0.000 Creating connection with server4:443 with v1 0.085 Setting up connection for downloading https://server4:443/irviymwnje at 52:36.104 on ClientConnection[dcdcfde38020fcc7/6846759b9a8694fa(V1) with server4/193.167.100.100:443] 0.087 Original destination connection id: dcdcfde38020fcc7 (scid: 6846759b9a8694fa) >- CryptoStream[I|ClientHello] 0.235 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.435/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.229 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.277 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 0.436 loss detection timeout handler running Sending probe 0, because no ack since 0.229. Current RTT: 100/25. 0.437 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.439 (Probe is an initial retransmit) 0.442 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.842/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.442 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.474 <- (2) Packet I|1|L|48|1 Token=[] AckFrame[1-0|Δ0] 0.483 probe count not reset on ack because handshake not yet confirmed 0.488 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.888/Initial, because peerAwaitingAddressValidation | RTT:100/25 0.570 <- (3) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 0.591 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 0.687/Handshake, because peerAwaitingAddressValidation | RTT:32/16 0.591 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 0.687/Handshake, because peerAwaitingAddressValidation | RTT:32/16 0.591 Discarding pn space Initial because first Handshake message is being sent 0.591 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 0.592 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 0.624 <- (5) Packet H|1|L|773|1 CryptoFrame[0,727] 0.631 - unknown transport parameter 0x00b6, size 0 0.632 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 0.632 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 0.657 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 0.753/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 0.657 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.625 <- (6) Packet H|2|L|773|1 CryptoFrame[0,727] 0.661 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 0.664 Starting downloading https://server4:443/irviymwnje at 52:36.701 on ClientConnection[dcdcfde38020fcc7/6846759b9a8694fa(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.667 -> Packet H|2|L|46|1 AckFrame[2-1|Δ0] 0.687 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 0.783/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 0.689 <- (7) Packet A|1|S0|6846759b9a8694fa|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 0.686 -> Packet A|0|S0|c979b1e53779cfc2|47|1 StreamFrame[0(CIB),0,17,fin] 0.699 State is set to Confirmed reschedule loss detection timer for PTO over 53 millis, based on 0.753/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 105 millis, based on 0.807/App, because ackElicitingInFlight | RTT:32/16 0.702 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 0.719 <- (8) Packet A|2|S0|6846759b9a8694fa|1054|1 StreamFrame[0(CIB),0,1024] 0.719 <- (9) Packet A|3|S0|6846759b9a8694fa|31|1 StreamFrame[0(CIB),1024,0,fin] 0.720 -> Packet A|1|S0|c979b1e53779cfc2|32|1 AckFrame[2-1|Δ15] 0.722 Finished downloading https://server4:443/irviymwnje at 52:36.758 on ClientConnection[dcdcfde38020fcc7/6846759b9a8694fa(V1) with server4/193.167.100.100:443] 0.723 Closing ClientConnection[dcdcfde38020fcc7/6846759b9a8694fa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.726 Creating connection with server4:443 with v1 0.727 Setting up connection for downloading https://server4:443/lpibdmzkkr at 52:36.764 on ClientConnection[8561d8c59846c7b9/9ce5fc8b7542f276(V1) with server4/193.167.100.100:443] 0.727 Original destination connection id: 8561d8c59846c7b9 (scid: 9ce5fc8b7542f276) 0.726 -> Packet A|2|S0|c979b1e53779cfc2|36|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ5] >- CryptoStream[I|ClientHello] 0.733 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.933/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.733 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.766 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 0.768 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.968/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.773 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.766 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) reschedule loss detection timer for PTO over 96 millis, based on 0.870/Handshake, because peerAwaitingAddressValidation | RTT:33/16 0.773 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 0.774 - unknown transport parameter 0x00b6, size 0 0.774 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 0.774 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 0.778 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.875/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.778 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.780 Starting downloading https://server4:443/lpibdmzkkr at 52:36.816 on ClientConnection[8561d8c59846c7b9/9ce5fc8b7542f276(V1) with server4/193.167.100.100:443] 0.780 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.877/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.780 Discarding pn space Initial because first Handshake message is being sent 0.781 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 0.878/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.781 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|90f6445cd5a211f4|47|1 StreamFrame[0(CIB),0,17,fin]] 0.766 <- (2) Packet A|0|S0|9ce5fc8b7542f276|54|1 NewConnectionIdFrame[1,<0|9b1175fea8d629d9|4e32a5ce47bcf6f526dc40ff15ef9ff2] 0.805 -> Packet A|1|S0|90f6445cd5a211f4|32|1 AckFrame[0|Δ19] 0.877 loss detection timeout handler running Sending probe 0, because no ack since 0.778. Current RTT: 33/16. 0.877 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.878 (Probe is a handshake retransmit) 0.879 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.073/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 0.878 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 0.947 <- (3) Packet A|2|S0|9ce5fc8b7542f276|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 0.948 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 1.025/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -45 millis, based on 0.903/App, because ackElicitingInFlight | RTT:33/16 0.948 Discarding pn space Handshake because HandshakeDone is received 0.948 loss detection timeout handler running Sending probe 0, because no ack since 0.781. Current RTT: 33/16. 0.949 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 0.947 <- (4) Packet A|3|S0|9ce5fc8b7542f276|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 1.194/App, because ackElicitingInFlight | RTT:33/16 0.950 -> Packet PA|2|S0|90f6445cd5a211f4|47|1 StreamFrame[0(CIB),0,17,fin] 0.950 -> Packet A|3|S0|90f6445cd5a211f4|34|1 AckFrame[3-2,0|Δ1] 0.982 <- (5) Packet A|4|S0|9ce5fc8b7542f276|1054|1 StreamFrame[0(CIB),0,1024] 0.982 <- (6) Packet A|5|S0|9ce5fc8b7542f276|31|1 StreamFrame[0(CIB),1024,0,fin] 0.984 Finished downloading https://server4:443/lpibdmzkkr at 52:37.021 on ClientConnection[8561d8c59846c7b9/9ce5fc8b7542f276(V1) with server4/193.167.100.100:443] 0.984 -> Packet A|4|S0|90f6445cd5a211f4|33|1 AckFrame[5-2,0|Δ0] 0.984 Closing ClientConnection[8561d8c59846c7b9/9ce5fc8b7542f276(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.985 -> Packet A|5|S0|90f6445cd5a211f4|37|2 ConnectionCloseFrame[0|0|] AckFrame[5-2,0|Δ0] 0.986 Creating connection with server4:443 with v1 0.986 Setting up connection for downloading https://server4:443/lfsltjywdy at 52:37.023 on ClientConnection[f00420818b9799ce/210e8f78f34b8b46(V1) with server4/193.167.100.100:443] 0.987 Original destination connection id: f00420818b9799ce (scid: 210e8f78f34b8b46) >- CryptoStream[I|ClientHello] 0.989 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.189/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.989 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.189 loss detection timeout handler running Sending probe 0, because no ack since 0.989. Current RTT: 100/25. 1.189 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.189 (Probe is an initial retransmit) 1.190 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.590/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.190 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.223 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 1.224 probe count not reset on ack because handshake not yet confirmed 1.225 Retransmitting CryptoFrame[0,257] on level Initial 1.226 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.626/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.226 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.227 Cwnd(-): 6000; inflight: 1200 1.227 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 1.627/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 1.223 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 1.231 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.425/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.231 - unknown transport parameter 0x00b6, size 0 1.231 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 1.232 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 1.232 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 1.235 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.429/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.235 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.236 Starting downloading https://server4:443/lfsltjywdy at 52:37.273 on ClientConnection[f00420818b9799ce/210e8f78f34b8b46(V1) with server4/193.167.100.100:443] 1.236 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 1.236 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.333/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.236 Discarding pn space Initial because first Handshake message is being sent 1.237 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 1.334/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.237 -> Packet A|0|S0|452265d914547f89|47|1 StreamFrame[0(CIB),0,17,fin] 1.333 loss detection timeout handler running Sending probe 0, because no ack since 1.235. Current RTT: 33/16. 1.333 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.333 (Probe is a handshake retransmit) 1.334 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 1.528/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.334 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 1.348 <- (2) Packet H|1|L|772|1 CryptoFrame[0,726] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.349 <- (3) Packet H|2|L|772|1 CryptoFrame[0,726] 1.349 -> Packet H|3|L|46|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.350 -> Packet H|4|L|46|1 AckFrame[2-0|Δ0] 1.527 loss detection timeout handler running Sending probe 1, because no ack since 1.237. Current RTT: 33/16. 1.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.528 (Probe is a handshake retransmit) 1.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 1.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.528 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 1.529 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 1.917/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.529 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 1.666 <- (4) Packet A|2|S0|210e8f78f34b8b46|54|1 NewConnectionIdFrame[1,<0|a996b0249e4b1370|a51950821963ee4491c9a53e50d768f9] 1.666 <- (5) Packet A|3|S0|210e8f78f34b8b46|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 1.667 State is set to Confirmed reschedule loss detection timer for PTO over 57 millis, based on 1.725/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -309 millis, based on 1.359/App, because ackElicitingInFlight | RTT:33/16 1.668 Discarding pn space Handshake because HandshakeDone is received 1.668 loss detection timeout handler running Sending probe 0, because no ack since 1.237. Current RTT: 33/16. 1.668 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 1.912/App, because ackElicitingInFlight | RTT:33/16 1.668 -> Packet PA|1|S0|452265d914547f89|47|1 StreamFrame[0(CIB),0,17,fin] 1.669 -> Packet A|2|S0|452265d914547f89|32|1 AckFrame[3-2|Δ1] 1.700 <- (6) Packet A|4|S0|210e8f78f34b8b46|1054|1 StreamFrame[0(CIB),0,1024] 1.701 <- (7) Packet A|5|S0|210e8f78f34b8b46|31|1 StreamFrame[0(CIB),1024,0,fin] 1.702 Finished downloading https://server4:443/lfsltjywdy at 52:37.739 on ClientConnection[f00420818b9799ce/210e8f78f34b8b46(V1) with server4/193.167.100.100:443] 1.702 Closing ClientConnection[f00420818b9799ce/210e8f78f34b8b46(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.702 -> Packet A|3|S0|452265d914547f89|31|1 AckFrame[5-2|Δ0] 1.703 Creating connection with server4:443 with v1 1.703 -> Packet A|4|S0|452265d914547f89|35|2 ConnectionCloseFrame[0|0|] AckFrame[5-2|Δ0] 1.704 Setting up connection for downloading https://server4:443/waijgggsby at 52:37.741 on ClientConnection[cbcf86b040465dde/7dd231420282ace7(V1) with server4/193.167.100.100:443] 1.704 Original destination connection id: cbcf86b040465dde (scid: 7dd231420282ace7) >- CryptoStream[I|ClientHello] 1.706 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.906/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.706 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.906 loss detection timeout handler running Sending probe 0, because no ack since 1.706. Current RTT: 100/25. 1.906 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.906 (Probe is an initial retransmit) 1.907 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.307/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.907 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.940 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 1.941 probe count not reset on ack because handshake not yet confirmed 1.941 Retransmitting CryptoFrame[0,257] on level Initial 1.941 Cwnd(-): 6000; inflight: 0 1.941 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.341/Initial, because peerAwaitingAddressValidation | RTT:100/25 1.942 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 2.136/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.942 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 1.945 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.940 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,728] Padding(251) reschedule loss detection timer for PTO over 193 millis, based on 2.139/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.945 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 1.945 - unknown transport parameter 0x00b6, size 0 1.946 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 1.946 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 1.949 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 2.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.948 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.949 Starting downloading https://server4:443/waijgggsby at 52:37.986 on ClientConnection[cbcf86b040465dde/7dd231420282ace7(V1) with server4/193.167.100.100:443] 1.950 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 1.949 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.047/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.950 Discarding pn space Initial because first Handshake message is being sent 1.950 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.047/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 1.950 -> Packet A|0|S0|461faed79be2671b|47|1 StreamFrame[0(CIB),0,17,fin] 1.974 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.979 <- (3) Packet A|1|S0|7dd231420282ace7|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 1.980 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 2.045/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 2.072/App, because ackElicitingInFlight | RTT:33/16 1.981 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 2.001 -> Packet A|1|S0|461faed79be2671b|32|1 AckFrame[1|Δ19] 2.007 <- (4) Packet A|4|S0|7dd231420282ace7|32|1 AckFrame[0|Δ26] 2.008 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.032 <- (5) Packet A|5|S0|7dd231420282ace7|54|1 NewConnectionIdFrame[1,<0|847a65288190dc8b|ca0834390ee2d0bfe913840f51ebe111] 2.052 -> Packet A|2|S0|461faed79be2671b|34|1 AckFrame[5-4,1|Δ19] 2.084 <- (6) Packet A|6|S0|7dd231420282ace7|1054|1 StreamFrame[0(CIB),0,1024,fin] 2.085 Finished downloading https://server4:443/waijgggsby at 52:38.122 on ClientConnection[cbcf86b040465dde/7dd231420282ace7(V1) with server4/193.167.100.100:443] 2.085 Closing ClientConnection[cbcf86b040465dde/7dd231420282ace7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.086 -> Packet A|3|S0|461faed79be2671b|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,1|Δ0] 2.086 Creating connection with server4:443 with v1 2.087 Setting up connection for downloading https://server4:443/mqdyuxoqwv at 52:38.124 on ClientConnection[cbb7da347bed943f/b8294564eb7e8ebe(V1) with server4/193.167.100.100:443] 2.087 Original destination connection id: cbb7da347bed943f (scid: b8294564eb7e8ebe) >- CryptoStream[I|ClientHello] 2.089 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.289/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.089 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.116 <- (7) Packet A|7|S0|7dd231420282ace7|35|2 AckFrame[3-1|Δ0] ConnectionCloseFrame[0|0|] 2.122 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 2.123 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.323/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 2.122 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 2.126 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.223/Handshake, because peerAwaitingAddressValidation | RTT:33/16 2.126 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 2.126 - unknown transport parameter 0x00b6, size 0 2.127 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 2.127 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 2.130 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.227/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.130 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.130 Starting downloading https://server4:443/mqdyuxoqwv at 52:38.167 on ClientConnection[cbb7da347bed943f/b8294564eb7e8ebe(V1) with server4/193.167.100.100:443] 2.131 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 2.130 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.228/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.131 Discarding pn space Initial because first Handshake message is being sent 2.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 2.228/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.131 -> Packet A|0|S0|4ebf1a276e560310|47|1 StreamFrame[0(CIB),0,17,fin] 2.161 <- (2) Packet A|1|S0|b8294564eb7e8ebe|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 2.162 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 2.227/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 2.253/App, because ackElicitingInFlight | RTT:33/16 2.162 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 2.182 -> Packet A|1|S0|4ebf1a276e560310|32|1 AckFrame[1|Δ19] 2.253 loss detection timeout handler running Sending probe 0, because no ack since 2.131. Current RTT: 33/16. 2.253 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 2.498/App, because ackElicitingInFlight | RTT:33/16 2.254 -> Packet PA|2|S0|4ebf1a276e560310|47|1 StreamFrame[0(CIB),0,17,fin] 2.397 <- (3) Packet A|3|S0|b8294564eb7e8ebe|54|1 NewConnectionIdFrame[1,<0|a29436ca255a1165|642f61f64f751658854a5ea846f90338] 2.397 <- (4) Packet A|4|S0|b8294564eb7e8ebe|54|1 NewConnectionIdFrame[1,<0|a29436ca255a1165|642f61f64f751658854a5ea846f90338] 2.398 -> Packet A|3|S0|4ebf1a276e560310|33|1 AckFrame[4-3,1|Δ0] 2.497 loss detection timeout handler running Sending probe 1, because no ack since 2.254. Current RTT: 33/16. 2.498 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 2.986/App, because ackElicitingInFlight | RTT:33/16 2.498 -> Packet PA|4|S0|4ebf1a276e560310|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 2.987/App, because ackElicitingInFlight | RTT:33/16 2.499 -> Packet PA|5|S0|4ebf1a276e560310|47|1 StreamFrame[0(CIB),0,17,fin] 2.530 <- (5) Packet A|6|S0|b8294564eb7e8ebe|1054|1 StreamFrame[0(CIB),0,1024] 2.550 -> Packet A|6|S0|4ebf1a276e560310|36|1 AckFrame[6,4-3,1|Δ19] 2.686 <- (6) Packet A|10|S0|b8294564eb7e8ebe|30|2 PingFrame[] Padding(3) 2.706 -> Packet A|7|S0|4ebf1a276e560310|38|1 AckFrame[10,6,4-3,1|Δ19] 2.737 <- (7) Packet A|12|S0|b8294564eb7e8ebe|31|1 StreamFrame[0(CIB),1024,0,fin] 2.738 Finished downloading https://server4:443/mqdyuxoqwv at 52:38.775 on ClientConnection[cbb7da347bed943f/b8294564eb7e8ebe(V1) with server4/193.167.100.100:443] 2.738 Closing ClientConnection[cbb7da347bed943f/b8294564eb7e8ebe(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.739 Creating connection with server4:443 with v1 2.739 -> Packet A|8|S0|4ebf1a276e560310|43|2 ConnectionCloseFrame[0|0|] AckFrame[12,10,6,4-3,1|Δ0] 2.740 Setting up connection for downloading https://server4:443/sppcryoaow at 52:38.777 on ClientConnection[d26e3f411197931c/62c65e95fd78c37b(V1) with server4/193.167.100.100:443] 2.740 Original destination connection id: d26e3f411197931c (scid: 62c65e95fd78c37b) >- CryptoStream[I|ClientHello] 2.742 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.942/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.741 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.941 loss detection timeout handler running Sending probe 0, because no ack since 2.741. Current RTT: 100/25. 2.941 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.941 (Probe is an initial retransmit) 2.942 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.342/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.942 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.974 <- (1) Packet I|1|L|48|1 Token=[] AckFrame[1-0|Δ0] 2.975 probe count not reset on ack because handshake not yet confirmed 2.975 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 3.375/Initial, because peerAwaitingAddressValidation | RTT:100/25 3.076 <- (2) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 3.081 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 3.177/Handshake, because peerAwaitingAddressValidation | RTT:32/16 3.081 Discarding pn space Initial because first Handshake message is being sent 3.082 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 3.178/Handshake, because peerAwaitingAddressValidation | RTT:32/16 3.081 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 3.177 loss detection timeout handler running 3.177 Sending probe 0. Current RTT: 32/16. 3.177 Sending probe because peer awaiting address validation 3.177 (Probe is a handshake ping) 3.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 3.370/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.178 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 3.370 loss detection timeout handler running Sending probe 1, because no ack since 3.178. Current RTT: 32/16. 3.370 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.370 (Probe is a handshake ping) 3.371 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 3.755/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.370 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 3.371 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 3.755/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.371 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 3.376 <- (3) Packet H|1|L|773|1 CryptoFrame[0,727] 3.377 - unknown transport parameter 0x00b6, size 0 3.377 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 3.377 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 3.380 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 3.764/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.380 -> Packet H|3|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.381 Starting downloading https://server4:443/sppcryoaow at 52:39.417 on ClientConnection[d26e3f411197931c/62c65e95fd78c37b(V1) with server4/193.167.100.100:443] 3.376 <- (4) Packet H|2|L|773|1 CryptoFrame[0,727] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.381 -> Packet H|4|L|46|1 AckFrame[1|Δ0] 3.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 3.765/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.381 -> [Packet H|5|L|46|1 AckFrame[2-1|Δ0], Packet A|0|S0|5bf4d748d50ea1f1|47|1 StreamFrame[0(CIB),0,17,fin]] 3.402 <- (5) Packet H|3|L|47|1 AckFrame[2|Δ0] 3.403 probe count not reset on ack because handshake not yet confirmed 3.403 Cwnd(-): 6000; inflight: 171 3.406 loss detection timeout handler running 3.407 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 308 millis, based on 3.716/Handshake, because ackElicitingInFlight | RTT:32/13 3.413 <- (6) Packet A|2|S0|62c65e95fd78c37b|1054|1 StreamFrame[0(CIB),0,1024] 3.413 <- (7) Packet A|3|S0|62c65e95fd78c37b|31|1 StreamFrame[0(CIB),1024,0,fin] 3.414 Finished downloading https://server4:443/sppcryoaow at 52:39.451 on ClientConnection[d26e3f411197931c/62c65e95fd78c37b(V1) with server4/193.167.100.100:443] 3.414 Closing ClientConnection[d26e3f411197931c/62c65e95fd78c37b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.414 -> Packet A|1|S0|5bf4d748d50ea1f1|31|1 AckFrame[3-2|Δ0] 3.415 Creating connection with server4:443 with v1 3.415 -> Packet A|2|S0|5bf4d748d50ea1f1|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 3.416 Setting up connection for downloading https://server4:443/suefmweeqb at 52:39.453 on ClientConnection[6c02138d6ad087cb/01b7be6c16231c19(V1) with server4/193.167.100.100:443] 3.416 Original destination connection id: 6c02138d6ad087cb (scid: 01b7be6c16231c19) >- CryptoStream[I|ClientHello] 3.418 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.618/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.418 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.446 <- (8) Packet A|5|S0|62c65e95fd78c37b|37|2 AckFrame[2,0|Δ0] ConnectionCloseFrame[0|0|] 3.451 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.451 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.651/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.455 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.451 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) reschedule loss detection timer for PTO over 95 millis, based on 3.551/Handshake, because peerAwaitingAddressValidation | RTT:32/16 3.454 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 3.455 - unknown transport parameter 0x00b6, size 0 3.459 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 3.459 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 3.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 3.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.462 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.463 Starting downloading https://server4:443/suefmweeqb at 52:39.500 on ClientConnection[6c02138d6ad087cb/01b7be6c16231c19(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 3.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.464 Discarding pn space Initial because first Handshake message is being sent 3.464 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 3.464 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 3.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 3.464 -> Packet A|0|S0|5cb858dd0cff6cc7|47|1 StreamFrame[0(CIB),0,17,fin] 3.494 <- (2) Packet A|1|S0|01b7be6c16231c19|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 3.494 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 3.558/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 3.585/App, because ackElicitingInFlight | RTT:32/16 3.495 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 3.496 <- (3) Packet A|2|S0|01b7be6c16231c19|1054|1 StreamFrame[0(CIB),0,1024] 3.496 <- (4) Packet A|3|S0|01b7be6c16231c19|31|1 StreamFrame[0(CIB),1024,0,fin] 3.496 -> Packet A|1|S0|5cb858dd0cff6cc7|32|1 AckFrame[2-1|Δ1] 3.497 Finished downloading https://server4:443/suefmweeqb at 52:39.534 on ClientConnection[6c02138d6ad087cb/01b7be6c16231c19(V1) with server4/193.167.100.100:443] 3.497 Closing ClientConnection[6c02138d6ad087cb/01b7be6c16231c19(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.498 Creating connection with server4:443 with v1 3.498 -> Packet A|2|S0|5cb858dd0cff6cc7|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 3.498 Setting up connection for downloading https://server4:443/fwndncokqw at 52:39.535 on ClientConnection[1265dd4d0af77951/d7c37d9c89a6fd79(V1) with server4/193.167.100.100:443] 3.498 Original destination connection id: 1265dd4d0af77951 (scid: d7c37d9c89a6fd79) >- CryptoStream[I|ClientHello] 3.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.701/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.500 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.529 <- (5) Packet A|6|S0|01b7be6c16231c19|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 3.533 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.735/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.533 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 3.538 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.635/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.538 - unknown transport parameter 0x00b6, size 0 3.538 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 3.538 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 3.539 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 3.542 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.639/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.541 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.542 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.542 Starting downloading https://server4:443/fwndncokqw at 52:39.579 on ClientConnection[1265dd4d0af77951/d7c37d9c89a6fd79(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 3.639/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.542 Discarding pn space Initial because first Handshake message is being sent 3.534 <- (2) Packet A|0|S0|d7c37d9c89a6fd79|54|1 NewConnectionIdFrame[1,<0|1cf74a267c446241|54fb9badc782f937ca8e8539c5803cfc] 3.543 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.640/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.543 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|00af7da8cbee3aa9|47|1 StreamFrame[0(CIB),0,17,fin]] 3.563 -> Packet A|1|S0|00af7da8cbee3aa9|32|1 AckFrame[0|Δ20] 3.573 <- (3) Packet A|2|S0|d7c37d9c89a6fd79|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 3.573 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 3.638/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 3.665/App, because ackElicitingInFlight | RTT:33/16 3.573 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 3.575 <- (4) Packet A|3|S0|d7c37d9c89a6fd79|1054|1 StreamFrame[0(CIB),0,1024] 3.575 <- (5) Packet A|4|S0|d7c37d9c89a6fd79|31|1 StreamFrame[0(CIB),1024,0,fin] 3.575 -> Packet A|2|S0|00af7da8cbee3aa9|34|1 AckFrame[3-2,0|Δ1] 3.576 Finished downloading https://server4:443/fwndncokqw at 52:39.613 on ClientConnection[1265dd4d0af77951/d7c37d9c89a6fd79(V1) with server4/193.167.100.100:443] 3.576 Closing ClientConnection[1265dd4d0af77951/d7c37d9c89a6fd79(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.576 -> Packet A|3|S0|00af7da8cbee3aa9|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-2,0|Δ0] 3.577 Creating connection with server4:443 with v1 3.578 Setting up connection for downloading https://server4:443/dxxwzwcdyo at 52:39.614 on ClientConnection[95100131a1f36e26/13fe1612d90b9ef8(V1) with server4/193.167.100.100:443] 3.578 Original destination connection id: 95100131a1f36e26 (scid: 13fe1612d90b9ef8) >- CryptoStream[I|ClientHello] 3.580 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.780/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.579 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.600 <- (6) Packet A|5|S0|d7c37d9c89a6fd79|32|1 AckFrame[0|Δ26] 3.601 -> Packet A|4|S0|00af7da8cbee3aa9|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-2,0|Δ0] 3.607 <- (7) Packet A|6|S0|d7c37d9c89a6fd79|37|2 AckFrame[3-2,0|Δ0] ConnectionCloseFrame[0|0|] 3.613 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 3.613 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.814/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.613 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 3.617 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.714/Handshake, because peerAwaitingAddressValidation | RTT:33/16 3.617 - unknown transport parameter 0x00b6, size 0 3.617 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 3.617 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 3.617 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 3.621 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.718/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.621 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.621 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.719/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.622 Discarding pn space Initial because first Handshake message is being sent 3.621 Starting downloading https://server4:443/dxxwzwcdyo at 52:39.658 on ClientConnection[95100131a1f36e26/13fe1612d90b9ef8(V1) with server4/193.167.100.100:443] 3.613 <- (2) Packet A|0|S0|13fe1612d90b9ef8|54|1 NewConnectionIdFrame[1,<0|9fb4ad590613ec68|d2c4d784c24edc53c5199d076c24357e] 3.622 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 3.623 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.720/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.623 -> Packet A|0|S0|a7b6eda4ae2e9063|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 3.654 <- (3) Packet A|3|S0|13fe1612d90b9ef8|31|1 StreamFrame[0(CIB),1024,0,fin] 3.674 -> Packet A|1|S0|a7b6eda4ae2e9063|34|1 AckFrame[3,0|Δ19] 3.679 <- (4) Packet A|4|S0|13fe1612d90b9ef8|32|1 AckFrame[0|Δ25] 3.680 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.777/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.712 <- (5) Packet A|5|S0|13fe1612d90b9ef8|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 3.712 State is set to Confirmed reschedule loss detection timer for PTO over 16 millis, based on 3.729/Handshake, because ackElicitingInFlight | RTT:36/18 3.712 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.712 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 3.714 <- (6) Packet A|6|S0|13fe1612d90b9ef8|1054|1 StreamFrame[0(CIB),0,1024,fin] 3.715 Finished downloading https://server4:443/dxxwzwcdyo at 52:39.752 on ClientConnection[95100131a1f36e26/13fe1612d90b9ef8(V1) with server4/193.167.100.100:443] 3.715 -> Packet A|2|S0|a7b6eda4ae2e9063|32|1 AckFrame[6-3|Δ1] 3.715 Closing ClientConnection[95100131a1f36e26/13fe1612d90b9ef8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.715 -> Packet A|3|S0|a7b6eda4ae2e9063|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 3.716 Creating connection with server4:443 with v1 3.716 Setting up connection for downloading https://server4:443/fflxrcsboq at 52:39.753 on ClientConnection[a9c37ee4fcca439d/d4e700dc166bd3cc(V1) with server4/193.167.100.100:443] 3.716 Original destination connection id: a9c37ee4fcca439d (scid: d4e700dc166bd3cc) >- CryptoStream[I|ClientHello] 3.718 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.918/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.718 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.746 <- (7) Packet A|7|S0|13fe1612d90b9ef8|35|2 AckFrame[3-1|Δ0] ConnectionCloseFrame[0|0|] 3.918 loss detection timeout handler running Sending probe 0, because no ack since 3.718. Current RTT: 100/25. 3.918 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.918 (Probe is an initial retransmit) 3.918 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.319/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.918 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.952 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 3.952 probe count not reset on ack because handshake not yet confirmed 3.953 Retransmitting CryptoFrame[0,257] on level Initial 3.953 Cwnd(-): 6000; inflight: 0 3.953 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.353/Initial, because peerAwaitingAddressValidation | RTT:100/25 3.953 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 4.147/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.953 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 3.952 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 3.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.150/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.956 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 3.956 - unknown transport parameter 0x00b6, size 0 3.957 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 3.957 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 3.959 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.153/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.959 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.960 Starting downloading https://server4:443/fflxrcsboq at 52:39.997 on ClientConnection[a9c37ee4fcca439d/d4e700dc166bd3cc(V1) with server4/193.167.100.100:443] 3.960 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 3.960 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.058/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.961 Discarding pn space Initial because first Handshake message is being sent 3.961 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.058/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.961 -> Packet A|0|S0|2e0cdd6af8faea86|47|1 StreamFrame[0(CIB),0,17,fin] 3.952 <- (2) Packet A|0|S0|d4e700dc166bd3cc|54|1 NewConnectionIdFrame[1,<0|c26aaa5ec6cfca4a|8df19bbb21281ad7cc8c2ddf93cd2c74] 3.980 -> Packet A|1|S0|2e0cdd6af8faea86|32|1 AckFrame[0|Δ19] 3.993 <- (3) Packet A|2|S0|d4e700dc166bd3cc|1054|1 StreamFrame[0(CIB),0,1024] 3.993 <- (4) Packet A|3|S0|d4e700dc166bd3cc|31|1 StreamFrame[0(CIB),1024,0,fin] 3.994 Finished downloading https://server4:443/fflxrcsboq at 52:40.030 on ClientConnection[a9c37ee4fcca439d/d4e700dc166bd3cc(V1) with server4/193.167.100.100:443] 3.994 -> Packet A|2|S0|2e0cdd6af8faea86|33|1 AckFrame[3-2,0|Δ0] 3.994 Closing ClientConnection[a9c37ee4fcca439d/d4e700dc166bd3cc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.995 Creating connection with server4:443 with v1 3.994 -> Packet A|3|S0|2e0cdd6af8faea86|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 3.995 Setting up connection for downloading https://server4:443/athsilqqsv at 52:40.032 on ClientConnection[523e6b6fecd3fb8d/d1a97da436c9b4ec(V1) with server4/193.167.100.100:443] 3.995 Original destination connection id: 523e6b6fecd3fb8d (scid: d1a97da436c9b4ec) >- CryptoStream[I|ClientHello] 3.997 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.197/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.997 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.018 <- (5) Packet A|4|S0|d4e700dc166bd3cc|32|1 AckFrame[1-0|Δ7] 4.019 -> Packet A|4|S0|2e0cdd6af8faea86|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 4.025 <- (6) Packet A|5|S0|d4e700dc166bd3cc|35|2 AckFrame[3-0|Δ0] ConnectionCloseFrame[0|0|] 4.030 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.031 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.231/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.030 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 4.034 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.130/Handshake, because peerAwaitingAddressValidation | RTT:32/16 4.034 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 4.034 - unknown transport parameter 0x00b6, size 0 4.034 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 4.034 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 4.037 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.133/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.037 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.038 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.038 Starting downloading https://server4:443/athsilqqsv at 52:40.074 on ClientConnection[523e6b6fecd3fb8d/d1a97da436c9b4ec(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 4.134/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.038 Discarding pn space Initial because first Handshake message is being sent 4.038 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 4.038 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.134/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.038 -> Packet A|0|S0|53c3241d7497f352|47|1 StreamFrame[0(CIB),0,17,fin] 4.068 <- (2) Packet A|1|S0|d1a97da436c9b4ec|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 4.069 State is set to Confirmed reschedule loss detection timer for PTO over 63 millis, based on 4.133/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 4.159/App, because ackElicitingInFlight | RTT:32/16 4.069 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 4.070 <- (3) Packet A|2|S0|d1a97da436c9b4ec|1054|1 StreamFrame[0(CIB),0,1024] 4.070 <- (4) Packet A|3|S0|d1a97da436c9b4ec|31|1 StreamFrame[0(CIB),1024,0,fin] 4.071 -> Packet A|1|S0|53c3241d7497f352|31|1 AckFrame[2-1|Δ0] 4.071 Finished downloading https://server4:443/athsilqqsv at 52:40.108 on ClientConnection[523e6b6fecd3fb8d/d1a97da436c9b4ec(V1) with server4/193.167.100.100:443] 4.071 Closing ClientConnection[523e6b6fecd3fb8d/d1a97da436c9b4ec(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.072 -> Packet A|2|S0|53c3241d7497f352|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 4.072 Creating connection with server4:443 with v1 4.072 Setting up connection for downloading https://server4:443/gfpozntkwz at 52:40.109 on ClientConnection[66c38f4b1c416401/c5934d143fca68bf(V1) with server4/193.167.100.100:443] 4.072 Original destination connection id: 66c38f4b1c416401 (scid: c5934d143fca68bf) >- CryptoStream[I|ClientHello] 4.074 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.274/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.074 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.095 <- (5) Packet A|4|S0|d1a97da436c9b4ec|32|1 AckFrame[0|Δ26] 4.096 -> Packet A|3|S0|53c3241d7497f352|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 4.103 <- (6) Packet A|6|S0|d1a97da436c9b4ec|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 4.273 loss detection timeout handler running Sending probe 0, because no ack since 4.074. Current RTT: 100/25. 4.274 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.274 (Probe is an initial retransmit) 4.274 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.674/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.274 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.308 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 4.308 probe count not reset on ack because handshake not yet confirmed 4.309 Retransmitting CryptoFrame[0,257] on level Initial 4.309 Cwnd(-): 6000; inflight: 0 4.309 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.709/Initial, because peerAwaitingAddressValidation | RTT:100/25 4.309 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 4.503/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.309 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 4.308 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 4.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.506/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.312 - unknown transport parameter 0x00b6, size 0 4.312 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 4.312 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 4.312 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 4.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.509/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.314 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.315 Starting downloading https://server4:443/gfpozntkwz at 52:40.352 on ClientConnection[66c38f4b1c416401/c5934d143fca68bf(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 4.412/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.315 Discarding pn space Initial because first Handshake message is being sent 4.315 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 4.308 <- (2) Packet A|0|S0|c5934d143fca68bf|54|1 NewConnectionIdFrame[1,<0|9a2b8ae5e4afff17|0c04d5c2adbefcd636b149500a0b114b] 4.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 4.413/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.315 -> Packet A|0|S0|4fd5d15f55bb91f9|47|1 StreamFrame[0(CIB),0,17,fin] 4.335 -> Packet A|1|S0|4fd5d15f55bb91f9|32|1 AckFrame[0|Δ19] 4.341 Discarding packet (48 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.412 loss detection timeout handler running Sending probe 0, because no ack since 4.314. Current RTT: 33/16. 4.412 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.412 (Probe is a handshake retransmit) 4.412 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 4.606/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.412 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 4.606 loss detection timeout handler running Sending probe 1, because no ack since 4.315. Current RTT: 33/16. 4.606 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.606 (Probe is a handshake retransmit) 4.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 4.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.606 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 4.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 4.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 4.607 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 4.639 <- (4) Packet A|1|S0|c5934d143fca68bf|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 4.639 State is set to Confirmed reschedule loss detection timer for PTO over 164 millis, based on 4.803/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -201 millis, based on 4.437/App, because ackElicitingInFlight | RTT:33/16 4.639 Discarding pn space Handshake because HandshakeDone is received 4.639 loss detection timeout handler running Sending probe 0, because no ack since 4.315. Current RTT: 33/16. 4.639 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 4.884/App, because ackElicitingInFlight | RTT:33/16 4.640 -> Packet PA|2|S0|4fd5d15f55bb91f9|47|1 StreamFrame[0(CIB),0,17,fin] 4.659 -> Packet A|3|S0|4fd5d15f55bb91f9|32|1 AckFrame[1-0|Δ19] 4.672 <- (5) Packet A|2|S0|c5934d143fca68bf|1054|1 StreamFrame[0(CIB),0,1024] 4.672 <- (6) Packet A|3|S0|c5934d143fca68bf|31|1 StreamFrame[0(CIB),1024,0,fin] 4.673 -> Packet A|4|S0|4fd5d15f55bb91f9|31|1 AckFrame[3-0|Δ0] 4.673 Finished downloading https://server4:443/gfpozntkwz at 52:40.710 on ClientConnection[66c38f4b1c416401/c5934d143fca68bf(V1) with server4/193.167.100.100:443] 4.673 Closing ClientConnection[66c38f4b1c416401/c5934d143fca68bf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.674 -> Packet A|5|S0|4fd5d15f55bb91f9|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 4.674 Creating connection with server4:443 with v1 4.674 Setting up connection for downloading https://server4:443/vjfnwzzicr at 52:40.711 on ClientConnection[6a887fbf36e7a4f5/eb283c50aa81061c(V1) with server4/193.167.100.100:443] 4.675 Original destination connection id: 6a887fbf36e7a4f5 (scid: eb283c50aa81061c) >- CryptoStream[I|ClientHello] 4.677 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.877/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.676 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.704 <- (7) Packet A|5|S0|c5934d143fca68bf|37|2 AckFrame[5,3-2|Δ0] ConnectionCloseFrame[0|0|] 4.709 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.710 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.910/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.709 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 4.713 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.809/Handshake, because peerAwaitingAddressValidation | RTT:32/16 4.714 - unknown transport parameter 0x00b6, size 0 4.713 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 4.714 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 4.714 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 4.717 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.813/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.717 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.718 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.718 Starting downloading https://server4:443/vjfnwzzicr at 52:40.755 on ClientConnection[6a887fbf36e7a4f5/eb283c50aa81061c(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 4.814/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.718 Discarding pn space Initial because first Handshake message is being sent 4.709 <- (2) Packet A|0|S0|eb283c50aa81061c|54|1 NewConnectionIdFrame[1,<0|16c28a4f906db0ef|f412ddec2f97972fcecd212bdbac6011] 4.719 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 4.815/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.718 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|34ae375b8febfbb0|47|1 StreamFrame[0(CIB),0,17,fin]] 4.738 -> Packet A|1|S0|34ae375b8febfbb0|32|1 AckFrame[0|Δ19] 4.748 <- (3) Packet A|1|S0|eb283c50aa81061c|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 4.749 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 4.813/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 4.839/App, because ackElicitingInFlight | RTT:32/16 4.749 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 4.750 <- (4) Packet A|3|S0|eb283c50aa81061c|31|1 StreamFrame[0(CIB),1024,0,fin] 4.751 -> Packet A|2|S0|34ae375b8febfbb0|34|1 AckFrame[3,1-0|Δ1] 4.775 <- (5) Packet A|4|S0|eb283c50aa81061c|32|1 AckFrame[1-0|Δ6] 4.776 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.873 <- (6) Packet A|5|S0|eb283c50aa81061c|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 4.873 <- (7) Packet A|6|S0|eb283c50aa81061c|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 4.874 -> Packet A|3|S0|34ae375b8febfbb0|33|1 AckFrame[6-3,1|Δ0] 4.906 <- (8) Packet A|7|S0|eb283c50aa81061c|1054|1 StreamFrame[0(CIB),0,1024,fin] 4.907 Finished downloading https://server4:443/vjfnwzzicr at 52:40.944 on ClientConnection[6a887fbf36e7a4f5/eb283c50aa81061c(V1) with server4/193.167.100.100:443] 4.907 Closing ClientConnection[6a887fbf36e7a4f5/eb283c50aa81061c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.907 -> Packet A|4|S0|34ae375b8febfbb0|37|2 ConnectionCloseFrame[0|0|] AckFrame[7-3,1|Δ0] 4.907 Creating connection with server4:443 with v1 4.908 Setting up connection for downloading https://server4:443/vfmoxqfrdn at 52:40.945 on ClientConnection[235aa40b2827fb5e/5be8aafc4c87cf93(V1) with server4/193.167.100.100:443] 4.908 Original destination connection id: 235aa40b2827fb5e (scid: 5be8aafc4c87cf93) >- CryptoStream[I|ClientHello] 4.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.110/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.910 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.938 <- (9) Packet A|8|S0|eb283c50aa81061c|35|2 AckFrame[4-3|Δ0] ConnectionCloseFrame[0|0|] 4.943 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 4.943 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.143/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 4.943 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 4.946 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 5.042/Handshake, because peerAwaitingAddressValidation | RTT:32/16 4.946 - unknown transport parameter 0x00b6, size 0 4.946 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 4.946 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 4.946 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 4.949 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 5.045/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.949 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.950 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 5.046/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.950 Discarding pn space Initial because first Handshake message is being sent 4.950 Starting downloading https://server4:443/vfmoxqfrdn at 52:40.987 on ClientConnection[235aa40b2827fb5e/5be8aafc4c87cf93(V1) with server4/193.167.100.100:443] 4.950 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 4.943 <- (2) Packet A|0|S0|5be8aafc4c87cf93|54|1 NewConnectionIdFrame[1,<0|8183cc39760ba67d|fa419ee6b8bbc05f79806a04630994e2] 4.950 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 5.046/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 4.950 -> Packet A|0|S0|d3ae6ea9a432b5aa|47|1 StreamFrame[0(CIB),0,17,fin] 4.970 -> Packet A|1|S0|d3ae6ea9a432b5aa|32|1 AckFrame[0|Δ19] 5.046 loss detection timeout handler running Sending probe 0, because no ack since 4.949. Current RTT: 32/16. 5.046 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.046 (Probe is a handshake retransmit) 5.046 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 5.238/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.046 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 5.114 <- (3) Packet A|2|S0|5be8aafc4c87cf93|54|1 NewConnectionIdFrame[1,<0|8183cc39760ba67d|fa419ee6b8bbc05f79806a04630994e2] 5.134 -> Packet A|2|S0|d3ae6ea9a432b5aa|34|1 AckFrame[2,0|Δ19] 5.237 loss detection timeout handler running Sending probe 1, because no ack since 4.950. Current RTT: 32/16. 5.238 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.238 (Probe is a handshake retransmit) 5.238 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 5.622/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.238 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 5.239 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 5.623/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.239 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 5.247 <- (4) Packet A|4|S0|5be8aafc4c87cf93|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 5.247 State is set to Confirmed reschedule loss detection timer for PTO over 186 millis, based on 5.434/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -176 millis, based on 5.071/App, because ackElicitingInFlight | RTT:32/16 5.248 Discarding pn space Handshake because HandshakeDone is received 5.248 loss detection timeout handler running Sending probe 0, because no ack since 4.950. Current RTT: 32/16. 5.248 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 5.490/App, because ackElicitingInFlight | RTT:32/16 5.248 -> Packet PA|3|S0|d3ae6ea9a432b5aa|47|1 StreamFrame[0(CIB),0,17,fin] 5.247 <- (5) Packet A|5|S0|5be8aafc4c87cf93|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 5.248 -> Packet A|4|S0|d3ae6ea9a432b5aa|35|1 AckFrame[5-4,2,0|Δ0] 5.279 <- (6) Packet A|6|S0|5be8aafc4c87cf93|31|1 AckFrame[3-2|Δ0] 5.280 Cwnd(-): 6000; inflight: 0 5.280 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.280 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 5.280 <- (7) Packet A|7|S0|5be8aafc4c87cf93|1054|1 StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 108 millis, based on 5.390/App, because ackElicitingInFlight | RTT:32/13 5.281 -> Packet A|5|S0|d3ae6ea9a432b5aa|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5-4|Δ0] 5.280 <- (8) Packet A|8|S0|5be8aafc4c87cf93|31|1 StreamFrame[0(CIB),1024,0,fin] 5.281 Finished downloading https://server4:443/vfmoxqfrdn at 52:41.318 on ClientConnection[235aa40b2827fb5e/5be8aafc4c87cf93(V1) with server4/193.167.100.100:443] 5.281 Closing ClientConnection[235aa40b2827fb5e/5be8aafc4c87cf93(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.281 -> Packet A|6|S0|d3ae6ea9a432b5aa|31|1 AckFrame[8-4|Δ0] 5.282 Creating connection with server4:443 with v1 5.282 -> Packet A|7|S0|d3ae6ea9a432b5aa|35|2 ConnectionCloseFrame[0|0|] AckFrame[8-4|Δ0] 5.283 Setting up connection for downloading https://server4:443/mtioiudcog at 52:41.320 on ClientConnection[480c8051478c6548/0262dce479452d69(V1) with server4/193.167.100.100:443] 5.283 Original destination connection id: 480c8051478c6548 (scid: 0262dce479452d69) >- CryptoStream[I|ClientHello] 5.284 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.484/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.284 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.313 <- (9) Packet A|9|S0|5be8aafc4c87cf93|37|2 AckFrame[7,4|Δ0] ConnectionCloseFrame[0|0|] 5.317 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 5.318 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.518/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.317 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 5.321 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.321 - unknown transport parameter 0x00b6, size 0 reschedule loss detection timer for PTO over 95 millis, based on 5.417/Handshake, because peerAwaitingAddressValidation | RTT:32/16 5.321 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 5.320 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 5.321 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 5.323 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 5.419/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.323 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.323 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.323 Starting downloading https://server4:443/mtioiudcog at 52:41.360 on ClientConnection[480c8051478c6548/0262dce479452d69(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 5.419/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.323 Discarding pn space Initial because first Handshake message is being sent 5.323 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 5.317 <- (2) Packet A|0|S0|0262dce479452d69|54|1 NewConnectionIdFrame[1,<0|b889eafa1baaf77a|b174a4e5cec71914c970624f5bad31a2] 5.324 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 5.420/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 5.324 -> Packet A|0|S0|8c6d10835694c866|47|1 StreamFrame[0(CIB),0,17,fin] 5.344 -> Packet A|1|S0|8c6d10835694c866|32|1 AckFrame[0|Δ19] 5.354 <- (3) Packet A|1|S0|0262dce479452d69|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 5.355 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 5.419/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 5.445/App, because ackElicitingInFlight | RTT:32/16 5.355 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 5.356 <- (4) Packet A|3|S0|0262dce479452d69|1054|1 StreamFrame[0(CIB),0,1024] 5.356 <- (5) Packet A|4|S0|0262dce479452d69|31|1 StreamFrame[0(CIB),1024,0,fin] 5.356 -> Packet A|2|S0|8c6d10835694c866|34|1 AckFrame[3,1-0|Δ1] 5.357 Finished downloading https://server4:443/mtioiudcog at 52:41.393 on ClientConnection[480c8051478c6548/0262dce479452d69(V1) with server4/193.167.100.100:443] 5.357 Closing ClientConnection[480c8051478c6548/0262dce479452d69(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.357 -> Packet A|3|S0|8c6d10835694c866|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1-0|Δ0] 5.358 Creating connection with server4:443 with v1 5.358 Setting up connection for downloading https://server4:443/lhscnapmzz at 52:41.395 on ClientConnection[ac3619733f3e2e08/e6777abe3a8a4645(V1) with server4/193.167.100.100:443] 5.358 Original destination connection id: ac3619733f3e2e08 (scid: e6777abe3a8a4645) >- CryptoStream[I|ClientHello] 5.360 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.560/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.360 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.381 <- (6) Packet A|5|S0|0262dce479452d69|32|1 AckFrame[1-0|Δ7] 5.382 -> Packet A|4|S0|8c6d10835694c866|37|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1-0|Δ0] 5.388 <- (7) Packet A|6|S0|0262dce479452d69|35|2 AckFrame[3-0|Δ0] ConnectionCloseFrame[0|0|] 5.393 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 5.560 loss detection timeout handler running Sending probe 0, because no ack since 5.360. Current RTT: 100/25. 5.560 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.560 (Probe is an initial retransmit) 5.560 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.960/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.560 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.695 <- (2) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 5.698 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 5.898/Handshake, because peerAwaitingAddressValidation | RTT:100/25 5.699 Discarding pn space Initial because first Handshake message is being sent 5.699 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 5.899/Handshake, because peerAwaitingAddressValidation | RTT:100/25 5.699 -> Packet I|2|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1153) 5.736 <- (3) Packet H|1|L|773|1 CryptoFrame[0,727] 5.737 - unknown transport parameter 0x00b6, size 0 5.737 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 5.737 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 5.740 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 5.940/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.740 -> Packet H|0|L|80|1 CryptoFrame[0,36] 5.741 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 5.741 Starting downloading https://server4:443/lhscnapmzz at 52:41.778 on ClientConnection[ac3619733f3e2e08/e6777abe3a8a4645(V1) with server4/193.167.100.100:443] 5.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 5.941/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.741 -> Packet A|0|S0|46841a9a52bd6f50|47|1 StreamFrame[0(CIB),0,17,fin] 5.941 loss detection timeout handler running Sending probe 0, because no ack since 5.740. Current RTT: 100/25. 5.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.941 (Probe is a handshake retransmit) 5.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.341/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.941 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 5.960 <- (4) Packet H|3|L|773|1 CryptoFrame[0,727] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.961 <- (5) Packet H|4|L|773|1 CryptoFrame[0,727] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.961 -> Packet H|3|L|48|1 AckFrame[3,1|Δ0] 5.961 -> Packet H|4|L|48|1 AckFrame[4-3,1|Δ0] 5.972 <- (6) Packet A|1|S0|e6777abe3a8a4645|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 5.973 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 6.191/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -7 millis, based on 5.966/App, because ackElicitingInFlight | RTT:100/25 5.973 loss detection timeout handler running 5.973 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 5.741. Current RTT: 100/25. 5.973 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 449 millis, based on 6.424/App, because ackElicitingInFlight | RTT:100/25 5.974 -> Packet PA|1|S0|46841a9a52bd6f50|47|1 StreamFrame[0(CIB),0,17,fin] 5.993 -> Packet A|2|S0|46841a9a52bd6f50|32|1 AckFrame[1|Δ19] 6.005 <- (7) Packet A|3|S0|e6777abe3a8a4645|31|1 StreamFrame[0(CIB),1024,0,fin] 6.024 <- (8) Packet A|4|S0|e6777abe3a8a4645|54|1 NewConnectionIdFrame[1,<0|c624985dcf6afae5|b722e44f8ea355e99cb1d6fba3334a6a] 6.024 -> Packet A|3|S0|46841a9a52bd6f50|34|1 AckFrame[4-3,1|Δ18] 6.030 <- (9) Packet A|5|S0|e6777abe3a8a4645|32|1 AckFrame[2-1|Δ6] 6.030 Cwnd(-): 6000; inflight: 0 6.030 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.030 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 224 millis, based on 6.255/App, because ackElicitingInFlight | RTT:100/25 6.030 -> Packet A|4|S0|46841a9a52bd6f50|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4-3|Δ0] 6.056 <- (10) Packet A|6|S0|e6777abe3a8a4645|1054|1 StreamFrame[0(CIB),0,1024,fin] 6.057 Finished downloading https://server4:443/lhscnapmzz at 52:42.094 on ClientConnection[ac3619733f3e2e08/e6777abe3a8a4645(V1) with server4/193.167.100.100:443] 6.057 Closing ClientConnection[ac3619733f3e2e08/e6777abe3a8a4645(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.058 Creating connection with server4:443 with v1 6.058 -> Packet A|5|S0|46841a9a52bd6f50|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 6.059 Setting up connection for downloading https://server4:443/extifzubnd at 52:42.096 on ClientConnection[5b3569fa8bf76e98/4cc43d7fe7cb8835(V1) with server4/193.167.100.100:443] 6.059 Original destination connection id: 5b3569fa8bf76e98 (scid: 4cc43d7fe7cb8835) >- CryptoStream[I|ClientHello] 6.061 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.261/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.060 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.087 <- (11) Packet A|7|S0|e6777abe3a8a4645|32|1 AckFrame[4-1|Δ26] 6.088 -> Packet A|6|S0|46841a9a52bd6f50|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 6.094 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 6.094 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.294/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 6.094 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,728] Padding(251) 6.097 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.194/Handshake, because peerAwaitingAddressValidation | RTT:33/16 6.097 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 6.098 - unknown transport parameter 0x00b6, size 0 6.098 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 6.098 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 6.101 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.198/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.101 -> Packet H|0|L|80|1 CryptoFrame[0,36] 6.102 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.199/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.102 Discarding pn space Initial because first Handshake message is being sent 6.102 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 6.102 Starting downloading https://server4:443/extifzubnd at 52:42.139 on ClientConnection[5b3569fa8bf76e98/4cc43d7fe7cb8835(V1) with server4/193.167.100.100:443] 6.103 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 6.200/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 6.102 -> Packet A|0|S0|62391f446535312e|47|1 StreamFrame[0(CIB),0,17,fin] 6.119 <- (12) Packet A|8|S0|e6777abe3a8a4645|37|2 AckFrame[6,4-3|Δ0] ConnectionCloseFrame[0|0|] 6.132 <- (2) Packet A|1|S0|4cc43d7fe7cb8835|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 6.133 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 6.198/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 6.224/App, because ackElicitingInFlight | RTT:33/16 6.133 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 6.134 <- (3) Packet A|2|S0|4cc43d7fe7cb8835|1054|1 StreamFrame[0(CIB),0,1024] 6.135 -> Packet A|1|S0|62391f446535312e|32|1 AckFrame[2-1|Δ1] 6.159 <- (4) Packet A|4|S0|4cc43d7fe7cb8835|32|1 AckFrame[0|Δ25] 6.159 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.269 <- (5) Packet A|5|S0|4cc43d7fe7cb8835|54|1 NewConnectionIdFrame[1,<0|3040e1c9c6ae9cc4|1ebc5800b096c5c7b77475e64d2c275d] 6.270 <- (6) Packet A|6|S0|4cc43d7fe7cb8835|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 6.270 -> Packet A|2|S0|62391f446535312e|33|1 AckFrame[6-4,2-1|Δ0] 6.422 <- (7) Packet A|9|S0|4cc43d7fe7cb8835|30|2 PingFrame[] Padding(3) 6.442 -> Packet A|3|S0|62391f446535312e|36|1 AckFrame[9,6-4,2-1|Δ19] 6.662 <- (8) Packet A|10|S0|4cc43d7fe7cb8835|30|2 PingFrame[] Padding(3) 6.662 <- (9) Packet A|11|S0|4cc43d7fe7cb8835|30|2 PingFrame[] Padding(3) 6.663 -> Packet A|4|S0|62391f446535312e|35|1 AckFrame[11-9,6-4,2-1|Δ0] 7.143 <- (10) Packet A|12|S0|4cc43d7fe7cb8835|30|2 PingFrame[] Padding(3) 7.143 <- (11) Packet A|13|S0|4cc43d7fe7cb8835|30|2 PingFrame[] Padding(3) 7.144 -> Packet A|5|S0|62391f446535312e|35|1 AckFrame[13-9,6-4,2-1|Δ0] 7.175 <- (12) Packet A|14|S0|4cc43d7fe7cb8835|31|1 StreamFrame[0(CIB),1024,0,fin] 7.175 Finished downloading https://server4:443/extifzubnd at 52:43.212 on ClientConnection[5b3569fa8bf76e98/4cc43d7fe7cb8835(V1) with server4/193.167.100.100:443] 7.175 Closing ClientConnection[5b3569fa8bf76e98/4cc43d7fe7cb8835(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.176 -> Packet A|6|S0|62391f446535312e|39|2 ConnectionCloseFrame[0|0|] AckFrame[14-9,6-4,2-1|Δ0] 7.176 Creating connection with server4:443 with v1 7.177 Setting up connection for downloading https://server4:443/myznodhbrh at 52:43.214 on ClientConnection[682919f4cc1b54f5/3e3b91ba3d722caa(V1) with server4/193.167.100.100:443] 7.177 Original destination connection id: 682919f4cc1b54f5 (scid: 3e3b91ba3d722caa) >- CryptoStream[I|ClientHello] 7.179 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.379/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.178 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.284 <- (13) Packet A|15|S0|4cc43d7fe7cb8835|30|2 PingFrame[] Padding(3) 7.284 <- (14) Packet A|16|S0|4cc43d7fe7cb8835|30|2 PingFrame[] Padding(3) 7.285 -> Packet A|7|S0|62391f446535312e|39|2 ConnectionCloseFrame[0|0|] AckFrame[14-9,6-4,2-1|Δ0] 7.285 -> Packet A|8|S0|62391f446535312e|39|2 ConnectionCloseFrame[0|0|] AckFrame[14-9,6-4,2-1|Δ0] 7.378 loss detection timeout handler running Sending probe 0, because no ack since 7.178. Current RTT: 100/25. 7.378 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.378 (Probe is an initial retransmit) 7.379 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.779/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.378 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.713 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 7.716 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.916/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.716 Discarding pn space Initial because first Handshake message is being sent 7.716 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.717 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.917/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.716 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 7.749 <- (3) Packet H|1|L|772|1 CryptoFrame[0,726] 7.750 - unknown transport parameter 0x00b6, size 0 7.750 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 7.750 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.752 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.952/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.752 Starting downloading https://server4:443/myznodhbrh at 52:43.789 on ClientConnection[682919f4cc1b54f5/3e3b91ba3d722caa(V1) with server4/193.167.100.100:443] 7.752 -> Packet H|0|L|80|1 CryptoFrame[0,36] 7.753 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 7.753 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.953/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.753 -> Packet A|0|S0|4e4b6ae1d3b63b5c|47|1 StreamFrame[0(CIB),0,17,fin] 7.783 <- (4) Packet A|1|S0|3e3b91ba3d722caa|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 7.784 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 7.952/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 7.978/App, because ackElicitingInFlight | RTT:100/25 7.784 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 7.804 -> Packet A|1|S0|4e4b6ae1d3b63b5c|32|1 AckFrame[1|Δ19] 7.977 loss detection timeout handler running Sending probe 0, because no ack since 7.753. Current RTT: 100/25. 7.977 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 8.428/App, because ackElicitingInFlight | RTT:100/25 7.978 -> Packet PA|2|S0|4e4b6ae1d3b63b5c|47|1 StreamFrame[0(CIB),0,17,fin] 8.009 <- (5) Packet A|2|S0|3e3b91ba3d722caa|31|1 AckFrame[2|Δ0] 8.009 Cwnd(-): 6000; inflight: 0 8.009 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.009 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 114 millis, based on 8.124/App, because ackElicitingInFlight | RTT:30/15 8.009 -> Packet A|3|S0|4e4b6ae1d3b63b5c|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 8.067 <- (6) Packet A|6|S0|3e3b91ba3d722caa|32|1 AckFrame[3-2|Δ26] 8.067 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.405 <- (7) Packet A|7|S0|3e3b91ba3d722caa|54|1 NewConnectionIdFrame[1,<0|6eb9df226263e048|6d8429aed4a4aa5ae938c8e709fa3f7c] 8.405 <- (8) Packet A|8|S0|3e3b91ba3d722caa|54|1 NewConnectionIdFrame[1,<0|6eb9df226263e048|6d8429aed4a4aa5ae938c8e709fa3f7c] 8.406 -> Packet A|4|S0|4e4b6ae1d3b63b5c|33|1 AckFrame[8-6,2|Δ0] 8.761 <- (9) Packet A|11|S0|3e3b91ba3d722caa|30|2 PingFrame[] Padding(3) 8.781 -> Packet A|5|S0|4e4b6ae1d3b63b5c|36|1 AckFrame[11,8-6,2|Δ19] 9.407 <- (10) Packet A|12|S0|3e3b91ba3d722caa|30|2 PingFrame[] Padding(3) 9.407 <- (11) Packet A|13|S0|3e3b91ba3d722caa|30|2 PingFrame[] Padding(3) 9.407 -> Packet A|6|S0|4e4b6ae1d3b63b5c|35|1 AckFrame[13-11,8-6,2|Δ0] 10.697 <- (12) Packet A|14|S0|3e3b91ba3d722caa|30|2 PingFrame[] Padding(3) 10.717 -> Packet A|7|S0|4e4b6ae1d3b63b5c|36|1 AckFrame[14-11,8-6,2|Δ19] 10.749 <- (13) Packet A|16|S0|3e3b91ba3d722caa|1054|1 StreamFrame[0(CIB),0,1024,fin] 10.750 Finished downloading https://server4:443/myznodhbrh at 52:46.787 on ClientConnection[682919f4cc1b54f5/3e3b91ba3d722caa(V1) with server4/193.167.100.100:443] 10.750 Closing ClientConnection[682919f4cc1b54f5/3e3b91ba3d722caa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.750 -> Packet A|8|S0|4e4b6ae1d3b63b5c|41|2 ConnectionCloseFrame[0|0|] AckFrame[16,14-11,8-6,2|Δ0] 10.750 Creating connection with server4:443 with v1 10.751 Setting up connection for downloading https://server4:443/kjteikrdly at 52:46.788 on ClientConnection[4cfb072c4dccd8fe/6f163fd9d9cfef80(V1) with server4/193.167.100.100:443] 10.751 Original destination connection id: 4cfb072c4dccd8fe (scid: 6f163fd9d9cfef80) >- CryptoStream[I|ClientHello] 10.753 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.953/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.752 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.781 <- (14) Packet A|17|S0|3e3b91ba3d722caa|37|2 AckFrame[8-7,4|Δ0] ConnectionCloseFrame[0|0|] 10.952 loss detection timeout handler running Sending probe 0, because no ack since 10.752. Current RTT: 100/25. 10.952 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.952 (Probe is an initial retransmit) 10.952 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.353/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.952 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.352 loss detection timeout handler running Sending probe 1, because no ack since 10.952. Current RTT: 100/25. 11.352 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.352 (Probe is an initial retransmit) 11.352 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 12.152/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.352 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.353 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 12.153/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.353 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.386 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 11.386 probe count not reset on ack because handshake not yet confirmed 11.386 Retransmitting CryptoFrame[0,257] on level Initial 11.387 Cwnd(-): 6000; inflight: 1200 11.387 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 12.187/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.387 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 11.775/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.387 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 11.386 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,728] Padding(251) 11.390 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 11.778/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.389 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 11.390 - unknown transport parameter 0x00b6, size 0 11.390 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 11.390 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 11.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 11.780/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.392 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.392 Starting downloading https://server4:443/kjteikrdly at 52:47.429 on ClientConnection[4cfb072c4dccd8fe/6f163fd9d9cfef80(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 11.489/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.392 Discarding pn space Initial because first Handshake message is being sent 11.392 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 11.386 <- (2) Packet A|0|S0|6f163fd9d9cfef80|54|1 NewConnectionIdFrame[1,<0|f48fc53b912d0662|fbe0e68d93af99218a15232a4200f4fe] 11.393 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 11.490/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 11.393 -> Packet A|0|S0|80e57a68f675e185|47|1 StreamFrame[0(CIB),0,17,fin] 11.413 -> Packet A|1|S0|80e57a68f675e185|32|1 AckFrame[0|Δ19] 11.423 <- (3) Packet A|1|S0|6f163fd9d9cfef80|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 11.423 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 11.489/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 11.515/App, because ackElicitingInFlight | RTT:33/16 11.424 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 11.424 <- (4) Packet A|2|S0|6f163fd9d9cfef80|1054|1 StreamFrame[0(CIB),0,1024] 11.425 -> Packet A|2|S0|80e57a68f675e185|31|1 AckFrame[2-0|Δ0] 11.451 <- (5) Packet A|4|S0|6f163fd9d9cfef80|32|1 AckFrame[1-0|Δ7] 11.451 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.545 <- (6) Packet A|5|S0|6f163fd9d9cfef80|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 11.565 -> Packet A|3|S0|80e57a68f675e185|34|1 AckFrame[5-4,2-1|Δ19] 11.787 <- (7) Packet A|7|S0|6f163fd9d9cfef80|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 11.788 <- (8) Packet A|8|S0|6f163fd9d9cfef80|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 11.788 -> Packet A|4|S0|80e57a68f675e185|35|1 AckFrame[8-7,5-4,2-1|Δ0] 11.819 <- (9) Packet A|9|S0|6f163fd9d9cfef80|31|1 StreamFrame[0(CIB),1024,0,fin] 11.820 Finished downloading https://server4:443/kjteikrdly at 52:47.856 on ClientConnection[4cfb072c4dccd8fe/6f163fd9d9cfef80(V1) with server4/193.167.100.100:443] 11.820 Closing ClientConnection[4cfb072c4dccd8fe/6f163fd9d9cfef80(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.820 Creating connection with server4:443 with v1 11.820 -> Packet A|5|S0|80e57a68f675e185|39|2 ConnectionCloseFrame[0|0|] AckFrame[9-7,5-4,2-1|Δ0] 11.821 Setting up connection for downloading https://server4:443/lqoagdtiut at 52:47.858 on ClientConnection[88c430c165c8410f/e4ed082b306d8359(V1) with server4/193.167.100.100:443] 11.821 Original destination connection id: 88c430c165c8410f (scid: e4ed082b306d8359) >- CryptoStream[I|ClientHello] 11.822 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.022/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.822 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.851 <- (10) Packet A|10|S0|6f163fd9d9cfef80|35|2 AckFrame[5-4|Δ0] ConnectionCloseFrame[0|0|] 12.022 loss detection timeout handler running Sending probe 0, because no ack since 11.822. Current RTT: 100/25. 12.022 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.022 (Probe is an initial retransmit) 12.022 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.422/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.022 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.422 loss detection timeout handler running Sending probe 1, because no ack since 12.022. Current RTT: 100/25. 12.422 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.422 (Probe is an initial retransmit) 12.423 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.223/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.422 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.423 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.223/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.423 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.456 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[2|Δ0] CryptoFrame[0,123] 12.456 probe count not reset on ack because handshake not yet confirmed 12.457 Retransmitting CryptoFrame[0,257] on level Initial 12.457 Cwnd(-): 6000; inflight: 1200 12.457 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.257/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.457 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 12.845/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.457 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 12.456 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 12.460 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 12.848/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.460 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 12.460 - unknown transport parameter 0x00b6, size 0 12.460 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 12.460 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 12.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 12.850/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.462 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.463 Starting downloading https://server4:443/lqoagdtiut at 52:48.500 on ClientConnection[88c430c165c8410f/e4ed082b306d8359(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 12.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.463 Discarding pn space Initial because first Handshake message is being sent 12.463 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.456 <- (2) Packet A|0|S0|e4ed082b306d8359|54|1 NewConnectionIdFrame[1,<0|20978a9179fb8bfd|48fac83a3b2f2fd544b0ecc67b771133] 12.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 12.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.463 -> Packet A|0|S0|e7a6d9084eeea16c|47|1 StreamFrame[0(CIB),0,17,fin] 12.483 -> Packet A|1|S0|e7a6d9084eeea16c|32|1 AckFrame[0|Δ19] 12.489 Discarding packet (50 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 12.493 <- (4) Packet A|1|S0|e4ed082b306d8359|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 12.494 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 12.559/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 12.585/App, because ackElicitingInFlight | RTT:33/16 12.494 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 12.495 <- (5) Packet A|2|S0|e4ed082b306d8359|1054|1 StreamFrame[0(CIB),0,1024] 12.495 <- (6) Packet A|3|S0|e4ed082b306d8359|31|1 StreamFrame[0(CIB),1024,0,fin] 12.495 -> Packet A|2|S0|e7a6d9084eeea16c|32|1 AckFrame[2-0|Δ1] 12.496 Finished downloading https://server4:443/lqoagdtiut at 52:48.533 on ClientConnection[88c430c165c8410f/e4ed082b306d8359(V1) with server4/193.167.100.100:443] 12.496 Closing ClientConnection[88c430c165c8410f/e4ed082b306d8359(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.496 -> Packet A|3|S0|e7a6d9084eeea16c|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 12.496 Creating connection with server4:443 with v1 12.497 Setting up connection for downloading https://server4:443/xgufuabbee at 52:48.534 on ClientConnection[fc6099c0b8adb8db/118e2c135ef14893(V1) with server4/193.167.100.100:443] 12.497 Original destination connection id: fc6099c0b8adb8db (scid: 118e2c135ef14893) >- CryptoStream[I|ClientHello] 12.499 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.699/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.499 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.520 <- (7) Packet A|4|S0|e4ed082b306d8359|32|1 AckFrame[1-0|Δ6] 12.520 -> Packet A|4|S0|e7a6d9084eeea16c|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 12.527 <- (8) Packet A|5|S0|e4ed082b306d8359|35|2 AckFrame[3-0|Δ0] ConnectionCloseFrame[0|0|] 12.531 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 12.532 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.732/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 12.535 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.531 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) reschedule loss detection timer for PTO over 95 millis, based on 12.631/Handshake, because peerAwaitingAddressValidation | RTT:32/16 12.535 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 12.536 - unknown transport parameter 0x00b6, size 0 12.536 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 12.536 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 12.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 12.635/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 12.539 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.539 Starting downloading https://server4:443/xgufuabbee at 52:48.576 on ClientConnection[fc6099c0b8adb8db/118e2c135ef14893(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 12.635/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 12.539 Discarding pn space Initial because first Handshake message is being sent 12.539 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 12.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 12.636/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 12.540 -> Packet A|0|S0|90ac4b394e0b4832|47|1 StreamFrame[0(CIB),0,17,fin] 12.635 loss detection timeout handler running Sending probe 0, because no ack since 12.539. Current RTT: 32/16. 12.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.635 (Probe is a handshake retransmit) 12.635 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 12.827/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 12.635 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 12.642 <- (2) Packet H|1|L|772|1 CryptoFrame[0,726] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.643 -> Packet H|3|L|46|1 AckFrame[1-0|Δ0] 12.666 <- (3) Packet A|1|S0|118e2c135ef14893|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 12.667 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 12.782/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -6 millis, based on 12.661/App, because ackElicitingInFlight | RTT:32/16 12.667 Discarding pn space Handshake because HandshakeDone is received 12.667 loss detection timeout handler running Sending probe 0, because no ack since 12.540. Current RTT: 32/16. 12.667 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 12.910/App, because ackElicitingInFlight | RTT:32/16 12.668 -> Packet PA|1|S0|90ac4b394e0b4832|47|1 StreamFrame[0(CIB),0,17,fin] 12.687 -> Packet A|2|S0|90ac4b394e0b4832|32|1 AckFrame[1|Δ19] 12.718 <- (4) Packet A|2|S0|118e2c135ef14893|54|1 NewConnectionIdFrame[1,<0|7852728b301a0185|14f2ed6e98db7613b0a529b03309ce91] 12.738 -> Packet A|3|S0|90ac4b394e0b4832|32|1 AckFrame[2-1|Δ19] 12.909 loss detection timeout handler running Sending probe 1, because no ack since 12.668. Current RTT: 32/16. 12.909 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 13.393/App, because ackElicitingInFlight | RTT:32/16 12.909 -> Packet PA|4|S0|90ac4b394e0b4832|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 13.394/App, because ackElicitingInFlight | RTT:32/16 12.910 -> Packet PA|5|S0|90ac4b394e0b4832|47|1 StreamFrame[0(CIB),0,17,fin] 12.942 <- (5) Packet A|4|S0|118e2c135ef14893|1054|1 StreamFrame[0(CIB),0,1024] 12.961 -> Packet A|6|S0|90ac4b394e0b4832|34|1 AckFrame[4,2-1|Δ19] 13.068 <- (6) Packet A|7|S0|118e2c135ef14893|30|2 PingFrame[] Padding(3) 13.088 -> Packet A|7|S0|90ac4b394e0b4832|36|1 AckFrame[7,4,2-1|Δ19] 13.321 <- (7) Packet A|8|S0|118e2c135ef14893|30|2 PingFrame[] Padding(3) 13.321 <- (8) Packet A|9|S0|118e2c135ef14893|30|2 PingFrame[] Padding(3) 13.322 -> Packet A|8|S0|90ac4b394e0b4832|35|1 AckFrame[9-7,4,2-1|Δ0] 13.353 <- (9) Packet A|10|S0|118e2c135ef14893|31|1 StreamFrame[0(CIB),1024,0,fin] 13.353 Finished downloading https://server4:443/xgufuabbee at 52:49.390 on ClientConnection[fc6099c0b8adb8db/118e2c135ef14893(V1) with server4/193.167.100.100:443] 13.353 Closing ClientConnection[fc6099c0b8adb8db/118e2c135ef14893(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.354 Creating connection with server4:443 with v1 13.354 -> Packet A|9|S0|90ac4b394e0b4832|39|2 ConnectionCloseFrame[0|0|] AckFrame[10-7,4,2-1|Δ0] 13.355 Setting up connection for downloading https://server4:443/eckwmujqgy at 52:49.392 on ClientConnection[6778fe275b22947e/bae339c19e5608ed(V1) with server4/193.167.100.100:443] 13.355 Original destination connection id: 6778fe275b22947e (scid: bae339c19e5608ed) >- CryptoStream[I|ClientHello] 13.356 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.556/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.356 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.556 loss detection timeout handler running Sending probe 0, because no ack since 13.356. Current RTT: 100/25. 13.556 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.556 (Probe is an initial retransmit) 13.556 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.956/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.556 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.588 <- (1) Packet I|1|L|48|1 Token=[] AckFrame[1-0|Δ0] 13.589 probe count not reset on ack because handshake not yet confirmed 13.589 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.989/Initial, because peerAwaitingAddressValidation | RTT:100/25 13.690 <- (2) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 13.693 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 13.789/Handshake, because peerAwaitingAddressValidation | RTT:32/16 13.693 Discarding pn space Initial because first Handshake message is being sent 13.693 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.694 Packet not sent because keys are discarded: Packet I|2|L|.|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 13.789 loss detection timeout handler running 13.789 Sending probe 0. Current RTT: 32/16. 13.789 Sending probe because peer awaiting address validation 13.789 (Probe is a handshake ping) 13.790 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 13.982/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 13.789 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 13.820 <- (4) Packet H|1|L|47|1 AckFrame[0|Δ0] 13.821 probe count not reset on ack because handshake not yet confirmed 13.821 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.990 <- (5) Packet H|2|L|773|1 CryptoFrame[0,727] 13.990 - unknown transport parameter 0x00b6, size 0 13.990 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 13.990 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 167 millis, based on 14.161/Handshake, because ackElicitingInFlight | RTT:32/13 13.993 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.993 Starting downloading https://server4:443/eckwmujqgy at 52:50.030 on ClientConnection[6778fe275b22947e/bae339c19e5608ed(V1) with server4/193.167.100.100:443] 13.990 <- (6) Packet H|3|L|773|1 CryptoFrame[0,727] 13.993 -> Packet H|2|L|46|1 AckFrame[2-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.994 -> Packet H|3|L|46|1 AckFrame[3-1|Δ0] 13.994 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 166 millis, based on 14.161/Handshake, because ackElicitingInFlight | RTT:32/13 13.994 -> Packet A|0|S0|a21e0cf38b5e64c5|47|1 StreamFrame[0(CIB),0,17,fin] 14.024 <- (7) Packet A|1|S0|bae339c19e5608ed|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 14.025 State is set to Confirmed reschedule loss detection timer for PTO over 136 millis, based on 14.161/Handshake, because ackElicitingInFlight | RTT:32/13 reschedule loss detection timer for PTO over 78 millis, based on 14.103/App, because ackElicitingInFlight | RTT:32/13 14.025 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 14.026 <- (8) Packet A|2|S0|bae339c19e5608ed|1054|1 StreamFrame[0(CIB),0,1024] 14.026 <- (9) Packet A|3|S0|bae339c19e5608ed|31|1 StreamFrame[0(CIB),1024,0,fin] 14.026 -> Packet A|1|S0|a21e0cf38b5e64c5|31|1 AckFrame[2-1|Δ0] 14.026 Finished downloading https://server4:443/eckwmujqgy at 52:50.063 on ClientConnection[6778fe275b22947e/bae339c19e5608ed(V1) with server4/193.167.100.100:443] 14.026 Closing ClientConnection[6778fe275b22947e/bae339c19e5608ed(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.027 -> Packet A|2|S0|a21e0cf38b5e64c5|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 14.027 Creating connection with server4:443 with v1 14.028 Setting up connection for downloading https://server4:443/vxcbbomtnh at 52:50.065 on ClientConnection[bc8846e14988eebb/c49ec7061d784f2b(V1) with server4/193.167.100.100:443] 14.028 Original destination connection id: bc8846e14988eebb (scid: c49ec7061d784f2b) >- CryptoStream[I|ClientHello] 14.029 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.229/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.029 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.051 <- (10) Packet A|4|S0|bae339c19e5608ed|32|1 AckFrame[0|Δ26] 14.052 -> Packet A|3|S0|a21e0cf38b5e64c5|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 14.057 <- (11) Packet A|5|S0|bae339c19e5608ed|54|1 NewConnectionIdFrame[1,<0|33b066df923b5848|e0ef0e9d3697c85db520d5ebdc45d405] 14.057 -> Packet A|4|S0|a21e0cf38b5e64c5|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 14.062 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 14.062 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.262/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 14.062 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,728] Padding(251) 14.065 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.065 - unknown transport parameter 0x00b6, size 0 14.065 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 14.065 - unknown transport parameter 0xff04de1b, size 2 reschedule loss detection timer for PTO over 95 millis, based on 14.161/Handshake, because peerAwaitingAddressValidation | RTT:32/16 14.065 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 14.068 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.164/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.068 -> Packet H|0|L|80|1 CryptoFrame[0,36] 14.068 Starting downloading https://server4:443/vxcbbomtnh at 52:50.105 on ClientConnection[bc8846e14988eebb/c49ec7061d784f2b(V1) with server4/193.167.100.100:443] 14.068 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.164/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.068 Discarding pn space Initial because first Handshake message is being sent 14.069 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 14.165/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.069 -> [Packet H|1|L|46|1 AckFrame[0|Δ0], Packet A|0|S0|ecc90833147cd72a|47|1 StreamFrame[0(CIB),0,17,fin]] 14.164 loss detection timeout handler running Sending probe 0, because no ack since 14.068. Current RTT: 32/16. 14.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.164 (Probe is a handshake retransmit) 14.165 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 14.357/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.164 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 14.356 loss detection timeout handler running Sending probe 1, because no ack since 14.069. Current RTT: 32/16. 14.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.356 (Probe is a handshake retransmit) 14.356 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 14.740/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.356 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 14.357 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 14.741/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.357 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 14.522 <- (2) Packet A|2|S0|c49ec7061d784f2b|54|1 NewConnectionIdFrame[1,<0|5d5dda7708e1d09a|b0363bd61b2b7bfa23611491a9a99cd9] 14.542 -> Packet A|1|S0|ecc90833147cd72a|32|1 AckFrame[2|Δ19] 14.740 loss detection timeout handler running Sending probe 2, because no ack since 14.069. Current RTT: 32/16. 14.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.741 (Probe is a handshake retransmit) 14.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 15.509/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.741 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 14.742 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 767 millis, based on 15.510/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 14.742 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 15.509 loss detection timeout handler running Sending probe 3, because no ack since 14.069. Current RTT: 32/16. 15.509 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.509 (Probe is a handshake retransmit) 15.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1535 millis, based on 17.046/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.510 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 15.511 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1535 millis, based on 17.047/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 15.511 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 16.474 <- (3) Packet A|7|S0|c49ec7061d784f2b|54|1 NewConnectionIdFrame[1,<0|5d5dda7708e1d09a|b0363bd61b2b7bfa23611491a9a99cd9] 16.474 <- (4) Packet A|8|S0|c49ec7061d784f2b|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 16.475 State is set to Confirmed reschedule loss detection timer for PTO over -470 millis, based on 16.005/App, because ackElicitingInFlight | RTT:32/16 16.475 loss detection timeout handler running Sending probe 4, because no ack since 14.069. Current RTT: 32/16. reschedule loss detection timer for PTO over -2164 millis, based on 14.311/App, because ackElicitingInFlight | RTT:32/16 16.475 (Probe is retransmit on level App) 16.475 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 16.717/App, because ackElicitingInFlight | RTT:32/16 16.475 -> Packet PA|2|S0|ecc90833147cd72a|47|1 StreamFrame[0(CIB),0,17,fin] 16.475 -> Packet A|3|S0|ecc90833147cd72a|33|1 AckFrame[8-7,2|Δ0] 16.506 <- (5) Packet A|9|S0|c49ec7061d784f2b|31|1 AckFrame[2|Δ0] 16.506 Cwnd(-): 6000; inflight: 0 16.507 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.507 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 108 millis, based on 16.616/App, because ackElicitingInFlight | RTT:32/13 16.507 -> Packet A|4|S0|ecc90833147cd72a|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[8-7,2|Δ0] 16.507 <- (6) Packet A|10|S0|c49ec7061d784f2b|1054|1 StreamFrame[0(CIB),0,1024] 16.507 <- (7) Packet A|11|S0|c49ec7061d784f2b|31|1 StreamFrame[0(CIB),1024,0,fin] 16.507 -> Packet A|5|S0|ecc90833147cd72a|33|1 AckFrame[11-7,2|Δ0] 16.507 Finished downloading https://server4:443/vxcbbomtnh at 52:52.544 on ClientConnection[bc8846e14988eebb/c49ec7061d784f2b(V1) with server4/193.167.100.100:443] 16.508 Closing ClientConnection[bc8846e14988eebb/c49ec7061d784f2b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.508 -> Packet A|6|S0|ecc90833147cd72a|37|2 ConnectionCloseFrame[0|0|] AckFrame[11-7,2|Δ0] 16.508 Creating connection with server4:443 with v1 16.509 Setting up connection for downloading https://server4:443/myzqxlketa at 52:52.546 on ClientConnection[b563fe165fdb530d/62df27c0f9fdd1ad(V1) with server4/193.167.100.100:443] 16.509 Original destination connection id: b563fe165fdb530d (scid: 62df27c0f9fdd1ad) >- CryptoStream[I|ClientHello] 16.510 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.710/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.510 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.543 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.544 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.744/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.543 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 16.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.644/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.547 - unknown transport parameter 0x00b6, size 0 16.546 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 16.547 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 16.547 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 16.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.646/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.549 -> Packet H|0|L|80|1 CryptoFrame[0,36] 16.549 Starting downloading https://server4:443/myzqxlketa at 52:52.586 on ClientConnection[b563fe165fdb530d/62df27c0f9fdd1ad(V1) with server4/193.167.100.100:443] 16.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.646/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.549 Discarding pn space Initial because first Handshake message is being sent 16.549 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 16.543 <- (2) Packet A|0|S0|62df27c0f9fdd1ad|54|1 NewConnectionIdFrame[1,<0|dc18f3701f2e0b21|508f4f6bcf2b8dfa1e51b6a154914a46] 16.550 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 16.647/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.550 -> Packet A|0|S0|b34b8cbf9ab81b54|47|1 StreamFrame[0(CIB),0,17,fin] 16.569 -> Packet A|1|S0|b34b8cbf9ab81b54|32|1 AckFrame[0|Δ19] 16.646 loss detection timeout handler running Sending probe 0, because no ack since 16.549. Current RTT: 33/16. 16.646 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.646 (Probe is a handshake retransmit) 16.646 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 16.840/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.646 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 16.678 <- (3) Packet A|1|S0|62df27c0f9fdd1ad|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 16.678 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 16.794/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -6 millis, based on 16.672/App, because ackElicitingInFlight | RTT:33/16 16.678 Discarding pn space Handshake because HandshakeDone is received 16.678 loss detection timeout handler running Sending probe 0, because no ack since 16.550. Current RTT: 33/16. 16.679 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 16.923/App, because ackElicitingInFlight | RTT:33/16 16.679 -> Packet PA|2|S0|b34b8cbf9ab81b54|47|1 StreamFrame[0(CIB),0,17,fin] 16.698 -> Packet A|3|S0|b34b8cbf9ab81b54|32|1 AckFrame[1-0|Δ19] 16.710 <- (4) Packet A|2|S0|62df27c0f9fdd1ad|31|1 AckFrame[2|Δ0] 16.710 Cwnd(-): 6000; inflight: 0 16.710 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 16.710 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 109 millis, based on 16.820/App, because ackElicitingInFlight | RTT:33/13 16.710 -> Packet A|4|S0|b34b8cbf9ab81b54|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1-0|Δ0] 16.711 <- (5) Packet A|3|S0|62df27c0f9fdd1ad|1054|1 StreamFrame[0(CIB),0,1024] 16.730 -> Packet A|5|S0|b34b8cbf9ab81b54|32|1 AckFrame[3-0|Δ19] 16.767 <- (6) Packet A|5|S0|62df27c0f9fdd1ad|32|1 AckFrame[5-3|Δ6] 16.768 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.832 <- (7) Packet A|6|S0|62df27c0f9fdd1ad|30|2 PingFrame[] Padding(3) 16.852 -> Packet A|6|S0|b34b8cbf9ab81b54|32|1 AckFrame[6-5|Δ19] 16.883 <- (8) Packet A|8|S0|62df27c0f9fdd1ad|31|1 StreamFrame[0(CIB),1024,0,fin] 16.884 Finished downloading https://server4:443/myzqxlketa at 52:52.921 on ClientConnection[b563fe165fdb530d/62df27c0f9fdd1ad(V1) with server4/193.167.100.100:443] 16.884 Closing ClientConnection[b563fe165fdb530d/62df27c0f9fdd1ad(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.884 -> Packet A|7|S0|b34b8cbf9ab81b54|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-5|Δ0] 16.885 Creating connection with server4:443 with v1 16.885 Setting up connection for downloading https://server4:443/yvjjmzyxdf at 52:52.922 on ClientConnection[8e522aa8502d266e/306cb9ceae7d4b1c(V1) with server4/193.167.100.100:443] 16.885 Original destination connection id: 8e522aa8502d266e (scid: 306cb9ceae7d4b1c) >- CryptoStream[I|ClientHello] 16.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.086/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.886 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.919 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 16.920 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.120/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.919 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 16.923 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.923 - unknown transport parameter 0x00b6, size 0 reschedule loss detection timer for PTO over 96 millis, based on 17.020/Handshake, because peerAwaitingAddressValidation | RTT:33/16 16.923 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 16.923 - unknown transport parameter 0xff04de1b, size 2 16.923 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) >- CryptoStream[H|Finished] 16.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.925 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.925 Starting downloading https://server4:443/yvjjmzyxdf at 52:52.962 on ClientConnection[8e522aa8502d266e/306cb9ceae7d4b1c(V1) with server4/193.167.100.100:443] 16.925 Discarding pn space Initial because first Handshake message is being sent 16.925 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 16.919 <- (2) Packet A|0|S0|306cb9ceae7d4b1c|54|1 NewConnectionIdFrame[1,<0|be78872916f1ce05|06b1ad3d273898d38d082c4386c1b1ab] 16.926 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 17.023/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 16.926 -> Packet A|0|S0|7c53163afcbf7ace|47|1 StreamFrame[0(CIB),0,17,fin] 16.945 -> Packet A|1|S0|7c53163afcbf7ace|32|1 AckFrame[0|Δ19] 17.003 <- (9) Packet A|9|S0|62df27c0f9fdd1ad|30|2 PingFrame[] Padding(3) 17.003 <- (10) Packet A|10|S0|62df27c0f9fdd1ad|30|2 PingFrame[] Padding(3) 17.004 -> Packet A|8|S0|b34b8cbf9ab81b54|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-5|Δ0] 17.004 -> Packet A|9|S0|b34b8cbf9ab81b54|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-5|Δ0] 17.022 loss detection timeout handler running Sending probe 0, because no ack since 16.925. Current RTT: 33/16. 17.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.022 (Probe is a handshake retransmit) 17.022 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 17.216/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 17.022 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 17.075 <- (3) Packet A|2|S0|306cb9ceae7d4b1c|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 17.075 State is set to Confirmed reschedule loss detection timer for PTO over 94 millis, based on 17.170/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -27 millis, based on 17.048/App, because ackElicitingInFlight | RTT:33/16 17.076 Discarding pn space Handshake because HandshakeDone is received 17.076 loss detection timeout handler running Sending probe 0, because no ack since 16.926. Current RTT: 33/16. 17.076 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 17.075 <- (4) Packet A|3|S0|306cb9ceae7d4b1c|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] reschedule loss detection timer for PTO over 243 millis, based on 17.320/App, because ackElicitingInFlight | RTT:33/16 17.076 -> Packet PA|2|S0|7c53163afcbf7ace|47|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 17.076 -> Packet A|3|S0|7c53163afcbf7ace|33|1 AckFrame[3-2,0|Δ0] 17.108 <- (5) Packet A|5|S0|306cb9ceae7d4b1c|31|1 StreamFrame[0(CIB),1024,0,fin] 17.128 -> Packet A|4|S0|7c53163afcbf7ace|36|1 AckFrame[5,3-2,0|Δ19] 17.133 <- (6) Packet A|6|S0|306cb9ceae7d4b1c|32|1 AckFrame[3-1|Δ25] 17.133 Cwnd(-): 6000; inflight: 0 17.133 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 17.133 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 121 millis, based on 17.255/App, because ackElicitingInFlight | RTT:33/16 17.133 -> Packet A|5|S0|7c53163afcbf7ace|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 17.255 loss detection timeout handler running Sending probe 0, because no ack since 17.133. Current RTT: 33/16. 17.255 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 17.499/App, because ackElicitingInFlight | RTT:33/16 17.255 -> Packet PA|6|S0|7c53163afcbf7ace|47|1 StreamFrame[0(CIB),0,17,fin] 17.279 <- (7) Packet A|8|S0|306cb9ceae7d4b1c|30|2 PingFrame[] Padding(3) 17.299 -> Packet A|7|S0|7c53163afcbf7ace|34|1 AckFrame[8,6-5|Δ19] 17.498 loss detection timeout handler running Sending probe 1, because no ack since 17.255. Current RTT: 33/16. 17.499 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 17.987/App, because ackElicitingInFlight | RTT:33/16 17.499 -> Packet PA|8|S0|7c53163afcbf7ace|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 17.988/App, because ackElicitingInFlight | RTT:33/16 17.500 -> Packet PA|9|S0|7c53163afcbf7ace|47|1 StreamFrame[0(CIB),0,17,fin] 17.504 <- (8) Packet A|11|S0|306cb9ceae7d4b1c|30|2 PingFrame[] Padding(3) 17.504 <- (9) Packet A|12|S0|306cb9ceae7d4b1c|30|2 PingFrame[] Padding(3) 17.505 -> Packet A|10|S0|7c53163afcbf7ace|35|1 AckFrame[12-11,8,6-5|Δ0] 17.530 <- (10) Packet A|13|S0|306cb9ceae7d4b1c|35|1 AckFrame[8,6,4-1|Δ0] 17.530 Cwnd(-): 3000; inflight: 47 17.530 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 91 millis, based on 17.622/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 109 millis, based on 17.640/App, because ackElicitingInFlight | RTT:33/13 17.530 -> Packet A|11|S0|7c53163afcbf7ace|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[12-11,8,6|Δ0] 17.536 <- (11) Packet A|14|S0|306cb9ceae7d4b1c|1054|1 StreamFrame[0(CIB),0,1024,fin] 17.537 Finished downloading https://server4:443/yvjjmzyxdf at 52:53.574 on ClientConnection[8e522aa8502d266e/306cb9ceae7d4b1c(V1) with server4/193.167.100.100:443] 17.537 Closing ClientConnection[8e522aa8502d266e/306cb9ceae7d4b1c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.537 -> Packet A|12|S0|7c53163afcbf7ace|39|2 ConnectionCloseFrame[0|0|] AckFrame[14-11,8,6|Δ0] 17.538 Creating connection with server4:443 with v1 17.538 Setting up connection for downloading https://server4:443/nokicqyigp at 52:53.575 on ClientConnection[d2d4b49f458679d4/5b37d528db9af2db(V1) with server4/193.167.100.100:443] 17.538 Original destination connection id: d2d4b49f458679d4 (scid: 5b37d528db9af2db) >- CryptoStream[I|ClientHello] 17.539 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.740/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.539 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.573 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 17.739 loss detection timeout handler running Sending probe 0, because no ack since 17.539. Current RTT: 100/25. 17.739 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.739 (Probe is an initial retransmit) 17.739 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.139/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.739 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.875 <- (2) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 17.878 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.878 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.078/Handshake, because peerAwaitingAddressValidation | RTT:100/25 reschedule loss detection timer for PTO over 199 millis, based on 18.078/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.878 Discarding pn space Initial because first Handshake message is being sent 17.878 -> Packet I|2|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1153) 18.077 loss detection timeout handler running 18.077 Sending probe 0. Current RTT: 100/25. 18.077 Sending probe because peer awaiting address validation 18.077 (Probe is a handshake ping) 18.078 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 18.478/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.078 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 18.174 <- (3) Packet H|1|L|772|1 CryptoFrame[0,726] 18.175 - unknown transport parameter 0x00b6, size 0 18.175 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 18.175 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 18.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 18.578/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.177 -> Packet H|1|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.174 <- (4) Packet H|2|L|772|1 CryptoFrame[0,726] 18.178 Starting downloading https://server4:443/nokicqyigp at 52:54.215 on ClientConnection[d2d4b49f458679d4/5b37d528db9af2db(V1) with server4/193.167.100.100:443] 18.178 -> Packet H|2|L|46|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.178 -> Packet H|3|L|46|1 AckFrame[2-1|Δ0] 18.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 18.579/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.179 -> Packet A|0|S0|d8dfc5818ddab8ec|47|1 StreamFrame[0(CIB),0,17,fin] 18.209 <- (5) Packet A|1|S0|5b37d528db9af2db|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 18.210 State is set to Confirmed reschedule loss detection timer for PTO over 367 millis, based on 18.577/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 18.404/App, because ackElicitingInFlight | RTT:100/25 18.210 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 18.210 <- (6) Packet A|2|S0|5b37d528db9af2db|1054|1 StreamFrame[0(CIB),0,1024] 18.210 <- (7) Packet A|3|S0|5b37d528db9af2db|31|1 StreamFrame[0(CIB),1024,0,fin] 18.211 -> Packet A|1|S0|d8dfc5818ddab8ec|31|1 AckFrame[2-1|Δ0] 18.211 Finished downloading https://server4:443/nokicqyigp at 52:54.248 on ClientConnection[d2d4b49f458679d4/5b37d528db9af2db(V1) with server4/193.167.100.100:443] 18.211 Closing ClientConnection[d2d4b49f458679d4/5b37d528db9af2db(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.211 -> Packet A|2|S0|d8dfc5818ddab8ec|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 18.212 Creating connection with server4:443 with v1 18.212 Setting up connection for downloading https://server4:443/awraoavoff at 52:54.249 on ClientConnection[b53d052fc8fd99a6/9f61108437826876(V1) with server4/193.167.100.100:443] 18.212 Original destination connection id: b53d052fc8fd99a6 (scid: 9f61108437826876) >- CryptoStream[I|ClientHello] 18.213 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.413/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.213 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.235 <- (8) Packet A|4|S0|5b37d528db9af2db|32|1 AckFrame[0|Δ25] 18.235 -> Packet A|3|S0|d8dfc5818ddab8ec|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 18.242 <- (9) Packet A|6|S0|5b37d528db9af2db|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 18.246 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 18.413 loss detection timeout handler running Sending probe 0, because no ack since 18.213. Current RTT: 100/25. 18.413 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.413 (Probe is an initial retransmit) 18.413 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.813/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.413 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.445 <- (2) Packet I|1|L|48|1 Token=[] AckFrame[1-0|Δ0] 18.446 probe count not reset on ack because handshake not yet confirmed 18.446 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.846/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.547 <- (3) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 18.550 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 18.641/Handshake, because peerAwaitingAddressValidation | RTT:31/15 18.550 Discarding pn space Initial because first Handshake message is being sent 18.550 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 18.642/Handshake, because peerAwaitingAddressValidation | RTT:31/15 18.550 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 18.583 <- (4) Packet H|1|L|774|1 CryptoFrame[0,728] 18.583 - unknown transport parameter 0x00b6, size 0 18.584 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 18.584 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 18.586 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 18.677/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 18.586 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.587 Starting downloading https://server4:443/awraoavoff at 52:54.623 on ClientConnection[b53d052fc8fd99a6/9f61108437826876(V1) with server4/193.167.100.100:443] 18.587 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 18.587 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 18.678/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 18.587 -> Packet A|0|S0|fcd4774eeff48b72|47|1 StreamFrame[0(CIB),0,17,fin] 18.619 <- (5) Packet A|2|S0|9f61108437826876|1054|1 StreamFrame[0(CIB),0,1024] 18.619 <- (6) Packet A|3|S0|9f61108437826876|31|1 StreamFrame[0(CIB),1024,0,fin] 18.619 Finished downloading https://server4:443/awraoavoff at 52:54.656 on ClientConnection[b53d052fc8fd99a6/9f61108437826876(V1) with server4/193.167.100.100:443] 18.619 Closing ClientConnection[b53d052fc8fd99a6/9f61108437826876(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.619 -> Packet A|1|S0|fcd4774eeff48b72|31|1 AckFrame[3-2|Δ0] 18.620 -> Packet A|2|S0|fcd4774eeff48b72|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 18.620 Creating connection with server4:443 with v1 18.621 Setting up connection for downloading https://server4:443/psbnpmclif at 52:54.658 on ClientConnection[ee7edd82c2fc7216/bca09d4189fae18f(V1) with server4/193.167.100.100:443] 18.621 Original destination connection id: ee7edd82c2fc7216 (scid: bca09d4189fae18f) >- CryptoStream[I|ClientHello] 18.622 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.822/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.622 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.650 <- (7) Packet A|5|S0|9f61108437826876|54|1 NewConnectionIdFrame[1,<0|349c8db4c797e4a8|a8b696fe8e11edd02eb27103264f2009] 18.650 -> Packet A|3|S0|fcd4774eeff48b72|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-2|Δ0] 18.651 <- (8) Packet A|6|S0|9f61108437826876|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 18.655 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 18.656 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.856/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.658 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.655 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) reschedule loss detection timer for PTO over 95 millis, based on 18.754/Handshake, because peerAwaitingAddressValidation | RTT:32/16 18.658 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 18.659 - unknown transport parameter 0x00b6, size 0 18.659 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 18.659 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 18.661 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 18.757/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 18.661 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.661 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 18.757/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 18.661 Starting downloading https://server4:443/psbnpmclif at 52:54.698 on ClientConnection[ee7edd82c2fc7216/bca09d4189fae18f(V1) with server4/193.167.100.100:443] 18.661 Discarding pn space Initial because first Handshake message is being sent 18.661 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 18.662 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 18.758/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 18.662 -> Packet A|0|S0|b479c8bcfc224603|47|1 StreamFrame[0(CIB),0,17,fin] 18.757 loss detection timeout handler running Sending probe 0, because no ack since 18.661. Current RTT: 32/16. 18.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.757 (Probe is a handshake retransmit) 18.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 18.949/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 18.757 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 18.789 <- (2) Packet A|1|S0|bca09d4189fae18f|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 18.789 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 18.904/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -6 millis, based on 18.783/App, because ackElicitingInFlight | RTT:32/16 18.789 Discarding pn space Handshake because HandshakeDone is received 18.789 loss detection timeout handler running Sending probe 0, because no ack since 18.662. Current RTT: 32/16. 18.789 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 19.032/App, because ackElicitingInFlight | RTT:32/16 18.790 -> Packet PA|1|S0|b479c8bcfc224603|47|1 StreamFrame[0(CIB),0,17,fin] 18.809 -> Packet A|2|S0|b479c8bcfc224603|32|1 AckFrame[1|Δ19] 18.822 <- (3) Packet A|3|S0|bca09d4189fae18f|31|1 StreamFrame[0(CIB),1024,0,fin] 18.842 -> Packet A|3|S0|b479c8bcfc224603|34|1 AckFrame[3,1|Δ19] 18.847 <- (4) Packet A|5|S0|bca09d4189fae18f|32|1 AckFrame[2-1|Δ7] 18.848 Cwnd(-): 6000; inflight: 0 18.848 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 18.848 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 120 millis, based on 18.969/App, because ackElicitingInFlight | RTT:32/16 18.848 -> Packet A|4|S0|b479c8bcfc224603|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 18.880 <- (5) Packet A|6|S0|bca09d4189fae18f|1054|1 StreamFrame[0(CIB),0,1024,fin] 18.881 Finished downloading https://server4:443/psbnpmclif at 52:54.918 on ClientConnection[ee7edd82c2fc7216/bca09d4189fae18f(V1) with server4/193.167.100.100:443] 18.881 Closing ClientConnection[ee7edd82c2fc7216/bca09d4189fae18f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.882 Creating connection with server4:443 with v1 18.882 -> Packet A|5|S0|b479c8bcfc224603|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3|Δ0] 18.883 Setting up connection for downloading https://server4:443/hhpkymudzc at 52:54.920 on ClientConnection[9cc3520d11d3429c/d1b8795a63ae0414(V1) with server4/193.167.100.100:443] 18.883 Original destination connection id: 9cc3520d11d3429c (scid: d1b8795a63ae0414) >- CryptoStream[I|ClientHello] 18.884 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.084/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.884 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.905 <- (6) Packet A|7|S0|bca09d4189fae18f|32|1 AckFrame[4-1|Δ26] 18.905 -> Packet A|6|S0|b479c8bcfc224603|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3|Δ0] 19.084 loss detection timeout handler running Sending probe 0, because no ack since 18.884. Current RTT: 100/25. 19.084 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.084 (Probe is an initial retransmit) 19.084 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.484/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.084 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.118 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 19.118 probe count not reset on ack because handshake not yet confirmed 19.118 Retransmitting CryptoFrame[0,257] on level Initial 19.119 Cwnd(-): 6000; inflight: 0 19.119 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.519/Initial, because peerAwaitingAddressValidation | RTT:100/25 19.119 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 19.313/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.119 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 19.121 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.118 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,728] Padding(251) reschedule loss detection timer for PTO over 193 millis, based on 19.315/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.121 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 19.121 - unknown transport parameter 0x00b6, size 0 19.121 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 19.121 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 19.124 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.318/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.123 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.124 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.124 Starting downloading https://server4:443/hhpkymudzc at 52:55.161 on ClientConnection[9cc3520d11d3429c/d1b8795a63ae0414(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 19.221/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.124 Discarding pn space Initial because first Handshake message is being sent 19.124 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 19.118 <- (2) Packet A|0|S0|d1b8795a63ae0414|54|1 NewConnectionIdFrame[1,<0|df6a9ba481f390ef|0c8600239aa5e7b3b1af67cd8afbbfb8] 19.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 19.222/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.125 -> Packet A|0|S0|fcebe3723d9a9a1e|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 19.221 loss detection timeout handler running Sending probe 0, because no ack since 19.123. Current RTT: 33/16. 19.221 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.221 (Probe is a handshake retransmit) 19.222 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 19.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.221 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 19.415 loss detection timeout handler running Sending probe 1, because no ack since 19.125. Current RTT: 33/16. 19.415 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.415 (Probe is a handshake retransmit) 19.415 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 19.803/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.415 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 19.416 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 19.804/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 19.416 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 19.480 <- (3) Packet A|2|S0|d1b8795a63ae0414|54|1 NewConnectionIdFrame[1,<0|df6a9ba481f390ef|0c8600239aa5e7b3b1af67cd8afbbfb8] 19.500 -> Packet A|1|S0|fcebe3723d9a9a1e|34|1 AckFrame[2,0|Δ19] 19.660 <- (4) Packet A|4|S0|d1b8795a63ae0414|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 19.660 State is set to Confirmed reschedule loss detection timer for PTO over -47 millis, based on 19.613/App, because ackElicitingInFlight | RTT:33/16 19.660 loss detection timeout handler running Sending probe 2, because no ack since 19.125. Current RTT: 33/16. reschedule loss detection timer for PTO over -413 millis, based on 19.247/App, because ackElicitingInFlight | RTT:33/16 19.661 Discarding pn space Handshake because HandshakeDone is received 19.661 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 19.905/App, because ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 19.661 -> Packet PA|2|S0|fcebe3723d9a9a1e|47|1 StreamFrame[0(CIB),0,17,fin] 19.660 <- (5) Packet A|5|S0|d1b8795a63ae0414|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 19.661 -> Packet A|3|S0|fcebe3723d9a9a1e|35|1 AckFrame[5-4,2,0|Δ0] 19.692 <- (6) Packet A|6|S0|d1b8795a63ae0414|1054|1 StreamFrame[0(CIB),0,1024,fin] 19.693 Finished downloading https://server4:443/hhpkymudzc at 52:55.730 on ClientConnection[9cc3520d11d3429c/d1b8795a63ae0414(V1) with server4/193.167.100.100:443] 19.693 Closing ClientConnection[9cc3520d11d3429c/d1b8795a63ae0414(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.694 Creating connection with server4:443 with v1 19.694 -> Packet A|4|S0|fcebe3723d9a9a1e|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,2,0|Δ0] 19.694 Setting up connection for downloading https://server4:443/kyzegaayev at 52:55.731 on ClientConnection[5bf5a9cffc4d3997/e8272339195bcd85(V1) with server4/193.167.100.100:443] 19.694 Original destination connection id: 5bf5a9cffc4d3997 (scid: e8272339195bcd85) >- CryptoStream[I|ClientHello] 19.695 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.896/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.695 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.724 <- (7) Packet A|8|S0|d1b8795a63ae0414|35|2 AckFrame[4-1|Δ0] ConnectionCloseFrame[0|0|] 19.728 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 19.729 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.929/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.731 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 19.827/Handshake, because peerAwaitingAddressValidation | RTT:32/16 19.731 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 19.728 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,728] Padding(251) 19.731 - unknown transport parameter 0x00b6, size 0 19.731 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 19.731 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 19.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 19.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.733 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.734 Starting downloading https://server4:443/kyzegaayev at 52:55.771 on ClientConnection[5bf5a9cffc4d3997/e8272339195bcd85(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 19.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.734 Discarding pn space Initial because first Handshake message is being sent 19.734 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 19.734 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 19.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.734 -> Packet A|0|S0|78c5fb841e01c458|47|1 StreamFrame[0(CIB),0,17,fin] 19.830 loss detection timeout handler running Sending probe 0, because no ack since 19.733. Current RTT: 32/16. 19.830 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.830 (Probe is a handshake retransmit) 19.830 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 20.022/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 19.830 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 19.897 <- (2) Packet A|2|S0|e8272339195bcd85|54|1 NewConnectionIdFrame[1,<0|eb9e25bcc07edea3|452c8c5d1c5d4c80939276f5eace8c7f] 19.898 <- (3) Packet A|3|S0|e8272339195bcd85|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 19.898 State is set to Confirmed reschedule loss detection timer for PTO over 78 millis, based on 19.976/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -43 millis, based on 19.855/App, because ackElicitingInFlight | RTT:32/16 19.898 Discarding pn space Handshake because HandshakeDone is received 19.898 loss detection timeout handler running Sending probe 0, because no ack since 19.734. Current RTT: 32/16. 19.899 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 20.141/App, because ackElicitingInFlight | RTT:32/16 19.899 -> Packet PA|1|S0|78c5fb841e01c458|47|1 StreamFrame[0(CIB),0,17,fin] 19.899 -> Packet A|2|S0|78c5fb841e01c458|31|1 AckFrame[3-2|Δ0] 19.930 <- (4) Packet A|4|S0|e8272339195bcd85|1054|1 StreamFrame[0(CIB),0,1024] 19.950 -> Packet A|3|S0|78c5fb841e01c458|32|1 AckFrame[4-2|Δ19] 19.956 <- (5) Packet A|6|S0|e8272339195bcd85|32|1 AckFrame[1|Δ26] 19.957 Cwnd(-): 6000; inflight: 0 19.957 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.957 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 104 millis, based on 20.062/App, because ackElicitingInFlight | RTT:32/12 19.957 -> Packet A|4|S0|78c5fb841e01c458|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4-2|Δ0] 19.987 <- (6) Packet A|7|S0|e8272339195bcd85|33|1 AckFrame[4-3,1|Δ0] 19.988 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.325 <- (7) Packet A|10|S0|e8272339195bcd85|30|2 PingFrame[] Padding(3) 20.326 <- (8) Packet A|11|S0|e8272339195bcd85|30|2 PingFrame[] Padding(3) 20.326 -> Packet A|5|S0|78c5fb841e01c458|33|1 AckFrame[11-10,7-6|Δ0] 20.478 <- (9) Packet A|13|S0|e8272339195bcd85|30|2 PingFrame[] Padding(3) 20.478 <- (10) Packet A|14|S0|e8272339195bcd85|30|2 PingFrame[] Padding(3) 20.478 -> Packet A|6|S0|78c5fb841e01c458|35|1 AckFrame[14-13,11-10,7-6|Δ0] 20.509 <- (11) Packet A|15|S0|e8272339195bcd85|31|1 StreamFrame[0(CIB),1024,0,fin] 20.510 Finished downloading https://server4:443/kyzegaayev at 52:56.547 on ClientConnection[5bf5a9cffc4d3997/e8272339195bcd85(V1) with server4/193.167.100.100:443] 20.510 Closing ClientConnection[5bf5a9cffc4d3997/e8272339195bcd85(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.510 -> Packet A|7|S0|78c5fb841e01c458|39|2 ConnectionCloseFrame[0|0|] AckFrame[15-13,11-10,7-6|Δ0] 20.511 Creating connection with server4:443 with v1 20.511 Setting up connection for downloading https://server4:443/weeryqoyjj at 52:56.548 on ClientConnection[c7a278f4af3cbe68/015aa796375a7bdf(V1) with server4/193.167.100.100:443] 20.511 Original destination connection id: c7a278f4af3cbe68 (scid: 015aa796375a7bdf) >- CryptoStream[I|ClientHello] 20.513 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.713/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.513 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.546 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 20.547 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.747/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 20.546 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,728] Padding(251) 20.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.646/Handshake, because peerAwaitingAddressValidation | RTT:33/16 20.549 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 20.550 - unknown transport parameter 0x00b6, size 0 20.550 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 20.550 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 20.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.649/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.552 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.649/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.552 Discarding pn space Initial because first Handshake message is being sent 20.552 Starting downloading https://server4:443/weeryqoyjj at 52:56.589 on ClientConnection[c7a278f4af3cbe68/015aa796375a7bdf(V1) with server4/193.167.100.100:443] 20.552 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 20.546 <- (2) Packet A|0|S0|015aa796375a7bdf|54|1 NewConnectionIdFrame[1,<0|68f015056b35edc1|74170519b2bd88743a2975ce80365f84] 20.553 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 20.650/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.553 -> Packet A|0|S0|a2b42ee999667f25|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 20.619 <- (12) Packet A|16|S0|e8272339195bcd85|30|2 PingFrame[] Padding(3) 20.619 <- (13) Packet A|17|S0|e8272339195bcd85|30|2 PingFrame[] Padding(3) 20.619 -> Packet A|8|S0|78c5fb841e01c458|39|2 ConnectionCloseFrame[0|0|] AckFrame[15-13,11-10,7-6|Δ0] 20.620 -> Packet A|9|S0|78c5fb841e01c458|39|2 ConnectionCloseFrame[0|0|] AckFrame[15-13,11-10,7-6|Δ0] 20.649 loss detection timeout handler running Sending probe 0, because no ack since 20.552. Current RTT: 33/16. 20.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.649 (Probe is a handshake retransmit) 20.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 20.843/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.649 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 20.650 <- (14) Packet A|18|S0|e8272339195bcd85|37|2 AckFrame[8,6-5|Δ0] ConnectionCloseFrame[0|0|] 20.843 loss detection timeout handler running Sending probe 1, because no ack since 20.553. Current RTT: 33/16. 20.843 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.843 (Probe is a handshake retransmit) 20.843 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.231/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.843 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 20.844 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 21.232/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 20.844 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 20.847 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.848 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.231 loss detection timeout handler running Sending probe 2, because no ack since 20.553. Current RTT: 33/16. 21.231 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.232 (Probe is a handshake retransmit) 21.232 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 22.008/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.232 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 21.233 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 22.009/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 21.233 -> Packet PH|6|L|80|1 CryptoFrame[0,36] 22.008 loss detection timeout handler running Sending probe 3, because no ack since 20.553. Current RTT: 33/16. 22.008 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.008 (Probe is a handshake retransmit) 22.008 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1551 millis, based on 23.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.008 -> Packet PH|7|L|80|1 CryptoFrame[0,36] 22.009 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1551 millis, based on 23.561/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 22.009 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 22.827 <- (5) Packet A|4|S0|015aa796375a7bdf|54|1 NewConnectionIdFrame[1,<0|68f015056b35edc1|74170519b2bd88743a2975ce80365f84] 22.827 <- (6) Packet A|5|S0|015aa796375a7bdf|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 22.828 State is set to Confirmed reschedule loss detection timer for PTO over -323 millis, based on 22.505/App, because ackElicitingInFlight | RTT:33/16 22.828 loss detection timeout handler running Sending probe 4, because no ack since 20.553. Current RTT: 33/16. reschedule loss detection timer for PTO over -2153 millis, based on 20.675/App, because ackElicitingInFlight | RTT:33/16 22.828 Discarding pn space Handshake because HandshakeDone is received 22.828 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 23.072/App, because ackElicitingInFlight | RTT:33/16 -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 22.828 -> Packet PA|1|S0|a2b42ee999667f25|47|1 StreamFrame[0(CIB),0,17,fin] 22.829 -> Packet A|2|S0|a2b42ee999667f25|33|1 AckFrame[5-4,0|Δ0] 23.072 loss detection timeout handler running Sending probe 1, because no ack since 22.828. Current RTT: 33/16. 23.072 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 23.560/App, because ackElicitingInFlight | RTT:33/16 23.072 -> Packet PA|3|S0|a2b42ee999667f25|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 23.561/App, because ackElicitingInFlight | RTT:33/16 23.073 -> Packet PA|4|S0|a2b42ee999667f25|47|1 StreamFrame[0(CIB),0,17,fin] 23.103 <- (7) Packet A|6|S0|015aa796375a7bdf|31|1 AckFrame[3-2|Δ0] 23.104 Cwnd(-): 6000; inflight: 47 23.104 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 91 millis, based on 23.195/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 109 millis, based on 23.214/App, because ackElicitingInFlight | RTT:33/13 23.104 -> Packet A|5|S0|a2b42ee999667f25|47|1 StreamFrame[0(CIB),0,17,fin] 23.130 <- (8) Packet A|9|S0|015aa796375a7bdf|32|1 AckFrame[4-2|Δ26] reschedule loss detection timer for PTO over 83 millis, based on 23.214/App, because ackElicitingInFlight | RTT:33/13 23.213 loss detection timeout handler running Sending probe 0, because no ack since 23.104. Current RTT: 33/10. 23.214 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 195 millis, based on 23.410/App, because ackElicitingInFlight | RTT:33/10 23.214 -> Packet PA|6|S0|a2b42ee999667f25|47|1 StreamFrame[0(CIB),0,17,fin] 23.227 <- (9) Packet A|10|S0|015aa796375a7bdf|30|2 PingFrame[] Padding(3) 23.227 <- (10) Packet A|11|S0|015aa796375a7bdf|30|2 PingFrame[] Padding(3) 23.228 -> Packet A|7|S0|a2b42ee999667f25|33|1 AckFrame[11-9,6|Δ0] 23.245 <- (11) Packet A|12|S0|015aa796375a7bdf|33|1 AckFrame[6,4-2|Δ0] 23.245 Cwnd(-): 3000; inflight: 0 23.245 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 23.245 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 89 millis, based on 23.335/App, because ackElicitingInFlight | RTT:33/8 23.245 -> Packet A|8|S0|a2b42ee999667f25|54|2 StreamFrame[0(CIB),0,17,fin] AckFrame[11-9,6|Δ0] 23.335 loss detection timeout handler running Sending probe 0, because no ack since 23.245. Current RTT: 33/8. 23.335 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 179 millis, based on 23.515/App, because ackElicitingInFlight | RTT:33/8 23.335 -> Packet PA|9|S0|a2b42ee999667f25|47|1 StreamFrame[0(CIB),0,17,fin] 23.473 <- (12) Packet A|13|S0|015aa796375a7bdf|30|2 PingFrame[] Padding(3) 23.493 -> Packet A|10|S0|a2b42ee999667f25|34|1 AckFrame[13-9,6|Δ19] 23.515 loss detection timeout handler running Sending probe 1, because no ack since 23.335. Current RTT: 33/8. 23.515 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 359 millis, based on 23.875/App, because ackElicitingInFlight | RTT:33/8 23.515 -> Packet PA|11|S0|a2b42ee999667f25|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 359 millis, based on 23.876/App, because ackElicitingInFlight | RTT:33/8 23.516 -> Packet PA|12|S0|a2b42ee999667f25|47|1 StreamFrame[0(CIB),0,17,fin] 23.525 <- (13) Packet A|16|S0|015aa796375a7bdf|1054|1 StreamFrame[0(CIB),0,1024,fin] 23.526 Finished downloading https://server4:443/weeryqoyjj at 52:59.563 on ClientConnection[c7a278f4af3cbe68/015aa796375a7bdf(V1) with server4/193.167.100.100:443] 23.526 Closing ClientConnection[c7a278f4af3cbe68/015aa796375a7bdf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.526 -> Packet A|13|S0|a2b42ee999667f25|39|2 ConnectionCloseFrame[0|0|] AckFrame[16,13-9,6|Δ0] 23.526 Creating connection with server4:443 with v1 23.527 Setting up connection for downloading https://server4:443/eizvpbnhha at 52:59.564 on ClientConnection[14f9555ef6b8c00a/06f0ee69e1701a17(V1) with server4/193.167.100.100:443] 23.527 Original destination connection id: 14f9555ef6b8c00a (scid: 06f0ee69e1701a17) >- CryptoStream[I|ClientHello] 23.528 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.728/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.528 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.546 <- (14) Packet A|17|S0|015aa796375a7bdf|31|1 AckFrame[11-10|Δ0] 23.546 -> Packet A|14|S0|a2b42ee999667f25|39|2 ConnectionCloseFrame[0|0|] AckFrame[16,13-9,6|Δ0] 23.577 <- (15) Packet A|18|S0|015aa796375a7bdf|37|2 AckFrame[14,11-10|Δ0] ConnectionCloseFrame[0|0|] 23.728 loss detection timeout handler running Sending probe 0, because no ack since 23.528. Current RTT: 100/25. 23.728 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.728 (Probe is an initial retransmit) 23.728 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.128/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.728 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.864 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 23.866 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.066/Handshake, because peerAwaitingAddressValidation | RTT:100/25 23.867 Discarding pn space Initial because first Handshake message is being sent 23.867 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.067/Handshake, because peerAwaitingAddressValidation | RTT:100/25 23.867 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 24.066 loss detection timeout handler running 24.066 Sending probe 0. Current RTT: 100/25. 24.066 Sending probe because peer awaiting address validation 24.066 (Probe is a handshake ping) 24.066 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 24.466/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.066 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 24.097 <- (2) Packet H|1|L|47|1 AckFrame[0|Δ0] 24.098 probe count not reset on ack because handshake not yet confirmed 24.098 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.163 <- (3) Packet H|2|L|771|1 CryptoFrame[0,725] 24.164 - unknown transport parameter 0x00b6, size 0 24.164 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 24.164 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 181 millis, based on 24.348/Handshake, because ackElicitingInFlight | RTT:31/15 24.166 -> Packet H|1|L|85|2 CryptoFrame[0,36] AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.167 Starting downloading https://server4:443/eizvpbnhha at 53:00.204 on ClientConnection[14f9555ef6b8c00a/06f0ee69e1701a17(V1) with server4/193.167.100.100:443] 24.164 <- (4) Packet H|3|L|771|1 CryptoFrame[0,725] 24.167 -> Packet H|2|L|46|1 AckFrame[2-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.168 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 180 millis, based on 24.348/Handshake, because ackElicitingInFlight | RTT:31/15 24.167 -> [Packet H|3|L|46|1 AckFrame[3-1|Δ0], Packet A|0|S0|69b2aaa6c5939751|47|1 StreamFrame[0(CIB),0,17,fin]] 24.198 <- (5) Packet A|1|S0|06f0ee69e1701a17|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 24.198 State is set to Confirmed reschedule loss detection timer for PTO over 150 millis, based on 24.348/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 85 millis, based on 24.283/App, because ackElicitingInFlight | RTT:31/15 24.198 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 24.199 <- (6) Packet A|2|S0|06f0ee69e1701a17|1054|1 StreamFrame[0(CIB),0,1024] 24.199 <- (7) Packet A|3|S0|06f0ee69e1701a17|31|1 StreamFrame[0(CIB),1024,0,fin] 24.200 -> Packet A|1|S0|69b2aaa6c5939751|31|1 AckFrame[2-1|Δ0] 24.200 Finished downloading https://server4:443/eizvpbnhha at 53:00.237 on ClientConnection[14f9555ef6b8c00a/06f0ee69e1701a17(V1) with server4/193.167.100.100:443] 24.200 Closing ClientConnection[14f9555ef6b8c00a/06f0ee69e1701a17(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.200 -> Packet A|2|S0|69b2aaa6c5939751|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 24.200 Creating connection with server4:443 with v1 24.201 Setting up connection for downloading https://server4:443/vljkrcbget at 53:00.238 on ClientConnection[a77527ab7abc2d7b/7cc372faf5c4bf24(V1) with server4/193.167.100.100:443] 24.201 Original destination connection id: a77527ab7abc2d7b (scid: 7cc372faf5c4bf24) >- CryptoStream[I|ClientHello] 24.203 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.403/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.202 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.224 <- (8) Packet A|4|S0|06f0ee69e1701a17|32|1 AckFrame[0|Δ25] 24.224 -> Packet A|3|S0|69b2aaa6c5939751|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 24.230 <- (9) Packet A|5|S0|06f0ee69e1701a17|54|1 NewConnectionIdFrame[1,<0|765c19d354a12c84|1d4ef43290ed3d9a2ce8fccaadb42a53] 24.230 -> Packet A|4|S0|69b2aaa6c5939751|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 24.235 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.236 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.436/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.235 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 24.238 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.334/Handshake, because peerAwaitingAddressValidation | RTT:32/16 24.238 - unknown transport parameter 0x00b6, size 0 24.238 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 24.238 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 24.238 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.241 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.337/Handshake, because peerAwaitingAddressValidation | RTT:32/16 24.241 Discarding pn space Initial because first Handshake message is being sent 24.241 Starting downloading https://server4:443/vljkrcbget at 53:00.278 on ClientConnection[a77527ab7abc2d7b/7cc372faf5c4bf24(V1) with server4/193.167.100.100:443] 24.241 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.337/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.241 -> Packet H|0|L|85|2 AckFrame[0|Δ0] CryptoFrame[0,36] 24.235 <- (2) Packet A|0|S0|7cc372faf5c4bf24|54|1 NewConnectionIdFrame[1,<0|f25233b7c203d6f2|940b3ee3d4e43c2bc1ec84dd0084fd2f] 24.241 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.337/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.241 -> Packet A|0|S0|975d921f8af618f9|47|1 StreamFrame[0(CIB),0,17,fin] 24.261 -> Packet A|1|S0|975d921f8af618f9|32|1 AckFrame[0|Δ19] 24.272 <- (3) Packet A|1|S0|7cc372faf5c4bf24|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 24.273 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 24.337/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 89 millis, based on 24.362/App, because ackElicitingInFlight | RTT:32/16 24.273 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 24.273 <- (4) Packet A|3|S0|7cc372faf5c4bf24|31|1 StreamFrame[0(CIB),1024,0,fin] 24.274 -> Packet A|2|S0|975d921f8af618f9|33|1 AckFrame[3,1-0|Δ0] 24.297 <- (5) Packet A|4|S0|7cc372faf5c4bf24|32|1 AckFrame[1-0|Δ6] 24.298 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.392 <- (6) Packet A|5|S0|7cc372faf5c4bf24|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 24.392 <- (7) Packet A|6|S0|7cc372faf5c4bf24|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 24.393 -> Packet A|3|S0|975d921f8af618f9|33|1 AckFrame[6-3,1|Δ0] 24.425 <- (8) Packet A|7|S0|7cc372faf5c4bf24|1054|1 StreamFrame[0(CIB),0,1024,fin] 24.425 Finished downloading https://server4:443/vljkrcbget at 53:00.462 on ClientConnection[a77527ab7abc2d7b/7cc372faf5c4bf24(V1) with server4/193.167.100.100:443] 24.426 Closing ClientConnection[a77527ab7abc2d7b/7cc372faf5c4bf24(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.426 -> Packet A|4|S0|975d921f8af618f9|37|2 ConnectionCloseFrame[0|0|] AckFrame[7-3,1|Δ0] 24.426 Creating connection with server4:443 with v1 24.427 Setting up connection for downloading https://server4:443/vksabntwlb at 53:00.464 on ClientConnection[6630619e63343790/a677b1b077bc1620(V1) with server4/193.167.100.100:443] 24.427 Original destination connection id: 6630619e63343790 (scid: a677b1b077bc1620) >- CryptoStream[I|ClientHello] 24.428 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.628/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.428 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.457 <- (9) Packet A|8|S0|7cc372faf5c4bf24|35|2 AckFrame[4-3|Δ0] ConnectionCloseFrame[0|0|] 24.461 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.462 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.662/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.461 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 24.464 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.560/Handshake, because peerAwaitingAddressValidation | RTT:32/16 24.464 - unknown transport parameter 0x00b6, size 0 24.464 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 24.464 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 24.464 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 24.467 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.563/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.467 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.467 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.467 Starting downloading https://server4:443/vksabntwlb at 53:00.504 on ClientConnection[6630619e63343790/a677b1b077bc1620(V1) with server4/193.167.100.100:443] 24.467 -> Packet H|1|L|46|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 95 millis, based on 24.563/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.467 Discarding pn space Initial because first Handshake message is being sent 24.461 <- (2) Packet A|0|S0|a677b1b077bc1620|54|1 NewConnectionIdFrame[1,<0|0a31eb383d8465fe|82cdf19f48d2317c3dad2518dc9c0810] 24.467 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.563/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.467 -> Packet A|0|S0|544baf5d54056d8b|47|1 StreamFrame[0(CIB),0,17,fin] 24.487 -> Packet A|1|S0|544baf5d54056d8b|32|1 AckFrame[0|Δ19] 24.499 <- (3) Packet A|2|S0|a677b1b077bc1620|1054|1 StreamFrame[0(CIB),0,1024] 24.499 <- (4) Packet A|3|S0|a677b1b077bc1620|31|1 StreamFrame[0(CIB),1024,0,fin] 24.500 Finished downloading https://server4:443/vksabntwlb at 53:00.537 on ClientConnection[6630619e63343790/a677b1b077bc1620(V1) with server4/193.167.100.100:443] 24.500 -> Packet A|2|S0|544baf5d54056d8b|33|1 AckFrame[3-2,0|Δ0] 24.500 Closing ClientConnection[6630619e63343790/a677b1b077bc1620(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.500 -> Packet A|3|S0|544baf5d54056d8b|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 24.501 Creating connection with server4:443 with v1 24.501 Setting up connection for downloading https://server4:443/tlrweslspm at 53:00.538 on ClientConnection[136ca1f0049fd5be/461de0a64df71c2d(V1) with server4/193.167.100.100:443] 24.501 Original destination connection id: 136ca1f0049fd5be (scid: 461de0a64df71c2d) >- CryptoStream[I|ClientHello] 24.503 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.703/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.503 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.524 <- (5) Packet A|4|S0|a677b1b077bc1620|32|1 AckFrame[0|Δ26] 24.525 -> Packet A|4|S0|544baf5d54056d8b|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 24.536 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.536 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.736/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.536 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 24.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.635/Handshake, because peerAwaitingAddressValidation | RTT:32/16 24.538 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 24.539 - unknown transport parameter 0x00b6, size 0 24.539 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 24.539 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 24.541 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.637/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.541 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.541 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.637/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.541 Discarding pn space Initial because first Handshake message is being sent 24.541 Starting downloading https://server4:443/tlrweslspm at 53:00.578 on ClientConnection[136ca1f0049fd5be/461de0a64df71c2d(V1) with server4/193.167.100.100:443] 24.541 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 24.536 <- (2) Packet A|0|S0|461de0a64df71c2d|54|1 NewConnectionIdFrame[1,<0|33726830de5ece85|cd45e29f10db3317ddd4d36ec5141342] 24.542 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.638/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.542 -> Packet A|0|S0|a6973f62169630f3|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 24.572 <- (3) Packet A|1|S0|461de0a64df71c2d|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 24.572 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 24.637/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 24.663/App, because ackElicitingInFlight | RTT:32/16 24.573 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 24.573 <- (4) Packet A|2|S0|461de0a64df71c2d|1054|1 StreamFrame[0(CIB),0,1024] 24.573 <- (5) Packet A|3|S0|461de0a64df71c2d|31|1 StreamFrame[0(CIB),1024,0,fin] 24.574 -> Packet A|1|S0|a6973f62169630f3|31|1 AckFrame[2-0|Δ0] 24.574 Finished downloading https://server4:443/tlrweslspm at 53:00.611 on ClientConnection[136ca1f0049fd5be/461de0a64df71c2d(V1) with server4/193.167.100.100:443] 24.574 Closing ClientConnection[136ca1f0049fd5be/461de0a64df71c2d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.574 -> Packet A|2|S0|a6973f62169630f3|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 24.575 Creating connection with server4:443 with v1 24.575 Setting up connection for downloading https://server4:443/mnhmovbbuf at 53:00.612 on ClientConnection[562e3702a84afcfe/df395058caf07534(V1) with server4/193.167.100.100:443] 24.575 Original destination connection id: 562e3702a84afcfe (scid: df395058caf07534) >- CryptoStream[I|ClientHello] 24.577 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.777/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.576 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.598 <- (6) Packet A|4|S0|461de0a64df71c2d|32|1 AckFrame[0|Δ25] 24.598 -> Packet A|3|S0|a6973f62169630f3|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 24.605 <- (7) Packet A|5|S0|461de0a64df71c2d|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 24.609 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.610 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.810/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.609 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 24.612 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.708/Handshake, because peerAwaitingAddressValidation | RTT:32/16 24.612 - unknown transport parameter 0x00b6, size 0 24.612 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 24.612 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 24.612 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 24.615 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.615 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.615 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.615 Discarding pn space Initial because first Handshake message is being sent 24.615 Starting downloading https://server4:443/mnhmovbbuf at 53:00.652 on ClientConnection[562e3702a84afcfe/df395058caf07534(V1) with server4/193.167.100.100:443] 24.615 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 24.615 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.615 -> Packet A|0|S0|4e0d6e266d3a74b5|47|1 StreamFrame[0(CIB),0,17,fin] 24.631 <- (6) Packet A|5|S0|a677b1b077bc1620|54|1 NewConnectionIdFrame[1,<0|0a31eb383d8465fe|82cdf19f48d2317c3dad2518dc9c0810] 24.631 <- (7) Packet A|6|S0|a677b1b077bc1620|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 24.632 -> Packet A|5|S0|544baf5d54056d8b|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 24.711 loss detection timeout handler running Sending probe 0, because no ack since 24.615. Current RTT: 32/16. 24.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.711 (Probe is a handshake retransmit) 24.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 24.903/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.711 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 24.742 <- (2) Packet A|1|S0|df395058caf07534|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 24.743 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 24.857/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -6 millis, based on 24.736/App, because ackElicitingInFlight | RTT:32/16 24.743 Discarding pn space Handshake because HandshakeDone is received 24.743 loss detection timeout handler running Sending probe 0, because no ack since 24.615. Current RTT: 32/16. 24.743 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 24.985/App, because ackElicitingInFlight | RTT:32/16 24.743 -> Packet PA|1|S0|4e0d6e266d3a74b5|47|1 StreamFrame[0(CIB),0,17,fin] 24.763 -> Packet A|2|S0|4e0d6e266d3a74b5|32|1 AckFrame[1|Δ19] 24.775 <- (3) Packet A|2|S0|df395058caf07534|1054|1 StreamFrame[0(CIB),0,1024] 24.775 <- (4) Packet A|3|S0|df395058caf07534|31|1 StreamFrame[0(CIB),1024,0,fin] 24.776 Finished downloading https://server4:443/mnhmovbbuf at 53:00.813 on ClientConnection[562e3702a84afcfe/df395058caf07534(V1) with server4/193.167.100.100:443] 24.776 -> Packet A|3|S0|4e0d6e266d3a74b5|31|1 AckFrame[3-1|Δ0] 24.776 Closing ClientConnection[562e3702a84afcfe/df395058caf07534(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.776 -> Packet A|4|S0|4e0d6e266d3a74b5|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 24.777 Creating connection with server4:443 with v1 24.777 Setting up connection for downloading https://server4:443/fjbarkbxld at 53:00.814 on ClientConnection[0296c54fe5f2874d/e5bbcbfb734315db(V1) with server4/193.167.100.100:443] 24.777 Original destination connection id: 0296c54fe5f2874d (scid: e5bbcbfb734315db) >- CryptoStream[I|ClientHello] 24.779 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.979/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.779 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.799 <- (5) Packet A|4|S0|df395058caf07534|32|1 AckFrame[1|Δ25] 24.800 -> Packet A|5|S0|4e0d6e266d3a74b5|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 24.807 <- (6) Packet A|5|S0|df395058caf07534|54|1 NewConnectionIdFrame[1,<0|a6f9928ba29e1610|00d860a1c15a914d230e80c13a913aa7] 24.807 -> Packet A|6|S0|4e0d6e266d3a74b5|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 24.807 <- (7) Packet A|6|S0|df395058caf07534|37|2 AckFrame[4-3,1|Δ0] ConnectionCloseFrame[0|0|] 24.811 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.812 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.012/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.814 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.910/Handshake, because peerAwaitingAddressValidation | RTT:32/16 24.814 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 24.811 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,726] Padding(253) 24.814 - unknown transport parameter 0x00b6, size 0 24.815 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 24.815 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 24.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.913/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.817 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.913/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.817 Discarding pn space Initial because first Handshake message is being sent 24.817 Starting downloading https://server4:443/fjbarkbxld at 53:00.854 on ClientConnection[0296c54fe5f2874d/e5bbcbfb734315db(V1) with server4/193.167.100.100:443] 24.817 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 24.811 <- (2) Packet A|0|S0|e5bbcbfb734315db|54|1 NewConnectionIdFrame[1,<0|4bb18539cc5015e6|0d34a13c8feacdb067d0c49353a606ee] 24.818 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.914/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.818 -> Packet A|0|S0|23502ea1bb492455|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 24.848 <- (3) Packet A|1|S0|e5bbcbfb734315db|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 24.849 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 24.913/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 24.939/App, because ackElicitingInFlight | RTT:32/16 24.849 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 24.849 <- (4) Packet A|2|S0|e5bbcbfb734315db|1054|1 StreamFrame[0(CIB),0,1024] 24.849 <- (5) Packet A|3|S0|e5bbcbfb734315db|31|1 StreamFrame[0(CIB),1024,0,fin] 24.850 -> Packet A|1|S0|23502ea1bb492455|31|1 AckFrame[2-0|Δ0] 24.850 Finished downloading https://server4:443/fjbarkbxld at 53:00.887 on ClientConnection[0296c54fe5f2874d/e5bbcbfb734315db(V1) with server4/193.167.100.100:443] 24.850 Closing ClientConnection[0296c54fe5f2874d/e5bbcbfb734315db(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.851 -> Packet A|2|S0|23502ea1bb492455|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 24.851 Creating connection with server4:443 with v1 24.851 Setting up connection for downloading https://server4:443/wujtbsneog at 53:00.888 on ClientConnection[12fffc8e1eaa1db3/709baa45fb429981(V1) with server4/193.167.100.100:443] 24.851 Original destination connection id: 12fffc8e1eaa1db3 (scid: 709baa45fb429981) >- CryptoStream[I|ClientHello] 24.853 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.053/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.853 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.875 <- (6) Packet A|4|S0|e5bbcbfb734315db|32|1 AckFrame[0|Δ26] 24.876 -> Packet A|3|S0|23502ea1bb492455|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-0|Δ0] 24.886 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 24.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.086/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.886 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,728] Padding(251) 24.889 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.985/Handshake, because peerAwaitingAddressValidation | RTT:32/16 24.889 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 24.889 - unknown transport parameter 0x00b6, size 0 24.889 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 24.889 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 24.892 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.988/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.892 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.892 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.988/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.892 Starting downloading https://server4:443/wujtbsneog at 53:00.929 on ClientConnection[12fffc8e1eaa1db3/709baa45fb429981(V1) with server4/193.167.100.100:443] 24.892 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 24.893 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 24.989/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.892 Discarding pn space Initial because first Handshake message is being sent 24.893 -> Packet A|0|S0|b9216c40ce08c4c8|47|1 StreamFrame[0(CIB),0,17,fin] 24.988 loss detection timeout handler running Sending probe 0, because no ack since 24.892. Current RTT: 32/16. 24.988 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.988 (Probe is a handshake retransmit) 24.988 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 25.180/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 24.988 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 24.995 <- (2) Packet H|2|L|774|1 CryptoFrame[0,728] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.995 -> Packet H|3|L|48|1 AckFrame[2,0|Δ0] 25.179 loss detection timeout handler running Sending probe 1, because no ack since 24.893. Current RTT: 32/16. 25.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.180 (Probe is a handshake retransmit) 25.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 25.564/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 25.180 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 25.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 25.565/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 25.181 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 25.209 <- (3) Packet H|3|L|774|1 CryptoFrame[0,728] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.209 -> Packet H|6|L|48|1 AckFrame[3-2,0|Δ0] 25.211 <- (4) Packet A|1|S0|709baa45fb429981|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 25.211 State is set to Confirmed reschedule loss detection timer for PTO over 165 millis, based on 25.377/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -197 millis, based on 25.014/App, because ackElicitingInFlight | RTT:32/16 25.211 Discarding pn space Handshake because HandshakeDone is received 25.211 loss detection timeout handler running Sending probe 0, because no ack since 24.893. Current RTT: 32/16. 25.211 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 25.454/App, because ackElicitingInFlight | RTT:32/16 25.212 -> Packet PA|1|S0|b9216c40ce08c4c8|47|1 StreamFrame[0(CIB),0,17,fin] 25.231 -> Packet A|2|S0|b9216c40ce08c4c8|32|1 AckFrame[1|Δ19] 25.243 <- (5) Packet A|3|S0|709baa45fb429981|31|1 StreamFrame[0(CIB),1024,0,fin] 25.262 <- (6) Packet A|4|S0|709baa45fb429981|54|1 NewConnectionIdFrame[1,<0|0c0ab4fe2757e972|ad28113726b67171a62b413d4f076b6e] 25.262 -> Packet A|3|S0|b9216c40ce08c4c8|34|1 AckFrame[4-3,1|Δ18] 25.415 <- (7) Packet A|7|S0|709baa45fb429981|30|2 PingFrame[] Padding(3) 25.415 <- (8) Packet A|8|S0|709baa45fb429981|30|2 PingFrame[] Padding(3) 25.415 -> Packet A|4|S0|b9216c40ce08c4c8|35|1 AckFrame[8-7,4-3,1|Δ0] 25.453 loss detection timeout handler running Sending probe 1, because no ack since 25.212. Current RTT: 32/16. 25.453 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 25.937/App, because ackElicitingInFlight | RTT:32/16 25.453 -> Packet PA|5|S0|b9216c40ce08c4c8|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 25.938/App, because ackElicitingInFlight | RTT:32/16 25.454 -> Packet PA|6|S0|b9216c40ce08c4c8|47|1 StreamFrame[0(CIB),0,17,fin] 25.654 <- (9) Packet A|10|S0|709baa45fb429981|30|2 PingFrame[] Padding(3) 25.673 -> Packet A|7|S0|b9216c40ce08c4c8|38|1 AckFrame[10,8-7,4-3,1|Δ19] 25.937 loss detection timeout handler running Sending probe 2, because no ack since 25.454. Current RTT: 32/16. 25.938 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 967 millis, based on 26.906/App, because ackElicitingInFlight | RTT:32/16 25.938 -> Packet PA|8|S0|b9216c40ce08c4c8|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 967 millis, based on 26.907/App, because ackElicitingInFlight | RTT:32/16 25.939 -> Packet PA|9|S0|b9216c40ce08c4c8|47|1 StreamFrame[0(CIB),0,17,fin] 26.132 <- (10) Packet A|14|S0|709baa45fb429981|30|2 PingFrame[] Padding(3) 26.152 -> Packet A|10|S0|b9216c40ce08c4c8|40|1 AckFrame[14,10,8-7,4-3,1|Δ19] 26.906 loss detection timeout handler running Sending probe 3, because no ack since 25.939. Current RTT: 32/16. 26.906 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1935 millis, based on 28.842/App, because ackElicitingInFlight | RTT:32/16 26.906 -> Packet PA|11|S0|b9216c40ce08c4c8|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1935 millis, based on 28.843/App, because ackElicitingInFlight | RTT:32/16 26.907 -> Packet PA|12|S0|b9216c40ce08c4c8|47|1 StreamFrame[0(CIB),0,17,fin] 26.937 <- (11) Packet A|15|S0|709baa45fb429981|37|1 AckFrame[11,9,5,3-1|Δ0] 26.938 Cwnd(-): 6000; inflight: 47 26.938 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 89 millis, based on 27.028/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 104 millis, based on 27.043/App, because ackElicitingInFlight | RTT:32/12 26.938 -> Packet A|13|S0|b9216c40ce08c4c8|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[14,10,8-7|Δ0] 26.964 <- (12) Packet A|16|S0|709baa45fb429981|38|1 AckFrame[12-11,9,5,3-1|Δ26] reschedule loss detection timer for PTO over 78 millis, based on 27.043/App, because ackElicitingInFlight | RTT:32/12 27.043 loss detection timeout handler running Sending probe 0, because no ack since 26.938. Current RTT: 32/9. 27.043 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 185 millis, based on 27.230/App, because ackElicitingInFlight | RTT:32/9 27.044 -> Packet PA|14|S0|b9216c40ce08c4c8|47|1 StreamFrame[0(CIB),0,17,fin] 27.088 <- (13) Packet A|17|S0|709baa45fb429981|30|2 PingFrame[] Padding(3) 27.107 -> Packet A|15|S0|b9216c40ce08c4c8|36|1 AckFrame[17-14,10,8-7|Δ19] 27.229 loss detection timeout handler running Sending probe 1, because no ack since 27.044. Current RTT: 32/9. 27.229 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 371 millis, based on 27.601/App, because ackElicitingInFlight | RTT:32/9 27.229 -> Packet PA|16|S0|b9216c40ce08c4c8|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 371 millis, based on 27.602/App, because ackElicitingInFlight | RTT:32/9 27.230 -> Packet PA|17|S0|b9216c40ce08c4c8|47|1 StreamFrame[0(CIB),0,17,fin] 27.260 <- (14) Packet A|19|S0|709baa45fb429981|39|1 AckFrame[16,12-11,9,5,3-1|Δ0] 27.261 Cwnd(-): 3000; inflight: 47 27.261 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 62 millis, based on 27.323/App, because ackElicitingInFlight | RTT:32/9 reschedule loss detection timer for PTO over 84 millis, based on 27.346/App, because ackElicitingInFlight | RTT:32/7 27.261 -> Packet A|18|S0|b9216c40ce08c4c8|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[17-14,10,8-7|Δ0] 27.293 <- (15) Packet A|21|S0|709baa45fb429981|1061|2 AckFrame[18,16|Δ0] StreamFrame[0(CIB),0,1024,fin] 27.294 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.294 Finished downloading https://server4:443/wujtbsneog at 53:03.331 on ClientConnection[12fffc8e1eaa1db3/709baa45fb429981(V1) with server4/193.167.100.100:443] 27.294 Closing ClientConnection[12fffc8e1eaa1db3/709baa45fb429981(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.294 -> Packet A|19|S0|b9216c40ce08c4c8|37|2 ConnectionCloseFrame[0|0|] AckFrame[21,19|Δ0] 27.295 Creating connection with server4:443 with v1 27.295 Setting up connection for downloading https://server4:443/clkjxdlznn at 53:03.332 on ClientConnection[48e9142fad944e15/7159a1b0b447c205(V1) with server4/193.167.100.100:443] 27.295 Original destination connection id: 48e9142fad944e15 (scid: 7159a1b0b447c205) >- CryptoStream[I|ClientHello] 27.297 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.497/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.296 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.325 <- (16) Packet A|22|S0|709baa45fb429981|35|2 AckFrame[19|Δ0] ConnectionCloseFrame[0|0|] 27.330 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 27.496 loss detection timeout handler running Sending probe 0, because no ack since 27.296. Current RTT: 100/25. 27.496 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.496 (Probe is an initial retransmit) 27.496 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.896/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.496 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.528 <- (2) Packet I|1|L|48|1 Token=[] AckFrame[1-0|Δ0] 27.529 probe count not reset on ack because handshake not yet confirmed 27.529 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.929/Initial, because peerAwaitingAddressValidation | RTT:100/25 27.631 <- (3) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 27.634 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 27.730/Handshake, because peerAwaitingAddressValidation | RTT:32/16 27.634 Discarding pn space Initial because first Handshake message is being sent 27.634 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 27.634 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 27.730/Handshake, because peerAwaitingAddressValidation | RTT:32/16 27.634 -> Packet I|2|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 27.729 loss detection timeout handler running 27.729 Sending probe 0. Current RTT: 32/16. 27.729 Sending probe because peer awaiting address validation 27.729 (Probe is a handshake ping) 27.730 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 27.922/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.729 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 27.921 loss detection timeout handler running Sending probe 1, because no ack since 27.729. Current RTT: 32/16. 27.921 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.921 (Probe is a handshake ping) 27.921 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 28.305/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.921 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 27.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 28.306/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.922 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 27.931 <- (5) Packet H|1|L|773|1 CryptoFrame[0,727] 27.932 - unknown transport parameter 0x00b6, size 0 27.932 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 27.932 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 27.934 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 28.318/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.934 -> Packet H|3|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.932 <- (6) Packet H|2|L|773|1 CryptoFrame[0,727] 27.934 Starting downloading https://server4:443/clkjxdlznn at 53:03.971 on ClientConnection[48e9142fad944e15/7159a1b0b447c205(V1) with server4/193.167.100.100:443] 27.934 -> Packet H|4|L|46|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.934 -> Packet H|5|L|46|1 AckFrame[2-1|Δ0] 27.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 28.319/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 27.935 -> Packet A|0|S0|b11fdb50068d1298|47|1 StreamFrame[0(CIB),0,17,fin] 27.965 <- (7) Packet A|1|S0|7159a1b0b447c205|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 27.966 State is set to Confirmed reschedule loss detection timer for PTO over 352 millis, based on 28.318/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 90 millis, based on 28.056/App, because ackElicitingInFlight | RTT:32/16 27.966 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 27.966 <- (8) Packet A|2|S0|7159a1b0b447c205|1054|1 StreamFrame[0(CIB),0,1024] 27.966 <- (9) Packet A|3|S0|7159a1b0b447c205|31|1 StreamFrame[0(CIB),1024,0,fin] 27.967 -> Packet A|1|S0|b11fdb50068d1298|31|1 AckFrame[2-1|Δ0] 27.967 Finished downloading https://server4:443/clkjxdlznn at 53:04.004 on ClientConnection[48e9142fad944e15/7159a1b0b447c205(V1) with server4/193.167.100.100:443] 27.967 Closing ClientConnection[48e9142fad944e15/7159a1b0b447c205(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.968 -> Packet A|2|S0|b11fdb50068d1298|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 27.968 Creating connection with server4:443 with v1 27.968 Setting up connection for downloading https://server4:443/wsdgnyzive at 53:04.005 on ClientConnection[78987a675d1017aa/3c5b9f8f76ffd007(V1) with server4/193.167.100.100:443] 27.968 Original destination connection id: 78987a675d1017aa (scid: 3c5b9f8f76ffd007) >- CryptoStream[I|ClientHello] 27.970 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.170/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.970 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.991 <- (10) Packet A|4|S0|7159a1b0b447c205|32|1 AckFrame[0|Δ25] 27.991 -> Packet A|3|S0|b11fdb50068d1298|35|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 28.003 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 28.004 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.204/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 28.003 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 28.007 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.104/Handshake, because peerAwaitingAddressValidation | RTT:33/16 28.007 - unknown transport parameter 0x00b6, size 0 28.007 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 28.007 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 28.007 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 28.010 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.107/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.010 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.010 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.107/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.010 Discarding pn space Initial because first Handshake message is being sent 28.010 Starting downloading https://server4:443/wsdgnyzive at 53:04.047 on ClientConnection[78987a675d1017aa/3c5b9f8f76ffd007(V1) with server4/193.167.100.100:443] 28.010 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 28.011 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.108/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.011 -> Packet A|0|S0|fa93cee0a5839559|47|1 StreamFrame[0(CIB),0,17,fin] 28.042 <- (2) Packet A|2|S0|3c5b9f8f76ffd007|1054|1 StreamFrame[0(CIB),0,1024] 28.062 -> Packet A|1|S0|fa93cee0a5839559|32|1 AckFrame[2|Δ19] 28.067 <- (3) Packet A|4|S0|3c5b9f8f76ffd007|32|1 AckFrame[0|Δ25] 28.067 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.164/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.163 loss detection timeout handler running Sending probe 0, because no ack since 28.010. Current RTT: 36/18. 28.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.164 (Probe is a handshake retransmit) 28.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 215 millis, based on 28.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/18 28.164 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 28.178 <- (4) Packet A|5|S0|3c5b9f8f76ffd007|54|1 NewConnectionIdFrame[1,<0|25545118e1b87b5b|b4b6a5848f21a2f132f7d2a9c6a47c3f] 28.179 <- (5) Packet A|6|S0|3c5b9f8f76ffd007|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 28.179 State is set to Confirmed reschedule loss detection timer for PTO over 200 millis, based on 28.380/Handshake, because ackElicitingInFlight | RTT:36/18 28.179 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.179 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 28.180 -> Packet A|2|S0|fa93cee0a5839559|33|1 AckFrame[6-4,2|Δ0] 28.450 <- (6) Packet A|7|S0|3c5b9f8f76ffd007|54|1 NewConnectionIdFrame[1,<0|25545118e1b87b5b|b4b6a5848f21a2f132f7d2a9c6a47c3f] 28.451 <- (7) Packet A|8|S0|3c5b9f8f76ffd007|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 28.451 -> Packet A|3|S0|fa93cee0a5839559|33|1 AckFrame[8-4,2|Δ0] 28.482 <- (8) Packet A|9|S0|3c5b9f8f76ffd007|31|1 StreamFrame[0(CIB),1024,0,fin] 28.483 Finished downloading https://server4:443/wsdgnyzive at 53:04.520 on ClientConnection[78987a675d1017aa/3c5b9f8f76ffd007(V1) with server4/193.167.100.100:443] 28.483 Closing ClientConnection[78987a675d1017aa/3c5b9f8f76ffd007(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.483 -> Packet A|4|S0|fa93cee0a5839559|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-4,2|Δ0] 28.484 Creating connection with server4:443 with v1 28.484 Setting up connection for downloading https://server4:443/ftvuswmwdp at 53:04.521 on ClientConnection[3c83379487f49202/5f7fa2a356e82684(V1) with server4/193.167.100.100:443] 28.484 Original destination connection id: 3c83379487f49202 (scid: 5f7fa2a356e82684) >- CryptoStream[I|ClientHello] 28.485 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.686/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.485 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.685 loss detection timeout handler running Sending probe 0, because no ack since 28.485. Current RTT: 100/25. 28.685 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.685 (Probe is an initial retransmit) 28.685 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.085/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.685 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.084 loss detection timeout handler running Sending probe 1, because no ack since 28.685. Current RTT: 100/25. 29.085 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.085 (Probe is an initial retransmit) 29.085 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.885/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.085 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.086 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.886/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.086 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.118 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 29.118 <- (2) Packet I|1|L|48|1 Token=[] AckFrame[3-2|Δ0] 29.119 probe count not reset on ack because handshake not yet confirmed 29.119 Retransmitting CryptoFrame[0,257] on level Initial 29.119 Cwnd(-): 6000; inflight: 0 29.119 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 29.919/Initial, because peerAwaitingAddressValidation | RTT:100/25 29.119 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 29.503/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 29.119 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.151 <- (3) Packet I|2|L|48|1 Token=[] AckFrame[4-2|Δ0] 29.151 probe count not reset on ack because handshake not yet confirmed 29.152 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 29.536/Initial, because peerAwaitingAddressValidation | RTT:32/16 29.419 <- (4) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 29.422 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 29.502/Handshake, because peerAwaitingAddressValidation | RTT:32/12 29.422 Discarding pn space Initial because first Handshake message is being sent 29.423 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 29.423 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 29.503/Handshake, because peerAwaitingAddressValidation | RTT:32/12 29.423 -> Packet I|5|L|1201|2 Token=[] AckFrame[3-1|Δ0] Padding(1153) 29.455 <- (6) Packet H|1|L|773|1 CryptoFrame[0,727] 29.456 - unknown transport parameter 0x00b6, size 0 29.456 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 29.456 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 29.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 29.538/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 29.458 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.459 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 29.459 Starting downloading https://server4:443/ftvuswmwdp at 53:05.496 on ClientConnection[3c83379487f49202/5f7fa2a356e82684(V1) with server4/193.167.100.100:443] 29.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 79 millis, based on 29.539/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 29.459 -> Packet A|0|S0|aa081ec1e81cd969|47|1 StreamFrame[0(CIB),0,17,fin] 29.538 loss detection timeout handler running Sending probe 0, because no ack since 29.458. Current RTT: 32/12. 29.538 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.539 (Probe is a handshake retransmit) 29.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 159 millis, based on 29.699/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 29.539 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 29.698 loss detection timeout handler running Sending probe 1, because no ack since 29.459. Current RTT: 32/12. 29.698 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.698 (Probe is a handshake retransmit) 29.699 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 319 millis, based on 30.019/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 29.699 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 29.700 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 319 millis, based on 30.020/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/12 29.700 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 29.755 <- (7) Packet A|2|S0|5f7fa2a356e82684|54|1 NewConnectionIdFrame[1,<0|bbb06b31207a159e|98ca9611e2c398e57e0e86a170756894] 29.755 <- (8) Packet A|3|S0|5f7fa2a356e82684|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 29.755 State is set to Confirmed reschedule loss detection timer for PTO over 123 millis, based on 29.879/App, because ackElicitingInFlight | RTT:32/12 reschedule loss detection timer for PTO over -191 millis, based on 29.564/App, because ackElicitingInFlight | RTT:32/12 29.756 loss detection timeout handler running 29.756 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 29.459. Current RTT: 32/12. 29.756 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 209 millis, based on 29.966/App, because ackElicitingInFlight | RTT:32/12 29.756 -> Packet PA|1|S0|aa081ec1e81cd969|47|1 StreamFrame[0(CIB),0,17,fin] 29.756 -> Packet A|2|S0|aa081ec1e81cd969|31|1 AckFrame[3-2|Δ0] 29.965 loss detection timeout handler running Sending probe 1, because no ack since 29.756. Current RTT: 32/12. 29.965 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 419 millis, based on 30.385/App, because ackElicitingInFlight | RTT:32/12 29.965 -> Packet PA|3|S0|aa081ec1e81cd969|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 419 millis, based on 30.387/App, because ackElicitingInFlight | RTT:32/12 29.967 -> Packet PA|4|S0|aa081ec1e81cd969|47|1 StreamFrame[0(CIB),0,17,fin] 29.998 <- (9) Packet A|5|S0|5f7fa2a356e82684|1054|1 StreamFrame[0(CIB),0,1024] 29.998 <- (10) Packet A|6|S0|5f7fa2a356e82684|31|1 StreamFrame[0(CIB),1024,0,fin] 29.999 -> Packet A|5|S0|aa081ec1e81cd969|33|1 AckFrame[6-5,3-2|Δ0] 29.999 Finished downloading https://server4:443/ftvuswmwdp at 53:06.036 on ClientConnection[3c83379487f49202/5f7fa2a356e82684(V1) with server4/193.167.100.100:443] 29.999 Closing ClientConnection[3c83379487f49202/5f7fa2a356e82684(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.000 -> Packet A|6|S0|aa081ec1e81cd969|37|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3-2|Δ0] 30.000 Creating connection with server4:443 with v1 30.001 Setting up connection for downloading https://server4:443/kfoyseefgh at 53:06.038 on ClientConnection[acd720ec4906dc58/425b1174443b735f(V1) with server4/193.167.100.100:443] 30.001 Original destination connection id: acd720ec4906dc58 (scid: 425b1174443b735f) >- CryptoStream[I|ClientHello] 30.002 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.202/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.002 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.030 <- (11) Packet A|7|S0|5f7fa2a356e82684|35|2 AckFrame[6-4|Δ0] ConnectionCloseFrame[0|0|] 30.201 loss detection timeout handler running Sending probe 0, because no ack since 30.002. Current RTT: 100/25. 30.201 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.201 (Probe is an initial retransmit) 30.202 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 30.602/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.202 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.537 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 30.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 30.739/Handshake, because peerAwaitingAddressValidation | RTT:100/25 30.539 Discarding pn space Initial because first Handshake message is being sent 30.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.539 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) reschedule loss detection timer for PTO over 199 millis, based on 30.739/Handshake, because peerAwaitingAddressValidation | RTT:100/25 30.539 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 30.738 loss detection timeout handler running 30.738 Sending probe 0. Current RTT: 100/25. 30.738 Sending probe because peer awaiting address validation 30.739 (Probe is a handshake ping) 30.739 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 31.139/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.739 -> Packet PH|0|L|44|2 PingFrame[] Padding(2) 30.750 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.751 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 31.138 loss detection timeout handler running Sending probe 1, because no ack since 30.739. Current RTT: 100/25. 31.138 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.138 (Probe is a handshake ping) 31.139 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 31.939/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.139 -> Packet PH|1|L|44|2 PingFrame[] Padding(2) 31.140 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 31.940/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.140 -> Packet PH|2|L|44|2 PingFrame[] Padding(2) 31.939 loss detection timeout handler running Sending probe 2, because no ack since 31.140. Current RTT: 100/25. 31.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.939 (Probe is a handshake ping) 31.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 33.539/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.939 -> Packet PH|3|L|44|2 PingFrame[] Padding(2) 31.940 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 33.540/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.940 -> Packet PH|4|L|44|2 PingFrame[] Padding(2) 32.022 <- (5) Packet H|6|L|774|1 CryptoFrame[0,728] 32.023 - unknown transport parameter 0x00b6, size 0 32.023 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 32.023 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 32.027 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 33.627/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.027 -> Packet H|5|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.028 Starting downloading https://server4:443/kfoyseefgh at 53:08.065 on ClientConnection[acd720ec4906dc58/425b1174443b735f(V1) with server4/193.167.100.100:443] 32.022 <- (6) Packet H|7|L|774|1 CryptoFrame[0,728] 32.028 -> Packet H|6|L|46|1 AckFrame[6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.028 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1599 millis, based on 33.628/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.028 -> [Packet H|7|L|46|1 AckFrame[7-6|Δ0], Packet A|0|S0|9979695c2497c696|47|1 StreamFrame[0(CIB),0,17,fin]] 33.627 loss detection timeout handler running Sending probe 3, because no ack since 32.027. Current RTT: 100/25. 33.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.628 (Probe is a handshake retransmit) 33.628 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3199 millis, based on 36.828/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.628 -> Packet PH|8|L|80|1 CryptoFrame[0,36] 33.629 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3199 millis, based on 36.829/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.629 -> Packet PH|9|L|80|1 CryptoFrame[0,36] 34.160 <- (7) Packet A|2|S0|425b1174443b735f|54|1 NewConnectionIdFrame[1,<0|679937caf8271949|34b14da2eec9dc1813abcf7dbada2f50] 34.161 <- (8) Packet A|3|S0|425b1174443b735f|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 34.161 State is set to Confirmed reschedule loss detection timer for PTO over 1466 millis, based on 35.628/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -1908 millis, based on 32.253/App, because ackElicitingInFlight | RTT:100/25 34.161 Discarding pn space Handshake because HandshakeDone is received 34.161 loss detection timeout handler running Sending probe 0, because no ack since 32.028. Current RTT: 100/25. 34.161 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 449 millis, based on 34.611/App, because ackElicitingInFlight | RTT:100/25 34.161 -> Packet PA|1|S0|9979695c2497c696|47|1 StreamFrame[0(CIB),0,17,fin] 34.162 -> Packet A|2|S0|9979695c2497c696|31|1 AckFrame[3-2|Δ0] 34.611 loss detection timeout handler running Sending probe 1, because no ack since 34.161. Current RTT: 100/25. 34.611 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 35.511/App, because ackElicitingInFlight | RTT:100/25 34.611 -> Packet PA|3|S0|9979695c2497c696|47|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 35.512/App, because ackElicitingInFlight | RTT:100/25 34.612 -> Packet PA|4|S0|9979695c2497c696|47|1 StreamFrame[0(CIB),0,17,fin] 34.643 <- (9) Packet A|4|S0|425b1174443b735f|33|1 AckFrame[4,2|Δ0] 34.643 Cwnd(-): 6000; inflight: 47 34.643 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 34.643 -> Packet A|5|S0|9979695c2497c696|47|1 StreamFrame[0(CIB),0,17,fin] 34.644 <- (10) Packet A|6|S0|425b1174443b735f|31|1 StreamFrame[0(CIB),1024,0,fin] 34.663 -> Packet A|6|S0|9979695c2497c696|34|1 AckFrame[6,4|Δ19] 34.700 <- (11) Packet A|7|S0|425b1174443b735f|32|1 AckFrame[6-5|Δ6] 34.701 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 34.823 <- (12) Packet A|9|S0|425b1174443b735f|30|2 PingFrame[] Padding(3) 34.823 <- (13) Packet A|10|S0|425b1174443b735f|30|2 PingFrame[] Padding(3) 34.824 -> Packet A|7|S0|9979695c2497c696|33|1 AckFrame[10-9,7|Δ0] 34.855 <- (14) Packet A|11|S0|425b1174443b735f|1054|1 StreamFrame[0(CIB),0,1024,fin] 34.856 Finished downloading https://server4:443/kfoyseefgh at 53:10.893 on ClientConnection[acd720ec4906dc58/425b1174443b735f(V1) with server4/193.167.100.100:443] 34.856 Closing ClientConnection[acd720ec4906dc58/425b1174443b735f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 34.857 -> Packet A|8|S0|9979695c2497c696|37|2 ConnectionCloseFrame[0|0|] AckFrame[11-9,7|Δ0] 34.857 Creating connection with server4:443 with v1 34.858 Setting up connection for downloading https://server4:443/dfjcobrghn at 53:10.895 on ClientConnection[83ffcc82504beb22/fbb2f19a5cc70b5e(V1) with server4/193.167.100.100:443] 34.858 Original destination connection id: 83ffcc82504beb22 (scid: fbb2f19a5cc70b5e) >- CryptoStream[I|ClientHello] 34.859 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.059/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.859 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.892 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 34.893 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.093/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 34.895 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.992/Handshake, because peerAwaitingAddressValidation | RTT:33/16 34.892 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 34.895 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 34.895 - unknown transport parameter 0x00b6, size 0 34.895 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 34.895 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 34.898 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.995/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.898 -> Packet H|0|L|80|1 CryptoFrame[0,36] 34.898 Starting downloading https://server4:443/dfjcobrghn at 53:10.935 on ClientConnection[83ffcc82504beb22/fbb2f19a5cc70b5e(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 34.899 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.996/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.899 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.996/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.899 -> Packet A|0|S0|a9ee8fa6fa83be13|47|1 StreamFrame[0(CIB),0,17,fin] 34.899 Discarding pn space Initial because first Handshake message is being sent 34.899 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 34.892 <- (2) Packet A|0|S0|fbb2f19a5cc70b5e|54|1 NewConnectionIdFrame[1,<0|a4f04b3630baf6ee|0c7dc4136a93c0333454c57daa62b4cb] 34.918 -> Packet A|1|S0|a9ee8fa6fa83be13|32|1 AckFrame[0|Δ19] 34.929 <- (3) Packet A|1|S0|fbb2f19a5cc70b5e|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 34.929 State is set to Confirmed reschedule loss detection timer for PTO over 65 millis, based on 34.995/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 91 millis, based on 35.021/App, because ackElicitingInFlight | RTT:33/16 34.929 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 34.949 -> Packet A|2|S0|a9ee8fa6fa83be13|32|1 AckFrame[1-0|Δ19] 34.966 <- (15) Packet A|12|S0|425b1174443b735f|30|2 PingFrame[] Padding(3) 34.966 <- (16) Packet A|13|S0|425b1174443b735f|30|2 PingFrame[] Padding(3) 34.967 -> Packet A|9|S0|9979695c2497c696|37|2 ConnectionCloseFrame[0|0|] AckFrame[11-9,7|Δ0] 34.967 -> Packet A|10|S0|9979695c2497c696|37|2 ConnectionCloseFrame[0|0|] AckFrame[11-9,7|Δ0] 34.998 <- (17) Packet A|14|S0|425b1174443b735f|37|2 AckFrame[10,7|Δ0] ConnectionCloseFrame[0|0|] 35.021 loss detection timeout handler running Sending probe 0, because no ack since 34.899. Current RTT: 33/16. 35.021 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 35.265/App, because ackElicitingInFlight | RTT:33/16 35.021 -> Packet PA|3|S0|a9ee8fa6fa83be13|47|1 StreamFrame[0(CIB),0,17,fin] 35.078 <- (4) Packet A|5|S0|fbb2f19a5cc70b5e|32|1 AckFrame[3-0|Δ26] 35.079 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 35.106 <- (5) Packet A|6|S0|fbb2f19a5cc70b5e|30|2 PingFrame[] Padding(3) 35.126 -> Packet A|4|S0|a9ee8fa6fa83be13|32|1 AckFrame[6-5|Δ19] 35.157 <- (6) Packet A|8|S0|fbb2f19a5cc70b5e|1054|1 StreamFrame[0(CIB),0,1024,fin] 35.158 Finished downloading https://server4:443/dfjcobrghn at 53:11.195 on ClientConnection[83ffcc82504beb22/fbb2f19a5cc70b5e(V1) with server4/193.167.100.100:443] 35.158 Closing ClientConnection[83ffcc82504beb22/fbb2f19a5cc70b5e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 35.158 -> Packet A|5|S0|a9ee8fa6fa83be13|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-5|Δ0] 35.159 Creating connection with server4:443 with v1 35.159 Setting up connection for downloading https://server4:443/jkyftsswzn at 53:11.196 on ClientConnection[2f84703c74746f62/cdb96b25ab0bdfc2(V1) with server4/193.167.100.100:443] 35.159 Original destination connection id: 2f84703c74746f62 (scid: cdb96b25ab0bdfc2) >- CryptoStream[I|ClientHello] 35.161 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.361/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.161 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.315 <- (7) Packet A|10|S0|fbb2f19a5cc70b5e|30|2 PingFrame[] Padding(3) 35.316 -> Packet A|6|S0|a9ee8fa6fa83be13|37|2 ConnectionCloseFrame[0|0|] AckFrame[8,6-5|Δ0] 35.346 <- (8) Packet A|11|S0|fbb2f19a5cc70b5e|37|2 AckFrame[6,4|Δ0] ConnectionCloseFrame[0|0|] 35.360 loss detection timeout handler running Sending probe 0, because no ack since 35.161. Current RTT: 100/25. 35.360 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 35.360 (Probe is an initial retransmit) 35.360 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 35.760/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.360 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.694 <- (1) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 35.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 35.897/Handshake, because peerAwaitingAddressValidation | RTT:100/25 35.697 Discarding pn space Initial because first Handshake message is being sent 35.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 35.897/Handshake, because peerAwaitingAddressValidation | RTT:100/25 35.697 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 35.730 <- (2) Packet H|2|L|773|1 CryptoFrame[0,727] 35.730 - unknown transport parameter 0x00b6, size 0 35.730 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 35.730 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 35.732 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 35.932/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.732 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 35.733 Starting downloading https://server4:443/jkyftsswzn at 53:11.769 on ClientConnection[2f84703c74746f62/cdb96b25ab0bdfc2(V1) with server4/193.167.100.100:443] 35.733 -> Packet H|1|L|46|1 AckFrame[2|Δ0] 35.733 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 35.933/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.733 -> Packet A|0|S0|0032e0b21ed3582d|47|1 StreamFrame[0(CIB),0,17,fin] 35.908 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 35.909 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 35.932 loss detection timeout handler running Sending probe 0, because no ack since 35.732. Current RTT: 100/25. 35.932 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 35.932 (Probe is a handshake retransmit) 35.932 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 36.332/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.932 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 35.964 <- (5) Packet A|1|S0|cdb96b25ab0bdfc2|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 35.964 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 36.183/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 35.958/App, because ackElicitingInFlight | RTT:100/25 35.964 Discarding pn space Handshake because HandshakeDone is received 35.964 loss detection timeout handler running Sending probe 0, because no ack since 35.733. Current RTT: 100/25. 35.964 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 449 millis, based on 36.414/App, because ackElicitingInFlight | RTT:100/25 35.964 -> Packet PA|1|S0|0032e0b21ed3582d|47|1 StreamFrame[0(CIB),0,17,fin] 35.984 -> Packet A|2|S0|0032e0b21ed3582d|32|1 AckFrame[1|Δ19] 35.996 <- (6) Packet A|2|S0|cdb96b25ab0bdfc2|1054|1 StreamFrame[0(CIB),0,1024] 36.016 -> Packet A|3|S0|0032e0b21ed3582d|32|1 AckFrame[2-1|Δ19] 36.021 <- (7) Packet A|5|S0|cdb96b25ab0bdfc2|32|1 AckFrame[2-1|Δ6] 36.021 Cwnd(-): 6000; inflight: 0 36.021 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 36.021 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 224 millis, based on 36.246/App, because ackElicitingInFlight | RTT:100/25 36.021 -> Packet A|4|S0|0032e0b21ed3582d|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 36.078 <- (8) Packet A|6|S0|cdb96b25ab0bdfc2|32|1 AckFrame[4-1|Δ26] 36.079 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 36.145 <- (9) Packet A|8|S0|cdb96b25ab0bdfc2|54|1 NewConnectionIdFrame[1,<0|dce918161e80fb81|d27d313dcda71b5879dafa92dc04797d] 36.165 -> Packet A|5|S0|0032e0b21ed3582d|34|1 AckFrame[8,6-5|Δ19] 36.195 <- (10) Packet A|9|S0|cdb96b25ab0bdfc2|31|1 StreamFrame[0(CIB),1024,0,fin] 36.196 Finished downloading https://server4:443/jkyftsswzn at 53:12.233 on ClientConnection[2f84703c74746f62/cdb96b25ab0bdfc2(V1) with server4/193.167.100.100:443] 36.196 Closing ClientConnection[2f84703c74746f62/cdb96b25ab0bdfc2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 36.196 -> Packet A|6|S0|0032e0b21ed3582d|37|2 ConnectionCloseFrame[0|0|] AckFrame[9-8,6-5|Δ0] 36.197 Creating connection with server4:443 with v1 36.197 Setting up connection for downloading https://server4:443/dldaxxsgue at 53:12.234 on ClientConnection[1c8f33ff6fbd7f53/f27575bcce44e341(V1) with server4/193.167.100.100:443] 36.197 Original destination connection id: 1c8f33ff6fbd7f53 (scid: f27575bcce44e341) >- CryptoStream[I|ClientHello] 36.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.399/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.198 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.227 <- (11) Packet A|10|S0|cdb96b25ab0bdfc2|35|2 AckFrame[6-5|Δ0] ConnectionCloseFrame[0|0|] 36.398 loss detection timeout handler running Sending probe 0, because no ack since 36.198. Current RTT: 100/25. 36.398 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 36.398 (Probe is an initial retransmit) 36.398 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 36.798/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.398 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.797 loss detection timeout handler running Sending probe 1, because no ack since 36.398. Current RTT: 100/25. 36.797 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 36.798 (Probe is an initial retransmit) 36.798 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 37.598/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.798 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 37.599/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.799 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.831 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 36.831 <- (2) Packet I|1|L|48|1 Token=[] AckFrame[3-2|Δ0] 36.832 probe count not reset on ack because handshake not yet confirmed 36.832 Retransmitting CryptoFrame[0,257] on level Initial 36.832 Cwnd(-): 6000; inflight: 0 36.832 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 37.632/Initial, because peerAwaitingAddressValidation | RTT:100/25 36.832 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 383 millis, based on 37.216/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 36.832 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.132 <- (3) Packet I|2|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 37.134 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 37.230/Handshake, because peerAwaitingAddressValidation | RTT:32/16 37.135 Discarding pn space Initial because first Handshake message is being sent 37.135 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 37.135 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 37.231/Handshake, because peerAwaitingAddressValidation | RTT:32/16 37.135 -> Packet I|5|L|1201|2 Token=[] AckFrame[2-1|Δ0] Padding(1153) 37.167 <- (5) Packet H|1|L|773|1 CryptoFrame[0,727] 37.168 - unknown transport parameter 0x00b6, size 0 37.168 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 37.168 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 37.170 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 37.266/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.170 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 37.168 <- (6) Packet H|2|L|773|1 CryptoFrame[0,727] 37.170 -> Packet H|1|L|46|1 AckFrame[1|Δ0] 37.170 Starting downloading https://server4:443/dldaxxsgue at 53:13.207 on ClientConnection[1c8f33ff6fbd7f53/f27575bcce44e341(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 37.171 -> Packet H|2|L|46|1 AckFrame[2-1|Δ0] 37.171 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 37.267/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.171 -> Packet A|0|S0|1042cbc61f9675ac|47|1 StreamFrame[0(CIB),0,17,fin] 37.266 loss detection timeout handler running Sending probe 0, because no ack since 37.170. Current RTT: 32/16. 37.266 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 37.266 (Probe is a handshake retransmit) 37.266 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 37.458/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.266 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 37.457 loss detection timeout handler running Sending probe 1, because no ack since 37.171. Current RTT: 32/16. 37.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 37.458 (Probe is a handshake retransmit) 37.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 37.842/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.458 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 37.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 37.843/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.459 -> Packet PH|5|L|80|1 CryptoFrame[0,36] 37.465 <- (7) Packet A|3|S0|f27575bcce44e341|54|1 NewConnectionIdFrame[1,<0|a8708a2eff1b93f6|040a4957ff817523cba60832f0037b7f] 37.466 <- (8) Packet A|4|S0|f27575bcce44e341|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 37.466 State is set to Confirmed reschedule loss detection timer for PTO over 188 millis, based on 37.655/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over -174 millis, based on 37.292/App, because ackElicitingInFlight | RTT:32/16 37.466 Discarding pn space Handshake because HandshakeDone is received 37.466 loss detection timeout handler running Sending probe 0, because no ack since 37.171. Current RTT: 32/16. 37.466 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 241 millis, based on 37.708/App, because ackElicitingInFlight | RTT:32/16 37.466 -> Packet PA|1|S0|1042cbc61f9675ac|47|1 StreamFrame[0(CIB),0,17,fin] 37.467 -> Packet A|2|S0|1042cbc61f9675ac|31|1 AckFrame[4-3|Δ0] 37.498 <- (9) Packet A|5|S0|f27575bcce44e341|1054|1 StreamFrame[0(CIB),0,1024] 37.498 <- (10) Packet A|6|S0|f27575bcce44e341|31|1 StreamFrame[0(CIB),1024,0,fin] 37.499 -> Packet A|3|S0|1042cbc61f9675ac|31|1 AckFrame[6-3|Δ0] 37.499 Finished downloading https://server4:443/dldaxxsgue at 53:13.536 on ClientConnection[1c8f33ff6fbd7f53/f27575bcce44e341(V1) with server4/193.167.100.100:443] 37.499 Closing ClientConnection[1c8f33ff6fbd7f53/f27575bcce44e341(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 37.499 -> Packet A|4|S0|1042cbc61f9675ac|35|2 ConnectionCloseFrame[0|0|] AckFrame[6-3|Δ0] 37.500 Creating connection with server4:443 with v1 37.500 Setting up connection for downloading https://server4:443/vpyesajxqy at 53:13.537 on ClientConnection[225a9fe70c114c32/93db4a5b3829a7d3(V1) with server4/193.167.100.100:443] 37.500 Original destination connection id: 225a9fe70c114c32 (scid: 93db4a5b3829a7d3) >- CryptoStream[I|ClientHello] 37.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 37.701/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.501 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.530 <- (11) Packet A|8|S0|f27575bcce44e341|35|2 AckFrame[4-1|Δ0] ConnectionCloseFrame[0|0|] 37.534 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 37.535 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 37.735/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 37.534 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 37.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 37.633/Handshake, because peerAwaitingAddressValidation | RTT:32/16 37.537 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 37.537 - unknown transport parameter 0x00b6, size 0 37.537 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 37.537 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 37.539 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 37.635/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.539 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 37.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 37.636/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.540 Discarding pn space Initial because first Handshake message is being sent 37.540 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 37.534 <- (2) Packet A|0|S0|93db4a5b3829a7d3|54|1 NewConnectionIdFrame[1,<0|2bddd90a33ddf7a1|a0df9d5c27e8c12600ef10e00d601cc8] 37.540 Starting downloading https://server4:443/vpyesajxqy at 53:13.577 on ClientConnection[225a9fe70c114c32/93db4a5b3829a7d3(V1) with server4/193.167.100.100:443] 37.540 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 37.637/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.540 -> Packet A|0|S0|37d65d8603744429|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 37.572 <- (3) Packet A|2|S0|93db4a5b3829a7d3|1054|1 StreamFrame[0(CIB),0,1024] 37.592 -> Packet A|1|S0|37d65d8603744429|34|1 AckFrame[2,0|Δ19] 37.629 <- (4) Packet A|5|S0|93db4a5b3829a7d3|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 37.629 State is set to Confirmed reschedule loss detection timer for PTO over 6 millis, based on 37.635/Handshake, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 32 millis, based on 37.661/App, because ackElicitingInFlight | RTT:32/16 37.629 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 37.649 -> Packet A|2|S0|37d65d8603744429|36|1 AckFrame[5,2,0|Δ19] 37.662 loss detection timeout handler running Sending probe 0, because no ack since 37.540. Current RTT: 32/16. 37.662 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 37.904/App, because ackElicitingInFlight | RTT:32/16 37.662 -> Packet PA|3|S0|37d65d8603744429|47|1 StreamFrame[0(CIB),0,17,fin] 37.693 <- (5) Packet A|6|S0|93db4a5b3829a7d3|33|1 AckFrame[3,1-0|Δ0] 37.693 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 37.765 <- (6) Packet A|7|S0|93db4a5b3829a7d3|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 37.765 <- (7) Packet A|8|S0|93db4a5b3829a7d3|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 37.766 -> Packet A|4|S0|37d65d8603744429|31|1 AckFrame[8-5|Δ0] 37.796 <- (8) Packet A|9|S0|93db4a5b3829a7d3|31|1 StreamFrame[0(CIB),1024,0,fin] 37.797 Finished downloading https://server4:443/vpyesajxqy at 53:13.834 on ClientConnection[225a9fe70c114c32/93db4a5b3829a7d3(V1) with server4/193.167.100.100:443] 37.797 Closing ClientConnection[225a9fe70c114c32/93db4a5b3829a7d3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 37.797 -> Packet A|5|S0|37d65d8603744429|35|2 ConnectionCloseFrame[0|0|] AckFrame[9-5|Δ0] 37.798 Creating connection with server4:443 with v1 37.798 Setting up connection for downloading https://server4:443/gqnfjpitvr at 53:13.835 on ClientConnection[dc5e4b277a01818f/8e4e54579a45fdfe(V1) with server4/193.167.100.100:443] 37.798 Original destination connection id: dc5e4b277a01818f (scid: 8e4e54579a45fdfe) >- CryptoStream[I|ClientHello] 37.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 37.999/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.799 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.828 <- (9) Packet A|10|S0|93db4a5b3829a7d3|35|2 AckFrame[5-4|Δ0] ConnectionCloseFrame[0|0|] 37.832 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 37.833 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 38.033/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 37.832 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 37.835 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 37.931/Handshake, because peerAwaitingAddressValidation | RTT:32/16 37.835 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 37.835 - unknown transport parameter 0x00b6, size 0 37.835 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 37.835 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 37.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 37.933/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.837 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 37.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 37.837 Starting downloading https://server4:443/gqnfjpitvr at 53:13.874 on ClientConnection[dc5e4b277a01818f/8e4e54579a45fdfe(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 37.933/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.837 Discarding pn space Initial because first Handshake message is being sent 37.837 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 37.832 <- (2) Packet A|0|S0|8e4e54579a45fdfe|54|1 NewConnectionIdFrame[1,<0|b71b698350c365c0|7c8213bc25950c93aa869860264dd420] 37.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 95 millis, based on 37.934/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.838 -> Packet A|0|S0|c944594a07bb9e63|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 37.933 loss detection timeout handler running Sending probe 0, because no ack since 37.837. Current RTT: 32/16. 37.933 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 37.933 (Probe is a handshake retransmit) 37.933 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 191 millis, based on 38.125/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 37.933 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 38.125 loss detection timeout handler running Sending probe 1, because no ack since 37.838. Current RTT: 32/16. 38.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 38.125 (Probe is a handshake retransmit) 38.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 38.509/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 38.125 -> Packet PH|3|L|80|1 CryptoFrame[0,36] 38.126 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 383 millis, based on 38.510/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:32/16 38.126 -> Packet PH|4|L|80|1 CryptoFrame[0,36] 38.194 <- (3) Packet A|2|S0|8e4e54579a45fdfe|54|1 NewConnectionIdFrame[1,<0|b71b698350c365c0|7c8213bc25950c93aa869860264dd420] 38.214 -> Packet A|1|S0|c944594a07bb9e63|34|1 AckFrame[2,0|Δ19] 38.373 <- (4) Packet A|4|S0|8e4e54579a45fdfe|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 38.373 State is set to Confirmed reschedule loss detection timer for PTO over -51 millis, based on 38.322/App, because ackElicitingInFlight | RTT:32/16 38.373 loss detection timeout handler running Sending probe 2, because no ack since 37.838. Current RTT: 32/16. reschedule loss detection timer for PTO over -414 millis, based on 37.959/App, because ackElicitingInFlight | RTT:32/16 38.373 Discarding pn space Handshake because HandshakeDone is received 38.373 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 38.615/App, because ackElicitingInFlight | RTT:32/16 -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 38.373 -> Packet PA|2|S0|c944594a07bb9e63|47|1 StreamFrame[0(CIB),0,17,fin] 38.373 <- (5) Packet A|5|S0|8e4e54579a45fdfe|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 38.374 -> Packet A|3|S0|c944594a07bb9e63|35|1 AckFrame[5-4,2,0|Δ0] 38.573 <- (6) Packet A|9|S0|8e4e54579a45fdfe|30|2 PingFrame[] Padding(3) 38.573 <- (7) Packet A|10|S0|8e4e54579a45fdfe|30|2 PingFrame[] Padding(3) 38.574 -> Packet A|4|S0|c944594a07bb9e63|37|1 AckFrame[10-9,5-4,2,0|Δ0] 38.605 <- (8) Packet A|11|S0|8e4e54579a45fdfe|1054|1 StreamFrame[0(CIB),0,1024,fin] 38.606 Finished downloading https://server4:443/gqnfjpitvr at 53:14.643 on ClientConnection[dc5e4b277a01818f/8e4e54579a45fdfe(V1) with server4/193.167.100.100:443] 38.606 Closing ClientConnection[dc5e4b277a01818f/8e4e54579a45fdfe(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 38.606 -> Packet A|5|S0|c944594a07bb9e63|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-9,5-4,2,0|Δ0] 38.607 Creating connection with server4:443 with v1 38.607 Setting up connection for downloading https://server4:443/exbapoyhmm at 53:14.644 on ClientConnection[520241f0ba04e90b/0dbad1ab8086c15b(V1) with server4/193.167.100.100:443] 38.607 Original destination connection id: 520241f0ba04e90b (scid: 0dbad1ab8086c15b) >- CryptoStream[I|ClientHello] 38.608 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 38.808/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 38.608 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 38.764 <- (9) Packet A|12|S0|8e4e54579a45fdfe|30|2 PingFrame[] Padding(3) 38.765 -> Packet A|6|S0|c944594a07bb9e63|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-9,5-4,2,0|Δ0] 38.795 <- (10) Packet A|14|S0|8e4e54579a45fdfe|37|2 AckFrame[6,4-1|Δ0] ConnectionCloseFrame[0|0|] 38.807 loss detection timeout handler running Sending probe 0, because no ack since 38.608. Current RTT: 100/25. 38.807 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 38.807 (Probe is an initial retransmit) 38.808 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 39.208/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 38.808 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 38.841 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level App (keys not installed)) 39.142 <- (2) Packet I|1|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1030) -< CryptoStream[I|ServerHello] 39.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 39.345/Handshake, because peerAwaitingAddressValidation | RTT:100/25 39.145 Discarding pn space Initial because first Handshake message is being sent 39.145 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 39.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 39.345/Handshake, because peerAwaitingAddressValidation | RTT:100/25 39.145 -> Packet I|2|L|1201|2 Token=[] AckFrame[1|Δ0] Padding(1153) 39.178 <- (4) Packet H|1|L|773|1 CryptoFrame[0,727] 39.178 - unknown transport parameter 0x00b6, size 0 39.178 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 39.178 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 39.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 39.381/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.181 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 39.178 <- (5) Packet H|2|L|773|1 CryptoFrame[0,727] 39.181 Starting downloading https://server4:443/exbapoyhmm at 53:15.218 on ClientConnection[520241f0ba04e90b/0dbad1ab8086c15b(V1) with server4/193.167.100.100:443] 39.181 -> Packet H|1|L|46|1 AckFrame[1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 39.181 -> Packet H|2|L|46|1 AckFrame[2-1|Δ0] 39.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 39.381/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.181 -> Packet A|0|S0|c8ad365989b85cf2|47|1 StreamFrame[0(CIB),0,17,fin] 39.212 <- (6) Packet A|1|S0|0dbad1ab8086c15b|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 39.212 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 39.381/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 39.406/App, because ackElicitingInFlight | RTT:100/25 39.212 Discarding pn space Handshake because HandshakeDone is received -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 39.213 <- (7) Packet A|4|S0|0dbad1ab8086c15b|31|1 StreamFrame[0(CIB),1024,0,fin] 39.213 -> Packet A|1|S0|c8ad365989b85cf2|33|1 AckFrame[4,1|Δ0] 39.238 <- (8) Packet A|5|S0|0dbad1ab8086c15b|32|1 AckFrame[0|Δ25] 39.238 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 39.477 <- (9) Packet A|6|S0|0dbad1ab8086c15b|54|1 NewConnectionIdFrame[1,<0|c2c64c6daae4b6e5|ed9e6b0ab6a3214b8bdf2298a62fc9f6] 39.497 -> Packet A|2|S0|c8ad365989b85cf2|34|1 AckFrame[6-4,1|Δ19] 40.007 <- (10) Packet A|9|S0|0dbad1ab8086c15b|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] 40.026 -> Packet A|3|S0|c8ad365989b85cf2|36|1 AckFrame[9,6-4,1|Δ19] 40.058 <- (11) Packet A|10|S0|0dbad1ab8086c15b|1054|1 StreamFrame[0(CIB),0,1024,fin] 40.059 Finished downloading https://server4:443/exbapoyhmm at 53:16.096 on ClientConnection[520241f0ba04e90b/0dbad1ab8086c15b(V1) with server4/193.167.100.100:443] 40.059 Closing ClientConnection[520241f0ba04e90b/0dbad1ab8086c15b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 40.059 -> Packet A|4|S0|c8ad365989b85cf2|39|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,6-4,1|Δ0] 40.060 Creating connection with server4:443 with v1 40.060 Setting up connection for downloading https://server4:443/svvfbytztn at 53:16.097 on ClientConnection[90ad70035870b158/1e6110887782ffee(V1) with server4/193.167.100.100:443] 40.060 Original destination connection id: 90ad70035870b158 (scid: 1e6110887782ffee) >- CryptoStream[I|ClientHello] 40.061 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.261/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.061 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.094 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[0|Δ0] CryptoFrame[0,123] 40.095 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.295/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 40.094 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,727] Padding(252) 40.097 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.194/Handshake, because peerAwaitingAddressValidation | RTT:33/16 40.097 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 40.097 - unknown transport parameter 0x00b6, size 0 40.098 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 40.098 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] 40.100 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.197/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.100 -> Packet H|0|L|80|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 40.100 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.197/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.100 Starting downloading https://server4:443/svvfbytztn at 53:16.137 on ClientConnection[90ad70035870b158/1e6110887782ffee(V1) with server4/193.167.100.100:443] 40.100 Discarding pn space Initial because first Handshake message is being sent 40.100 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 40.094 <- (2) Packet A|0|S0|1e6110887782ffee|54|1 NewConnectionIdFrame[1,<0|9e90bb8c44a9b711|a61b3c8263d16e7c93268bed2226084b] 40.101 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.198/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.101 -> Packet A|0|S0|c74ee6211880ce37|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 40.132 <- (3) Packet A|2|S0|1e6110887782ffee|1054|1 StreamFrame[0(CIB),0,1024] 40.132 <- (4) Packet A|3|S0|1e6110887782ffee|31|1 StreamFrame[0(CIB),1024,0,fin] 40.133 Finished downloading https://server4:443/svvfbytztn at 53:16.170 on ClientConnection[90ad70035870b158/1e6110887782ffee(V1) with server4/193.167.100.100:443] 40.133 -> Packet A|1|S0|c74ee6211880ce37|33|1 AckFrame[3-2,0|Δ0] 40.133 Closing ClientConnection[90ad70035870b158/1e6110887782ffee(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 40.133 -> Packet A|2|S0|c74ee6211880ce37|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 40.134 Creating connection with server4:443 with v1 40.134 Setting up connection for downloading https://server4:443/cyfozavfpq at 53:16.171 on ClientConnection[dffa30fc1534f5c3/938537bba29e5229(V1) with server4/193.167.100.100:443] 40.134 Original destination connection id: dffa30fc1534f5c3 (scid: 938537bba29e5229) >- CryptoStream[I|ClientHello] 40.135 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.335/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.135 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.157 <- (5) Packet A|4|S0|1e6110887782ffee|32|1 AckFrame[0|Δ25] 40.157 -> Packet A|3|S0|c74ee6211880ce37|37|2 ConnectionCloseFrame[0|0|] AckFrame[3-2,0|Δ0] 40.164 <- (6) Packet A|5|S0|1e6110887782ffee|35|2 AckFrame[2-0|Δ0] ConnectionCloseFrame[0|0|] 40.198 <- (12) Packet A|13|S0|0dbad1ab8086c15b|54|1 NewConnectionIdFrame[1,<0|c2c64c6daae4b6e5|ed9e6b0ab6a3214b8bdf2298a62fc9f6] 40.199 -> Packet A|5|S0|c8ad365989b85cf2|39|2 ConnectionCloseFrame[0|0|] AckFrame[10-9,6-4,1|Δ0] 40.230 <- (13) Packet A|14|S0|0dbad1ab8086c15b|37|2 AckFrame[5,3|Δ0] ConnectionCloseFrame[0|0|] 40.335 loss detection timeout handler running Sending probe 0, because no ack since 40.135. Current RTT: 100/25. 40.335 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 40.335 (Probe is an initial retransmit) 40.335 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 40.735/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.335 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.369 <- (1) Packet I|0|L|175|2 Token=[] AckFrame[1|Δ0] CryptoFrame[0,123] 40.369 probe count not reset on ack because handshake not yet confirmed 40.369 Retransmitting CryptoFrame[0,257] on level Initial 40.370 Cwnd(-): 6000; inflight: 0 40.370 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 40.770/Initial, because peerAwaitingAddressValidation | RTT:100/25 40.370 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 193 millis, based on 40.564/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.370 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) -< CryptoStream[I|ServerHello] 40.369 <- (1) Packet H|0|L|1025|2 CryptoFrame[0,728] Padding(251) 40.373 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 40.567/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.373 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1153) 40.373 - unknown transport parameter 0x00b6, size 0 40.373 - unsupported transport parameter 0x2ab2, size 0 (grease-quic-bit) 40.373 - unknown transport parameter 0xff04de1b, size 2 >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 40.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.473/Handshake, because peerAwaitingAddressValidation | RTT:33/16 40.376 Discarding pn space Initial because first Handshake message is being sent 40.369 <- (2) Packet A|0|S0|938537bba29e5229|54|1 NewConnectionIdFrame[1,<0|7b3dbf9415f452be|54a4fda75d47e8e3dcfb844a18026651] 40.376 Starting downloading https://server4:443/cyfozavfpq at 53:16.413 on ClientConnection[dffa30fc1534f5c3/938537bba29e5229(V1) with server4/193.167.100.100:443] 40.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.474/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.376 -> Packet H|0|L|80|1 CryptoFrame[0,36] 40.377 -> Packet H|1|L|46|1 AckFrame[0|Δ0] 40.377 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 40.474/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.377 -> Packet A|0|S0|d85e557185821619|52|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 40.473 loss detection timeout handler running Sending probe 0, because no ack since 40.376. Current RTT: 33/16. 40.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 40.473 (Probe is a handshake retransmit) 40.474 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 40.668/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.474 -> Packet PH|2|L|80|1 CryptoFrame[0,36] 40.545 <- (3) Packet A|2|S0|938537bba29e5229|54|1 NewConnectionIdFrame[1,<0|7b3dbf9415f452be|54a4fda75d47e8e3dcfb844a18026651] 40.545 <- (4) Packet A|3|S0|938537bba29e5229|387|2 HandshakeDoneFrame[] CryptoFrame[0,356] 40.545 State is set to Confirmed reschedule loss detection timer for PTO over 75 millis, based on 40.621/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -46 millis, based on 40.499/App, because ackElicitingInFlight | RTT:33/16 40.545 Discarding pn space Handshake because HandshakeDone is received 40.545 loss detection timeout handler running Sending probe 0, because no ack since 40.377. Current RTT: 33/16. 40.545 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket,NewSessionTicket,NewSessionTicket,NewSessionTicket] reschedule loss detection timer for PTO over 243 millis, based on 40.789/App, because ackElicitingInFlight | RTT:33/16 40.545 -> Packet PA|1|S0|d85e557185821619|47|1 StreamFrame[0(CIB),0,17,fin] 40.546 -> Packet A|2|S0|d85e557185821619|33|1 AckFrame[3-2,0|Δ0] 40.700 <- (5) Packet A|7|S0|938537bba29e5229|30|2 PingFrame[] Padding(3) 40.720 -> Packet A|3|S0|d85e557185821619|36|1 AckFrame[7,3-2,0|Δ19] 40.751 <- (6) Packet A|9|S0|938537bba29e5229|1054|1 StreamFrame[0(CIB),0,1024,fin] 40.752 Finished downloading https://server4:443/cyfozavfpq at 53:16.789 on ClientConnection[dffa30fc1534f5c3/938537bba29e5229(V1) with server4/193.167.100.100:443] 40.752 Closing ClientConnection[dffa30fc1534f5c3/938537bba29e5229(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 40.753 -> Packet A|4|S0|d85e557185821619|41|2 ConnectionCloseFrame[0|0|] AckFrame[9,7,3-2,0|Δ0]