bb39eff7b4beef57: No root crt list specified -- certificate will not be verified. bb39eff7b4beef57: Sending ALPN list (1): hq-interop bb39eff7b4beef57: Sending transport parameter TLS extension (83 bytes): bb39eff7b4beef57: Extension list (83 bytes): bb39eff7b4beef57: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 bb39eff7b4beef57: Extension type: 4 (initial_max_data), length 4, 80100000 bb39eff7b4beef57: Extension type: 8 (max_streams_bidi), length 2, 4200 bb39eff7b4beef57: Extension type: 1 (idle_timeout), length 4, 8002bf20 bb39eff7b4beef57: Extension type: 3 (max_packet_size), length 2, 45a0 bb39eff7b4beef57: Extension type: 9 (max_streams_uni), length 2, 4200 bb39eff7b4beef57: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 bb39eff7b4beef57: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff bb39eff7b4beef57: Extension type: 14 (active_connection_id_limit), length 1, 08 bb39eff7b4beef57: Extension type: 11 (max_ack_delay), length 1, 0a bb39eff7b4beef57: Extension type: 15 (hcid), length 8, 00fefc5806f0cf65 bb39eff7b4beef57: Extension type: 5855 (unknown), length 2, 79ef bb39eff7b4beef57: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 bb39eff7b4beef57: Extension type: 29016 (enable_time_stamp), length 1, 03 bb39eff7b4beef57: Extension type: 10930 (grease_quic_bit), length 0 bb39eff7b4beef57: Preparing GET on stream 0 for /svamffdjuz bb39eff7b4beef57: Sending packet type: 2 (initial), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 122278, pl: 391 bb39eff7b4beef57: Token length: 0 bb39eff7b4beef57: Prepared 371 bytes bb39eff7b4beef57: ping, 1 bytes bb39eff7b4beef57: crypto_hs, offset 0, length 366: 0100016a0303903f... bb39eff7b4beef57: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 0, pl: 810 bb39eff7b4beef57: Prepared 790 bytes bb39eff7b4beef57: stream 0, offset 0, length 17, fin = 1: 474554202f737661... bb39eff7b4beef57: padding, 770 bytes bb39eff7b4beef57: Sending 1252 bytes to 193.167.100.100:443 at T=0.001935 (362262d3) bb39eff7b4beef57: T= 0.252235, Lost packet type 2, number 122278, size 401, DCID <>, reason: timer bb39eff7b4beef57: Sending packet type: 2 (initial), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 122279, pl: 391 bb39eff7b4beef57: Token length: 0 bb39eff7b4beef57: Prepared 371 bytes bb39eff7b4beef57: ping, 1 bytes bb39eff7b4beef57: crypto_hs, offset 0, length 366: 0100016a0303903f... bb39eff7b4beef57: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 1, pl: 810 bb39eff7b4beef57: Prepared 790 bytes bb39eff7b4beef57: padding, 790 bytes bb39eff7b4beef57: Sending 1252 bytes to 193.167.100.100:443 at T=0.252235 (3626348f) bb39eff7b4beef57: Receiving 54 bytes from 193.167.100.100:443 at T=0.284210 (3626b176) bb39eff7b4beef57: Receiving packet type: 2 (initial), S0, Q1, Version 1, bb39eff7b4beef57: <00fefc5806f0cf65>, , Seq: 1, pl: 28 bb39eff7b4beef57: Token length: 0 bb39eff7b4beef57: Decrypted 11 bytes bb39eff7b4beef57: ack_ecn (nb=0), 122278-122279, ect0=0, ect1=2, ce=0 bb39eff7b4beef57: Received unpadded initial, length=54 bb39eff7b4beef57: Sending packet type: 2 (initial), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 122280, pl: 30 bb39eff7b4beef57: Token length: 0 bb39eff7b4beef57: Prepared 10 bytes bb39eff7b4beef57: ping, 1 bytes bb39eff7b4beef57: ack_ecn (nb=0), 1, ect0=1, ect1=0, ce=0 bb39eff7b4beef57: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 2, pl: 1171 bb39eff7b4beef57: Prepared 1151 bytes bb39eff7b4beef57: padding, 1151 bytes bb39eff7b4beef57: Sending 1252 bytes to 193.167.100.100:443 at T=0.332264 (36276d2c) bb39eff7b4beef57: T= 0.412337, Lost packet type 2, number 122280, size 40, DCID , reason: timer bb39eff7b4beef57: Sending packet type: 2 (initial), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 122281, pl: 30 bb39eff7b4beef57: Token length: 0 bb39eff7b4beef57: Prepared 10 bytes bb39eff7b4beef57: ping, 1 bytes bb39eff7b4beef57: ack_ecn (nb=0), 1, ect0=1, ect1=0, ce=0 bb39eff7b4beef57: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 3, pl: 1171 bb39eff7b4beef57: Prepared 1151 bytes bb39eff7b4beef57: padding, 1151 bytes bb39eff7b4beef57: Sending 1252 bytes to 193.167.100.100:443 at T=0.412337 (3628a5f5) bb39eff7b4beef57: Receiving 223 bytes from 193.167.100.100:443 at T=0.444549 (362923c9) bb39eff7b4beef57: T= 0.444549, Keys unavailable, buffered packet type 4. bb39eff7b4beef57: Receiving 223 bytes from 193.167.100.100:443 at T=0.444598 (362923fa) bb39eff7b4beef57: T= 0.444598, Keys unavailable, buffered packet type 4. bb39eff7b4beef57: T= 0.572380, Lost packet type 2, number 122281, size 40, DCID , reason: timer bb39eff7b4beef57: Sending packet type: 2 (initial), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 122282, pl: 32 bb39eff7b4beef57: Token length: 0 bb39eff7b4beef57: Prepared 12 bytes bb39eff7b4beef57: ping, 1 bytes bb39eff7b4beef57: ack_ecn (nb=0), 1, ect0=1, ect1=0, ce=0 bb39eff7b4beef57: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 4, pl: 1169 bb39eff7b4beef57: Prepared 1149 bytes bb39eff7b4beef57: padding, 1149 bytes bb39eff7b4beef57: Sending 1252 bytes to 193.167.100.100:443 at T=0.572380 (362b1720) bb39eff7b4beef57: T= 0.732440, Lost packet type 2, number 122282, size 42, DCID , reason: timer bb39eff7b4beef57: Sending packet type: 2 (initial), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 122283, pl: 32 bb39eff7b4beef57: Token length: 0 bb39eff7b4beef57: Prepared 12 bytes bb39eff7b4beef57: ping, 1 bytes bb39eff7b4beef57: ack_ecn (nb=0), 1, ect0=1, ect1=0, ce=0 bb39eff7b4beef57: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 5, pl: 1169 bb39eff7b4beef57: Prepared 1149 bytes bb39eff7b4beef57: padding, 1149 bytes bb39eff7b4beef57: Sending 1252 bytes to 193.167.100.100:443 at T=0.732440 (362d885c) bb39eff7b4beef57: Receiving 56 bytes from 193.167.100.100:443 at T=0.764487 (362e058b) bb39eff7b4beef57: Receiving packet type: 2 (initial), S0, Q0, Version 1, bb39eff7b4beef57: <00fefc5806f0cf65>, , Seq: 5, pl: 30 bb39eff7b4beef57: Token length: 0 bb39eff7b4beef57: Decrypted 13 bytes bb39eff7b4beef57: ack_ecn (nb=1), 122283, 122281, ect0=0, ect1=4, ce=0 bb39eff7b4beef57: Sending packet type: 2 (initial), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 122284, pl: 32 bb39eff7b4beef57: Token length: 0 bb39eff7b4beef57: Prepared 12 bytes bb39eff7b4beef57: ping, 1 bytes bb39eff7b4beef57: ack_ecn (nb=1), 5, 1, ect0=2, ect1=0, ce=0 bb39eff7b4beef57: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 6, pl: 1169 bb39eff7b4beef57: Prepared 1149 bytes bb39eff7b4beef57: padding, 1149 bytes bb39eff7b4beef57: Sending 1252 bytes to 193.167.100.100:443 at T=0.800539 (362e925f) bb39eff7b4beef57: Receiving 1200 bytes from 193.167.100.100:443 at T=0.833483 (362f130f) bb39eff7b4beef57: Receiving packet type: 2 (initial), S0, Q1, Version 1, bb39eff7b4beef57: <00fefc5806f0cf65>, , Seq: 6, pl: 1174 bb39eff7b4beef57: Token length: 0 bb39eff7b4beef57: Decrypted 1157 bytes bb39eff7b4beef57: ack_ecn (nb=0), 122284, ect0=0, ect1=5, ce=0 bb39eff7b4beef57: crypto_hs, offset 0, length 129: 0200007d030319e6... bb39eff7b4beef57: padding, 1013 bytes bb39eff7b4beef57: Receiving 223 bytes from 193.167.100.100:443 at T=0.833837 (362f1471) bb39eff7b4beef57: Receiving packet type: 4 (handshake), S0, Q1, Version 1, bb39eff7b4beef57: <00fefc5806f0cf65>, , Seq: 3, pl: 198 bb39eff7b4beef57: Decrypted 181 bytes bb39eff7b4beef57: crypto_hs, offset 0, length 177: 0800008900870010... bb39eff7b4beef57: Received transport parameter TLS extension (110 bytes): bb39eff7b4beef57: Extension list (110 bytes): bb39eff7b4beef57: Extension type: 1 (idle_timeout), length 4, 80007530 bb39eff7b4beef57: Extension type: 3 (max_packet_size), length 2, 45c0 bb39eff7b4beef57: Extension type: 4 (initial_max_data), length 8, ffffffffffffffff bb39eff7b4beef57: Extension type: 5 (max_stream_data_bidi_local), length 4, 801312d0 bb39eff7b4beef57: Extension type: 6 (max_stream_data_bidi_remote), length 4, 801312d0 bb39eff7b4beef57: Extension type: 7 (max_stream_data_uni), length 4, 801312d0 bb39eff7b4beef57: Extension type: 8 (max_streams_bidi), length 2, 4064 bb39eff7b4beef57: Extension type: 9 (max_streams_uni), length 2, 4064 bb39eff7b4beef57: Extension type: 14 (active_connection_id_limit), length 1, 05 bb39eff7b4beef57: Extension type: 182 (unknown), length 0 bb39eff7b4beef57: Extension type: 2 (stateless_reset_token), length 16, 1ff59c9e236b1233201b13bae40d1e4f bb39eff7b4beef57: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff bb39eff7b4beef57: Extension type: 0 (ocid), length 8, bb39eff7b4beef57 bb39eff7b4beef57: Extension type: 15 (hcid), length 8, d436b6ad23d41ef8 bb39eff7b4beef57: Extension type: 10930 (grease_quic_bit), length 0 bb39eff7b4beef57: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 bb39eff7b4beef57: The session was properly resumed! bb39eff7b4beef57: Zero RTT data is accepted! bb39eff7b4beef57: Negotiated ALPN: hq-interop bb39eff7b4beef57: Receiving 223 bytes from 193.167.100.100:443 at T=0.833953 (362f14e5) bb39eff7b4beef57: Receiving packet type: 4 (handshake), S0, Q1, Version 1, bb39eff7b4beef57: <00fefc5806f0cf65>, , Seq: 4, pl: 198 bb39eff7b4beef57: Decrypted 181 bytes bb39eff7b4beef57: crypto_hs, offset 0, length 177: 0800008900870010... bb39eff7b4beef57: Receiving 223 bytes from 193.167.100.100:443 at T=0.833978 (362f14fe) bb39eff7b4beef57: Receiving packet type: 4 (handshake), S0, Q1, Version 1, bb39eff7b4beef57: <00fefc5806f0cf65>, , Seq: 2, pl: 198 bb39eff7b4beef57: Decrypted 181 bytes bb39eff7b4beef57: crypto_hs, offset 0, length 177: 0800008900870010... bb39eff7b4beef57: Receiving 223 bytes from 193.167.100.100:443 at T=0.833978 (362f14fe) bb39eff7b4beef57: Receiving packet type: 4 (handshake), S0, Q1, Version 1, bb39eff7b4beef57: <00fefc5806f0cf65>, , Seq: 1, pl: 198 bb39eff7b4beef57: Decrypted 181 bytes bb39eff7b4beef57: crypto_hs, offset 0, length 177: 0800008900870010... bb39eff7b4beef57: Sending packet type: 4 (handshake), S0, Q0, Version 1, bb39eff7b4beef57: , <00fefc5806f0cf65>, Seq: 0, pl: 67 bb39eff7b4beef57: Prepared 47 bytes bb39eff7b4beef57: ack_ecn (nb=0), 1-4, ect0=4, ect1=0, ce=0 bb39eff7b4beef57: crypto_hs, offset 0, length 36: 140000206e8bcf6a... bb39eff7b4beef57: T= 0.833978, Lost packet type 5, number 0, size 819, DCID , reason: timer bb39eff7b4beef57: Sending packet type: 6 (1rtt protected), S0, Q1, bb39eff7b4beef57: , Seq: 7 (7), Phi: 0, bb39eff7b4beef57: Prepared 157 bytes bb39eff7b4beef57: new_connection_id[1]: 0x7d452fed37d9203c, b533369cb19577511b0ebaea3f377082 bb39eff7b4beef57: new_connection_id[2]: 0xcafcd145f9e35d91, 47666adfcf457ad5877ce3a6a953fcc1 bb39eff7b4beef57: new_connection_id[3]: 0x584acf2a08af24b6, 0f34bb3a8e0d429ec694658a45570965 bb39eff7b4beef57: new_connection_id[4]: 0xf53bdacfd3ef456c, f9276984277fd779df9a948f2c3e9cf9 bb39eff7b4beef57: stream 0, offset 0, length 17, fin = 1: 474554202f737661... bb39eff7b4beef57: padding, 25 bytes bb39eff7b4beef57: T= 0.833978, cwin: 16286,flight: 7084,nb_ret: 5,rtt_min: 31975,rtt: 32104,rtt_var: 9246,max_ack_delay: 0,state: 13 bb39eff7b4beef57: Sending 275 bytes to 193.167.100.100:443 at T=0.833978 (362f14fe) bb39eff7b4beef57: T= 0.833978, Lost packet type 5, number 1, size 819, DCID , reason: repeat bb39eff7b4beef57: T= 0.833978, Lost packet type 5, number 2, size 1180, DCID , reason: repeat bb39eff7b4beef57: T= 0.833978, Lost packet type 5, number 3, size 1180, DCID , reason: repeat bb39eff7b4beef57: T= 0.833978, Lost packet type 5, number 4, size 1178, DCID , reason: repeat bb39eff7b4beef57: Connection established. Version = 1, I-CID: bb39eff7b4beef57, verified: 1 bb39eff7b4beef57: Receiving 1054 bytes from 193.167.100.100:443 at T=0.866311 (362f934b) bb39eff7b4beef57: Receiving packet type: 6 (1rtt protected), S0, Q1, bb39eff7b4beef57: <7d452fed37d9203c>, Seq: 2 (2), Phi: 0, bb39eff7b4beef57: Decrypted 1028 bytes bb39eff7b4beef57: stream 0, offset 0, length 1024, fin = 0: fb2c12a6a5219e5c... bb39eff7b4beef57: T= 0.866311, cwin: 16286,flight: 2663,nb_ret: 9,rtt_min: 31975,rtt: 32104,rtt_var: 9246,max_ack_delay: 0,state: 13 bb39eff7b4beef57: Receiving 31 bytes from 193.167.100.100:443 at T=0.866464 (362f93e4) bb39eff7b4beef57: Receiving packet type: 6 (1rtt protected), S0, Q0, bb39eff7b4beef57: <7d452fed37d9203c>, Seq: 3 (3), Phi: 0, bb39eff7b4beef57: Decrypted 5 bytes bb39eff7b4beef57: stream 0, offset 1024, length 0, fin = 1: bb39eff7b4beef57: T= 0.866464, cwin: 16286,flight: 2663,nb_ret: 9,rtt_min: 31975,rtt: 32104,rtt_var: 9246,max_ack_delay: 0,state: 13 bb39eff7b4beef57: All done, Closing the connection. bb39eff7b4beef57: Sending packet type: 6 (1rtt protected), S1, Q1, bb39eff7b4beef57: , Seq: 8 (8), Phi: 0, bb39eff7b4beef57: Prepared 11 bytes bb39eff7b4beef57: ack_ecn (nb=0), 2-3, ect0=2, ect1=0, ce=0 bb39eff7b4beef57: application_close, Error 0x0000, Reason length 0 bb39eff7b4beef57: Sending 37 bytes to 193.167.100.100:443 at T=0.866541 (362f9431) bb39eff7b4beef57: Out of 7 zero RTT packets, 0 were acked by the server. bb39eff7b4beef57: Received 1024 bytes in 1.046387 seconds, 0.007829 Mbps. bb39eff7b4beef57: Sent 17 bytes in 1.046387 seconds, 0.000130 Mbps.