0.000 Creating connection with server4:443 with v1 0.079 Setting up connection for downloading https://server4:443/iscwljdasp at 12:36.732 on ClientConnection[60f9788b871b3ee8/9bc7fc98d34228c0(V1) with server4/193.167.100.100:443] 0.081 Original destination connection id: 60f9788b871b3ee8 (scid: 9bc7fc98d34228c0) >- CryptoStream[I|ClientHello] 0.225 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.425/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.220 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.425 loss detection timeout handler running Sending probe 0, because no ack since 0.220. Current RTT: 100/25. 0.427 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.428 (Probe is an initial retransmit) 0.431 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.831/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.430 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.469 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 0.481 probe count not reset on ack because handshake not yet confirmed 0.485 Retransmitting CryptoFrame[0,257] on level Initial 0.487 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.887/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.487 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) 0.489 Cwnd(-): 6000; inflight: 1200 0.491 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.891/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 0.512 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.512 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) 0.469 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 0.542 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.771/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.542 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.549 Starting downloading https://server4:443/iscwljdasp at 12:37.217 on ClientConnection[60f9788b871b3ee8/9bc7fc98d34228c0(V1) with server4/193.167.100.100:443] 0.551 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.665/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.551 Discarding pn space Initial because first Handshake message is being sent 0.551 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 0.574 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.688/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.575 <- (2) Packet A|3|S0|9bc7fc98d34228c0|467|3 NewConnectionIdFrame[1,<0|c162f28d6bf139523bf0df0107858f931be88ee4|28ed62a163486275f6b6d334de0cf7a8] HandshakeDoneFrame[] CryptoFrame[0,396] 0.574 -> Packet A|0|S0|41456e389aea3cd89811592a319ef59fc91ec85a|63|2 StreamFrame[0(CIB),0,17] StreamFrame[0(CIB),17,0,fin] 0.587 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 0.656/Handshake, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over 125 millis, based on 0.713/App, because ackElicitingInFlight | RTT:38/19 0.588 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 0.606 <- (3) Packet A|4|S0|9bc7fc98d34228c0|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 0.608 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 0.609 -> Packet A|1|S0|41456e389aea3cd89811592a319ef59fc91ec85a|44|1 AckFrame[4-3|Δ18] 0.610 Finished downloading https://server4:443/iscwljdasp at 12:37.280 on ClientConnection[60f9788b871b3ee8/9bc7fc98d34228c0(V1) with server4/193.167.100.100:443] 0.612 Closing ClientConnection[60f9788b871b3ee8/9bc7fc98d34228c0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.614 Creating connection with server4:443 with v1 0.615 Setting up connection for downloading https://server4:443/mjaztmmwhh at 12:37.285 on ClientConnection[f8c6cfd2865d3fda/6e039eeccaaa96dd(V1) with server4/193.167.100.100:443] 0.615 Original destination connection id: f8c6cfd2865d3fda (scid: 6e039eeccaaa96dd) >- CryptoStream[I|ClientHello] 0.619 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.614 -> Packet A|2|S0|41456e389aea3cd89811592a319ef59fc91ec85a|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] reschedule loss detection timer for PTO over 199 millis, based on 0.819/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.619 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.652 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.654 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.854/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.652 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 0.659 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.756/Handshake, because peerAwaitingAddressValidation | RTT:33/16 0.659 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 0.664 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.761/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.663 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.665 Starting downloading https://server4:443/mjaztmmwhh at 12:37.335 on ClientConnection[f8c6cfd2865d3fda/6e039eeccaaa96dd(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 0.762/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.665 Discarding pn space Initial because first Handshake message is being sent 0.666 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.764/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.666 -> [Packet H|1|L|58|1 AckFrame[1|Δ0], Packet A|0|S0|e0d8e85a7ea70dddf69903ffaac9ee1b91106861|59|1 StreamFrame[0(CIB),0,17,fin]] 0.696 <- (2) Packet A|2|S0|6e039eeccaaa96dd|467|3 NewConnectionIdFrame[1,<0|ed62af8795ebdd9ba15808e38aa3002732970c9f|7506b3aa6c6b7db15707c0e2e2a9d5d2] HandshakeDoneFrame[] CryptoFrame[0,396] 0.697 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 0.760/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 0.788/App, because ackElicitingInFlight | RTT:33/16 0.697 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 0.717 -> Packet A|1|S0|e0d8e85a7ea70dddf69903ffaac9ee1b91106861|44|1 AckFrame[2|Δ19] 0.787 loss detection timeout handler running Sending probe 0, because no ack since 0.666. Current RTT: 33/16. 0.788 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 1.034/App, because ackElicitingInFlight | RTT:33/16 0.790 -> Packet PA|2|S0|e0d8e85a7ea70dddf69903ffaac9ee1b91106861|59|1 StreamFrame[0(CIB),0,17,fin] 0.822 <- (3) Packet A|3|S0|6e039eeccaaa96dd|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 0.824 Cwnd(-): 6000; inflight: 0 0.824 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 0.824 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 0.934/App, because ackElicitingInFlight | RTT:33/13 0.824 Finished downloading https://server4:443/mjaztmmwhh at 12:37.494 on ClientConnection[f8c6cfd2865d3fda/6e039eeccaaa96dd(V1) with server4/193.167.100.100:443] 0.824 Closing ClientConnection[f8c6cfd2865d3fda/6e039eeccaaa96dd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.824 -> Packet A|3|S0|e0d8e85a7ea70dddf69903ffaac9ee1b91106861|59|1 StreamFrame[0(CIB),0,17,fin] 0.825 Creating connection with server4:443 with v1 0.825 -> Packet A|4|S0|e0d8e85a7ea70dddf69903ffaac9ee1b91106861|48|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ1] 0.826 Setting up connection for downloading https://server4:443/ixdhaeryxy at 12:37.496 on ClientConnection[330c340b69655a96/29db63f6d6723807(V1) with server4/193.167.100.100:443] 0.826 Original destination connection id: 330c340b69655a96 (scid: 29db63f6d6723807) >- CryptoStream[I|ClientHello] 0.828 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.028/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.828 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.855 <- (4) Packet A|4|S0|6e039eeccaaa96dd|31|1 AckFrame[3-1|Δ0] 0.856 -> Packet A|5|S0|e0d8e85a7ea70dddf69903ffaac9ee1b91106861|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 0.861 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.862 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.062/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.861 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 0.867 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.964/Handshake, because peerAwaitingAddressValidation | RTT:33/16 0.866 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 0.870 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.967/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.870 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.872 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.872 Starting downloading https://server4:443/ixdhaeryxy at 12:37.542 on ClientConnection[330c340b69655a96/29db63f6d6723807(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 0.969/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.872 Discarding pn space Initial because first Handshake message is being sent 0.873 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.970/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.872 -> [Packet H|1|L|58|1 AckFrame[1|Δ0], Packet A|0|S0|98bd22f6b6c868b180aae77a776eb7bcf0ca6e06|59|1 StreamFrame[0(CIB),0,17,fin]] 0.902 <- (2) Packet A|2|S0|29db63f6d6723807|467|3 NewConnectionIdFrame[1,<0|6f7cf85351ba4662be56411c484224718162df89|7274b0877d8801a373133ac4031b4f10] HandshakeDoneFrame[] CryptoFrame[0,396] 0.903 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 0.967/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 0.994/App, because ackElicitingInFlight | RTT:33/16 0.903 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 0.923 -> Packet A|1|S0|98bd22f6b6c868b180aae77a776eb7bcf0ca6e06|44|1 AckFrame[2|Δ19] 0.994 loss detection timeout handler running Sending probe 0, because no ack since 0.872. Current RTT: 33/16. 0.995 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 1.239/App, because ackElicitingInFlight | RTT:33/16 0.995 -> Packet PA|2|S0|98bd22f6b6c868b180aae77a776eb7bcf0ca6e06|59|1 StreamFrame[0(CIB),0,17,fin] 1.027 <- (3) Packet A|3|S0|29db63f6d6723807|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 1.028 Cwnd(-): 6000; inflight: 0 1.028 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 1.028 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 1.138/App, because ackElicitingInFlight | RTT:33/13 1.028 -> Packet A|3|S0|98bd22f6b6c868b180aae77a776eb7bcf0ca6e06|59|1 StreamFrame[0(CIB),0,17,fin] 1.029 Finished downloading https://server4:443/ixdhaeryxy at 12:37.699 on ClientConnection[330c340b69655a96/29db63f6d6723807(V1) with server4/193.167.100.100:443] 1.029 Closing ClientConnection[330c340b69655a96/29db63f6d6723807(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.030 Creating connection with server4:443 with v1 1.030 -> Packet A|4|S0|98bd22f6b6c868b180aae77a776eb7bcf0ca6e06|48|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ1] 1.030 Setting up connection for downloading https://server4:443/otkpxufgyf at 12:37.700 on ClientConnection[d4bbcf7a365375d1/89c20b8147a4f97b(V1) with server4/193.167.100.100:443] 1.031 Original destination connection id: d4bbcf7a365375d1 (scid: 89c20b8147a4f97b) >- CryptoStream[I|ClientHello] 1.033 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.233/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.033 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.232 loss detection timeout handler running Sending probe 0, because no ack since 1.033. Current RTT: 100/25. 1.232 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.232 (Probe is an initial retransmit) 1.233 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.633/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.233 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.632 loss detection timeout handler running Sending probe 1, because no ack since 1.233. Current RTT: 100/25. 1.633 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.633 (Probe is an initial retransmit) 1.634 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.434/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.633 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.634 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.434/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.634 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.667 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 1.668 probe count not reset on ack because handshake not yet confirmed 1.668 Retransmitting CryptoFrame[0,257] on level Initial 1.669 Cwnd(-): 6000; inflight: 1200 1.669 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.469/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.669 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 2.469/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.669 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 1.667 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 1.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 2.061/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.673 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 1.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 2.064/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.676 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.677 Starting downloading https://server4:443/otkpxufgyf at 12:38.347 on ClientConnection[d4bbcf7a365375d1/89c20b8147a4f97b(V1) with server4/193.167.100.100:443] 1.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.774/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.677 Discarding pn space Initial because first Handshake message is being sent 1.677 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 1.678 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.776/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.678 -> Packet A|0|S0|e68b6e894fd984139ba08c307e14fd7150c83721|59|1 StreamFrame[0(CIB),0,17,fin] 1.679 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.707 <- (3) Packet A|4|S0|89c20b8147a4f97b|467|3 NewConnectionIdFrame[1,<0|63f6cbcfb1b32617d11669c31b38455977091451|0f80eb0df5fb357d7421d416219901b8] HandshakeDoneFrame[] CryptoFrame[0,396] 1.708 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 1.773/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 1.800/App, because ackElicitingInFlight | RTT:33/16 1.709 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.729 -> Packet A|1|S0|e68b6e894fd984139ba08c307e14fd7150c83721|44|1 AckFrame[4|Δ19] 1.800 loss detection timeout handler running Sending probe 0, because no ack since 1.678. Current RTT: 33/16. 1.800 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 2.044/App, because ackElicitingInFlight | RTT:33/16 1.800 -> Packet PA|2|S0|e68b6e894fd984139ba08c307e14fd7150c83721|59|1 StreamFrame[0(CIB),0,17,fin] 1.832 <- (4) Packet A|5|S0|89c20b8147a4f97b|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 1.833 Cwnd(-): 3000; inflight: 0 1.833 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 1.833 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 1.944/App, because ackElicitingInFlight | RTT:33/13 1.834 -> Packet A|3|S0|e68b6e894fd984139ba08c307e14fd7150c83721|59|1 StreamFrame[0(CIB),0,17,fin] 1.834 Finished downloading https://server4:443/otkpxufgyf at 12:38.504 on ClientConnection[d4bbcf7a365375d1/89c20b8147a4f97b(V1) with server4/193.167.100.100:443] 1.834 Closing ClientConnection[d4bbcf7a365375d1/89c20b8147a4f97b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.835 Creating connection with server4:443 with v1 1.835 -> Packet A|4|S0|e68b6e894fd984139ba08c307e14fd7150c83721|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 1.835 Setting up connection for downloading https://server4:443/eommecvfyg at 12:38.505 on ClientConnection[0471211965d5c8f5/392c219f334872a2(V1) with server4/193.167.100.100:443] 1.836 Original destination connection id: 0471211965d5c8f5 (scid: 392c219f334872a2) >- CryptoStream[I|ClientHello] 1.837 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.037/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.837 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.864 <- (5) Packet A|6|S0|89c20b8147a4f97b|31|1 AckFrame[3-1|Δ0] 1.865 -> Packet A|5|S0|e68b6e894fd984139ba08c307e14fd7150c83721|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 1.870 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 1.871 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.072/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.870 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 1.876 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.973/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.875 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 1.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.976/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.879 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.880 Starting downloading https://server4:443/eommecvfyg at 12:38.549 on ClientConnection[0471211965d5c8f5/392c219f334872a2(V1) with server4/193.167.100.100:443] 1.880 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.977/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.880 Discarding pn space Initial because first Handshake message is being sent 1.880 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 1.880 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.977/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.880 -> Packet A|0|S0|631853e36b0c9565e460f6f4699b061e8efef5fa|59|1 StreamFrame[0(CIB),0,17,fin] 1.910 <- (2) Packet A|2|S0|392c219f334872a2|467|3 NewConnectionIdFrame[1,<0|b3a18d1f54b4ebb6cf18de49c417cc994fe5575a|c66cfe6a895734e177ec071a8e3a97bf] HandshakeDoneFrame[] CryptoFrame[0,396] 1.911 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 1.976/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 2.002/App, because ackElicitingInFlight | RTT:33/16 1.911 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.931 -> Packet A|1|S0|631853e36b0c9565e460f6f4699b061e8efef5fa|44|1 AckFrame[2|Δ19] 2.002 loss detection timeout handler running Sending probe 0, because no ack since 1.880. Current RTT: 33/16. 2.002 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 2.247/App, because ackElicitingInFlight | RTT:33/16 2.003 -> Packet PA|2|S0|631853e36b0c9565e460f6f4699b061e8efef5fa|59|1 StreamFrame[0(CIB),0,17,fin] 2.246 loss detection timeout handler running Sending probe 1, because no ack since 2.003. Current RTT: 33/16. 2.246 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 2.735/App, because ackElicitingInFlight | RTT:33/16 2.247 -> Packet PA|3|S0|631853e36b0c9565e460f6f4699b061e8efef5fa|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 2.736/App, because ackElicitingInFlight | RTT:33/16 2.248 -> Packet PA|4|S0|631853e36b0c9565e460f6f4699b061e8efef5fa|59|1 StreamFrame[0(CIB),0,17,fin] 2.279 <- (3) Packet A|3|S0|392c219f334872a2|1060|2 AckFrame[3|Δ0] StreamFrame[0(CIB),0,1024,fin] 2.279 Cwnd(-): 6000; inflight: 59 2.279 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 2.370/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 109 millis, based on 2.390/App, because ackElicitingInFlight | RTT:33/13 2.280 Finished downloading https://server4:443/eommecvfyg at 12:38.950 on ClientConnection[0471211965d5c8f5/392c219f334872a2(V1) with server4/193.167.100.100:443] 2.280 -> Packet A|5|S0|631853e36b0c9565e460f6f4699b061e8efef5fa|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 2.280 Closing ClientConnection[0471211965d5c8f5/392c219f334872a2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.281 Creating connection with server4:443 with v1 2.281 -> Packet A|6|S0|631853e36b0c9565e460f6f4699b061e8efef5fa|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 2.281 Setting up connection for downloading https://server4:443/hvapcotskc at 12:38.951 on ClientConnection[9efb39e6462b09f5/9b8328a62c67816e(V1) with server4/193.167.100.100:443] 2.281 Original destination connection id: 9efb39e6462b09f5 (scid: 9b8328a62c67816e) >- CryptoStream[I|ClientHello] 2.283 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.483/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.283 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.310 <- (4) Packet A|4|S0|392c219f334872a2|33|1 AckFrame[5,3|Δ0] 2.311 -> Packet A|7|S0|631853e36b0c9565e460f6f4699b061e8efef5fa|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 2.316 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.317 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.517/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.316 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 2.321 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.418/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.321 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 2.324 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.421/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.324 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.325 Starting downloading https://server4:443/hvapcotskc at 12:38.995 on ClientConnection[9efb39e6462b09f5/9b8328a62c67816e(V1) with server4/193.167.100.100:443] 2.325 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.422/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.325 Discarding pn space Initial because first Handshake message is being sent 2.325 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 2.326 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.423/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.326 -> Packet A|0|S0|cb5ac91e48bb0cc51e0c19d3fdb29bcdb7ddd16f|59|1 StreamFrame[0(CIB),0,17,fin] 2.355 <- (2) Packet A|2|S0|9b8328a62c67816e|467|3 NewConnectionIdFrame[1,<0|48d8a295d3a82f7e8377550927ee82ec8b6b5661|4babc0634f727002b08900e1c17f4dba] HandshakeDoneFrame[] CryptoFrame[0,396] 2.356 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 2.421/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 2.448/App, because ackElicitingInFlight | RTT:33/16 2.356 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.357 <- (3) Packet A|3|S0|9b8328a62c67816e|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 2.358 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.358 Finished downloading https://server4:443/hvapcotskc at 12:39.028 on ClientConnection[9efb39e6462b09f5/9b8328a62c67816e(V1) with server4/193.167.100.100:443] 2.358 -> Packet A|1|S0|cb5ac91e48bb0cc51e0c19d3fdb29bcdb7ddd16f|44|1 AckFrame[3-2|Δ1] 2.359 Closing ClientConnection[9efb39e6462b09f5/9b8328a62c67816e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.359 Creating connection with server4:443 with v1 2.359 -> Packet A|2|S0|cb5ac91e48bb0cc51e0c19d3fdb29bcdb7ddd16f|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 2.360 Setting up connection for downloading https://server4:443/hkunhyiwnw at 12:39.030 on ClientConnection[ea25afe2128d17e3/62db5710eafdc37e(V1) with server4/193.167.100.100:443] 2.360 Original destination connection id: ea25afe2128d17e3 (scid: 62db5710eafdc37e) >- CryptoStream[I|ClientHello] 2.362 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.562/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.362 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.561 loss detection timeout handler running Sending probe 0, because no ack since 2.362. Current RTT: 100/25. 2.561 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.562 (Probe is an initial retransmit) 2.562 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.962/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.562 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.962 loss detection timeout handler running Sending probe 1, because no ack since 2.562. Current RTT: 100/25. 2.962 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.962 (Probe is an initial retransmit) 2.963 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.763/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.962 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.963 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 3.763/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.963 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.395 <- (1) Packet I|3|L|192|2 Token=[] AckFrame[3,0|Δ398] CryptoFrame[0,123] 3.396 probe count not reset on ack because handshake not yet confirmed 3.396 Cwnd(-): 6000; inflight: 0 3.396 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 4.196/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.400 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1290 millis, based on 4.691/Handshake, because peerAwaitingAddressValidation | RTT:431/215 3.400 Discarding pn space Initial because first Handshake message is being sent 3.400 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1290 millis, based on 4.691/Handshake, because peerAwaitingAddressValidation | RTT:431/215 3.400 -> Packet I|4|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1141) 3.433 <- (2) Packet H|5|L|756|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 3.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1290 millis, based on 4.729/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:431/215 3.437 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.442 Starting downloading https://server4:443/hkunhyiwnw at 12:40.112 on ClientConnection[ea25afe2128d17e3/62db5710eafdc37e(V1) with server4/193.167.100.100:443] 3.442 -> Packet H|1|L|58|1 AckFrame[5|Δ0] 3.443 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1290 millis, based on 4.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:431/215 3.443 -> Packet A|0|S0|86a4c9e43f1dd9cc0e3b067d287b5dffc399bbbc|59|1 StreamFrame[0(CIB),0,17,fin] 4.733 loss detection timeout handler running Sending probe 0, because no ack since 3.437. Current RTT: 431/215. 4.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.733 (Probe is a handshake retransmit) 4.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2581 millis, based on 7.316/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:431/215 4.734 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 7.316 loss detection timeout handler running Sending probe 1, because no ack since 3.443. Current RTT: 431/215. 7.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.316 (Probe is a handshake retransmit) 7.317 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 5163 millis, based on 12.481/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:431/215 7.316 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 7.317 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 5163 millis, based on 12.482/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:431/215 7.317 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 7.517 <- (3) Packet A|7|S0|62db5710eafdc37e|467|3 NewConnectionIdFrame[1,<0|e8ea4fa1b2584c73deb3acb8abab26bf0a69678f|49d1f83fc34a0dcf1b871624f6999f15] HandshakeDoneFrame[] CryptoFrame[0,396] 7.518 State is set to Confirmed reschedule loss detection timer for PTO over 1188 millis, based on 8.707/App, because ackElicitingInFlight | RTT:431/215 reschedule loss detection timer for PTO over -2760 millis, based on 4.759/App, because ackElicitingInFlight | RTT:431/215 7.519 loss detection timeout handler running 7.519 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 3.443. Current RTT: 431/215. 7.519 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 2631 millis, based on 10.151/App, because ackElicitingInFlight | RTT:431/215 7.519 -> Packet PA|1|S0|86a4c9e43f1dd9cc0e3b067d287b5dffc399bbbc|59|1 StreamFrame[0(CIB),0,17,fin] 7.539 -> Packet A|2|S0|86a4c9e43f1dd9cc0e3b067d287b5dffc399bbbc|44|1 AckFrame[7|Δ19] 7.551 <- (4) Packet A|8|S0|62db5710eafdc37e|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 7.552 Cwnd(-): 3000; inflight: 0 7.552 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 7.552 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 1449 millis, based on 9.002/App, because ackElicitingInFlight | RTT:381/261 7.552 -> Packet A|3|S0|86a4c9e43f1dd9cc0e3b067d287b5dffc399bbbc|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[7|Δ0] 7.553 Finished downloading https://server4:443/hkunhyiwnw at 12:44.223 on ClientConnection[ea25afe2128d17e3/62db5710eafdc37e(V1) with server4/193.167.100.100:443] 7.553 Closing ClientConnection[ea25afe2128d17e3/62db5710eafdc37e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.554 Creating connection with server4:443 with v1 7.554 -> Packet A|4|S0|86a4c9e43f1dd9cc0e3b067d287b5dffc399bbbc|48|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ1] 7.555 Setting up connection for downloading https://server4:443/gtdoealjwz at 12:44.224 on ClientConnection[a59f3de0f204a24c/d24ef47f163a627d(V1) with server4/193.167.100.100:443] 7.555 Original destination connection id: a59f3de0f204a24c (scid: d24ef47f163a627d) >- CryptoStream[I|ClientHello] 7.556 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.757/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.556 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.570 <- (5) Packet A|9|S0|62db5710eafdc37e|66|1 NewConnectionIdFrame[1,<0|e8ea4fa1b2584c73deb3acb8abab26bf0a69678f|49d1f83fc34a0dcf1b871624f6999f15] 7.571 -> Packet A|5|S0|86a4c9e43f1dd9cc0e3b067d287b5dffc399bbbc|47|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 7.756 loss detection timeout handler running Sending probe 0, because no ack since 7.556. Current RTT: 100/25. 7.756 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.756 (Probe is an initial retransmit) 7.757 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.157/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.757 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.156 loss detection timeout handler running Sending probe 1, because no ack since 7.757. Current RTT: 100/25. 8.156 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.156 (Probe is an initial retransmit) 8.157 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.957/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.157 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.158 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.958/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.158 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.191 <- (1) Packet I|2|L|62|1 Token=[] AckFrame[3,0|Δ0] 8.191 probe count not reset on ack because handshake not yet confirmed 8.191 Cwnd(-): 6000; inflight: 1200 8.269 loss detection timeout handler running 8.269 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 8.653/Initial, because peerAwaitingAddressValidation | RTT:32/16 8.652 loss detection timeout handler running Sending probe 2, because no ack since 8.158. Current RTT: 32/16. 8.652 Sending probe because peer awaiting address validation 8.652 (Probe is Initial ping, because there is no Initial data to retransmit) 8.654 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 9.422/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 8.653 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 8.686 <- (2) Packet I|4|L|62|1 Token=[] AckFrame[4-3,0|Δ0] 8.687 probe count not reset on ack because handshake not yet confirmed 8.687 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 9.455/Initial, because peerAwaitingAddressValidation | RTT:32/16 9.454 loss detection timeout handler running Sending probe 3, because no ack since 8.653. Current RTT: 32/12. 9.455 Sending probe because peer awaiting address validation 9.455 (Probe is Initial ping, because there is no Initial data to retransmit) 9.455 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 10.735/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 9.455 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 10.735 loss detection timeout handler running Sending probe 4, because no ack since 9.455. Current RTT: 32/12. 10.735 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.735 (Probe is Initial ping, because there is no Initial data to retransmit) 10.735 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2559 millis, based on 13.296/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 10.735 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 10.736 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2559 millis, based on 13.296/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 10.736 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 12.588 <- (3) Packet I|8|L|194|2 Token=[] AckFrame[7,4-3,0|Δ1819] CryptoFrame[0,123] 12.589 probe count not reset on ack because handshake not yet confirmed 12.590 Cwnd(-): 3000; inflight: 0 12.590 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2559 millis, based on 15.150/Initial, because peerAwaitingAddressValidation | RTT:32/12 -< CryptoStream[I|ServerHello] 12.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2115 millis, based on 14.709/Handshake, because peerAwaitingAddressValidation | RTT:260/464 12.593 Discarding pn space Initial because first Handshake message is being sent 12.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2115 millis, based on 14.709/Handshake, because peerAwaitingAddressValidation | RTT:260/464 12.593 -> Packet I|8|L|1201|2 Token=[] AckFrame[8,4,2|Δ0] Padding(1137) 12.626 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 12.626 <- (5) Packet H|11|L|755|1 CryptoFrame[0,697] >- CryptoStream[H|Finished] 12.630 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2115 millis, based on 14.746/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:260/464 12.630 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.631 Starting downloading https://server4:443/gtdoealjwz at 12:49.301 on ClientConnection[a59f3de0f204a24c/d24ef47f163a627d(V1) with server4/193.167.100.100:443] 12.631 -> Packet H|1|L|58|1 AckFrame[11|Δ0] 12.632 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2115 millis, based on 14.748/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:260/464 12.632 -> Packet A|0|S0|b928e39a13b9f46bbf67b20fb0cb7357672d1bf0|59|1 StreamFrame[0(CIB),0,17,fin] 14.747 loss detection timeout handler running Sending probe 0, because no ack since 12.630. Current RTT: 260/464. 14.747 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.748 (Probe is a handshake retransmit) 14.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 4231 millis, based on 18.980/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:260/464 14.748 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 14.779 <- (6) Packet A|12|S0|d24ef47f163a627d|467|3 NewConnectionIdFrame[1,<0|a7da605438b6138292a133446307f918b1e0e94e|c4858ad175e57a3f643e812b3bfa2d12] HandshakeDoneFrame[] CryptoFrame[0,396] 14.780 State is set to Confirmed reschedule loss detection timer for PTO over 2133 millis, based on 16.914/App, because ackElicitingInFlight | RTT:260/464 reschedule loss detection timer for PTO over -7 millis, based on 14.773/App, because ackElicitingInFlight | RTT:260/464 14.781 loss detection timeout handler running 14.781 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 12.632. Current RTT: 260/464. 14.781 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 4281 millis, based on 19.063/App, because ackElicitingInFlight | RTT:260/464 14.781 -> Packet PA|1|S0|b928e39a13b9f46bbf67b20fb0cb7357672d1bf0|59|1 StreamFrame[0(CIB),0,17,fin] 14.801 -> Packet A|2|S0|b928e39a13b9f46bbf67b20fb0cb7357672d1bf0|44|1 AckFrame[12|Δ19] 14.813 <- (7) Packet A|13|S0|d24ef47f163a627d|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 14.814 Cwnd(-): 2400; inflight: 0 14.814 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 14.814 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 1875 millis, based on 16.690/App, because ackElicitingInFlight | RTT:231/405 14.814 -> Packet A|3|S0|b928e39a13b9f46bbf67b20fb0cb7357672d1bf0|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[12|Δ0] 14.814 Finished downloading https://server4:443/gtdoealjwz at 12:51.484 on ClientConnection[a59f3de0f204a24c/d24ef47f163a627d(V1) with server4/193.167.100.100:443] 14.814 Closing ClientConnection[a59f3de0f204a24c/d24ef47f163a627d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.814 -> Packet A|4|S0|b928e39a13b9f46bbf67b20fb0cb7357672d1bf0|47|2 ConnectionCloseFrame[0|0|] AckFrame[13-12|Δ0] 14.815 Creating connection with server4:443 with v1 14.815 Setting up connection for downloading https://server4:443/kpxqdaiphz at 12:51.485 on ClientConnection[657aa1f941b8f0b6/28ce2c428319c6cf(V1) with server4/193.167.100.100:443] 14.815 Original destination connection id: 657aa1f941b8f0b6 (scid: 28ce2c428319c6cf) >- CryptoStream[I|ClientHello] 14.817 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.017/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.817 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.845 <- (8) Packet A|14|S0|d24ef47f163a627d|31|1 AckFrame[3-1|Δ0] 14.845 -> Packet A|5|S0|b928e39a13b9f46bbf67b20fb0cb7357672d1bf0|47|2 ConnectionCloseFrame[0|0|] AckFrame[13-12|Δ0] 15.016 loss detection timeout handler running Sending probe 0, because no ack since 14.817. Current RTT: 100/25. 15.017 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.017 (Probe is an initial retransmit) 15.017 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.417/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.017 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.416 loss detection timeout handler running Sending probe 1, because no ack since 15.017. Current RTT: 100/25. 15.417 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.417 (Probe is an initial retransmit) 15.417 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.217/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.417 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.418 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.218/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.418 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.451 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 15.451 probe count not reset on ack because handshake not yet confirmed 15.452 Retransmitting CryptoFrame[0,257] on level Initial 15.452 Cwnd(-): 6000; inflight: 1200 15.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.252/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 15.840/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.452 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 15.451 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 15.456 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 15.844/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.456 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 15.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 15.847/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.459 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.459 Starting downloading https://server4:443/kpxqdaiphz at 12:52.129 on ClientConnection[657aa1f941b8f0b6/28ce2c428319c6cf(V1) with server4/193.167.100.100:443] 15.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.556/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.459 Discarding pn space Initial because first Handshake message is being sent 15.459 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 15.460 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.557/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.460 -> Packet A|0|S0|63d03e0cf242a9943232d84348d9339ad718b80f|59|1 StreamFrame[0(CIB),0,17,fin] 15.485 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.491 <- (3) Packet A|5|S0|28ce2c428319c6cf|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 15.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.589/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.493 Finished downloading https://server4:443/kpxqdaiphz at 12:52.163 on ClientConnection[657aa1f941b8f0b6/28ce2c428319c6cf(V1) with server4/193.167.100.100:443] 15.493 Closing ClientConnection[657aa1f941b8f0b6/28ce2c428319c6cf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.493 Creating connection with server4:443 with v1 15.493 -> Packet A|1|S0|63d03e0cf242a9943232d84348d9339ad718b80f|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 15.494 Setting up connection for downloading https://server4:443/yamngtsdaf at 12:52.164 on ClientConnection[199f5c5f5e593351/cd093a4d8f24c5f8(V1) with server4/193.167.100.100:443] 15.494 Original destination connection id: 199f5c5f5e593351 (scid: cd093a4d8f24c5f8) >- CryptoStream[I|ClientHello] 15.496 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.696/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.496 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.529 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 15.530 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.730/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.529 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 15.534 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.631/Handshake, because peerAwaitingAddressValidation | RTT:33/16 15.534 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 15.538 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.635/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.537 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.538 Starting downloading https://server4:443/yamngtsdaf at 12:52.208 on ClientConnection[199f5c5f5e593351/cd093a4d8f24c5f8(V1) with server4/193.167.100.100:443] 15.538 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.635/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.538 Discarding pn space Initial because first Handshake message is being sent 15.538 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 15.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 15.636/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.539 -> Packet A|0|S0|03e60f4222cf8541c113c72dfaa8117f5a189e88|59|1 StreamFrame[0(CIB),0,17,fin] 15.635 loss detection timeout handler running Sending probe 0, because no ack since 15.537. Current RTT: 33/16. 15.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.636 (Probe is a handshake retransmit) 15.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 15.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.636 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 15.668 <- (2) Packet A|2|S0|cd093a4d8f24c5f8|467|3 NewConnectionIdFrame[1,<0|a071f9f834de96cd8585108bef6ec2b60e853ee6|815b3b10597bb5ed71b9ff2d73798011] HandshakeDoneFrame[] CryptoFrame[0,396] 15.668 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 15.783/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 15.661/App, because ackElicitingInFlight | RTT:33/16 15.669 loss detection timeout handler running 15.669 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 15.539. Current RTT: 33/16. 15.669 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 15.913/App, because ackElicitingInFlight | RTT:33/16 15.669 -> Packet PA|1|S0|03e60f4222cf8541c113c72dfaa8117f5a189e88|59|1 StreamFrame[0(CIB),0,17,fin] 15.689 -> Packet A|2|S0|03e60f4222cf8541c113c72dfaa8117f5a189e88|44|1 AckFrame[2|Δ19] 15.912 loss detection timeout handler running Sending probe 1, because no ack since 15.669. Current RTT: 33/16. 15.913 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 16.401/App, because ackElicitingInFlight | RTT:33/16 15.913 -> Packet PA|3|S0|03e60f4222cf8541c113c72dfaa8117f5a189e88|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 16.402/App, because ackElicitingInFlight | RTT:33/16 15.914 -> Packet PA|4|S0|03e60f4222cf8541c113c72dfaa8117f5a189e88|59|1 StreamFrame[0(CIB),0,17,fin] 16.401 loss detection timeout handler running Sending probe 2, because no ack since 15.914. Current RTT: 33/16. 16.402 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 975 millis, based on 17.378/App, because ackElicitingInFlight | RTT:33/16 16.402 -> Packet PA|5|S0|03e60f4222cf8541c113c72dfaa8117f5a189e88|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 975 millis, based on 17.379/App, because ackElicitingInFlight | RTT:33/16 16.403 -> Packet PA|6|S0|03e60f4222cf8541c113c72dfaa8117f5a189e88|59|1 StreamFrame[0(CIB),0,17,fin] 16.434 <- (3) Packet A|4|S0|cd093a4d8f24c5f8|33|1 AckFrame[6,3|Δ0] 16.435 Cwnd(-): 6000; inflight: 59 16.435 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.435 -> Packet A|7|S0|03e60f4222cf8541c113c72dfaa8117f5a189e88|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 16.439 loss detection timeout handler running reschedule loss detection timer for PTO over 105 millis, based on 16.545/App, because ackElicitingInFlight | RTT:33/13 16.466 <- (4) Packet A|5|S0|cd093a4d8f24c5f8|33|1 AckFrame[7-6,3|Δ0] 16.466 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.368 <- (5) Packet A|6|S0|cd093a4d8f24c5f8|1065|2 AckFrame[7-6,3|Δ1901] StreamFrame[0(CIB),0,1024,fin] 18.369 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.369 Finished downloading https://server4:443/yamngtsdaf at 12:55.039 on ClientConnection[199f5c5f5e593351/cd093a4d8f24c5f8(V1) with server4/193.167.100.100:443] 18.369 Closing ClientConnection[199f5c5f5e593351/cd093a4d8f24c5f8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.369 -> Packet A|8|S0|03e60f4222cf8541c113c72dfaa8117f5a189e88|47|2 ConnectionCloseFrame[0|0|] AckFrame[6-4|Δ0] 18.370 Creating connection with server4:443 with v1 18.370 Setting up connection for downloading https://server4:443/mekoessgfm at 12:55.040 on ClientConnection[81600c048c29d478/3feb9428131ee67a(V1) with server4/193.167.100.100:443] 18.370 Original destination connection id: 81600c048c29d478 (scid: 3feb9428131ee67a) >- CryptoStream[I|ClientHello] 18.372 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.572/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.372 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.571 loss detection timeout handler running Sending probe 0, because no ack since 18.372. Current RTT: 100/25. 18.571 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.571 (Probe is an initial retransmit) 18.572 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.972/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.572 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.605 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 18.606 probe count not reset on ack because handshake not yet confirmed 18.606 Retransmitting CryptoFrame[0,257] on level Initial 18.606 Cwnd(-): 6000; inflight: 0 18.606 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.006/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.607 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 18.801/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.607 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 18.605 <- (1) Packet H|1|L|757|1 CryptoFrame[0,699] 18.610 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 18.804/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.610 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.613 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.710/Handshake, because peerAwaitingAddressValidation | RTT:33/16 18.613 Discarding pn space Initial because first Handshake message is being sent 18.613 Starting downloading https://server4:443/mekoessgfm at 12:55.283 on ClientConnection[81600c048c29d478/3feb9428131ee67a(V1) with server4/193.167.100.100:443] 18.613 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.710/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.613 -> Packet H|0|L|92|1 CryptoFrame[0,36] 18.614 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.614 -> [Packet H|1|L|58|1 AckFrame[1|Δ0], Packet A|0|S0|092336f7cf4c7dccf21221dbd6ccb9685643644d|59|1 StreamFrame[0(CIB),0,17,fin]] 18.640 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 18.644 <- (3) Packet A|3|S0|3feb9428131ee67a|467|3 NewConnectionIdFrame[1,<0|e79faf9a2bdfa27775792d132ed3f6f47d03ecf4|8adf182ed07d57037a46ca131c3c976c] HandshakeDoneFrame[] CryptoFrame[0,396] 18.645 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 18.710/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 18.736/App, because ackElicitingInFlight | RTT:33/16 18.645 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 18.665 -> Packet A|1|S0|092336f7cf4c7dccf21221dbd6ccb9685643644d|44|1 AckFrame[3|Δ19] 18.735 loss detection timeout handler running Sending probe 0, because no ack since 18.614. Current RTT: 33/16. 18.736 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 18.980/App, because ackElicitingInFlight | RTT:33/16 18.736 -> Packet PA|2|S0|092336f7cf4c7dccf21221dbd6ccb9685643644d|59|1 StreamFrame[0(CIB),0,17,fin] 18.768 <- (4) Packet A|4|S0|3feb9428131ee67a|1060|2 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024,fin] 18.769 Cwnd(-): 3000; inflight: 0 18.769 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.769 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 18.879/App, because ackElicitingInFlight | RTT:33/13 18.769 -> Packet A|3|S0|092336f7cf4c7dccf21221dbd6ccb9685643644d|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 18.769 Finished downloading https://server4:443/mekoessgfm at 12:55.439 on ClientConnection[81600c048c29d478/3feb9428131ee67a(V1) with server4/193.167.100.100:443] 18.769 Closing ClientConnection[81600c048c29d478/3feb9428131ee67a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.770 -> Packet A|4|S0|092336f7cf4c7dccf21221dbd6ccb9685643644d|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 18.770 Creating connection with server4:443 with v1 18.770 Setting up connection for downloading https://server4:443/enhxxtegxi at 12:55.440 on ClientConnection[7916180a81e9171c/f8f89ef2507b73e0(V1) with server4/193.167.100.100:443] 18.770 Original destination connection id: 7916180a81e9171c (scid: f8f89ef2507b73e0) >- CryptoStream[I|ClientHello] 18.772 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.972/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.772 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.800 <- (5) Packet A|5|S0|3feb9428131ee67a|31|1 AckFrame[3-2|Δ0] 18.801 -> Packet A|5|S0|092336f7cf4c7dccf21221dbd6ccb9685643644d|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 18.971 loss detection timeout handler running Sending probe 0, because no ack since 18.772. Current RTT: 100/25. 18.971 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.972 (Probe is an initial retransmit) 18.972 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.372/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.972 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.005 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 19.006 probe count not reset on ack because handshake not yet confirmed 19.006 Retransmitting CryptoFrame[0,257] on level Initial 19.006 Cwnd(-): 6000; inflight: 0 19.006 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.406/Initial, because peerAwaitingAddressValidation | RTT:100/25 19.007 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 19.201/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.006 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 19.005 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 19.009 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.203/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.009 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 19.012 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.206/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.012 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.012 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.012 Starting downloading https://server4:443/enhxxtegxi at 12:55.682 on ClientConnection[7916180a81e9171c/f8f89ef2507b73e0(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 19.109/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.012 Discarding pn space Initial because first Handshake message is being sent 19.012 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 19.013 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.110/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.013 -> Packet A|0|S0|a717111d59d3bf85be1a6d358fbf50b12aa347af|59|1 StreamFrame[0(CIB),0,17,fin] 19.039 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.109 loss detection timeout handler running Sending probe 0, because no ack since 19.012. Current RTT: 33/16. 19.109 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.109 (Probe is a handshake retransmit) 19.109 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.304/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.109 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 19.141 <- (3) Packet A|3|S0|f8f89ef2507b73e0|467|3 NewConnectionIdFrame[1,<0|cb25b3558cb2d4ae7063ba8dea3c07421bb97255|2aae0bd3af5d95bf68ab8c00fd6c72f4] HandshakeDoneFrame[] CryptoFrame[0,396] 19.141 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 19.257/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 19.135/App, because ackElicitingInFlight | RTT:33/16 19.141 Discarding pn space Handshake because HandshakeDone is received 19.141 loss detection timeout handler running Sending probe 0, because no ack since 19.013. Current RTT: 33/16. 19.142 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 19.386/App, because ackElicitingInFlight | RTT:33/16 19.142 -> Packet PA|1|S0|a717111d59d3bf85be1a6d358fbf50b12aa347af|59|1 StreamFrame[0(CIB),0,17,fin] 19.161 -> Packet A|2|S0|a717111d59d3bf85be1a6d358fbf50b12aa347af|44|1 AckFrame[3|Δ19] 19.385 loss detection timeout handler running Sending probe 1, because no ack since 19.142. Current RTT: 33/16. 19.385 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 19.873/App, because ackElicitingInFlight | RTT:33/16 19.385 -> Packet PA|3|S0|a717111d59d3bf85be1a6d358fbf50b12aa347af|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 19.874/App, because ackElicitingInFlight | RTT:33/16 19.386 -> Packet PA|4|S0|a717111d59d3bf85be1a6d358fbf50b12aa347af|59|1 StreamFrame[0(CIB),0,17,fin] 19.874 loss detection timeout handler running Sending probe 2, because no ack since 19.386. Current RTT: 33/16. 19.874 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 975 millis, based on 20.850/App, because ackElicitingInFlight | RTT:33/16 19.874 -> Packet PA|5|S0|a717111d59d3bf85be1a6d358fbf50b12aa347af|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 975 millis, based on 20.851/App, because ackElicitingInFlight | RTT:33/16 19.875 -> Packet PA|6|S0|a717111d59d3bf85be1a6d358fbf50b12aa347af|59|1 StreamFrame[0(CIB),0,17,fin] 19.906 <- (4) Packet A|5|S0|f8f89ef2507b73e0|33|1 AckFrame[6-5,2|Δ0] 19.907 Cwnd(-): 3000; inflight: 0 19.907 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.907 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 20.017/App, because ackElicitingInFlight | RTT:33/13 19.907 -> Packet A|7|S0|a717111d59d3bf85be1a6d358fbf50b12aa347af|59|1 StreamFrame[0(CIB),0,17,fin] 19.938 <- (5) Packet A|6|S0|f8f89ef2507b73e0|33|1 AckFrame[7-5,2|Δ0] 19.938 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.043 <- (6) Packet A|7|S0|f8f89ef2507b73e0|1063|2 AckFrame[7-5,2|Δ104] StreamFrame[0(CIB),0,1024,fin] 20.044 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.044 Finished downloading https://server4:443/enhxxtegxi at 12:56.714 on ClientConnection[7916180a81e9171c/f8f89ef2507b73e0(V1) with server4/193.167.100.100:443] 20.044 Closing ClientConnection[7916180a81e9171c/f8f89ef2507b73e0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.044 -> Packet A|8|S0|a717111d59d3bf85be1a6d358fbf50b12aa347af|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 20.045 Creating connection with server4:443 with v1 20.045 Setting up connection for downloading https://server4:443/nkqjtqevpq at 12:56.715 on ClientConnection[9ff899fbdfccaa33/b2114f44638ccd58(V1) with server4/193.167.100.100:443] 20.045 Original destination connection id: 9ff899fbdfccaa33 (scid: b2114f44638ccd58) >- CryptoStream[I|ClientHello] 20.047 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.247/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.047 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.080 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 20.080 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.280/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.080 <- (1) Packet H|1|L|757|1 CryptoFrame[0,699] 20.083 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.180/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.082 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 20.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.182/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.085 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.085 Starting downloading https://server4:443/nkqjtqevpq at 12:56.755 on ClientConnection[9ff899fbdfccaa33/b2114f44638ccd58(V1) with server4/193.167.100.100:443] 20.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.182/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.085 Discarding pn space Initial because first Handshake message is being sent 20.086 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.183/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.086 -> [Packet H|1|L|58|1 AckFrame[1|Δ0], Packet A|0|S0|4c4363cfcb5977a899ab0a8380e9a1124d39eb62|59|1 StreamFrame[0(CIB),0,17,fin]] 20.116 <- (2) Packet A|2|S0|b2114f44638ccd58|467|3 NewConnectionIdFrame[1,<0|a20da451e1ec2ce3550e13af07f3f7d64862ca90|85e2ccdf178c95cc3dc039384dcf807a] HandshakeDoneFrame[] CryptoFrame[0,396] 20.117 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 20.182/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 20.208/App, because ackElicitingInFlight | RTT:33/16 20.117 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.136 -> Packet A|1|S0|4c4363cfcb5977a899ab0a8380e9a1124d39eb62|44|1 AckFrame[2|Δ19] 20.207 loss detection timeout handler running Sending probe 0, because no ack since 20.086. Current RTT: 33/16. 20.207 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 20.451/App, because ackElicitingInFlight | RTT:33/16 20.207 -> Packet PA|2|S0|4c4363cfcb5977a899ab0a8380e9a1124d39eb62|59|1 StreamFrame[0(CIB),0,17,fin] 20.239 <- (3) Packet A|3|S0|b2114f44638ccd58|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 20.240 Cwnd(-): 6000; inflight: 0 20.240 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 20.240 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 20.350/App, because ackElicitingInFlight | RTT:33/13 20.240 -> Packet A|3|S0|4c4363cfcb5977a899ab0a8380e9a1124d39eb62|59|1 StreamFrame[0(CIB),0,17,fin] 20.240 Finished downloading https://server4:443/nkqjtqevpq at 12:56.910 on ClientConnection[9ff899fbdfccaa33/b2114f44638ccd58(V1) with server4/193.167.100.100:443] 20.240 Closing ClientConnection[9ff899fbdfccaa33/b2114f44638ccd58(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.241 Creating connection with server4:443 with v1 20.241 -> Packet A|4|S0|4c4363cfcb5977a899ab0a8380e9a1124d39eb62|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 20.242 Setting up connection for downloading https://server4:443/wiroyfzqqr at 12:56.911 on ClientConnection[18a5655e5a0af824/994c9d949ca84f6b(V1) with server4/193.167.100.100:443] 20.242 Original destination connection id: 18a5655e5a0af824 (scid: 994c9d949ca84f6b) >- CryptoStream[I|ClientHello] 20.243 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.443/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.243 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.276 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 20.277 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.477/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.276 <- (1) Packet H|1|L|757|1 CryptoFrame[0,699] 20.279 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.376/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.279 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 20.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.379/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.282 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.282 Starting downloading https://server4:443/wiroyfzqqr at 12:56.952 on ClientConnection[18a5655e5a0af824/994c9d949ca84f6b(V1) with server4/193.167.100.100:443] 20.282 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.379/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.282 Discarding pn space Initial because first Handshake message is being sent 20.282 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 20.283 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.283 -> Packet A|0|S0|5b43977ae599064bcfce404cc66e675c5a1f50bf|59|1 StreamFrame[0(CIB),0,17,fin] 20.314 <- (2) Packet A|3|S0|994c9d949ca84f6b|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 20.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.412/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.315 Finished downloading https://server4:443/wiroyfzqqr at 12:56.985 on ClientConnection[18a5655e5a0af824/994c9d949ca84f6b(V1) with server4/193.167.100.100:443] 20.315 Closing ClientConnection[18a5655e5a0af824/994c9d949ca84f6b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.316 Creating connection with server4:443 with v1 20.315 -> Packet A|1|S0|5b43977ae599064bcfce404cc66e675c5a1f50bf|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 20.316 Setting up connection for downloading https://server4:443/nwzngglqnf at 12:56.986 on ClientConnection[b901ee4d7a3454dc/94049f816895c4f2(V1) with server4/193.167.100.100:443] 20.316 Original destination connection id: b901ee4d7a3454dc (scid: 94049f816895c4f2) 20.316 <- (7) Packet A|8|S0|f8f89ef2507b73e0|1065|2 AckFrame[7-5,2|Δ377] StreamFrame[0(CIB),0,1024,fin] 20.317 -> Packet A|9|S0|a717111d59d3bf85be1a6d358fbf50b12aa347af|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] >- CryptoStream[I|ClientHello] 20.318 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.518/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.318 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.351 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 20.351 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.551/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.351 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 20.354 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.451/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.354 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 20.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 20.453/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.356 -> Packet H|0|L|92|1 CryptoFrame[0,36] 20.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.453/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.356 Starting downloading https://server4:443/nwzngglqnf at 12:57.026 on ClientConnection[b901ee4d7a3454dc/94049f816895c4f2(V1) with server4/193.167.100.100:443] 20.356 Discarding pn space Initial because first Handshake message is being sent 20.356 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 20.357 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.454/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.357 -> Packet A|0|S0|a07b374650e143bc7c078eacca099d150045cf6a|59|1 StreamFrame[0(CIB),0,17,fin] 20.453 loss detection timeout handler running Sending probe 0, because no ack since 20.356. Current RTT: 33/16. 20.453 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.453 (Probe is a handshake retransmit) 20.453 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.647/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.453 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 20.457 <- (2) Packet H|2|L|756|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.460 -> Packet H|3|L|58|1 AckFrame[2-1|Δ0] 20.647 loss detection timeout handler running Sending probe 1, because no ack since 20.357. Current RTT: 33/16. 20.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.647 (Probe is a handshake retransmit) 20.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.035/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.647 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 20.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.036/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.648 -> Packet PH|5|L|92|1 CryptoFrame[0,36] 20.748 <- (3) Packet A|4|S0|94049f816895c4f2|467|3 NewConnectionIdFrame[1,<0|c32ba7153c83e565bf4445ff684af6f96001ea7c|f09258dfce03d4e637803a2e156d7cb5] HandshakeDoneFrame[] CryptoFrame[0,396] 20.748 State is set to Confirmed reschedule loss detection timer for PTO over 96 millis, based on 20.845/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -270 millis, based on 20.479/App, because ackElicitingInFlight | RTT:33/16 20.749 Discarding pn space Handshake because HandshakeDone is received 20.749 loss detection timeout handler running Sending probe 0, because no ack since 20.357. Current RTT: 33/16. 20.749 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 20.993/App, because ackElicitingInFlight | RTT:33/16 20.748 <- (4) Packet A|5|S0|94049f816895c4f2|30|2 PingFrame[] Padding(3) 20.749 -> Packet PA|1|S0|a07b374650e143bc7c078eacca099d150045cf6a|59|1 StreamFrame[0(CIB),0,17,fin] 20.750 -> Packet A|2|S0|a07b374650e143bc7c078eacca099d150045cf6a|43|1 AckFrame[5-4|Δ0] 20.781 <- (5) Packet A|6|S0|94049f816895c4f2|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 20.782 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 20.782 Cwnd(-): 6000; inflight: 0 20.782 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 20.892/App, because ackElicitingInFlight | RTT:33/13 20.782 -> Packet A|3|S0|a07b374650e143bc7c078eacca099d150045cf6a|59|1 StreamFrame[0(CIB),0,17,fin] 20.781 <- (6) Packet A|7|S0|94049f816895c4f2|66|1 NewConnectionIdFrame[1,<0|c32ba7153c83e565bf4445ff684af6f96001ea7c|f09258dfce03d4e637803a2e156d7cb5] 20.782 -> Packet A|4|S0|a07b374650e143bc7c078eacca099d150045cf6a|43|1 AckFrame[7-4|Δ0] 20.782 Finished downloading https://server4:443/nwzngglqnf at 12:57.452 on ClientConnection[b901ee4d7a3454dc/94049f816895c4f2(V1) with server4/193.167.100.100:443] 20.782 Closing ClientConnection[b901ee4d7a3454dc/94049f816895c4f2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.783 -> Packet A|5|S0|a07b374650e143bc7c078eacca099d150045cf6a|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-4|Δ0] 20.783 Creating connection with server4:443 with v1 20.784 Setting up connection for downloading https://server4:443/jgcvukjwph at 12:57.454 on ClientConnection[417b3a3cb053216e/7e47e59969f7784d(V1) with server4/193.167.100.100:443] 20.784 Original destination connection id: 417b3a3cb053216e (scid: 7e47e59969f7784d) >- CryptoStream[I|ClientHello] 20.785 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.985/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.785 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.985 loss detection timeout handler running Sending probe 0, because no ack since 20.785. Current RTT: 100/25. 20.985 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.985 (Probe is an initial retransmit) 20.985 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.385/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.985 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.385 loss detection timeout handler running Sending probe 1, because no ack since 20.985. Current RTT: 100/25. 21.385 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.385 (Probe is an initial retransmit) 21.385 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 22.185/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.385 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.386 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 22.186/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.386 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.419 <- (1) Packet I|3|L|62|1 Token=[] AckFrame[3,1-0|Δ0] 21.420 probe count not reset on ack because handshake not yet confirmed 21.497 loss detection timeout handler running 21.497 Cwnd(-): 6000; inflight: 0 21.497 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 21.881/Initial, because peerAwaitingAddressValidation | RTT:32/16 21.820 <- (2) Packet I|4|L|192|2 Token=[] AckFrame[3,1-0|Δ399] CryptoFrame[0,123] 21.821 probe count not reset on ack because handshake not yet confirmed 21.821 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 22.205/Initial, because peerAwaitingAddressValidation | RTT:32/16 -< CryptoStream[I|ServerHello] 21.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 21.919/Handshake, because peerAwaitingAddressValidation | RTT:32/16 21.823 Discarding pn space Initial because first Handshake message is being sent 21.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 21.919/Handshake, because peerAwaitingAddressValidation | RTT:32/16 21.823 -> Packet I|4|L|1201|2 Token=[] AckFrame[4-3|Δ0] Padding(1141) 21.856 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.857 <- (4) Packet H|6|L|756|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 21.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 95 millis, based on 21.955/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 21.859 -> Packet H|0|L|92|1 CryptoFrame[0,36] 21.859 Starting downloading https://server4:443/jgcvukjwph at 12:58.529 on ClientConnection[417b3a3cb053216e/7e47e59969f7784d(V1) with server4/193.167.100.100:443] 21.859 -> Packet H|1|L|58|1 AckFrame[6|Δ0] 21.860 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 21.956/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 21.860 -> Packet A|0|S0|1916cfd2a6876a7bf3fdb68a3d4574a7427dbefe|59|1 StreamFrame[0(CIB),0,17,fin] 21.955 loss detection timeout handler running Sending probe 0, because no ack since 21.859. Current RTT: 32/16. 21.955 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.955 (Probe is a handshake retransmit) 21.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 22.148/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 21.955 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 22.147 loss detection timeout handler running Sending probe 1, because no ack since 21.860. Current RTT: 32/16. 22.147 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.147 (Probe is a handshake retransmit) 22.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 22.532/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.147 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 22.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 22.532/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.148 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 22.165 <- (5) Packet A|9|S0|7e47e59969f7784d|30|2 PingFrame[] Padding(3) 22.185 -> Packet A|1|S0|1916cfd2a6876a7bf3fdb68a3d4574a7427dbefe|44|1 AckFrame[9|Δ19] 22.216 <- (6) Packet A|10|S0|7e47e59969f7784d|467|3 NewConnectionIdFrame[1,<0|b647255f0afb304a4ba511592932eeeaf2dcf868|7cb20c581c9de34a68393a4f2b202dfc] HandshakeDoneFrame[] CryptoFrame[0,396] 22.216 State is set to Confirmed reschedule loss detection timer for PTO over 127 millis, based on 22.344/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -235 millis, based on 21.981/App, because ackElicitingInFlight | RTT:32/16 22.217 Discarding pn space Handshake because HandshakeDone is received 22.217 loss detection timeout handler running Sending probe 0, because no ack since 21.860. Current RTT: 32/16. 22.217 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 22.459/App, because ackElicitingInFlight | RTT:32/16 22.217 -> Packet PA|2|S0|1916cfd2a6876a7bf3fdb68a3d4574a7427dbefe|59|1 StreamFrame[0(CIB),0,17,fin] 22.223 <- (7) Packet A|11|S0|7e47e59969f7784d|467|3 NewConnectionIdFrame[1,<0|b647255f0afb304a4ba511592932eeeaf2dcf868|7cb20c581c9de34a68393a4f2b202dfc] HandshakeDoneFrame[] CryptoFrame[0,396] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 22.224 -> Packet A|3|S0|1916cfd2a6876a7bf3fdb68a3d4574a7427dbefe|44|1 AckFrame[11-9|Δ6] 22.249 <- (8) Packet A|12|S0|7e47e59969f7784d|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 22.249 Cwnd(-): 3000; inflight: 0 22.250 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.250 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 104 millis, based on 22.355/App, because ackElicitingInFlight | RTT:32/12 22.250 -> Packet A|4|S0|1916cfd2a6876a7bf3fdb68a3d4574a7427dbefe|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[11-10|Δ0] 22.250 Finished downloading https://server4:443/jgcvukjwph at 12:58.920 on ClientConnection[417b3a3cb053216e/7e47e59969f7784d(V1) with server4/193.167.100.100:443] 22.250 Closing ClientConnection[417b3a3cb053216e/7e47e59969f7784d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.251 Creating connection with server4:443 with v1 22.251 -> Packet A|5|S0|1916cfd2a6876a7bf3fdb68a3d4574a7427dbefe|47|2 ConnectionCloseFrame[0|0|] AckFrame[12-10|Δ0] 22.251 Setting up connection for downloading https://server4:443/vkpmgcozxl at 12:58.921 on ClientConnection[cac53a99f1352b77/1fa40ec3079b220c(V1) with server4/193.167.100.100:443] 22.251 Original destination connection id: cac53a99f1352b77 (scid: 1fa40ec3079b220c) >- CryptoStream[I|ClientHello] 22.253 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.453/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.253 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.452 loss detection timeout handler running Sending probe 0, because no ack since 22.253. Current RTT: 100/25. 22.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.452 (Probe is an initial retransmit) 22.453 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.853/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.453 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.852 loss detection timeout handler running Sending probe 1, because no ack since 22.453. Current RTT: 100/25. 22.853 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.853 (Probe is an initial retransmit) 22.853 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.653/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.853 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.854 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.654/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.854 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.886 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[2-1|Δ0] 22.886 probe count not reset on ack because handshake not yet confirmed 22.887 Retransmitting CryptoFrame[0,257] on level Initial 22.887 Cwnd(-): 6000; inflight: 1200 22.887 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.687/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.887 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 23.271/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 22.887 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) 23.270 loss detection timeout handler running Sending probe 2, because no ack since 22.887. Current RTT: 32/16. 23.270 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.270 (Probe is an initial retransmit) 23.271 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 24.039/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 23.270 -> Packet PI|5|L|1212|2 Token=[] CryptoFrame[0,257] Padding(896) 23.272 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 24.040/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 23.272 -> Packet PI|6|L|1212|2 Token=[] CryptoFrame[0,257] Padding(896) 23.303 <- (2) Packet I|4|L|62|1 Token=[] AckFrame[5-4,2-1|Δ0] 23.304 probe count not reset on ack because handshake not yet confirmed 23.304 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 24.072/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 23.304 <- (3) Packet I|5|L|62|1 Token=[] AckFrame[6-4,2-1|Δ0] 23.305 probe count not reset on ack because handshake not yet confirmed 23.305 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 23.945/Initial, because peerAwaitingAddressValidation | RTT:32/12 23.944 loss detection timeout handler running Sending probe 3, because no ack since 23.272. Current RTT: 32/9. 23.944 Sending probe because peer awaiting address validation 23.944 (Probe is Initial ping, because there is no Initial data to retransmit) 23.945 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1087 millis, based on 25.033/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 23.945 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 23.978 <- (4) Packet I|7|L|62|1 Token=[] AckFrame[7-4,2-1|Δ0] 23.978 probe count not reset on ack because handshake not yet confirmed 23.978 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1087 millis, based on 25.067/Initial, because peerAwaitingAddressValidation | RTT:32/9 24.485 Discarding packet (756 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 24.486 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 25.066 loss detection timeout handler running Sending probe 4, because no ack since 23.945. Current RTT: 32/7. 25.066 Sending probe because peer awaiting address validation 25.066 (Probe is Initial ping, because there is no Initial data to retransmit) 25.067 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1919 millis, based on 26.987/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 25.066 -> Packet PI|8|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 26.986 loss detection timeout handler running Sending probe 5, because no ack since 25.066. Current RTT: 32/7. 26.986 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.986 (Probe is Initial ping, because there is no Initial data to retransmit) 26.986 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 30.827/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 26.986 -> Packet PI|9|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 26.987 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 30.827/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 26.987 -> Packet PI|10|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 27.020 <- (7) Packet I|10|L|64|1 Token=[] AckFrame[10,7-4,2-1|Δ0] 27.021 probe count not reset on ack because handshake not yet confirmed 27.021 Cwnd(-): 3000; inflight: 1201 27.023 loss detection timeout handler running 27.023 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3327 millis, based on 30.351/Initial, because peerAwaitingAddressValidation | RTT:32/5 27.483 <- (8) Packet I|11|L|194|2 Token=[] AckFrame[10,7-4,2-1|Δ462] CryptoFrame[0,123] 27.484 probe count not reset on ack because handshake not yet confirmed 27.484 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3327 millis, based on 30.812/Initial, because peerAwaitingAddressValidation | RTT:32/5 -< CryptoStream[I|ServerHello] 27.486 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 51 millis, based on 27.538/Handshake, because peerAwaitingAddressValidation | RTT:32/5 27.486 Discarding pn space Initial because first Handshake message is being sent 27.487 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 51 millis, based on 27.539/Handshake, because peerAwaitingAddressValidation | RTT:32/5 27.487 -> Packet I|11|L|1201|2 Token=[] AckFrame[11-10,7,5-4,2|Δ0] Padding(1135) 27.520 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 27.520 <- (10) Packet H|14|L|756|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 27.524 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 51 millis, based on 27.576/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 27.523 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.524 Starting downloading https://server4:443/vkpmgcozxl at 13:04.194 on ClientConnection[cac53a99f1352b77/1fa40ec3079b220c(V1) with server4/193.167.100.100:443] 27.524 -> Packet H|1|L|58|1 AckFrame[14|Δ0] 27.524 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 51 millis, based on 27.577/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 27.524 -> Packet A|0|S0|80c390a3579c8b90ab20b463bd21c272f61c38cf|59|1 StreamFrame[0(CIB),0,17,fin] 27.555 <- (11) Packet A|15|S0|1fa40ec3079b220c|467|3 NewConnectionIdFrame[1,<0|401df006772b377013a334ab16e96be5e4f5944a|3b75153795df5f258f2e6c80823f2983] HandshakeDoneFrame[] CryptoFrame[0,396] 27.556 State is set to Confirmed reschedule loss detection timer for PTO over 19 millis, based on 27.575/Handshake, because ackElicitingInFlight | RTT:32/5 reschedule loss detection timer for PTO over 45 millis, based on 27.601/App, because ackElicitingInFlight | RTT:32/5 27.556 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 27.556 <- (12) Packet A|16|S0|1fa40ec3079b220c|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 27.556 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.557 -> Packet A|1|S0|80c390a3579c8b90ab20b463bd21c272f61c38cf|43|1 AckFrame[16-15|Δ0] 27.557 Finished downloading https://server4:443/vkpmgcozxl at 13:04.227 on ClientConnection[cac53a99f1352b77/1fa40ec3079b220c(V1) with server4/193.167.100.100:443] 27.557 Closing ClientConnection[cac53a99f1352b77/1fa40ec3079b220c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.557 -> Packet A|2|S0|80c390a3579c8b90ab20b463bd21c272f61c38cf|47|2 ConnectionCloseFrame[0|0|] AckFrame[16-15|Δ0] 27.558 Creating connection with server4:443 with v1 27.558 Setting up connection for downloading https://server4:443/gwvtnaxtnw at 13:04.228 on ClientConnection[dd424bfe45d7f2ab/6b2be6efc94a5c8d(V1) with server4/193.167.100.100:443] 27.558 Original destination connection id: dd424bfe45d7f2ab (scid: 6b2be6efc94a5c8d) >- CryptoStream[I|ClientHello] 27.560 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.760/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.560 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.593 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 27.594 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.794/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.596 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.593 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] reschedule loss detection timer for PTO over 96 millis, based on 27.693/Handshake, because peerAwaitingAddressValidation | RTT:33/16 27.596 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 27.599 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.696/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.599 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.600 Starting downloading https://server4:443/gwvtnaxtnw at 13:04.270 on ClientConnection[dd424bfe45d7f2ab/6b2be6efc94a5c8d(V1) with server4/193.167.100.100:443] 27.600 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.697/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.600 Discarding pn space Initial because first Handshake message is being sent 27.600 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 27.600 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 27.697/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.600 -> Packet A|0|S0|c7bf2d5b55a6dcb6aec4e95c0a8b0a83ec242e2e|59|1 StreamFrame[0(CIB),0,17,fin] 27.697 loss detection timeout handler running Sending probe 0, because no ack since 27.599. Current RTT: 33/16. 27.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.697 (Probe is a handshake retransmit) 27.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 27.891/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.697 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 27.891 loss detection timeout handler running Sending probe 1, because no ack since 27.600. Current RTT: 33/16. 27.891 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.891 (Probe is a handshake retransmit) 27.891 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 28.279/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.891 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 27.892 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 28.280/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 27.892 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 28.084 <- (2) Packet A|5|S0|6b2be6efc94a5c8d|30|2 PingFrame[] Padding(3) 28.104 -> Packet A|1|S0|c7bf2d5b55a6dcb6aec4e95c0a8b0a83ec242e2e|44|1 AckFrame[5|Δ19] 28.264 <- (3) Packet A|8|S0|6b2be6efc94a5c8d|513|5 AckFrame[1|Δ128] NewConnectionIdFrame[1,<0|d71028cf8f4fd16af966d6fb5106cf1ead5378cf|7eea80a58ec45b659e31695e5ca971b9] NewConnectionIdFrame[1,<0|d71028cf8f4fd16af966d6fb5106cf1ead5378cf|7eea80a58ec45b659e31695e5ca971b9] HandshakeDoneFrame[] CryptoFrame[0,396] 28.265 probe count not reset on ack because handshake not yet confirmed 28.265 Cwnd(-): 6000; inflight: 368 28.265 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 28.265 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.265 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 28.653/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 387 millis, based on 28.653/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.265 -> Packet A|2|S0|c7bf2d5b55a6dcb6aec4e95c0a8b0a83ec242e2e|59|1 StreamFrame[0(CIB),0,17,fin] 28.265 State is set to Confirmed reschedule loss detection timer for PTO over 14 millis, based on 28.280/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 121 millis, based on 28.387/App, because ackElicitingInFlight | RTT:33/16 28.265 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 28.285 -> Packet A|3|S0|c7bf2d5b55a6dcb6aec4e95c0a8b0a83ec242e2e|44|1 AckFrame[8|Δ19] 28.297 <- (4) Packet A|9|S0|6b2be6efc94a5c8d|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024,fin] 28.297 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.298 Finished downloading https://server4:443/gwvtnaxtnw at 13:04.967 on ClientConnection[dd424bfe45d7f2ab/6b2be6efc94a5c8d(V1) with server4/193.167.100.100:443] 28.298 Closing ClientConnection[dd424bfe45d7f2ab/6b2be6efc94a5c8d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.298 Creating connection with server4:443 with v1 28.298 -> Packet A|4|S0|c7bf2d5b55a6dcb6aec4e95c0a8b0a83ec242e2e|47|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 28.299 Setting up connection for downloading https://server4:443/ulnnfjuipr at 13:04.969 on ClientConnection[1b8c8233931d9c83/09287214b62d23ba(V1) with server4/193.167.100.100:443] 28.299 Original destination connection id: 1b8c8233931d9c83 (scid: 09287214b62d23ba) >- CryptoStream[I|ClientHello] 28.300 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.500/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.300 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.499 loss detection timeout handler running Sending probe 0, because no ack since 28.300. Current RTT: 100/25. 28.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.500 (Probe is an initial retransmit) 28.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.900/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.500 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.539 <- (5) Packet A|10|S0|6b2be6efc94a5c8d|595|7 AckFrame[2-1|Δ242] NewConnectionIdFrame[1,<0|d71028cf8f4fd16af966d6fb5106cf1ead5378cf|7eea80a58ec45b659e31695e5ca971b9] NewConnectionIdFrame[1,<0|d71028cf8f4fd16af966d6fb5106cf1ead5378cf|7eea80a58ec45b659e31695e5ca971b9] NewConnectionIdFrame[1,<0|d71028cf8f4fd16af966d6fb5106cf1ead5378cf|7eea80a58ec45b659e31695e5ca971b9] NewConnectionIdFrame[1,<0|d71028cf8f4fd16af966d6fb5106cf1ead5378cf|7eea80a58ec45b659e31695e5ca971b9] HandshakeDoneFrame[] CryptoFrame[0,396] 28.539 <- (6) Packet A|11|S0|6b2be6efc94a5c8d|35|2 AckFrame[2-1|Δ242] PingFrame[] 28.540 -> Packet A|5|S0|c7bf2d5b55a6dcb6aec4e95c0a8b0a83ec242e2e|47|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 28.540 -> Packet A|6|S0|c7bf2d5b55a6dcb6aec4e95c0a8b0a83ec242e2e|47|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 28.899 loss detection timeout handler running Sending probe 1, because no ack since 28.500. Current RTT: 100/25. 28.899 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.899 (Probe is an initial retransmit) 28.900 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.700/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.900 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.901 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.701/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.901 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.933 <- (1) Packet I|3|L|60|1 Token=[] AckFrame[2-0|Δ0] 28.933 probe count not reset on ack because handshake not yet confirmed 28.933 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.733/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.934 <- (2) Packet I|4|L|60|1 Token=[] AckFrame[3-0|Δ0] 28.934 probe count not reset on ack because handshake not yet confirmed 28.934 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 29.318/Initial, because peerAwaitingAddressValidation | RTT:32/16 29.317 loss detection timeout handler running Sending probe 2, because no ack since 28.901. Current RTT: 32/12. 29.317 Sending probe because peer awaiting address validation 29.317 (Probe is Initial ping, because there is no Initial data to retransmit) 29.318 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 29.958/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 29.318 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 29.350 <- (3) Packet I|6|L|60|1 Token=[] AckFrame[4-0|Δ0] 29.351 probe count not reset on ack because handshake not yet confirmed 29.351 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 29.991/Initial, because peerAwaitingAddressValidation | RTT:32/12 29.990 loss detection timeout handler running Sending probe 3, because no ack since 29.318. Current RTT: 32/9. 29.990 Sending probe because peer awaiting address validation 29.990 (Probe is Initial ping, because there is no Initial data to retransmit) 29.991 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1087 millis, based on 31.079/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 29.991 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 30.332 Discarding packet (756 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 30.332 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 31.078 loss detection timeout handler running Sending probe 4, because no ack since 29.991. Current RTT: 32/9. 31.078 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 31.078 (Probe is Initial ping, because there is no Initial data to retransmit) 31.079 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 33.255/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 31.079 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 31.080 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 33.256/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 31.080 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 31.112 <- (6) Packet I|11|L|60|1 Token=[] AckFrame[7-0|Δ0] 31.113 probe count not reset on ack because handshake not yet confirmed 31.113 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 33.289/Initial, because peerAwaitingAddressValidation | RTT:32/9 33.288 loss detection timeout handler running Sending probe 5, because no ack since 31.080. Current RTT: 32/7. 33.288 Sending probe because peer awaiting address validation 33.288 (Probe is Initial ping, because there is no Initial data to retransmit) 33.289 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 37.129/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 33.288 -> Packet PI|8|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 33.332 <- (7) Packet I|12|L|190|2 Token=[] AckFrame[7-0|Δ2219] CryptoFrame[0,123] 33.332 probe count not reset on ack because handshake not yet confirmed 33.332 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 37.173/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 -< CryptoStream[I|ServerHello] 33.335 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 59 millis, based on 33.395/Handshake, because peerAwaitingAddressValidation | RTT:32/7 33.335 Discarding pn space Initial because first Handshake message is being sent 33.335 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 33.335 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 59 millis, based on 33.395/Handshake, because peerAwaitingAddressValidation | RTT:32/7 33.335 -> Packet I|9|L|1201|2 Token=[] AckFrame[12-11,6,4-3|Δ0] Padding(1137) 33.368 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 33.369 <- (10) Packet H|15|L|756|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 33.372 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 59 millis, based on 33.432/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 33.372 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.373 Starting downloading https://server4:443/ulnnfjuipr at 13:10.042 on ClientConnection[1b8c8233931d9c83/09287214b62d23ba(V1) with server4/193.167.100.100:443] 33.373 -> Packet H|1|L|58|1 AckFrame[15|Δ0] 33.373 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 59 millis, based on 33.433/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 33.373 -> Packet A|0|S0|263e4e441f9951efbc6b9f3c8124ae552eaec154|59|1 StreamFrame[0(CIB),0,17,fin] 33.404 <- (11) Packet A|16|S0|09287214b62d23ba|467|3 NewConnectionIdFrame[1,<0|400af68c7c7f2a3fbd2f39d44ceb2aea1cd9a2c9|e370b9f1b2e0261e2f5264627ee6d868] HandshakeDoneFrame[] CryptoFrame[0,396] 33.404 State is set to Confirmed reschedule loss detection timer for PTO over 27 millis, based on 33.432/Handshake, because ackElicitingInFlight | RTT:32/7 reschedule loss detection timer for PTO over 53 millis, based on 33.458/App, because ackElicitingInFlight | RTT:32/7 33.404 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 33.405 <- (12) Packet A|17|S0|09287214b62d23ba|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 33.405 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.405 -> Packet A|1|S0|263e4e441f9951efbc6b9f3c8124ae552eaec154|43|1 AckFrame[17-16|Δ0] 33.406 Finished downloading https://server4:443/ulnnfjuipr at 13:10.075 on ClientConnection[1b8c8233931d9c83/09287214b62d23ba(V1) with server4/193.167.100.100:443] 33.406 Closing ClientConnection[1b8c8233931d9c83/09287214b62d23ba(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.406 -> Packet A|2|S0|263e4e441f9951efbc6b9f3c8124ae552eaec154|47|2 ConnectionCloseFrame[0|0|] AckFrame[17-16|Δ0] 33.406 Creating connection with server4:443 with v1 33.407 Setting up connection for downloading https://server4:443/pbghqsptmw at 13:10.077 on ClientConnection[0d6d4b3cb6d141ed/c41e3a2165a41e29(V1) with server4/193.167.100.100:443] 33.407 Original destination connection id: 0d6d4b3cb6d141ed (scid: c41e3a2165a41e29) >- CryptoStream[I|ClientHello] 33.408 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.608/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.408 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.441 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 33.442 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.642/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 33.441 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 33.445 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 33.542/Handshake, because peerAwaitingAddressValidation | RTT:33/16 33.444 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 33.448 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 33.545/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.448 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.448 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.448 Starting downloading https://server4:443/pbghqsptmw at 13:10.118 on ClientConnection[0d6d4b3cb6d141ed/c41e3a2165a41e29(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 33.545/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.449 Discarding pn space Initial because first Handshake message is being sent 33.448 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 33.449 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 33.546/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 33.449 -> Packet A|0|S0|3d7e43eb5d813fd4b1d582db7657f244950d7585|59|1 StreamFrame[0(CIB),0,17,fin] 33.479 <- (2) Packet A|2|S0|c41e3a2165a41e29|467|3 NewConnectionIdFrame[1,<0|8dab99b8a4f12ae590b9ef8f3fd7d5a8765c6109|246d3e99e3ae8269d1f601e8916379d9] HandshakeDoneFrame[] CryptoFrame[0,396] 33.480 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 33.545/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 33.571/App, because ackElicitingInFlight | RTT:33/16 33.480 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 33.500 -> Packet A|1|S0|3d7e43eb5d813fd4b1d582db7657f244950d7585|44|1 AckFrame[2|Δ19] 33.570 loss detection timeout handler running Sending probe 0, because no ack since 33.449. Current RTT: 33/16. 33.570 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 33.815/App, because ackElicitingInFlight | RTT:33/16 33.571 -> Packet PA|2|S0|3d7e43eb5d813fd4b1d582db7657f244950d7585|59|1 StreamFrame[0(CIB),0,17,fin] 33.602 <- (3) Packet A|4|S0|c41e3a2165a41e29|31|1 AckFrame[2-0|Δ0] 33.602 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.661 <- (4) Packet A|5|S0|c41e3a2165a41e29|1061|2 AckFrame[2-0|Δ58] StreamFrame[0(CIB),0,1024,fin] 33.662 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.662 Finished downloading https://server4:443/pbghqsptmw at 13:10.332 on ClientConnection[0d6d4b3cb6d141ed/c41e3a2165a41e29(V1) with server4/193.167.100.100:443] 33.662 Closing ClientConnection[0d6d4b3cb6d141ed/c41e3a2165a41e29(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.662 -> Packet A|3|S0|3d7e43eb5d813fd4b1d582db7657f244950d7585|47|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 33.663 Creating connection with server4:443 with v1 33.663 Setting up connection for downloading https://server4:443/gluxbnyyue at 13:10.333 on ClientConnection[f3be46110190fe60/43b7ad337533709e(V1) with server4/193.167.100.100:443] 33.663 Original destination connection id: f3be46110190fe60 (scid: 43b7ad337533709e) >- CryptoStream[I|ClientHello] 33.665 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.865/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.665 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.864 loss detection timeout handler running Sending probe 0, because no ack since 33.665. Current RTT: 100/25. 33.865 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 33.865 (Probe is an initial retransmit) 33.865 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 34.265/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.865 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.264 loss detection timeout handler running Sending probe 1, because no ack since 33.865. Current RTT: 100/25. 34.264 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 34.264 (Probe is an initial retransmit) 34.265 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 35.065/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.265 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.266 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 35.066/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.266 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.298 <- (1) Packet I|2|L|62|1 Token=[] AckFrame[2,0|Δ0] 34.298 probe count not reset on ack because handshake not yet confirmed 34.298 Cwnd(-): 6000; inflight: 1200 34.298 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 35.098/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.299 <- (2) Packet I|3|L|62|1 Token=[] AckFrame[3-2,0|Δ0] 34.299 probe count not reset on ack because handshake not yet confirmed 34.299 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 34.683/Initial, because peerAwaitingAddressValidation | RTT:32/16 34.682 loss detection timeout handler running Sending probe 2, because no ack since 34.266. Current RTT: 32/12. 34.682 Sending probe because peer awaiting address validation 34.682 (Probe is Initial ping, because there is no Initial data to retransmit) 34.683 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 35.323/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 34.683 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 34.715 <- (3) Packet I|5|L|62|1 Token=[] AckFrame[4-2,0|Δ0] 34.716 probe count not reset on ack because handshake not yet confirmed 34.716 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 35.356/Initial, because peerAwaitingAddressValidation | RTT:32/12 35.355 loss detection timeout handler running Sending probe 3, because no ack since 34.683. Current RTT: 32/9. 35.355 Sending probe because peer awaiting address validation 35.355 (Probe is Initial ping, because there is no Initial data to retransmit) 35.356 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1087 millis, based on 36.444/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 35.356 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 35.698 Discarding packet (756 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 35.698 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 36.443 loss detection timeout handler running Sending probe 4, because no ack since 35.356. Current RTT: 32/9. 36.443 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 36.443 (Probe is Initial ping, because there is no Initial data to retransmit) 36.444 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 38.620/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 36.443 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 36.445 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 38.621/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 36.444 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 36.477 <- (6) Packet I|9|L|64|1 Token=[] AckFrame[7-6,4-2,0|Δ0] 36.478 probe count not reset on ack because handshake not yet confirmed 36.478 Cwnd(-): 3000; inflight: 0 36.478 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 38.654/Initial, because peerAwaitingAddressValidation | RTT:32/9 38.653 loss detection timeout handler running Sending probe 5, because no ack since 36.444. Current RTT: 32/7. 38.653 Sending probe because peer awaiting address validation 38.653 (Probe is Initial ping, because there is no Initial data to retransmit) 38.654 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 42.494/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/7 38.654 -> Packet PI|8|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 38.687 <- (7) Packet I|10|L|64|1 Token=[] AckFrame[8-6,4-2,0|Δ0] 38.688 probe count not reset on ack because handshake not yet confirmed 38.688 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3839 millis, based on 42.528/Initial, because peerAwaitingAddressValidation | RTT:32/7 38.694 <- (8) Packet I|11|L|192|2 Token=[] AckFrame[8-6,4-2,0|Δ7] CryptoFrame[0,123] 38.695 probe count not reset on ack because handshake not yet confirmed 38.695 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3583 millis, based on 42.279/Initial, because peerAwaitingAddressValidation | RTT:32/6 -< CryptoStream[I|ServerHello] 38.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 55 millis, based on 38.753/Handshake, because peerAwaitingAddressValidation | RTT:32/6 38.697 Discarding pn space Initial because first Handshake message is being sent 38.697 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 38.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 55 millis, based on 38.753/Handshake, because peerAwaitingAddressValidation | RTT:32/6 38.697 -> Packet I|9|L|1201|2 Token=[] AckFrame[11-9,5,3-2|Δ0] Padding(1137) 38.730 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 38.731 <- (11) Packet H|14|L|756|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 38.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 55 millis, based on 38.790/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/6 38.734 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 38.734 Starting downloading https://server4:443/gluxbnyyue at 13:15.404 on ClientConnection[f3be46110190fe60/43b7ad337533709e(V1) with server4/193.167.100.100:443] 38.734 -> Packet H|1|L|58|1 AckFrame[14|Δ0] 38.735 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 55 millis, based on 38.791/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/6 38.735 -> Packet A|0|S0|e45f94d7cd4e3810e6c9122acc1bdeb8d12e6391|59|1 StreamFrame[0(CIB),0,17,fin] 38.790 loss detection timeout handler running Sending probe 0, because no ack since 38.734. Current RTT: 32/6. 38.790 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 38.790 (Probe is a handshake retransmit) 38.790 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 111 millis, based on 38.902/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/6 38.790 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 38.902 loss detection timeout handler running Sending probe 1, because no ack since 38.735. Current RTT: 32/6. 38.902 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 38.902 (Probe is a handshake retransmit) 38.902 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 223 millis, based on 39.126/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/6 38.902 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 38.903 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 223 millis, based on 39.127/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/6 38.903 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 38.934 <- (12) Packet A|15|S0|43b7ad337533709e|467|3 NewConnectionIdFrame[1,<0|6a8ea43a47eb275dc200502a59d3b8b6262c9cd6|8bf1da2156f55e8da3cf9309dee8c57a] HandshakeDoneFrame[] CryptoFrame[0,396] 38.934 State is set to Confirmed reschedule loss detection timer for PTO over 124 millis, based on 39.059/App, because ackElicitingInFlight | RTT:32/6 reschedule loss detection timer for PTO over -118 millis, based on 38.816/App, because ackElicitingInFlight | RTT:32/6 38.934 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 38.935 loss detection timeout handler running Sending probe 0, because no ack since 38.735. Current RTT: 32/6. 38.935 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 161 millis, based on 39.097/App, because ackElicitingInFlight | RTT:32/6 38.935 -> Packet PA|1|S0|e45f94d7cd4e3810e6c9122acc1bdeb8d12e6391|59|1 StreamFrame[0(CIB),0,17,fin] 38.954 -> Packet A|2|S0|e45f94d7cd4e3810e6c9122acc1bdeb8d12e6391|44|1 AckFrame[15|Δ19] 38.967 <- (13) Packet A|16|S0|43b7ad337533709e|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 38.967 Cwnd(-): 2400; inflight: 0 38.967 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 38.967 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 76 millis, based on 39.045/App, because ackElicitingInFlight | RTT:32/5 38.968 -> Packet A|3|S0|e45f94d7cd4e3810e6c9122acc1bdeb8d12e6391|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[15|Δ0] 38.968 Finished downloading https://server4:443/gluxbnyyue at 13:15.638 on ClientConnection[f3be46110190fe60/43b7ad337533709e(V1) with server4/193.167.100.100:443] 38.968 Closing ClientConnection[f3be46110190fe60/43b7ad337533709e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 38.969 Creating connection with server4:443 with v1 38.968 -> Packet A|4|S0|e45f94d7cd4e3810e6c9122acc1bdeb8d12e6391|47|2 ConnectionCloseFrame[0|0|] AckFrame[16-15|Δ0] 38.969 Setting up connection for downloading https://server4:443/wkmzovtlgk at 13:15.639 on ClientConnection[697c419e4051dcac/e3d8c7be2aa9c6dc(V1) with server4/193.167.100.100:443] 38.969 Original destination connection id: 697c419e4051dcac (scid: e3d8c7be2aa9c6dc) >- CryptoStream[I|ClientHello] 38.971 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 39.171/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 38.971 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 38.998 <- (14) Packet A|17|S0|43b7ad337533709e|31|1 AckFrame[3-1|Δ0] 38.999 -> Packet A|5|S0|e45f94d7cd4e3810e6c9122acc1bdeb8d12e6391|47|2 ConnectionCloseFrame[0|0|] AckFrame[16-15|Δ0] 39.170 loss detection timeout handler running Sending probe 0, because no ack since 38.971. Current RTT: 100/25. 39.170 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 39.170 (Probe is an initial retransmit) 39.171 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 39.571/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.171 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.204 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 39.204 probe count not reset on ack because handshake not yet confirmed 39.205 Retransmitting CryptoFrame[0,257] on level Initial 39.205 Cwnd(-): 6000; inflight: 0 39.205 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 39.605/Initial, because peerAwaitingAddressValidation | RTT:100/25 39.205 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 39.399/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 39.205 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 39.207 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 39.401/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 39.207 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) 39.204 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 39.210 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 39.307/Handshake, because peerAwaitingAddressValidation | RTT:33/16 39.210 Starting downloading https://server4:443/wkmzovtlgk at 13:15.879 on ClientConnection[697c419e4051dcac/e3d8c7be2aa9c6dc(V1) with server4/193.167.100.100:443] 39.210 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 39.307/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 39.210 Discarding pn space Initial because first Handshake message is being sent 39.210 -> Packet H|0|L|97|2 AckFrame[1|Δ0] CryptoFrame[0,36] 39.210 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 39.307/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 39.210 -> Packet A|0|S0|728b24d48e6a901a415a91b353670b89972bd788|59|1 StreamFrame[0(CIB),0,17,fin] 39.238 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 39.242 <- (3) Packet A|4|S0|e3d8c7be2aa9c6dc|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 39.242 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 39.339/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 39.243 Finished downloading https://server4:443/wkmzovtlgk at 13:15.913 on ClientConnection[697c419e4051dcac/e3d8c7be2aa9c6dc(V1) with server4/193.167.100.100:443] 39.243 Closing ClientConnection[697c419e4051dcac/e3d8c7be2aa9c6dc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 39.244 Creating connection with server4:443 with v1 39.243 -> Packet A|1|S0|728b24d48e6a901a415a91b353670b89972bd788|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 39.244 Setting up connection for downloading https://server4:443/bfohhlfhwc at 13:15.914 on ClientConnection[69e29f8d0630c58c/2ea9981c14093cf7(V1) with server4/193.167.100.100:443] 39.244 Original destination connection id: 69e29f8d0630c58c (scid: 2ea9981c14093cf7) >- CryptoStream[I|ClientHello] 39.245 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 39.445/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.245 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.445 loss detection timeout handler running Sending probe 0, because no ack since 39.245. Current RTT: 100/25. 39.445 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 39.445 (Probe is an initial retransmit) 39.445 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 39.845/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.445 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.844 loss detection timeout handler running Sending probe 1, because no ack since 39.445. Current RTT: 100/25. 39.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 39.845 (Probe is an initial retransmit) 39.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 40.645/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.845 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.846 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 40.646/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.846 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.878 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[2-1|Δ0] 39.878 probe count not reset on ack because handshake not yet confirmed 39.879 Retransmitting CryptoFrame[0,257] on level Initial 39.879 Cwnd(-): 6000; inflight: 1200 39.879 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 40.679/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.879 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 40.263/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 39.879 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) 40.262 loss detection timeout handler running Sending probe 2, because no ack since 39.879. Current RTT: 32/16. 40.262 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 40.262 (Probe is an initial retransmit) 40.263 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 41.031/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 40.263 -> Packet PI|5|L|1212|2 Token=[] CryptoFrame[0,257] Padding(896) 40.264 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 41.032/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 40.264 -> Packet PI|6|L|1212|2 Token=[] CryptoFrame[0,257] Padding(896) 40.478 <- (2) Packet I|4|L|192|2 Token=[] AckFrame[6,2-1|Δ181] CryptoFrame[0,123] 40.479 probe count not reset on ack because handshake not yet confirmed 40.479 Retransmitting CryptoFrame[0,257] on level Initial 40.479 Cwnd(-): 3000; inflight: 0 40.479 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 41.247/Initial, because peerAwaitingAddressValidation | RTT:32/16 40.479 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2295 millis, based on 42.775/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:55/58 40.479 -> Packet I|7|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[2|Δ0] Padding(879) -< CryptoStream[I|ServerHello] 40.481 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 286 millis, based on 40.769/Handshake, because peerAwaitingAddressValidation | RTT:55/58 40.482 Discarding pn space Initial because first Handshake message is being sent 40.482 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 286 millis, based on 40.769/Handshake, because peerAwaitingAddressValidation | RTT:55/58 40.482 -> Packet I|8|L|1201|2 Token=[] AckFrame[4,2|Δ0] Padding(1139) 40.512 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 40.513 <- (4) Packet H|6|L|757|1 CryptoFrame[0,699] >- CryptoStream[H|Finished] 40.516 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 286 millis, based on 40.803/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:55/58 40.515 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 40.516 Starting downloading https://server4:443/bfohhlfhwc at 13:17.186 on ClientConnection[69e29f8d0630c58c/2ea9981c14093cf7(V1) with server4/193.167.100.100:443] 40.516 -> Packet H|1|L|58|1 AckFrame[6|Δ0] 40.517 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 286 millis, based on 40.804/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:55/58 40.516 -> Packet A|0|S0|ca6befaad2058cf6058c1dbe2aedd737af166c1d|59|1 StreamFrame[0(CIB),0,17,fin] 40.547 <- (5) Packet A|7|S0|2ea9981c14093cf7|467|3 NewConnectionIdFrame[1,<0|fd69f83c04c3f8af5ef962f0b5c63abc63fbf434|2a7b89bc3fd255efd8c4df2ea080b90f] HandshakeDoneFrame[] CryptoFrame[0,396] 40.547 State is set to Confirmed reschedule loss detection timer for PTO over 255 millis, based on 40.802/Handshake, because ackElicitingInFlight | RTT:55/58 reschedule loss detection timer for PTO over 281 millis, based on 40.828/App, because ackElicitingInFlight | RTT:55/58 40.547 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 40.548 <- (6) Packet A|8|S0|2ea9981c14093cf7|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 40.549 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 40.549 -> Packet A|1|S0|ca6befaad2058cf6058c1dbe2aedd737af166c1d|44|1 AckFrame[8-7|Δ1] 40.549 Finished downloading https://server4:443/bfohhlfhwc at 13:17.219 on ClientConnection[69e29f8d0630c58c/2ea9981c14093cf7(V1) with server4/193.167.100.100:443] 40.549 Closing ClientConnection[69e29f8d0630c58c/2ea9981c14093cf7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 40.549 -> Packet A|2|S0|ca6befaad2058cf6058c1dbe2aedd737af166c1d|47|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 40.550 Creating connection with server4:443 with v1 40.550 Setting up connection for downloading https://server4:443/ytoafnhetm at 13:17.220 on ClientConnection[d956a6e19b573428/854b0bc49410eb42(V1) with server4/193.167.100.100:443] 40.550 Original destination connection id: d956a6e19b573428 (scid: 854b0bc49410eb42) >- CryptoStream[I|ClientHello] 40.552 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.752/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.552 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.585 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 40.586 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.786/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 40.585 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 40.588 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.685/Handshake, because peerAwaitingAddressValidation | RTT:33/16 40.588 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 40.591 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.688/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.591 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 40.591 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 40.591 Starting downloading https://server4:443/ytoafnhetm at 13:17.261 on ClientConnection[d956a6e19b573428/854b0bc49410eb42(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 40.688/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.591 Discarding pn space Initial because first Handshake message is being sent 40.591 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 40.592 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.689/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.592 -> Packet A|0|S0|48d4b3d77e11907898b86cad04a60fe7d407c5f9|59|1 StreamFrame[0(CIB),0,17,fin] 40.623 <- (2) Packet A|3|S0|854b0bc49410eb42|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 40.624 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.721/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.624 Finished downloading https://server4:443/ytoafnhetm at 13:17.294 on ClientConnection[d956a6e19b573428/854b0bc49410eb42(V1) with server4/193.167.100.100:443] 40.624 Closing ClientConnection[d956a6e19b573428/854b0bc49410eb42(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 40.625 Creating connection with server4:443 with v1 40.625 -> Packet A|1|S0|48d4b3d77e11907898b86cad04a60fe7d407c5f9|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 40.626 Setting up connection for downloading https://server4:443/mxaxdbsgii at 13:17.296 on ClientConnection[921949cb8b8ae39b/0a667425d0fd2c97(V1) with server4/193.167.100.100:443] 40.626 Original destination connection id: 921949cb8b8ae39b (scid: 0a667425d0fd2c97) >- CryptoStream[I|ClientHello] 40.627 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.827/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.627 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.826 loss detection timeout handler running Sending probe 0, because no ack since 40.627. Current RTT: 100/25. 40.827 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 40.827 (Probe is an initial retransmit) 40.827 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 41.227/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.827 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.860 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 40.861 probe count not reset on ack because handshake not yet confirmed 40.861 Retransmitting CryptoFrame[0,257] on level Initial 40.861 Cwnd(-): 6000; inflight: 0 40.861 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 41.261/Initial, because peerAwaitingAddressValidation | RTT:100/25 40.861 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 41.055/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.861 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 40.860 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 40.863 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 41.057/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.863 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 40.865 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 41.059/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.865 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 40.866 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.866 Starting downloading https://server4:443/mxaxdbsgii at 13:17.536 on ClientConnection[921949cb8b8ae39b/0a667425d0fd2c97(V1) with server4/193.167.100.100:443] 40.866 Discarding pn space Initial because first Handshake message is being sent 40.866 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 40.866 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.866 -> Packet A|0|S0|cf5611b834348953ccb77ca737b3e12c04213666|59|1 StreamFrame[0(CIB),0,17,fin] 40.898 <- (2) Packet A|3|S0|0a667425d0fd2c97|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 40.899 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.996/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.899 Finished downloading https://server4:443/mxaxdbsgii at 13:17.569 on ClientConnection[921949cb8b8ae39b/0a667425d0fd2c97(V1) with server4/193.167.100.100:443] 40.899 Closing ClientConnection[921949cb8b8ae39b/0a667425d0fd2c97(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 40.899 -> Packet A|1|S0|cf5611b834348953ccb77ca737b3e12c04213666|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 40.899 Creating connection with server4:443 with v1 40.900 Setting up connection for downloading https://server4:443/kjucslsgsg at 13:17.570 on ClientConnection[7687ee3a49d21079/a74a42bbd5df4226(V1) with server4/193.167.100.100:443] 40.900 Original destination connection id: 7687ee3a49d21079 (scid: a74a42bbd5df4226) >- CryptoStream[I|ClientHello] 40.902 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 41.102/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.901 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.101 loss detection timeout handler running Sending probe 0, because no ack since 40.901. Current RTT: 100/25. 41.101 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 41.101 (Probe is an initial retransmit) 41.101 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 41.501/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.101 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.135 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 41.135 probe count not reset on ack because handshake not yet confirmed 41.135 Retransmitting CryptoFrame[0,257] on level Initial 41.135 Cwnd(-): 6000; inflight: 0 41.135 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 41.535/Initial, because peerAwaitingAddressValidation | RTT:100/25 41.135 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 41.329/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.135 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 41.135 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 41.138 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 41.332/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.137 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 41.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 41.334/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.140 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 41.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 41.140 Starting downloading https://server4:443/kjucslsgsg at 13:17.810 on ClientConnection[7687ee3a49d21079/a74a42bbd5df4226(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 41.237/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.140 Discarding pn space Initial because first Handshake message is being sent 41.140 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 41.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 41.238/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.140 -> Packet A|0|S0|a5918ca5e5b7a81e8b3b5fb968c1bb252c962726|59|1 StreamFrame[0(CIB),0,17,fin] 41.168 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 41.171 <- (3) Packet A|3|S0|a74a42bbd5df4226|467|3 NewConnectionIdFrame[1,<0|5b4eb4ddf667cf8d6d7bfa731ad5a5b2d4f5f463|ba4536dea3983f17298e1672e64a61aa] HandshakeDoneFrame[] CryptoFrame[0,396] 41.171 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 41.237/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 41.262/App, because ackElicitingInFlight | RTT:33/16 41.171 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 41.191 -> Packet A|1|S0|a5918ca5e5b7a81e8b3b5fb968c1bb252c962726|44|1 AckFrame[3|Δ19] 41.262 loss detection timeout handler running Sending probe 0, because no ack since 41.140. Current RTT: 33/16. 41.263 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 41.507/App, because ackElicitingInFlight | RTT:33/16 41.263 -> Packet PA|2|S0|a5918ca5e5b7a81e8b3b5fb968c1bb252c962726|59|1 StreamFrame[0(CIB),0,17,fin] 41.294 <- (4) Packet A|5|S0|a74a42bbd5df4226|31|1 AckFrame[2-0|Δ0] 41.294 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 41.308 <- (5) Packet A|6|S0|a74a42bbd5df4226|1061|2 AckFrame[2-0|Δ13] StreamFrame[0(CIB),0,1024,fin] 41.308 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 41.308 Finished downloading https://server4:443/kjucslsgsg at 13:17.978 on ClientConnection[7687ee3a49d21079/a74a42bbd5df4226(V1) with server4/193.167.100.100:443] 41.308 Closing ClientConnection[7687ee3a49d21079/a74a42bbd5df4226(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 41.309 Creating connection with server4:443 with v1 41.309 -> Packet A|3|S0|a5918ca5e5b7a81e8b3b5fb968c1bb252c962726|47|2 ConnectionCloseFrame[0|0|] AckFrame[6-5|Δ0] 41.309 Setting up connection for downloading https://server4:443/ezmjplzlao at 13:17.979 on ClientConnection[293f33000fb51ee1/d2c840802b4ad4e6(V1) with server4/193.167.100.100:443] 41.310 Original destination connection id: 293f33000fb51ee1 (scid: d2c840802b4ad4e6) >- CryptoStream[I|ClientHello] 41.311 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 41.511/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.311 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.510 loss detection timeout handler running Sending probe 0, because no ack since 41.311. Current RTT: 100/25. 41.510 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 41.510 (Probe is an initial retransmit) 41.511 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 41.911/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.510 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.544 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 41.544 probe count not reset on ack because handshake not yet confirmed 41.545 Retransmitting CryptoFrame[0,257] on level Initial 41.545 Cwnd(-): 6000; inflight: 0 41.545 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 41.945/Initial, because peerAwaitingAddressValidation | RTT:100/25 41.545 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 41.739/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.545 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 41.544 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 41.548 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 41.742/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.548 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 41.550 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 41.744/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.550 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 41.550 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 41.550 Starting downloading https://server4:443/ezmjplzlao at 13:18.220 on ClientConnection[293f33000fb51ee1/d2c840802b4ad4e6(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 41.647/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.551 Discarding pn space Initial because first Handshake message is being sent 41.550 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 41.551 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 41.648/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.551 -> Packet A|0|S0|825ea224547df4bca5ddee6e2f3b39b9f739efed|59|1 StreamFrame[0(CIB),0,17,fin] 41.647 loss detection timeout handler running Sending probe 0, because no ack since 41.550. Current RTT: 33/16. 41.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 41.647 (Probe is a handshake retransmit) 41.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 41.842/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.647 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 41.841 loss detection timeout handler running Sending probe 1, because no ack since 41.551. Current RTT: 33/16. 41.841 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 41.841 (Probe is a handshake retransmit) 41.841 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 42.229/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.841 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 41.842 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 42.230/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 41.842 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 41.992 <- (2) Packet A|3|S0|d2c840802b4ad4e6|467|3 NewConnectionIdFrame[1,<0|23d511ef644f5b66d09d4110f5079810abd740a4|1e89b56341cc0635c00fd88d3f5fd56c] HandshakeDoneFrame[] CryptoFrame[0,396] 41.992 State is set to Confirmed reschedule loss detection timer for PTO over 46 millis, based on 42.039/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -319 millis, based on 41.673/App, because ackElicitingInFlight | RTT:33/16 41.993 Discarding pn space Handshake because HandshakeDone is received 41.993 loss detection timeout handler running Sending probe 0, because no ack since 41.551. Current RTT: 33/16. 41.993 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 42.237/App, because ackElicitingInFlight | RTT:33/16 41.993 -> Packet PA|1|S0|825ea224547df4bca5ddee6e2f3b39b9f739efed|59|1 StreamFrame[0(CIB),0,17,fin] 42.012 -> Packet A|2|S0|825ea224547df4bca5ddee6e2f3b39b9f739efed|44|1 AckFrame[3|Δ19] 42.024 <- (3) Packet A|4|S0|d2c840802b4ad4e6|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 42.025 Cwnd(-): 3000; inflight: 0 42.025 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 42.025 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 42.135/App, because ackElicitingInFlight | RTT:33/13 42.025 -> Packet A|3|S0|825ea224547df4bca5ddee6e2f3b39b9f739efed|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 42.026 Finished downloading https://server4:443/ezmjplzlao at 13:18.695 on ClientConnection[293f33000fb51ee1/d2c840802b4ad4e6(V1) with server4/193.167.100.100:443] 42.026 Closing ClientConnection[293f33000fb51ee1/d2c840802b4ad4e6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 42.026 -> Packet A|4|S0|825ea224547df4bca5ddee6e2f3b39b9f739efed|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 42.026 Creating connection with server4:443 with v1 42.027 Setting up connection for downloading https://server4:443/cjetfnhecf at 13:18.697 on ClientConnection[9a021cd24a7a1b5c/e0e8696da24fabfa(V1) with server4/193.167.100.100:443] 42.027 Original destination connection id: 9a021cd24a7a1b5c (scid: e0e8696da24fabfa) >- CryptoStream[I|ClientHello] 42.028 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 42.228/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.028 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.061 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 42.062 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 42.262/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 42.061 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 42.064 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.161/Handshake, because peerAwaitingAddressValidation | RTT:33/16 42.064 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 42.066 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.163/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 42.066 -> Packet H|0|L|92|1 CryptoFrame[0,36] 42.066 Starting downloading https://server4:443/cjetfnhecf at 13:18.736 on ClientConnection[9a021cd24a7a1b5c/e0e8696da24fabfa(V1) with server4/193.167.100.100:443] 42.066 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.163/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 42.066 Discarding pn space Initial because first Handshake message is being sent 42.066 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 42.066 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.163/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 42.066 -> Packet A|0|S0|842fe0bff93f500876dc4790c8c05e18ad57d0c0|59|1 StreamFrame[0(CIB),0,17,fin] 42.097 <- (2) Packet A|2|S0|e0e8696da24fabfa|467|3 NewConnectionIdFrame[1,<0|435c6c4d28dfc7750ee25a301889ab8803468522|a4c93bc04fa2eaf9069871b076bd4c18] HandshakeDoneFrame[] CryptoFrame[0,396] 42.097 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 42.163/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 42.188/App, because ackElicitingInFlight | RTT:33/16 42.097 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 42.117 -> Packet A|1|S0|842fe0bff93f500876dc4790c8c05e18ad57d0c0|44|1 AckFrame[2|Δ19] 42.187 loss detection timeout handler running Sending probe 0, because no ack since 42.066. Current RTT: 33/16. 42.188 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 42.432/App, because ackElicitingInFlight | RTT:33/16 42.188 -> Packet PA|2|S0|842fe0bff93f500876dc4790c8c05e18ad57d0c0|59|1 StreamFrame[0(CIB),0,17,fin] 42.229 <- (3) Packet A|5|S0|e0e8696da24fabfa|1061|2 AckFrame[2-0|Δ9] StreamFrame[0(CIB),0,1024,fin] 42.230 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 42.230 Finished downloading https://server4:443/cjetfnhecf at 13:18.900 on ClientConnection[9a021cd24a7a1b5c/e0e8696da24fabfa(V1) with server4/193.167.100.100:443] 42.230 Closing ClientConnection[9a021cd24a7a1b5c/e0e8696da24fabfa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 42.230 -> Packet A|3|S0|842fe0bff93f500876dc4790c8c05e18ad57d0c0|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 42.231 Creating connection with server4:443 with v1 42.231 Setting up connection for downloading https://server4:443/pfjnbehfus at 13:18.901 on ClientConnection[509bdaa46b497bd0/e553b4e2d005747a(V1) with server4/193.167.100.100:443] 42.231 Original destination connection id: 509bdaa46b497bd0 (scid: e553b4e2d005747a) >- CryptoStream[I|ClientHello] 42.232 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 42.432/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.232 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.265 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 42.266 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 42.466/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 42.265 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 42.268 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.365/Handshake, because peerAwaitingAddressValidation | RTT:33/16 42.268 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 42.270 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.367/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 42.270 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 42.270 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.367/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 42.270 Discarding pn space Initial because first Handshake message is being sent 42.270 Starting downloading https://server4:443/pfjnbehfus at 13:18.940 on ClientConnection[509bdaa46b497bd0/e553b4e2d005747a(V1) with server4/193.167.100.100:443] 42.270 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 42.271 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.368/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 42.271 -> Packet A|0|S0|7f87f5e71c33d72c2a1b7c16fd658dbfef718814|59|1 StreamFrame[0(CIB),0,17,fin] 42.302 <- (2) Packet A|3|S0|e553b4e2d005747a|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 42.303 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 42.400/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 42.303 Finished downloading https://server4:443/pfjnbehfus at 13:18.973 on ClientConnection[509bdaa46b497bd0/e553b4e2d005747a(V1) with server4/193.167.100.100:443] 42.303 Closing ClientConnection[509bdaa46b497bd0/e553b4e2d005747a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 42.303 -> Packet A|1|S0|7f87f5e71c33d72c2a1b7c16fd658dbfef718814|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 42.304 Creating connection with server4:443 with v1 42.304 Setting up connection for downloading https://server4:443/ypryckfckr at 13:18.974 on ClientConnection[9cfd173345a218b8/4c6bf56284d9f16e(V1) with server4/193.167.100.100:443] 42.304 Original destination connection id: 9cfd173345a218b8 (scid: 4c6bf56284d9f16e) >- CryptoStream[I|ClientHello] 42.305 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 42.505/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.305 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.505 loss detection timeout handler running Sending probe 0, because no ack since 42.305. Current RTT: 100/25. 42.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 42.505 (Probe is an initial retransmit) 42.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 42.905/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.505 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.538 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 42.539 probe count not reset on ack because handshake not yet confirmed 42.539 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 42.939/Initial, because peerAwaitingAddressValidation | RTT:100/25 42.938 loss detection timeout handler running Sending probe 1, because no ack since 42.505. Current RTT: 32/16. 42.938 Sending probe because peer awaiting address validation 42.938 (Probe is Initial ping, because there is no Initial data to retransmit) 42.939 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 43.323/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 42.938 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 43.322 loss detection timeout handler running Sending probe 2, because no ack since 42.938. Current RTT: 32/16. 43.322 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 43.322 (Probe is Initial ping, because there is no Initial data to retransmit) 43.322 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 44.090/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 43.322 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 43.323 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 44.091/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 43.323 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 43.339 <- (2) Packet I|3|L|190|2 Token=[] AckFrame[1-0|Δ801] CryptoFrame[0,123] 43.339 probe count not reset on ack because handshake not yet confirmed 43.339 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 44.107/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[I|ServerHello] 43.341 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 43.437/Handshake, because peerAwaitingAddressValidation | RTT:32/16 43.342 Discarding pn space Initial because first Handshake message is being sent 43.342 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 43.438/Handshake, because peerAwaitingAddressValidation | RTT:32/16 43.342 -> Packet I|5|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1141) 43.375 <- (3) Packet H|6|L|755|1 CryptoFrame[0,697] >- CryptoStream[H|Finished] 43.377 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 43.473/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 43.377 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 43.378 Starting downloading https://server4:443/ypryckfckr at 13:20.048 on ClientConnection[9cfd173345a218b8/4c6bf56284d9f16e(V1) with server4/193.167.100.100:443] 43.378 -> Packet H|1|L|58|1 AckFrame[6|Δ0] 43.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 43.474/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 43.378 -> Packet A|0|S0|d5e5ac46922244acd65fbed3033212b19f1fd463|59|1 StreamFrame[0(CIB),0,17,fin] 43.409 <- (4) Packet A|7|S0|4c6bf56284d9f16e|467|3 NewConnectionIdFrame[1,<0|27230f074ab6f555e4df7688cf0a48a20bf0b5ea|c6234814853c56550d160297fb4d36a4] HandshakeDoneFrame[] CryptoFrame[0,396] 43.409 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 43.473/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 43.499/App, because ackElicitingInFlight | RTT:32/16 43.409 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 43.410 <- (5) Packet A|8|S0|4c6bf56284d9f16e|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 43.410 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 43.410 -> Packet A|1|S0|d5e5ac46922244acd65fbed3033212b19f1fd463|43|1 AckFrame[8-7|Δ0] 43.410 Finished downloading https://server4:443/ypryckfckr at 13:20.080 on ClientConnection[9cfd173345a218b8/4c6bf56284d9f16e(V1) with server4/193.167.100.100:443] 43.410 Closing ClientConnection[9cfd173345a218b8/4c6bf56284d9f16e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 43.411 -> Packet A|2|S0|d5e5ac46922244acd65fbed3033212b19f1fd463|47|2 ConnectionCloseFrame[0|0|] AckFrame[8-7|Δ0] 43.411 Creating connection with server4:443 with v1 43.412 Setting up connection for downloading https://server4:443/rflgohpxbr at 13:20.082 on ClientConnection[d4264fa3100fe38f/1d32af335bb41414(V1) with server4/193.167.100.100:443] 43.412 Original destination connection id: d4264fa3100fe38f (scid: 1d32af335bb41414) >- CryptoStream[I|ClientHello] 43.413 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 43.613/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.413 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 43.612 loss detection timeout handler running Sending probe 0, because no ack since 43.413. Current RTT: 100/25. 43.612 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 43.612 (Probe is an initial retransmit) 43.613 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 44.013/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.613 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 43.646 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 43.646 probe count not reset on ack because handshake not yet confirmed 43.646 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 44.047/Initial, because peerAwaitingAddressValidation | RTT:100/25 44.046 loss detection timeout handler running Sending probe 1, because no ack since 43.613. Current RTT: 33/16. 44.046 Sending probe because peer awaiting address validation 44.046 (Probe is Initial ping, because there is no Initial data to retransmit) 44.046 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 44.434/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 44.046 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 44.079 <- (2) Packet I|3|L|60|1 Token=[] AckFrame[2-0|Δ0] 44.080 probe count not reset on ack because handshake not yet confirmed 44.080 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 44.468/Initial, because peerAwaitingAddressValidation | RTT:33/16 44.467 loss detection timeout handler running Sending probe 2, because no ack since 44.046. Current RTT: 33/12. 44.467 Sending probe because peer awaiting address validation 44.467 (Probe is Initial ping, because there is no Initial data to retransmit) 44.468 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 45.116/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 44.468 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 44.500 <- (3) Packet I|5|L|60|1 Token=[] AckFrame[3-0|Δ0] 44.501 probe count not reset on ack because handshake not yet confirmed 44.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 45.149/Initial, because peerAwaitingAddressValidation | RTT:33/12 45.148 loss detection timeout handler running Sending probe 3, because no ack since 44.468. Current RTT: 33/9. 45.148 Sending probe because peer awaiting address validation 45.148 (Probe is Initial ping, because there is no Initial data to retransmit) 45.149 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1103 millis, based on 46.253/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/9 45.149 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 46.252 loss detection timeout handler running Sending probe 4, because no ack since 45.149. Current RTT: 33/9. 46.252 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 46.252 (Probe is Initial ping, because there is no Initial data to retransmit) 46.253 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2207 millis, based on 48.461/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/9 46.253 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 46.254 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2207 millis, based on 48.462/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/9 46.254 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 46.286 <- (4) Packet I|10|L|60|1 Token=[] AckFrame[6-0|Δ0] 46.287 probe count not reset on ack because handshake not yet confirmed 46.287 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2207 millis, based on 48.495/Initial, because peerAwaitingAddressValidation | RTT:33/9 48.445 <- (5) Packet I|11|L|190|2 Token=[] AckFrame[6-0|Δ2158] CryptoFrame[0,123] 48.445 probe count not reset on ack because handshake not yet confirmed 48.445 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1951 millis, based on 50.397/Initial, because peerAwaitingAddressValidation | RTT:33/7 -< CryptoStream[I|ServerHello] 48.448 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 60 millis, based on 48.509/Handshake, because peerAwaitingAddressValidation | RTT:33/7 48.448 Discarding pn space Initial because first Handshake message is being sent 48.448 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 48.448 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 60 millis, based on 48.509/Handshake, because peerAwaitingAddressValidation | RTT:33/7 48.448 -> Packet I|7|L|1201|2 Token=[] AckFrame[11-10,5,3-2|Δ0] Padding(1137) 48.481 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 48.481 <- (8) Packet H|14|L|755|1 CryptoFrame[0,697] >- CryptoStream[H|Finished] 48.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 60 millis, based on 48.545/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 48.484 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 48.484 Starting downloading https://server4:443/rflgohpxbr at 13:25.154 on ClientConnection[d4264fa3100fe38f/1d32af335bb41414(V1) with server4/193.167.100.100:443] 48.484 -> Packet H|1|L|58|1 AckFrame[14|Δ0] 48.485 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 60 millis, based on 48.546/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 48.485 -> Packet A|0|S0|cab70139b3f707f6c090f25fbdfbb0e89f666822|59|1 StreamFrame[0(CIB),0,17,fin] 48.545 loss detection timeout handler running Sending probe 0, because no ack since 48.484. Current RTT: 33/7. 48.545 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 48.545 (Probe is a handshake retransmit) 48.545 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 121 millis, based on 48.667/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 48.545 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 48.577 <- (9) Packet A|15|S0|1d32af335bb41414|467|3 NewConnectionIdFrame[1,<0|51e4b0d0b7896029989c193dadad18e2a595af3d|64418298b6180e429044efc3d8c5fd23] HandshakeDoneFrame[] CryptoFrame[0,396] 48.577 State is set to Confirmed reschedule loss detection timer for PTO over 79 millis, based on 48.657/App, because ackElicitingInFlight | RTT:33/7 reschedule loss detection timer for PTO over -6 millis, based on 48.571/App, because ackElicitingInFlight | RTT:33/7 48.577 Discarding pn space Handshake because HandshakeDone is received 48.577 loss detection timeout handler running Sending probe 0, because no ack since 48.485. Current RTT: 33/7. 48.577 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 171 millis, based on 48.750/App, because ackElicitingInFlight | RTT:33/7 48.578 -> Packet PA|1|S0|cab70139b3f707f6c090f25fbdfbb0e89f666822|59|1 StreamFrame[0(CIB),0,17,fin] 48.597 -> Packet A|2|S0|cab70139b3f707f6c090f25fbdfbb0e89f666822|44|1 AckFrame[15|Δ19] 48.749 loss detection timeout handler running Sending probe 1, because no ack since 48.578. Current RTT: 33/7. 48.749 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 343 millis, based on 49.093/App, because ackElicitingInFlight | RTT:33/7 48.749 -> Packet PA|3|S0|cab70139b3f707f6c090f25fbdfbb0e89f666822|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 343 millis, based on 49.094/App, because ackElicitingInFlight | RTT:33/7 48.750 -> Packet PA|4|S0|cab70139b3f707f6c090f25fbdfbb0e89f666822|59|1 StreamFrame[0(CIB),0,17,fin] 48.781 <- (10) Packet A|17|S0|1d32af335bb41414|1060|2 AckFrame[3|Δ0] StreamFrame[0(CIB),0,1024,fin] 48.782 Cwnd(-): 6000; inflight: 59 48.782 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 54 millis, based on 48.836/App, because ackElicitingInFlight | RTT:33/7 reschedule loss detection timer for PTO over 81 millis, based on 48.864/App, because ackElicitingInFlight | RTT:33/6 48.782 -> Packet A|5|S0|cab70139b3f707f6c090f25fbdfbb0e89f666822|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[15|Δ0] 48.783 Finished downloading https://server4:443/rflgohpxbr at 13:25.452 on ClientConnection[d4264fa3100fe38f/1d32af335bb41414(V1) with server4/193.167.100.100:443] 48.783 Closing ClientConnection[d4264fa3100fe38f/1d32af335bb41414(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 48.783 -> Packet A|6|S0|cab70139b3f707f6c090f25fbdfbb0e89f666822|49|2 ConnectionCloseFrame[0|0|] AckFrame[17,15|Δ0] 48.783 Creating connection with server4:443 with v1 48.784 Setting up connection for downloading https://server4:443/lhrpxdkkts at 13:25.454 on ClientConnection[03db80d98127350d/563c392f72cfc88d(V1) with server4/193.167.100.100:443] 48.784 Original destination connection id: 03db80d98127350d (scid: 563c392f72cfc88d) >- CryptoStream[I|ClientHello] 48.785 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.985/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.785 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 48.818 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 48.819 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 49.019/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 48.818 <- (1) Packet H|1|L|757|1 CryptoFrame[0,699] 48.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.918/Handshake, because peerAwaitingAddressValidation | RTT:33/16 48.821 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 48.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 96 millis, based on 48.920/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.823 -> Packet H|0|L|92|1 CryptoFrame[0,36] 48.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 48.823 Starting downloading https://server4:443/lhrpxdkkts at 13:25.493 on ClientConnection[03db80d98127350d/563c392f72cfc88d(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 48.921/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.824 Discarding pn space Initial because first Handshake message is being sent 48.824 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 48.824 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 48.921/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.824 -> Packet A|0|S0|883531be3ae5089655566c701e3aba52da41699a|59|1 StreamFrame[0(CIB),0,17,fin] 48.920 loss detection timeout handler running Sending probe 0, because no ack since 48.823. Current RTT: 33/16. 48.920 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 48.920 (Probe is a handshake retransmit) 48.921 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 49.115/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 48.920 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 49.114 loss detection timeout handler running Sending probe 1, because no ack since 48.824. Current RTT: 33/16. 49.114 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 49.114 (Probe is a handshake retransmit) 49.114 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 49.502/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.114 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 49.115 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 49.503/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.115 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 49.146 <- (2) Packet A|2|S0|563c392f72cfc88d|467|3 NewConnectionIdFrame[1,<0|41307701572e05b3e9b8a97296b47272d6d00dae|55a5f460034588bd3814ded7309a6fb4] HandshakeDoneFrame[] CryptoFrame[0,396] 49.147 State is set to Confirmed reschedule loss detection timer for PTO over 164 millis, based on 49.312/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -201 millis, based on 48.946/App, because ackElicitingInFlight | RTT:33/16 49.147 Discarding pn space Handshake because HandshakeDone is received 49.147 loss detection timeout handler running Sending probe 0, because no ack since 48.824. Current RTT: 33/16. 49.147 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 49.391/App, because ackElicitingInFlight | RTT:33/16 49.147 -> Packet PA|1|S0|883531be3ae5089655566c701e3aba52da41699a|59|1 StreamFrame[0(CIB),0,17,fin] 49.167 -> Packet A|2|S0|883531be3ae5089655566c701e3aba52da41699a|44|1 AckFrame[2|Δ19] 49.391 loss detection timeout handler running Sending probe 1, because no ack since 49.147. Current RTT: 33/16. 49.391 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 49.879/App, because ackElicitingInFlight | RTT:33/16 49.391 -> Packet PA|3|S0|883531be3ae5089655566c701e3aba52da41699a|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 49.880/App, because ackElicitingInFlight | RTT:33/16 49.392 -> Packet PA|4|S0|883531be3ae5089655566c701e3aba52da41699a|59|1 StreamFrame[0(CIB),0,17,fin] 49.423 <- (3) Packet A|3|S0|563c392f72cfc88d|1060|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] 49.423 Cwnd(-): 6000; inflight: 59 49.423 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 49.514/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 109 millis, based on 49.534/App, because ackElicitingInFlight | RTT:33/13 49.423 <- (4) Packet A|4|S0|563c392f72cfc88d|31|1 AckFrame[4-2|Δ0] 49.424 -> Packet A|5|S0|883531be3ae5089655566c701e3aba52da41699a|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 49.534/App, because ackElicitingInFlight | RTT:33/13 49.424 Finished downloading https://server4:443/lhrpxdkkts at 13:26.094 on ClientConnection[03db80d98127350d/563c392f72cfc88d(V1) with server4/193.167.100.100:443] 49.424 Closing ClientConnection[03db80d98127350d/563c392f72cfc88d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 49.425 -> Packet A|6|S0|883531be3ae5089655566c701e3aba52da41699a|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 49.425 Creating connection with server4:443 with v1 49.425 Setting up connection for downloading https://server4:443/kwbreilrkj at 13:26.095 on ClientConnection[d76056a49ab758d1/c6ef88de08494d27(V1) with server4/193.167.100.100:443] 49.425 Original destination connection id: d76056a49ab758d1 (scid: c6ef88de08494d27) >- CryptoStream[I|ClientHello] 49.427 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 49.627/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 49.427 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 49.460 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 49.460 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 49.661/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 49.460 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 49.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 49.560/Handshake, because peerAwaitingAddressValidation | RTT:33/16 49.463 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 49.465 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 49.562/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.465 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 49.465 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 49.562/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.465 Discarding pn space Initial because first Handshake message is being sent 49.465 Starting downloading https://server4:443/kwbreilrkj at 13:26.135 on ClientConnection[d76056a49ab758d1/c6ef88de08494d27(V1) with server4/193.167.100.100:443] 49.465 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 49.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 49.563/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.465 -> Packet A|0|S0|db0af35d99fed4cc0b476b11ca50c4c190a6e16e|59|1 StreamFrame[0(CIB),0,17,fin] 49.562 loss detection timeout handler running Sending probe 0, because no ack since 49.465. Current RTT: 33/16. 49.562 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 49.562 (Probe is a handshake retransmit) 49.562 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 49.756/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 49.562 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 49.628 <- (2) Packet A|3|S0|c6ef88de08494d27|467|3 NewConnectionIdFrame[1,<0|ddfb07984f5453e342b90648240a6e0c8c08a6e8|19c7a4b5f3229a062bc56f0c38f19663] HandshakeDoneFrame[] CryptoFrame[0,396] 49.628 State is set to Confirmed reschedule loss detection timer for PTO over 81 millis, based on 49.709/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -40 millis, based on 49.587/App, because ackElicitingInFlight | RTT:33/16 49.629 Discarding pn space Handshake because HandshakeDone is received 49.629 loss detection timeout handler running Sending probe 0, because no ack since 49.465. Current RTT: 33/16. 49.629 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 49.873/App, because ackElicitingInFlight | RTT:33/16 49.629 -> Packet PA|1|S0|db0af35d99fed4cc0b476b11ca50c4c190a6e16e|59|1 StreamFrame[0(CIB),0,17,fin] 49.648 -> Packet A|2|S0|db0af35d99fed4cc0b476b11ca50c4c190a6e16e|44|1 AckFrame[3|Δ19] 49.872 loss detection timeout handler running Sending probe 1, because no ack since 49.629. Current RTT: 33/16. 49.872 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 50.361/App, because ackElicitingInFlight | RTT:33/16 49.873 -> Packet PA|3|S0|db0af35d99fed4cc0b476b11ca50c4c190a6e16e|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 50.362/App, because ackElicitingInFlight | RTT:33/16 49.874 -> Packet PA|4|S0|db0af35d99fed4cc0b476b11ca50c4c190a6e16e|59|1 StreamFrame[0(CIB),0,17,fin] 49.923 <- (3) Packet A|8|S0|c6ef88de08494d27|35|2 AckFrame[4-3,1|Δ18] PingFrame[] 49.924 Cwnd(-): 6000; inflight: 0 49.924 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 49.924 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 123 millis, based on 50.048/App, because ackElicitingInFlight | RTT:35/16 49.924 -> Packet A|5|S0|db0af35d99fed4cc0b476b11ca50c4c190a6e16e|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 49.943 -> Packet A|6|S0|db0af35d99fed4cc0b476b11ca50c4c190a6e16e|46|1 AckFrame[8,3|Δ19] 49.955 <- (4) Packet A|9|S0|c6ef88de08494d27|73|2 AckFrame[5-3,1|Δ0] NewConnectionIdFrame[1,<0|ddfb07984f5453e342b90648240a6e0c8c08a6e8|19c7a4b5f3229a062bc56f0c38f19663] 49.955 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 49.974 -> Packet A|7|S0|db0af35d99fed4cc0b476b11ca50c4c190a6e16e|44|1 AckFrame[9-8|Δ19] 49.975 <- (5) Packet A|10|S0|c6ef88de08494d27|1060|2 AckFrame[6-5|Δ0] StreamFrame[0(CIB),0,1024,fin] 49.975 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 49.976 Finished downloading https://server4:443/kwbreilrkj at 13:26.645 on ClientConnection[d76056a49ab758d1/c6ef88de08494d27(V1) with server4/193.167.100.100:443] 49.976 Closing ClientConnection[d76056a49ab758d1/c6ef88de08494d27(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 49.976 -> Packet A|8|S0|db0af35d99fed4cc0b476b11ca50c4c190a6e16e|47|2 ConnectionCloseFrame[0|0|] AckFrame[10-9|Δ0] 49.977 Creating connection with server4:443 with v1 49.977 Setting up connection for downloading https://server4:443/tdpqqnjrit at 13:26.647 on ClientConnection[f9beeabce0bc3b82/cd4ddae6a10cd770(V1) with server4/193.167.100.100:443] 49.977 Original destination connection id: f9beeabce0bc3b82 (scid: cd4ddae6a10cd770) >- CryptoStream[I|ClientHello] 49.978 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 50.178/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 49.978 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.178 loss detection timeout handler running Sending probe 0, because no ack since 49.978. Current RTT: 100/25. 50.178 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 50.178 (Probe is an initial retransmit) 50.178 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 50.578/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.178 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.577 loss detection timeout handler running Sending probe 1, because no ack since 50.178. Current RTT: 100/25. 50.577 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 50.578 (Probe is an initial retransmit) 50.578 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 51.378/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.578 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.579 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 51.379/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.579 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.611 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 50.612 probe count not reset on ack because handshake not yet confirmed 50.612 Retransmitting CryptoFrame[0,257] on level Initial 50.612 Cwnd(-): 6000; inflight: 1200 50.612 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 51.412/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.612 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 51.001/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.612 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 50.611 <- (1) Packet H|1|L|757|1 CryptoFrame[0,699] 50.615 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 51.003/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.615 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 50.617 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 51.005/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.617 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 50.617 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 50.617 Starting downloading https://server4:443/tdpqqnjrit at 13:27.287 on ClientConnection[f9beeabce0bc3b82/cd4ddae6a10cd770(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 50.714/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.617 Discarding pn space Initial because first Handshake message is being sent 50.617 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 50.617 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 50.618 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.715/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.617 -> Packet A|0|S0|32875b04f0f5c96c04f1bdd139513fb35f3e3837|59|1 StreamFrame[0(CIB),0,17,fin] 50.648 <- (3) Packet A|3|S0|cd4ddae6a10cd770|467|3 NewConnectionIdFrame[1,<0|4cebd5b99808b33de576e38cdb831b44b8025423|b17399d187346006c0c0f6067438d83f] HandshakeDoneFrame[] CryptoFrame[0,396] 50.649 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 50.714/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 50.739/App, because ackElicitingInFlight | RTT:33/16 50.649 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 50.649 <- (4) Packet A|4|S0|cd4ddae6a10cd770|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 50.650 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 50.650 -> Packet A|1|S0|32875b04f0f5c96c04f1bdd139513fb35f3e3837|43|1 AckFrame[4-3|Δ0] 50.650 Finished downloading https://server4:443/tdpqqnjrit at 13:27.320 on ClientConnection[f9beeabce0bc3b82/cd4ddae6a10cd770(V1) with server4/193.167.100.100:443] 50.650 Closing ClientConnection[f9beeabce0bc3b82/cd4ddae6a10cd770(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 50.650 -> Packet A|2|S0|32875b04f0f5c96c04f1bdd139513fb35f3e3837|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 50.650 Creating connection with server4:443 with v1 50.651 Setting up connection for downloading https://server4:443/sskixqbxdd at 13:27.321 on ClientConnection[cbdc74afa7fe8cf7/347e370ee9b946cb(V1) with server4/193.167.100.100:443] 50.651 Original destination connection id: cbdc74afa7fe8cf7 (scid: 347e370ee9b946cb) >- CryptoStream[I|ClientHello] 50.652 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 50.852/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.652 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.851 loss detection timeout handler running Sending probe 0, because no ack since 50.652. Current RTT: 100/25. 50.852 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 50.852 (Probe is an initial retransmit) 50.852 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 51.252/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.852 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.885 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 50.886 probe count not reset on ack because handshake not yet confirmed 50.886 Retransmitting CryptoFrame[0,257] on level Initial 50.886 Cwnd(-): 6000; inflight: 0 50.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 51.286/Initial, because peerAwaitingAddressValidation | RTT:100/25 50.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 51.080/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.886 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 50.885 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 50.888 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 51.082/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.888 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 50.890 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 51.084/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.890 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 50.891 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.988/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.891 Discarding pn space Initial because first Handshake message is being sent 50.891 Starting downloading https://server4:443/sskixqbxdd at 13:27.560 on ClientConnection[cbdc74afa7fe8cf7/347e370ee9b946cb(V1) with server4/193.167.100.100:443] 50.890 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 50.891 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 50.988/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.891 -> Packet A|0|S0|599e81efe0b24ee87ba603728fb1a67d54526aba|59|1 StreamFrame[0(CIB),0,17,fin] 50.987 loss detection timeout handler running Sending probe 0, because no ack since 50.890. Current RTT: 33/16. 50.987 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 50.987 (Probe is a handshake retransmit) 50.987 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 51.181/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 50.987 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 51.055 <- (2) Packet A|4|S0|347e370ee9b946cb|475|4 AckFrame[0|Δ132] NewConnectionIdFrame[1,<0|0ed07c5a0bc3a0bc7b71035d2bbeef00052e72f1|2c64220b596a4fe2c9ea2a050776960c] HandshakeDoneFrame[] CryptoFrame[0,396] 51.056 probe count not reset on ack because handshake not yet confirmed 51.056 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 51.250/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 51.056 State is set to Confirmed reschedule loss detection timer for PTO over 335 millis, based on 51.391/Handshake, because ackElicitingInFlight | RTT:46/39 51.056 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 51.056 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 51.075 -> Packet A|1|S0|599e81efe0b24ee87ba603728fb1a67d54526aba|44|1 AckFrame[4|Δ19] 51.107 <- (3) Packet A|5|S0|347e370ee9b946cb|1100|3 AckFrame[1|Δ0] NewConnectionIdFrame[1,<0|0ed07c5a0bc3a0bc7b71035d2bbeef00052e72f1|2c64220b596a4fe2c9ea2a050776960c] StreamFrame[0(CIB),0,1024,fin] 51.108 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 51.108 Finished downloading https://server4:443/sskixqbxdd at 13:27.778 on ClientConnection[cbdc74afa7fe8cf7/347e370ee9b946cb(V1) with server4/193.167.100.100:443] 51.108 Closing ClientConnection[cbdc74afa7fe8cf7/347e370ee9b946cb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 51.108 -> Packet A|2|S0|599e81efe0b24ee87ba603728fb1a67d54526aba|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 51.109 Creating connection with server4:443 with v1 51.109 Setting up connection for downloading https://server4:443/hnnyhteqwo at 13:27.779 on ClientConnection[e02a02ec25b909ec/ff521320a668a6aa(V1) with server4/193.167.100.100:443] 51.109 Original destination connection id: e02a02ec25b909ec (scid: ff521320a668a6aa) >- CryptoStream[I|ClientHello] 51.110 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 51.310/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 51.110 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 51.309 loss detection timeout handler running Sending probe 0, because no ack since 51.110. Current RTT: 100/25. 51.309 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 51.309 (Probe is an initial retransmit) 51.310 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 51.710/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 51.310 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 51.709 loss detection timeout handler running Sending probe 1, because no ack since 51.310. Current RTT: 100/25. 51.709 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 51.709 (Probe is an initial retransmit) 51.710 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 52.510/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 51.709 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 51.710 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 52.510/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 51.710 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 52.510 loss detection timeout handler running Sending probe 2, because no ack since 51.710. Current RTT: 100/25. 52.510 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 52.510 (Probe is an initial retransmit) 52.510 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 54.110/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 52.510 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 52.511 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 54.111/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 52.511 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 52.544 <- (1) Packet I|3|L|62|1 Token=[] AckFrame[5-4,2|Δ0] 52.544 probe count not reset on ack because handshake not yet confirmed 52.544 Retransmitting CryptoFrame[0,257] on level Initial 52.545 Cwnd(-): 6000; inflight: 0 52.545 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 54.145/Initial, because peerAwaitingAddressValidation | RTT:100/25 52.545 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 53.313/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 52.545 -> Packet I|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) 53.312 loss detection timeout handler running Sending probe 3, because no ack since 52.545. Current RTT: 32/16. 53.312 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 53.312 (Probe is an initial retransmit) 53.312 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1535 millis, based on 54.849/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 53.312 -> Packet PI|7|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) 53.313 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1535 millis, based on 54.849/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 53.313 -> Packet PI|8|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) 53.345 <- (2) Packet I|5|L|64|1 Token=[] AckFrame[7,5-4,2|Δ0] 53.345 probe count not reset on ack because handshake not yet confirmed 53.346 Retransmitting CryptoFrame[0,257] on level Initial 53.346 Cwnd(-): 3000; inflight: 1200 53.346 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1535 millis, based on 54.882/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 53.346 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 54.626/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 53.346 -> Packet I|9|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[3|Δ0] Padding(879) 53.378 <- (3) Packet I|7|L|187|2 Token=[] AckFrame[9-7|Δ0] CryptoFrame[0,123] 53.379 probe count not reset on ack because handshake not yet confirmed 53.379 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 54.659/Initial, because peerAwaitingAddressValidation | RTT:32/12 -< CryptoStream[I|ServerHello] 53.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 67 millis, based on 53.449/Handshake, because peerAwaitingAddressValidation | RTT:32/9 53.381 Discarding pn space Initial because first Handshake message is being sent 53.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 67 millis, based on 53.449/Handshake, because peerAwaitingAddressValidation | RTT:32/9 53.381 -> Packet I|10|L|1201|2 Token=[] AckFrame[7,5|Δ0] Padding(1139) 53.414 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 53.449 loss detection timeout handler running 53.449 Sending probe 0. Current RTT: 32/9. 53.449 Sending probe because peer awaiting address validation 53.449 (Probe is a handshake ping) 53.449 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 135 millis, based on 53.585/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 53.449 -> Packet PH|0|L|56|2 PingFrame[] Padding(2) 53.480 <- (5) Packet H|10|L|59|1 AckFrame[0|Δ0] 53.481 probe count not reset on ack because handshake not yet confirmed 53.481 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 53.700 <- (6) Packet H|12|L|764|2 AckFrame[0|Δ219] CryptoFrame[0,698] 53.701 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 59 millis, based on 53.763/Handshake, because ackElicitingInFlight | RTT:32/7 53.703 -> Packet H|1|L|97|2 CryptoFrame[0,36] AckFrame[10|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 53.704 Starting downloading https://server4:443/hnnyhteqwo at 13:30.374 on ClientConnection[e02a02ec25b909ec/ff521320a668a6aa(V1) with server4/193.167.100.100:443] 53.700 <- (7) Packet H|13|L|63|2 AckFrame[0|Δ219] PingFrame[] 53.704 -> Packet H|2|L|60|1 AckFrame[12,10|Δ0] reschedule loss detection timer for PTO over 59 millis, based on 53.763/Handshake, because ackElicitingInFlight | RTT:32/7 53.704 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 58 millis, based on 53.763/Handshake, because ackElicitingInFlight | RTT:32/7 53.704 -> [Packet H|3|L|60|1 AckFrame[13-12,10|Δ0], Packet A|0|S0|abc720137a07efd96be43e8a1a8ab560ea147dd5|59|1 StreamFrame[0(CIB),0,17,fin]] 53.762 loss detection timeout handler running Sending probe 0, because no ack since 53.703. Current RTT: 32/7. 53.763 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 53.763 (Probe is a handshake retransmit) 53.763 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 119 millis, based on 53.883/Handshake, because ackElicitingInFlight | RTT:32/7 53.763 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 53.789 <- (8) Packet H|15|L|61|2 AckFrame[2|Δ54] PingFrame[] 53.789 Retransmitting CryptoFrame[0,36] on level Handshake 53.789 Cwnd(-): 2400; inflight: 151 53.789 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 33 millis, based on 53.823/Handshake, because ackElicitingInFlight | RTT:32/7 53.790 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 59 millis, based on 53.849/Handshake, because ackElicitingInFlight | RTT:32/7 53.789 -> Packet H|5|L|97|2 CryptoFrame[0,36] AckFrame[13|Δ0] 53.790 -> Packet H|6|L|60|1 AckFrame[15,13|Δ0] 53.821 <- (9) Packet H|16|L|59|1 AckFrame[6|Δ0] 53.825 loss detection timeout handler running 53.825 loss detection timeout handler running 53.825 loss detection timeout handler running 53.825 loss detection timeout handler running 53.825 loss detection timeout handler running 53.825 loss detection timeout handler running 53.825 loss detection timeout handler running 53.826 loss detection timeout handler running 53.826 Retransmitting CryptoFrame[0,36] on level Handshake 53.826 Cwnd(-): 2400; inflight: 59 53.826 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 53.826 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 53.826 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 59 millis, based on 53.886/Handshake, because ackElicitingInFlight | RTT:32/7 53.826 -> Packet H|7|L|97|2 CryptoFrame[0,36] AckFrame[16|Δ0] 53.885 loss detection timeout handler running Sending probe 0, because no ack since 53.704. Current RTT: 32/7. 53.885 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 53.885 (Probe is a handshake retransmit) 53.885 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 119 millis, based on 54.005/Handshake, because ackElicitingInFlight | RTT:32/7 53.885 -> Packet PH|8|L|92|1 CryptoFrame[0,36] 54.004 loss detection timeout handler running Sending probe 1, because no ack since 53.704. Current RTT: 32/7. 54.005 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 54.005 (Probe is a handshake retransmit) 54.005 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 239 millis, based on 54.245/Handshake, because ackElicitingInFlight | RTT:32/7 54.005 -> Packet PH|9|L|92|1 CryptoFrame[0,36] 54.006 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 239 millis, based on 54.246/Handshake, because ackElicitingInFlight | RTT:32/7 54.006 -> Packet PH|10|L|92|1 CryptoFrame[0,36] 54.036 <- (10) Packet A|17|S0|ff521320a668a6aa|467|3 NewConnectionIdFrame[1,<0|0fbb7f17f9d63d2ec496bed28136869c4291b807|2e3df53b4aa02b4c3d6ac78cca3254cd] HandshakeDoneFrame[] CryptoFrame[0,396] 54.037 State is set to Confirmed reschedule loss detection timer for PTO over 7 millis, based on 54.044/App, because ackElicitingInFlight | RTT:32/7 reschedule loss detection timer for PTO over -247 millis, based on 53.789/App, because ackElicitingInFlight | RTT:32/7 54.037 loss detection timeout handler running 54.037 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 53.704. Current RTT: 32/7. 54.037 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 169 millis, based on 54.207/App, because ackElicitingInFlight | RTT:32/7 54.037 -> Packet PA|1|S0|abc720137a07efd96be43e8a1a8ab560ea147dd5|59|1 StreamFrame[0(CIB),0,17,fin] 54.056 -> Packet A|2|S0|abc720137a07efd96be43e8a1a8ab560ea147dd5|44|1 AckFrame[17|Δ19] 54.069 <- (11) Packet A|18|S0|ff521320a668a6aa|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 54.069 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 54.069 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 80 millis, based on 54.150/App, because ackElicitingInFlight | RTT:32/6 54.070 Finished downloading https://server4:443/hnnyhteqwo at 13:30.740 on ClientConnection[e02a02ec25b909ec/ff521320a668a6aa(V1) with server4/193.167.100.100:443] 54.070 Closing ClientConnection[e02a02ec25b909ec/ff521320a668a6aa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 54.069 -> Packet A|3|S0|abc720137a07efd96be43e8a1a8ab560ea147dd5|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[17|Δ0] 54.070 -> Packet A|4|S0|abc720137a07efd96be43e8a1a8ab560ea147dd5|47|2 ConnectionCloseFrame[0|0|] AckFrame[18-17|Δ0] 54.071 Creating connection with server4:443 with v1 54.071 Setting up connection for downloading https://server4:443/hoqnceytrn at 13:30.741 on ClientConnection[d5c4256533a64331/e240a3db950e9657(V1) with server4/193.167.100.100:443] 54.071 Original destination connection id: d5c4256533a64331 (scid: e240a3db950e9657) >- CryptoStream[I|ClientHello] 54.072 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 54.273/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 54.072 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 54.105 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 54.106 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 54.306/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 54.105 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 54.108 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 54.206/Handshake, because peerAwaitingAddressValidation | RTT:33/16 54.108 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 54.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 54.208/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.111 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 54.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 54.208/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.111 Discarding pn space Initial because first Handshake message is being sent 54.111 Starting downloading https://server4:443/hoqnceytrn at 13:30.781 on ClientConnection[d5c4256533a64331/e240a3db950e9657(V1) with server4/193.167.100.100:443] 54.111 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 54.111 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 54.208/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.111 -> Packet A|0|S0|3a9318f8c6cbe1a4d4bbaad73e861c9c07df0f30|59|1 StreamFrame[0(CIB),0,17,fin] 54.208 loss detection timeout handler running Sending probe 0, because no ack since 54.111. Current RTT: 33/16. 54.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 54.208 (Probe is a handshake retransmit) 54.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 54.402/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.208 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 54.213 <- (2) Packet H|2|L|756|1 CryptoFrame[0,698] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 54.213 -> Packet H|3|L|58|1 AckFrame[2-1|Δ0] 54.239 <- (3) Packet A|3|S0|e240a3db950e9657|467|3 NewConnectionIdFrame[1,<0|eae05892f1e2711d95f3653fcedcd6b615431248|ecab2266efe1d0fe3a4473e62bbc7548] HandshakeDoneFrame[] CryptoFrame[0,396] 54.239 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 54.355/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 54.233/App, because ackElicitingInFlight | RTT:33/16 54.240 Discarding pn space Handshake because HandshakeDone is received 54.240 loss detection timeout handler running Sending probe 0, because no ack since 54.111. Current RTT: 33/16. 54.240 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 54.484/App, because ackElicitingInFlight | RTT:33/16 54.240 -> Packet PA|1|S0|3a9318f8c6cbe1a4d4bbaad73e861c9c07df0f30|59|1 StreamFrame[0(CIB),0,17,fin] 54.259 -> Packet A|2|S0|3a9318f8c6cbe1a4d4bbaad73e861c9c07df0f30|44|1 AckFrame[3|Δ19] 54.483 loss detection timeout handler running Sending probe 1, because no ack since 54.240. Current RTT: 33/16. 54.483 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 54.971/App, because ackElicitingInFlight | RTT:33/16 54.483 -> Packet PA|3|S0|3a9318f8c6cbe1a4d4bbaad73e861c9c07df0f30|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 54.972/App, because ackElicitingInFlight | RTT:33/16 54.484 -> Packet PA|4|S0|3a9318f8c6cbe1a4d4bbaad73e861c9c07df0f30|59|1 StreamFrame[0(CIB),0,17,fin] 54.656 <- (4) Packet A|5|S0|e240a3db950e9657|1063|2 AckFrame[3-2|Δ140] StreamFrame[0(CIB),0,1024,fin] 54.657 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 54.657 Cwnd(-): 6000; inflight: 59 reschedule loss detection timer for PTO over -50 millis, based on 54.606/App, because ackElicitingInFlight | RTT:33/16 54.657 loss detection timeout handler running Sending probe 0, because no ack since 54.484. Current RTT: 47/41. reschedule loss detection timer for PTO over 471 millis, based on 55.129/App, because ackElicitingInFlight | RTT:47/41 54.657 (Probe is retransmit on level App) 54.657 -> Packet A|5|S0|3a9318f8c6cbe1a4d4bbaad73e861c9c07df0f30|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 471 millis, based on 55.129/App, because ackElicitingInFlight | RTT:47/41 54.657 -> Packet PA|6|S0|3a9318f8c6cbe1a4d4bbaad73e861c9c07df0f30|59|1 StreamFrame[0(CIB),0,17,fin] 54.657 Finished downloading https://server4:443/hoqnceytrn at 13:31.327 on ClientConnection[d5c4256533a64331/e240a3db950e9657(V1) with server4/193.167.100.100:443] 54.657 Closing ClientConnection[d5c4256533a64331/e240a3db950e9657(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 54.658 -> Packet A|7|S0|3a9318f8c6cbe1a4d4bbaad73e861c9c07df0f30|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 54.658 Creating connection with server4:443 with v1 54.659 Setting up connection for downloading https://server4:443/yidiuvimrr at 13:31.329 on ClientConnection[9526eda0aaf99efc/31652f9836dac3d9(V1) with server4/193.167.100.100:443] 54.659 Original destination connection id: 9526eda0aaf99efc (scid: 31652f9836dac3d9) >- CryptoStream[I|ClientHello] 54.660 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 54.860/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 54.660 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 54.688 <- (5) Packet A|6|S0|e240a3db950e9657|33|1 AckFrame[6,3-2|Δ0] 54.688 -> Packet A|8|S0|3a9318f8c6cbe1a4d4bbaad73e861c9c07df0f30|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 54.693 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 54.694 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 54.894/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 54.693 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 54.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 54.794/Handshake, because peerAwaitingAddressValidation | RTT:33/16 54.697 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 54.699 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 54.796/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.699 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 54.700 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 54.700 Starting downloading https://server4:443/yidiuvimrr at 13:31.370 on ClientConnection[9526eda0aaf99efc/31652f9836dac3d9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 54.797/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.700 Discarding pn space Initial because first Handshake message is being sent 54.700 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 54.700 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 54.797/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.700 -> Packet A|0|S0|927e5a9ffee7bf83be0eb10b9047e618be2882b2|59|1 StreamFrame[0(CIB),0,17,fin] 54.796 loss detection timeout handler running Sending probe 0, because no ack since 54.699. Current RTT: 33/16. 54.796 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 54.796 (Probe is a handshake retransmit) 54.797 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 54.991/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.797 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 54.936 <- (6) Packet A|8|S0|e240a3db950e9657|37|2 AckFrame[6,3-2|Δ247] PingFrame[] 54.936 -> Packet A|9|S0|3a9318f8c6cbe1a4d4bbaad73e861c9c07df0f30|47|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 54.990 loss detection timeout handler running Sending probe 1, because no ack since 54.700. Current RTT: 33/16. 54.990 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 54.990 (Probe is a handshake retransmit) 54.990 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 55.378/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.990 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 54.991 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 55.379/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 54.991 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 55.378 loss detection timeout handler running Sending probe 2, because no ack since 54.700. Current RTT: 33/16. 55.378 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 55.378 (Probe is a handshake retransmit) 55.379 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 56.155/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 55.379 -> Packet PH|5|L|92|1 CryptoFrame[0,36] 55.380 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 56.156/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 55.380 -> Packet PH|6|L|92|1 CryptoFrame[0,36] 56.155 loss detection timeout handler running Sending probe 3, because no ack since 54.700. Current RTT: 33/16. 56.155 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 56.155 (Probe is a handshake retransmit) 56.155 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1551 millis, based on 57.707/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 56.155 -> Packet PH|7|L|92|1 CryptoFrame[0,36] 56.156 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1551 millis, based on 57.708/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 56.156 -> Packet PH|8|L|92|1 CryptoFrame[0,36] 57.707 loss detection timeout handler running Sending probe 4, because no ack since 54.700. Current RTT: 33/16. 57.708 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 57.708 (Probe is a handshake retransmit) 57.708 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3103 millis, based on 60.812/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 57.708 -> Packet PH|9|L|92|1 CryptoFrame[0,36] 57.709 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3103 millis, based on 60.813/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 57.709 -> Packet PH|10|L|92|1 CryptoFrame[0,36] 60.812 loss detection timeout handler running Sending probe 5, because no ack since 54.700. Current RTT: 33/16. 60.812 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 60.812 (Probe is a handshake retransmit) 60.813 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 6207 millis, based on 67.021/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 60.812 -> Packet PH|11|L|92|1 CryptoFrame[0,36] 60.814 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 6207 millis, based on 67.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 60.813 -> Packet PH|12|L|92|1 CryptoFrame[0,36] 61.904 <- (2) Packet A|7|S0|31652f9836dac3d9|1350|5 AckFrame[0|Δ7171] NewConnectionIdFrame[1,<0|3751b05271a1a5c4743560ec143d5aa177452c39|f5800698f6dba1dcdd0010d98c409e90] HandshakeDoneFrame[] CryptoFrame[0,396] StreamFrame[0(CIB),0,870] 61.906 probe count not reset on ack because handshake not yet confirmed 61.906 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 6207 millis, based on 68.114/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 61.906 State is set to Confirmed reschedule loss detection timer for PTO over 518458 millis, based on 580.365/Handshake, because ackElicitingInFlight | RTT:926/1798 61.907 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 61.907 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 61.926 -> Packet A|1|S0|927e5a9ffee7bf83be0eb10b9047e618be2882b2|44|1 AckFrame[7|Δ19] 62.525 <- (3) Packet A|11|S0|31652f9836dac3d9|1183|5 AckFrame[1|Δ567] NewConnectionIdFrame[1,<0|3751b05271a1a5c4743560ec143d5aa177452c39|f5800698f6dba1dcdd0010d98c409e90] NewConnectionIdFrame[1,<0|3751b05271a1a5c4743560ec143d5aa177452c39|f5800698f6dba1dcdd0010d98c409e90] NewConnectionIdFrame[1,<0|3751b05271a1a5c4743560ec143d5aa177452c39|f5800698f6dba1dcdd0010d98c409e90] StreamFrame[0(CIB),0,1024,fin] 62.526 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 62.525 <- (4) Packet A|12|S0|31652f9836dac3d9|35|2 AckFrame[1|Δ567] PingFrame[] 62.527 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 62.527 Finished downloading https://server4:443/yidiuvimrr at 13:39.197 on ClientConnection[9526eda0aaf99efc/31652f9836dac3d9(V1) with server4/193.167.100.100:443] 62.527 Closing ClientConnection[9526eda0aaf99efc/31652f9836dac3d9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 62.527 -> Packet A|2|S0|927e5a9ffee7bf83be0eb10b9047e618be2882b2|43|1 AckFrame[12-11|Δ0] 62.527 -> Packet A|3|S0|927e5a9ffee7bf83be0eb10b9047e618be2882b2|47|2 ConnectionCloseFrame[0|0|] AckFrame[12-11|Δ0] 62.528 Creating connection with server4:443 with v1 62.528 Setting up connection for downloading https://server4:443/zrrtnhrrhm at 13:39.198 on ClientConnection[719af228a6b808da/70be1a41ea045fe9(V1) with server4/193.167.100.100:443] 62.528 Original destination connection id: 719af228a6b808da (scid: 70be1a41ea045fe9) >- CryptoStream[I|ClientHello] 62.530 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 62.730/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 62.530 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 62.563 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 62.563 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 62.763/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 62.563 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 62.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 62.663/Handshake, because peerAwaitingAddressValidation | RTT:33/16 62.566 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 62.568 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 62.665/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 62.568 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 62.568 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 62.665/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 62.568 Starting downloading https://server4:443/zrrtnhrrhm at 13:39.238 on ClientConnection[719af228a6b808da/70be1a41ea045fe9(V1) with server4/193.167.100.100:443] 62.568 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 62.568 Discarding pn space Initial because first Handshake message is being sent 62.569 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 62.666/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 62.569 -> Packet A|0|S0|48a35dc7e9a02c080dbbe5e00ce9f5266de9bfed|59|1 StreamFrame[0(CIB),0,17,fin] 62.665 loss detection timeout handler running Sending probe 0, because no ack since 62.568. Current RTT: 33/16. 62.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 62.665 (Probe is a handshake retransmit) 62.665 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 62.860/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 62.665 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 62.697 <- (2) Packet A|2|S0|70be1a41ea045fe9|467|3 NewConnectionIdFrame[1,<0|d10dc9090afcf6733652264918f947b4e36037ef|be243ede05763f8975e9f79dd379c1f0] HandshakeDoneFrame[] CryptoFrame[0,396] 62.697 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 62.813/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 62.691/App, because ackElicitingInFlight | RTT:33/16 62.698 Discarding pn space Handshake because HandshakeDone is received 62.698 loss detection timeout handler running Sending probe 0, because no ack since 62.569. Current RTT: 33/16. 62.698 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 62.942/App, because ackElicitingInFlight | RTT:33/16 62.698 -> Packet PA|1|S0|48a35dc7e9a02c080dbbe5e00ce9f5266de9bfed|59|1 StreamFrame[0(CIB),0,17,fin] 62.717 -> Packet A|2|S0|48a35dc7e9a02c080dbbe5e00ce9f5266de9bfed|44|1 AckFrame[2|Δ19] 62.865 <- (3) Packet A|4|S0|70be1a41ea045fe9|1061|2 AckFrame[2-1|Δ116] StreamFrame[0(CIB),0,1024,fin] 62.866 Cwnd(-): 6000; inflight: 0 62.866 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 62.866 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 62.988/App, because ackElicitingInFlight | RTT:33/16 62.866 -> Packet A|3|S0|48a35dc7e9a02c080dbbe5e00ce9f5266de9bfed|59|1 StreamFrame[0(CIB),0,17,fin] 62.866 Finished downloading https://server4:443/zrrtnhrrhm at 13:39.536 on ClientConnection[719af228a6b808da/70be1a41ea045fe9(V1) with server4/193.167.100.100:443] 62.866 Closing ClientConnection[719af228a6b808da/70be1a41ea045fe9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 62.867 -> Packet A|4|S0|48a35dc7e9a02c080dbbe5e00ce9f5266de9bfed|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 62.867 Creating connection with server4:443 with v1 62.867 Setting up connection for downloading https://server4:443/absnxgbuft at 13:39.537 on ClientConnection[ac14e050d54033ee/0148bd5ebe4105a9(V1) with server4/193.167.100.100:443] 62.867 Original destination connection id: ac14e050d54033ee (scid: 0148bd5ebe4105a9) >- CryptoStream[I|ClientHello] 62.869 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 63.069/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 62.869 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 63.068 loss detection timeout handler running Sending probe 0, because no ack since 62.869. Current RTT: 100/25. 63.068 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 63.068 (Probe is an initial retransmit) 63.068 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 63.468/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 63.068 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 63.101 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 63.102 probe count not reset on ack because handshake not yet confirmed 63.102 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 63.502/Initial, because peerAwaitingAddressValidation | RTT:100/25 63.135 <- (4) Packet A|6|S0|70be1a41ea045fe9|35|2 AckFrame[2-1|Δ386] PingFrame[] 63.136 -> Packet A|5|S0|48a35dc7e9a02c080dbbe5e00ce9f5266de9bfed|47|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 63.501 loss detection timeout handler running Sending probe 1, because no ack since 63.068. Current RTT: 32/16. 63.501 Sending probe because peer awaiting address validation 63.501 (Probe is Initial ping, because there is no Initial data to retransmit) 63.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 63.885/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 63.501 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 63.885 loss detection timeout handler running Sending probe 2, because no ack since 63.501. Current RTT: 32/16. 63.885 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 63.885 (Probe is Initial ping, because there is no Initial data to retransmit) 63.885 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 64.653/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 63.885 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 63.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 64.654/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 63.886 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 63.902 <- (2) Packet I|3|L|190|2 Token=[] AckFrame[1-0|Δ801] CryptoFrame[0,123] 63.902 probe count not reset on ack because handshake not yet confirmed 63.902 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 64.670/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[I|ServerHello] 63.904 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 64.000/Handshake, because peerAwaitingAddressValidation | RTT:32/16 63.904 Discarding pn space Initial because first Handshake message is being sent 63.905 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 64.001/Handshake, because peerAwaitingAddressValidation | RTT:32/16 63.904 -> Packet I|5|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1141) 63.919 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 64.000 loss detection timeout handler running 64.000 Sending probe 0. Current RTT: 32/16. 64.000 Sending probe because peer awaiting address validation 64.000 (Probe is a handshake ping) 64.000 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 64.192/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 64.000 -> Packet PH|0|L|56|2 PingFrame[] Padding(2) 64.191 loss detection timeout handler running Sending probe 1, because no ack since 64.000. Current RTT: 32/16. 64.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 64.192 (Probe is a handshake ping) 64.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 64.576/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 64.192 -> Packet PH|1|L|56|2 PingFrame[] Padding(2) 64.193 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 64.577/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 64.193 -> Packet PH|2|L|56|2 PingFrame[] Padding(2) 64.576 loss detection timeout handler running Sending probe 2, because no ack since 64.193. Current RTT: 32/16. 64.576 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 64.576 (Probe is a handshake ping) 64.577 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 65.345/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 64.577 -> Packet PH|3|L|56|2 PingFrame[] Padding(2) 64.578 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 65.346/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 64.578 -> Packet PH|4|L|56|2 PingFrame[] Padding(2) 64.608 <- (4) Packet H|8|L|61|1 AckFrame[4-3,1|Δ0] 64.609 probe count not reset on ack because handshake not yet confirmed 64.609 Cwnd(-): 6000; inflight: 0 64.609 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 64.901 <- (5) Packet H|9|L|766|2 AckFrame[4-3,1|Δ291] CryptoFrame[0,698] 64.901 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 83 millis, based on 64.987/Handshake, because ackElicitingInFlight | RTT:32/13 64.903 -> Packet H|5|L|97|2 CryptoFrame[0,36] AckFrame[8|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 64.901 <- (6) Packet H|10|L|65|2 AckFrame[4-3,1|Δ291] PingFrame[] 64.904 Starting downloading https://server4:443/absnxgbuft at 13:41.574 on ClientConnection[ac14e050d54033ee/0148bd5ebe4105a9(V1) with server4/193.167.100.100:443] 64.904 -> Packet H|6|L|58|1 AckFrame[9-8|Δ0] reschedule loss detection timer for PTO over 83 millis, based on 64.987/Handshake, because ackElicitingInFlight | RTT:32/13 64.904 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 83 millis, based on 64.987/Handshake, because ackElicitingInFlight | RTT:32/13 64.904 -> [Packet H|7|L|58|1 AckFrame[10-8|Δ0], Packet A|0|S0|7b2bcad646635fb94a82cc6dbb3b940fcfacb2d5|59|1 StreamFrame[0(CIB),0,17,fin]] 64.935 <- (7) Packet A|11|S0|0148bd5ebe4105a9|467|3 NewConnectionIdFrame[1,<0|eb2f79c3a61182c6739feee4188ca37303b593ba|87425ee9f551601b2468748d7ef09057] HandshakeDoneFrame[] CryptoFrame[0,396] 64.935 State is set to Confirmed reschedule loss detection timer for PTO over 52 millis, based on 64.987/Handshake, because ackElicitingInFlight | RTT:32/13 reschedule loss detection timer for PTO over 77 millis, based on 65.013/App, because ackElicitingInFlight | RTT:32/13 64.935 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 64.955 -> Packet A|1|S0|7b2bcad646635fb94a82cc6dbb3b940fcfacb2d5|44|1 AckFrame[11|Δ19] 65.012 loss detection timeout handler running Sending probe 0, because no ack since 64.904. Current RTT: 32/13. 65.012 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 217 millis, based on 65.230/App, because ackElicitingInFlight | RTT:32/13 65.012 -> Packet PA|2|S0|7b2bcad646635fb94a82cc6dbb3b940fcfacb2d5|59|1 StreamFrame[0(CIB),0,17,fin] 65.230 loss detection timeout handler running Sending probe 1, because no ack since 65.012. Current RTT: 32/13. 65.230 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 435 millis, based on 65.666/App, because ackElicitingInFlight | RTT:32/13 65.230 -> Packet PA|3|S0|7b2bcad646635fb94a82cc6dbb3b940fcfacb2d5|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 435 millis, based on 65.667/App, because ackElicitingInFlight | RTT:32/13 65.231 -> Packet PA|4|S0|7b2bcad646635fb94a82cc6dbb3b940fcfacb2d5|59|1 StreamFrame[0(CIB),0,17,fin] 65.262 <- (8) Packet A|12|S0|0148bd5ebe4105a9|1060|2 AckFrame[3|Δ0] StreamFrame[0(CIB),0,1024,fin] 65.262 Cwnd(-): 3000; inflight: 59 65.262 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 77 millis, based on 65.340/App, because ackElicitingInFlight | RTT:32/13 reschedule loss detection timer for PTO over 96 millis, based on 65.359/App, because ackElicitingInFlight | RTT:32/10 65.262 -> Packet A|5|S0|7b2bcad646635fb94a82cc6dbb3b940fcfacb2d5|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[11|Δ0] 65.263 Finished downloading https://server4:443/absnxgbuft at 13:41.932 on ClientConnection[ac14e050d54033ee/0148bd5ebe4105a9(V1) with server4/193.167.100.100:443] 65.263 Closing ClientConnection[ac14e050d54033ee/0148bd5ebe4105a9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 65.263 -> Packet A|6|S0|7b2bcad646635fb94a82cc6dbb3b940fcfacb2d5|47|2 ConnectionCloseFrame[0|0|] AckFrame[12-11|Δ0] 65.263 Creating connection with server4:443 with v1 65.264 Setting up connection for downloading https://server4:443/xkbljihexx at 13:41.934 on ClientConnection[460fc483704059c8/d2cb9fab370b71ba(V1) with server4/193.167.100.100:443] 65.264 Original destination connection id: 460fc483704059c8 (scid: d2cb9fab370b71ba) >- CryptoStream[I|ClientHello] 65.265 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 65.465/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 65.265 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 65.293 <- (9) Packet A|14|S0|0148bd5ebe4105a9|31|1 AckFrame[5-3|Δ0] 65.293 -> Packet A|7|S0|7b2bcad646635fb94a82cc6dbb3b940fcfacb2d5|47|2 ConnectionCloseFrame[0|0|] AckFrame[12-11|Δ0] 65.464 loss detection timeout handler running Sending probe 0, because no ack since 65.265. Current RTT: 100/25. 65.464 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 65.464 (Probe is an initial retransmit) 65.465 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 65.865/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 65.465 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 65.498 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 65.498 probe count not reset on ack because handshake not yet confirmed 65.499 Retransmitting CryptoFrame[0,257] on level Initial 65.499 Cwnd(-): 6000; inflight: 0 65.499 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 65.899/Initial, because peerAwaitingAddressValidation | RTT:100/25 65.499 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 65.693/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 65.499 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 65.498 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 65.502 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 65.696/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 65.502 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 65.505 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 65.699/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 65.504 -> Packet H|0|L|92|1 CryptoFrame[0,36] 65.505 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 65.602/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 65.505 Starting downloading https://server4:443/xkbljihexx at 13:42.175 on ClientConnection[460fc483704059c8/d2cb9fab370b71ba(V1) with server4/193.167.100.100:443] 65.505 Discarding pn space Initial because first Handshake message is being sent 65.505 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 65.505 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 65.602/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 65.505 -> Packet A|0|S0|cdeaa30724c3edf4c5283c5d84e812faa48a6e99|59|1 StreamFrame[0(CIB),0,17,fin] 65.532 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 65.601 loss detection timeout handler running Sending probe 0, because no ack since 65.504. Current RTT: 33/16. 65.601 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 65.601 (Probe is a handshake retransmit) 65.602 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 65.796/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 65.602 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 65.633 <- (3) Packet A|3|S0|d2cb9fab370b71ba|467|3 NewConnectionIdFrame[1,<0|1b24e2d6849c13a7f46d65fe86a80a67125f958a|0b15e3e4807fa67a60b112b187368a77] HandshakeDoneFrame[] CryptoFrame[0,396] 65.634 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 65.749/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 65.627/App, because ackElicitingInFlight | RTT:33/16 65.634 Discarding pn space Handshake because HandshakeDone is received 65.634 loss detection timeout handler running Sending probe 0, because no ack since 65.505. Current RTT: 33/16. 65.634 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 65.878/App, because ackElicitingInFlight | RTT:33/16 65.634 -> Packet PA|1|S0|cdeaa30724c3edf4c5283c5d84e812faa48a6e99|59|1 StreamFrame[0(CIB),0,17,fin] 65.654 -> Packet A|2|S0|cdeaa30724c3edf4c5283c5d84e812faa48a6e99|44|1 AckFrame[3|Δ19] 65.666 <- (4) Packet A|4|S0|d2cb9fab370b71ba|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 65.667 Cwnd(-): 3000; inflight: 0 65.667 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 65.667 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 65.777/App, because ackElicitingInFlight | RTT:33/13 65.667 -> Packet A|3|S0|cdeaa30724c3edf4c5283c5d84e812faa48a6e99|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 65.667 Finished downloading https://server4:443/xkbljihexx at 13:42.337 on ClientConnection[460fc483704059c8/d2cb9fab370b71ba(V1) with server4/193.167.100.100:443] 65.667 Closing ClientConnection[460fc483704059c8/d2cb9fab370b71ba(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 65.668 -> Packet A|4|S0|cdeaa30724c3edf4c5283c5d84e812faa48a6e99|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 65.668 Creating connection with server4:443 with v1 65.669 Setting up connection for downloading https://server4:443/fprpdunmyo at 13:42.339 on ClientConnection[035c96472a2afa63/487b83d44313d372(V1) with server4/193.167.100.100:443] 65.669 Original destination connection id: 035c96472a2afa63 (scid: 487b83d44313d372) >- CryptoStream[I|ClientHello] 65.670 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 65.870/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 65.670 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 65.698 <- (5) Packet A|5|S0|d2cb9fab370b71ba|33|1 AckFrame[3,1|Δ0] 65.698 -> Packet A|5|S0|cdeaa30724c3edf4c5283c5d84e812faa48a6e99|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 65.869 loss detection timeout handler running Sending probe 0, because no ack since 65.670. Current RTT: 100/25. 65.869 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 65.869 (Probe is an initial retransmit) 65.870 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 66.270/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 65.870 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 65.886 <- (6) Packet A|6|S0|d2cb9fab370b71ba|1065|2 AckFrame[3,1|Δ187] StreamFrame[0(CIB),0,1024,fin] 65.887 -> Packet A|6|S0|cdeaa30724c3edf4c5283c5d84e812faa48a6e99|47|2 ConnectionCloseFrame[0|0|] AckFrame[4-3|Δ0] 65.902 <- (1) Packet I|2|L|60|1 Token=[] AckFrame[1-0|Δ0] 65.903 probe count not reset on ack because handshake not yet confirmed 65.903 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 66.303/Initial, because peerAwaitingAddressValidation | RTT:100/25 66.302 loss detection timeout handler running Sending probe 1, because no ack since 65.870. Current RTT: 32/16. 66.302 Sending probe because peer awaiting address validation 66.302 (Probe is Initial ping, because there is no Initial data to retransmit) 66.302 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 66.687/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 66.302 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 66.335 <- (2) Packet I|3|L|60|1 Token=[] AckFrame[2-0|Δ0] 66.336 probe count not reset on ack because handshake not yet confirmed 66.336 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 66.720/Initial, because peerAwaitingAddressValidation | RTT:32/16 66.719 loss detection timeout handler running Sending probe 2, because no ack since 66.302. Current RTT: 32/12. 66.719 Sending probe because peer awaiting address validation 66.719 (Probe is Initial ping, because there is no Initial data to retransmit) 66.719 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 67.359/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 66.719 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 66.752 <- (3) Packet I|5|L|60|1 Token=[] AckFrame[3-0|Δ0] 66.753 probe count not reset on ack because handshake not yet confirmed 66.753 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 639 millis, based on 67.393/Initial, because peerAwaitingAddressValidation | RTT:32/12 67.392 loss detection timeout handler running Sending probe 3, because no ack since 66.719. Current RTT: 32/9. 67.392 Sending probe because peer awaiting address validation 67.392 (Probe is Initial ping, because there is no Initial data to retransmit) 67.392 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1087 millis, based on 68.480/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 67.392 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 67.702 Discarding packet (756 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 67.703 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 68.480 loss detection timeout handler running Sending probe 4, because no ack since 67.392. Current RTT: 32/9. 68.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 68.480 (Probe is Initial ping, because there is no Initial data to retransmit) 68.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 70.656/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 68.480 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 68.481 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 70.657/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 68.481 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 68.513 <- (6) Packet I|8|L|62|1 Token=[] AckFrame[5,3-0|Δ0] 68.513 probe count not reset on ack because handshake not yet confirmed 68.513 Cwnd(-): 6000; inflight: 1201 68.514 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2175 millis, based on 70.690/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 68.514 <- (7) Packet I|9|L|62|1 Token=[] AckFrame[6-5,3-0|Δ0] 68.514 probe count not reset on ack because handshake not yet confirmed 68.514 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1919 millis, based on 70.434/Initial, because peerAwaitingAddressValidation | RTT:32/7 70.433 loss detection timeout handler running Sending probe 5, because no ack since 68.481. Current RTT: 32/5. 70.434 Sending probe because peer awaiting address validation 70.434 (Probe is Initial ping, because there is no Initial data to retransmit) 70.434 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3327 millis, based on 73.762/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 70.434 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 70.703 <- (8) Packet I|11|L|66|2 Token=[] AckFrame[6-5,3-0|Δ2188] PingFrame[] 70.704 probe count not reset on ack because handshake not yet confirmed 70.704 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3327 millis, based on 74.032/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 70.704 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3327 millis, based on 74.032/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 70.704 -> Packet I|8|L|1201|2 Token=[] AckFrame[11,9-8,5,3-2|Δ0] Padding(1135) 74.031 loss detection timeout handler running Sending probe 6, because no ack since 70.434. Current RTT: 32/5. 74.032 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 74.032 (Probe is Initial ping, because there is no Initial data to retransmit) 74.032 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 6655 millis, based on 80.688/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 74.032 -> Packet PI|9|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 74.033 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 6655 millis, based on 80.689/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 74.033 -> Packet PI|10|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 74.065 <- (9) Packet I|12|L|64|1 Token=[] AckFrame[9,6-5,3-0|Δ0] 74.065 probe count not reset on ack because handshake not yet confirmed 74.065 Cwnd(-): 3000; inflight: 1201 74.065 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 6655 millis, based on 80.721/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/5 74.066 <- (10) Packet I|13|L|64|1 Token=[] AckFrame[10-9,6-5,3-0|Δ0] 74.066 probe count not reset on ack because handshake not yet confirmed 74.066 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 6143 millis, based on 80.210/Initial, because peerAwaitingAddressValidation | RTT:32/4 75.696 Discarding packet (756 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 75.697 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 80.209 loss detection timeout handler running Sending probe 7, because no ack since 74.033. Current RTT: 32/3. 80.209 Sending probe because peer awaiting address validation 80.209 (Probe is Initial ping, because there is no Initial data to retransmit) 80.210 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 11263 millis, based on 91.474/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/3 80.209 -> Packet PI|11|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1143) 86.689 <- (13) Packet I|16|L|194|2 Token=[] AckFrame[10-9,6-5,3-0|Δ12623] CryptoFrame[0,123] 86.689 probe count not reset on ack because handshake not yet confirmed 86.689 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 11263 millis, based on 97.953/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/3 -< CryptoStream[I|ServerHello] 86.692 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 43 millis, based on 86.736/Handshake, because peerAwaitingAddressValidation | RTT:32/3 86.692 Discarding pn space Initial because first Handshake message is being sent 86.692 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 43 millis, based on 86.736/Handshake, because peerAwaitingAddressValidation | RTT:32/3 86.692 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 86.692 -> Packet I|12|L|1201|2 Token=[] AckFrame[16,13-11,9-8,5,3-2|Δ0] Padding(1133) 86.725 <- (15) Packet H|19|L|756|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 86.728 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 43 millis, based on 86.772/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/3 86.728 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 86.728 Starting downloading https://server4:443/fprpdunmyo at 14:03.398 on ClientConnection[035c96472a2afa63/487b83d44313d372(V1) with server4/193.167.100.100:443] 86.728 -> Packet H|1|L|58|1 AckFrame[19|Δ0] 86.729 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 43 millis, based on 86.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/3 86.729 -> Packet A|0|S0|4a9b65506642c15a391fa2f9b6522f37818e3ade|59|1 StreamFrame[0(CIB),0,17,fin] 86.760 <- (16) Packet A|21|S0|487b83d44313d372|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 86.761 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 43 millis, based on 86.805/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/3 86.761 Finished downloading https://server4:443/fprpdunmyo at 14:03.431 on ClientConnection[035c96472a2afa63/487b83d44313d372(V1) with server4/193.167.100.100:443] 86.762 Closing ClientConnection[035c96472a2afa63/487b83d44313d372(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 86.762 -> Packet A|1|S0|4a9b65506642c15a391fa2f9b6522f37818e3ade|47|2 ConnectionCloseFrame[0|0|] AckFrame[21|Δ0] 86.762 Creating connection with server4:443 with v1 86.763 Setting up connection for downloading https://server4:443/pgvicqspwy at 14:03.433 on ClientConnection[1038bca9bd7ba1bd/bab3988ed3d9cc5b(V1) with server4/193.167.100.100:443] 86.763 Original destination connection id: 1038bca9bd7ba1bd (scid: bab3988ed3d9cc5b) >- CryptoStream[I|ClientHello] 86.765 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 86.965/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 86.764 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 86.964 loss detection timeout handler running Sending probe 0, because no ack since 86.764. Current RTT: 100/25. 86.964 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 86.964 (Probe is an initial retransmit) 86.964 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 87.364/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 86.964 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 87.363 loss detection timeout handler running Sending probe 1, because no ack since 86.964. Current RTT: 100/25. 87.363 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 87.364 (Probe is an initial retransmit) 87.364 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 88.164/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 87.364 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 87.365 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 88.165/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 87.365 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 87.998 <- (1) Packet I|4|L|190|2 Token=[] AckFrame[3-1|Δ599] CryptoFrame[0,123] 87.998 probe count not reset on ack because handshake not yet confirmed 87.998 Retransmitting CryptoFrame[0,257] on level Initial 87.998 Cwnd(-): 6000; inflight: 0 87.998 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 88.799/Initial, because peerAwaitingAddressValidation | RTT:100/25 87.999 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 7583 millis, based on 95.583/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:632/316 87.999 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 88.001 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1895 millis, based on 89.897/Handshake, because peerAwaitingAddressValidation | RTT:632/316 88.001 Discarding pn space Initial because first Handshake message is being sent 88.001 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1895 millis, based on 89.897/Handshake, because peerAwaitingAddressValidation | RTT:632/316 88.001 -> Packet I|5|L|1201|2 Token=[] AckFrame[4|Δ0] Padding(1141) 88.034 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 88.034 <- (3) Packet H|6|L|756|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 88.038 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1895 millis, based on 89.934/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:632/316 88.037 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 88.038 Starting downloading https://server4:443/pgvicqspwy at 14:04.708 on ClientConnection[1038bca9bd7ba1bd/bab3988ed3d9cc5b(V1) with server4/193.167.100.100:443] 88.038 -> Packet H|1|L|58|1 AckFrame[6|Δ0] 88.039 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1895 millis, based on 89.935/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:632/316 88.038 -> Packet A|0|S0|7494c4023f40aec7e384257b5024ed8b70fd86c2|59|1 StreamFrame[0(CIB),0,17,fin] 88.069 <- (4) Packet A|7|S0|bab3988ed3d9cc5b|467|3 NewConnectionIdFrame[1,<0|de434e5e0d221df418bae639d7498f584985215c|205fbec92bde0d2abc1e4cc1e2cd9789] HandshakeDoneFrame[] CryptoFrame[0,396] 88.069 State is set to Confirmed reschedule loss detection timer for PTO over 1864 millis, based on 89.933/Handshake, because ackElicitingInFlight | RTT:632/316 reschedule loss detection timer for PTO over 1890 millis, based on 89.959/App, because ackElicitingInFlight | RTT:632/316 88.069 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 88.089 -> Packet A|1|S0|7494c4023f40aec7e384257b5024ed8b70fd86c2|44|1 AckFrame[7|Δ19] 88.337 <- (5) Packet A|9|S0|bab3988ed3d9cc5b|1350|5 AckFrame[0|Δ266] NewConnectionIdFrame[1,<0|de434e5e0d221df418bae639d7498f584985215c|205fbec92bde0d2abc1e4cc1e2cd9789] HandshakeDoneFrame[] CryptoFrame[0,396] StreamFrame[0(CIB),0,870] 88.338 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 88.357 -> Packet A|2|S0|7494c4023f40aec7e384257b5024ed8b70fd86c2|46|1 AckFrame[9,7|Δ19] 88.522 <- (6) Packet A|12|S0|bab3988ed3d9cc5b|194|2 AckFrame[2|Δ133] StreamFrame[0(CIB),870,154,fin] 88.522 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 88.523 Finished downloading https://server4:443/pgvicqspwy at 14:05.193 on ClientConnection[1038bca9bd7ba1bd/bab3988ed3d9cc5b(V1) with server4/193.167.100.100:443] 88.523 Closing ClientConnection[1038bca9bd7ba1bd/bab3988ed3d9cc5b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 88.523 -> Packet A|3|S0|7494c4023f40aec7e384257b5024ed8b70fd86c2|47|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 88.523 Creating connection with server4:443 with v1 88.524 Setting up connection for downloading https://server4:443/hlprhrhumg at 14:05.194 on ClientConnection[49a0233172f7d9d4/cada1ac825348fa6(V1) with server4/193.167.100.100:443] 88.524 Original destination connection id: 49a0233172f7d9d4 (scid: cada1ac825348fa6) >- CryptoStream[I|ClientHello] 88.525 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 88.725/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 88.525 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 88.558 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 88.559 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 88.759/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 88.558 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 88.562 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 88.659/Handshake, because peerAwaitingAddressValidation | RTT:33/16 88.562 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 88.564 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 88.661/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 88.564 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 88.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 88.662/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 88.565 Discarding pn space Initial because first Handshake message is being sent 88.565 Starting downloading https://server4:443/hlprhrhumg at 14:05.235 on ClientConnection[49a0233172f7d9d4/cada1ac825348fa6(V1) with server4/193.167.100.100:443] 88.565 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 88.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 88.662/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 88.565 -> Packet A|0|S0|4b7c7d5eb65e2cb9d300a08280bd62956138831e|59|1 StreamFrame[0(CIB),0,17,fin] 88.597 <- (2) Packet A|3|S0|cada1ac825348fa6|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 88.597 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 88.694/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 88.598 Finished downloading https://server4:443/hlprhrhumg at 14:05.268 on ClientConnection[49a0233172f7d9d4/cada1ac825348fa6(V1) with server4/193.167.100.100:443] 88.598 Closing ClientConnection[49a0233172f7d9d4/cada1ac825348fa6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 88.598 -> Packet A|1|S0|4b7c7d5eb65e2cb9d300a08280bd62956138831e|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 88.599 Creating connection with server4:443 with v1 88.599 Setting up connection for downloading https://server4:443/gldlbfoewy at 14:05.269 on ClientConnection[d5ed0c88eee3e1d5/dcdb186cde37edb8(V1) with server4/193.167.100.100:443] 88.599 Original destination connection id: d5ed0c88eee3e1d5 (scid: dcdb186cde37edb8) >- CryptoStream[I|ClientHello] 88.601 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 88.801/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 88.600 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 88.731 <- (3) Packet A|4|S0|cada1ac825348fa6|475|4 AckFrame[0|Δ134] NewConnectionIdFrame[1,<0|e13813ff44aa67db248f32a2b03e6355f3b455ec|19bc42877678907944ba3ca63d464549] HandshakeDoneFrame[] CryptoFrame[0,396] 88.732 -> Packet A|2|S0|4b7c7d5eb65e2cb9d300a08280bd62956138831e|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 88.800 loss detection timeout handler running Sending probe 0, because no ack since 88.600. Current RTT: 100/25. 88.800 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 88.800 (Probe is an initial retransmit) 88.800 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 89.200/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 88.800 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 88.833 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 88.834 probe count not reset on ack because handshake not yet confirmed 88.834 Retransmitting CryptoFrame[0,257] on level Initial 88.834 Cwnd(-): 6000; inflight: 0 88.834 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 89.234/Initial, because peerAwaitingAddressValidation | RTT:100/25 88.834 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 89.028/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 88.834 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 88.833 <- (1) Packet H|1|L|757|1 CryptoFrame[0,699] 88.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 89.031/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 88.837 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 88.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 89.034/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 88.840 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 88.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 88.840 Starting downloading https://server4:443/gldlbfoewy at 14:05.510 on ClientConnection[d5ed0c88eee3e1d5/dcdb186cde37edb8(V1) with server4/193.167.100.100:443] 88.840 -> Packet H|1|L|58|1 AckFrame[1|Δ0] reschedule loss detection timer for PTO over 96 millis, based on 88.937/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 88.840 Discarding pn space Initial because first Handshake message is being sent 88.841 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 88.938/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 88.841 -> Packet A|0|S0|5b5850a727c347fa2fcc542bc8bdab32668fa8d1|59|1 StreamFrame[0(CIB),0,17,fin] 88.937 loss detection timeout handler running Sending probe 0, because no ack since 88.840. Current RTT: 33/16. 88.937 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 88.937 (Probe is a handshake retransmit) 88.937 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 89.131/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 88.937 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 89.006 <- (2) Packet A|3|S0|dcdb186cde37edb8|467|3 NewConnectionIdFrame[1,<0|436c64f6cd2316dda556097384bf07996abb5fb6|8cb6b5c7f0e45997edba90283e97d81e] HandshakeDoneFrame[] CryptoFrame[0,396] 89.006 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 89.085/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -43 millis, based on 88.963/App, because ackElicitingInFlight | RTT:33/16 89.006 Discarding pn space Handshake because HandshakeDone is received 89.006 loss detection timeout handler running Sending probe 0, because no ack since 88.841. Current RTT: 33/16. 89.007 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 89.251/App, because ackElicitingInFlight | RTT:33/16 89.007 -> Packet PA|1|S0|5b5850a727c347fa2fcc542bc8bdab32668fa8d1|59|1 StreamFrame[0(CIB),0,17,fin] 89.026 -> Packet A|2|S0|5b5850a727c347fa2fcc542bc8bdab32668fa8d1|44|1 AckFrame[3|Δ19] 89.191 <- (3) Packet A|5|S0|dcdb186cde37edb8|35|2 AckFrame[2|Δ133] PingFrame[] 89.191 Cwnd(-): 3000; inflight: 0 89.191 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 89.191 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 89.313/App, because ackElicitingInFlight | RTT:33/16 89.191 -> Packet A|3|S0|5b5850a727c347fa2fcc542bc8bdab32668fa8d1|59|1 StreamFrame[0(CIB),0,17,fin] 89.211 -> Packet A|4|S0|5b5850a727c347fa2fcc542bc8bdab32668fa8d1|44|1 AckFrame[5|Δ19] 89.313 loss detection timeout handler running Sending probe 0, because no ack since 89.191. Current RTT: 33/16. 89.313 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 89.557/App, because ackElicitingInFlight | RTT:33/16 89.313 -> Packet PA|5|S0|5b5850a727c347fa2fcc542bc8bdab32668fa8d1|59|1 StreamFrame[0(CIB),0,17,fin] 89.344 <- (4) Packet A|7|S0|dcdb186cde37edb8|33|1 AckFrame[5,3-2|Δ0] 89.344 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 89.490 <- (5) Packet A|9|S0|dcdb186cde37edb8|37|2 AckFrame[5,3-2|Δ145] PingFrame[] 89.491 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 89.510 -> Packet A|6|S0|5b5850a727c347fa2fcc542bc8bdab32668fa8d1|48|1 AckFrame[9,7,5|Δ19] 89.542 <- (6) Packet A|10|S0|dcdb186cde37edb8|1100|3 AckFrame[6|Δ0] NewConnectionIdFrame[1,<0|436c64f6cd2316dda556097384bf07996abb5fb6|8cb6b5c7f0e45997edba90283e97d81e] StreamFrame[0(CIB),0,1024,fin] 89.542 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 89.543 Finished downloading https://server4:443/gldlbfoewy at 14:06.213 on ClientConnection[d5ed0c88eee3e1d5/dcdb186cde37edb8(V1) with server4/193.167.100.100:443] 89.543 Closing ClientConnection[d5ed0c88eee3e1d5/dcdb186cde37edb8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 89.543 -> Packet A|7|S0|5b5850a727c347fa2fcc542bc8bdab32668fa8d1|47|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 89.543 Creating connection with server4:443 with v1 89.544 Setting up connection for downloading https://server4:443/sdcirlkfod at 14:06.214 on ClientConnection[e6f3af9b73a74068/f76e192cafe9e73f(V1) with server4/193.167.100.100:443] 89.544 Original destination connection id: e6f3af9b73a74068 (scid: f76e192cafe9e73f) >- CryptoStream[I|ClientHello] 89.545 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 89.745/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 89.545 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 89.549 <- (7) Packet A|11|S0|dcdb186cde37edb8|1061|2 AckFrame[6|Δ7] StreamFrame[0(CIB),0,1024,fin] 89.549 -> Packet A|8|S0|5b5850a727c347fa2fcc542bc8bdab32668fa8d1|47|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 89.744 loss detection timeout handler running Sending probe 0, because no ack since 89.545. Current RTT: 100/25. 89.744 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 89.744 (Probe is an initial retransmit) 89.745 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 90.145/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 89.745 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 90.144 loss detection timeout handler running Sending probe 1, because no ack since 89.745. Current RTT: 100/25. 90.144 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 90.144 (Probe is an initial retransmit) 90.144 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 90.944/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 90.144 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 90.145 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 90.945/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 90.145 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 90.778 <- (1) Packet I|3|L|192|2 Token=[] AckFrame[3,1|Δ599] CryptoFrame[0,123] 90.779 probe count not reset on ack because handshake not yet confirmed 90.779 Retransmitting CryptoFrame[0,257] on level Initial 90.779 Cwnd(-): 6000; inflight: 0 90.779 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 91.579/Initial, because peerAwaitingAddressValidation | RTT:100/25 90.779 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 7583 millis, based on 98.363/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:632/316 90.779 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(884) -< CryptoStream[I|ServerHello] 90.781 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1895 millis, based on 92.677/Handshake, because peerAwaitingAddressValidation | RTT:632/316 90.781 Discarding pn space Initial because first Handshake message is being sent 90.781 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1895 millis, based on 92.677/Handshake, because peerAwaitingAddressValidation | RTT:632/316 90.781 -> Packet I|5|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1141) 90.814 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 91.029 <- (3) Packet H|7|L|756|1 CryptoFrame[0,698] >- CryptoStream[H|Finished] 91.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1895 millis, based on 92.928/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:632/316 91.032 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 91.029 <- (4) Packet H|8|L|58|2 PingFrame[] Padding(3) 91.032 Starting downloading https://server4:443/sdcirlkfod at 14:07.702 on ClientConnection[e6f3af9b73a74068/f76e192cafe9e73f(V1) with server4/193.167.100.100:443] 91.032 -> Packet H|1|L|58|1 AckFrame[7|Δ0] 91.032 -> Packet H|2|L|58|1 AckFrame[8-7|Δ0] 91.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1895 millis, based on 92.928/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:632/316 91.032 -> Packet A|0|S0|37c2938d73796115869f3402adbd8430608b6fc2|59|1 StreamFrame[0(CIB),0,17,fin] 91.063 <- (5) Packet A|9|S0|f76e192cafe9e73f|467|3 NewConnectionIdFrame[1,<0|5408164d7fecf6bfff597987dba9c21769c9d7b2|c684489632eabd5bf8c109b85dc93045] HandshakeDoneFrame[] CryptoFrame[0,396] 91.063 State is set to Confirmed reschedule loss detection timer for PTO over 1864 millis, based on 92.928/Handshake, because ackElicitingInFlight | RTT:632/316 reschedule loss detection timer for PTO over 1889 millis, based on 92.953/App, because ackElicitingInFlight | RTT:632/316 91.063 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 91.064 <- (6) Packet A|10|S0|f76e192cafe9e73f|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 91.064 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 91.064 -> Packet A|1|S0|37c2938d73796115869f3402adbd8430608b6fc2|43|1 AckFrame[10-9|Δ0] 91.065 Finished downloading https://server4:443/sdcirlkfod at 14:07.735 on ClientConnection[e6f3af9b73a74068/f76e192cafe9e73f(V1) with server4/193.167.100.100:443] 91.065 Closing ClientConnection[e6f3af9b73a74068/f76e192cafe9e73f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 91.065 Creating connection with server4:443 with v1 91.065 -> Packet A|2|S0|37c2938d73796115869f3402adbd8430608b6fc2|47|2 ConnectionCloseFrame[0|0|] AckFrame[10-9|Δ0] 91.066 Setting up connection for downloading https://server4:443/huhslxvfmz at 14:07.736 on ClientConnection[10bd83024e7ef2f0/4a1a7ebc7dbfa3da(V1) with server4/193.167.100.100:443] 91.066 Original destination connection id: 10bd83024e7ef2f0 (scid: 4a1a7ebc7dbfa3da) >- CryptoStream[I|ClientHello] 91.067 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 91.267/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 91.067 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 91.100 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 91.100 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 91.300/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 91.100 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 91.102 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 91.199/Handshake, because peerAwaitingAddressValidation | RTT:33/16 91.102 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 91.104 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 91.201/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 91.104 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 91.104 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 91.104 Starting downloading https://server4:443/huhslxvfmz at 14:07.774 on ClientConnection[10bd83024e7ef2f0/4a1a7ebc7dbfa3da(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 91.201/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 91.104 Discarding pn space Initial because first Handshake message is being sent 91.104 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 91.105 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 91.202/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 91.105 -> Packet A|0|S0|5729d9c639baa4de1f8794a364e13284b0d42f2e|59|1 StreamFrame[0(CIB),0,17,fin] 91.201 loss detection timeout handler running Sending probe 0, because no ack since 91.104. Current RTT: 33/16. 91.201 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 91.201 (Probe is a handshake retransmit) 91.201 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 91.395/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 91.201 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 91.232 <- (2) Packet A|2|S0|4a1a7ebc7dbfa3da|467|3 NewConnectionIdFrame[1,<0|a9a9b07c049020ad41a38b020e8747101f6ce1e2|d3d8e733d46046f7645568dbc6c9ceb1] HandshakeDoneFrame[] CryptoFrame[0,396] 91.233 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 91.349/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 91.227/App, because ackElicitingInFlight | RTT:33/16 91.233 loss detection timeout handler running 91.233 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 91.105. Current RTT: 33/16. 91.233 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 91.477/App, because ackElicitingInFlight | RTT:33/16 91.233 -> Packet PA|1|S0|5729d9c639baa4de1f8794a364e13284b0d42f2e|59|1 StreamFrame[0(CIB),0,17,fin] 91.253 -> Packet A|2|S0|5729d9c639baa4de1f8794a364e13284b0d42f2e|44|1 AckFrame[2|Δ19] 91.476 loss detection timeout handler running Sending probe 1, because no ack since 91.233. Current RTT: 33/16. 91.477 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 91.965/App, because ackElicitingInFlight | RTT:33/16 91.477 -> Packet PA|3|S0|5729d9c639baa4de1f8794a364e13284b0d42f2e|59|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 91.966/App, because ackElicitingInFlight | RTT:33/16 91.478 -> Packet PA|4|S0|5729d9c639baa4de1f8794a364e13284b0d42f2e|59|1 StreamFrame[0(CIB),0,17,fin] 91.509 <- (3) Packet A|4|S0|4a1a7ebc7dbfa3da|31|1 AckFrame[4-3|Δ0] 91.509 Cwnd(-): 6000; inflight: 0 91.509 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 91.509 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 109 millis, based on 91.619/App, because ackElicitingInFlight | RTT:33/13 91.509 -> Packet A|5|S0|5729d9c639baa4de1f8794a364e13284b0d42f2e|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 91.540 <- (4) Packet A|5|S0|4a1a7ebc7dbfa3da|31|1 AckFrame[5-3|Δ0] 91.541 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 92.459 <- (5) Packet A|6|S0|4a1a7ebc7dbfa3da|1063|2 AckFrame[5-3|Δ918] StreamFrame[0(CIB),0,1024,fin] 92.460 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 92.460 Finished downloading https://server4:443/huhslxvfmz at 14:09.130 on ClientConnection[10bd83024e7ef2f0/4a1a7ebc7dbfa3da(V1) with server4/193.167.100.100:443] 92.460 Closing ClientConnection[10bd83024e7ef2f0/4a1a7ebc7dbfa3da(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 92.461 -> Packet A|6|S0|5729d9c639baa4de1f8794a364e13284b0d42f2e|47|2 ConnectionCloseFrame[0|0|] AckFrame[6-4|Δ0] 92.461 Creating connection with server4:443 with v1 92.461 Setting up connection for downloading https://server4:443/nxenrpmixb at 14:09.131 on ClientConnection[e996c08305a66353/97a41f1986b1ec71(V1) with server4/193.167.100.100:443] 92.461 Original destination connection id: e996c08305a66353 (scid: 97a41f1986b1ec71) >- CryptoStream[I|ClientHello] 92.462 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 92.662/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 92.462 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 92.496 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 92.496 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 92.696/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 92.496 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 92.498 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 92.595/Handshake, because peerAwaitingAddressValidation | RTT:33/16 92.498 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 92.500 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 92.597/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 92.500 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 92.500 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 92.597/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 92.500 Starting downloading https://server4:443/nxenrpmixb at 14:09.170 on ClientConnection[e996c08305a66353/97a41f1986b1ec71(V1) with server4/193.167.100.100:443] 92.500 Discarding pn space Initial because first Handshake message is being sent 92.500 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 92.501 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 92.598/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 92.501 -> Packet A|0|S0|6dfab7aed1a650072b13328f4b9700679440dace|59|1 StreamFrame[0(CIB),0,17,fin] 92.531 <- (2) Packet A|2|S0|97a41f1986b1ec71|467|3 NewConnectionIdFrame[1,<0|d46d9a1ebd9628129560491f6ea1d66c5d9e435e|c347341f9b4a0183126624c0bff8e76e] HandshakeDoneFrame[] CryptoFrame[0,396] 92.532 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 92.597/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 92.623/App, because ackElicitingInFlight | RTT:33/16 92.532 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 92.551 -> Packet A|1|S0|6dfab7aed1a650072b13328f4b9700679440dace|44|1 AckFrame[2|Δ19] 92.622 loss detection timeout handler running Sending probe 0, because no ack since 92.501. Current RTT: 33/16. 92.622 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 92.866/App, because ackElicitingInFlight | RTT:33/16 92.622 -> Packet PA|2|S0|6dfab7aed1a650072b13328f4b9700679440dace|59|1 StreamFrame[0(CIB),0,17,fin] 92.654 <- (3) Packet A|3|S0|97a41f1986b1ec71|1060|2 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024,fin] 92.655 Cwnd(-): 6000; inflight: 0 92.655 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 92.655 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 105 millis, based on 92.761/App, because ackElicitingInFlight | RTT:33/12 92.655 -> Packet A|3|S0|6dfab7aed1a650072b13328f4b9700679440dace|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 92.655 Finished downloading https://server4:443/nxenrpmixb at 14:09.325 on ClientConnection[e996c08305a66353/97a41f1986b1ec71(V1) with server4/193.167.100.100:443] 92.656 Closing ClientConnection[e996c08305a66353/97a41f1986b1ec71(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 92.656 -> Packet A|4|S0|6dfab7aed1a650072b13328f4b9700679440dace|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 92.656 Creating connection with server4:443 with v1 92.657 Setting up connection for downloading https://server4:443/ymmwbkfvtm at 14:09.327 on ClientConnection[79a74d801520ba3c/bda2f57f92f8d5df(V1) with server4/193.167.100.100:443] 92.657 Original destination connection id: 79a74d801520ba3c (scid: bda2f57f92f8d5df) >- CryptoStream[I|ClientHello] 92.658 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 92.858/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 92.658 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 92.686 <- (4) Packet A|4|S0|97a41f1986b1ec71|31|1 AckFrame[3-2|Δ0] 92.686 -> Packet A|5|S0|6dfab7aed1a650072b13328f4b9700679440dace|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 92.691 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 92.691 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 92.891/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 92.691 <- (1) Packet H|1|L|755|1 CryptoFrame[0,697] 92.693 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 92.790/Handshake, because peerAwaitingAddressValidation | RTT:33/16 92.693 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 92.695 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 92.792/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 92.695 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 92.696 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 92.793/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 92.696 Starting downloading https://server4:443/ymmwbkfvtm at 14:09.366 on ClientConnection[79a74d801520ba3c/bda2f57f92f8d5df(V1) with server4/193.167.100.100:443] 92.696 Discarding pn space Initial because first Handshake message is being sent 92.696 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 92.696 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 92.793/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 92.696 -> Packet A|0|S0|3d8d3f7a03490b1fa368ad48df5d87da5b2af778|59|1 StreamFrame[0(CIB),0,17,fin] 92.792 loss detection timeout handler running Sending probe 0, because no ack since 92.695. Current RTT: 33/16. 92.792 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 92.792 (Probe is a handshake retransmit) 92.793 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 92.987/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 92.792 -> Packet PH|2|L|92|1 CryptoFrame[0,36] 92.986 loss detection timeout handler running Sending probe 1, because no ack since 92.696. Current RTT: 33/16. 92.986 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 92.986 (Probe is a handshake retransmit) 92.986 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 93.374/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 92.986 -> Packet PH|3|L|92|1 CryptoFrame[0,36] 92.987 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 93.375/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 92.987 -> Packet PH|4|L|92|1 CryptoFrame[0,36] 93.017 <- (2) Packet A|2|S0|bda2f57f92f8d5df|467|3 NewConnectionIdFrame[1,<0|18018fbdfdd5d82b59a2d0d62f549a5e706f9e64|deb41d2a6dab2cf4842d4bb6fbb9ba74] HandshakeDoneFrame[] CryptoFrame[0,396] 93.018 State is set to Confirmed reschedule loss detection timer for PTO over 166 millis, based on 93.184/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -199 millis, based on 92.818/App, because ackElicitingInFlight | RTT:33/16 93.018 Discarding pn space Handshake because HandshakeDone is received 93.018 loss detection timeout handler running Sending probe 0, because no ack since 92.696. Current RTT: 33/16. 93.018 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 93.262/App, because ackElicitingInFlight | RTT:33/16 93.018 -> Packet PA|1|S0|3d8d3f7a03490b1fa368ad48df5d87da5b2af778|59|1 StreamFrame[0(CIB),0,17,fin] 93.037 -> Packet A|2|S0|3d8d3f7a03490b1fa368ad48df5d87da5b2af778|44|1 AckFrame[2|Δ19] 93.050 <- (3) Packet A|3|S0|bda2f57f92f8d5df|1060|2 AckFrame[1|Δ0] StreamFrame[0(CIB),0,1024,fin] 93.050 Cwnd(-): 6000; inflight: 0 93.050 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 93.050 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 93.160/App, because ackElicitingInFlight | RTT:33/13 93.050 -> Packet A|3|S0|3d8d3f7a03490b1fa368ad48df5d87da5b2af778|64|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 93.051 Finished downloading https://server4:443/ymmwbkfvtm at 14:09.720 on ClientConnection[79a74d801520ba3c/bda2f57f92f8d5df(V1) with server4/193.167.100.100:443] 93.051 Closing ClientConnection[79a74d801520ba3c/bda2f57f92f8d5df(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 93.051 -> Packet A|4|S0|3d8d3f7a03490b1fa368ad48df5d87da5b2af778|47|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 93.051 Creating connection with server4:443 with v1 93.052 Setting up connection for downloading https://server4:443/ibyroyyhft at 14:09.722 on ClientConnection[0ec4b0a0b4d4debb/a56aab35d9fc3c42(V1) with server4/193.167.100.100:443] 93.052 Original destination connection id: 0ec4b0a0b4d4debb (scid: a56aab35d9fc3c42) >- CryptoStream[I|ClientHello] 93.053 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 93.253/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 93.053 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 93.086 <- (1) Packet I|0|L|187|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 93.087 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 93.287/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 93.086 <- (1) Packet H|1|L|756|1 CryptoFrame[0,698] 93.089 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 93.186/Handshake, because peerAwaitingAddressValidation | RTT:33/16 93.089 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1141) >- CryptoStream[H|Finished] 93.091 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 93.188/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 93.091 -> Packet H|0|L|92|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 93.091 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 93.188/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 93.092 Starting downloading https://server4:443/ibyroyyhft at 14:09.761 on ClientConnection[0ec4b0a0b4d4debb/a56aab35d9fc3c42(V1) with server4/193.167.100.100:443] 93.092 Discarding pn space Initial because first Handshake message is being sent 93.091 -> Packet H|1|L|58|1 AckFrame[1|Δ0] 93.092 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 93.189/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 93.092 -> Packet A|0|S0|1471f7d11780d4490708ccd72ca43af87730db5a|59|1 StreamFrame[0(CIB),0,17,fin] 93.123 <- (2) Packet A|3|S0|a56aab35d9fc3c42|1060|2 AckFrame[0|Δ0] StreamFrame[0(CIB),0,1024,fin] 93.124 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 93.221/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 93.124 Finished downloading https://server4:443/ibyroyyhft at 14:09.794 on ClientConnection[0ec4b0a0b4d4debb/a56aab35d9fc3c42(V1) with server4/193.167.100.100:443] 93.124 Closing ClientConnection[0ec4b0a0b4d4debb/a56aab35d9fc3c42(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 93.125 -> Packet A|1|S0|1471f7d11780d4490708ccd72ca43af87730db5a|47|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0]