Packet H|16|L|59|1 AckFrame[2-1|Δ0] 116.929 probe count not reset on ack because handshake not yet confirmed 116.929 Cwnd(-): 3000; inflight: 0 116.929 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 116.965 <- (11) Packet H|17|L|761|2 AckFrame[2-1|Δ35] CryptoFrame[0,697] 116.965 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 55 millis, based on 117.023/Handshake, because ackElicitingInFlight | RTT:32/6 116.967 -> Packet H|3|L|97|2 CryptoFrame[0,36] AckFrame[16|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 116.965 <- (12) Packet H|18|L|61|2 AckFrame[2-1|Δ35] PingFrame[] 116.968 Starting downloading https://server4:443/hppohghlol at 42:13.871 on ClientConnection[43b92cafefcde600/35502316277cc3a6(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 55 millis, based on 117.023/Handshake, because ackElicitingInFlight | RTT:32/6 116.968 -> Packet H|4|L|58|1 AckFrame[17-16|Δ0] 116.968 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 54 millis, based on 117.023/Handshake, because ackElicitingInFlight | RTT:32/6 116.968 -> [Packet H|5|L|58|1 AckFrame[18-16|Δ0], Packet A|0|S0|a472ac1360422c5fa6fe4f0e9decb4e6c56527bb|59|1 StreamFrame[0(CIB),0,17,fin]] 117.022 loss detection timeout handler running Sending probe 0, because no ack since 116.967. Current RTT: 32/6. 117.023 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 117.023 (Probe is a handshake retransmit) 117.023 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 111 millis, based on 117.135/Handshake, because ackElicitingInFlight | RTT:32/6 117.023 -> Packet PH|6|L|92|1 CryptoFrame[0,36] 117.054 <- (13) Packet A|19|S0|35502316277cc3a6|467|3 NewConnectionIdFrame[1,<0|d2c9fcc0d2f2976a29c7bbf1ff639c4bedfe8c4c|cee7c7b6b551af3dded8a12a3acc8a84] HandshakeDoneFrame[] CryptoFrame[0,396] 117.054 State is set to Confirmed reschedule loss detection timer for PTO over 75 millis, based on 117.130/App, because ackElicitingInFlight | RTT:32/6 reschedule loss detection timer for PTO over -5 millis, based on 117.049/App, because ackElicitingInFlight | RTT:32/6 117.055 Discarding pn space Handshake because HandshakeDone is received 117.055 loss detection timeout handler running Sending probe 0, because no ack since 116.968. Current RTT: 32/6. 117.055 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 161 millis, based on 117.217/App, because ackElicitingInFlight | RTT:32/6 117.055 -> Packet PA|1|S0|a472ac1360422c5fa6fe4f0e9decb4e6c56527bb|59|1 StreamFrame[0(CIB),0,17,fin] 117.074 -> Packet A|2|S0|a472ac1360422c5fa6fe4f0e9decb4e6c56527bb|44|1 AckFrame[19|Δ19] 117.087 <- (14) Packet A|20|S0|35502316277cc3a6|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 117.087 Cwnd(-): 2400; inflight: 0 117.087 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 117.087 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 76 millis, based on 117.164/App, because ackElicitingInFlight | RTT:32/5 117.087 -> Packet A|3|S0|a472ac1360422c5fa6fe4f0e9decb4e6c56527bb|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[19|Δ0] 117.087 Finished downloading https://server4:443/hppohghlol at 42:13.991 on ClientConnection[43b92cafefcde600/35502316277cc3a6(V1) with server4/193.167.100.100:443] 117.087 Closing ClientConnection[43b92cafefcde600/35502316277cc3a6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 117.088 -> Packet A|4|S0|a472ac1360422c5fa6fe4f0e9decb4e6c56527bb|47|2 ConnectionCloseFrame[0|0|] AckFrame[20-19|Δ0] 117.088 Creating connection with server4:443 with v1 117.089 Setting up connection for downloading https://server4:443/lzpkuiouhu at 42:13.992 on ClientConnection[cb67bc2016e1b178/88c8fccfa1bcb997(V1) with server4/193.167.100.100:443] 117.089 Original destination connection id: cb67bc2016e1b178 (scid: 88c8fccfa1bcb997) >- CryptoStream[I|ClientHello] 117.090 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 117.290/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 117.090 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 117.289 loss detection timeout handler running Sending probe 0, because no ack since 117.090. Current RTT: 100/25. 117.289 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 117.289 (Probe is an initial retransmit) 117.290 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 117.690/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 117.289 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 117.322 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 117.322 probe count not reset on ack because handshake not yet confirmed 117.323 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 117.723/Initial, because peerAwaitingAddressValidation | RTT:100/25 117.722 loss detection timeout handler running Sending probe 1, because no ack since 117.289. Current RTT: 32/16. 117.722 Sending probe because peer awaiting address validation 117.722 (Probe is Initial ping, because there is no Initial data to retransmit) 117.722 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 118.106/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 117.722 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 118.105 loss detection timeout handler running Sending probe 2, because no ack since 117.722. Current RTT: 32/16. 118.105 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 118.105 (Probe is Initial ping, because there is no Initial data to retransmit) 118.105 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 118.874/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 118.105 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 118.107 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 118.875/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 118.107 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 118.123 <- (2) Packet I|3|L|190|2 Token=[] AckFrame[1-0|Δ801] CryptoFrame[0,123] 118.124 probe count not reset on ack because handshake not yet confirmed 118.124 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 118.892/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[I|ServerHello] 118.127 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 118.223/Handshake, because peerAwaitingAddressValidation | RTT:32/16 118.127 Discarding pn space Initial because first Handshake message is being sent 118.127 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 118.223/Handshake, because peerAwaitingAddressValidation | RTT:32/16 118.127 -> Packet I|5|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1141) 118.138 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 118.139 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 118.160 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 118.222 loss detection timeout handler running 118.222 Sending probe 0. Current RTT: 32/16. 118.222 Sending probe because peer awaiting address validation 118.222 (Probe is a handshake ping) 118.222 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 118.414/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 118.222 -> Packet PH|0|L|56|2 PingFrame[] Padding(2) 118.377 <- (6) Packet H|9|L|58|2 PingFrame[] Padding(3) 118.377 -> Packet H|1|L|58|1 AckFrame[9|Δ0] 118.414 loss detection timeout handler running Sending probe 1, because no ack since 118.222. Current RTT: 32/16. 118.414 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 118.414 (Probe is a handshake ping) 118.414 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 118.798/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 118.414 -> Packet PH|2|L|56|2 PingFrame[] Padding(2) 118.415 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 118.799/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 118.415 -> Packet PH|3|L|56|2 PingFrame[] Padding(2) 118.444 <- (7) Packet H|10|L|59|1 AckFrame[2|Δ0] 118.445 probe count not reset on ack because handshake not yet confirmed 118.445 Cwnd(-): 6000; inflight: 56 reschedule loss detection timer for PTO over 353 millis, based on 118.799/Handshake, because ackElicitingInFlight | RTT:32/16 118.445 <- (8) Packet H|11|L|59|1 AckFrame[3-2|Δ0] 118.446 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 118.812 <- (9) Packet H|12|L|761|2 AckFrame[3-2|Δ365] CryptoFrame[0,695] 118.812 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 71 millis, based on 118.886/Handshake, because ackElicitingInFlight | RTT:32/10 118.814 -> Packet H|4|L|97|2 CryptoFrame[0,36] AckFrame[11-9|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 118.812 <- (10) Packet H|13|L|63|2 AckFrame[3-2|Δ365] PingFrame[] 118.815 Starting downloading https://server4:443/lzpkuiouhu at 42:15.718 on ClientConnection[cb67bc2016e1b178/88c8fccfa1bcb997(V1) with server4/193.167.100.100:443] 118.815 -> Packet H|5|L|58|1 AckFrame[12-9|Δ0] reschedule loss detection timer for PTO over 71 millis, based on 118.886/Handshake, because ackElicitingInFlight | RTT:32/10 118.815 -> Packet H|6|L|58|1 AckFrame[13-9|Δ0] 118.815 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 70 millis, based on 118.886/Handshake, because ackElicitingInFlight | RTT:32/10 118.815 -> Packet A|0|S0|78b42f10a5391e18dfc6a598bc329669d0eaf399|59|1 StreamFrame[0(CIB),0,17,fin] 118.847 <- (11) Packet A|15|S0|88c8fccfa1bcb997|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 39 millis, based on 118.886/Handshake, because ackElicitingInFlight | RTT:32/10 118.848 Finished downloading https://server4:443/lzpkuiouhu at 42:15.751 on ClientConnection[cb67bc2016e1b178/88c8fccfa1bcb997(V1) with server4/193.167.100.100:443] 118.848 Closing ClientConnection[cb67bc2016e1b178/88c8fccfa1bcb997(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 118.848 -> Packet A|1|S0|78b42f10a5391e18dfc6a598bc329669d0eaf399|47|2 ConnectionCloseFrame[0|0|] AckFrame[15|Δ0] 118.848 Creating connection with server4:443 with v1 118.849 Setting up connection for downloading https://server4:443/oyymqplrcx at 42:15.752 on ClientConnection[4788b195437e2ed1/fa418796079b6bbf(V1) with server4/193.167.100.100:443] 118.849 Original destination connection id: 4788b195437e2ed1 (scid: fa418796079b6bbf) >- CryptoStream[I|ClientHello] 118.850 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 119.050/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 118.850 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 118.883 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 118.883 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 119.083/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 118.883 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 118.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 118.982/Handshake, because peerAwaitingAddressValidation | RTT:33/16 118.885 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 118.888 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 118.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 118.887 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 118.888 Starting downloading https://server4:443/oyymqplrcx at 42:15.791 on ClientConnection[4788b195437e2ed1/fa418796079b6bbf(V1) with server4/193.167.100.100:443] 118.888 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 118.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 118.888 Discarding pn space Initial because first Handshake message is being sent 118.888 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 118.888 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 118.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 118.888 -> Packet A|0|S0|32ea7a38a4e4b9a07971b37f59d2e57517c8d088|59|1 StreamFrame[0(CIB),0,17,fin] 118.984 loss detection timeout handler running Sending probe 0, because no ack since 118.887. Current RTT: 33/16. 118.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 118.984 (Probe is a handshake retransmit) 118.985 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 119.179/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 118.984 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 119.178 loss detection timeout handler running Sending probe 1, because no ack since 118.888. Current RTT: 33/16. 119.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 119.178 (Probe is a handshake retransmit) 119.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 119.566/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 119.178 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 119.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 119.567/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 119.179 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 119.277 <- (2) Packet A|4|S0|fa418796079b6bbf|467|3 NewConnectionIdFrame[1,<0|39155de42ad6bcf6a64348f6b96dd6de08a9d8cc|95e77e6eb33616ae03dfd6cfa5b5245e] HandshakeDoneFrame[] CryptoFrame[0,396] 119.278 State is set to Confirmed reschedule loss detection timer for PTO over 98 millis, based on 119.376/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -267 millis, based on 119.010/App, because ackElicitingInFlight | RTT:33/16 119.278 Discarding pn space Handshake because HandshakeDone is received 119.278 loss detection timeout handler running Sending probe 0, because no ack since 118.888. Current RTT: 33/16. 119.278 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 119.522/App, because ackElicitingInFlight | RTT:33/16 119.277 <- (3) Packet A|5|S0|fa418796079b6bbf|30|2 PingFrame[] Padding(3) 119.278 -> Packet PA|1|S0|32ea7a38a4e4b9a07971b37f59d2e57517c8d088|59|1 StreamFrame[0(CIB),0,17,fin] 119.279 -> Packet A|2|S0|32ea7a38a4e4b9a07971b37f59d2e57517c8d088|43|1 AckFrame[5-4|Δ0] 119.521 loss detection timeout handler running Sending probe 1, because no ack since 119.278. Current RTT: 33/16. 119.522 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 120.010/App, because ackElicitingInFlight | RTT:33/16 119.522 -> Packet PA|3|S0|32ea7a38a4e4b9a07971b37f59d2e57517c8d088|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 120.011/App, because ackElicitingInFlight | RTT:33/16 119.523 -> Packet PA|4|S0|32ea7a38a4e4b9a07971b37f59d2e57517c8d088|59|1 StreamFrame[0(CIB),0,17,fin] 119.554 <- (4) Packet A|8|S0|fa418796079b6bbf|1060|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] 119.554 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 119.554 Cwnd(-): 6000; inflight: 59 reschedule loss detection timer for PTO over 90 millis, based on 119.645/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 121 millis, based on 119.676/App, because ackElicitingInFlight | RTT:33/13 119.554 -> Packet A|5|S0|32ea7a38a4e4b9a07971b37f59d2e57517c8d088|59|1 StreamFrame[0(CIB),0,17,fin] 119.554 <- (5) Packet A|9|S0|fa418796079b6bbf|31|1 AckFrame[4-2|Δ0] reschedule loss detection timer for PTO over 109 millis, based on 119.664/App, because ackElicitingInFlight | RTT:33/13 119.555 Finished downloading https://server4:443/oyymqplrcx at 42:16.458 on ClientConnection[4788b195437e2ed1/fa418796079b6bbf(V1) with server4/193.167.100.100:443] 119.555 Closing ClientConnection[4788b195437e2ed1/fa418796079b6bbf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 119.555 -> Packet A|6|S0|32ea7a38a4e4b9a07971b37f59d2e57517c8d088|47|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 119.555 Creating connection with server4:443 with v1 119.556 Setting up connection for downloading https://server4:443/woorekpoku at 42:16.459 on ClientConnection[16f459df1c6eba13/115ab041e85dcf07(V1) with server4/193.167.100.100:443] 119.556 Original destination connection id: 16f459df1c6eba13 (scid: 115ab041e85dcf07) >- CryptoStream[I|ClientHello] 119.557 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 119.757/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 119.557 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 119.585 <- (6) Packet A|10|S0|fa418796079b6bbf|31|1 AckFrame[5-2|Δ0] 119.585 -> Packet A|7|S0|32ea7a38a4e4b9a07971b37f59d2e57517c8d088|47|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 119.590 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 119.591 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 119.791/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 119.590 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 119.594 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 119.691/Handshake, because peerAwaitingAddressValidation | RTT:33/16 119.594 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 119.596 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 119.693/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 119.596 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 119.597 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 119.694/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 119.597 Discarding pn space Initial because first Handshake message is being sent 119.597 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 119.597 Starting downloading https://server4:443/woorekpoku at 42:16.500 on ClientConnection[16f459df1c6eba13/115ab041e85dcf07(V1) with server4/193.167.100.100:443] 119.597 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 119.694/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 119.597 -> Packet A|0|S0|2cf8cab5b6294c2306ef20bde1c16bcfeca82805|59|1 StreamFrame[0(CIB),0,17,fin] 119.627 <- (2) Packet A|2|S0|115ab041e85dcf07|467|3 NewConnectionIdFrame[1,<0|683e0a4de444cbb67b10f622cd9b07883e1914e7|1ded91c609ad6ed601f7cd2989e938bc] HandshakeDoneFrame[] CryptoFrame[0,396] 119.628 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 119.693/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 119.719/App, because ackElicitingInFlight | RTT:33/16 119.628 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 119.629 <- (3) Packet A|3|S0|115ab041e85dcf07|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 119.629 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 119.629 -> Packet A|1|S0|2cf8cab5b6294c2306ef20bde1c16bcfeca82805|44|1 AckFrame[3-2|Δ1] 119.630 Finished downloading https://server4:443/woorekpoku at 42:16.533 on ClientConnection[16f459df1c6eba13/115ab041e85dcf07(V1) with server4/193.167.100.100:443] 119.630 Closing ClientConnection[16f459df1c6eba13/115ab041e85dcf07(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 119.630 -> Packet A|2|S0|2cf8cab5b6294c2306ef20bde1c16bcfeca82805|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 119.630 Creating connection with server4:443 with v1 119.631 Setting up connection for downloading https://server4:443/spggumjeon at 42:16.534 on ClientConnection[de7627475ba554b6/67cecd7cdfc0a2cd(V1) with server4/193.167.100.100:443] 119.631 Original destination connection id: de7627475ba554b6 (scid: 67cecd7cdfc0a2cd) >- CryptoStream[I|ClientHello] 119.632 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 119.832/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 119.632 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 119.665 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 119.665 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 119.865/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 119.665 <- (1) Packet H|1|L|753|1 CryptoFrame[0,695] 119.668 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 119.765/Handshake, because peerAwaitingAddressValidation | RTT:33/16 119.667 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 119.669 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 119.766/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 119.669 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 119.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 119.670 Starting downloading https://server4:443/spggumjeon at 42:16.573 on ClientConnection[de7627475ba554b6/67cecd7cdfc0a2cd(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 119.767/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 119.670 Discarding pn space Initial because first Handshake message is being sent 119.670 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 119.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 119.767/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 119.670 -> Packet A|0|S0|f9557888fbdcbfa3950951a7515901fa276ce06f|59|1 StreamFrame[0(CIB),0,17,fin] 119.700 <- (2) Packet A|2|S0|67cecd7cdfc0a2cd|467|3 NewConnectionIdFrame[1,<0|aa3b05f18ddeb81015b9420f5fa5271d69919f43|701fa033d72c75ff577dcf5e4f0cedf9] HandshakeDoneFrame[] CryptoFrame[0,396] 119.701 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 119.766/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 119.792/App, because ackElicitingInFlight | RTT:33/16 119.701 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 119.720 -> Packet A|1|S0|f9557888fbdcbfa3950951a7515901fa276ce06f|44|1 AckFrame[2|Δ19] 119.792 loss detection timeout handler running Sending probe 0, because no ack since 119.670. Current RTT: 33/16. 119.792 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 120.036/App, because ackElicitingInFlight | RTT:33/16 119.792 -> Packet PA|2|S0|f9557888fbdcbfa3950951a7515901fa276ce06f|59|1 StreamFrame[0(CIB),0,17,fin] 119.823 <- (3) Packet A|4|S0|67cecd7cdfc0a2cd|31|1 AckFrame[2-0|Δ0] 119.823 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 119.832 <- (4) Packet A|5|S0|67cecd7cdfc0a2cd|1061|2 AckFrame[2-0|Δ8] StreamFrame[0(CIB),0,1024,fin] 119.832 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 119.832 Finished downloading https://server4:443/spggumjeon at 42:16.736 on ClientConnection[de7627475ba554b6/67cecd7cdfc0a2cd(V1) with server4/193.167.100.100:443] 119.833 Closing ClientConnection[de7627475ba554b6/67cecd7cdfc0a2cd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 119.833 -> Packet A|3|S0|f9557888fbdcbfa3950951a7515901fa276ce06f|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 119.833 Creating connection with server4:443 with v1 119.833 Setting up connection for downloading https://server4:443/fuwkengvxi at 42:16.737 on ClientConnection[190b6201abc771f0/a468773c644d2e92(V1) with server4/193.167.100.100:443] 119.833 Original destination connection id: 190b6201abc771f0 (scid: a468773c644d2e92) >- CryptoStream[I|ClientHello] 119.834 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 120.034/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 119.834 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 120.034 loss detection timeout handler running Sending probe 0, because no ack since 119.834. Current RTT: 100/25. 120.034 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 120.034 (Probe is an initial retransmit) 120.034 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 120.434/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 120.034 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 120.067 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 120.067 probe count not reset on ack because handshake not yet confirmed 120.067 Retransmitting CryptoFrame[0,257] on level Initial 120.068 Cwnd(-): 6000; inflight: 0 120.068 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 120.468/Initial, because peerAwaitingAddressValidation | RTT:100/25 120.068 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 120.262/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 120.068 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 120.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 120.265/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 120.067 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 120.071 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 120.073 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 120.267/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 120.073 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 120.073 Starting downloading https://server4:443/fuwkengvxi at 42:16.977 on ClientConnection[190b6201abc771f0/a468773c644d2e92(V1) with server4/193.167.100.100:443] 120.073 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 120.170/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 120.074 Discarding pn space Initial because first Handshake message is being sent 120.074 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 120.074 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 120.171/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 120.074 -> Packet A|0|S0|ba285e249cf4c95cf8fac4073e5232bf340a5f0d|59|1 StreamFrame[0(CIB),0,17,fin] 120.170 loss detection timeout handler running Sending probe 0, because no ack since 120.073. Current RTT: 33/16. 120.170 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 120.170 (Probe is a handshake retransmit) 120.170 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 120.364/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 120.170 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 120.238 <- (2) Packet A|3|S0|a468773c644d2e92|467|3 NewConnectionIdFrame[1,<0|d880014890a670485e16d8f8ac72a4dc7ec4d44e|8bce67c45fe170537a31c4d7143ec1c9] HandshakeDoneFrame[] CryptoFrame[0,396] 120.239 State is set to Confirmed reschedule loss detection timer for PTO over 79 millis, based on 120.318/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -43 millis, based on 120.196/App, because ackElicitingInFlight | RTT:33/16 120.239 Discarding pn space Handshake because HandshakeDone is received 120.239 loss detection timeout handler running Sending probe 0, because no ack since 120.074. Current RTT: 33/16. 120.239 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 120.483/App, because ackElicitingInFlight | RTT:33/16 120.239 -> Packet PA|1|S0|ba285e249cf4c95cf8fac4073e5232bf340a5f0d|59|1 StreamFrame[0(CIB),0,17,fin] 120.258 -> Packet A|2|S0|ba285e249cf4c95cf8fac4073e5232bf340a5f0d|44|1 AckFrame[3|Δ19] 120.271 <- (3) Packet A|4|S0|a468773c644d2e92|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 120.271 Cwnd(-): 3000; inflight: 0 120.271 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 120.271 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 120.381/App, because ackElicitingInFlight | RTT:33/13 120.271 -> Packet A|3|S0|ba285e249cf4c95cf8fac4073e5232bf340a5f0d|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 120.271 Finished downloading https://server4:443/fuwkengvxi at 42:17.175 on ClientConnection[190b6201abc771f0/a468773c644d2e92(V1) with server4/193.167.100.100:443] 120.271 Closing ClientConnection[190b6201abc771f0/a468773c644d2e92(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 120.272 -> Packet A|4|S0|ba285e249cf4c95cf8fac4073e5232bf340a5f0d|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 120.272 Creating connection with server4:443 with v1 120.272 Setting up connection for downloading https://server4:443/eokjkmhodd at 42:17.176 on ClientConnection[0096a69cb7935e13/299478ec3f58465d(V1) with server4/193.167.100.100:443] 120.272 Original destination connection id: 0096a69cb7935e13 (scid: 299478ec3f58465d) >- CryptoStream[I|ClientHello] 120.273 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 120.473/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 120.273 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 120.289 <- (4) Packet A|5|S0|a468773c644d2e92|66|1 NewConnectionIdFrame[1,<0|d880014890a670485e16d8f8ac72a4dc7ec4d44e|8bce67c45fe170537a31c4d7143ec1c9] 120.289 -> Packet A|5|S0|ba285e249cf4c95cf8fac4073e5232bf340a5f0d|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 120.302 <- (5) Packet A|6|S0|a468773c644d2e92|31|1 AckFrame[3-1|Δ0] 120.302 -> Packet A|6|S0|ba285e249cf4c95cf8fac4073e5232bf340a5f0d|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 120.306 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 120.306 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 120.506/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 120.306 <- (1) Packet H|1|L|753|1 CryptoFrame[0,695] 120.308 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 120.404/Handshake, because peerAwaitingAddressValidation | RTT:32/16 120.308 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 120.310 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 120.406/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 120.310 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 120.310 Starting downloading https://server4:443/eokjkmhodd at 42:17.214 on ClientConnection[0096a69cb7935e13/299478ec3f58465d(V1) with server4/193.167.100.100:443] 120.310 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 120.407/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 120.311 Discarding pn space Initial because first Handshake message is being sent 120.310 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 120.311 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 120.407/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 120.311 -> Packet A|0|S0|e2c93828558fb0b072e336f47b33740d7265112c|59|1 StreamFrame[0(CIB),0,17,fin] 120.341 <- (2) Packet A|2|S0|299478ec3f58465d|467|3 NewConnectionIdFrame[1,<0|92c86645bf268f0b15fb8de84d9947d6088f38bc|29a4c39859fe746f4d90f8345a2f2d75] HandshakeDoneFrame[] CryptoFrame[0,396] 120.342 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 120.406/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 120.432/App, because ackElicitingInFlight | RTT:32/16 120.342 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 120.361 -> Packet A|1|S0|e2c93828558fb0b072e336f47b33740d7265112c|44|1 AckFrame[2|Δ19] 120.432 loss detection timeout handler running Sending probe 0, because no ack since 120.311. Current RTT: 32/16. 120.432 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 120.674/App, because ackElicitingInFlight | RTT:32/16 120.432 -> Packet PA|2|S0|e2c93828558fb0b072e336f47b33740d7265112c|59|1 StreamFrame[0(CIB),0,17,fin] 120.673 loss detection timeout handler running Sending probe 1, because no ack since 120.432. Current RTT: 32/16. 120.673 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 121.157/App, because ackElicitingInFlight | RTT:32/16 120.673 -> Packet PA|3|S0|e2c93828558fb0b072e336f47b33740d7265112c|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 121.158/App, because ackElicitingInFlight | RTT:32/16 120.674 -> Packet PA|4|S0|e2c93828558fb0b072e336f47b33740d7265112c|59|1 StreamFrame[0(CIB),0,17,fin] 120.705 <- (3) Packet A|3|S0|299478ec3f58465d|1062|2 AckFrame[3,1|Δ0] StreamFrame[0(CIB),0,1024,fin] 120.706 Cwnd(-): 6000; inflight: 59 120.706 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 89 millis, based on 120.795/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 104 millis, based on 120.811/App, because ackElicitingInFlight | RTT:32/12 120.706 -> Packet A|5|S0|e2c93828558fb0b072e336f47b33740d7265112c|59|1 StreamFrame[0(CIB),0,17,fin] 120.706 Finished downloading https://server4:443/eokjkmhodd at 42:17.609 on ClientConnection[0096a69cb7935e13/299478ec3f58465d(V1) with server4/193.167.100.100:443] 120.706 Closing ClientConnection[0096a69cb7935e13/299478ec3f58465d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 120.706 -> Packet A|6|S0|e2c93828558fb0b072e336f47b33740d7265112c|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 120.706 Creating connection with server4:443 with v1 120.707 Setting up connection for downloading https://server4:443/byzqlshtzl at 42:17.610 on ClientConnection[63d027791f5d9631/ddfc7d419ae0414b(V1) with server4/193.167.100.100:443] 120.707 Original destination connection id: 63d027791f5d9631 (scid: ddfc7d419ae0414b) >- CryptoStream[I|ClientHello] 120.708 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 120.908/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 120.708 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 120.741 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 120.741 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 120.941/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 120.741 <- (1) Packet H|1|L|754|1 CryptoFrame[0,696] 120.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 120.839/Handshake, because peerAwaitingAddressValidation | RTT:32/16 120.743 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 120.745 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 120.841/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 120.745 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 120.745 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 120.745 Starting downloading https://server4:443/byzqlshtzl at 42:17.649 on ClientConnection[63d027791f5d9631/ddfc7d419ae0414b(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 120.841/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 120.745 Discarding pn space Initial because first Handshake message is being sent 120.745 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 120.745 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 120.842/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 120.745 -> Packet A|0|S0|e47eb4baf66096da4d3e80fbe1325aa43e3f10e4|59|1 StreamFrame[0(CIB),0,17,fin] 120.835 <- (4) Packet A|4|S0|299478ec3f58465d|1063|2 AckFrame[3,1|Δ130] StreamFrame[0(CIB),0,1024,fin] 120.835 -> Packet A|7|S0|e2c93828558fb0b072e336f47b33740d7265112c|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 120.841 loss detection timeout handler running Sending probe 0, because no ack since 120.745. Current RTT: 32/16. 120.841 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 120.841 (Probe is a handshake retransmit) 120.841 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 121.033/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 120.841 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 121.032 loss detection timeout handler running Sending probe 1, because no ack since 120.745. Current RTT: 32/16. 121.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 121.032 (Probe is a handshake retransmit) 121.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 121.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 121.032 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 121.033 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 121.417/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 121.033 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 121.063 <- (2) Packet A|2|S0|ddfc7d419ae0414b|467|3 NewConnectionIdFrame[1,<0|a9e8387becae620af30186da0ac1ee52542bd95a|a5bfbcd45982d2efba43e78df1aca0f6] HandshakeDoneFrame[] CryptoFrame[0,396] 121.064 State is set to Confirmed reschedule loss detection timer for PTO over 165 millis, based on 121.229/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -197 millis, based on 120.866/App, because ackElicitingInFlight | RTT:32/16 121.064 loss detection timeout handler running 121.064 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 120.745. Current RTT: 32/16. 121.064 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 121.306/App, because ackElicitingInFlight | RTT:32/16 121.064 -> Packet PA|1|S0|e47eb4baf66096da4d3e80fbe1325aa43e3f10e4|59|1 StreamFrame[0(CIB),0,17,fin] 121.083 -> Packet A|2|S0|e47eb4baf66096da4d3e80fbe1325aa43e3f10e4|44|1 AckFrame[2|Δ19] 121.096 <- (3) Packet A|3|S0|ddfc7d419ae0414b|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 121.096 Cwnd(-): 6000; inflight: 0 121.096 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 121.096 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 104 millis, based on 121.201/App, because ackElicitingInFlight | RTT:32/12 121.096 -> Packet A|3|S0|e47eb4baf66096da4d3e80fbe1325aa43e3f10e4|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 121.096 Finished downloading https://server4:443/byzqlshtzl at 42:18.000 on ClientConnection[63d027791f5d9631/ddfc7d419ae0414b(V1) with server4/193.167.100.100:443] 121.096 Closing ClientConnection[63d027791f5d9631/ddfc7d419ae0414b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 121.097 -> Packet A|4|S0|e47eb4baf66096da4d3e80fbe1325aa43e3f10e4|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 121.097 Creating connection with server4:443 with v1 121.097 Setting up connection for downloading https://server4:443/ggkydlinvd at 42:18.001 on ClientConnection[db75391ccec2d366/633a24e04f6a4d83(V1) with server4/193.167.100.100:443] 121.097 Original destination connection id: db75391ccec2d366 (scid: 633a24e04f6a4d83) >- CryptoStream[I|ClientHello] 121.098 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 121.298/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 121.098 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 121.127 <- (4) Packet A|4|S0|ddfc7d419ae0414b|31|1 AckFrame[3-1|Δ0] 121.127 -> Packet A|5|S0|e47eb4baf66096da4d3e80fbe1325aa43e3f10e4|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 121.131 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 121.132 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 121.332/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 121.131 <- (1) Packet H|1|L|753|1 CryptoFrame[0,695] 121.134 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 121.230/Handshake, because peerAwaitingAddressValidation | RTT:32/16 121.134 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 121.135 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 121.231/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 121.135 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 121.136 Starting downloading https://server4:443/ggkydlinvd at 42:18.039 on ClientConnection[db75391ccec2d366/633a24e04f6a4d83(V1) with server4/193.167.100.100:443] 121.136 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 121.232/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 121.136 Discarding pn space Initial because first Handshake message is being sent 121.136 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 121.136 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 121.232/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 121.136 -> Packet A|0|S0|1ee5d7ad5f2c3c085aed1ba065e1687bcea748a7|59|1 StreamFrame[0(CIB),0,17,fin] 121.167 <- (2) Packet A|2|S0|633a24e04f6a4d83|467|3 NewConnectionIdFrame[1,<0|13d27cde910dde04f88d634f9cb4aec62749aa32|ae08bb1b29710a42da8f00cf6bc53706] HandshakeDoneFrame[] CryptoFrame[0,396] 121.167 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 121.231/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 121.257/App, because ackElicitingInFlight | RTT:32/16 121.167 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 121.167 <- (3) Packet A|3|S0|633a24e04f6a4d83|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 121.168 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 121.168 -> Packet A|1|S0|1ee5d7ad5f2c3c085aed1ba065e1687bcea748a7|43|1 AckFrame[3-2|Δ0] 121.168 Finished downloading https://server4:443/ggkydlinvd at 42:18.071 on ClientConnection[db75391ccec2d366/633a24e04f6a4d83(V1) with server4/193.167.100.100:443] 121.168 Closing ClientConnection[db75391ccec2d366/633a24e04f6a4d83(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 121.168 -> Packet A|2|S0|1ee5d7ad5f2c3c085aed1ba065e1687bcea748a7|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 121.169 Creating connection with server4:443 with v1 121.169 Setting up connection for downloading https://server4:443/gwjzrzsvap at 42:18.072 on ClientConnection[ef5a8a1ea09b5370/9d8564ecc5fe14df(V1) with server4/193.167.100.100:443] 121.169 Original destination connection id: ef5a8a1ea09b5370 (scid: 9d8564ecc5fe14df) >- CryptoStream[I|ClientHello] 121.170 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 121.370/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 121.170 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 121.369 loss detection timeout handler running Sending probe 0, because no ack since 121.170. Current RTT: 100/25. 121.369 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 121.369 (Probe is an initial retransmit) 121.369 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 121.769/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 121.369 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 121.402 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 121.402 probe count not reset on ack because handshake not yet confirmed 121.402 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 121.802/Initial, because peerAwaitingAddressValidation | RTT:100/25 121.801 loss detection timeout handler running Sending probe 1, because no ack since 121.369. Current RTT: 32/16. 121.801 Sending probe because peer awaiting address validation 121.802 (Probe is Initial ping, because there is no Initial data to retransmit) 121.802 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 122.186/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 121.802 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 122.185 loss detection timeout handler running Sending probe 2, because no ack since 121.802. Current RTT: 32/16. 122.185 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 122.185 (Probe is Initial ping, because there is no Initial data to retransmit) 122.185 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 122.953/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 122.185 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 122.186 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 122.954/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 122.186 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 122.203 <- (2) Packet I|3|L|190|2 Token=[] AckFrame[1-0|Δ801] CryptoFrame[0,123] 122.203 probe count not reset on ack because handshake not yet confirmed 122.203 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 122.971/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[I|ServerHello] 122.205 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 122.301/Handshake, because peerAwaitingAddressValidation | RTT:32/16 122.205 Discarding pn space Initial because first Handshake message is being sent 122.205 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 122.301/Handshake, because peerAwaitingAddressValidation | RTT:32/16 122.205 -> Packet I|5|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1141) 122.238 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 122.238 <- (4) Packet H|5|L|754|1 CryptoFrame[0,696] >- CryptoStream[H|Finished] 122.241 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 122.337/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 122.241 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 122.241 Starting downloading https://server4:443/gwjzrzsvap at 42:19.145 on ClientConnection[ef5a8a1ea09b5370/9d8564ecc5fe14df(V1) with server4/193.167.100.100:443] 122.241 -> Packet H|1|L|58|1 AckFrame[5|Δ0] 122.241 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 122.338/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 122.241 -> Packet A|0|S0|6b9a2ddbb910a39da0082db1728996b27a31a69b|59|1 StreamFrame[0(CIB),0,17,fin] 122.273 <- (5) Packet A|7|S0|9d8564ecc5fe14df|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 122.273 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 122.369/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 122.274 Finished downloading https://server4:443/gwjzrzsvap at 42:19.177 on ClientConnection[ef5a8a1ea09b5370/9d8564ecc5fe14df(V1) with server4/193.167.100.100:443] 122.274 Closing ClientConnection[ef5a8a1ea09b5370/9d8564ecc5fe14df(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 122.274 -> Packet A|1|S0|6b9a2ddbb910a39da0082db1728996b27a31a69b|47|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 122.274 Creating connection with server4:443 with v1 122.275 Setting up connection for downloading https://server4:443/inawzmxdsv at 42:19.178 on ClientConnection[b82eddb906627ce7/4cf0b8c65c59d604(V1) with server4/193.167.100.100:443] 122.275 Original destination connection id: b82eddb906627ce7 (scid: 4cf0b8c65c59d604) >- CryptoStream[I|ClientHello] 122.276 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 122.476/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 122.275 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 122.308 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 122.309 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 122.509/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 122.308 <- (1) Packet H|1|L|753|1 CryptoFrame[0,695] 122.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 122.409/Handshake, because peerAwaitingAddressValidation | RTT:33/16 122.312 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 122.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 122.411/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 122.314 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 122.315 Starting downloading https://server4:443/inawzmxdsv at 42:19.218 on ClientConnection[b82eddb906627ce7/4cf0b8c65c59d604(V1) with server4/193.167.100.100:443] 122.315 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 122.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 122.412/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 122.315 Discarding pn space Initial because first Handshake message is being sent 122.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 122.412/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 122.315 -> Packet A|0|S0|b652252163c9f730443f83a47b20962197a3e59f|59|1 StreamFrame[0(CIB),0,17,fin] 122.345 <- (2) Packet A|2|S0|4cf0b8c65c59d604|467|3 NewConnectionIdFrame[1,<0|a9512fd3333f1de9c0672aec370d5e0c1df3bab4|fc2b1bf52a58eaff4f19f681c64a4337] HandshakeDoneFrame[] CryptoFrame[0,396] 122.346 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 122.411/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 122.437/App, because ackElicitingInFlight | RTT:33/16 122.346 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 122.365 -> Packet A|1|S0|b652252163c9f730443f83a47b20962197a3e59f|44|1 AckFrame[2|Δ19] 122.437 loss detection timeout handler running Sending probe 0, because no ack since 122.315. Current RTT: 33/16. 122.437 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 122.681/App, because ackElicitingInFlight | RTT:33/16 122.437 -> Packet PA|2|S0|b652252163c9f730443f83a47b20962197a3e59f|59|1 StreamFrame[0(CIB),0,17,fin] 122.469 <- (3) Packet A|3|S0|4cf0b8c65c59d604|1060|2 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024,fin] 122.469 Cwnd(-): 6000; inflight: 0 122.469 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 122.469 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 122.579/App, because ackElicitingInFlight | RTT:33/13 122.469 -> Packet A|3|S0|b652252163c9f730443f83a47b20962197a3e59f|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 122.469 Finished downloading https://server4:443/inawzmxdsv at 42:19.373 on ClientConnection[b82eddb906627ce7/4cf0b8c65c59d604(V1) with server4/193.167.100.100:443] 122.469 Closing ClientConnection[b82eddb906627ce7/4cf0b8c65c59d604(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 122.470 -> Packet A|4|S0|b652252163c9f730443f83a47b20962197a3e59f|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0]