0.000 Creating connection with server4:443 with v1 0.088 Setting up connection for downloading https://server4:443/qtntchsmbf at 53:50.309 on ClientConnection[b7ab98eb862f65f9/cbd1a93ba89e2684(V1) with server4/193.167.100.100:443] 0.090 Original destination connection id: b7ab98eb862f65f9 (scid: cbd1a93ba89e2684) >- CryptoStream[I|ClientHello] 0.285 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.486/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.280 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.319 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.337 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.537/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.319 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 0.367 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.481/Handshake, because peerAwaitingAddressValidation | RTT:38/19 0.364 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 0.369 - unknown transport parameter 0x00b6, size 0 0.370 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 0.370 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 0.398 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.512/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.398 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.402 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 0.403 Starting downloading https://server4:443/qtntchsmbf at 53:50.640 on ClientConnection[b7ab98eb862f65f9/cbd1a93ba89e2684(V1) with server4/193.167.100.100:443] 0.408 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.523/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.409 Discarding pn space Initial because first Handshake message is being sent 0.319 <- (2) Packet A|0|S0|cbd1a93ba89e2684|54|1 NewConnectionIdFrame[1,<0|0366584c4b381cb4|10084e2955eb9edcc2f0688ac032a2a6] 0.432 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 113 millis, based on 0.546/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.432 -> Packet A|0|S0|36397ca80b6468c2|53|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ9] 0.546 loss detection timeout handler running Sending probe 0, because no ack since 0.398. Current RTT: 38/19. 0.547 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.548 (Probe is a handshake retransmit) 0.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 227 millis, based on 0.777/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.549 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 0.777 loss detection timeout handler running Sending probe 1, because no ack since 0.432. Current RTT: 38/19. 0.777 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.777 (Probe is a handshake retransmit) 0.778 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 1.234/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.778 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 0.779 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 455 millis, based on 1.235/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/19 0.779 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 0.844 <- (3) Packet A|2|S0|cbd1a93ba89e2684|54|1 NewConnectionIdFrame[1,<0|0366584c4b381cb4|10084e2955eb9edcc2f0688ac032a2a6] 0.844 <- (4) Packet A|3|S0|cbd1a93ba89e2684|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 0.846 State is set to Confirmed reschedule loss detection timer for PTO over 141 millis, based on 0.988/App, because ackElicitingInFlight | RTT:38/19 reschedule loss detection timer for PTO over -275 millis, based on 0.571/App, because ackElicitingInFlight | RTT:38/19 0.847 loss detection timeout handler running 0.847 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 0.432. Current RTT: 38/19. 0.847 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 277 millis, based on 1.126/App, because ackElicitingInFlight | RTT:38/19 -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 0.848 -> Packet PA|1|S0|36397ca80b6468c2|47|1 StreamFrame[0(CIB),0,17,fin] 0.849 -> Packet A|2|S0|36397ca80b6468c2|34|1 AckFrame[3-2,0|Δ3] 0.880 <- (5) Packet A|5|S0|cbd1a93ba89e2684|31|1 StreamFrame[0(CIB),1024,0,fin] 0.901 -> Packet A|3|S0|36397ca80b6468c2|36|1 AckFrame[5,3-2,0|Δ19] 0.966 <- (6) Packet A|7|S0|cbd1a93ba89e2684|1054|1 StreamFrame[0(CIB),0,1024,fin] 0.968 Finished downloading https://server4:443/qtntchsmbf at 53:51.206 on ClientConnection[b7ab98eb862f65f9/cbd1a93ba89e2684(V1) with server4/193.167.100.100:443] 0.970 Closing ClientConnection[b7ab98eb862f65f9/cbd1a93ba89e2684(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.972 Creating connection with server4:443 with v1 0.973 Setting up connection for downloading https://server4:443/wpizflurdg at 53:51.211 on ClientConnection[9155bb5a41a5674d/d3522d04b5e271b6(V1) with server4/193.167.100.100:443] 0.973 Original destination connection id: 9155bb5a41a5674d (scid: d3522d04b5e271b6) >- CryptoStream[I|ClientHello] 0.977 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.177/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.976 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.972 -> Packet A|4|S0|36397ca80b6468c2|42|2 ConnectionCloseFrame[0|0|] AckFrame[7,5,3-2,0|Δ5] 1.010 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 1.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.211/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 1.010 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 1.017 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.114/Handshake, because peerAwaitingAddressValidation | RTT:33/16 1.017 - unknown transport parameter 0x00b6, size 0 1.017 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 1.018 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 1.018 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 1.021 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.119/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.021 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.022 Starting downloading https://server4:443/wpizflurdg at 53:51.260 on ClientConnection[9155bb5a41a5674d/d3522d04b5e271b6(V1) with server4/193.167.100.100:443] 1.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.119/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.022 Discarding pn space Initial because first Handshake message is being sent 1.010 <- (2) Packet A|0|S0|d3522d04b5e271b6|54|1 NewConnectionIdFrame[1,<0|08fa3b2d89f9d816|90910dc019fe5e52df5badcd0dc762eb] 1.023 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.120/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.023 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|955910624fe46e2a|47|1 StreamFrame[0(CIB),0,17,fin]] 1.044 -> Packet A|1|S0|955910624fe46e2a|32|1 AckFrame[0|Δ20] 1.052 <- (3) Packet A|1|S0|d3522d04b5e271b6|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 1.053 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 1.118/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 1.145/App, because ackElicitingInFlight | RTT:33/16 1.053 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 1.055 <- (4) Packet A|2|S0|d3522d04b5e271b6|1054|1 StreamFrame[0(CIB),0,1024] 1.055 <- (5) Packet A|3|S0|d3522d04b5e271b6|31|1 StreamFrame[0(CIB),1024,0,fin] 1.056 -> Packet A|2|S0|955910624fe46e2a|32|1 AckFrame[2-0|Δ1] 1.056 Finished downloading https://server4:443/wpizflurdg at 53:51.294 on ClientConnection[9155bb5a41a5674d/d3522d04b5e271b6(V1) with server4/193.167.100.100:443] 1.057 Closing ClientConnection[9155bb5a41a5674d/d3522d04b5e271b6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.057 -> Packet A|3|S0|955910624fe46e2a|36|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ1] 1.057 Creating connection with server4:443 with v1 1.058 Setting up connection for downloading https://server4:443/xxvnsceofc at 53:51.296 on ClientConnection[1e654772d4a9d166/3f997e0c9caec309(V1) with server4/193.167.100.100:443] 1.058 Original destination connection id: 1e654772d4a9d166 (scid: 3f997e0c9caec309) >- CryptoStream[I|ClientHello] 1.062 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.262/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.061 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.080 <- (6) Packet A|4|S0|d3522d04b5e271b6|32|1 AckFrame[0|Δ26] 1.082 -> Packet A|4|S0|955910624fe46e2a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 1.096 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 1.188 <- (7) Packet A|6|S0|d3522d04b5e271b6|30|2 PingFrame[] Padding(3) 1.189 -> Packet A|5|S0|955910624fe46e2a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 1.213 <- (7) Packet A|8|S0|cbd1a93ba89e2684|30|2 PingFrame[] Padding(3) 1.213 <- (8) Packet A|9|S0|cbd1a93ba89e2684|30|2 PingFrame[] Padding(3) 1.214 -> Packet A|5|S0|36397ca80b6468c2|41|2 ConnectionCloseFrame[0|0|] AckFrame[7,5,3-2,0|Δ0] 1.214 -> Packet A|6|S0|36397ca80b6468c2|41|2 ConnectionCloseFrame[0|0|] AckFrame[7,5,3-2,0|Δ0] 1.220 <- (8) Packet A|8|S0|d3522d04b5e271b6|39|2 AckFrame[5,2,0|Δ0] ConnectionCloseFrame[0|0|] 1.244 <- (9) Packet A|10|S0|cbd1a93ba89e2684|37|2 AckFrame[5,3-1|Δ0] ConnectionCloseFrame[0|0|] 1.261 loss detection timeout handler running Sending probe 0, because no ack since 1.061. Current RTT: 100/25. 1.261 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.261 (Probe is an initial retransmit) 1.262 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.662/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.262 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.294 <- (2) Packet I|1|L|48|1 Token=[] AckFrame[1-0|Δ0] 1.295 probe count not reset on ack because handshake not yet confirmed 1.295 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.695/Initial, because peerAwaitingAddressValidation | RTT:100/25 1.395 <- (3) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 1.401 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 1.492/Handshake, because peerAwaitingAddressValidation | RTT:31/15 1.401 Discarding pn space Initial because first Handshake message is being sent 1.401 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.402 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 1.493/Handshake, because peerAwaitingAddressValidation | RTT:31/15 1.402 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 1.492 loss detection timeout handler running 1.492 Sending probe 0. Current RTT: 31/15. 1.492 Sending probe because peer awaiting address validation 1.492 (Probe is a handshake ping) 1.493 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 1.676/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 1.493 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 1.524 <- (5) Packet H|1|L|47|1 AckFrame[0|Δ0] 1.525 probe count not reset on ack because handshake not yet confirmed 1.525 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.696 <- (6) Packet H|3|L|771|1 CryptoFrame[0,725] 1.697 - unknown transport parameter 0x00b6, size 0 1.697 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 1.697 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 157 millis, based on 1.858/Handshake, because ackElicitingInFlight | RTT:31/12 1.700 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.701 Starting downloading https://server4:443/xxvnsceofc at 53:51.939 on ClientConnection[1e654772d4a9d166/3f997e0c9caec309(V1) with server4/193.167.100.100:443] 1.702 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 155 millis, based on 1.858/Handshake, because ackElicitingInFlight | RTT:31/12 1.702 -> [Packet H|2|L|48|1 AckFrame[3,1|Δ0], Packet A|0|S0|a560c072117961a1|47|1 StreamFrame[0(CIB),0,17,fin]] 1.858 loss detection timeout handler running Sending probe 1, because no ack since 1.700. Current RTT: 31/12. 1.858 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 1.858 (Probe is a handshake retransmit) 1.859 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 315 millis, based on 2.175/Handshake, because ackElicitingInFlight | RTT:31/12 1.859 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 1.860 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 315 millis, based on 2.176/Handshake, because ackElicitingInFlight | RTT:31/12 1.860 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 2.031 <- (7) Packet A|2|S0|3f997e0c9caec309|54|1 NewConnectionIdFrame[1,<0|25896b75236cc998|f28087bf2e93c5c4e053064f28c671c3] 2.031 <- (8) Packet A|3|S0|3f997e0c9caec309|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 2.033 State is set to Confirmed reschedule loss detection timer for PTO over 85 millis, based on 2.118/App, because ackElicitingInFlight | RTT:31/12 reschedule loss detection timer for PTO over -226 millis, based on 1.806/App, because ackElicitingInFlight | RTT:31/12 2.033 loss detection timeout handler running 2.033 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 1.702. Current RTT: 31/12. 2.033 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 207 millis, based on 2.242/App, because ackElicitingInFlight | RTT:31/12 2.034 -> Packet PA|1|S0|a560c072117961a1|47|1 StreamFrame[0(CIB),0,17,fin] 2.034 -> Packet A|2|S0|a560c072117961a1|32|1 AckFrame[3-2|Δ1] 2.066 <- (9) Packet A|4|S0|3f997e0c9caec309|1054|1 StreamFrame[0(CIB),0,1024] 2.087 -> Packet A|3|S0|a560c072117961a1|32|1 AckFrame[4-2|Δ19] 2.203 <- (10) Packet A|7|S0|3f997e0c9caec309|30|2 PingFrame[] Padding(3) 2.203 <- (11) Packet A|8|S0|3f997e0c9caec309|30|2 PingFrame[] Padding(3) 2.204 -> Packet A|4|S0|a560c072117961a1|33|1 AckFrame[8-7,4-2|Δ0] 2.241 loss detection timeout handler running Sending probe 1, because no ack since 2.034. Current RTT: 31/12. 2.241 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 415 millis, based on 2.658/App, because ackElicitingInFlight | RTT:31/12 2.242 -> Packet PA|5|S0|a560c072117961a1|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 415 millis, based on 2.659/App, because ackElicitingInFlight | RTT:31/12 2.243 -> Packet PA|6|S0|a560c072117961a1|47|1 StreamFrame[0(CIB),0,17,fin] 2.273 <- (12) Packet A|9|S0|3f997e0c9caec309|35|1 AckFrame[5,3,1|Δ0] 2.276 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 103 millis, based on 2.380/App, because ackElicitingInFlight | RTT:31/12 2.276 -> Packet A|7|S0|a560c072117961a1|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8-7|Δ0] 2.277 Cwnd(-): 6000; inflight: 99 reschedule loss detection timer for PTO over 103 millis, based on 2.380/App, because ackElicitingInFlight | RTT:31/12 2.380 loss detection timeout handler running Sending probe 0, because no ack since 2.276. Current RTT: 31/9. 2.381 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 183 millis, based on 2.565/App, because ackElicitingInFlight | RTT:31/9 2.381 -> Packet PA|8|S0|a560c072117961a1|47|1 StreamFrame[0(CIB),0,17,fin] 2.478 <- (13) Packet A|10|S0|3f997e0c9caec309|30|2 PingFrame[] Padding(3) 2.499 -> Packet A|9|S0|a560c072117961a1|32|1 AckFrame[10-7|Δ19] 2.529 <- (14) Packet A|12|S0|3f997e0c9caec309|31|1 StreamFrame[0(CIB),1024,0,fin] 2.531 Finished downloading https://server4:443/xxvnsceofc at 53:52.768 on ClientConnection[1e654772d4a9d166/3f997e0c9caec309(V1) with server4/193.167.100.100:443] 2.531 Closing ClientConnection[1e654772d4a9d166/3f997e0c9caec309(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.531 Creating connection with server4:443 with v1 2.531 -> Packet A|10|S0|a560c072117961a1|37|2 ConnectionCloseFrame[0|0|] AckFrame[12,10-7|Δ0] 2.532 Setting up connection for downloading https://server4:443/surydlnbwz at 53:52.770 on ClientConnection[ce4218d5c7b9d4f1/64c5b0b4afa20fb8(V1) with server4/193.167.100.100:443] 2.532 Original destination connection id: ce4218d5c7b9d4f1 (scid: 64c5b0b4afa20fb8) >- CryptoStream[I|ClientHello] 2.535 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.735/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.535 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.562 <- (15) Packet A|13|S0|3f997e0c9caec309|35|2 AckFrame[10-9|Δ0] ConnectionCloseFrame[0|0|] 2.734 loss detection timeout handler running Sending probe 0, because no ack since 2.535. Current RTT: 100/25. 2.734 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.735 (Probe is an initial retransmit) 2.735 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.135/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.735 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.769 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 3.071 <- (2) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 3.075 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.275/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.075 Discarding pn space Initial because first Handshake message is being sent 3.076 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.276/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.075 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 3.275 loss detection timeout handler running 3.275 Sending probe 0. Current RTT: 100/25. 3.275 Sending probe because peer awaiting address validation 3.275 (Probe is a handshake ping) 3.276 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.676/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.276 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 3.298 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.299 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.676 loss detection timeout handler running Sending probe 1, because no ack since 3.276. Current RTT: 100/25. 3.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.676 (Probe is a handshake ping) 3.677 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 4.477/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.676 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 3.678 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 4.478/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.677 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 3.708 <- (5) Packet H|3|L|777|2 AckFrame[1|Δ0] CryptoFrame[0,726] 3.709 probe count not reset on ack because handshake not yet confirmed 3.709 Cwnd(-): 6000; inflight: 44 reschedule loss detection timer for PTO over 767 millis, based on 4.477/Handshake, because ackElicitingInFlight | RTT:100/25 3.710 - unknown transport parameter 0x00b6, size 0 3.710 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 3.710 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 363 millis, based on 4.077/Handshake, because ackElicitingInFlight | RTT:31/15 3.713 -> Packet H|3|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.715 Starting downloading https://server4:443/surydlnbwz at 53:53.952 on ClientConnection[ce4218d5c7b9d4f1/64c5b0b4afa20fb8(V1) with server4/193.167.100.100:443] 3.709 <- (6) Packet H|4|L|772|1 CryptoFrame[0,726] 3.715 -> Packet H|4|L|46|1 AckFrame[3|Δ0] 3.716 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 361 millis, based on 4.077/Handshake, because ackElicitingInFlight | RTT:31/15 3.716 -> Packet A|0|S0|4c6132a1e4757dab|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.717 -> Packet H|5|L|46|1 AckFrame[4-3|Δ0] 3.748 <- (7) Packet A|4|S0|64c5b0b4afa20fb8|31|1 StreamFrame[0(CIB),1024,0,fin] 3.769 -> Packet A|1|S0|4c6132a1e4757dab|32|1 AckFrame[4|Δ19] 3.773 <- (8) Packet A|5|S0|64c5b0b4afa20fb8|32|1 AckFrame[0|Δ25] reschedule loss detection timer for PTO over 30 millis, based on 3.804/Handshake, because ackElicitingInFlight | RTT:31/15 3.804 loss detection timeout handler running Sending probe 0, because no ack since 3.713. Current RTT: 31/12. 3.804 (Probe is a handshake retransmit) reschedule loss detection timer for PTO over 157 millis, based on 3.963/Handshake, because ackElicitingInFlight | RTT:31/12 3.805 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 3.962 loss detection timeout handler running Sending probe 1, because no ack since 3.716. Current RTT: 31/12. 3.963 (Probe is a handshake retransmit) reschedule loss detection timer for PTO over 315 millis, based on 4.279/Handshake, because ackElicitingInFlight | RTT:31/12 3.963 -> Packet PH|7|L|80|1 CryptoFrame[0,36] reschedule loss detection timer for PTO over 315 millis, based on 4.280/Handshake, because ackElicitingInFlight | RTT:31/12 3.964 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 4.279 loss detection timeout handler running Sending probe 2, because no ack since 3.716. Current RTT: 31/12. 4.280 (Probe is a handshake retransmit) reschedule loss detection timer for PTO over 631 millis, based on 4.912/Handshake, because ackElicitingInFlight | RTT:31/12 4.280 -> Packet PH|9|L|80|1 CryptoFrame[0,36] reschedule loss detection timer for PTO over 631 millis, based on 4.913/Handshake, because ackElicitingInFlight | RTT:31/12 4.281 -> Packet PH|10|L|80|1 CryptoFrame[0,36] 4.855 <- (9) Packet A|6|S0|64c5b0b4afa20fb8|54|1 NewConnectionIdFrame[1,<0|8c4638b4dd6ad013|faab87a32bd44ad0408acc2be98924a6] 4.875 -> Packet A|2|S0|4c6132a1e4757dab|32|1 AckFrame[6-4|Δ19] 4.907 <- (10) Packet A|8|S0|64c5b0b4afa20fb8|1054|1 StreamFrame[0(CIB),0,1024,fin] 4.908 Finished downloading https://server4:443/surydlnbwz at 53:55.146 on ClientConnection[ce4218d5c7b9d4f1/64c5b0b4afa20fb8(V1) with server4/193.167.100.100:443] 4.909 Closing ClientConnection[ce4218d5c7b9d4f1/64c5b0b4afa20fb8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.909 -> Packet A|3|S0|4c6132a1e4757dab|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-4|Δ0] 4.909 Creating connection with server4:443 with v1 4.910 Setting up connection for downloading https://server4:443/gwsgjxxcwd at 53:55.148 on ClientConnection[2503941c7e661e33/96398dd2d01d9835(V1) with server4/193.167.100.100:443] 4.910 Original destination connection id: 2503941c7e661e33 (scid: 96398dd2d01d9835) >- CryptoStream[I|ClientHello] 4.913 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.113/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.912 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.940 <- (11) Packet A|9|S0|64c5b0b4afa20fb8|35|2 AckFrame[3-2|Δ0] ConnectionCloseFrame[0|0|] 5.112 loss detection timeout handler running Sending probe 0, because no ack since 4.912. Current RTT: 100/25. 5.112 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.112 (Probe is an initial retransmit) 5.113 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.513/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.113 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.512 loss detection timeout handler running Sending probe 1, because no ack since 5.113. Current RTT: 100/25. 5.512 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.512 (Probe is an initial retransmit) 5.513 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.313/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.513 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.514 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.314/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.514 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.849 <- (1) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 5.853 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.053/Handshake, because peerAwaitingAddressValidation | RTT:100/25 5.853 Discarding pn space Initial because first Handshake message is being sent 5.854 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.054/Handshake, because peerAwaitingAddressValidation | RTT:100/25 5.853 -> Packet I|4|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 6.053 loss detection timeout handler running 6.053 Sending probe 0. Current RTT: 100/25. 6.053 Sending probe because peer awaiting address validation 6.053 (Probe is a handshake ping) 6.054 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.454/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.054 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 6.085 <- (2) Packet H|1|L|47|1 AckFrame[0|Δ0] 6.086 probe count not reset on ack because handshake not yet confirmed 6.086 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.148 <- (3) Packet H|2|L|772|1 CryptoFrame[0,726] 6.149 - unknown transport parameter 0x00b6, size 0 6.149 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 6.150 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 181 millis, based on 6.334/Handshake, because ackElicitingInFlight | RTT:31/15 6.152 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.153 Starting downloading https://server4:443/gwsgjxxcwd at 53:56.391 on ClientConnection[2503941c7e661e33/96398dd2d01d9835(V1) with server4/193.167.100.100:443] 6.149 <- (4) Packet H|3|L|772|1 CryptoFrame[0,726] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.154 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 179 millis, based on 6.334/Handshake, because ackElicitingInFlight | RTT:31/15 6.154 -> [Packet H|2|L|46|1 AckFrame[3-1|Δ0], Packet A|0|S0|867e129af2da747f|47|1 StreamFrame[0(CIB),0,17,fin]] 6.184 <- (5) Packet A|1|S0|96398dd2d01d9835|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 6.185 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 6.334/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 85 millis, based on 6.270/App, because ackElicitingInFlight | RTT:31/15 6.185 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 6.186 <- (6) Packet A|2|S0|96398dd2d01d9835|1054|1 StreamFrame[0(CIB),0,1024] 6.186 <- (7) Packet A|3|S0|96398dd2d01d9835|31|1 StreamFrame[0(CIB),1024,0,fin] 6.187 -> Packet A|1|S0|867e129af2da747f|32|1 AckFrame[2-1|Δ1] 6.187 Finished downloading https://server4:443/gwsgjxxcwd at 53:56.425 on ClientConnection[2503941c7e661e33/96398dd2d01d9835(V1) with server4/193.167.100.100:443] 6.187 Closing ClientConnection[2503941c7e661e33/96398dd2d01d9835(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.188 -> Packet A|2|S0|867e129af2da747f|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 6.189 Creating connection with server4:443 with v1 6.189 Setting up connection for downloading https://server4:443/uljbwgleja at 53:56.427 on ClientConnection[5a56590e58794a2e/24b0579cfaebfcd1(V1) with server4/193.167.100.100:443] 6.189 Original destination connection id: 5a56590e58794a2e (scid: 24b0579cfaebfcd1) >- CryptoStream[I|ClientHello] 6.191 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.391/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.191 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.211 <- (8) Packet A|4|S0|96398dd2d01d9835|32|1 AckFrame[0|Δ26] 6.212 -> Packet A|3|S0|867e129af2da747f|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 6.219 <- (9) Packet A|6|S0|96398dd2d01d9835|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 6.390 loss detection timeout handler running Sending probe 0, because no ack since 6.191. Current RTT: 100/25. 6.391 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.391 (Probe is an initial retransmit) 6.391 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.791/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.391 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.791 loss detection timeout handler running Sending probe 1, because no ack since 6.391. Current RTT: 100/25. 6.791 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.791 (Probe is an initial retransmit) 6.791 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.592/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.791 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.792 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.592/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.792 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.826 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 7.126 <- (2) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 7.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.331/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.131 Discarding pn space Initial because first Handshake message is being sent 7.131 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.331/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.131 -> Packet I|4|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 7.164 <- (4) Packet H|2|L|773|1 CryptoFrame[0,727] 7.165 - unknown transport parameter 0x00b6, size 0 7.166 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 7.166 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 7.169 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.369/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.169 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.170 Starting downloading https://server4:443/uljbwgleja at 53:57.407 on ClientConnection[5a56590e58794a2e/24b0579cfaebfcd1(V1) with server4/193.167.100.100:443] 7.171 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.371/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.171 -> [Packet H|1|L|46|1 AckFrame[2|Δ0], Packet A|0|S0|b1ec3aa915446bf4|47|1 StreamFrame[0(CIB),0,17,fin]] 7.202 <- (5) Packet A|2|S0|24b0579cfaebfcd1|1054|1 StreamFrame[0(CIB),0,1024] 7.202 <- (6) Packet A|3|S0|24b0579cfaebfcd1|31|1 StreamFrame[0(CIB),1024,0,fin] 7.204 Finished downloading https://server4:443/uljbwgleja at 53:57.442 on ClientConnection[5a56590e58794a2e/24b0579cfaebfcd1(V1) with server4/193.167.100.100:443] 7.204 Closing ClientConnection[5a56590e58794a2e/24b0579cfaebfcd1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.204 -> Packet A|1|S0|b1ec3aa915446bf4|31|1 AckFrame[3-2|Δ0] 7.204 -> Packet A|2|S0|b1ec3aa915446bf4|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 7.205 Creating connection with server4:443 with v1 7.205 Setting up connection for downloading https://server4:443/oavklgsqqv at 53:57.443 on ClientConnection[8371881faa455890/ffebfc0b081f1dbb(V1) with server4/193.167.100.100:443] 7.206 Original destination connection id: 8371881faa455890 (scid: ffebfc0b081f1dbb) >- CryptoStream[I|ClientHello] 7.212 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.412/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.212 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.227 <- (7) Packet A|4|S0|24b0579cfaebfcd1|32|1 AckFrame[0|Δ25] 7.228 -> Packet A|3|S0|b1ec3aa915446bf4|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 7.235 <- (8) Packet A|5|S0|24b0579cfaebfcd1|54|1 NewConnectionIdFrame[1,<0|28ba15e89fcc6ec1|d382893ab069cf47dec2aa24613f55c5] 7.235 <- (9) Packet A|6|S0|24b0579cfaebfcd1|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 7.236 -> Packet A|4|S0|b1ec3aa915446bf4|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 7.411 loss detection timeout handler running Sending probe 0, because no ack since 7.212. Current RTT: 100/25. 7.411 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.412 (Probe is an initial retransmit) 7.412 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.812/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.412 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.812 loss detection timeout handler running Sending probe 1, because no ack since 7.412. Current RTT: 100/25. 7.812 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.812 (Probe is an initial retransmit) 7.813 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.613/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.812 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.813 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.613/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.813 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.846 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[3|Δ0] CryptoFrame[0,123] 7.847 probe count not reset on ack because handshake not yet confirmed 7.848 Retransmitting CryptoFrame[0,257] on level Initial 7.848 Cwnd(-): 6000; inflight: 1200 7.849 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 7.846 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,725] Padding(254) 7.852 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 7.853 - unknown transport parameter 0x00b6, size 0 7.853 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 7.853 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 7.856 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.857 Starting downloading https://server4:443/oavklgsqqv at 53:58.095 on ClientConnection[8371881faa455890/ffebfc0b081f1dbb(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 7.954/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.857 Discarding pn space Initial because first Handshake message is being sent 7.857 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 7.847 <- (2) Packet A|0|S0|ffebfc0b081f1dbb|54|1 NewConnectionIdFrame[1,<0|2efc290d666b1a83|a38b3ddbd75542a4813409bcd0cf0ad1] 7.858 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 7.955/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.858 -> Packet A|0|S0|1688d538a5de96d5|47|1 StreamFrame[0(CIB),0,17,fin] 7.877 -> Packet A|1|S0|1688d538a5de96d5|32|1 AckFrame[0|Δ19] 7.887 <- (3) Packet A|1|S0|ffebfc0b081f1dbb|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 7.888 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 7.953/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 7.980/App, because ackElicitingInFlight | RTT:33/16 7.888 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 7.889 <- (4) Packet A|2|S0|ffebfc0b081f1dbb|1054|1 StreamFrame[0(CIB),0,1024] 7.889 <- (5) Packet A|3|S0|ffebfc0b081f1dbb|31|1 StreamFrame[0(CIB),1024,0,fin] 7.890 -> Packet A|2|S0|1688d538a5de96d5|32|1 AckFrame[2-0|Δ1] 7.890 Finished downloading https://server4:443/oavklgsqqv at 53:58.128 on ClientConnection[8371881faa455890/ffebfc0b081f1dbb(V1) with server4/193.167.100.100:443] 7.890 Closing ClientConnection[8371881faa455890/ffebfc0b081f1dbb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.891 -> Packet A|3|S0|1688d538a5de96d5|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 7.891 Creating connection with server4:443 with v1 7.891 Setting up connection for downloading https://server4:443/xyuhufqirg at 53:58.129 on ClientConnection[d2c7374cbc4847c3/464e9c8ce0b4c01a(V1) with server4/193.167.100.100:443] 7.892 Original destination connection id: d2c7374cbc4847c3 (scid: 464e9c8ce0b4c01a) >- CryptoStream[I|ClientHello] 7.894 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.094/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.893 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.093 loss detection timeout handler running Sending probe 0, because no ack since 7.893. Current RTT: 100/25. 8.093 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.093 (Probe is an initial retransmit) 8.094 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.494/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.094 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.127 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 8.128 probe count not reset on ack because handshake not yet confirmed 8.128 Retransmitting CryptoFrame[0,257] on level Initial 8.128 Cwnd(-): 6000; inflight: 0 8.128 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 8.528/Initial, because peerAwaitingAddressValidation | RTT:100/25 8.128 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 8.322/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.128 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 8.127 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,725] Padding(254) 8.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.325/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.131 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 8.131 - unknown transport parameter 0x00b6, size 0 8.132 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 8.132 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 8.134 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 8.328/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.134 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.135 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.135 Starting downloading https://server4:443/xyuhufqirg at 53:58.372 on ClientConnection[d2c7374cbc4847c3/464e9c8ce0b4c01a(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 8.232/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.135 Discarding pn space Initial because first Handshake message is being sent 8.135 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 8.135 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.232/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.135 -> Packet A|0|S0|75cdca4a0623869a|47|1 StreamFrame[0(CIB),0,17,fin] 8.160 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.165 <- (3) Packet A|1|S0|464e9c8ce0b4c01a|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 8.166 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 8.231/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 8.257/App, because ackElicitingInFlight | RTT:33/16 8.166 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 8.167 <- (4) Packet A|2|S0|464e9c8ce0b4c01a|1054|1 StreamFrame[0(CIB),0,1024] 8.167 <- (5) Packet A|3|S0|464e9c8ce0b4c01a|31|1 StreamFrame[0(CIB),1024,0,fin] 8.168 -> Packet A|1|S0|75cdca4a0623869a|31|1 AckFrame[2-1|Δ0] 8.168 Finished downloading https://server4:443/xyuhufqirg at 53:58.406 on ClientConnection[d2c7374cbc4847c3/464e9c8ce0b4c01a(V1) with server4/193.167.100.100:443] 8.168 Closing ClientConnection[d2c7374cbc4847c3/464e9c8ce0b4c01a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.168 -> Packet A|2|S0|75cdca4a0623869a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 8.169 Creating connection with server4:443 with v1 8.169 Setting up connection for downloading https://server4:443/enyvhzjpem at 53:58.407 on ClientConnection[00d861a6c6552dfd/35425e5af7cad2f8(V1) with server4/193.167.100.100:443] 8.169 Original destination connection id: 00d861a6c6552dfd (scid: 35425e5af7cad2f8) >- CryptoStream[I|ClientHello] 8.171 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.371/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.171 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.192 <- (6) Packet A|4|S0|464e9c8ce0b4c01a|32|1 AckFrame[0|Δ26] 8.193 -> Packet A|3|S0|75cdca4a0623869a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 8.198 <- (7) Packet A|5|S0|464e9c8ce0b4c01a|54|1 NewConnectionIdFrame[1,<0|b8456307f45b843c|1345c60291a4c45034ec6e7723dcb1c9] 8.199 -> Packet A|4|S0|75cdca4a0623869a|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 8.199 <- (8) Packet A|6|S0|464e9c8ce0b4c01a|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 8.204 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.204 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.404/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.204 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 8.208 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 8.304/Handshake, because peerAwaitingAddressValidation | RTT:32/16 8.208 - unknown transport parameter 0x00b6, size 0 8.208 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 8.208 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 8.208 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 8.211 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 8.307/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 8.211 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.212 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 8.308/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 8.212 Discarding pn space Initial because first Handshake message is being sent 8.212 Starting downloading https://server4:443/enyvhzjpem at 53:58.450 on ClientConnection[00d861a6c6552dfd/35425e5af7cad2f8(V1) with server4/193.167.100.100:443] 8.212 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 8.213 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 8.309/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 8.213 -> Packet A|0|S0|6c592907d86f6411|47|1 StreamFrame[0(CIB),0,17,fin] 8.242 <- (2) Packet A|1|S0|35425e5af7cad2f8|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 8.243 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 8.307/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 8.334/App, because ackElicitingInFlight | RTT:32/16 8.244 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 8.263 -> Packet A|1|S0|6c592907d86f6411|32|1 AckFrame[1|Δ19] 8.294 <- (3) Packet A|5|S0|35425e5af7cad2f8|54|1 NewConnectionIdFrame[1,<0|68e3c3766e9da7ad|f3745b2e4af4813760f28938a75f1d99] 8.314 -> Packet A|2|S0|6c592907d86f6411|34|1 AckFrame[5,1|Δ19] 8.334 loss detection timeout handler running Sending probe 0, because no ack since 8.213. Current RTT: 32/16. 8.334 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 8.576/App, because ackElicitingInFlight | RTT:32/16 8.334 -> Packet PA|3|S0|6c592907d86f6411|47|1 StreamFrame[0(CIB),0,17,fin] 8.346 <- (4) Packet A|6|S0|35425e5af7cad2f8|1054|1 StreamFrame[0(CIB),0,1024,fin] 8.347 Finished downloading https://server4:443/enyvhzjpem at 53:58.584 on ClientConnection[00d861a6c6552dfd/35425e5af7cad2f8(V1) with server4/193.167.100.100:443] 8.347 Closing ClientConnection[00d861a6c6552dfd/35425e5af7cad2f8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.348 Creating connection with server4:443 with v1 8.347 -> Packet A|4|S0|6c592907d86f6411|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,1|Δ0] 8.348 Setting up connection for downloading https://server4:443/bdijulsbdw at 53:58.586 on ClientConnection[9746e85c1088c85d/338deea58fec4ba6(V1) with server4/193.167.100.100:443] 8.348 Original destination connection id: 9746e85c1088c85d (scid: 338deea58fec4ba6) >- CryptoStream[I|ClientHello] 8.350 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.550/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.350 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.379 <- (5) Packet A|7|S0|35425e5af7cad2f8|37|2 AckFrame[4,2-0|Δ0] ConnectionCloseFrame[0|0|] 8.383 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.384 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.584/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.383 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 8.387 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.387 - unknown transport parameter 0x00b6, size 0 reschedule loss detection timer for PTO over 96 millis, based on 8.484/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.387 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 8.387 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 8.387 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 8.390 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.487/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.390 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.391 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.391 Starting downloading https://server4:443/bdijulsbdw at 53:58.628 on ClientConnection[9746e85c1088c85d/338deea58fec4ba6(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 8.488/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.391 Discarding pn space Initial because first Handshake message is being sent 8.383 <- (2) Packet A|0|S0|338deea58fec4ba6|54|1 NewConnectionIdFrame[1,<0|1f0925b8366370d0|199c1024eddb1315e1ac838d33479703] 8.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.489/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.392 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|c17ff15604282195|47|1 StreamFrame[0(CIB),0,17,fin]] 8.411 -> Packet A|1|S0|c17ff15604282195|32|1 AckFrame[0|Δ19] 8.423 <- (3) Packet A|2|S0|338deea58fec4ba6|1054|1 StreamFrame[0(CIB),0,1024] 8.423 <- (4) Packet A|3|S0|338deea58fec4ba6|31|1 StreamFrame[0(CIB),1024,0,fin] 8.424 Finished downloading https://server4:443/bdijulsbdw at 53:58.662 on ClientConnection[9746e85c1088c85d/338deea58fec4ba6(V1) with server4/193.167.100.100:443] 8.425 Closing ClientConnection[9746e85c1088c85d/338deea58fec4ba6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.424 -> Packet A|2|S0|c17ff15604282195|33|1 AckFrame[3-2,0|Δ0] 8.425 -> Packet A|3|S0|c17ff15604282195|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 8.425 Creating connection with server4:443 with v1 8.426 Setting up connection for downloading https://server4:443/hfjdxtlyka at 53:58.664 on ClientConnection[9de3b9eca5ff5937/a24a751374324985(V1) with server4/193.167.100.100:443] 8.426 Original destination connection id: 9de3b9eca5ff5937 (scid: a24a751374324985) >- CryptoStream[I|ClientHello] 8.428 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.628/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.428 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.448 <- (5) Packet A|4|S0|338deea58fec4ba6|32|1 AckFrame[1-0|Δ6] 8.449 -> Packet A|4|S0|c17ff15604282195|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 8.461 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.462 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.663/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.461 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 8.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.563/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.466 - unknown transport parameter 0x00b6, size 0 8.466 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 8.466 - unknown transport parameter 0xff04de1b, size 2 8.466 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.470 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.470 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.567/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.470 Discarding pn space Initial because first Handshake message is being sent reschedule loss detection timer for PTO over 96 millis, based on 8.567/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.470 -> Packet H|0|L|80|1 CryptoFrame[0,36] 8.470 Starting downloading https://server4:443/hfjdxtlyka at 53:58.708 on ClientConnection[9de3b9eca5ff5937/a24a751374324985(V1) with server4/193.167.100.100:443] 8.470 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 8.471 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.568/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.471 -> Packet A|0|S0|8390fca5976e6faf|47|1 StreamFrame[0(CIB),0,17,fin] 8.501 <- (2) Packet A|1|S0|a24a751374324985|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 8.502 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 8.567/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 8.593/App, because ackElicitingInFlight | RTT:33/16 8.502 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 8.522 -> Packet A|1|S0|8390fca5976e6faf|32|1 AckFrame[1|Δ19] 8.553 <- (3) Packet A|2|S0|a24a751374324985|54|1 NewConnectionIdFrame[1,<0|4b492b80813d19a4|24ca62c3b0517a52b10ceb6bf368490c] 8.573 -> Packet A|2|S0|8390fca5976e6faf|32|1 AckFrame[2-1|Δ19] 8.592 loss detection timeout handler running Sending probe 0, because no ack since 8.471. Current RTT: 33/16. 8.592 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 8.836/App, because ackElicitingInFlight | RTT:33/16 8.592 -> Packet PA|3|S0|8390fca5976e6faf|47|1 StreamFrame[0(CIB),0,17,fin] 8.624 <- (4) Packet A|4|S0|a24a751374324985|1054|1 StreamFrame[0(CIB),0,1024] 8.624 <- (5) Packet A|6|S0|a24a751374324985|31|1 StreamFrame[0(CIB),1024,0,fin] 8.625 Finished downloading https://server4:443/hfjdxtlyka at 53:58.863 on ClientConnection[9de3b9eca5ff5937/a24a751374324985(V1) with server4/193.167.100.100:443] 8.625 Closing ClientConnection[9de3b9eca5ff5937/a24a751374324985(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.625 -> Packet A|4|S0|8390fca5976e6faf|35|1 AckFrame[6,4,2-1|Δ0] 8.626 -> Packet A|5|S0|8390fca5976e6faf|39|2 ConnectionCloseFrame[0|0|] AckFrame[6,4,2-1|Δ0] 8.627 Creating connection with server4:443 with v1 8.627 Setting up connection for downloading https://server4:443/xwpzhblcdw at 53:58.865 on ClientConnection[d56c4313d95c7f19/9fb75c4af91375f8(V1) with server4/193.167.100.100:443] 8.627 <- (6) Packet A|5|S0|338deea58fec4ba6|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 8.627 Original destination connection id: d56c4313d95c7f19 (scid: 9fb75c4af91375f8) 8.627 <- (7) Packet A|6|S0|338deea58fec4ba6|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 8.628 -> Packet A|5|S0|c17ff15604282195|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] >- CryptoStream[I|ClientHello] 8.629 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.829/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.629 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.658 <- (8) Packet A|7|S0|338deea58fec4ba6|37|2 AckFrame[5,1-0|Δ0] ConnectionCloseFrame[0|0|] 8.662 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 8.663 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.863/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.662 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 8.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.764/Handshake, because peerAwaitingAddressValidation | RTT:33/16 8.666 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 8.667 - unknown transport parameter 0x00b6, size 0 8.667 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 8.667 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 8.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.767/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.670 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.671 Starting downloading https://server4:443/xwpzhblcdw at 53:58.908 on ClientConnection[d56c4313d95c7f19/9fb75c4af91375f8(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 8.768/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.671 Discarding pn space Initial because first Handshake message is being sent 8.662 <- (2) Packet A|0|S0|9fb75c4af91375f8|54|1 NewConnectionIdFrame[1,<0|35975925696982f4|aa124fabc7e9ae6a235e171b9318c2d5] 8.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 8.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 8.671 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|1da80d276823aa91|47|1 StreamFrame[0(CIB),0,17,fin]] 8.691 -> Packet A|1|S0|1da80d276823aa91|32|1 AckFrame[0|Δ19] 8.701 <- (3) Packet A|1|S0|9fb75c4af91375f8|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 8.702 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 8.767/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 8.793/App, because ackElicitingInFlight | RTT:33/16 8.702 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 8.703 <- (4) Packet A|4|S0|9fb75c4af91375f8|31|1 StreamFrame[0(CIB),1024,0,fin] 8.704 -> Packet A|2|S0|1da80d276823aa91|34|1 AckFrame[4,1-0|Δ1] 8.728 <- (5) Packet A|5|S0|9fb75c4af91375f8|32|1 AckFrame[1-0|Δ6] 8.728 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.859 <- (6) Packet A|8|S0|9fb75c4af91375f8|30|2 PingFrame[] Padding(3) 8.879 -> Packet A|3|S0|1da80d276823aa91|36|1 AckFrame[8,5-4,1|Δ19] 8.911 <- (7) Packet A|9|S0|9fb75c4af91375f8|1054|1 StreamFrame[0(CIB),0,1024,fin] 8.912 Finished downloading https://server4:443/xwpzhblcdw at 53:59.149 on ClientConnection[d56c4313d95c7f19/9fb75c4af91375f8(V1) with server4/193.167.100.100:443] 8.912 Closing ClientConnection[d56c4313d95c7f19/9fb75c4af91375f8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.912 -> Packet A|4|S0|1da80d276823aa91|39|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,5-4,1|Δ0] 8.912 Creating connection with server4:443 with v1 8.913 Setting up connection for downloading https://server4:443/dywyrflvgp at 53:59.151 on ClientConnection[725e3d6383e8176a/d0502c450cb28c74(V1) with server4/193.167.100.100:443] 8.913 Original destination connection id: 725e3d6383e8176a (scid: d0502c450cb28c74) >- CryptoStream[I|ClientHello] 8.914 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.114/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.914 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.114 loss detection timeout handler running Sending probe 0, because no ack since 8.914. Current RTT: 100/25. 9.114 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.114 (Probe is an initial retransmit) 9.115 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.515/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.114 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.146 <- (1) Packet I|1|L|48|1 Token=[] AckFrame[1-0|Δ0] 9.147 probe count not reset on ack because handshake not yet confirmed 9.147 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.547/Initial, because peerAwaitingAddressValidation | RTT:100/25 9.248 <- (2) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 9.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 9.348/Handshake, because peerAwaitingAddressValidation | RTT:32/16 9.252 Discarding pn space Initial because first Handshake message is being sent 9.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 9.348/Handshake, because peerAwaitingAddressValidation | RTT:32/16 9.252 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 9.285 <- (3) Packet H|1|L|771|1 CryptoFrame[0,725] 9.285 - unknown transport parameter 0x00b6, size 0 9.286 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 9.286 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 9.289 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 9.385/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.289 -> Packet H|0|L|80|1 CryptoFrame[0,36] 9.289 Starting downloading https://server4:443/dywyrflvgp at 53:59.527 on ClientConnection[725e3d6383e8176a/d0502c450cb28c74(V1) with server4/193.167.100.100:443] 9.285 <- (4) Packet H|2|L|771|1 CryptoFrame[0,725] 9.289 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.290 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 9.386/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.290 -> Packet A|0|S0|12516594e16c2d31|47|1 StreamFrame[0(CIB),0,17,fin] 9.290 -> Packet H|2|L|46|1 AckFrame[2-1|Δ0] 9.385 loss detection timeout handler running Sending probe 0, because no ack since 9.289. Current RTT: 32/16. 9.385 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.385 (Probe is a handshake retransmit) 9.386 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 9.578/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 9.385 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 9.417 <- (5) Packet A|1|S0|d0502c450cb28c74|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 9.418 State is set to Confirmed reschedule loss detection timer for PTO over 113 millis, based on 9.532/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -7 millis, based on 9.411/App, because ackElicitingInFlight | RTT:32/16 9.418 Discarding pn space Handshake because HandshakeDone is received 9.418 loss detection timeout handler running Sending probe 0, because no ack since 9.290. Current RTT: 32/16. 9.418 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 9.660/App, because ackElicitingInFlight | RTT:32/16 9.418 -> Packet PA|1|S0|12516594e16c2d31|47|1 StreamFrame[0(CIB),0,17,fin] 9.438 -> Packet A|2|S0|12516594e16c2d31|32|1 AckFrame[1|Δ19] 9.450 <- (6) Packet A|2|S0|d0502c450cb28c74|1054|1 StreamFrame[0(CIB),0,1024] 9.451 <- (7) Packet A|3|S0|d0502c450cb28c74|31|1 StreamFrame[0(CIB),1024,0,fin] 9.451 Finished downloading https://server4:443/dywyrflvgp at 53:59.689 on ClientConnection[725e3d6383e8176a/d0502c450cb28c74(V1) with server4/193.167.100.100:443] 9.452 Closing ClientConnection[725e3d6383e8176a/d0502c450cb28c74(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.451 -> Packet A|3|S0|12516594e16c2d31|31|1 AckFrame[3-1|Δ0] 9.452 -> Packet A|4|S0|12516594e16c2d31|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 9.452 Creating connection with server4:443 with v1 9.453 Setting up connection for downloading https://server4:443/ljhqflsate at 53:59.691 on ClientConnection[83a18343e5f3f29c/5f50e67f46ec7c24(V1) with server4/193.167.100.100:443] 9.453 Original destination connection id: 83a18343e5f3f29c (scid: 5f50e67f46ec7c24) >- CryptoStream[I|ClientHello] 9.455 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.655/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.455 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.475 <- (8) Packet A|4|S0|d0502c450cb28c74|32|1 AckFrame[1|Δ25] 9.476 -> Packet A|5|S0|12516594e16c2d31|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 9.482 <- (9) Packet A|5|S0|d0502c450cb28c74|54|1 NewConnectionIdFrame[1,<0|0a1f6fc68e5505bb|47df1e12ed79a8c2c0950cb7097de63a] 9.483 -> Packet A|6|S0|12516594e16c2d31|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 9.488 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 9.654 loss detection timeout handler running Sending probe 0, because no ack since 9.455. Current RTT: 100/25. 9.654 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.654 (Probe is an initial retransmit) 9.655 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.055/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.655 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.789 <- (2) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 9.793 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.993/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.793 Discarding pn space Initial because first Handshake message is being sent 9.793 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.993/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.793 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.793 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 9.826 <- (4) Packet H|1|L|772|1 CryptoFrame[0,726] 9.827 - unknown transport parameter 0x00b6, size 0 9.827 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 9.827 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 9.829 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.030/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.829 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.830 Starting downloading https://server4:443/ljhqflsate at 54:00.068 on ClientConnection[83a18343e5f3f29c/5f50e67f46ec7c24(V1) with server4/193.167.100.100:443] 9.826 <- (5) Packet H|2|L|772|1 CryptoFrame[0,726] 9.830 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.831 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.031/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.830 -> [Packet H|2|L|46|1 AckFrame[2-1|Δ0], Packet A|0|S0|2c66680d5217feac|47|1 StreamFrame[0(CIB),0,17,fin]] 10.030 loss detection timeout handler running Sending probe 0, because no ack since 9.829. Current RTT: 100/25. 10.030 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.030 (Probe is a handshake retransmit) 10.031 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 10.431/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.030 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 10.062 <- (6) Packet A|1|S0|5f50e67f46ec7c24|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 10.062 State is set to Confirmed reschedule loss detection timer for PTO over 217 millis, based on 10.280/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -7 millis, based on 10.055/App, because ackElicitingInFlight | RTT:100/25 10.063 Discarding pn space Handshake because HandshakeDone is received 10.063 loss detection timeout handler running Sending probe 0, because no ack since 9.830. Current RTT: 100/25. 10.063 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 449 millis, based on 10.513/App, because ackElicitingInFlight | RTT:100/25 10.063 -> Packet PA|1|S0|2c66680d5217feac|47|1 StreamFrame[0(CIB),0,17,fin] 10.082 -> Packet A|2|S0|2c66680d5217feac|32|1 AckFrame[1|Δ19] 10.095 <- (7) Packet A|2|S0|5f50e67f46ec7c24|1054|1 StreamFrame[0(CIB),0,1024] 10.095 <- (8) Packet A|3|S0|5f50e67f46ec7c24|31|1 StreamFrame[0(CIB),1024,0,fin] 10.096 Finished downloading https://server4:443/ljhqflsate at 54:00.333 on ClientConnection[83a18343e5f3f29c/5f50e67f46ec7c24(V1) with server4/193.167.100.100:443] 10.096 Closing ClientConnection[83a18343e5f3f29c/5f50e67f46ec7c24(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.096 -> Packet A|3|S0|2c66680d5217feac|31|1 AckFrame[3-1|Δ0] 10.096 -> Packet A|4|S0|2c66680d5217feac|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 10.097 Creating connection with server4:443 with v1 10.098 Setting up connection for downloading https://server4:443/volzrvffhg at 54:00.335 on ClientConnection[cd81fb1f852912e4/953db11fadaeea53(V1) with server4/193.167.100.100:443] 10.098 Original destination connection id: cd81fb1f852912e4 (scid: 953db11fadaeea53) >- CryptoStream[I|ClientHello] 10.099 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.299/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.099 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.127 <- (9) Packet A|5|S0|5f50e67f46ec7c24|54|1 NewConnectionIdFrame[1,<0|bbc7d27d4e7477d6|ee314d20e13235c288d1492e1f55e02e] 10.127 <- (10) Packet A|6|S0|5f50e67f46ec7c24|37|2 AckFrame[4-3,1|Δ0] ConnectionCloseFrame[0|0|] 10.128 -> Packet A|5|S0|2c66680d5217feac|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 10.299 loss detection timeout handler running Sending probe 0, because no ack since 10.099. Current RTT: 100/25. 10.299 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.299 (Probe is an initial retransmit) 10.299 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.699/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.299 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.333 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 10.633 <- (2) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 10.636 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.837/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.637 Discarding pn space Initial because first Handshake message is being sent 10.637 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.637 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.837/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.637 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 10.669 <- (4) Packet H|1|L|772|1 CryptoFrame[0,726] 10.670 - unknown transport parameter 0x00b6, size 0 10.670 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 10.670 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.673 Starting downloading https://server4:443/volzrvffhg at 54:00.911 on ClientConnection[cd81fb1f852912e4/953db11fadaeea53(V1) with server4/193.167.100.100:443] 10.670 <- (5) Packet H|2|L|772|1 CryptoFrame[0,726] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.674 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.874/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.673 -> Packet H|0|L|80|1 CryptoFrame[0,36] 10.674 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.874/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.674 -> [Packet H|1|L|46|1 AckFrame[2-1|Δ0], Packet A|0|S0|cc5c889349a2e51c|47|1 StreamFrame[0(CIB),0,17,fin]] 10.704 <- (6) Packet A|1|S0|953db11fadaeea53|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 10.705 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 10.873/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 10.899/App, because ackElicitingInFlight | RTT:100/25 10.705 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 10.706 <- (7) Packet A|2|S0|953db11fadaeea53|1054|1 StreamFrame[0(CIB),0,1024] 10.706 <- (8) Packet A|3|S0|953db11fadaeea53|31|1 StreamFrame[0(CIB),1024,0,fin] 10.706 -> Packet A|1|S0|cc5c889349a2e51c|31|1 AckFrame[2-1|Δ0] 10.707 Finished downloading https://server4:443/volzrvffhg at 54:00.944 on ClientConnection[cd81fb1f852912e4/953db11fadaeea53(V1) with server4/193.167.100.100:443] 10.707 Closing ClientConnection[cd81fb1f852912e4/953db11fadaeea53(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.707 -> Packet A|2|S0|cc5c889349a2e51c|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 10.707 Creating connection with server4:443 with v1 10.708 Setting up connection for downloading https://server4:443/ymfnppqcwo at 54:00.946 on ClientConnection[eaa2482768b69665/dad11b98fc72ccd5(V1) with server4/193.167.100.100:443] 10.708 Original destination connection id: eaa2482768b69665 (scid: dad11b98fc72ccd5) >- CryptoStream[I|ClientHello] 10.709 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.909/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.709 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.731 <- (9) Packet A|4|S0|953db11fadaeea53|32|1 AckFrame[0|Δ26] 10.732 -> Packet A|3|S0|cc5c889349a2e51c|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 10.742 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 10.743 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.943/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 10.742 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 10.745 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 10.841/Handshake, because peerAwaitingAddressValidation | RTT:32/16 10.746 - unknown transport parameter 0x00b6, size 0 10.745 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 10.746 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 10.746 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 10.749 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 10.845/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 10.749 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.749 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.749 Starting downloading https://server4:443/ymfnppqcwo at 54:00.987 on ClientConnection[eaa2482768b69665/dad11b98fc72ccd5(V1) with server4/193.167.100.100:443] 10.750 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 10.750 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 10.845/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 95 millis, based on 10.846/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 10.750 Discarding pn space Initial because first Handshake message is being sent 10.750 -> Packet A|0|S0|a5c78550c2bdea79|47|1 StreamFrame[0(CIB),0,17,fin] 10.742 <- (2) Packet A|0|S0|dad11b98fc72ccd5|54|1 NewConnectionIdFrame[1,<0|2068d8cf52b22e66|5d95f8c3cc666440bb0d9dc8edfe570e] 10.770 -> Packet A|1|S0|a5c78550c2bdea79|32|1 AckFrame[0|Δ19] 10.780 <- (3) Packet A|1|S0|dad11b98fc72ccd5|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 10.781 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 10.845/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 10.871/App, because ackElicitingInFlight | RTT:32/16 10.781 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 10.782 <- (4) Packet A|2|S0|dad11b98fc72ccd5|1054|1 StreamFrame[0(CIB),0,1024] 10.782 -> Packet A|2|S0|a5c78550c2bdea79|32|1 AckFrame[2-0|Δ1] 10.807 <- (5) Packet A|4|S0|dad11b98fc72ccd5|32|1 AckFrame[1-0|Δ6] 10.807 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.891 <- (6) Packet A|6|S0|dad11b98fc72ccd5|30|2 PingFrame[] Padding(3) 10.911 -> Packet A|3|S0|a5c78550c2bdea79|36|1 AckFrame[6,4,2-1|Δ19] 10.942 <- (7) Packet A|7|S0|dad11b98fc72ccd5|31|1 StreamFrame[0(CIB),1024,0,fin] 10.943 Finished downloading https://server4:443/ymfnppqcwo at 54:01.181 on ClientConnection[eaa2482768b69665/dad11b98fc72ccd5(V1) with server4/193.167.100.100:443] 10.943 Closing ClientConnection[eaa2482768b69665/dad11b98fc72ccd5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.943 -> Packet A|4|S0|a5c78550c2bdea79|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4,2-1|Δ0] 10.944 Creating connection with server4:443 with v1 10.944 Setting up connection for downloading https://server4:443/htlvjqkoof at 54:01.182 on ClientConnection[2ffa8096ec1d28b8/9e065d0da3ce2219(V1) with server4/193.167.100.100:443] 10.944 Original destination connection id: 2ffa8096ec1d28b8 (scid: 9e065d0da3ce2219) >- CryptoStream[I|ClientHello] 10.946 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.146/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.946 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.145 loss detection timeout handler running Sending probe 0, because no ack since 10.946. Current RTT: 100/25. 11.145 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.145 (Probe is an initial retransmit) 11.146 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.546/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.146 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.177 <- (1) Packet I|1|L|48|1 Token=[] AckFrame[1-0|Δ0] 11.178 probe count not reset on ack because handshake not yet confirmed 11.178 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.578/Initial, because peerAwaitingAddressValidation | RTT:100/25 11.281 <- (2) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 11.284 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 11.375/Handshake, because peerAwaitingAddressValidation | RTT:31/15 11.284 Discarding pn space Initial because first Handshake message is being sent 11.284 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 11.375/Handshake, because peerAwaitingAddressValidation | RTT:31/15 11.284 -> Packet I|2|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1151) 11.374 loss detection timeout handler running 11.374 Sending probe 0. Current RTT: 31/15. 11.374 Sending probe because peer awaiting address validation 11.374 (Probe is a handshake ping) 11.375 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 11.557/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 11.375 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 11.406 <- (3) Packet H|3|L|47|1 AckFrame[0|Δ0] 11.406 probe count not reset on ack because handshake not yet confirmed 11.407 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.544 <- (4) Packet H|4|L|772|1 CryptoFrame[0,726] 11.545 - unknown transport parameter 0x00b6, size 0 11.545 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 11.545 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 157 millis, based on 11.706/Handshake, because ackElicitingInFlight | RTT:31/12 11.548 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.548 Starting downloading https://server4:443/htlvjqkoof at 54:01.786 on ClientConnection[2ffa8096ec1d28b8/9e065d0da3ce2219(V1) with server4/193.167.100.100:443] 11.544 <- (5) Packet H|5|L|772|1 CryptoFrame[0,726] 11.548 -> Packet H|2|L|46|1 AckFrame[4-3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.549 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 156 millis, based on 11.706/Handshake, because ackElicitingInFlight | RTT:31/12 11.549 -> [Packet H|3|L|46|1 AckFrame[5-3|Δ0], Packet A|0|S0|7381d1da72a0d140|47|1 StreamFrame[0(CIB),0,17,fin]] 11.638 <- (6) Packet H|6|L|772|1 CryptoFrame[0,726] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.639 -> Packet H|4|L|46|1 AckFrame[6-3|Δ0] 11.705 loss detection timeout handler running Sending probe 1, because no ack since 11.548. Current RTT: 31/12. 11.705 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 11.705 (Probe is a handshake retransmit) 11.706 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 315 millis, based on 12.022/Handshake, because ackElicitingInFlight | RTT:31/12 11.706 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 11.707 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 315 millis, based on 12.023/Handshake, because ackElicitingInFlight | RTT:31/12 11.707 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 11.723 <- (7) Packet H|9|L|772|1 CryptoFrame[0,726] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.723 -> Packet H|7|L|48|1 AckFrame[9,6-3|Δ0] 11.737 <- (8) Packet A|1|S0|9e065d0da3ce2219|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 11.737 State is set to Confirmed reschedule loss detection timer for PTO over 227 millis, based on 11.965/App, because ackElicitingInFlight | RTT:31/12 reschedule loss detection timer for PTO over -84 millis, based on 11.653/App, because ackElicitingInFlight | RTT:31/12 11.738 Discarding pn space Handshake because HandshakeDone is received 11.738 loss detection timeout handler running Sending probe 0, because no ack since 11.549. Current RTT: 31/12. 11.738 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 207 millis, based on 11.946/App, because ackElicitingInFlight | RTT:31/12 11.738 -> Packet PA|1|S0|7381d1da72a0d140|47|1 StreamFrame[0(CIB),0,17,fin] 11.758 -> Packet A|2|S0|7381d1da72a0d140|32|1 AckFrame[1|Δ19] 11.770 <- (9) Packet A|3|S0|9e065d0da3ce2219|31|1 StreamFrame[0(CIB),1024,0,fin] 11.790 -> Packet A|3|S0|7381d1da72a0d140|34|1 AckFrame[3,1|Δ19] 11.821 <- (10) Packet A|5|S0|9e065d0da3ce2219|54|1 NewConnectionIdFrame[1,<0|021882e342dcebd0|663a4e151d66cb25f82b66a6c49a2f2b] 11.840 -> Packet A|4|S0|7381d1da72a0d140|36|1 AckFrame[5,3,1|Δ19] 11.945 loss detection timeout handler running Sending probe 1, because no ack since 11.738. Current RTT: 31/12. 11.946 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 415 millis, based on 12.362/App, because ackElicitingInFlight | RTT:31/12 11.946 -> Packet PA|5|S0|7381d1da72a0d140|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 415 millis, based on 12.363/App, because ackElicitingInFlight | RTT:31/12 11.947 -> Packet PA|6|S0|7381d1da72a0d140|47|1 StreamFrame[0(CIB),0,17,fin] 12.173 <- (11) Packet A|9|S0|9e065d0da3ce2219|30|2 PingFrame[] Padding(3) 12.174 <- (12) Packet A|10|S0|9e065d0da3ce2219|30|2 PingFrame[] Padding(3) 12.174 -> Packet A|7|S0|7381d1da72a0d140|37|1 AckFrame[10-9,5,3,1|Δ0] 12.206 <- (13) Packet A|11|S0|9e065d0da3ce2219|1054|1 StreamFrame[0(CIB),0,1024,fin] 12.207 Finished downloading https://server4:443/htlvjqkoof at 54:02.445 on ClientConnection[2ffa8096ec1d28b8/9e065d0da3ce2219(V1) with server4/193.167.100.100:443] 12.208 Closing ClientConnection[2ffa8096ec1d28b8/9e065d0da3ce2219(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.208 Creating connection with server4:443 with v1 12.208 -> Packet A|8|S0|7381d1da72a0d140|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-9,5,3,1|Δ0] 12.209 Setting up connection for downloading https://server4:443/spbylmulsv at 54:02.447 on ClientConnection[34ef3c705e296575/ba71979ac9dbcff9(V1) with server4/193.167.100.100:443] 12.209 Original destination connection id: 34ef3c705e296575 (scid: ba71979ac9dbcff9) >- CryptoStream[I|ClientHello] 12.211 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.411/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.211 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.244 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.245 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.445/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.244 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 12.248 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.248 - unknown transport parameter 0x00b6, size 0 reschedule loss detection timer for PTO over 96 millis, based on 12.345/Handshake, because peerAwaitingAddressValidation | RTT:33/16 12.248 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 12.248 - unknown transport parameter 0xff04de1b, size 2 12.247 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 12.250 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.347/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.250 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.251 Starting downloading https://server4:443/spbylmulsv at 54:02.489 on ClientConnection[34ef3c705e296575/ba71979ac9dbcff9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 12.348/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.251 Discarding pn space Initial because first Handshake message is being sent 12.251 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.244 <- (2) Packet A|0|S0|ba71979ac9dbcff9|54|1 NewConnectionIdFrame[1,<0|89c8d092f2fd1082|df76d108c8b13ac72a1efc85be4ea923] 12.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.348/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.251 -> Packet A|0|S0|72d22854c8cdfbef|47|1 StreamFrame[0(CIB),0,17,fin] 12.271 -> Packet A|1|S0|72d22854c8cdfbef|32|1 AckFrame[0|Δ19] 12.281 <- (3) Packet A|1|S0|ba71979ac9dbcff9|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 12.282 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 12.347/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 12.373/App, because ackElicitingInFlight | RTT:33/16 12.282 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 12.283 <- (4) Packet A|3|S0|ba71979ac9dbcff9|31|1 StreamFrame[0(CIB),1024,0,fin] 12.283 -> Packet A|2|S0|72d22854c8cdfbef|33|1 AckFrame[3,1-0|Δ0] 12.308 <- (5) Packet A|4|S0|ba71979ac9dbcff9|32|1 AckFrame[1-0|Δ6] 12.308 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.315 <- (14) Packet A|12|S0|9e065d0da3ce2219|30|2 PingFrame[] Padding(3) 12.315 -> Packet A|9|S0|7381d1da72a0d140|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-9,5,3,1|Δ0] 12.484 <- (6) Packet A|6|S0|ba71979ac9dbcff9|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 12.504 -> Packet A|3|S0|72d22854c8cdfbef|36|1 AckFrame[6,4-3,1|Δ19] 12.536 <- (7) Packet A|7|S0|ba71979ac9dbcff9|1054|1 StreamFrame[0(CIB),0,1024,fin] 12.537 Finished downloading https://server4:443/spbylmulsv at 54:02.775 on ClientConnection[34ef3c705e296575/ba71979ac9dbcff9(V1) with server4/193.167.100.100:443] 12.537 Closing ClientConnection[34ef3c705e296575/ba71979ac9dbcff9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.538 Creating connection with server4:443 with v1 12.538 -> Packet A|4|S0|72d22854c8cdfbef|39|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4-3,1|Δ0] 12.539 Setting up connection for downloading https://server4:443/dtmdtkfzcn at 54:02.776 on ClientConnection[552da5d829c07cdd/56031760369ecce2(V1) with server4/193.167.100.100:443] 12.539 Original destination connection id: 552da5d829c07cdd (scid: 56031760369ecce2) >- CryptoStream[I|ClientHello] 12.540 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.740/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.540 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.574 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 12.740 loss detection timeout handler running Sending probe 0, because no ack since 12.540. Current RTT: 100/25. 12.740 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.740 (Probe is an initial retransmit) 12.740 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.140/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.740 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.875 <- (2) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 12.878 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.078/Handshake, because peerAwaitingAddressValidation | RTT:100/25 12.878 Discarding pn space Initial because first Handshake message is being sent 12.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.879 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) reschedule loss detection timer for PTO over 199 millis, based on 13.079/Handshake, because peerAwaitingAddressValidation | RTT:100/25 12.878 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 12.911 <- (4) Packet H|1|L|772|1 CryptoFrame[0,726] 12.912 - unknown transport parameter 0x00b6, size 0 12.912 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 12.912 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 12.914 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.114/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.914 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.915 Starting downloading https://server4:443/dtmdtkfzcn at 54:03.152 on ClientConnection[552da5d829c07cdd/56031760369ecce2(V1) with server4/193.167.100.100:443] 12.912 <- (5) Packet H|2|L|772|1 CryptoFrame[0,726] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.116/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.915 -> [Packet H|1|L|46|1 AckFrame[1|Δ0], Packet A|0|S0|7b933d3e887244a9|47|1 StreamFrame[0(CIB),0,17,fin]] 12.916 -> Packet H|2|L|46|1 AckFrame[2-1|Δ0] 12.946 <- (6) Packet A|1|S0|56031760369ecce2|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 12.946 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 13.114/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 13.140/App, because ackElicitingInFlight | RTT:100/25 12.946 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 12.947 <- (7) Packet A|2|S0|56031760369ecce2|1054|1 StreamFrame[0(CIB),0,1024] 12.947 <- (8) Packet A|3|S0|56031760369ecce2|31|1 StreamFrame[0(CIB),1024,0,fin] 12.948 Finished downloading https://server4:443/dtmdtkfzcn at 54:03.186 on ClientConnection[552da5d829c07cdd/56031760369ecce2(V1) with server4/193.167.100.100:443] 12.948 -> Packet A|1|S0|7b933d3e887244a9|31|1 AckFrame[2-1|Δ0] 12.948 Closing ClientConnection[552da5d829c07cdd/56031760369ecce2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.949 -> Packet A|2|S0|7b933d3e887244a9|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 12.949 Creating connection with server4:443 with v1 12.949 Setting up connection for downloading https://server4:443/hqrelkwvyc at 54:03.187 on ClientConnection[1058f8f83213600f/881fd691b6da509e(V1) with server4/193.167.100.100:443] 12.949 Original destination connection id: 1058f8f83213600f (scid: 881fd691b6da509e) >- CryptoStream[I|ClientHello] 12.951 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.151/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.951 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.979 <- (9) Packet A|5|S0|56031760369ecce2|54|1 NewConnectionIdFrame[1,<0|25a5f5bbed4f1a5d|489ea35dbee3b02739fd847759cf8dbc] 12.979 -> Packet A|3|S0|7b933d3e887244a9|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 12.979 <- (10) Packet A|6|S0|56031760369ecce2|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 13.150 loss detection timeout handler running Sending probe 0, because no ack since 12.951. Current RTT: 100/25. 13.150 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.150 (Probe is an initial retransmit) 13.151 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.551/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.151 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.550 loss detection timeout handler running Sending probe 1, because no ack since 13.151. Current RTT: 100/25. 13.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.550 (Probe is an initial retransmit) 13.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.351/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.551 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.552 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.352/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.552 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.584 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 13.585 probe count not reset on ack because handshake not yet confirmed 13.585 Retransmitting CryptoFrame[0,257] on level Initial 13.585 Cwnd(-): 6000; inflight: 1200 13.585 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.385/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.585 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 13.974/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.585 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 13.584 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,725] Padding(254) 13.588 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 13.976/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.588 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 13.588 - unknown transport parameter 0x00b6, size 0 13.588 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 13.588 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.590 Starting downloading https://server4:443/hqrelkwvyc at 54:03.828 on ClientConnection[1058f8f83213600f/881fd691b6da509e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 13.687/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.591 Discarding pn space Initial because first Handshake message is being sent 13.591 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.688/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.591 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.590 -> Packet H|0|L|80|1 CryptoFrame[0,36] 13.591 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.688/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.591 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|90dbcb8ab3c30947|47|1 StreamFrame[0(CIB),0,17,fin]] 13.617 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.622 <- (4) Packet A|1|S0|881fd691b6da509e|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 13.622 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 13.687/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 13.713/App, because ackElicitingInFlight | RTT:33/16 13.622 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 13.623 <- (5) Packet A|2|S0|881fd691b6da509e|1054|1 StreamFrame[0(CIB),0,1024] 13.623 -> Packet A|1|S0|90dbcb8ab3c30947|31|1 AckFrame[2-1|Δ0] 13.648 <- (6) Packet A|4|S0|881fd691b6da509e|32|1 AckFrame[0|Δ26] 13.649 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.654 <- (7) Packet A|5|S0|881fd691b6da509e|54|1 NewConnectionIdFrame[1,<0|ec280839a7bd1c13|e8f6a0aacd16bb0fc0d8c91eb8c76104] 13.674 -> Packet A|2|S0|90dbcb8ab3c30947|34|1 AckFrame[5-4,2-1|Δ19] 13.704 <- (8) Packet A|6|S0|881fd691b6da509e|31|1 StreamFrame[0(CIB),1024,0,fin] 13.705 Finished downloading https://server4:443/hqrelkwvyc at 54:03.943 on ClientConnection[1058f8f83213600f/881fd691b6da509e(V1) with server4/193.167.100.100:443] 13.705 Closing ClientConnection[1058f8f83213600f/881fd691b6da509e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.705 -> Packet A|3|S0|90dbcb8ab3c30947|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,2-1|Δ0] 13.706 Creating connection with server4:443 with v1 13.706 Setting up connection for downloading https://server4:443/shlpivmaxs at 54:03.944 on ClientConnection[e5dd547cac1f0804/973b1b7f42f444d7(V1) with server4/193.167.100.100:443] 13.706 Original destination connection id: e5dd547cac1f0804 (scid: 973b1b7f42f444d7) >- CryptoStream[I|ClientHello] 13.708 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.908/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.708 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.741 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.742 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.942/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.741 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 13.745 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.842/Handshake, because peerAwaitingAddressValidation | RTT:33/16 13.745 - unknown transport parameter 0x00b6, size 0 13.745 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 13.745 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 13.745 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 13.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.845/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.748 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.845/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.748 Discarding pn space Initial because first Handshake message is being sent 13.748 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 13.748 Starting downloading https://server4:443/shlpivmaxs at 54:03.986 on ClientConnection[e5dd547cac1f0804/973b1b7f42f444d7(V1) with server4/193.167.100.100:443] 13.749 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 13.846/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.749 -> Packet A|0|S0|05ebb219def4be2e|47|1 StreamFrame[0(CIB),0,17,fin] 13.845 loss detection timeout handler running Sending probe 0, because no ack since 13.748. Current RTT: 33/16. 13.845 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.845 (Probe is a handshake retransmit) 13.846 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.040/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 13.846 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 13.877 <- (2) Packet A|1|S0|973b1b7f42f444d7|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 13.878 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 13.993/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 13.871/App, because ackElicitingInFlight | RTT:33/16 13.878 loss detection timeout handler running 13.878 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 13.749. Current RTT: 33/16. 13.878 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 14.122/App, because ackElicitingInFlight | RTT:33/16 13.878 -> Packet PA|1|S0|05ebb219def4be2e|47|1 StreamFrame[0(CIB),0,17,fin] 13.898 -> Packet A|2|S0|05ebb219def4be2e|32|1 AckFrame[1|Δ19] 13.910 <- (3) Packet A|2|S0|973b1b7f42f444d7|1054|1 StreamFrame[0(CIB),0,1024] 13.910 <- (4) Packet A|3|S0|973b1b7f42f444d7|31|1 StreamFrame[0(CIB),1024,0,fin] 13.911 Finished downloading https://server4:443/shlpivmaxs at 54:04.149 on ClientConnection[e5dd547cac1f0804/973b1b7f42f444d7(V1) with server4/193.167.100.100:443] 13.911 -> Packet A|3|S0|05ebb219def4be2e|31|1 AckFrame[3-1|Δ0] 13.911 Closing ClientConnection[e5dd547cac1f0804/973b1b7f42f444d7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.912 -> Packet A|4|S0|05ebb219def4be2e|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 13.912 Creating connection with server4:443 with v1 13.912 Setting up connection for downloading https://server4:443/zqthkbtxls at 54:04.150 on ClientConnection[f12f973f05031068/4c3f49b79ff9fcec(V1) with server4/193.167.100.100:443] 13.912 Original destination connection id: f12f973f05031068 (scid: 4c3f49b79ff9fcec) >- CryptoStream[I|ClientHello] 13.914 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.114/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.914 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.935 <- (5) Packet A|4|S0|973b1b7f42f444d7|32|1 AckFrame[1|Δ25] 13.935 -> Packet A|5|S0|05ebb219def4be2e|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 13.942 <- (6) Packet A|5|S0|973b1b7f42f444d7|54|1 NewConnectionIdFrame[1,<0|560b7fac7a1b8578|66a4b4d33f9ce48501b45b123b3b00c1] 13.942 -> Packet A|6|S0|05ebb219def4be2e|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 13.942 <- (7) Packet A|6|S0|973b1b7f42f444d7|37|2 AckFrame[4-3,1|Δ0] ConnectionCloseFrame[0|0|] 13.947 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 13.947 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.147/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.947 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 13.950 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.046/Handshake, because peerAwaitingAddressValidation | RTT:32/16 13.950 - unknown transport parameter 0x00b6, size 0 13.950 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 13.950 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 13.950 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 13.953 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.049/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.953 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.953 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.953 Starting downloading https://server4:443/zqthkbtxls at 54:04.191 on ClientConnection[f12f973f05031068/4c3f49b79ff9fcec(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 14.049/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.953 Discarding pn space Initial because first Handshake message is being sent 13.953 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 13.947 <- (2) Packet A|0|S0|4c3f49b79ff9fcec|54|1 NewConnectionIdFrame[1,<0|d64ed9fcea055e51|3c450cb48d64a58f9030c8c494425476] 13.953 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.049/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.953 -> Packet A|0|S0|058d068ce06b2160|47|1 StreamFrame[0(CIB),0,17,fin] 13.973 -> Packet A|1|S0|058d068ce06b2160|32|1 AckFrame[0|Δ19] 14.049 loss detection timeout handler running Sending probe 0, because no ack since 13.953. Current RTT: 32/16. 14.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.049 (Probe is a handshake retransmit) 14.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 14.241/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.049 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 14.240 loss detection timeout handler running Sending probe 1, because no ack since 13.953. Current RTT: 32/16. 14.241 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.241 (Probe is a handshake retransmit) 14.241 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 14.625/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.241 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 14.242 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 14.626/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.242 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 14.248 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 14.249 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 14.272 <- (5) Packet A|1|S0|4c3f49b79ff9fcec|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 14.273 State is set to Confirmed reschedule loss detection timer for PTO over 164 millis, based on 14.437/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -198 millis, based on 14.074/App, because ackElicitingInFlight | RTT:32/16 14.273 Discarding pn space Handshake because HandshakeDone is received 14.273 loss detection timeout handler running Sending probe 0, because no ack since 13.953. Current RTT: 32/16. 14.273 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 14.516/App, because ackElicitingInFlight | RTT:32/16 14.274 -> Packet PA|2|S0|058d068ce06b2160|47|1 StreamFrame[0(CIB),0,17,fin] 14.293 -> Packet A|3|S0|058d068ce06b2160|32|1 AckFrame[1-0|Δ19] 14.515 loss detection timeout handler running Sending probe 1, because no ack since 14.274. Current RTT: 32/16. 14.515 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 14.999/App, because ackElicitingInFlight | RTT:32/16 14.515 -> Packet PA|4|S0|058d068ce06b2160|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 15.000/App, because ackElicitingInFlight | RTT:32/16 14.516 -> Packet PA|5|S0|058d068ce06b2160|47|1 StreamFrame[0(CIB),0,17,fin] 14.546 <- (6) Packet A|2|S0|4c3f49b79ff9fcec|31|1 AckFrame[4|Δ0] 14.547 Cwnd(-): 6000; inflight: 47 14.547 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 89 millis, based on 14.637/App, because ackElicitingInFlight | RTT:32/16 14.547 <- (7) Packet A|4|S0|4c3f49b79ff9fcec|31|1 StreamFrame[0(CIB),1024,0,fin] reschedule loss detection timer for PTO over 104 millis, based on 14.653/App, because ackElicitingInFlight | RTT:32/12 14.548 -> Packet A|6|S0|058d068ce06b2160|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1-0|Δ0] 14.567 -> Packet A|7|S0|058d068ce06b2160|34|1 AckFrame[4,2-0|Δ19] 14.573 <- (8) Packet A|5|S0|4c3f49b79ff9fcec|32|1 AckFrame[5-4|Δ26] reschedule loss detection timer for PTO over 78 millis, based on 14.653/App, because ackElicitingInFlight | RTT:32/12 14.604 <- (9) Packet A|6|S0|4c3f49b79ff9fcec|32|1 AckFrame[7-5|Δ6] 14.605 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.857 <- (10) Packet A|7|S0|4c3f49b79ff9fcec|1054|1 StreamFrame[0(CIB),0,1024,fin] 14.858 Finished downloading https://server4:443/zqthkbtxls at 54:05.096 on ClientConnection[f12f973f05031068/4c3f49b79ff9fcec(V1) with server4/193.167.100.100:443] 14.858 Closing ClientConnection[f12f973f05031068/4c3f49b79ff9fcec(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.859 Creating connection with server4:443 with v1 14.859 -> Packet A|8|S0|058d068ce06b2160|35|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 14.859 Setting up connection for downloading https://server4:443/xgcwmpvepq at 54:05.097 on ClientConnection[d7da991fd57051d1/424fd468b2614493(V1) with server4/193.167.100.100:443] 14.859 Original destination connection id: d7da991fd57051d1 (scid: 424fd468b2614493) >- CryptoStream[I|ClientHello] 14.861 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.061/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.861 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.890 <- (11) Packet A|8|S0|4c3f49b79ff9fcec|35|2 AckFrame[8|Δ0] ConnectionCloseFrame[0|0|] 14.894 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.894 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.094/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.894 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,725] Padding(254) 14.896 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.992/Handshake, because peerAwaitingAddressValidation | RTT:32/16 14.897 - unknown transport parameter 0x00b6, size 0 14.897 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 14.896 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 14.897 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 14.899 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.899 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.899 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.899 Starting downloading https://server4:443/xgcwmpvepq at 54:05.137 on ClientConnection[d7da991fd57051d1/424fd468b2614493(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 14.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.899 Discarding pn space Initial because first Handshake message is being sent 14.899 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 14.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.996/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.899 -> Packet A|0|S0|890da9597e9bf824|47|1 StreamFrame[0(CIB),0,17,fin] 14.930 <- (2) Packet A|1|S0|424fd468b2614493|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 14.930 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 14.995/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 15.020/App, because ackElicitingInFlight | RTT:32/16 14.931 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 14.950 -> Packet A|1|S0|890da9597e9bf824|32|1 AckFrame[1|Δ19] 15.020 loss detection timeout handler running Sending probe 0, because no ack since 14.899. Current RTT: 32/16. 15.020 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 15.262/App, because ackElicitingInFlight | RTT:32/16 15.020 -> Packet PA|2|S0|890da9597e9bf824|47|1 StreamFrame[0(CIB),0,17,fin] 15.051 <- (3) Packet A|2|S0|424fd468b2614493|31|1 AckFrame[2|Δ0] 15.052 Cwnd(-): 6000; inflight: 0 15.052 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.052 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 104 millis, based on 15.157/App, because ackElicitingInFlight | RTT:32/12 15.052 -> Packet A|3|S0|890da9597e9bf824|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 15.052 <- (4) Packet A|4|S0|424fd468b2614493|31|1 StreamFrame[0(CIB),1024,0,fin] 15.072 -> Packet A|4|S0|890da9597e9bf824|34|1 AckFrame[4,2-1|Δ19] 15.111 <- (5) Packet A|7|S0|424fd468b2614493|1054|1 StreamFrame[0(CIB),0,1024,fin] 15.112 Finished downloading https://server4:443/xgcwmpvepq at 54:05.349 on ClientConnection[d7da991fd57051d1/424fd468b2614493(V1) with server4/193.167.100.100:443] 15.112 Closing ClientConnection[d7da991fd57051d1/424fd468b2614493(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.112 -> Packet A|5|S0|890da9597e9bf824|39|2 ConnectionCloseFrame[0|0|] AckFrame[7,4,2-1|Δ0] 15.112 Creating connection with server4:443 with v1 15.113 Setting up connection for downloading https://server4:443/cjpnqriave at 54:05.351 on ClientConnection[3778a5b78bc49286/43a893872bdee249(V1) with server4/193.167.100.100:443] 15.113 Original destination connection id: 3778a5b78bc49286 (scid: 43a893872bdee249) >- CryptoStream[I|ClientHello] 15.115 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.315/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.114 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.143 <- (6) Packet A|8|S0|424fd468b2614493|35|2 AckFrame[5-3|Δ0] ConnectionCloseFrame[0|0|] 15.148 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 15.314 loss detection timeout handler running Sending probe 0, because no ack since 15.114. Current RTT: 100/25. 15.314 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.314 (Probe is an initial retransmit) 15.314 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.714/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.314 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.346 <- (2) Packet I|1|L|48|1 Token=[] AckFrame[1-0|Δ0] 15.347 probe count not reset on ack because handshake not yet confirmed 15.347 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.747/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.450 <- (3) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 15.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 15.548/Handshake, because peerAwaitingAddressValidation | RTT:32/16 reschedule loss detection timer for PTO over 95 millis, based on 15.549/Handshake, because peerAwaitingAddressValidation | RTT:32/16 15.453 Discarding pn space Initial because first Handshake message is being sent 15.452 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 15.453 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.548 loss detection timeout handler running 15.548 Sending probe 0. Current RTT: 32/16. 15.548 Sending probe because peer awaiting address validation 15.548 (Probe is a handshake ping) 15.548 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 15.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.548 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 15.739 loss detection timeout handler running Sending probe 1, because no ack since 15.548. Current RTT: 32/16. 15.740 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.740 (Probe is a handshake ping) 15.740 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 16.124/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.740 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 15.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 16.125/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.741 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 15.748 <- (5) Packet H|2|L|772|1 CryptoFrame[0,726] 15.749 - unknown transport parameter 0x00b6, size 0 15.749 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 15.749 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 15.752 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 16.136/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.752 -> Packet H|3|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.752 Starting downloading https://server4:443/cjpnqriave at 54:05.990 on ClientConnection[3778a5b78bc49286/43a893872bdee249(V1) with server4/193.167.100.100:443] 15.749 <- (6) Packet H|3|L|772|1 CryptoFrame[0,726] 15.752 -> Packet H|4|L|46|1 AckFrame[2|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.753 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 16.137/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.753 -> [Packet H|5|L|46|1 AckFrame[3-2|Δ0], Packet A|0|S0|a9ca29d42220338b|47|1 StreamFrame[0(CIB),0,17,fin]] 15.771 <- (7) Packet H|4|L|47|1 AckFrame[1-0|Δ0] 15.771 probe count not reset on ack because handshake not yet confirmed 15.771 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 364 millis, based on 16.136/Handshake, because ackElicitingInFlight | RTT:32/16 15.772 <- (8) Packet H|5|L|47|1 AckFrame[2-0|Δ0] 15.772 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 63 millis, based on 15.836/Handshake, because ackElicitingInFlight | RTT:32/13 15.835 loss detection timeout handler running Sending probe 0, because no ack since 15.752. Current RTT: 32/10. 15.835 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.835 (Probe is a handshake retransmit) 15.836 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 143 millis, based on 15.980/Handshake, because ackElicitingInFlight | RTT:32/10 15.836 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 15.979 loss detection timeout handler running Sending probe 1, because no ack since 15.753. Current RTT: 32/10. 15.979 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.979 (Probe is a handshake retransmit) 15.980 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 287 millis, based on 16.268/Handshake, because ackElicitingInFlight | RTT:32/10 15.980 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 15.981 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 287 millis, based on 16.269/Handshake, because ackElicitingInFlight | RTT:32/10 15.981 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 16.011 <- (9) Packet A|1|S0|43a893872bdee249|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 16.011 State is set to Confirmed reschedule loss detection timer for PTO over 129 millis, based on 16.141/App, because ackElicitingInFlight | RTT:32/10 reschedule loss detection timer for PTO over -161 millis, based on 15.850/App, because ackElicitingInFlight | RTT:32/10 16.012 Discarding pn space Handshake because HandshakeDone is received 16.012 loss detection timeout handler running Sending probe 0, because no ack since 15.753. Current RTT: 32/10. 16.012 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 193 millis, based on 16.206/App, because ackElicitingInFlight | RTT:32/10 16.012 -> Packet PA|1|S0|a9ca29d42220338b|47|1 StreamFrame[0(CIB),0,17,fin] 16.031 -> Packet A|2|S0|a9ca29d42220338b|32|1 AckFrame[1|Δ19] 16.044 <- (10) Packet A|3|S0|43a893872bdee249|31|1 StreamFrame[0(CIB),1024,0,fin] 16.064 -> Packet A|3|S0|a9ca29d42220338b|34|1 AckFrame[3,1|Δ19] 16.103 <- (11) Packet A|6|S0|43a893872bdee249|1054|1 StreamFrame[0(CIB),0,1024,fin] 16.104 Finished downloading https://server4:443/cjpnqriave at 54:06.341 on ClientConnection[3778a5b78bc49286/43a893872bdee249(V1) with server4/193.167.100.100:443] 16.104 Closing ClientConnection[3778a5b78bc49286/43a893872bdee249(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.104 Creating connection with server4:443 with v1 16.104 -> Packet A|4|S0|a9ca29d42220338b|39|2 ConnectionCloseFrame[0|0|] AckFrame[6,3,1|Δ0] 16.105 Setting up connection for downloading https://server4:443/jepylbbmyl at 54:06.343 on ClientConnection[0add8f861e1e5c0a/fb8f620f755294d9(V1) with server4/193.167.100.100:443] 16.105 Original destination connection id: 0add8f861e1e5c0a (scid: fb8f620f755294d9) >- CryptoStream[I|ClientHello] 16.107 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.307/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.107 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.135 <- (12) Packet A|7|S0|43a893872bdee249|35|2 AckFrame[4-1|Δ0] ConnectionCloseFrame[0|0|] 16.306 loss detection timeout handler running Sending probe 0, because no ack since 16.107. Current RTT: 100/25. 16.306 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.306 (Probe is an initial retransmit) 16.307 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.707/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.306 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.706 loss detection timeout handler running Sending probe 1, because no ack since 16.306. Current RTT: 100/25. 16.706 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.706 (Probe is an initial retransmit) 16.706 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.507/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.706 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.707 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.507/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.707 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.740 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 16.740 <- (2) Packet I|1|L|48|1 Token=[] AckFrame[3-2|Δ0] 16.740 probe count not reset on ack because handshake not yet confirmed 16.741 Retransmitting CryptoFrame[0,257] on level Initial 16.741 Cwnd(-): 6000; inflight: 0 16.741 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 17.541/Initial, because peerAwaitingAddressValidation | RTT:100/25 16.741 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 17.125/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 16.741 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.124 loss detection timeout handler running Sending probe 2, because no ack since 16.741. Current RTT: 32/16. 17.124 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.124 (Probe is an initial retransmit) 17.125 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 17.893/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.125 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.126 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 767 millis, based on 17.894/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.126 -> Packet PI|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.341 Discarding packet (773 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 17.341 Discarding packet (773 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 17.893 loss detection timeout handler running Sending probe 3, because no ack since 17.126. Current RTT: 32/16. 17.893 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.893 (Probe is an initial retransmit) 17.893 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1535 millis, based on 19.429/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.893 -> Packet PI|7|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.894 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1535 millis, based on 19.430/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.894 -> Packet PI|8|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.925 <- (5) Packet I|5|L|52|1 Token=[] AckFrame[7,5,3-2|Δ0] 17.926 probe count not reset on ack because handshake not yet confirmed 17.930 Cwnd(+): 6470 (CongestionAvoidance); inflight: 6000 17.930 Retransmitting CryptoFrame[0,257] on level Initial 17.930 Cwnd(-): 3235; inflight: 1200 17.930 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1535 millis, based on 19.466/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 17.930 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 19.210/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 17.930 -> Packet I|9|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[1|Δ0] Padding(891) 17.962 <- (6) Packet I|6|L|52|1 Token=[] AckFrame[9,7,5|Δ0] 17.962 probe count not reset on ack because handshake not yet confirmed 17.963 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1279 millis, based on 19.243/Initial, because peerAwaitingAddressValidation | RTT:32/12 17.963 <- (7) Packet I|7|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 17.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 67 millis, based on 18.034/Handshake, because peerAwaitingAddressValidation | RTT:32/9 17.966 Discarding pn space Initial because first Handshake message is being sent 17.966 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 17.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 67 millis, based on 18.034/Handshake, because peerAwaitingAddressValidation | RTT:32/9 17.966 -> Packet I|10|L|1201|2 Token=[] AckFrame[7-5|Δ0] Padding(1153) 17.965 <- (9) Packet H|4|L|773|1 CryptoFrame[0,727] 17.966 - unknown transport parameter 0x00b6, size 0 17.966 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 17.966 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 17.969 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 67 millis, based on 18.037/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 17.969 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.969 Starting downloading https://server4:443/jepylbbmyl at 54:08.207 on ClientConnection[0add8f861e1e5c0a/fb8f620f755294d9(V1) with server4/193.167.100.100:443] 17.969 -> Packet H|1|L|46|1 AckFrame[4|Δ0] 17.970 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 67 millis, based on 18.038/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/9 17.970 -> Packet A|0|S0|f861449a2b760ccb|47|1 StreamFrame[0(CIB),0,17,fin] 18.000 <- (10) Packet A|1|S0|fb8f620f755294d9|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 18.001 State is set to Confirmed reschedule loss detection timer for PTO over 36 millis, based on 18.037/Handshake, because ackElicitingInFlight | RTT:32/9 reschedule loss detection timer for PTO over 61 millis, based on 18.063/App, because ackElicitingInFlight | RTT:32/9 18.001 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 18.020 -> Packet A|1|S0|f861449a2b760ccb|32|1 AckFrame[1|Δ19] 18.062 loss detection timeout handler running Sending probe 0, because no ack since 17.970. Current RTT: 32/9. 18.062 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 185 millis, based on 18.248/App, because ackElicitingInFlight | RTT:32/9 18.062 -> Packet PA|2|S0|f861449a2b760ccb|47|1 StreamFrame[0(CIB),0,17,fin] 18.094 <- (11) Packet A|3|S0|fb8f620f755294d9|1054|1 StreamFrame[0(CIB),0,1024] 18.094 <- (12) Packet A|4|S0|fb8f620f755294d9|31|1 StreamFrame[0(CIB),1024,0,fin] 18.095 Finished downloading https://server4:443/jepylbbmyl at 54:08.333 on ClientConnection[0add8f861e1e5c0a/fb8f620f755294d9(V1) with server4/193.167.100.100:443] 18.095 Closing ClientConnection[0add8f861e1e5c0a/fb8f620f755294d9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.095 -> Packet A|3|S0|f861449a2b760ccb|33|1 AckFrame[4-3,1|Δ0] 18.096 -> Packet A|4|S0|f861449a2b760ccb|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1|Δ0] 18.096 Creating connection with server4:443 with v1 18.097 Setting up connection for downloading https://server4:443/wxsnwugslr at 54:08.334 on ClientConnection[047f03e8a0471702/63d23269adde167e(V1) with server4/193.167.100.100:443] 18.097 Original destination connection id: 047f03e8a0471702 (scid: 63d23269adde167e) >- CryptoStream[I|ClientHello] 18.098 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.298/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.098 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.119 <- (13) Packet A|5|S0|fb8f620f755294d9|32|1 AckFrame[2-1|Δ25] 18.119 -> Packet A|5|S0|f861449a2b760ccb|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1|Δ0] 18.126 <- (14) Packet A|6|S0|fb8f620f755294d9|37|2 AckFrame[4,2-1|Δ0] ConnectionCloseFrame[0|0|] 18.297 loss detection timeout handler running Sending probe 0, because no ack since 18.098. Current RTT: 100/25. 18.297 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.297 (Probe is an initial retransmit) 18.298 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.698/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.298 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.697 loss detection timeout handler running Sending probe 1, because no ack since 18.298. Current RTT: 100/25. 18.697 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.697 (Probe is an initial retransmit) 18.698 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.498/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.698 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.699 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.499/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.699 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.731 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 18.731 probe count not reset on ack because handshake not yet confirmed 18.731 Retransmitting CryptoFrame[0,257] on level Initial 18.732 Cwnd(-): 6000; inflight: 1200 18.732 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.532/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.732 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 19.120/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.732 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 18.731 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 18.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 19.122/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.734 - unknown transport parameter 0x00b6, size 0 18.734 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 18.734 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 18.734 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 18.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 19.125/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.737 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.737 Starting downloading https://server4:443/wxsnwugslr at 54:08.975 on ClientConnection[047f03e8a0471702/63d23269adde167e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 18.834/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.737 Discarding pn space Initial because first Handshake message is being sent 18.731 <- (2) Packet A|0|S0|63d23269adde167e|54|1 NewConnectionIdFrame[1,<0|c3a761548ac25228|3dab89909dfe92c9404a463bb0b81788] 18.738 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 18.835/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.738 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|fcba2e86e456b140|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 18.768 <- (3) Packet A|1|S0|63d23269adde167e|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 18.768 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 18.834/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 18.860/App, because ackElicitingInFlight | RTT:33/16 18.768 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 18.769 <- (4) Packet A|2|S0|63d23269adde167e|1054|1 StreamFrame[0(CIB),0,1024] 18.769 <- (5) Packet A|3|S0|63d23269adde167e|31|1 StreamFrame[0(CIB),1024,0,fin] 18.770 -> Packet A|1|S0|fcba2e86e456b140|31|1 AckFrame[2-0|Δ0] 18.770 Finished downloading https://server4:443/wxsnwugslr at 54:09.008 on ClientConnection[047f03e8a0471702/63d23269adde167e(V1) with server4/193.167.100.100:443] 18.770 Closing ClientConnection[047f03e8a0471702/63d23269adde167e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.770 -> Packet A|2|S0|fcba2e86e456b140|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 18.771 Creating connection with server4:443 with v1 18.771 Setting up connection for downloading https://server4:443/rsvrdynpra at 54:09.009 on ClientConnection[cee1e38e6db4e47d/3e39d7c304b67a67(V1) with server4/193.167.100.100:443] 18.771 Original destination connection id: cee1e38e6db4e47d (scid: 3e39d7c304b67a67) >- CryptoStream[I|ClientHello] 18.773 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.973/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.773 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.801 <- (6) Packet A|5|S0|63d23269adde167e|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 18.806 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18.806 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.006/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.806 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 18.809 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 18.905/Handshake, because peerAwaitingAddressValidation | RTT:32/16 18.809 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 18.809 - unknown transport parameter 0x00b6, size 0 18.809 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 18.809 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 18.811 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 18.907/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.811 -> Packet H|0|L|80|1 CryptoFrame[0,36] 18.811 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 18.907/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 18.811 Starting downloading https://server4:443/rsvrdynpra at 54:09.049 on ClientConnection[cee1e38e6db4e47d/3e39d7c304b67a67(V1) with server4/193.167.100.100:443] 18.811 Discarding pn space Initial because first Handshake message is being sent 18.811 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 18.806 <- (2) Packet A|0|S0|3e39d7c304b67a67|54|1 NewConnectionIdFrame[1,<0|ca8a09951960ce0d|34c29f5e2ae14b60a48faf1d54141443] 18.812 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 18.908/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 18.812 -> Packet A|0|S0|190c6b867e2b53a2|47|1 StreamFrame[0(CIB),0,17,fin] 18.831 -> Packet A|1|S0|190c6b867e2b53a2|32|1 AckFrame[0|Δ19] 18.842 <- (3) Packet A|1|S0|3e39d7c304b67a67|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 18.843 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 18.907/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 18.933/App, because ackElicitingInFlight | RTT:32/16 18.843 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 18.863 -> Packet A|2|S0|190c6b867e2b53a2|32|1 AckFrame[1-0|Δ19] 18.869 <- (4) Packet A|4|S0|3e39d7c304b67a67|32|1 AckFrame[1-0|Δ7] 18.870 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.017 <- (5) Packet A|5|S0|3e39d7c304b67a67|30|2 PingFrame[] Padding(3) 19.037 -> Packet A|3|S0|190c6b867e2b53a2|34|1 AckFrame[5-4,1|Δ19] 19.225 <- (6) Packet A|8|S0|3e39d7c304b67a67|30|2 PingFrame[] Padding(3) 19.225 <- (7) Packet A|9|S0|3e39d7c304b67a67|30|2 PingFrame[] Padding(3) 19.225 -> Packet A|4|S0|190c6b867e2b53a2|35|1 AckFrame[9-8,5-4,1|Δ0] 19.415 <- (8) Packet A|12|S0|3e39d7c304b67a67|30|2 PingFrame[] Padding(3) 19.435 -> Packet A|5|S0|190c6b867e2b53a2|38|1 AckFrame[12,9-8,5-4,1|Δ19] 19.467 <- (9) Packet A|13|S0|3e39d7c304b67a67|1054|1 StreamFrame[0(CIB),0,1024,fin] 19.468 Finished downloading https://server4:443/rsvrdynpra at 54:09.705 on ClientConnection[cee1e38e6db4e47d/3e39d7c304b67a67(V1) with server4/193.167.100.100:443] 19.468 Closing ClientConnection[cee1e38e6db4e47d/3e39d7c304b67a67(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.468 -> Packet A|6|S0|190c6b867e2b53a2|41|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,9-8,5-4,1|Δ0] 19.468 Creating connection with server4:443 with v1 19.469 Setting up connection for downloading https://server4:443/aylgxsizap at 54:09.707 on ClientConnection[07fff1a9a15644d4/6c7ec12172ca64a8(V1) with server4/193.167.100.100:443] 19.469 Original destination connection id: 07fff1a9a15644d4 (scid: 6c7ec12172ca64a8) >- CryptoStream[I|ClientHello] 19.470 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.670/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.470 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.499 <- (10) Packet A|14|S0|3e39d7c304b67a67|35|2 AckFrame[6-2|Δ0] ConnectionCloseFrame[0|0|] 19.503 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.504 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.704/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.503 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 19.506 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.603/Handshake, because peerAwaitingAddressValidation | RTT:33/16 19.506 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 19.506 - unknown transport parameter 0x00b6, size 0 19.506 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 19.506 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 19.509 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.606/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.508 -> Packet H|0|L|80|1 CryptoFrame[0,36] 19.509 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.606/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.509 Discarding pn space Initial because first Handshake message is being sent 19.509 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 19.509 Starting downloading https://server4:443/aylgxsizap at 54:09.747 on ClientConnection[07fff1a9a15644d4/6c7ec12172ca64a8(V1) with server4/193.167.100.100:443] 19.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.607/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.509 -> Packet A|0|S0|3c1eca1ff073b95f|47|1 StreamFrame[0(CIB),0,17,fin] 19.541 <- (2) Packet A|2|S0|6c7ec12172ca64a8|1054|1 StreamFrame[0(CIB),0,1024] 19.561 -> Packet A|1|S0|3c1eca1ff073b95f|32|1 AckFrame[2|Δ19] 19.566 <- (3) Packet A|4|S0|6c7ec12172ca64a8|32|1 AckFrame[0|Δ25] 19.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.663/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.599 <- (4) Packet A|6|S0|6c7ec12172ca64a8|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 19.599 State is set to Confirmed reschedule loss detection timer for PTO over 17 millis, based on 19.616/Handshake, because ackElicitingInFlight | RTT:36/18 19.599 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.599 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 19.619 -> Packet A|2|S0|3c1eca1ff073b95f|36|1 AckFrame[6,4,2|Δ19] 19.783 <- (5) Packet A|10|S0|6c7ec12172ca64a8|54|1 NewConnectionIdFrame[1,<0|7a61c061ea2d9427|5c213aa84ecc4c13adb4134329e1758a] 19.802 -> Packet A|3|S0|3c1eca1ff073b95f|38|1 AckFrame[10,6,4,2|Δ19] 20.044 <- (6) Packet A|12|S0|6c7ec12172ca64a8|54|1 NewConnectionIdFrame[1,<0|7a61c061ea2d9427|5c213aa84ecc4c13adb4134329e1758a] 20.064 -> Packet A|4|S0|3c1eca1ff073b95f|40|1 AckFrame[12,10,6,4,2|Δ19] 20.566 <- (7) Packet A|13|S0|6c7ec12172ca64a8|54|1 NewConnectionIdFrame[1,<0|7a61c061ea2d9427|5c213aa84ecc4c13adb4134329e1758a] 20.566 <- (8) Packet A|14|S0|6c7ec12172ca64a8|54|1 NewConnectionIdFrame[1,<0|7a61c061ea2d9427|5c213aa84ecc4c13adb4134329e1758a] 20.567 -> Packet A|5|S0|3c1eca1ff073b95f|39|1 AckFrame[14-12,10,6,4,2|Δ0] 21.610 <- (9) Packet A|15|S0|6c7ec12172ca64a8|54|1 NewConnectionIdFrame[1,<0|7a61c061ea2d9427|5c213aa84ecc4c13adb4134329e1758a] 21.610 <- (10) Packet A|16|S0|6c7ec12172ca64a8|54|1 NewConnectionIdFrame[1,<0|7a61c061ea2d9427|5c213aa84ecc4c13adb4134329e1758a] 21.610 -> Packet A|6|S0|3c1eca1ff073b95f|39|1 AckFrame[16-12,10,6,4,2|Δ0] 21.641 <- (11) Packet A|17|S0|6c7ec12172ca64a8|31|1 StreamFrame[0(CIB),1024,0,fin] 21.642 Finished downloading https://server4:443/aylgxsizap at 54:11.880 on ClientConnection[07fff1a9a15644d4/6c7ec12172ca64a8(V1) with server4/193.167.100.100:443] 21.642 Closing ClientConnection[07fff1a9a15644d4/6c7ec12172ca64a8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.642 -> Packet A|7|S0|3c1eca1ff073b95f|43|2 ConnectionCloseFrame[0|0|] AckFrame[17-12,10,6,4,2|Δ0] 21.643 Creating connection with server4:443 with v1 21.643 Setting up connection for downloading https://server4:443/wvblovdoyu at 54:11.881 on ClientConnection[5c7a48554ee3d577/386741a0a832b008(V1) with server4/193.167.100.100:443] 21.643 Original destination connection id: 5c7a48554ee3d577 (scid: 386741a0a832b008) >- CryptoStream[I|ClientHello] 21.645 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.845/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.645 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.678 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 21.679 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.879/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 21.678 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 21.681 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.778/Handshake, because peerAwaitingAddressValidation | RTT:33/16 21.681 - unknown transport parameter 0x00b6, size 0 21.681 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 21.682 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 21.682 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 21.684 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.781/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.684 -> Packet H|0|L|80|1 CryptoFrame[0,36] 21.684 Starting downloading https://server4:443/wvblovdoyu at 54:11.922 on ClientConnection[5c7a48554ee3d577/386741a0a832b008(V1) with server4/193.167.100.100:443] 21.684 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 21.684 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 21.782/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.685 Discarding pn space Initial because first Handshake message is being sent 21.685 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.678 <- (2) Packet A|0|S0|386741a0a832b008|54|1 NewConnectionIdFrame[1,<0|3aef52c00ff0611c|6a2fe0d5bdecd51e27e9a8f3d87a3226] reschedule loss detection timer for PTO over 96 millis, based on 21.782/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.685 -> Packet A|0|S0|db78b74db0886a60|47|1 StreamFrame[0(CIB),0,17,fin] 21.704 -> Packet A|1|S0|db78b74db0886a60|32|1 AckFrame[0|Δ19] 21.763 <- (12) Packet A|18|S0|6c7ec12172ca64a8|30|2 PingFrame[] Padding(3) 21.763 <- (13) Packet A|19|S0|6c7ec12172ca64a8|30|2 PingFrame[] Padding(3) 21.764 -> Packet A|8|S0|3c1eca1ff073b95f|43|2 ConnectionCloseFrame[0|0|] AckFrame[17-12,10,6,4,2|Δ0] 21.764 -> Packet A|9|S0|3c1eca1ff073b95f|43|2 ConnectionCloseFrame[0|0|] AckFrame[17-12,10,6,4,2|Δ0] 21.781 loss detection timeout handler running Sending probe 0, because no ack since 21.684. Current RTT: 33/16. 21.781 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.781 (Probe is a handshake retransmit) 21.781 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 21.975/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.781 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 21.812 <- (3) Packet A|1|S0|386741a0a832b008|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 21.812 State is set to Confirmed reschedule loss detection timer for PTO over 116 millis, based on 21.929/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 21.807/App, because ackElicitingInFlight | RTT:33/16 21.813 Discarding pn space Handshake because HandshakeDone is received 21.813 loss detection timeout handler running Sending probe 0, because no ack since 21.685. Current RTT: 33/16. 21.813 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 22.057/App, because ackElicitingInFlight | RTT:33/16 21.813 -> Packet PA|2|S0|db78b74db0886a60|47|1 StreamFrame[0(CIB),0,17,fin] 21.832 -> Packet A|3|S0|db78b74db0886a60|32|1 AckFrame[1-0|Δ19] 21.845 <- (4) Packet A|3|S0|386741a0a832b008|1054|1 StreamFrame[0(CIB),0,1024] 21.864 -> Packet A|4|S0|db78b74db0886a60|34|1 AckFrame[3,1-0|Δ19] 21.870 <- (5) Packet A|5|S0|386741a0a832b008|32|1 AckFrame[3-2|Δ7] 21.871 Cwnd(-): 6000; inflight: 0 21.871 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 21.871 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 21.993/App, because ackElicitingInFlight | RTT:33/16 21.871 -> Packet A|5|S0|db78b74db0886a60|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 21.928 <- (6) Packet A|6|S0|386741a0a832b008|32|1 AckFrame[5-2|Δ26] 21.929 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.236 <- (7) Packet A|9|S0|386741a0a832b008|30|2 PingFrame[] Padding(3) 22.236 <- (8) Packet A|10|S0|386741a0a832b008|30|2 PingFrame[] Padding(3) 22.237 -> Packet A|6|S0|db78b74db0886a60|33|1 AckFrame[10-9,6-5|Δ0] 22.391 <- (9) Packet A|12|S0|386741a0a832b008|30|2 PingFrame[] Padding(3) 22.391 <- (10) Packet A|13|S0|386741a0a832b008|30|2 PingFrame[] Padding(3) 22.392 -> Packet A|7|S0|db78b74db0886a60|35|1 AckFrame[13-12,10-9,6-5|Δ0] 22.637 <- (11) Packet A|14|S0|386741a0a832b008|30|2 PingFrame[] Padding(3) 22.637 <- (12) Packet A|15|S0|386741a0a832b008|30|2 PingFrame[] Padding(3) 22.638 -> Packet A|8|S0|db78b74db0886a60|35|1 AckFrame[15-12,10-9,6-5|Δ0] 22.784 <- (13) Packet A|17|S0|386741a0a832b008|30|2 PingFrame[] Padding(3) 22.804 -> Packet A|9|S0|db78b74db0886a60|38|1 AckFrame[17,15-12,10-9,6-5|Δ19] 22.835 <- (14) Packet A|19|S0|386741a0a832b008|31|1 StreamFrame[0(CIB),1024,0,fin] 22.835 Finished downloading https://server4:443/wvblovdoyu at 54:13.073 on ClientConnection[5c7a48554ee3d577/386741a0a832b008(V1) with server4/193.167.100.100:443] 22.836 Closing ClientConnection[5c7a48554ee3d577/386741a0a832b008(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.836 -> Packet A|10|S0|db78b74db0886a60|43|2 ConnectionCloseFrame[0|0|] AckFrame[19,17,15-12,10-9,6-5|Δ0] 22.836 Creating connection with server4:443 with v1 22.837 Setting up connection for downloading https://server4:443/qdhltcloru at 54:13.074 on ClientConnection[8e3b72e57de206ea/0e76654b2ca018d2(V1) with server4/193.167.100.100:443] 22.837 Original destination connection id: 8e3b72e57de206ea (scid: 0e76654b2ca018d2) >- CryptoStream[I|ClientHello] 22.838 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.038/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.838 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.867 <- (15) Packet A|20|S0|386741a0a832b008|37|2 AckFrame[10-8,6|Δ0] ConnectionCloseFrame[0|0|] 23.037 loss detection timeout handler running Sending probe 0, because no ack since 22.838. Current RTT: 100/25. 23.037 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.037 (Probe is an initial retransmit) 23.038 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.438/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.038 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.172 <- (1) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 23.175 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 23.375/Handshake, because peerAwaitingAddressValidation | RTT:100/25 23.175 Discarding pn space Initial because first Handshake message is being sent 23.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 23.376/Handshake, because peerAwaitingAddressValidation | RTT:100/25 23.175 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 23.375 loss detection timeout handler running 23.375 Sending probe 0. Current RTT: 100/25. 23.375 Sending probe because peer awaiting address validation 23.375 (Probe is a handshake ping) 23.375 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 23.775/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.375 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 23.471 <- (2) Packet H|1|L|772|1 CryptoFrame[0,726] 23.472 - unknown transport parameter 0x00b6, size 0 23.472 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 23.472 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 23.475 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 23.875/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.475 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.475 Starting downloading https://server4:443/qdhltcloru at 54:13.713 on ClientConnection[8e3b72e57de206ea/0e76654b2ca018d2(V1) with server4/193.167.100.100:443] 23.475 -> Packet H|2|L|46|1 AckFrame[1|Δ0] 23.475 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 23.875/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.475 -> Packet A|0|S0|05f77995000b9903|47|1 StreamFrame[0(CIB),0,17,fin] 23.506 <- (3) Packet A|1|S0|0e76654b2ca018d2|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 23.506 State is set to Confirmed reschedule loss detection timer for PTO over 368 millis, based on 23.875/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 23.700/App, because ackElicitingInFlight | RTT:100/25 23.506 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 23.526 -> Packet A|1|S0|05f77995000b9903|32|1 AckFrame[1|Δ19] 23.557 <- (4) Packet A|2|S0|0e76654b2ca018d2|54|1 NewConnectionIdFrame[1,<0|ddb673e177aea16d|77a9979542edc0223d0dce4f168ef53e] 23.577 -> Packet A|2|S0|05f77995000b9903|32|1 AckFrame[2-1|Δ19] 23.700 loss detection timeout handler running Sending probe 0, because no ack since 23.475. Current RTT: 100/25. 23.701 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 24.151/App, because ackElicitingInFlight | RTT:100/25 23.701 -> Packet PA|3|S0|05f77995000b9903|47|1 StreamFrame[0(CIB),0,17,fin] 24.150 loss detection timeout handler running Sending probe 1, because no ack since 23.701. Current RTT: 100/25. 24.150 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 25.051/App, because ackElicitingInFlight | RTT:100/25 24.151 -> Packet PA|4|S0|05f77995000b9903|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 25.052/App, because ackElicitingInFlight | RTT:100/25 24.152 -> Packet PA|5|S0|05f77995000b9903|47|1 StreamFrame[0(CIB),0,17,fin] 24.183 <- (5) Packet A|3|S0|0e76654b2ca018d2|33|1 AckFrame[5,2-1|Δ0] 24.183 Cwnd(-): 6000; inflight: 47 24.183 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 24.183 -> Packet A|6|S0|05f77995000b9903|47|1 StreamFrame[0(CIB),0,17,fin] 24.183 <- (6) Packet A|4|S0|0e76654b2ca018d2|1054|1 StreamFrame[0(CIB),0,1024] 24.184 <- (7) Packet A|5|S0|0e76654b2ca018d2|31|1 StreamFrame[0(CIB),1024,0,fin] 24.184 -> Packet A|7|S0|05f77995000b9903|31|1 AckFrame[5-3|Δ0] 24.184 Finished downloading https://server4:443/qdhltcloru at 54:14.422 on ClientConnection[8e3b72e57de206ea/0e76654b2ca018d2(V1) with server4/193.167.100.100:443] 24.184 Closing ClientConnection[8e3b72e57de206ea/0e76654b2ca018d2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.185 -> Packet A|8|S0|05f77995000b9903|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 24.185 Creating connection with server4:443 with v1 24.186 Setting up connection for downloading https://server4:443/gjaxofyixf at 54:14.424 on ClientConnection[059f51f3f4260c4a/ad16357f9bd33f3d(V1) with server4/193.167.100.100:443] 24.186 Original destination connection id: 059f51f3f4260c4a (scid: ad16357f9bd33f3d) >- CryptoStream[I|ClientHello] 24.188 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.388/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.187 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.216 <- (8) Packet A|6|S0|0e76654b2ca018d2|35|2 AckFrame[8-7|Δ0] ConnectionCloseFrame[0|0|] 24.221 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 24.387 loss detection timeout handler running Sending probe 0, because no ack since 24.187. Current RTT: 100/25. 24.387 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.387 (Probe is an initial retransmit) 24.388 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.788/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.387 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.419 <- (2) Packet I|1|L|48|1 Token=[] AckFrame[1-0|Δ0] 24.420 probe count not reset on ack because handshake not yet confirmed 24.420 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.820/Initial, because peerAwaitingAddressValidation | RTT:100/25 24.523 <- (3) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 24.526 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 24.617/Handshake, because peerAwaitingAddressValidation | RTT:31/15 24.526 Discarding pn space Initial because first Handshake message is being sent 24.526 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.526 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 24.617/Handshake, because peerAwaitingAddressValidation | RTT:31/15 24.526 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 24.559 <- (5) Packet H|2|L|771|1 CryptoFrame[0,725] 24.559 - unknown transport parameter 0x00b6, size 0 24.560 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 24.560 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 24.562 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 24.653/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 24.562 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.563 Starting downloading https://server4:443/gjaxofyixf at 54:14.800 on ClientConnection[059f51f3f4260c4a/ad16357f9bd33f3d(V1) with server4/193.167.100.100:443] 24.563 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 24.563 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 24.654/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 24.563 -> Packet A|0|S0|07e988cb427173d3|47|1 StreamFrame[0(CIB),0,17,fin] 24.595 <- (6) Packet A|2|S0|ad16357f9bd33f3d|1054|1 StreamFrame[0(CIB),0,1024] 24.615 -> Packet A|1|S0|07e988cb427173d3|32|1 AckFrame[2|Δ19] 24.620 <- (7) Packet A|4|S0|ad16357f9bd33f3d|32|1 AckFrame[0|Δ26] 24.621 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 24.712/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 24.645 <- (8) Packet A|5|S0|ad16357f9bd33f3d|54|1 NewConnectionIdFrame[1,<0|61cb219911ecb9ac|c0f10bbe7d932e6945e2d64c2b758ac3] 24.665 -> Packet A|2|S0|07e988cb427173d3|34|1 AckFrame[5-4,2|Δ19] 24.696 <- (9) Packet A|7|S0|ad16357f9bd33f3d|31|1 StreamFrame[0(CIB),1024,0,fin] 24.696 Finished downloading https://server4:443/gjaxofyixf at 54:14.934 on ClientConnection[059f51f3f4260c4a/ad16357f9bd33f3d(V1) with server4/193.167.100.100:443] 24.696 Closing ClientConnection[059f51f3f4260c4a/ad16357f9bd33f3d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.697 -> Packet A|3|S0|07e988cb427173d3|39|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4,2|Δ0] 24.697 Creating connection with server4:443 with v1 24.698 Setting up connection for downloading https://server4:443/lcalowmgnk at 54:14.935 on ClientConnection[e536d6041bab8fdc/748387d617485449(V1) with server4/193.167.100.100:443] 24.698 Original destination connection id: e536d6041bab8fdc (scid: 748387d617485449) >- CryptoStream[I|ClientHello] 24.699 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.899/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.699 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.898 loss detection timeout handler running Sending probe 0, because no ack since 24.699. Current RTT: 100/25. 24.898 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.899 (Probe is an initial retransmit) 24.899 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.299/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.899 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.932 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 24.933 probe count not reset on ack because handshake not yet confirmed 24.933 Retransmitting CryptoFrame[0,257] on level Initial 24.933 Cwnd(-): 6000; inflight: 0 24.933 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.333/Initial, because peerAwaitingAddressValidation | RTT:100/25 24.934 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 25.128/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.933 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 24.932 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 24.936 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 25.130/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.936 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 24.936 - unknown transport parameter 0x00b6, size 0 24.936 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 24.936 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 24.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 25.133/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.939 -> Packet H|0|L|80|1 CryptoFrame[0,36] 24.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.939 Starting downloading https://server4:443/lcalowmgnk at 54:15.177 on ClientConnection[e536d6041bab8fdc/748387d617485449(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 25.036/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.939 Discarding pn space Initial because first Handshake message is being sent 24.939 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 24.932 <- (2) Packet A|0|S0|748387d617485449|54|1 NewConnectionIdFrame[1,<0|613ed429c82f9fad|6c118681d5eb0c0713c9fb30e9e29ed8] 24.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 25.036/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 24.939 -> Packet A|0|S0|30f7440fdc358697|47|1 StreamFrame[0(CIB),0,17,fin] 24.959 -> Packet A|1|S0|30f7440fdc358697|32|1 AckFrame[0|Δ19] 25.036 loss detection timeout handler running Sending probe 0, because no ack since 24.939. Current RTT: 33/16. 25.036 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.036 (Probe is a handshake retransmit) 25.036 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 25.230/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 25.036 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 25.067 <- (3) Packet A|1|S0|748387d617485449|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 25.068 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 25.183/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 25.061/App, because ackElicitingInFlight | RTT:33/16 25.068 Discarding pn space Handshake because HandshakeDone is received 25.068 loss detection timeout handler running Sending probe 0, because no ack since 24.939. Current RTT: 33/16. 25.068 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 25.312/App, because ackElicitingInFlight | RTT:33/16 25.068 -> Packet PA|2|S0|30f7440fdc358697|47|1 StreamFrame[0(CIB),0,17,fin] 25.088 -> Packet A|3|S0|30f7440fdc358697|32|1 AckFrame[1-0|Δ19] 25.100 <- (4) Packet A|2|S0|748387d617485449|1054|1 StreamFrame[0(CIB),0,1024] 25.100 <- (5) Packet A|3|S0|748387d617485449|31|1 StreamFrame[0(CIB),1024,0,fin] 25.101 -> Packet A|4|S0|30f7440fdc358697|31|1 AckFrame[3-0|Δ0] 25.101 Finished downloading https://server4:443/lcalowmgnk at 54:15.339 on ClientConnection[e536d6041bab8fdc/748387d617485449(V1) with server4/193.167.100.100:443] 25.101 Closing ClientConnection[e536d6041bab8fdc/748387d617485449(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.102 -> Packet A|5|S0|30f7440fdc358697|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 25.102 Creating connection with server4:443 with v1 25.102 Setting up connection for downloading https://server4:443/rpmozrynvw at 54:15.340 on ClientConnection[a67820efa3f94703/a6fd3767ca056621(V1) with server4/193.167.100.100:443] 25.103 Original destination connection id: a67820efa3f94703 (scid: a6fd3767ca056621) >- CryptoStream[I|ClientHello] 25.104 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.304/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.104 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.125 <- (6) Packet A|4|S0|748387d617485449|32|1 AckFrame[3-2|Δ6] 25.125 -> Packet A|6|S0|30f7440fdc358697|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 25.137 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 25.137 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.337/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 25.137 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,725] Padding(254) 25.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 25.236/Handshake, because peerAwaitingAddressValidation | RTT:32/16 25.140 - unknown transport parameter 0x00b6, size 0 25.140 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 25.140 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 25.140 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 25.142 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 25.238/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 25.142 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.142 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.143 Starting downloading https://server4:443/rpmozrynvw at 54:15.380 on ClientConnection[a67820efa3f94703/a6fd3767ca056621(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 25.238/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 25.143 Discarding pn space Initial because first Handshake message is being sent 25.137 <- (2) Packet A|0|S0|a6fd3767ca056621|54|1 NewConnectionIdFrame[1,<0|325e1b64d09f555e|d505685341647895cc2b8574137fb106] 25.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 25.239/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 25.143 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|1fea3b774005b578|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0]] 25.173 <- (3) Packet A|1|S0|a6fd3767ca056621|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 25.174 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 25.238/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 25.264/App, because ackElicitingInFlight | RTT:32/16 25.174 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 25.175 <- (4) Packet A|2|S0|a6fd3767ca056621|1054|1 StreamFrame[0(CIB),0,1024] 25.175 -> Packet A|1|S0|1fea3b774005b578|31|1 AckFrame[2-0|Δ0] 25.200 <- (5) Packet A|4|S0|a6fd3767ca056621|32|1 AckFrame[0|Δ26] 25.201 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 25.300 <- (6) Packet A|5|S0|a6fd3767ca056621|30|2 PingFrame[] Padding(3) 25.300 <- (7) Packet A|6|S0|a6fd3767ca056621|30|2 PingFrame[] Padding(3) 25.301 -> Packet A|2|S0|1fea3b774005b578|33|1 AckFrame[6-4,2-1|Δ0] 25.447 <- (8) Packet A|8|S0|a6fd3767ca056621|30|2 PingFrame[] Padding(3) 25.447 <- (9) Packet A|9|S0|a6fd3767ca056621|30|2 PingFrame[] Padding(3) 25.448 -> Packet A|3|S0|1fea3b774005b578|35|1 AckFrame[9-8,6-4,2-1|Δ0] 25.676 <- (10) Packet A|10|S0|a6fd3767ca056621|30|2 PingFrame[] Padding(3) 25.676 <- (11) Packet A|11|S0|a6fd3767ca056621|30|2 PingFrame[] Padding(3) 25.677 -> Packet A|4|S0|1fea3b774005b578|35|1 AckFrame[11-8,6-4,2-1|Δ0] 25.708 <- (12) Packet A|12|S0|a6fd3767ca056621|31|1 StreamFrame[0(CIB),1024,0,fin] 25.708 Finished downloading https://server4:443/rpmozrynvw at 54:15.946 on ClientConnection[a67820efa3f94703/a6fd3767ca056621(V1) with server4/193.167.100.100:443] 25.708 Closing ClientConnection[a67820efa3f94703/a6fd3767ca056621(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.709 -> Packet A|5|S0|1fea3b774005b578|39|2 ConnectionCloseFrame[0|0|] AckFrame[12-8,6-4,2-1|Δ0] 25.709 Creating connection with server4:443 with v1 25.709 Setting up connection for downloading https://server4:443/mgqbtexohl at 54:15.947 on ClientConnection[41445c44766a9224/d49d37fe4e09d40d(V1) with server4/193.167.100.100:443] 25.709 Original destination connection id: 41445c44766a9224 (scid: d49d37fe4e09d40d) >- CryptoStream[I|ClientHello] 25.711 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.911/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.710 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.739 <- (13) Packet A|13|S0|a6fd3767ca056621|37|2 AckFrame[5-4,2-1|Δ0] ConnectionCloseFrame[0|0|] 25.910 loss detection timeout handler running Sending probe 0, because no ack since 25.710. Current RTT: 100/25. 25.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.910 (Probe is an initial retransmit) 25.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 26.311/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.910 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.045 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 26.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 26.249/Handshake, because peerAwaitingAddressValidation | RTT:100/25 26.049 Discarding pn space Initial because first Handshake message is being sent 26.049 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 26.249/Handshake, because peerAwaitingAddressValidation | RTT:100/25 26.049 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 26.081 <- (3) Packet H|1|L|771|1 CryptoFrame[0,725] 26.082 - unknown transport parameter 0x00b6, size 0 26.082 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 26.082 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 26.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 26.285/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.085 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.085 Starting downloading https://server4:443/mgqbtexohl at 54:16.323 on ClientConnection[41445c44766a9224/d49d37fe4e09d40d(V1) with server4/193.167.100.100:443] 26.082 <- (4) Packet H|2|L|771|1 CryptoFrame[0,725] 26.085 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.086 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 26.286/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.086 -> [Packet H|2|L|46|1 AckFrame[2-1|Δ0], Packet A|0|S0|a0c7326511f1a462|47|1 StreamFrame[0(CIB),0,17,fin]] 26.116 <- (5) Packet A|1|S0|d49d37fe4e09d40d|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 26.117 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 26.285/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 26.311/App, because ackElicitingInFlight | RTT:100/25 26.117 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 26.136 -> Packet A|1|S0|a0c7326511f1a462|32|1 AckFrame[1|Δ19] 26.310 loss detection timeout handler running Sending probe 0, because no ack since 26.086. Current RTT: 100/25. 26.310 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 26.760/App, because ackElicitingInFlight | RTT:100/25 26.310 -> Packet PA|2|S0|a0c7326511f1a462|47|1 StreamFrame[0(CIB),0,17,fin] 26.341 <- (6) Packet A|2|S0|d49d37fe4e09d40d|31|1 AckFrame[2|Δ0] 26.342 Cwnd(-): 6000; inflight: 0 26.342 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 26.342 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 114 millis, based on 26.457/App, because ackElicitingInFlight | RTT:30/15 26.342 -> Packet A|3|S0|a0c7326511f1a462|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 26.456 loss detection timeout handler running Sending probe 0, because no ack since 26.342. Current RTT: 30/15. 26.457 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 229 millis, based on 26.687/App, because ackElicitingInFlight | RTT:30/15 26.457 -> Packet PA|4|S0|a0c7326511f1a462|47|1 StreamFrame[0(CIB),0,17,fin] 26.488 <- (7) Packet A|5|S0|d49d37fe4e09d40d|33|1 AckFrame[4,2|Δ0] 26.489 Cwnd(-): 3000; inflight: 0 26.489 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 26.489 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 102 millis, based on 26.592/App, because ackElicitingInFlight | RTT:30/12 26.489 -> Packet A|5|S0|a0c7326511f1a462|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2-1|Δ0] 26.591 loss detection timeout handler running Sending probe 0, because no ack since 26.489. Current RTT: 30/12. 26.591 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 205 millis, based on 26.798/App, because ackElicitingInFlight | RTT:30/12 26.592 -> Packet PA|6|S0|a0c7326511f1a462|47|1 StreamFrame[0(CIB),0,17,fin] 26.609 <- (8) Packet A|6|S0|d49d37fe4e09d40d|54|1 NewConnectionIdFrame[1,<0|141ab85f8dd422fa|4e380c46c73228d69b081de7affe5c6b] 26.610 <- (9) Packet A|7|S0|d49d37fe4e09d40d|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 26.610 -> Packet A|7|S0|a0c7326511f1a462|33|1 AckFrame[7-5,2-1|Δ0] 26.642 <- (10) Packet A|9|S0|d49d37fe4e09d40d|1054|1 StreamFrame[0(CIB),0,1024,fin] 26.642 Finished downloading https://server4:443/mgqbtexohl at 54:16.880 on ClientConnection[41445c44766a9224/d49d37fe4e09d40d(V1) with server4/193.167.100.100:443] 26.642 Closing ClientConnection[41445c44766a9224/d49d37fe4e09d40d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.643 -> Packet A|8|S0|a0c7326511f1a462|39|2 ConnectionCloseFrame[0|0|] AckFrame[9,7-5,2-1|Δ0] 26.643 Creating connection with server4:443 with v1 26.644 Setting up connection for downloading https://server4:443/jxikixusbz at 54:16.882 on ClientConnection[b312696ff9039e44/b4b1648fd4e54177(V1) with server4/193.167.100.100:443] 26.644 Original destination connection id: b312696ff9039e44 (scid: b4b1648fd4e54177) >- CryptoStream[I|ClientHello] 26.645 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.845/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.645 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.845 loss detection timeout handler running Sending probe 0, because no ack since 26.645. Current RTT: 100/25. 26.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.845 (Probe is an initial retransmit) 26.845 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.245/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.845 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.879 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 27.180 <- (2) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 27.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 27.383/Handshake, because peerAwaitingAddressValidation | RTT:100/25 27.183 Discarding pn space Initial because first Handshake message is being sent 27.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 27.383/Handshake, because peerAwaitingAddressValidation | RTT:100/25 27.183 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 27.383 loss detection timeout handler running 27.383 Sending probe 0. Current RTT: 100/25. 27.383 Sending probe because peer awaiting address validation 27.383 (Probe is a handshake ping) 27.383 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 27.783/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.383 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 27.414 <- (3) Packet H|1|L|47|1 AckFrame[0|Δ0] 27.415 probe count not reset on ack because handshake not yet confirmed 27.415 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.478 <- (4) Packet H|2|L|771|1 CryptoFrame[0,725] 27.479 - unknown transport parameter 0x00b6, size 0 27.479 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 27.479 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 181 millis, based on 27.663/Handshake, because ackElicitingInFlight | RTT:31/15 27.481 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.482 Starting downloading https://server4:443/jxikixusbz at 54:17.719 on ClientConnection[b312696ff9039e44/b4b1648fd4e54177(V1) with server4/193.167.100.100:443] 27.479 <- (5) Packet H|3|L|771|1 CryptoFrame[0,725] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.482 -> Packet H|2|L|46|1 AckFrame[2-1|Δ0] 27.482 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 180 millis, based on 27.663/Handshake, because ackElicitingInFlight | RTT:31/15 27.482 -> [Packet H|3|L|46|1 AckFrame[3-1|Δ0], Packet A|0|S0|55ca1f82ee936023|47|1 StreamFrame[0(CIB),0,17,fin]] 27.514 <- (6) Packet A|2|S0|b4b1648fd4e54177|1054|1 StreamFrame[0(CIB),0,1024] 27.514 <- (7) Packet A|3|S0|b4b1648fd4e54177|31|1 StreamFrame[0(CIB),1024,0,fin] 27.515 Finished downloading https://server4:443/jxikixusbz at 54:17.753 on ClientConnection[b312696ff9039e44/b4b1648fd4e54177(V1) with server4/193.167.100.100:443] 27.515 Closing ClientConnection[b312696ff9039e44/b4b1648fd4e54177(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.515 -> Packet A|1|S0|55ca1f82ee936023|31|1 AckFrame[3-2|Δ0] 27.516 -> Packet A|2|S0|55ca1f82ee936023|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 27.516 Creating connection with server4:443 with v1 27.516 Setting up connection for downloading https://server4:443/kyufpnyjuz at 54:17.754 on ClientConnection[e15500dad3b403eb/5b9e5cb2208065d4(V1) with server4/193.167.100.100:443] 27.516 Original destination connection id: e15500dad3b403eb (scid: 5b9e5cb2208065d4) >- CryptoStream[I|ClientHello] 27.518 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.718/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.518 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.539 <- (8) Packet A|4|S0|b4b1648fd4e54177|32|1 AckFrame[0|Δ26] 27.540 -> Packet A|3|S0|55ca1f82ee936023|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 27.546 <- (9) Packet A|5|S0|b4b1648fd4e54177|54|1 NewConnectionIdFrame[1,<0|6974a38c4ddbcac1|419fa8c74c9af9bd9ebbc819907601ad] 27.546 -> Packet A|4|S0|55ca1f82ee936023|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 27.551 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 27.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.751/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.551 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 27.554 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 27.650/Handshake, because peerAwaitingAddressValidation | RTT:32/16 27.554 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 27.554 - unknown transport parameter 0x00b6, size 0 27.554 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 27.554 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 27.653/Handshake, because peerAwaitingAddressValidation | RTT:32/16 27.557 Discarding pn space Initial because first Handshake message is being sent 27.557 Starting downloading https://server4:443/kyufpnyjuz at 54:17.794 on ClientConnection[e15500dad3b403eb/5b9e5cb2208065d4(V1) with server4/193.167.100.100:443] 27.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 27.653/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.557 -> Packet H|0|L|80|1 CryptoFrame[0,36] 27.551 <- (2) Packet A|0|S0|5b9e5cb2208065d4|54|1 NewConnectionIdFrame[1,<0|dffe119f4968171b|b33f4580df71b7109c3a8b5b3b8d3eb9] 27.557 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 27.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 27.653/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.557 -> Packet A|0|S0|87bcf8fcfda4d9b4|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 27.588 <- (3) Packet A|1|S0|5b9e5cb2208065d4|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 27.588 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 27.653/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 27.678/App, because ackElicitingInFlight | RTT:32/16 27.589 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 27.608 -> Packet A|1|S0|87bcf8fcfda4d9b4|32|1 AckFrame[1-0|Δ19] 27.678 loss detection timeout handler running Sending probe 0, because no ack since 27.557. Current RTT: 32/16. 27.678 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 27.920/App, because ackElicitingInFlight | RTT:32/16 27.678 -> Packet PA|2|S0|87bcf8fcfda4d9b4|47|1 StreamFrame[0(CIB),0,17,fin] 27.920 loss detection timeout handler running Sending probe 1, because no ack since 27.678. Current RTT: 32/16. 27.920 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 28.404/App, because ackElicitingInFlight | RTT:32/16 27.920 -> Packet PA|3|S0|87bcf8fcfda4d9b4|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 28.405/App, because ackElicitingInFlight | RTT:32/16 27.921 -> Packet PA|4|S0|87bcf8fcfda4d9b4|47|1 StreamFrame[0(CIB),0,17,fin] 27.952 <- (4) Packet A|2|S0|5b9e5cb2208065d4|33|1 AckFrame[4,1|Δ0] 27.953 Cwnd(-): 6000; inflight: 47 27.953 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 27.953 -> Packet A|5|S0|87bcf8fcfda4d9b4|47|1 StreamFrame[0(CIB),0,17,fin] 27.953 <- (5) Packet A|3|S0|5b9e5cb2208065d4|1054|1 StreamFrame[0(CIB),0,1024] 27.956 loss detection timeout handler running 27.956 loss detection timeout handler running 27.956 loss detection timeout handler running reschedule loss detection timer for PTO over 105 millis, based on 28.062/App, because ackElicitingInFlight | RTT:32/13 27.973 -> Packet A|6|S0|87bcf8fcfda4d9b4|32|1 AckFrame[3-2|Δ20] 28.010 <- (6) Packet A|5|S0|5b9e5cb2208065d4|32|1 AckFrame[6-5|Δ6] 28.011 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.084 <- (7) Packet A|7|S0|5b9e5cb2208065d4|30|2 PingFrame[] Padding(3) 28.104 -> Packet A|7|S0|87bcf8fcfda4d9b4|34|1 AckFrame[7,5|Δ19] 28.135 <- (8) Packet A|8|S0|5b9e5cb2208065d4|31|1 StreamFrame[0(CIB),1024,0,fin] 28.135 Finished downloading https://server4:443/kyufpnyjuz at 54:18.373 on ClientConnection[e15500dad3b403eb/5b9e5cb2208065d4(V1) with server4/193.167.100.100:443] 28.135 Closing ClientConnection[e15500dad3b403eb/5b9e5cb2208065d4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.136 -> Packet A|8|S0|87bcf8fcfda4d9b4|37|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5|Δ0] 28.136 Creating connection with server4:443 with v1 28.137 Setting up connection for downloading https://server4:443/seuaseaekx at 54:18.374 on ClientConnection[550666e5660d44cc/a72a7ae57af5783a(V1) with server4/193.167.100.100:443] 28.137 Original destination connection id: 550666e5660d44cc (scid: a72a7ae57af5783a) >- CryptoStream[I|ClientHello] 28.138 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.338/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.138 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.167 <- (9) Packet A|9|S0|5b9e5cb2208065d4|35|2 AckFrame[8-7|Δ0] ConnectionCloseFrame[0|0|] 28.171 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 28.172 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.372/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 28.171 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 28.174 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 28.270/Handshake, because peerAwaitingAddressValidation | RTT:32/16 28.174 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 28.174 - unknown transport parameter 0x00b6, size 0 28.174 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 28.174 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 28.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 28.272/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.176 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 28.273/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.177 Discarding pn space Initial because first Handshake message is being sent 28.177 Starting downloading https://server4:443/seuaseaekx at 54:18.415 on ClientConnection[550666e5660d44cc/a72a7ae57af5783a(V1) with server4/193.167.100.100:443] 28.177 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 28.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 28.273/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 28.177 -> Packet A|0|S0|70675bc66d619866|47|1 StreamFrame[0(CIB),0,17,fin] 28.209 <- (2) Packet A|2|S0|a72a7ae57af5783a|1054|1 StreamFrame[0(CIB),0,1024] 28.209 <- (3) Packet A|3|S0|a72a7ae57af5783a|31|1 StreamFrame[0(CIB),1024,0,fin] 28.210 Finished downloading https://server4:443/seuaseaekx at 54:18.448 on ClientConnection[550666e5660d44cc/a72a7ae57af5783a(V1) with server4/193.167.100.100:443] 28.210 Closing ClientConnection[550666e5660d44cc/a72a7ae57af5783a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.210 -> Packet A|1|S0|70675bc66d619866|31|1 AckFrame[3-2|Δ0] 28.210 -> Packet A|2|S0|70675bc66d619866|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 28.211 Creating connection with server4:443 with v1 28.211 Setting up connection for downloading https://server4:443/fsxnghfiwc at 54:18.449 on ClientConnection[a2dc331a248f1733/a155e227c767b966(V1) with server4/193.167.100.100:443] 28.211 Original destination connection id: a2dc331a248f1733 (scid: a155e227c767b966) >- CryptoStream[I|ClientHello] 28.213 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.413/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.213 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.234 <- (4) Packet A|4|S0|a72a7ae57af5783a|32|1 AckFrame[0|Δ26] 28.235 -> Packet A|3|S0|70675bc66d619866|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 28.241 <- (5) Packet A|5|S0|a72a7ae57af5783a|54|1 NewConnectionIdFrame[1,<0|a27d04979255962f|19068713e4675346f956c76d5d526603] 28.241 -> Packet A|4|S0|70675bc66d619866|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 28.412 loss detection timeout handler running Sending probe 0, because no ack since 28.213. Current RTT: 100/25. 28.412 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.412 (Probe is an initial retransmit) 28.413 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.813/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.413 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.446 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 28.447 probe count not reset on ack because handshake not yet confirmed 28.447 Retransmitting CryptoFrame[0,257] on level Initial 28.447 Cwnd(-): 6000; inflight: 0 28.447 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.847/Initial, because peerAwaitingAddressValidation | RTT:100/25 28.447 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 28.641/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.447 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 28.446 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 28.449 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 28.643/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.449 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 28.449 - unknown transport parameter 0x00b6, size 0 28.450 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 28.450 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 28.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 28.646/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.452 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.452 Starting downloading https://server4:443/fsxnghfiwc at 54:18.690 on ClientConnection[a2dc331a248f1733/a155e227c767b966(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 28.549/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.452 Discarding pn space Initial because first Handshake message is being sent 28.452 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 28.446 <- (2) Packet A|0|S0|a155e227c767b966|54|1 NewConnectionIdFrame[1,<0|6928cf9daa6ff7f5|0ae6781d22b466cec9810c5c9582bb45] 28.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.549/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.452 -> Packet A|0|S0|6d1d77ec6cc81e3f|47|1 StreamFrame[0(CIB),0,17,fin] 28.472 -> Packet A|1|S0|6d1d77ec6cc81e3f|32|1 AckFrame[0|Δ19] 28.479 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 28.549 loss detection timeout handler running Sending probe 0, because no ack since 28.452. Current RTT: 33/16. 28.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.549 (Probe is a handshake retransmit) 28.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 28.743/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.549 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 28.580 <- (4) Packet A|1|S0|a155e227c767b966|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 28.581 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 28.696/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 28.574/App, because ackElicitingInFlight | RTT:33/16 28.581 loss detection timeout handler running 28.581 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 28.452. Current RTT: 33/16. 28.581 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 28.825/App, because ackElicitingInFlight | RTT:33/16 28.581 -> Packet PA|2|S0|6d1d77ec6cc81e3f|47|1 StreamFrame[0(CIB),0,17,fin] 28.601 -> Packet A|3|S0|6d1d77ec6cc81e3f|32|1 AckFrame[1-0|Δ19] 28.613 <- (5) Packet A|2|S0|a155e227c767b966|1054|1 StreamFrame[0(CIB),0,1024] 28.613 <- (6) Packet A|3|S0|a155e227c767b966|31|1 StreamFrame[0(CIB),1024,0,fin] 28.614 Finished downloading https://server4:443/fsxnghfiwc at 54:18.852 on ClientConnection[a2dc331a248f1733/a155e227c767b966(V1) with server4/193.167.100.100:443] 28.614 -> Packet A|4|S0|6d1d77ec6cc81e3f|31|1 AckFrame[3-0|Δ0] 28.614 Closing ClientConnection[a2dc331a248f1733/a155e227c767b966(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.614 -> Packet A|5|S0|6d1d77ec6cc81e3f|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 28.615 Creating connection with server4:443 with v1 28.615 Setting up connection for downloading https://server4:443/awvjlsafoo at 54:18.853 on ClientConnection[28ae647c7433f4c2/24219fafd13fa0ba(V1) with server4/193.167.100.100:443] 28.615 Original destination connection id: 28ae647c7433f4c2 (scid: 24219fafd13fa0ba) >- CryptoStream[I|ClientHello] 28.617 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.817/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.617 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.733 <- (7) Packet A|6|S0|a155e227c767b966|30|2 PingFrame[] Padding(3) 28.734 -> Packet A|6|S0|6d1d77ec6cc81e3f|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 28.816 loss detection timeout handler running Sending probe 0, because no ack since 28.617. Current RTT: 100/25. 28.816 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.816 (Probe is an initial retransmit) 28.817 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.217/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.816 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.850 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 28.850 probe count not reset on ack because handshake not yet confirmed 28.851 Retransmitting CryptoFrame[0,257] on level Initial 28.851 Cwnd(-): 6000; inflight: 0 28.851 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.251/Initial, because peerAwaitingAddressValidation | RTT:100/25 28.851 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 29.045/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.851 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 28.854 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.850 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,725] Padding(254) reschedule loss detection timer for PTO over 193 millis, based on 29.048/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.854 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 28.854 - unknown transport parameter 0x00b6, size 0 28.854 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 28.854 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 28.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 29.051/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.857 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.954/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.857 Starting downloading https://server4:443/awvjlsafoo at 54:19.095 on ClientConnection[28ae647c7433f4c2/24219fafd13fa0ba(V1) with server4/193.167.100.100:443] 28.857 Discarding pn space Initial because first Handshake message is being sent 28.857 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 28.850 <- (2) Packet A|0|S0|24219fafd13fa0ba|54|1 NewConnectionIdFrame[1,<0|c8af77bd70cf4786|9f451c7b61c8f0ea204821bd3ae2e87c] 28.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.954/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.857 -> Packet A|0|S0|11c67053f70d83bf|47|1 StreamFrame[0(CIB),0,17,fin] 28.877 -> Packet A|1|S0|11c67053f70d83bf|32|1 AckFrame[0|Δ19] 28.883 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 28.888 <- (4) Packet A|1|S0|24219fafd13fa0ba|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 28.888 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 28.954/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 28.979/App, because ackElicitingInFlight | RTT:33/16 28.888 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 28.908 -> Packet A|2|S0|11c67053f70d83bf|32|1 AckFrame[1-0|Δ19] 28.979 loss detection timeout handler running Sending probe 0, because no ack since 28.857. Current RTT: 33/16. 28.979 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 29.224/App, because ackElicitingInFlight | RTT:33/16 28.980 -> Packet PA|3|S0|11c67053f70d83bf|47|1 StreamFrame[0(CIB),0,17,fin] 29.012 <- (5) Packet A|3|S0|24219fafd13fa0ba|31|1 StreamFrame[0(CIB),1024,0,fin] 29.031 -> Packet A|4|S0|11c67053f70d83bf|34|1 AckFrame[3,1-0|Δ19] 29.036 <- (6) Packet A|4|S0|24219fafd13fa0ba|32|1 AckFrame[3-1|Δ25] 29.036 Cwnd(-): 3000; inflight: 0 29.037 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 29.037 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 132 millis, based on 29.170/App, because ackElicitingInFlight | RTT:36/18 29.037 -> Packet A|5|S0|11c67053f70d83bf|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 29.067 <- (7) Packet A|5|S0|24219fafd13fa0ba|33|1 AckFrame[5,3-1|Δ0] 29.068 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.076 <- (8) Packet A|6|S0|24219fafd13fa0ba|1054|1 StreamFrame[0(CIB),0,1024,fin] 29.077 Finished downloading https://server4:443/awvjlsafoo at 54:19.315 on ClientConnection[28ae647c7433f4c2/24219fafd13fa0ba(V1) with server4/193.167.100.100:443] 29.077 Closing ClientConnection[28ae647c7433f4c2/24219fafd13fa0ba(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.077 -> Packet A|6|S0|11c67053f70d83bf|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-4|Δ0] 29.078 Creating connection with server4:443 with v1 29.078 Setting up connection for downloading https://server4:443/lszjnuhaok at 54:19.316 on ClientConnection[5477767853c0224a/5f1b19f796f4748c(V1) with server4/193.167.100.100:443] 29.078 Original destination connection id: 5477767853c0224a (scid: 5f1b19f796f4748c) >- CryptoStream[I|ClientHello] 29.082 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.282/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.082 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.281 loss detection timeout handler running Sending probe 0, because no ack since 29.082. Current RTT: 100/25. 29.282 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.282 (Probe is an initial retransmit) 29.282 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.682/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.282 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.315 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 29.316 probe count not reset on ack because handshake not yet confirmed 29.316 Retransmitting CryptoFrame[0,257] on level Initial 29.316 Cwnd(-): 6000; inflight: 0 29.316 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.716/Initial, because peerAwaitingAddressValidation | RTT:100/25 29.316 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 29.511/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 29.316 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 29.319 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.315 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) reschedule loss detection timer for PTO over 193 millis, based on 29.513/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 29.319 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 29.320 - unknown transport parameter 0x00b6, size 0 29.320 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 29.320 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 29.322 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 29.516/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 29.322 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.322 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 29.419/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 29.323 Discarding pn space Initial because first Handshake message is being sent 29.322 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 29.323 Starting downloading https://server4:443/lszjnuhaok at 54:19.560 on ClientConnection[5477767853c0224a/5f1b19f796f4748c(V1) with server4/193.167.100.100:443] 29.316 <- (2) Packet A|0|S0|5f1b19f796f4748c|54|1 NewConnectionIdFrame[1,<0|ce2ebd3d7e7db4ca|0b24b62ea801eed9825ab1ba2a694e2a] 29.323 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 29.420/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 29.323 -> Packet A|0|S0|c6076f1780fd5b75|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 29.353 <- (3) Packet A|1|S0|5f1b19f796f4748c|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 29.354 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 29.419/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 29.445/App, because ackElicitingInFlight | RTT:33/16 29.354 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 29.373 -> Packet A|1|S0|c6076f1780fd5b75|32|1 AckFrame[1-0|Δ19] 29.445 loss detection timeout handler running Sending probe 0, because no ack since 29.323. Current RTT: 33/16. 29.445 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 29.689/App, because ackElicitingInFlight | RTT:33/16 29.445 -> Packet PA|2|S0|c6076f1780fd5b75|47|1 StreamFrame[0(CIB),0,17,fin] 29.688 loss detection timeout handler running Sending probe 1, because no ack since 29.445. Current RTT: 33/16. 29.689 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 30.177/App, because ackElicitingInFlight | RTT:33/16 29.689 -> Packet PA|3|S0|c6076f1780fd5b75|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 30.178/App, because ackElicitingInFlight | RTT:33/16 29.690 -> Packet PA|4|S0|c6076f1780fd5b75|47|1 StreamFrame[0(CIB),0,17,fin] 30.177 loss detection timeout handler running Sending probe 2, because no ack since 29.690. Current RTT: 33/16. 30.177 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 975 millis, based on 31.153/App, because ackElicitingInFlight | RTT:33/16 30.177 -> Packet PA|5|S0|c6076f1780fd5b75|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 975 millis, based on 31.154/App, because ackElicitingInFlight | RTT:33/16 30.178 -> Packet PA|6|S0|c6076f1780fd5b75|47|1 StreamFrame[0(CIB),0,17,fin] 30.210 <- (4) Packet A|3|S0|5f1b19f796f4748c|1054|1 StreamFrame[0(CIB),0,1024] 30.210 <- (5) Packet A|4|S0|5f1b19f796f4748c|31|1 StreamFrame[0(CIB),1024,0,fin] 30.210 Finished downloading https://server4:443/lszjnuhaok at 54:20.448 on ClientConnection[5477767853c0224a/5f1b19f796f4748c(V1) with server4/193.167.100.100:443] 30.211 Closing ClientConnection[5477767853c0224a/5f1b19f796f4748c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.210 -> Packet A|7|S0|c6076f1780fd5b75|33|1 AckFrame[4-3,1-0|Δ0] 30.211 -> Packet A|8|S0|c6076f1780fd5b75|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1-0|Δ0] 30.211 Creating connection with server4:443 with v1 30.212 Setting up connection for downloading https://server4:443/rpfhcmiblr at 54:20.450 on ClientConnection[3bdb3862208963e9/c9170cf7a49a1aac(V1) with server4/193.167.100.100:443] 30.212 Original destination connection id: 3bdb3862208963e9 (scid: c9170cf7a49a1aac) >- CryptoStream[I|ClientHello] 30.213 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.413/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.213 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.235 <- (6) Packet A|5|S0|5f1b19f796f4748c|34|1 AckFrame[6-5,1|Δ26] 30.236 -> Packet A|9|S0|c6076f1780fd5b75|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1-0|Δ0] 30.246 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 30.247 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.447/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 30.246 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 30.249 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.346/Handshake, because peerAwaitingAddressValidation | RTT:33/16 30.249 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 30.249 - unknown transport parameter 0x00b6, size 0 30.249 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 30.249 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.252 Discarding pn space Initial because first Handshake message is being sent 30.246 <- (2) Packet A|0|S0|c9170cf7a49a1aac|54|1 NewConnectionIdFrame[1,<0|12a55b96c385cf6e|d8ccc7e8c61130798b4390f155dca2a3] 30.252 Starting downloading https://server4:443/rpfhcmiblr at 54:20.490 on ClientConnection[3bdb3862208963e9/c9170cf7a49a1aac(V1) with server4/193.167.100.100:443] 30.252 -> Packet H|0|L|80|1 CryptoFrame[0,36] 30.253 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 30.253 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.350/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.253 -> Packet A|0|S0|5c44d33764b2f8bc|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 30.267 <- (7) Packet A|6|S0|5f1b19f796f4748c|39|2 AckFrame[9,7-5,1|Δ0] ConnectionCloseFrame[0|0|] 30.285 <- (3) Packet A|3|S0|c9170cf7a49a1aac|31|1 StreamFrame[0(CIB),1024,0,fin] 30.304 -> Packet A|1|S0|5c44d33764b2f8bc|34|1 AckFrame[3,0|Δ19] 30.310 <- (4) Packet A|4|S0|c9170cf7a49a1aac|32|1 AckFrame[0|Δ26] 30.311 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 30.408/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 30.342 <- (5) Packet A|5|S0|c9170cf7a49a1aac|1415|3 HandshakeDoneFrame[] CryptoFrame[0,356] StreamFrame[0(CIB),0,1024,fin] 30.343 State is set to Confirmed reschedule loss detection timer for PTO over 17 millis, based on 30.360/Handshake, because ackElicitingInFlight | RTT:36/18 30.343 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 30.343 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 30.343 Finished downloading https://server4:443/rpfhcmiblr at 54:20.581 on ClientConnection[3bdb3862208963e9/c9170cf7a49a1aac(V1) with server4/193.167.100.100:443] 30.343 Closing ClientConnection[3bdb3862208963e9/c9170cf7a49a1aac(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.344 -> Packet A|2|S0|5c44d33764b2f8bc|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 30.344 Creating connection with server4:443 with v1 30.345 Setting up connection for downloading https://server4:443/debbkndwck at 54:20.583 on ClientConnection[f2bd441e743399e6/f39d7b3629b59c06(V1) with server4/193.167.100.100:443] 30.345 Original destination connection id: f2bd441e743399e6 (scid: f39d7b3629b59c06) >- CryptoStream[I|ClientHello] 30.346 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.546/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.346 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.374 <- (6) Packet A|6|S0|c9170cf7a49a1aac|35|2 AckFrame[2-1|Δ0] ConnectionCloseFrame[0|0|] 30.379 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 30.379 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.579/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 30.379 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 30.382 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 30.478/Handshake, because peerAwaitingAddressValidation | RTT:32/16 30.382 - unknown transport parameter 0x00b6, size 0 30.382 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 30.382 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 30.382 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 30.384 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 30.480/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 30.384 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.384 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 30.480/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 30.384 Discarding pn space Initial because first Handshake message is being sent 30.384 Starting downloading https://server4:443/debbkndwck at 54:20.622 on ClientConnection[f2bd441e743399e6/f39d7b3629b59c06(V1) with server4/193.167.100.100:443] 30.384 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 30.379 <- (2) Packet A|0|S0|f39d7b3629b59c06|54|1 NewConnectionIdFrame[1,<0|baebe181e760ba4f|4f16521bb7934e77ed88e2014ea5cc1e] 30.385 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 30.481/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 30.385 -> Packet A|0|S0|0991bcf6d2271ac3|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 30.417 <- (3) Packet A|3|S0|f39d7b3629b59c06|1054|1 StreamFrame[0(CIB),0,1024] 30.417 <- (4) Packet A|4|S0|f39d7b3629b59c06|31|1 StreamFrame[0(CIB),1024,0,fin] 30.417 Finished downloading https://server4:443/debbkndwck at 54:20.655 on ClientConnection[f2bd441e743399e6/f39d7b3629b59c06(V1) with server4/193.167.100.100:443] 30.417 Closing ClientConnection[f2bd441e743399e6/f39d7b3629b59c06(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.417 -> Packet A|1|S0|0991bcf6d2271ac3|33|1 AckFrame[4-3,0|Δ0] 30.417 -> Packet A|2|S0|0991bcf6d2271ac3|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,0|Δ0] 30.418 Creating connection with server4:443 with v1 30.419 Setting up connection for downloading https://server4:443/rjtsijmydj at 54:20.656 on ClientConnection[3ecdb8e8c1399838/429548a68069270b(V1) with server4/193.167.100.100:443] 30.419 Original destination connection id: 3ecdb8e8c1399838 (scid: 429548a68069270b) >- CryptoStream[I|ClientHello] 30.420 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.620/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.420 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.453 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 30.620 loss detection timeout handler running Sending probe 0, because no ack since 30.420. Current RTT: 100/25. 30.620 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.620 (Probe is an initial retransmit) 30.620 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.020/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.620 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.754 <- (2) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 30.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 30.957/Handshake, because peerAwaitingAddressValidation | RTT:100/25 30.757 Discarding pn space Initial because first Handshake message is being sent 30.757 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 30.957/Handshake, because peerAwaitingAddressValidation | RTT:100/25 30.757 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 30.790 <- (4) Packet H|2|L|771|1 CryptoFrame[0,725] 30.791 - unknown transport parameter 0x00b6, size 0 30.791 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 30.791 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 30.794 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 30.994/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.794 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.795 Starting downloading https://server4:443/rjtsijmydj at 54:21.033 on ClientConnection[3ecdb8e8c1399838/429548a68069270b(V1) with server4/193.167.100.100:443] 30.795 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 30.795 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 30.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.795 -> Packet A|0|S0|c75500492b53d42c|47|1 StreamFrame[0(CIB),0,17,fin] 30.995 loss detection timeout handler running Sending probe 0, because no ack since 30.794. Current RTT: 100/25. 30.995 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.995 (Probe is a handshake retransmit) 30.995 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 31.395/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.995 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 31.143 <- (5) Packet A|3|S0|429548a68069270b|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 31.144 State is set to Confirmed reschedule loss detection timer for PTO over 101 millis, based on 31.245/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -123 millis, based on 31.020/App, because ackElicitingInFlight | RTT:100/25 31.144 Discarding pn space Handshake because HandshakeDone is received 31.144 loss detection timeout handler running Sending probe 0, because no ack since 30.795. Current RTT: 100/25. 31.144 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 449 millis, based on 31.594/App, because ackElicitingInFlight | RTT:100/25 31.144 -> Packet PA|1|S0|c75500492b53d42c|47|1 StreamFrame[0(CIB),0,17,fin] 31.163 -> Packet A|2|S0|c75500492b53d42c|32|1 AckFrame[3|Δ19] 31.176 <- (6) Packet A|4|S0|429548a68069270b|1054|1 StreamFrame[0(CIB),0,1024] 31.176 <- (7) Packet A|5|S0|429548a68069270b|31|1 StreamFrame[0(CIB),1024,0,fin] 31.177 -> Packet A|3|S0|c75500492b53d42c|31|1 AckFrame[5-3|Δ0] 31.177 Finished downloading https://server4:443/rjtsijmydj at 54:21.415 on ClientConnection[3ecdb8e8c1399838/429548a68069270b(V1) with server4/193.167.100.100:443] 31.177 Closing ClientConnection[3ecdb8e8c1399838/429548a68069270b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.177 -> Packet A|4|S0|c75500492b53d42c|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 31.178 Creating connection with server4:443 with v1 31.178 Setting up connection for downloading https://server4:443/edjtqkfdew at 54:21.416 on ClientConnection[1a0e0284d6b06af5/fd76977d51058e3d(V1) with server4/193.167.100.100:443] 31.178 Original destination connection id: 1a0e0284d6b06af5 (scid: fd76977d51058e3d) >- CryptoStream[I|ClientHello] 31.179 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.379/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.179 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.313 <- (8) Packet A|7|S0|429548a68069270b|54|1 NewConnectionIdFrame[1,<0|480a71d1da970a63|c11c1bbbed717a099f93ab24bc42509c] 31.313 <- (9) Packet A|8|S0|429548a68069270b|54|1 NewConnectionIdFrame[1,<0|480a71d1da970a63|c11c1bbbed717a099f93ab24bc42509c] 31.314 -> Packet A|5|S0|c75500492b53d42c|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 31.314 -> Packet A|6|S0|c75500492b53d42c|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 31.379 loss detection timeout handler running Sending probe 0, because no ack since 31.179. Current RTT: 100/25. 31.379 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 31.379 (Probe is an initial retransmit) 31.379 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.779/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.379 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.411 <- (1) Packet I|1|L|48|1 Token=[] AckFrame[1-0|Δ0] 31.412 probe count not reset on ack because handshake not yet confirmed 31.412 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.812/Initial, because peerAwaitingAddressValidation | RTT:100/25 31.514 <- (2) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 31.517 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 31.608/Handshake, because peerAwaitingAddressValidation | RTT:31/15 31.517 Discarding pn space Initial because first Handshake message is being sent 31.517 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 31.608/Handshake, because peerAwaitingAddressValidation | RTT:31/15 31.517 -> Packet I|2|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1151) 31.554 <- (3) Packet H|1|L|773|1 CryptoFrame[0,727] 31.555 - unknown transport parameter 0x00b6, size 0 31.555 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 31.555 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 31.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 31.648/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 31.557 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.558 Starting downloading https://server4:443/edjtqkfdew at 54:21.796 on ClientConnection[1a0e0284d6b06af5/fd76977d51058e3d(V1) with server4/193.167.100.100:443] 31.558 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 31.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 31.649/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 31.558 -> Packet A|0|S0|b1037a80820aed97|47|1 StreamFrame[0(CIB),0,17,fin] 31.589 <- (4) Packet A|1|S0|fd76977d51058e3d|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 31.589 State is set to Confirmed reschedule loss detection timer for PTO over 59 millis, based on 31.648/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 85 millis, based on 31.674/App, because ackElicitingInFlight | RTT:31/15 31.589 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 31.590 <- (5) Packet A|2|S0|fd76977d51058e3d|1054|1 StreamFrame[0(CIB),0,1024] 31.590 -> Packet A|1|S0|b1037a80820aed97|31|1 AckFrame[2-1|Δ0] 31.674 loss detection timeout handler running Sending probe 0, because no ack since 31.558. Current RTT: 31/15. 31.674 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 31.907/App, because ackElicitingInFlight | RTT:31/15 31.675 -> Packet PA|2|S0|b1037a80820aed97|47|1 StreamFrame[0(CIB),0,17,fin] 31.731 <- (6) Packet A|6|S0|fd76977d51058e3d|32|1 AckFrame[2-0|Δ25] 31.731 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.741 <- (7) Packet A|7|S0|fd76977d51058e3d|54|1 NewConnectionIdFrame[1,<0|8f17d86bbc985e00|fa583229b386d9435b0e3e2e89e8b5d3] 31.761 -> Packet A|3|S0|b1037a80820aed97|32|1 AckFrame[7-6|Δ19] 31.792 <- (8) Packet A|9|S0|fd76977d51058e3d|31|1 StreamFrame[0(CIB),1024,0,fin] 31.792 Finished downloading https://server4:443/edjtqkfdew at 54:22.030 on ClientConnection[1a0e0284d6b06af5/fd76977d51058e3d(V1) with server4/193.167.100.100:443] 31.792 Closing ClientConnection[1a0e0284d6b06af5/fd76977d51058e3d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.792 -> Packet A|4|S0|b1037a80820aed97|37|2 ConnectionCloseFrame[0|0|] AckFrame[9,7-6|Δ0] 31.793 Creating connection with server4:443 with v1 31.793 Setting up connection for downloading https://server4:443/weackoxemf at 54:22.031 on ClientConnection[f7de41783c27faeb/9c2a1cc0e1579e26(V1) with server4/193.167.100.100:443] 31.793 Original destination connection id: f7de41783c27faeb (scid: 9c2a1cc0e1579e26) >- CryptoStream[I|ClientHello] 31.794 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.994/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.794 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.823 <- (9) Packet A|10|S0|fd76977d51058e3d|35|2 AckFrame[4-3|Δ0] ConnectionCloseFrame[0|0|] 31.827 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 31.828 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.028/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 31.827 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 31.831 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 31.927/Handshake, because peerAwaitingAddressValidation | RTT:32/16 31.831 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 31.831 - unknown transport parameter 0x00b6, size 0 31.831 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 31.831 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 31.834 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 31.930/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 31.834 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.834 Starting downloading https://server4:443/weackoxemf at 54:22.072 on ClientConnection[f7de41783c27faeb/9c2a1cc0e1579e26(V1) with server4/193.167.100.100:443] 31.834 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 31.930/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 31.834 Discarding pn space Initial because first Handshake message is being sent 31.834 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 31.827 <- (2) Packet A|0|S0|9c2a1cc0e1579e26|54|1 NewConnectionIdFrame[1,<0|d1218e412ee80100|e2d497164f0833e0bcb16301aeeaf018] 31.835 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 31.931/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 31.834 -> Packet A|0|S0|a1c878ad3fbdb296|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 31.930 loss detection timeout handler running Sending probe 0, because no ack since 31.834. Current RTT: 32/16. 31.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.930 (Probe is a handshake retransmit) 31.930 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 32.122/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 31.930 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 31.937 <- (3) Packet H|1|L|772|1 CryptoFrame[0,726] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.938 -> Packet H|3|L|46|1 AckFrame[1-0|Δ0] 31.938 <- (4) Packet H|2|L|772|1 CryptoFrame[0,726] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.938 -> Packet H|4|L|46|1 AckFrame[2-0|Δ0] 32.121 loss detection timeout handler running Sending probe 1, because no ack since 31.834. Current RTT: 32/16. 32.121 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.121 (Probe is a handshake retransmit) 32.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 32.506/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 32.122 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 32.123 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 32.507/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 32.123 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 32.153 <- (5) Packet A|1|S0|9c2a1cc0e1579e26|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 32.153 State is set to Confirmed reschedule loss detection timer for PTO over 165 millis, based on 32.318/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -197 millis, based on 31.955/App, because ackElicitingInFlight | RTT:32/16 32.153 Discarding pn space Handshake because HandshakeDone is received 32.153 loss detection timeout handler running Sending probe 0, because no ack since 31.834. Current RTT: 32/16. 32.153 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 32.396/App, because ackElicitingInFlight | RTT:32/16 32.154 -> Packet PA|1|S0|a1c878ad3fbdb296|47|1 StreamFrame[0(CIB),0,17,fin] 32.173 -> Packet A|2|S0|a1c878ad3fbdb296|32|1 AckFrame[1-0|Δ19] 32.395 loss detection timeout handler running Sending probe 1, because no ack since 32.154. Current RTT: 32/16. 32.395 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 32.879/App, because ackElicitingInFlight | RTT:32/16 32.395 -> Packet PA|3|S0|a1c878ad3fbdb296|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 32.880/App, because ackElicitingInFlight | RTT:32/16 32.396 -> Packet PA|4|S0|a1c878ad3fbdb296|47|1 StreamFrame[0(CIB),0,17,fin] 32.427 <- (6) Packet A|3|S0|9c2a1cc0e1579e26|33|1 AckFrame[4,2|Δ0] 32.428 Cwnd(-): 6000; inflight: 47 32.428 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 32.428 -> Packet A|5|S0|a1c878ad3fbdb296|47|1 StreamFrame[0(CIB),0,17,fin] 32.428 <- (7) Packet A|4|S0|9c2a1cc0e1579e26|1054|1 StreamFrame[0(CIB),0,1024] 32.428 <- (8) Packet A|5|S0|9c2a1cc0e1579e26|31|1 StreamFrame[0(CIB),1024,0,fin] 32.428 -> Packet A|6|S0|a1c878ad3fbdb296|31|1 AckFrame[5-3|Δ0] 32.429 Finished downloading https://server4:443/weackoxemf at 54:22.666 on ClientConnection[f7de41783c27faeb/9c2a1cc0e1579e26(V1) with server4/193.167.100.100:443] 32.429 Closing ClientConnection[f7de41783c27faeb/9c2a1cc0e1579e26(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.429 -> Packet A|7|S0|a1c878ad3fbdb296|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 32.429 Creating connection with server4:443 with v1 32.430 Setting up connection for downloading https://server4:443/nlmfazfibx at 54:22.667 on ClientConnection[35cbe086b8e35568/3662449da8d7478c(V1) with server4/193.167.100.100:443] 32.430 Original destination connection id: 35cbe086b8e35568 (scid: 3662449da8d7478c) >- CryptoStream[I|ClientHello] 32.431 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.631/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.431 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.485 <- (9) Packet A|6|S0|9c2a1cc0e1579e26|32|1 AckFrame[6-5|Δ26] 32.486 -> Packet A|8|S0|a1c878ad3fbdb296|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-3|Δ0] 32.630 loss detection timeout handler running Sending probe 0, because no ack since 32.431. Current RTT: 100/25. 32.630 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.630 (Probe is an initial retransmit) 32.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 33.031/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.630 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.664 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 32.966 <- (2) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 32.968 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.169/Handshake, because peerAwaitingAddressValidation | RTT:100/25 32.969 Discarding pn space Initial because first Handshake message is being sent 32.969 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.169/Handshake, because peerAwaitingAddressValidation | RTT:100/25 32.969 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 33.001 <- (3) Packet H|1|L|772|1 CryptoFrame[0,726] 33.002 - unknown transport parameter 0x00b6, size 0 33.002 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 33.002 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 33.004 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.204/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.004 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.002 <- (4) Packet H|2|L|772|1 CryptoFrame[0,726] 33.005 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 33.005 Starting downloading https://server4:443/nlmfazfibx at 54:23.242 on ClientConnection[35cbe086b8e35568/3662449da8d7478c(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.005 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.205/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.005 -> [Packet H|2|L|46|1 AckFrame[2-1|Δ0], Packet A|0|S0|87a70875c5927725|47|1 StreamFrame[0(CIB),0,17,fin]] 33.037 <- (5) Packet A|2|S0|3662449da8d7478c|1054|1 StreamFrame[0(CIB),0,1024] 33.037 <- (6) Packet A|3|S0|3662449da8d7478c|31|1 StreamFrame[0(CIB),1024,0,fin] 33.038 Finished downloading https://server4:443/nlmfazfibx at 54:23.275 on ClientConnection[35cbe086b8e35568/3662449da8d7478c(V1) with server4/193.167.100.100:443] 33.038 -> Packet A|1|S0|87a70875c5927725|31|1 AckFrame[3-2|Δ0] 33.038 Closing ClientConnection[35cbe086b8e35568/3662449da8d7478c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.038 -> Packet A|2|S0|87a70875c5927725|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 33.038 Creating connection with server4:443 with v1 33.039 Setting up connection for downloading https://server4:443/hhxiwzowhi at 54:23.277 on ClientConnection[ae6de3c9dac07633/d360515d6634cdaf(V1) with server4/193.167.100.100:443] 33.039 Original destination connection id: ae6de3c9dac07633 (scid: d360515d6634cdaf) >- CryptoStream[I|ClientHello] 33.040 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.240/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.040 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.062 <- (7) Packet A|4|S0|3662449da8d7478c|32|1 AckFrame[0|Δ26] 33.063 -> Packet A|3|S0|87a70875c5927725|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 33.068 <- (8) Packet A|5|S0|3662449da8d7478c|54|1 NewConnectionIdFrame[1,<0|dedbf5529761dfef|114d55ec0fb98bb83a089cc0352e0c9e] 33.069 <- (9) Packet A|6|S0|3662449da8d7478c|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 33.069 -> Packet A|4|S0|87a70875c5927725|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 33.073 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 33.073 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.273/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 33.073 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 33.075 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 33.171/Handshake, because peerAwaitingAddressValidation | RTT:32/16 33.075 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 33.076 - unknown transport parameter 0x00b6, size 0 33.076 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 33.076 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 33.077 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 33.174/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 33.077 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.078 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 33.174/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 33.078 Discarding pn space Initial because first Handshake message is being sent 33.078 Starting downloading https://server4:443/hhxiwzowhi at 54:23.316 on ClientConnection[ae6de3c9dac07633/d360515d6634cdaf(V1) with server4/193.167.100.100:443] 33.078 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 33.073 <- (2) Packet A|0|S0|d360515d6634cdaf|54|1 NewConnectionIdFrame[1,<0|31b14af90124b4db|65ae6310245c61e387b27a6c88e32894] 33.078 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 33.174/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 33.078 -> Packet A|0|S0|8c9f1334af51e2fd|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 33.108 <- (3) Packet A|1|S0|d360515d6634cdaf|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 33.109 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 33.173/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 33.199/App, because ackElicitingInFlight | RTT:32/16 33.109 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 33.128 -> Packet A|1|S0|8c9f1334af51e2fd|32|1 AckFrame[1-0|Δ19] 33.199 loss detection timeout handler running Sending probe 0, because no ack since 33.078. Current RTT: 32/16. 33.199 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 33.441/App, because ackElicitingInFlight | RTT:32/16 33.199 -> Packet PA|2|S0|8c9f1334af51e2fd|47|1 StreamFrame[0(CIB),0,17,fin] 33.441 loss detection timeout handler running Sending probe 1, because no ack since 33.199. Current RTT: 32/16. 33.441 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 33.925/App, because ackElicitingInFlight | RTT:32/16 33.441 -> Packet PA|3|S0|8c9f1334af51e2fd|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 33.926/App, because ackElicitingInFlight | RTT:32/16 33.442 -> Packet PA|4|S0|8c9f1334af51e2fd|47|1 StreamFrame[0(CIB),0,17,fin] 33.472 <- (4) Packet A|2|S0|d360515d6634cdaf|33|1 AckFrame[3,1|Δ0] 33.473 Cwnd(-): 6000; inflight: 47 33.473 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 90 millis, based on 33.563/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 104 millis, based on 33.578/App, because ackElicitingInFlight | RTT:32/12 33.473 -> Packet A|5|S0|8c9f1334af51e2fd|47|1 StreamFrame[0(CIB),0,17,fin] 33.473 <- (5) Packet A|3|S0|d360515d6634cdaf|1054|1 StreamFrame[0(CIB),0,1024] 33.473 <- (6) Packet A|4|S0|d360515d6634cdaf|31|1 StreamFrame[0(CIB),1024,0,fin] 33.473 -> Packet A|6|S0|8c9f1334af51e2fd|31|1 AckFrame[4-2|Δ0] 33.474 Finished downloading https://server4:443/hhxiwzowhi at 54:23.711 on ClientConnection[ae6de3c9dac07633/d360515d6634cdaf(V1) with server4/193.167.100.100:443] 33.474 Closing ClientConnection[ae6de3c9dac07633/d360515d6634cdaf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.474 -> Packet A|7|S0|8c9f1334af51e2fd|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 33.474 Creating connection with server4:443 with v1 33.475 Setting up connection for downloading https://server4:443/fbpqbbstpl at 54:23.713 on ClientConnection[39d253603c1a88fb/61bfbfd35247fe17(V1) with server4/193.167.100.100:443] 33.475 Original destination connection id: 39d253603c1a88fb (scid: 61bfbfd35247fe17) >- CryptoStream[I|ClientHello] 33.476 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.676/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.476 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.499 <- (7) Packet A|5|S0|d360515d6634cdaf|34|1 AckFrame[4-3,1|Δ26] 33.499 -> Packet A|8|S0|8c9f1334af51e2fd|35|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 33.509 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 33.675 loss detection timeout handler running Sending probe 0, because no ack since 33.476. Current RTT: 100/25. 33.675 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 33.676 (Probe is an initial retransmit) 33.676 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 34.076/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.676 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.075 loss detection timeout handler running Sending probe 1, because no ack since 33.676. Current RTT: 100/25. 34.075 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 34.075 (Probe is an initial retransmit) 34.076 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 34.876/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.076 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.077 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 34.877/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.077 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.107 <- (2) Packet I|4|L|48|1 Token=[] AckFrame[2-0|Δ0] 34.108 probe count not reset on ack because handshake not yet confirmed 34.108 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 34.908/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.108 <- (3) Packet I|5|L|48|1 Token=[] AckFrame[3-0|Δ0] 34.108 probe count not reset on ack because handshake not yet confirmed 34.108 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 363 millis, based on 34.472/Initial, because peerAwaitingAddressValidation | RTT:31/15 34.110 Discarding packet (772 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 34.111 Discarding packet (772 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 34.472 loss detection timeout handler running Sending probe 2, because no ack since 34.077. Current RTT: 31/11. 34.472 Sending probe because peer awaiting address validation 34.472 (Probe is Initial ping, because there is no Initial data to retransmit) 34.473 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 599 millis, based on 35.073/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/11 34.472 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1155) 34.505 <- (6) Packet I|6|L|48|1 Token=[] AckFrame[4-0|Δ0] 34.505 probe count not reset on ack because handshake not yet confirmed 34.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 599 millis, based on 35.105/Initial, because peerAwaitingAddressValidation | RTT:31/11 35.011 <- (7) Packet I|7|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 35.014 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 66 millis, based on 35.081/Handshake, because peerAwaitingAddressValidation | RTT:31/9 35.014 Discarding pn space Initial because first Handshake message is being sent 35.014 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 35.014 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 66 millis, based on 35.081/Handshake, because peerAwaitingAddressValidation | RTT:31/9 35.014 -> Packet I|5|L|1201|2 Token=[] AckFrame[7-4|Δ0] Padding(1153) 35.046 <- (9) Packet H|3|L|772|1 CryptoFrame[0,726] 35.047 - unknown transport parameter 0x00b6, size 0 35.047 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 35.047 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 35.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 66 millis, based on 35.116/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/9 35.049 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.049 Starting downloading https://server4:443/fbpqbbstpl at 54:25.287 on ClientConnection[39d253603c1a88fb/61bfbfd35247fe17(V1) with server4/193.167.100.100:443] 35.047 <- (10) Packet H|4|L|772|1 CryptoFrame[0,726] 35.049 -> Packet H|1|L|46|1 AckFrame[3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.049 -> Packet H|2|L|46|1 AckFrame[4-3|Δ0] 35.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 66 millis, based on 35.117/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/9 35.050 -> Packet A|0|S0|561e2124595305e2|47|1 StreamFrame[0(CIB),0,17,fin] 35.080 <- (11) Packet A|1|S0|61bfbfd35247fe17|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 35.080 State is set to Confirmed reschedule loss detection timer for PTO over 35 millis, based on 35.116/Handshake, because ackElicitingInFlight | RTT:31/9 reschedule loss detection timer for PTO over 61 millis, based on 35.142/App, because ackElicitingInFlight | RTT:31/9 35.080 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 35.081 <- (12) Packet A|2|S0|61bfbfd35247fe17|1054|1 StreamFrame[0(CIB),0,1024] 35.081 <- (13) Packet A|3|S0|61bfbfd35247fe17|31|1 StreamFrame[0(CIB),1024,0,fin] 35.081 -> Packet A|1|S0|561e2124595305e2|32|1 AckFrame[2-1|Δ1] 35.082 Finished downloading https://server4:443/fbpqbbstpl at 54:25.320 on ClientConnection[39d253603c1a88fb/61bfbfd35247fe17(V1) with server4/193.167.100.100:443] 35.082 Closing ClientConnection[39d253603c1a88fb/61bfbfd35247fe17(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 35.082 -> Packet A|2|S0|561e2124595305e2|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 35.083 Creating connection with server4:443 with v1 35.083 Setting up connection for downloading https://server4:443/hovsezjjdm at 54:25.321 on ClientConnection[80a2dfb0f3318b44/885d2e6272252397(V1) with server4/193.167.100.100:443] 35.083 Original destination connection id: 80a2dfb0f3318b44 (scid: 885d2e6272252397) >- CryptoStream[I|ClientHello] 35.085 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.285/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.084 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.112 <- (14) Packet A|5|S0|61bfbfd35247fe17|54|1 NewConnectionIdFrame[1,<0|d1179f923aded177|41bf460a8e909469f779c9b5ad8ee751] 35.112 -> Packet A|3|S0|561e2124595305e2|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 35.113 <- (15) Packet A|6|S0|61bfbfd35247fe17|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 35.284 loss detection timeout handler running Sending probe 0, because no ack since 35.084. Current RTT: 100/25. 35.284 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 35.284 (Probe is an initial retransmit) 35.284 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 35.684/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.284 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.317 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 35.618 <- (2) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 35.621 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 35.821/Handshake, because peerAwaitingAddressValidation | RTT:100/25 35.621 Discarding pn space Initial because first Handshake message is being sent 35.621 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 35.621 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 35.821/Handshake, because peerAwaitingAddressValidation | RTT:100/25 35.621 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 35.654 <- (4) Packet H|2|L|772|1 CryptoFrame[0,726] 35.655 - unknown transport parameter 0x00b6, size 0 35.655 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 35.655 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 35.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 35.857/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.657 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.657 Starting downloading https://server4:443/hovsezjjdm at 54:25.895 on ClientConnection[80a2dfb0f3318b44/885d2e6272252397(V1) with server4/193.167.100.100:443] 35.657 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 35.658 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 35.858/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.658 -> Packet A|0|S0|7218c234921e1aaa|47|1 StreamFrame[0(CIB),0,17,fin] 35.857 loss detection timeout handler running Sending probe 0, because no ack since 35.657. Current RTT: 100/25. 35.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 35.857 (Probe is a handshake retransmit) 35.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 36.257/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.857 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 35.888 <- (5) Packet A|1|S0|885d2e6272252397|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 35.889 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 36.108/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 35.883/App, because ackElicitingInFlight | RTT:100/25 35.889 Discarding pn space Handshake because HandshakeDone is received 35.889 loss detection timeout handler running Sending probe 0, because no ack since 35.658. Current RTT: 100/25. 35.889 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 449 millis, based on 36.339/App, because ackElicitingInFlight | RTT:100/25 35.889 -> Packet PA|1|S0|7218c234921e1aaa|47|1 StreamFrame[0(CIB),0,17,fin] 35.909 -> Packet A|2|S0|7218c234921e1aaa|32|1 AckFrame[1|Δ19] 36.004 <- (6) Packet A|2|S0|885d2e6272252397|54|1 NewConnectionIdFrame[1,<0|9d8b030bf817b446|001a4010816b3453a4c0e4944eee0e15] 36.004 <- (7) Packet A|3|S0|885d2e6272252397|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 36.005 -> Packet A|3|S0|7218c234921e1aaa|31|1 AckFrame[3-1|Δ0] 36.338 loss detection timeout handler running Sending probe 1, because no ack since 35.889. Current RTT: 100/25. 36.339 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 37.239/App, because ackElicitingInFlight | RTT:100/25 36.339 -> Packet PA|4|S0|7218c234921e1aaa|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 37.240/App, because ackElicitingInFlight | RTT:100/25 36.340 -> Packet PA|5|S0|7218c234921e1aaa|47|1 StreamFrame[0(CIB),0,17,fin] 36.371 <- (8) Packet A|5|S0|885d2e6272252397|1054|1 StreamFrame[0(CIB),0,1024] 36.390 -> Packet A|6|S0|7218c234921e1aaa|34|1 AckFrame[5,3-1|Δ19] 36.467 <- (9) Packet A|8|S0|885d2e6272252397|30|2 PingFrame[] Padding(3) 36.487 -> Packet A|7|S0|7218c234921e1aaa|36|1 AckFrame[8,5,3-1|Δ19] 36.517 <- (10) Packet A|9|S0|885d2e6272252397|31|1 StreamFrame[0(CIB),1024,0,fin] 36.518 Finished downloading https://server4:443/hovsezjjdm at 54:26.756 on ClientConnection[80a2dfb0f3318b44/885d2e6272252397(V1) with server4/193.167.100.100:443] 36.518 Closing ClientConnection[80a2dfb0f3318b44/885d2e6272252397(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 36.518 -> Packet A|8|S0|7218c234921e1aaa|39|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,5,3-1|Δ0] 36.518 Creating connection with server4:443 with v1 36.519 Setting up connection for downloading https://server4:443/pjoocgilcd at 54:26.757 on ClientConnection[c51f09215e9033a5/4a04a056ff2528c0(V1) with server4/193.167.100.100:443] 36.519 Original destination connection id: c51f09215e9033a5 (scid: 4a04a056ff2528c0) >- CryptoStream[I|ClientHello] 36.520 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.720/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.520 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.549 <- (11) Packet A|10|S0|885d2e6272252397|37|2 AckFrame[8-6,4-3|Δ0] ConnectionCloseFrame[0|0|] 36.553 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 36.554 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.754/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 36.553 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,725] Padding(254) 36.556 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 36.652/Handshake, because peerAwaitingAddressValidation | RTT:32/16 36.556 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 36.556 - unknown transport parameter 0x00b6, size 0 36.556 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 36.556 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 36.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 36.654/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 36.558 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 36.558 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 36.654/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 36.558 Discarding pn space Initial because first Handshake message is being sent 36.558 Starting downloading https://server4:443/pjoocgilcd at 54:26.796 on ClientConnection[c51f09215e9033a5/4a04a056ff2528c0(V1) with server4/193.167.100.100:443] 36.558 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 36.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 36.655/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 36.558 -> Packet A|0|S0|4ba5d1df9d6d7741|47|1 StreamFrame[0(CIB),0,17,fin] 36.590 <- (2) Packet A|3|S0|4a04a056ff2528c0|31|1 StreamFrame[0(CIB),1024,0,fin] 36.610 -> Packet A|1|S0|4ba5d1df9d6d7741|32|1 AckFrame[3|Δ19] 36.615 <- (3) Packet A|4|S0|4a04a056ff2528c0|32|1 AckFrame[0|Δ25] 36.615 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 36.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 36.648 <- (4) Packet A|6|S0|4a04a056ff2528c0|1415|3 HandshakeDoneFrame[] CryptoFrame[0,356] StreamFrame[0(CIB),0,1024,fin] 36.648 State is set to Confirmed reschedule loss detection timer for PTO over 16 millis, based on 36.665/Handshake, because ackElicitingInFlight | RTT:35/18 36.648 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 36.648 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 36.649 Finished downloading https://server4:443/pjoocgilcd at 54:26.886 on ClientConnection[c51f09215e9033a5/4a04a056ff2528c0(V1) with server4/193.167.100.100:443] 36.649 Closing ClientConnection[c51f09215e9033a5/4a04a056ff2528c0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 36.649 -> Packet A|2|S0|4ba5d1df9d6d7741|37|2 ConnectionCloseFrame[0|0|] AckFrame[6,4-3|Δ0]