989cf971542e2f22: No root crt list specified -- certificate will not be verified. 989cf971542e2f22: Sending ALPN list (1): hq-interop 989cf971542e2f22: Sending transport parameter TLS extension (85 bytes): 989cf971542e2f22: Extension list (85 bytes): 989cf971542e2f22: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 989cf971542e2f22: Extension type: 4 (initial_max_data), length 4, 80100000 989cf971542e2f22: Extension type: 8 (max_streams_bidi), length 2, 4200 989cf971542e2f22: Extension type: 1 (idle_timeout), length 4, 8002bf20 989cf971542e2f22: Extension type: 3 (max_packet_size), length 2, 45a0 989cf971542e2f22: Extension type: 9 (max_streams_uni), length 2, 4200 989cf971542e2f22: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 989cf971542e2f22: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 989cf971542e2f22: Extension type: 14 (active_connection_id_limit), length 1, 08 989cf971542e2f22: Extension type: 11 (max_ack_delay), length 1, 0a 989cf971542e2f22: Extension type: 15 (hcid), length 8, 38c0c1955ff438c8 989cf971542e2f22: Extension type: 4770 (unknown), length 4, 80009cf9 989cf971542e2f22: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 989cf971542e2f22: Extension type: 29016 (enable_time_stamp), length 1, 03 989cf971542e2f22: Extension type: 10930 (grease_quic_bit), length 0 989cf971542e2f22: Preparing GET on stream 0 for /enough-frightened-suitcase 989cf971542e2f22: Sending packet type: 2 (initial), S0, Q1, Version 1, 989cf971542e2f22: <989cf971542e2f22>, <38c0c1955ff438c8>, Seq: 85036, pl: 393 989cf971542e2f22: Token length: 0 989cf971542e2f22: Prepared 373 bytes 989cf971542e2f22: ping, 1 bytes 989cf971542e2f22: crypto_hs, offset 0, length 368: 0100016c03036e93... 989cf971542e2f22: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 989cf971542e2f22: <989cf971542e2f22>, <38c0c1955ff438c8>, Seq: 0, pl: 808 989cf971542e2f22: Prepared 788 bytes 989cf971542e2f22: stream 0, offset 0, length 33, fin = 1: 474554202f656e6f... 989cf971542e2f22: padding, 752 bytes 989cf971542e2f22: Sending 1252 bytes to 193.167.100.100:443 at T=0.001799 (255d8e59) 989cf971542e2f22: T= 0.252100, Lost packet type 2, number 85036, size 403, DCID <>, reason: timer 989cf971542e2f22: Sending packet type: 2 (initial), S0, Q1, Version 1, 989cf971542e2f22: <989cf971542e2f22>, <38c0c1955ff438c8>, Seq: 85037, pl: 393 989cf971542e2f22: Token length: 0 989cf971542e2f22: Prepared 373 bytes 989cf971542e2f22: ping, 1 bytes 989cf971542e2f22: crypto_hs, offset 0, length 368: 0100016c03036e93... 989cf971542e2f22: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 989cf971542e2f22: <989cf971542e2f22>, <38c0c1955ff438c8>, Seq: 1, pl: 808 989cf971542e2f22: Prepared 788 bytes 989cf971542e2f22: padding, 788 bytes 989cf971542e2f22: Sending 1252 bytes to 193.167.100.100:443 at T=0.252100 (25616016) 989cf971542e2f22: T= 0.752660, Lost packet type 2, number 85037, size 403, DCID <>, reason: timer 989cf971542e2f22: Sending packet type: 2 (initial), S0, Q1, Version 1, 989cf971542e2f22: <989cf971542e2f22>, <38c0c1955ff438c8>, Seq: 85038, pl: 393 989cf971542e2f22: Token length: 0 989cf971542e2f22: Prepared 373 bytes 989cf971542e2f22: ping, 1 bytes 989cf971542e2f22: crypto_hs, offset 0, length 368: 0100016c03036e93... 989cf971542e2f22: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 989cf971542e2f22: <989cf971542e2f22>, <38c0c1955ff438c8>, Seq: 2, pl: 808 989cf971542e2f22: Prepared 788 bytes 989cf971542e2f22: padding, 788 bytes 989cf971542e2f22: Sending 1252 bytes to 193.167.100.100:443 at T=0.752660 (25690366) 989cf971542e2f22: T= 1.253216, Lost packet type 2, number 85038, size 403, DCID <>, reason: timer 989cf971542e2f22: Sending packet type: 2 (initial), S0, Q1, Version 1, 989cf971542e2f22: <989cf971542e2f22>, <38c0c1955ff438c8>, Seq: 85039, pl: 393 989cf971542e2f22: Token length: 0 989cf971542e2f22: Prepared 373 bytes 989cf971542e2f22: ping, 1 bytes 989cf971542e2f22: crypto_hs, offset 0, length 368: 0100016c03036e93... 989cf971542e2f22: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 989cf971542e2f22: <989cf971542e2f22>, <38c0c1955ff438c8>, Seq: 3, pl: 808 989cf971542e2f22: Prepared 788 bytes 989cf971542e2f22: padding, 788 bytes 989cf971542e2f22: Sending 1252 bytes to 193.167.100.100:443 at T=1.253216 (2570a6b2) 989cf971542e2f22: Receiving 1200 bytes from 193.167.100.100:443 at T=1.286496 (257128b2) 989cf971542e2f22: Receiving packet type: 2 (initial), S0, Q0, Version 1, 989cf971542e2f22: <38c0c1955ff438c8>, , Seq: 0, pl: 161 989cf971542e2f22: Token length: 0 989cf971542e2f22: Decrypted 144 bytes 989cf971542e2f22: ack_ecn (nb=0), 85039, ect0=0, ect1=1, ce=0 989cf971542e2f22: crypto_hs, offset 0, length 129: 0200007d0303d0e2... 989cf971542e2f22: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 989cf971542e2f22: <38c0c1955ff438c8>, , Seq: 0, pl: 988 989cf971542e2f22: Decrypted 971 bytes 989cf971542e2f22: crypto_hs, offset 0, length 177: 0800008900870010... 989cf971542e2f22: padding, 790 bytes 989cf971542e2f22: Received transport parameter TLS extension (110 bytes): 989cf971542e2f22: Extension list (110 bytes): 989cf971542e2f22: Extension type: 1 (idle_timeout), length 4, 80007530 989cf971542e2f22: Extension type: 3 (max_packet_size), length 2, 45c0 989cf971542e2f22: Extension type: 4 (initial_max_data), length 8, ffffffffffffffff 989cf971542e2f22: Extension type: 5 (max_stream_data_bidi_local), length 4, 801312d0 989cf971542e2f22: Extension type: 6 (max_stream_data_bidi_remote), length 4, 801312d0 989cf971542e2f22: Extension type: 7 (max_stream_data_uni), length 4, 801312d0 989cf971542e2f22: Extension type: 8 (max_streams_bidi), length 2, 4064 989cf971542e2f22: Extension type: 9 (max_streams_uni), length 2, 4064 989cf971542e2f22: Extension type: 14 (active_connection_id_limit), length 1, 05 989cf971542e2f22: Extension type: 182 (unknown), length 0 989cf971542e2f22: Extension type: 2 (stateless_reset_token), length 16, 332c8ba34933fc166fc3896512b7f557 989cf971542e2f22: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff 989cf971542e2f22: Extension type: 0 (ocid), length 8, 989cf971542e2f22 989cf971542e2f22: Extension type: 15 (hcid), length 8, f8c1c7936edd6b22 989cf971542e2f22: Extension type: 10930 (grease_quic_bit), length 0 989cf971542e2f22: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 989cf971542e2f22: The session was properly resumed! 989cf971542e2f22: Zero RTT data is accepted! 989cf971542e2f22: Negotiated ALPN: hq-interop 989cf971542e2f22: Receiving 222 bytes from 193.167.100.100:443 at T=1.286966 (25712a88) 989cf971542e2f22: Receiving packet type: 6 (1rtt protected), S0, Q1, 989cf971542e2f22: <38c0c1955ff438c8>, Seq: 0 (0), Phi: 0, 989cf971542e2f22: Decrypted 196 bytes 989cf971542e2f22: new_connection_id[1]: 0x4ea7606c2e7625cd, 266d64e327515b57cd29528fb49f0a0a 989cf971542e2f22: new_connection_id[2]: 0x0e6fcb6a12778333, 2ec37071ff77bfb9f0bd935e3b1f659b 989cf971542e2f22: new_connection_id[3]: 0x01e8896e7a53ca24, a02760ca240cee4aabe557587cb4ca3a 989cf971542e2f22: new_connection_id[4]: 0x4e8fd5066e8da019, 5a290c5465a31fefaa1f13f9de4128cb 989cf971542e2f22: new_connection_id[5]: 0x8f58f4a63fedfaea, 8226709bfedd42e0ac1dd936bf3abad4 989cf971542e2f22: new_connection_id[6]: 0x099c3217dfcf4df3, 92f84016c99d186686aa749e676b221c 989cf971542e2f22: new_connection_id[7]: 0x15aef5cbc12579a7, 9901afe66f2d93f2c92ff4bf7030fc27 989cf971542e2f22: T= 1.286966, cwin: 15763,flight: 3332,nb_ret: 3,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 10 989cf971542e2f22: Sending packet type: 4 (handshake), S0, Q0, Version 1, 989cf971542e2f22: , <38c0c1955ff438c8>, Seq: 0, pl: 68 989cf971542e2f22: Prepared 48 bytes 989cf971542e2f22: ack_ecn (nb=0), 0, ect0=1, ect1=0, ce=0 989cf971542e2f22: crypto_hs, offset 0, length 36: 140000200ab03c47... 989cf971542e2f22: T= 1.287037, Lost packet type 5, number 0, size 817, DCID , reason: timer 989cf971542e2f22: Sending packet type: 6 (1rtt protected), S1, Q1, 989cf971542e2f22: , Seq: 4 (4), Phi: 0, 989cf971542e2f22: Prepared 157 bytes 989cf971542e2f22: new_connection_id[1]: 0x436f328f86a020f1, dba99855ef64d49c952c878d389ccb21 989cf971542e2f22: new_connection_id[2]: 0x3ad8bf4d878ba528, 5a22f8224ab1ca478b76733db9a519a2 989cf971542e2f22: new_connection_id[3]: 0x9b1de86e764d867c, 506712a51943b9f4be648fcbf253a5ab 989cf971542e2f22: new_connection_id[4]: 0xae689f417baaf323, 923be4ca6efe59ab979c9835af2243ef 989cf971542e2f22: stream 0, offset 0, length 33, fin = 1: 474554202f656e6f... 989cf971542e2f22: padding, 9 bytes 989cf971542e2f22: T= 1.287037, cwin: 15763,flight: 2775,nb_ret: 4,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 13 989cf971542e2f22: Sending 276 bytes to 193.167.100.100:443 at T=1.287037 (25712acf) 989cf971542e2f22: T= 1.287037, Lost packet type 5, number 1, size 817, DCID , reason: repeat 989cf971542e2f22: T= 1.287037, Lost packet type 5, number 2, size 817, DCID , reason: repeat 989cf971542e2f22: Connection established. Version = 1, I-CID: 989cf971542e2f22, verified: 1 989cf971542e2f22: Sending packet type: 6 (1rtt protected), S1, Q1, 989cf971542e2f22: , Seq: 5 (5), Phi: 0, 989cf971542e2f22: Prepared 29 bytes 989cf971542e2f22: ack_ecn (nb=0), 0, ect0=1, ect1=0, ce=0 989cf971542e2f22: padding, 20 bytes 989cf971542e2f22: T= 1.288031, cwin: 15763,flight: 1164,nb_ret: 6,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 13 989cf971542e2f22: Sending 55 bytes to 193.167.100.100:443 at T=1.288031 (25712eb1) 989cf971542e2f22: Receiving 1054 bytes from 193.167.100.100:443 at T=1.319111 (2571a819) 989cf971542e2f22: Receiving packet type: 6 (1rtt protected), S1, Q1, 989cf971542e2f22: <436f328f86a020f1>, Seq: 2 (2), Phi: 0, 989cf971542e2f22: Decrypted 1028 bytes 989cf971542e2f22: stream 0, offset 0, length 1024, fin = 0: c76a3c267c3fd6ec... 989cf971542e2f22: T= 1.319111, cwin: 15763,flight: 1164,nb_ret: 6,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 13 989cf971542e2f22: Sending packet type: 6 (1rtt protected), S0, Q0, 989cf971542e2f22: , Seq: 6 (6), Phi: 0, 989cf971542e2f22: Prepared 29 bytes 989cf971542e2f22: ack_ecn (nb=1), 2, 0, ect0=2, ect1=0, ce=0 989cf971542e2f22: padding, 19 bytes 989cf971542e2f22: T= 1.319226, cwin: 15763,flight: 1219,nb_ret: 6,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 13 989cf971542e2f22: Sending 55 bytes to 193.167.100.100:443 at T=1.319226 (2571a88c) 989cf971542e2f22: T= 1.370304, Lost packet type 4, number 0, size 77, DCID , reason: timer 989cf971542e2f22: Sending packet type: 4 (handshake), S0, Q0, Version 1, 989cf971542e2f22: , <436f328f86a020f1>, Seq: 1, pl: 158 989cf971542e2f22: Prepared 138 bytes 989cf971542e2f22: crypto_hs, offset 0, length 36: 140000200ab03c47... 989cf971542e2f22: ack_ecn (nb=0), 0, ect0=1, ect1=0, ce=0 989cf971542e2f22: padding, 90 bytes 989cf971542e2f22: T= 1.370304, cwin: 15763,flight: 1309,nb_ret: 7,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 13 989cf971542e2f22: Sending 183 bytes to 193.167.100.100:443 at T=1.370304 (25727012) 989cf971542e2f22: Receiving 390 bytes from 193.167.100.100:443 at T=1.436518 (257372b8) 989cf971542e2f22: Receiving packet type: 6 (1rtt protected), S0, Q0, 989cf971542e2f22: <436f328f86a020f1>, Seq: 5 (5), Phi: 0, 989cf971542e2f22: Decrypted 364 bytes 989cf971542e2f22: handshake_done 989cf971542e2f22: immediate_ack 989cf971542e2f22: crypto_hs, offset 0, length 356: 0400005500015180... 989cf971542e2f22: retire_connection_id[0] 989cf971542e2f22: T= 1.436518, cwin: 15763,flight: 1126,nb_ret: 7,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 14 989cf971542e2f22: Sending packet type: 6 (1rtt protected), S1, Q1, 989cf971542e2f22: , Seq: 7 (7), Phi: 0, 989cf971542e2f22: Prepared 157 bytes 989cf971542e2f22: ack_ecn (nb=2), 5, 2, 0, ect0=3, ect1=0, ce=0 989cf971542e2f22: new_connection_id[5]: 0x946afca07a4ecd5f, 2ec4dcc838d9a57801cc7c82315bcd3b 989cf971542e2f22: ack_frequency: S=0, P=2, uS=8320, Reordering threshold: 0 989cf971542e2f22: padding, 110 bytes 989cf971542e2f22: T= 1.436623, cwin: 15763,flight: 1309,nb_ret: 7,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 14 989cf971542e2f22: Sending 183 bytes to 193.167.100.100:443 at T=1.436623 (25737321) 989cf971542e2f22: Receiving 390 bytes from 193.167.100.100:443 at T=1.541173 (25750b87) 989cf971542e2f22: Receiving packet type: 6 (1rtt protected), S1, Q0, 989cf971542e2f22: <436f328f86a020f1>, Seq: 9 (9), Phi: 0, 989cf971542e2f22: Decrypted 364 bytes 989cf971542e2f22: handshake_done 989cf971542e2f22: immediate_ack 989cf971542e2f22: crypto_hs, offset 0, length 356: 0400005500015180... 989cf971542e2f22: retire_connection_id[0] 989cf971542e2f22: T= 1.541173, cwin: 15763,flight: 1309,nb_ret: 7,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 14 989cf971542e2f22: Sending packet type: 6 (1rtt protected), S0, Q1, 989cf971542e2f22: , Seq: 8 (8), Phi: 0, 989cf971542e2f22: Prepared 29 bytes 989cf971542e2f22: ack_ecn (nb=3), 9, 5, 2, 0, ect0=4, ect1=0, ce=0 989cf971542e2f22: padding, 15 bytes 989cf971542e2f22: T= 1.541260, cwin: 15763,flight: 1364,nb_ret: 7,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 14 989cf971542e2f22: Sending 55 bytes to 193.167.100.100:443 at T=1.541260 (25750bde) 989cf971542e2f22: Receiving 390 bytes from 193.167.100.100:443 at T=1.541478 (25750cb8) 989cf971542e2f22: Receiving packet type: 6 (1rtt protected), S1, Q0, 989cf971542e2f22: <436f328f86a020f1>, Seq: 10 (10), Phi: 0, 989cf971542e2f22: Decrypted 364 bytes 989cf971542e2f22: handshake_done 989cf971542e2f22: immediate_ack 989cf971542e2f22: crypto_hs, offset 0, length 356: 0400005500015180... 989cf971542e2f22: retire_connection_id[0] 989cf971542e2f22: T= 1.541478, cwin: 15763,flight: 1364,nb_ret: 7,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 14 989cf971542e2f22: Sending packet type: 6 (1rtt protected), S0, Q1, 989cf971542e2f22: , Seq: 9 (9), Phi: 0, 989cf971542e2f22: Prepared 29 bytes 989cf971542e2f22: ack_ecn (nb=3), 9-10, 5, 2, 0, ect0=5, ect1=0, ce=0 989cf971542e2f22: padding, 15 bytes 989cf971542e2f22: T= 1.541549, cwin: 15763,flight: 1419,nb_ret: 7,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 14 989cf971542e2f22: Sending 55 bytes to 193.167.100.100:443 at T=1.541549 (25750cff) 989cf971542e2f22: Receiving 31 bytes from 193.167.100.100:443 at T=1.571954 (257583c4) 989cf971542e2f22: Receiving packet type: 6 (1rtt protected), S0, Q0, 989cf971542e2f22: <436f328f86a020f1>, Seq: 11 (11), Phi: 0, 989cf971542e2f22: Decrypted 5 bytes 989cf971542e2f22: stream 0, offset 1024, length 0, fin = 1: 989cf971542e2f22: T= 1.571954, cwin: 15763,flight: 1419,nb_ret: 7,rtt_min: 33280,rtt: 33280,rtt_var: 16640,max_ack_delay: 0,state: 14 989cf971542e2f22: All done, Closing the connection. 989cf971542e2f22: Sending packet type: 6 (1rtt protected), S1, Q0, 989cf971542e2f22: , Seq: 10 (10), Phi: 0, 989cf971542e2f22: Prepared 15 bytes 989cf971542e2f22: ack_ecn (nb=2), 9-11, 5, 2, ect0=6, ect1=0, ce=0 989cf971542e2f22: application_close, Error 0x0000, Reason length 0 989cf971542e2f22: Sending 41 bytes to 193.167.100.100:443 at T=1.572052 (25758426) 989cf971542e2f22: Receiving 38 bytes from 193.167.100.100:443 at T=1.602660 (2575fbb6) 989cf971542e2f22: Receiving packet type: 6 (1rtt protected), S1, Q0, 989cf971542e2f22: <436f328f86a020f1>, Seq: 12 (12), Phi: 0, 989cf971542e2f22: Decrypted 12 bytes 989cf971542e2f22: ack_ecn (nb=0), 3-10, ect0=0, ect1=8, ce=0 989cf971542e2f22: connection_close, Error 0x0000, Reason length 0 989cf971542e2f22: Out of 4 zero RTT packets, 0 were acked by the server. 989cf971542e2f22: Received 1024 bytes in 1.602762 seconds, 0.005111 Mbps. 989cf971542e2f22: Sent 33 bytes in 1.602762 seconds, 0.000165 Mbps.