0.000 Creating connection with server4:443 with v1 0.081 Setting up connection for downloading https://server4:443/jrovfzxbii at 34:06.344 on ClientConnection[d4a13cef1f67a8ef/5f83d6d861c4ee1a(V1) with server4/193.167.100.100:443] 0.082 Original destination connection id: d4a13cef1f67a8ef (scid: 5f83d6d861c4ee1a) >- CryptoStream[I|ClientHello] 0.254 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.455/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.249 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.293 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ17] CryptoFrame[0,123] 0.310 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.510/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.337 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 126 millis, based on 0.465/Handshake, because peerAwaitingAddressValidation | RTT:43/21 0.293 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 0.337 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 0.370 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 126 millis, based on 0.497/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:43/21 0.370 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.374 Starting downloading https://server4:443/jrovfzxbii at 34:06.653 on ClientConnection[d4a13cef1f67a8ef/5f83d6d861c4ee1a(V1) with server4/193.167.100.100:443] 0.377 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 0.382 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 126 millis, based on 0.509/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:43/21 0.382 Discarding pn space Initial because first Handshake message is being sent 0.405 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 126 millis, based on 0.532/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:43/21 0.404 -> Packet A|0|S0|a7f8b0ee69f548b1463922e26cd6f19d|55|1 StreamFrame[0(CIB),0,17,fin] 0.438 <- (2) Packet A|1|S0|5f83d6d861c4ee1a|1061|3 AckFrame[0|Δ1] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 0.440 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 126 millis, based on 0.567/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:43/21 0.441 State is set to Confirmed reschedule loss detection timer for PTO over 42 millis, based on 0.484/Handshake, because ackElicitingInFlight | RTT:42/18 0.441 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 0.442 Discarding pn space Handshake because HandshakeDone is received 0.438 <- (3) Packet A|2|S0|5f83d6d861c4ee1a|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 0.444 Finished downloading https://server4:443/jrovfzxbii at 34:06.722 on ClientConnection[d4a13cef1f67a8ef/5f83d6d861c4ee1a(V1) with server4/193.167.100.100:443] 0.443 -> Packet A|1|S0|a7f8b0ee69f548b1463922e26cd6f19d|39|1 AckFrame[2-1|Δ0] 0.445 Closing ClientConnection[d4a13cef1f67a8ef/5f83d6d861c4ee1a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 0.448 Creating connection with server4:443 with v1 0.449 Setting up connection for downloading https://server4:443/bpafmwlmca at 34:06.728 on ClientConnection[77c4595aba42593c/3b5a75e369edb133(V1) with server4/193.167.100.100:443] 0.449 Original destination connection id: 77c4595aba42593c (scid: 3b5a75e369edb133) >- CryptoStream[I|ClientHello] 0.453 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.653/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.453 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.447 -> Packet A|2|S0|a7f8b0ee69f548b1463922e26cd6f19d|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 0.476 <- (4) Packet A|3|S0|5f83d6d861c4ee1a|104|3 AckFrame[1|Δ0] NewConnectionIdFrame[1,<1|fd30ffd77926fc1872fa0a4e55726974|144977fc65175fafcbb0aae5c3377b1a] NewConnectionIdFrame[2,<1|eaac25542c071325f17f737314e1e557|9b742ff88b771b654acba025b96fac6e] 0.483 -> Packet A|3|S0|a7f8b0ee69f548b1463922e26cd6f19d|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 0.488 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ12] CryptoFrame[0,123] 0.489 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.689/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 0.488 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 0.495 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 0.597/Handshake, because peerAwaitingAddressValidation | RTT:34/17 0.495 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 0.502 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 0.604/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 0.501 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 0.502 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 0.604/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 0.502 Discarding pn space Initial because first Handshake message is being sent 0.503 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 0.503 Starting downloading https://server4:443/bpafmwlmca at 34:06.782 on ClientConnection[77c4595aba42593c/3b5a75e369edb133(V1) with server4/193.167.100.100:443] 0.505 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 0.607/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 0.504 -> Packet A|0|S0|a935c11c67f93b5eb8eacf765b70f821|55|1 StreamFrame[0(CIB),0,17] 0.505 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 0.608/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 0.505 -> Packet A|1|S0|a935c11c67f93b5eb8eacf765b70f821|38|1 StreamFrame[0(CIB),17,0,fin] 0.607 loss detection timeout handler running Sending probe 0, because no ack since 0.501. Current RTT: 34/17. 0.608 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.609 (Probe is a handshake retransmit) 0.611 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 0.815/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 0.611 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 0.814 loss detection timeout handler running Sending probe 1, because no ack since 0.505. Current RTT: 34/17. 0.815 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 0.815 (Probe is a handshake retransmit) 0.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 1.224/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 0.815 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 0.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 1.225/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 0.816 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 1.224 loss detection timeout handler running Sending probe 2, because no ack since 0.505. Current RTT: 34/17. 1.224 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.224 (Probe is a handshake retransmit) 1.225 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 2.041/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.225 -> Packet PH|5|L|88|1 CryptoFrame[0,36] 1.226 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 2.042/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.226 -> Packet PH|6|L|88|1 CryptoFrame[0,36] 1.668 <- (2) Packet A|2|S0|3b5a75e369edb133|45|2 HandshakeDoneFrame[] Padding(18) 1.669 State is set to Confirmed reschedule loss detection timer for PTO over -148 millis, based on 1.521/App, because ackElicitingInFlight | RTT:34/17 1.669 loss detection timeout handler running Sending probe 3, because no ack since 0.505. Current RTT: 34/17. reschedule loss detection timer for PTO over -1037 millis, based on 0.632/App, because ackElicitingInFlight | RTT:34/17 1.670 Discarding pn space Handshake because HandshakeDone is received 1.670 (Probe is retransmit on level App) 1.668 <- (3) Packet A|4|S0|3b5a75e369edb133|45|2 HandshakeDoneFrame[] Padding(18) 1.670 -> Packet A|2|S0|a935c11c67f93b5eb8eacf765b70f821|41|1 AckFrame[4,2|Δ0] reschedule loss detection timer for PTO over 253 millis, based on 1.925/App, because ackElicitingInFlight | RTT:34/17 1.671 -> Packet PA|3|S0|a935c11c67f93b5eb8eacf765b70f821|55|1 StreamFrame[0(CIB),0,17] 1.702 <- (4) Packet A|5|S0|3b5a75e369edb133|104|3 AckFrame[2|Δ0] NewConnectionIdFrame[1,<1|14ff3702eefb90a63f4570e171dada8e|693aa1979d194593a02a062424192fd3] NewConnectionIdFrame[2,<1|e4389cb1d2583eab7cb990bc9b7aa6c6|a4c786d05e9d065ef775b051f9c4ff2e] 1.706 Retransmitted lost stream frame StreamFrame[0(CIB),0,17] 1.707 Retransmitted lost stream frame StreamFrame[0(CIB),17,0,fin] reschedule loss detection timer for PTO over 126 millis, based on 1.834/App, because ackElicitingInFlight | RTT:34/17 1.707 Cwnd(-): 6000; inflight: 114 1.707 -> Packet A|4|S0|a935c11c67f93b5eb8eacf765b70f821|59|2 StreamFrame[0(CIB),0,17] StreamFrame[0(CIB),17,0,fin] reschedule loss detection timer for PTO over 126 millis, based on 1.834/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 126 millis, based on 1.838/App, because ackElicitingInFlight | RTT:34/17 1.703 <- (5) Packet A|6|S0|3b5a75e369edb133|45|3 AckFrame[3-2|Δ0] StopSendingFrame[0:0] Padding(11) reschedule loss detection timer for PTO over 126 millis, based on 1.838/App, because ackElicitingInFlight | RTT:34/17 1.711 -> Packet A|5|S0|14ff3702eefb90a63f4570e171dada8e|41|2 RetireConnectionIdFrame[0] AckFrame[5|Δ0] 1.705 <- (6) Packet A|7|S0|3b5a75e369edb133|1054|1 StreamFrame[0(CIB),0,1024] 1.705 <- (7) Packet A|8|S0|3b5a75e369edb133|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 1.713 -> Packet A|6|S0|14ff3702eefb90a63f4570e171dada8e|40|1 AckFrame[8-5|Δ1] 1.713 Finished downloading https://server4:443/bpafmwlmca at 34:07.992 on ClientConnection[77c4595aba42593c/3b5a75e369edb133(V1) with server4/193.167.100.100:443] 1.714 Closing ClientConnection[77c4595aba42593c/3b5a75e369edb133(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.714 -> Packet A|7|S0|14ff3702eefb90a63f4570e171dada8e|43|2 ConnectionCloseFrame[0|0|] AckFrame[8-5|Δ0] 1.715 Creating connection with server4:443 with v1 1.715 Setting up connection for downloading https://server4:443/vpzvrwbpkb at 34:07.994 on ClientConnection[c16a8bd63ed11c46/d0b6ee01c44b0a5d(V1) with server4/193.167.100.100:443] 1.716 Original destination connection id: c16a8bd63ed11c46 (scid: d0b6ee01c44b0a5d) >- CryptoStream[I|ClientHello] 1.719 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 1.919/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.719 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.743 <- (8) Packet A|9|S0|3b5a75e369edb133|45|2 AckFrame[5,3|Δ0] Padding(12) 1.744 -> Packet A|8|S0|14ff3702eefb90a63f4570e171dada8e|43|2 ConnectionCloseFrame[0|0|] AckFrame[8-5|Δ0] 1.918 loss detection timeout handler running Sending probe 0, because no ack since 1.719. Current RTT: 100/25. 1.918 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.918 (Probe is an initial retransmit) 1.919 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.320/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.919 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 1.954 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ10] CryptoFrame[0,123] 1.955 probe count not reset on ack because handshake not yet confirmed 1.955 Retransmitting CryptoFrame[0,257] on level Initial 1.956 Cwnd(-): 6000; inflight: 0 1.956 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.356/Initial, because peerAwaitingAddressValidation | RTT:100/25 1.956 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 2.160/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.956 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 1.960 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.954 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) reschedule loss detection timer for PTO over 203 millis, based on 2.164/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.960 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.068/Handshake, because peerAwaitingAddressValidation | RTT:34/17 1.966 Discarding pn space Initial because first Handshake message is being sent 1.966 Starting downloading https://server4:443/vpzvrwbpkb at 34:08.245 on ClientConnection[c16a8bd63ed11c46/d0b6ee01c44b0a5d(V1) with server4/193.167.100.100:443] 1.966 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.068/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.966 -> Packet H|0|L|93|2 AckFrame[0|Δ0] CryptoFrame[0,36] 1.967 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.069/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 1.967 -> Packet A|0|S0|d9f4ab031717b57ee3399c66093f6288|55|1 StreamFrame[0(CIB),0,17,fin] 2.068 loss detection timeout handler running Sending probe 0, because no ack since 1.966. Current RTT: 34/17. 2.068 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 2.068 (Probe is a handshake retransmit) 2.069 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 2.273/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.069 -> Packet PH|1|L|88|1 CryptoFrame[0,36] 2.129 <- (2) Packet A|2|S0|d0b6ee01c44b0a5d|45|2 HandshakeDoneFrame[] Padding(18) 2.130 State is set to Confirmed reschedule loss detection timer for PTO over 90 millis, based on 2.221/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -36 millis, based on 2.094/App, because ackElicitingInFlight | RTT:34/17 2.130 loss detection timeout handler running 2.131 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 1.967. Current RTT: 34/17. 2.131 (Probe is retransmit on level App) 2.129 <- (3) Packet A|4|S0|d0b6ee01c44b0a5d|45|2 HandshakeDoneFrame[] Padding(18) reschedule loss detection timer for PTO over 253 millis, based on 2.385/App, because ackElicitingInFlight | RTT:34/17 2.131 -> Packet PA|1|S0|d9f4ab031717b57ee3399c66093f6288|55|1 StreamFrame[0(CIB),0,17,fin] 2.132 -> Packet A|2|S0|d9f4ab031717b57ee3399c66093f6288|41|1 AckFrame[4,2|Δ0] 2.163 <- (4) Packet A|5|S0|d0b6ee01c44b0a5d|103|3 AckFrame[2-1|Δ0] NewConnectionIdFrame[1,<1|8914f045ddf349cfb96ab44ef9ace807|b7b2d1ea24a39da79899fbc64742630d] NewConnectionIdFrame[2,<1|088ccccfea889feb55d466a8bc047bca|ec1e62b0070c5096f92bbdf08e80c523] 2.164 Cwnd(-): 3000; inflight: 0 2.164 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 2.164 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 126 millis, based on 2.291/App, because ackElicitingInFlight | RTT:34/17 2.164 -> Packet A|3|S0|d9f4ab031717b57ee3399c66093f6288|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 126 millis, based on 2.292/App, because ackElicitingInFlight | RTT:34/17 2.165 <- (5) Packet A|6|S0|d0b6ee01c44b0a5d|1054|1 StreamFrame[0(CIB),0,1024] 2.165 -> Packet A|4|S0|8914f045ddf349cfb96ab44ef9ace807|41|2 RetireConnectionIdFrame[0] AckFrame[5|Δ0] 2.165 <- (6) Packet A|7|S0|d0b6ee01c44b0a5d|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 2.166 Finished downloading https://server4:443/vpzvrwbpkb at 34:08.445 on ClientConnection[c16a8bd63ed11c46/d0b6ee01c44b0a5d(V1) with server4/193.167.100.100:443] 2.166 -> Packet A|5|S0|8914f045ddf349cfb96ab44ef9ace807|39|1 AckFrame[7-5|Δ0] 2.166 Closing ClientConnection[c16a8bd63ed11c46/d0b6ee01c44b0a5d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.166 -> Packet A|6|S0|8914f045ddf349cfb96ab44ef9ace807|43|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 2.167 Creating connection with server4:443 with v1 2.167 Setting up connection for downloading https://server4:443/cqigtarars at 34:08.446 on ClientConnection[5f326e53ca1d92f3/64a7edfc7a4be914(V1) with server4/193.167.100.100:443] 2.168 Original destination connection id: 5f326e53ca1d92f3 (scid: 64a7edfc7a4be914) >- CryptoStream[I|ClientHello] 2.170 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.370/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.170 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.369 loss detection timeout handler running Sending probe 0, because no ack since 2.170. Current RTT: 100/25. 2.369 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.369 (Probe is an initial retransmit) 2.370 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.770/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.370 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.403 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[1-0|Δ1] Padding(1143) 2.404 probe count not reset on ack because handshake not yet confirmed 2.404 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.804/Initial, because peerAwaitingAddressValidation | RTT:100/25 2.803 loss detection timeout handler running Sending probe 1, because no ack since 2.370. Current RTT: 33/16. 2.803 Sending probe because peer awaiting address validation 2.803 (Probe is Initial ping, because there is no Initial data to retransmit) 2.804 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 3.192/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 2.804 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 3.192 loss detection timeout handler running Sending probe 2, because no ack since 2.804. Current RTT: 33/16. 3.192 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.192 (Probe is Initial ping, because there is no Initial data to retransmit) 3.192 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 3.969/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.192 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 3.193 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 3.969/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.193 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 3.205 <- (2) Packet I|5|L|186|2 Token=[] AckFrame[1-0|Δ6408] CryptoFrame[0,123] 3.206 probe count not reset on ack because handshake not yet confirmed 3.206 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 3.982/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[I|ServerHello] 3.211 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.205 <- (2) Packet H|4|L|1014|2 CryptoFrame[0,685] Padding(275) reschedule loss detection timer for PTO over 775 millis, based on 3.987/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.211 -> Packet I|5|L|1201|2 Token=[] AckFrame[5,1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 3.214 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 3.990/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.214 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.215 Starting downloading https://server4:443/cqigtarars at 34:09.494 on ClientConnection[5f326e53ca1d92f3/64a7edfc7a4be914(V1) with server4/193.167.100.100:443] 3.215 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 3.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.313/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.216 Discarding pn space Initial because first Handshake message is being sent 3.216 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 3.313/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.216 -> Packet A|0|S0|00ab73e3c1784f78eb69aecddab274a3|55|1 StreamFrame[0(CIB),0,17,fin] 3.227 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.228 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.312 loss detection timeout handler running Sending probe 0, because no ack since 3.214. Current RTT: 33/16. 3.312 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.312 (Probe is a handshake retransmit) 3.313 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 3.507/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 3.313 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 3.345 <- (5) Packet A|0|S0|64a7edfc7a4be914|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|a91cde3a374f4f426e1316ba5e946974|344e05ed59f78c6957a95f4f02f4d870] NewConnectionIdFrame[2,<1|5dd70bec47c58e5988289a9119fd8ec7|95c2ab479d0effc9af638e31ec6ebdde] 3.345 State is set to Confirmed reschedule loss detection timer for PTO over 114 millis, based on 3.460/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over -7 millis, based on 3.338/App, because ackElicitingInFlight | RTT:33/16 3.346 loss detection timeout handler running 3.346 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 3.216. Current RTT: 33/16. 3.346 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 3.590/App, because ackElicitingInFlight | RTT:33/16 3.346 -> Packet PA|1|S0|a91cde3a374f4f426e1316ba5e946974|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 243 millis, based on 3.591/App, because ackElicitingInFlight | RTT:33/16 3.347 -> Packet A|2|S0|a91cde3a374f4f426e1316ba5e946974|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 3.379 <- (6) Packet A|1|S0|64a7edfc7a4be914|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] 3.380 Cwnd(-): 6000; inflight: 0 3.380 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 3.380 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 105 millis, based on 3.487/App, because ackElicitingInFlight | RTT:33/12 3.381 -> Packet A|3|S0|a91cde3a374f4f426e1316ba5e946974|55|1 StreamFrame[0(CIB),0,17,fin] 3.400 -> Packet A|4|S0|a91cde3a374f4f426e1316ba5e946974|40|1 AckFrame[1|Δ19] 3.437 <- (7) Packet A|3|S0|64a7edfc7a4be914|45|2 AckFrame[4-3|Δ5] Padding(13) 3.438 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.507 <- (8) Packet A|5|S0|64a7edfc7a4be914|45|3 AckFrame[4-3|Δ75] PingFrame[] Padding(12) 3.508 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.507 <- (9) Packet A|7|S0|64a7edfc7a4be914|45|3 AckFrame[4-3|Δ75] PingFrame[] Padding(12) 3.509 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.509 -> Packet A|5|S0|a91cde3a374f4f426e1316ba5e946974|43|1 AckFrame[7,5,3|Δ0] 3.540 <- (10) Packet A|8|S0|64a7edfc7a4be914|45|3 AckFrame[5|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 3.541 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 3.541 Finished downloading https://server4:443/cqigtarars at 34:09.820 on ClientConnection[5f326e53ca1d92f3/64a7edfc7a4be914(V1) with server4/193.167.100.100:443] 3.542 Closing ClientConnection[5f326e53ca1d92f3/64a7edfc7a4be914(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.542 Creating connection with server4:443 with v1 3.542 -> Packet A|6|S0|a91cde3a374f4f426e1316ba5e946974|43|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 3.543 Setting up connection for downloading https://server4:443/pcscrakftb at 34:09.822 on ClientConnection[213fb618f0e24f97/edacdca4685f4591(V1) with server4/193.167.100.100:443] 3.543 Original destination connection id: 213fb618f0e24f97 (scid: edacdca4685f4591) >- CryptoStream[I|ClientHello] 3.544 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.745/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.544 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.579 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 3.580 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.780/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 3.583 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.579 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) reschedule loss detection timer for PTO over 101 millis, based on 3.685/Handshake, because peerAwaitingAddressValidation | RTT:34/17 3.582 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 3.586 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 3.688/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.585 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.586 Starting downloading https://server4:443/pcscrakftb at 34:09.865 on ClientConnection[213fb618f0e24f97/edacdca4685f4591(V1) with server4/193.167.100.100:443] 3.586 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.587 -> Packet H|1|L|54|1 AckFrame[0|Δ0] reschedule loss detection timer for PTO over 101 millis, based on 3.689/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.587 Discarding pn space Initial because first Handshake message is being sent 3.587 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 3.689/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.587 -> Packet A|0|S0|40a71940aadef53e4e8980df893e1791|55|1 StreamFrame[0(CIB),0,17,fin] 3.618 <- (2) Packet A|0|S0|edacdca4685f4591|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|4fb695609f570ef7a13917aab6347b0d|f8ae1a898528c0e882670cd2c79a6ca2] NewConnectionIdFrame[2,<1|58210a945c431c9cbb19cfd4ebbcc770|c262122943eba05898b601c2bef69cec] 3.618 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 3.687/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 3.714/App, because ackElicitingInFlight | RTT:34/17 3.619 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 3.746/App, because ackElicitingInFlight | RTT:34/17 3.619 -> Packet A|1|S0|4fb695609f570ef7a13917aab6347b0d|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 3.620 <- (3) Packet A|1|S0|edacdca4685f4591|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 3.746/App, because ackElicitingInFlight | RTT:34/17 3.620 <- (4) Packet A|2|S0|edacdca4685f4591|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 3.621 Finished downloading https://server4:443/pcscrakftb at 34:09.900 on ClientConnection[213fb618f0e24f97/edacdca4685f4591(V1) with server4/193.167.100.100:443] 3.621 Closing ClientConnection[213fb618f0e24f97/edacdca4685f4591(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.621 -> Packet A|2|S0|4fb695609f570ef7a13917aab6347b0d|39|1 AckFrame[2-0|Δ0] 3.621 -> Packet A|3|S0|4fb695609f570ef7a13917aab6347b0d|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 3.622 Creating connection with server4:443 with v1 3.622 Setting up connection for downloading https://server4:443/chezkjjjcj at 34:09.901 on ClientConnection[ff962e0f644c7c4a/39e0a2c509515c7e(V1) with server4/193.167.100.100:443] 3.622 Original destination connection id: ff962e0f644c7c4a (scid: 39e0a2c509515c7e) >- CryptoStream[I|ClientHello] 3.624 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.824/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.624 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.660 <- (11) Packet A|10|S0|64a7edfc7a4be914|45|3 AckFrame[5|Δ120] PingFrame[] Padding(12) 3.661 -> Packet A|7|S0|a91cde3a374f4f426e1316ba5e946974|43|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 3.823 loss detection timeout handler running Sending probe 0, because no ack since 3.624. Current RTT: 100/25. 3.824 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.824 (Probe is an initial retransmit) 3.824 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.224/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.824 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.224 loss detection timeout handler running Sending probe 1, because no ack since 3.824. Current RTT: 100/25. 4.224 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.224 (Probe is an initial retransmit) 4.224 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.024/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.224 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.225 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.026/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.225 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.260 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[3-2|Δ1] Padding(1143) 4.261 probe count not reset on ack because handshake not yet confirmed 4.261 Retransmitting CryptoFrame[0,257] on level Initial 4.261 Cwnd(-): 6000; inflight: 0 4.261 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.061/Initial, because peerAwaitingAddressValidation | RTT:100/25 4.261 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 4.669/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.261 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) 4.295 <- (2) Packet I|2|L|1200|2 Token=[] AckFrame[4-2|Δ2] Padding(1143) 4.295 probe count not reset on ack because handshake not yet confirmed 4.295 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 4.703/Initial, because peerAwaitingAddressValidation | RTT:34/17 4.703 loss detection timeout handler running Sending probe 2, because no ack since 4.261. Current RTT: 34/13. 4.703 Sending probe because peer awaiting address validation 4.703 (Probe is Initial ping, because there is no Initial data to retransmit) 4.704 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 687 millis, based on 5.392/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/13 4.703 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 4.737 <- (3) Packet I|3|L|1200|2 Token=[] AckFrame[5-2|Δ2] Padding(1143) 4.738 probe count not reset on ack because handshake not yet confirmed 4.738 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 687 millis, based on 5.426/Initial, because peerAwaitingAddressValidation | RTT:34/13 5.259 <- (4) Packet I|5|L|186|2 Token=[] AckFrame[5-2|Δ4174] CryptoFrame[0,123] 5.260 probe count not reset on ack because handshake not yet confirmed 5.260 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 591 millis, based on 5.852/Initial, because peerAwaitingAddressValidation | RTT:34/10 -< CryptoStream[I|ServerHello] 5.259 <- (4) Packet H|2|L|1014|2 CryptoFrame[0,683] Padding(277) 5.264 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 591 millis, based on 5.856/Handshake, because peerAwaitingAddressValidation | RTT:34/10 5.264 -> Packet I|6|L|1201|2 Token=[] AckFrame[5,3-1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 5.268 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 591 millis, based on 5.860/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 5.268 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.269 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.269 Starting downloading https://server4:443/chezkjjjcj at 34:11.547 on ClientConnection[ff962e0f644c7c4a/39e0a2c509515c7e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 73 millis, based on 5.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 5.269 Discarding pn space Initial because first Handshake message is being sent 5.269 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.269 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 73 millis, based on 5.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 5.269 -> [Packet H|1|L|54|1 AckFrame[2|Δ0], Packet A|0|S0|449c089f5ecf91a0a2b61f165453e6c6|55|1 StreamFrame[0(CIB),0,17,fin]] 5.298 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.343 loss detection timeout handler running Sending probe 0, because no ack since 5.268. Current RTT: 34/10. 5.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.343 (Probe is a handshake retransmit) 5.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 147 millis, based on 5.491/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 5.343 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 5.360 <- (7) Packet H|6|L|69|3 AckFrame[1|Δ478] PingFrame[] Padding(10) 5.361 probe count not reset on ack because handshake not yet confirmed 5.361 Retransmitting CryptoFrame[0,36] on level Handshake 5.361 Cwnd(-): 3000; inflight: 143 5.361 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 129 millis, based on 5.491/Handshake, because ackElicitingInFlight | RTT:34/10 5.361 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 147 millis, based on 5.509/Handshake, because ackElicitingInFlight | RTT:34/10 5.361 -> Packet H|3|L|88|1 CryptoFrame[0,36] 5.360 <- (8) Packet H|8|L|69|3 AckFrame[1|Δ478] PingFrame[] Padding(10) 5.361 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 73 millis, based on 5.435/Handshake, because ackElicitingInFlight | RTT:34/10 5.361 -> Packet H|4|L|54|1 AckFrame[6|Δ0] 5.362 -> Packet H|5|L|56|1 AckFrame[8,6|Δ0] 5.375 <- (9) Packet A|0|S0|39e0a2c509515c7e|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|caa7c4f4c1859b2820a86de7626e9aee|cd26b1156fde32f4110b3d54a2a3cb05] NewConnectionIdFrame[2,<1|b369d169383e290035b6c421d27c947e|26d9ca58f666d9a3e56ff13451c8184f] 5.375 State is set to Confirmed reschedule loss detection timer for PTO over -7 millis, based on 5.368/App, because ackElicitingInFlight | RTT:34/10 5.376 loss detection timeout handler running Sending probe 0, because no ack since 5.269. Current RTT: 34/10. 5.376 (Probe is retransmit on level App) reschedule loss detection timer for PTO over -7 millis, based on 5.368/App, because ackElicitingInFlight | RTT:34/10 5.376 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 98 millis, based on 5.475/App, because ackElicitingInFlight | RTT:34/10 5.376 -> Packet PA|1|S0|449c089f5ecf91a0a2b61f165453e6c6|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 98 millis, based on 5.475/App, because ackElicitingInFlight | RTT:34/10 5.376 -> Packet A|2|S0|caa7c4f4c1859b2820a86de7626e9aee|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 5.409 <- (10) Packet A|1|S0|39e0a2c509515c7e|1061|3 AckFrame[1|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 5.410 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 65 millis, based on 5.475/App, because ackElicitingInFlight | RTT:34/10 reschedule loss detection timer for PTO over 90 millis, based on 5.501/App, because ackElicitingInFlight | RTT:34/8 5.410 -> Packet A|3|S0|caa7c4f4c1859b2820a86de7626e9aee|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 5.429 -> Packet A|4|S0|caa7c4f4c1859b2820a86de7626e9aee|40|1 AckFrame[1-0|Δ19] 5.441 <- (11) Packet A|3|S0|39e0a2c509515c7e|45|2 AckFrame[3,1|Δ0] Padding(12) 5.442 Cwnd(-): 2400; inflight: 0 5.442 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 86 millis, based on 5.529/App, because ackElicitingInFlight | RTT:34/7 5.442 -> Packet A|5|S0|caa7c4f4c1859b2820a86de7626e9aee|41|2 RetireConnectionIdFrame[0] AckFrame[1|Δ0] 5.529 loss detection timeout handler running Sending probe 0, because no ack since 5.442. Current RTT: 34/7. 5.529 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 173 millis, based on 5.703/App, because ackElicitingInFlight | RTT:34/7 5.529 -> Packet PA|6|S0|caa7c4f4c1859b2820a86de7626e9aee|37|2 RetireConnectionIdFrame[0] Padding(1) 5.541 <- (12) Packet A|5|S0|39e0a2c509515c7e|45|3 AckFrame[4-3|Δ79] PingFrame[] Padding(12) reschedule loss detection timer for PTO over 75 millis, based on 5.616/App, because ackElicitingInFlight | RTT:34/7 5.541 <- (13) Packet A|7|S0|39e0a2c509515c7e|45|3 AckFrame[4-3|Δ79] PingFrame[] Padding(12) reschedule loss detection timer for PTO over 74 millis, based on 5.616/App, because ackElicitingInFlight | RTT:34/7 5.542 -> Packet A|7|S0|caa7c4f4c1859b2820a86de7626e9aee|43|1 AckFrame[7,5,3|Δ0] 5.560 <- (14) Packet A|8|S0|39e0a2c509515c7e|45|2 AckFrame[6,4-3|Δ0] Padding(12) 5.561 Cwnd(-): 2400; inflight: 0 5.561 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 82 millis, based on 5.644/App, because ackElicitingInFlight | RTT:34/6 5.561 -> Packet A|8|S0|caa7c4f4c1859b2820a86de7626e9aee|45|2 RetireConnectionIdFrame[0] AckFrame[7,5,3|Δ0] 5.643 loss detection timeout handler running Sending probe 0, because no ack since 5.561. Current RTT: 34/6. 5.644 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 165 millis, based on 5.810/App, because ackElicitingInFlight | RTT:34/6 5.644 -> Packet PA|9|S0|caa7c4f4c1859b2820a86de7626e9aee|37|2 RetireConnectionIdFrame[0] Padding(1) 5.720 <- (15) Packet A|11|S0|39e0a2c509515c7e|45|3 AckFrame[8,6|Δ126] PingFrame[] Padding(10) reschedule loss detection timer for PTO over 6 millis, based on 5.727/App, because ackElicitingInFlight | RTT:34/6 5.720 <- (16) Packet A|13|S0|39e0a2c509515c7e|45|3 AckFrame[8,6|Δ126] PingFrame[] Padding(10) reschedule loss detection timer for PTO over 109 millis, based on 5.831/App, because ackElicitingInFlight | RTT:46/29 5.721 -> Packet A|10|S0|caa7c4f4c1859b2820a86de7626e9aee|43|1 AckFrame[13,11,8|Δ0] 5.753 <- (17) Packet A|14|S0|39e0a2c509515c7e|45|3 AckFrame[10|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 5.754 Finished downloading https://server4:443/chezkjjjcj at 34:12.032 on ClientConnection[ff962e0f644c7c4a/39e0a2c509515c7e(V1) with server4/193.167.100.100:443] 5.754 Closing ClientConnection[ff962e0f644c7c4a/39e0a2c509515c7e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.754 -> Packet A|11|S0|caa7c4f4c1859b2820a86de7626e9aee|43|2 ConnectionCloseFrame[0|0|] AckFrame[14|Δ0] 5.754 Creating connection with server4:443 with v1 5.755 Setting up connection for downloading https://server4:443/jmhpfhfdvt at 34:12.034 on ClientConnection[b0a299bff1c2bc62/aa112d32b498adfa(V1) with server4/193.167.100.100:443] 5.755 Original destination connection id: b0a299bff1c2bc62 (scid: aa112d32b498adfa) >- CryptoStream[I|ClientHello] 5.757 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.957/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.756 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.791 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 5.792 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.992/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.791 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) 5.795 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.897/Handshake, because peerAwaitingAddressValidation | RTT:34/17 5.795 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 5.798 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.901/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.798 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.799 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.799 Starting downloading https://server4:443/jmhpfhfdvt at 34:12.078 on ClientConnection[b0a299bff1c2bc62/aa112d32b498adfa(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 5.901/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.799 Discarding pn space Initial because first Handshake message is being sent 5.800 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.902/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.800 -> [Packet H|1|L|54|1 AckFrame[0|Δ0], Packet A|0|S0|b4d6dbc2ae6fa3fa04a6be4e61c6bf58|55|1 StreamFrame[0(CIB),0,17,fin]] 5.830 <- (2) Packet A|0|S0|aa112d32b498adfa|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|187f51da88116f77daa3f65a9d5615d5|30d50b8fb60b5984acfbe82500864a88] NewConnectionIdFrame[2,<1|51e55584552e7b1a3032211ba1bab70c|5f7f1bc35564f2b823be24b26187237b] 5.831 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 5.900/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 5.927/App, because ackElicitingInFlight | RTT:34/17 5.831 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 5.959/App, because ackElicitingInFlight | RTT:34/17 5.832 -> Packet A|1|S0|187f51da88116f77daa3f65a9d5615d5|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 5.958 loss detection timeout handler running Sending probe 0, because no ack since 5.832. Current RTT: 34/17. 5.958 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 6.212/App, because ackElicitingInFlight | RTT:34/17 5.958 -> Packet PA|2|S0|187f51da88116f77daa3f65a9d5615d5|55|1 StreamFrame[0(CIB),0,17,fin] 5.991 <- (3) Packet A|2|S0|aa112d32b498adfa|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] 5.992 Cwnd(-): 6000; inflight: 0 5.992 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 5.992 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 6.103/App, because ackElicitingInFlight | RTT:34/13 5.992 -> Packet A|3|S0|187f51da88116f77daa3f65a9d5615d5|55|1 StreamFrame[0(CIB),0,17,fin] 6.012 -> Packet A|4|S0|187f51da88116f77daa3f65a9d5615d5|40|1 AckFrame[2|Δ19] 6.102 loss detection timeout handler running Sending probe 0, because no ack since 5.992. Current RTT: 34/13. 6.103 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 6.325/App, because ackElicitingInFlight | RTT:34/13 6.103 -> Packet PA|5|S0|187f51da88116f77daa3f65a9d5615d5|55|1 StreamFrame[0(CIB),0,17,fin] 6.116 <- (4) Packet A|7|S0|aa112d32b498adfa|45|3 AckFrame[2-1|Δ126] PingFrame[] Padding(12) reschedule loss detection timer for PTO over 97 millis, based on 6.214/App, because ackElicitingInFlight | RTT:34/13 6.136 -> Packet A|6|S0|187f51da88116f77daa3f65a9d5615d5|42|1 AckFrame[7,2|Δ19] 6.168 <- (5) Packet A|8|S0|aa112d32b498adfa|45|3 AckFrame[6|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(8) 6.168 Cwnd(-): 3000; inflight: 0 6.168 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 6.168 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 6.279/App, because ackElicitingInFlight | RTT:34/13 6.168 Finished downloading https://server4:443/jmhpfhfdvt at 34:12.447 on ClientConnection[b0a299bff1c2bc62/aa112d32b498adfa(V1) with server4/193.167.100.100:443] 6.168 -> Packet A|7|S0|187f51da88116f77daa3f65a9d5615d5|55|1 StreamFrame[0(CIB),0,17,fin] 6.168 Closing ClientConnection[b0a299bff1c2bc62/aa112d32b498adfa(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.169 Creating connection with server4:443 with v1 6.169 -> Packet A|8|S0|187f51da88116f77daa3f65a9d5615d5|43|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 6.170 Setting up connection for downloading https://server4:443/lnavudalme at 34:12.448 on ClientConnection[3a9d38dfa3199017/057c3452a479517a(V1) with server4/193.167.100.100:443] 6.170 Original destination connection id: 3a9d38dfa3199017 (scid: 057c3452a479517a) >- CryptoStream[I|ClientHello] 6.171 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.371/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.171 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.370 loss detection timeout handler running Sending probe 0, because no ack since 6.171. Current RTT: 100/25. 6.370 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.371 (Probe is an initial retransmit) 6.371 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.771/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.371 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.770 loss detection timeout handler running Sending probe 1, because no ack since 6.371. Current RTT: 100/25. 6.770 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.770 (Probe is an initial retransmit) 6.771 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.571/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.771 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.772 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 7.572/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.772 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.206 <- (1) Packet I|4|L|188|2 Token=[] AckFrame[3-2,0|Δ3202] CryptoFrame[0,123] 7.206 probe count not reset on ack because handshake not yet confirmed 7.207 Cwnd(-): 6000; inflight: 0 7.207 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.007/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 7.206 <- (1) Packet H|2|L|1012|2 CryptoFrame[0,684] Padding(274) 7.210 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 5207 millis, based on 12.418/Handshake, because peerAwaitingAddressValidation | RTT:434/217 7.210 -> Packet I|4|L|1201|2 Token=[] AckFrame[4|Δ0] Padding(1145) >- CryptoStream[H|Finished] 7.213 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 5207 millis, based on 12.421/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:434/217 7.212 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.213 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.213 Starting downloading https://server4:443/lnavudalme at 34:13.492 on ClientConnection[3a9d38dfa3199017/057c3452a479517a(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 1301 millis, based on 8.515/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:434/217 7.213 Discarding pn space Initial because first Handshake message is being sent 7.213 -> Packet H|1|L|54|1 AckFrame[2|Δ0] 7.214 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.214 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1301 millis, based on 8.516/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:434/217 7.214 -> Packet A|0|S0|8092637f1e964a76f62ebc73e8019844|55|1 StreamFrame[0(CIB),0,17,fin] 7.244 <- (3) Packet A|0|S0|057c3452a479517a|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|65aef36f5366ca383b3de9243ab6a3c0|c071ec3e7870779295aff4e90587531f] NewConnectionIdFrame[2,<1|75093bcfa8638a39550d6703a7990249|c5858b5aa266f7cc4cc2cd1df823d227] 7.245 State is set to Confirmed reschedule loss detection timer for PTO over 1269 millis, based on 8.514/Handshake, because ackElicitingInFlight | RTT:434/217 reschedule loss detection timer for PTO over 1295 millis, based on 8.541/App, because ackElicitingInFlight | RTT:434/217 7.245 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 1326 millis, based on 8.572/App, because ackElicitingInFlight | RTT:434/217 7.245 -> Packet A|1|S0|65aef36f5366ca383b3de9243ab6a3c0|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 7.247 <- (4) Packet A|1|S0|057c3452a479517a|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 1325 millis, based on 8.572/App, because ackElicitingInFlight | RTT:434/217 7.247 <- (5) Packet A|2|S0|057c3452a479517a|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 7.248 Finished downloading https://server4:443/lnavudalme at 34:13.527 on ClientConnection[3a9d38dfa3199017/057c3452a479517a(V1) with server4/193.167.100.100:443] 7.248 -> Packet A|2|S0|65aef36f5366ca383b3de9243ab6a3c0|39|1 AckFrame[2-0|Δ0] 7.248 Closing ClientConnection[3a9d38dfa3199017/057c3452a479517a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.248 Creating connection with server4:443 with v1 7.248 -> Packet A|3|S0|65aef36f5366ca383b3de9243ab6a3c0|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 7.249 Setting up connection for downloading https://server4:443/ptkxpdtdjn at 34:13.528 on ClientConnection[ea483e42ca170fa8/971346a9ff183ac1(V1) with server4/193.167.100.100:443] 7.249 Original destination connection id: ea483e42ca170fa8 (scid: 971346a9ff183ac1) >- CryptoStream[I|ClientHello] 7.251 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.451/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.251 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.450 loss detection timeout handler running Sending probe 0, because no ack since 7.251. Current RTT: 100/25. 7.450 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.450 (Probe is an initial retransmit) 7.451 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.851/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.451 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.484 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[1-0|Δ2] Padding(1143) 7.485 probe count not reset on ack because handshake not yet confirmed 7.485 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.885/Initial, because peerAwaitingAddressValidation | RTT:100/25 7.884 loss detection timeout handler running Sending probe 1, because no ack since 7.451. Current RTT: 33/16. 7.885 Sending probe because peer awaiting address validation 7.885 (Probe is Initial ping, because there is no Initial data to retransmit) 7.885 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 8.273/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 7.885 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 7.919 <- (2) Packet I|2|L|1200|2 Token=[] AckFrame[2-0|Δ3] Padding(1143) 7.920 probe count not reset on ack because handshake not yet confirmed 7.920 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 8.308/Initial, because peerAwaitingAddressValidation | RTT:33/16 8.287 <- (3) Packet I|6|L|186|2 Token=[] AckFrame[2-0|Δ2941] CryptoFrame[0,123] 8.288 probe count not reset on ack because handshake not yet confirmed 8.288 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 323 millis, based on 8.612/Initial, because peerAwaitingAddressValidation | RTT:33/12 -< CryptoStream[I|ServerHello] 8.291 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.287 <- (3) Packet H|4|L|1014|2 CryptoFrame[0,684] Padding(276) reschedule loss detection timer for PTO over 323 millis, based on 8.615/Handshake, because peerAwaitingAddressValidation | RTT:33/12 8.291 -> Packet I|3|L|1201|2 Token=[] AckFrame[6,2-1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 8.295 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 323 millis, based on 8.619/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 8.295 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.296 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 8.377/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 8.296 Discarding pn space Initial because first Handshake message is being sent 8.296 Starting downloading https://server4:443/ptkxpdtdjn at 34:14.574 on ClientConnection[ea483e42ca170fa8/971346a9ff183ac1(V1) with server4/193.167.100.100:443] 8.296 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 8.297 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 8.378/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 8.297 -> Packet A|0|S0|c7bffaedd7424dfee9bb63daeb37dc2c|55|1 StreamFrame[0(CIB),0,17,fin] 8.327 <- (4) Packet A|0|S0|971346a9ff183ac1|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|d3da7b23ece5512b597a0fb4719db931|c613681b1ba29874c9ee850a07e2506f] NewConnectionIdFrame[2,<1|9c4d50eb5891b9e1e88e508da04b660d|3b2c525b7c84ea9a0df2162b83be3eab] 8.327 State is set to Confirmed reschedule loss detection timer for PTO over 48 millis, based on 8.376/Handshake, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 75 millis, based on 8.403/App, because ackElicitingInFlight | RTT:33/12 8.327 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 105 millis, based on 8.434/App, because ackElicitingInFlight | RTT:33/12 8.328 -> Packet A|1|S0|d3da7b23ece5512b597a0fb4719db931|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 8.329 <- (5) Packet A|2|S0|971346a9ff183ac1|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 8.347 -> Packet A|2|S0|d3da7b23ece5512b597a0fb4719db931|42|1 AckFrame[2,0|Δ17] 8.433 loss detection timeout handler running Sending probe 0, because no ack since 8.328. Current RTT: 33/12. 8.433 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 211 millis, based on 8.645/App, because ackElicitingInFlight | RTT:33/12 8.433 -> Packet PA|3|S0|d3da7b23ece5512b597a0fb4719db931|55|1 StreamFrame[0(CIB),0,17,fin] 8.507 <- (6) Packet A|6|S0|971346a9ff183ac1|45|3 AckFrame[3-0|Δ42] PingFrame[] Padding(12) 8.508 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.527 -> Packet A|4|S0|d3da7b23ece5512b597a0fb4719db931|40|1 AckFrame[6|Δ19] 8.560 <- (7) Packet A|9|S0|971346a9ff183ac1|1059|2 AckFrame[4-0|Δ0] StreamFrame[0(CIB),0,1024,fin] 8.560 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.561 Finished downloading https://server4:443/ptkxpdtdjn at 34:14.840 on ClientConnection[ea483e42ca170fa8/971346a9ff183ac1(V1) with server4/193.167.100.100:443] 8.561 Closing ClientConnection[ea483e42ca170fa8/971346a9ff183ac1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.561 -> Packet A|5|S0|d3da7b23ece5512b597a0fb4719db931|43|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 8.561 Creating connection with server4:443 with v1 8.562 Setting up connection for downloading https://server4:443/dadjfohlrr at 34:14.841 on ClientConnection[783d10a120da577f/da040fc034ba74d3(V1) with server4/193.167.100.100:443] 8.562 Original destination connection id: 783d10a120da577f (scid: da040fc034ba74d3) >- CryptoStream[I|ClientHello] 8.563 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.763/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.563 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.763 loss detection timeout handler running Sending probe 0, because no ack since 8.563. Current RTT: 100/25. 8.763 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.763 (Probe is an initial retransmit) 8.763 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.163/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.763 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.798 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ10] CryptoFrame[0,123] 8.798 probe count not reset on ack because handshake not yet confirmed 8.799 Retransmitting CryptoFrame[0,257] on level Initial 8.799 Cwnd(-): 6000; inflight: 0 8.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.199/Initial, because peerAwaitingAddressValidation | RTT:100/25 8.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 9.003/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.799 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 8.802 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.798 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) reschedule loss detection timer for PTO over 203 millis, based on 9.006/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.802 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 8.805 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 9.009/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.804 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.805 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.805 Starting downloading https://server4:443/dadjfohlrr at 34:15.084 on ClientConnection[783d10a120da577f/da040fc034ba74d3(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 8.907/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.805 Discarding pn space Initial because first Handshake message is being sent 8.805 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 8.806 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 8.908/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.806 -> Packet A|0|S0|7bf5966e17c9cd2de617ae2bbc3952f4|55|1 StreamFrame[0(CIB),0,17,fin] 8.832 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.837 <- (3) Packet A|0|S0|da040fc034ba74d3|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|3288bfe37880d735f9ae9b7da4f4abe8|ba5bafd893d8962e980e15b6500220a9] NewConnectionIdFrame[2,<1|3ba2594d5e6bcfd75ee080b06ae0fc75|eb8831d9d0ff325d6eae1e5a4d5bd93f] 8.838 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 8.906/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 94 millis, based on 8.933/App, because ackElicitingInFlight | RTT:34/17 8.838 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 8.966/App, because ackElicitingInFlight | RTT:34/17 8.839 <- (4) Packet A|1|S0|da040fc034ba74d3|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 8.839 -> Packet A|1|S0|3288bfe37880d735f9ae9b7da4f4abe8|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] reschedule loss detection timer for PTO over 126 millis, based on 8.966/App, because ackElicitingInFlight | RTT:34/17 8.839 <- (5) Packet A|2|S0|da040fc034ba74d3|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 8.840 Finished downloading https://server4:443/dadjfohlrr at 34:15.119 on ClientConnection[783d10a120da577f/da040fc034ba74d3(V1) with server4/193.167.100.100:443] 8.840 Closing ClientConnection[783d10a120da577f/da040fc034ba74d3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.840 -> Packet A|2|S0|3288bfe37880d735f9ae9b7da4f4abe8|39|1 AckFrame[2-0|Δ0] 8.840 -> Packet A|3|S0|3288bfe37880d735f9ae9b7da4f4abe8|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 8.841 Creating connection with server4:443 with v1 8.841 Setting up connection for downloading https://server4:443/grkpbtewnk at 34:15.120 on ClientConnection[6d48fa1a22fe2dcf/32f1170055e98deb(V1) with server4/193.167.100.100:443] 8.841 Original destination connection id: 6d48fa1a22fe2dcf (scid: 32f1170055e98deb) >- CryptoStream[I|ClientHello] 8.843 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.043/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.843 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.877 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 8.878 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.078/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 8.881 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.877 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) reschedule loss detection timer for PTO over 101 millis, based on 8.983/Handshake, because peerAwaitingAddressValidation | RTT:34/17 8.881 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.884 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 8.986/Handshake, because peerAwaitingAddressValidation | RTT:34/17 8.884 Discarding pn space Initial because first Handshake message is being sent 8.884 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 8.986/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.884 Starting downloading https://server4:443/grkpbtewnk at 34:15.163 on ClientConnection[6d48fa1a22fe2dcf/32f1170055e98deb(V1) with server4/193.167.100.100:443] 8.884 -> Packet H|0|L|88|1 CryptoFrame[0,36] 8.884 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 8.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 8.987/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.885 -> Packet A|0|S0|07d23937a9169180a6aaab13c190f1d7|55|1 StreamFrame[0(CIB),0,17,fin] 8.895 <- (6) Packet A|3|S0|da040fc034ba74d3|45|2 AckFrame[2-1|Δ24] Padding(13) 8.895 -> Packet A|4|S0|3288bfe37880d735f9ae9b7da4f4abe8|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 8.986 loss detection timeout handler running Sending probe 0, because no ack since 8.884. Current RTT: 34/17. 8.986 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.986 (Probe is a handshake retransmit) 8.987 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 9.191/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.987 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 9.190 loss detection timeout handler running Sending probe 1, because no ack since 8.885. Current RTT: 34/17. 9.190 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.190 (Probe is a handshake retransmit) 9.191 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 9.599/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.190 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 9.191 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 9.600/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.191 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 9.599 loss detection timeout handler running Sending probe 2, because no ack since 8.885. Current RTT: 34/17. 9.599 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.599 (Probe is a handshake retransmit) 9.599 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 10.415/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.599 -> Packet PH|5|L|88|1 CryptoFrame[0,36] 9.600 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 10.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 9.600 -> Packet PH|6|L|88|1 CryptoFrame[0,36] 9.635 <- (2) Packet A|6|S0|32f1170055e98deb|45|2 HandshakeDoneFrame[] Padding(18) 9.635 State is set to Confirmed reschedule loss detection timer for PTO over 265 millis, based on 9.901/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -623 millis, based on 9.012/App, because ackElicitingInFlight | RTT:34/17 9.636 Discarding pn space Handshake because HandshakeDone is received 9.636 loss detection timeout handler running Sending probe 0, because no ack since 8.885. Current RTT: 34/17. 9.636 (Probe is retransmit on level App) 9.635 <- (3) Packet A|8|S0|32f1170055e98deb|45|2 HandshakeDoneFrame[] Padding(18) reschedule loss detection timer for PTO over 253 millis, based on 9.890/App, because ackElicitingInFlight | RTT:34/17 9.636 -> Packet PA|1|S0|07d23937a9169180a6aaab13c190f1d7|55|1 StreamFrame[0(CIB),0,17,fin] 9.636 -> Packet A|2|S0|07d23937a9169180a6aaab13c190f1d7|41|1 AckFrame[8,6|Δ0] 9.792 <- (4) Packet A|11|S0|32f1170055e98deb|45|3 AckFrame[2|Δ124] PingFrame[] Padding(12) 9.792 Cwnd(-): 6000; inflight: 0 9.792 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.792 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 9.792 <- (5) Packet A|13|S0|32f1170055e98deb|45|3 AckFrame[2|Δ124] PingFrame[] Padding(12) reschedule loss detection timer for PTO over 126 millis, based on 9.919/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 126 millis, based on 9.919/App, because ackElicitingInFlight | RTT:34/17 9.792 -> Packet A|3|S0|07d23937a9169180a6aaab13c190f1d7|55|1 StreamFrame[0(CIB),0,17,fin] 9.793 -> Packet A|4|S0|07d23937a9169180a6aaab13c190f1d7|41|1 AckFrame[13,11|Δ0] 9.824 <- (6) Packet A|14|S0|32f1170055e98deb|103|3 AckFrame[4|Δ0] NewConnectionIdFrame[1,<1|1c8918b327ab77f8252ac5f8c276f08d|2d78ccc7edf08dcdd1733e892df2f8c7] NewConnectionIdFrame[2,<1|184a96452b658937e44514491a954d67|9f7f76cc443fd002a512ef2799da3c3e] 9.825 -> Packet A|5|S0|1c8918b327ab77f8252ac5f8c276f08d|41|2 RetireConnectionIdFrame[0] AckFrame[14|Δ0] 9.830 loss detection timeout handler running 9.830 loss detection timeout handler running 9.830 loss detection timeout handler running 9.830 loss detection timeout handler running 9.830 loss detection timeout handler running 9.831 Cwnd(-): 3000; inflight: 41 9.831 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 121 millis, based on 9.952/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 126 millis, based on 9.958/App, because ackElicitingInFlight | RTT:34/17 9.831 -> Packet A|6|S0|1c8918b327ab77f8252ac5f8c276f08d|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[14|Δ0] 9.863 <- (7) Packet A|15|S0|32f1170055e98deb|1060|2 AckFrame[6-5|Δ0] StreamFrame[0(CIB),0,1024] 9.864 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.863 <- (8) Packet A|16|S0|32f1170055e98deb|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 9.865 Finished downloading https://server4:443/grkpbtewnk at 34:16.143 on ClientConnection[6d48fa1a22fe2dcf/32f1170055e98deb(V1) with server4/193.167.100.100:443] 9.864 -> Packet A|7|S0|1c8918b327ab77f8252ac5f8c276f08d|39|1 AckFrame[16-15|Δ0] 9.865 Closing ClientConnection[6d48fa1a22fe2dcf/32f1170055e98deb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.865 -> Packet A|8|S0|1c8918b327ab77f8252ac5f8c276f08d|43|2 ConnectionCloseFrame[0|0|] AckFrame[16-15|Δ0] 9.865 Creating connection with server4:443 with v1 9.866 Setting up connection for downloading https://server4:443/csoyixbxtq at 34:16.145 on ClientConnection[2c37627030a124b9/cfc26a0e3759efa8(V1) with server4/193.167.100.100:443] 9.866 Original destination connection id: 2c37627030a124b9 (scid: cfc26a0e3759efa8) >- CryptoStream[I|ClientHello] 9.867 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.067/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.867 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.066 loss detection timeout handler running Sending probe 0, because no ack since 9.867. Current RTT: 100/25. 10.067 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.067 (Probe is an initial retransmit) 10.067 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.467/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.067 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.466 loss detection timeout handler running Sending probe 1, because no ack since 10.067. Current RTT: 100/25. 10.466 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.466 (Probe is an initial retransmit) 10.467 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.267/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.467 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.468 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.268/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.468 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.902 <- (1) Packet I|2|L|186|2 Token=[] AckFrame[0|Δ8009] CryptoFrame[0,123] 10.902 probe count not reset on ack because handshake not yet confirmed 10.903 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.703/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 10.906 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.902 <- (1) Packet H|2|L|1014|2 CryptoFrame[0,684] Padding(276) reschedule loss detection timer for PTO over 12407 millis, based on 23.314/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:1034/517 10.906 -> Packet I|4|L|1201|2 Token=[] AckFrame[2|Δ0] Padding(1145) >- CryptoStream[H|Finished] 10.909 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 12407 millis, based on 23.317/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:1034/517 10.909 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.910 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3101 millis, based on 14.012/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:1034/517 10.910 Discarding pn space Initial because first Handshake message is being sent 10.910 -> Packet H|1|L|54|1 AckFrame[2|Δ0] 10.910 Starting downloading https://server4:443/csoyixbxtq at 34:17.189 on ClientConnection[2c37627030a124b9/cfc26a0e3759efa8(V1) with server4/193.167.100.100:443] 10.911 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3101 millis, based on 14.013/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:1034/517 10.911 -> Packet A|0|S0|a0581c689e65f33b25ae504d31092ae6|55|1 StreamFrame[0(CIB),0,17,fin] 10.941 <- (2) Packet A|0|S0|cfc26a0e3759efa8|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|a5d76f38021768c49297a0641ea19f3d|96e7b7f4837f5bf1531c789943a5063f] NewConnectionIdFrame[2,<1|45ef516277a96b9cc97148982641f69c|a37e3121dbdf9d5b7fb2302d52acf005] 10.942 State is set to Confirmed reschedule loss detection timer for PTO over 3069 millis, based on 14.011/Handshake, because ackElicitingInFlight | RTT:1034/517 reschedule loss detection timer for PTO over 3096 millis, based on 14.038/App, because ackElicitingInFlight | RTT:1034/517 10.942 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 3126 millis, based on 14.069/App, because ackElicitingInFlight | RTT:1034/517 10.942 -> Packet A|1|S0|a5d76f38021768c49297a0641ea19f3d|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 10.999 <- (3) Packet A|1|S0|cfc26a0e3759efa8|45|2 AckFrame[1|Δ25] Padding(13) 12.073 loss detection timeout handler running 12.074 Cwnd(-): 6000; inflight: 0 12.074 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.074 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 3464 millis, based on 15.539/App, because ackElicitingInFlight | RTT:912/632 12.074 -> Packet A|2|S0|a5d76f38021768c49297a0641ea19f3d|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 12.107 <- (4) Packet A|2|S0|cfc26a0e3759efa8|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] 12.108 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.127 -> Packet A|3|S0|a5d76f38021768c49297a0641ea19f3d|40|1 AckFrame[2|Δ19] 12.232 <- (5) Packet A|5|S0|cfc26a0e3759efa8|45|3 AckFrame[3|Δ72] PingFrame[] Padding(12) 12.232 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.232 <- (6) Packet A|7|S0|cfc26a0e3759efa8|45|3 AckFrame[3|Δ72] PingFrame[] Padding(12) 12.232 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.233 -> Packet A|4|S0|a5d76f38021768c49297a0641ea19f3d|41|1 AckFrame[7,5|Δ0] 12.479 <- (7) Packet A|11|S0|cfc26a0e3759efa8|45|3 AckFrame[3|Δ320] PingFrame[] Padding(10) 12.480 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.499 -> Packet A|5|S0|a5d76f38021768c49297a0641ea19f3d|44|1 AckFrame[11,7,5|Δ19] 12.531 <- (8) Packet A|12|S0|cfc26a0e3759efa8|45|3 AckFrame[5|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(8) 12.531 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.532 Finished downloading https://server4:443/csoyixbxtq at 34:18.810 on ClientConnection[2c37627030a124b9/cfc26a0e3759efa8(V1) with server4/193.167.100.100:443] 12.532 Closing ClientConnection[2c37627030a124b9/cfc26a0e3759efa8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.532 Creating connection with server4:443 with v1 12.532 -> Packet A|6|S0|a5d76f38021768c49297a0641ea19f3d|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 12.533 Setting up connection for downloading https://server4:443/nmbvledlqd at 34:18.812 on ClientConnection[8960b93a9287a2f3/e5a17b74dfed262f(V1) with server4/193.167.100.100:443] 12.533 Original destination connection id: 8960b93a9287a2f3 (scid: e5a17b74dfed262f) >- CryptoStream[I|ClientHello] 12.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.734/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.534 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.734 loss detection timeout handler running Sending probe 0, because no ack since 12.534. Current RTT: 100/25. 12.734 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.734 (Probe is an initial retransmit) 12.734 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.134/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.734 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.133 loss detection timeout handler running Sending probe 1, because no ack since 12.734. Current RTT: 100/25. 13.133 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.133 (Probe is an initial retransmit) 13.134 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.934/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.134 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.135 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.935/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.135 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.168 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[2|Δ10] CryptoFrame[0,123] 13.169 probe count not reset on ack because handshake not yet confirmed 13.169 Retransmitting CryptoFrame[0,257] on level Initial 13.169 Cwnd(-): 6000; inflight: 1200 13.169 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.969/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.169 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 13.578/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.169 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 13.172 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.168 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) reschedule loss detection timer for PTO over 407 millis, based on 13.580/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.172 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 13.175 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 13.583/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.175 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.175 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.277/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.175 Discarding pn space Initial because first Handshake message is being sent 13.175 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.175 Starting downloading https://server4:443/nmbvledlqd at 34:19.454 on ClientConnection[8960b93a9287a2f3/e5a17b74dfed262f(V1) with server4/193.167.100.100:443] 13.175 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 13.176 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.278/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.176 -> Packet A|0|S0|8af9a79617cf9caa11adb2b7eee86f7e|55|1 StreamFrame[0(CIB),0,17,fin] 13.203 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.277 loss detection timeout handler running Sending probe 0, because no ack since 13.175. Current RTT: 34/17. 13.277 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.277 (Probe is a handshake retransmit) 13.278 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 13.482/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.277 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 13.309 <- (4) Packet A|0|S0|e5a17b74dfed262f|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|c8a666dae506933b872a31e1863acaf6|bd8b6b0043c2ab1d1ed1d49c51cad652] NewConnectionIdFrame[2,<1|f049b78501d69703c413d5f3187ad4a6|116365e70a56762899157d6f01ac066a] 13.310 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 13.430/App, because ackElicitingInFlight | RTT:34/17 13.310 loss detection timeout handler running Sending probe 0, because no ack since 13.176. Current RTT: 34/17. reschedule loss detection timer for PTO over -6 millis, based on 13.303/App, because ackElicitingInFlight | RTT:34/17 13.310 (Probe is retransmit on level App) 13.310 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 253 millis, based on 13.564/App, because ackElicitingInFlight | RTT:34/17 13.310 -> Packet PA|1|S0|8af9a79617cf9caa11adb2b7eee86f7e|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 13.564/App, because ackElicitingInFlight | RTT:34/17 13.310 -> Packet A|2|S0|c8a666dae506933b872a31e1863acaf6|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 13.564 loss detection timeout handler running Sending probe 1, because no ack since 13.310. Current RTT: 34/17. 13.564 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 14.072/App, because ackElicitingInFlight | RTT:34/17 13.564 -> Packet PA|3|S0|c8a666dae506933b872a31e1863acaf6|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 14.073/App, because ackElicitingInFlight | RTT:34/17 13.565 -> Packet PA|4|S0|c8a666dae506933b872a31e1863acaf6|55|1 StreamFrame[0(CIB),0,17,fin] 13.597 <- (5) Packet A|3|S0|e5a17b74dfed262f|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 13.616 -> Packet A|5|S0|c8a666dae506933b872a31e1863acaf6|42|1 AckFrame[3,0|Δ19] 13.622 <- (6) Packet A|4|S0|e5a17b74dfed262f|45|2 AckFrame[4-2|Δ25] Padding(13) 13.623 Cwnd(-): 3000; inflight: 0 13.623 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.623 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 137 millis, based on 13.761/App, because ackElicitingInFlight | RTT:37/19 13.623 -> Packet A|6|S0|c8a666dae506933b872a31e1863acaf6|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[3|Δ0] 13.655 <- (7) Packet A|5|S0|e5a17b74dfed262f|1060|2 AckFrame[5-2|Δ6] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 105 millis, based on 13.761/App, because ackElicitingInFlight | RTT:37/19 13.656 Finished downloading https://server4:443/nmbvledlqd at 34:19.935 on ClientConnection[8960b93a9287a2f3/e5a17b74dfed262f(V1) with server4/193.167.100.100:443] 13.656 Closing ClientConnection[8960b93a9287a2f3/e5a17b74dfed262f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.657 -> Packet A|7|S0|c8a666dae506933b872a31e1863acaf6|43|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 13.657 Creating connection with server4:443 with v1 13.657 Setting up connection for downloading https://server4:443/xnlrdfambh at 34:19.936 on ClientConnection[7eba76457b780bf5/1a063b3336db41ec(V1) with server4/193.167.100.100:443] 13.657 Original destination connection id: 7eba76457b780bf5 (scid: 1a063b3336db41ec) >- CryptoStream[I|ClientHello] 13.659 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.859/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.659 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.681 <- (8) Packet A|6|S0|e5a17b74dfed262f|45|2 AckFrame[6-2|Δ25] Padding(13) 13.681 -> Packet A|8|S0|c8a666dae506933b872a31e1863acaf6|43|2 ConnectionCloseFrame[0|0|] AckFrame[5-4|Δ0] 13.693 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 13.693 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.893/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.695 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.693 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) reschedule loss detection timer for PTO over 101 millis, based on 13.798/Handshake, because peerAwaitingAddressValidation | RTT:34/17 13.695 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 13.698 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.800/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.698 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.698 Starting downloading https://server4:443/xnlrdfambh at 34:19.977 on ClientConnection[7eba76457b780bf5/1a063b3336db41ec(V1) with server4/193.167.100.100:443] 13.698 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.800/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.698 Discarding pn space Initial because first Handshake message is being sent 13.698 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 13.699 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.801/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.699 -> Packet A|0|S0|954a17ef9a3a6d664522bdc98d9b72c5|55|1 StreamFrame[0(CIB),0,17,fin] 13.730 <- (2) Packet A|0|S0|1a063b3336db41ec|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|9c734143292a8b91bc25daf156b678a0|3c86b278aa94596e4b77b5b4b736f2a4] NewConnectionIdFrame[2,<1|3ec02707f5c023069b26b1d95a112ee6|130e8cc011bb6e68c6db071ccf4711d8] 13.730 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 13.800/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 13.826/App, because ackElicitingInFlight | RTT:34/17 13.730 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 13.858/App, because ackElicitingInFlight | RTT:34/17 13.731 -> Packet A|1|S0|9c734143292a8b91bc25daf156b678a0|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 13.857 loss detection timeout handler running Sending probe 0, because no ack since 13.731. Current RTT: 34/17. 13.857 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 14.111/App, because ackElicitingInFlight | RTT:34/17 13.857 -> Packet PA|2|S0|9c734143292a8b91bc25daf156b678a0|55|1 StreamFrame[0(CIB),0,17,fin] 14.111 loss detection timeout handler running Sending probe 1, because no ack since 13.857. Current RTT: 34/17. 14.111 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 14.619/App, because ackElicitingInFlight | RTT:34/17 14.111 -> Packet PA|3|S0|9c734143292a8b91bc25daf156b678a0|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 14.620/App, because ackElicitingInFlight | RTT:34/17 14.112 -> Packet PA|4|S0|9c734143292a8b91bc25daf156b678a0|55|1 StreamFrame[0(CIB),0,17,fin] 14.143 <- (3) Packet A|2|S0|1a063b3336db41ec|45|2 AckFrame[4,1|Δ0] Padding(12) 14.144 Cwnd(-): 6000; inflight: 55 14.144 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 14.144 -> Packet A|5|S0|9c734143292a8b91bc25daf156b678a0|55|1 StreamFrame[0(CIB),0,17,fin] 14.145 <- (4) Packet A|4|S0|1a063b3336db41ec|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 14.148 loss detection timeout handler running 14.148 loss detection timeout handler running 14.148 loss detection timeout handler running 14.148 loss detection timeout handler running 14.148 loss detection timeout handler running 14.149 loss detection timeout handler running 14.149 loss detection timeout handler running 14.149 loss detection timeout handler running 14.149 loss detection timeout handler running 14.149 loss detection timeout handler running reschedule loss detection timer for PTO over 110 millis, based on 14.259/App, because ackElicitingInFlight | RTT:34/14 14.165 -> Packet A|6|S0|9c734143292a8b91bc25daf156b678a0|42|1 AckFrame[4,2|Δ19] 14.205 <- (5) Packet A|6|S0|1a063b3336db41ec|1062|2 AckFrame[6-4,1|Δ7] StreamFrame[0(CIB),0,1024,fin] 14.205 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.205 Finished downloading https://server4:443/xnlrdfambh at 34:20.484 on ClientConnection[7eba76457b780bf5/1a063b3336db41ec(V1) with server4/193.167.100.100:443] 14.205 Closing ClientConnection[7eba76457b780bf5/1a063b3336db41ec(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.206 -> Packet A|7|S0|9c734143292a8b91bc25daf156b678a0|43|2 ConnectionCloseFrame[0|0|] AckFrame[6|Δ0] 14.206 Creating connection with server4:443 with v1 14.207 Setting up connection for downloading https://server4:443/klscdtonjy at 34:20.486 on ClientConnection[3b74b5b7b4961cbb/2c7aa830cff871f8(V1) with server4/193.167.100.100:443] 14.207 Original destination connection id: 3b74b5b7b4961cbb (scid: 2c7aa830cff871f8) >- CryptoStream[I|ClientHello] 14.208 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.408/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.208 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.407 loss detection timeout handler running Sending probe 0, because no ack since 14.208. Current RTT: 100/25. 14.407 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.408 (Probe is an initial retransmit) 14.408 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.808/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.408 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.807 loss detection timeout handler running Sending probe 1, because no ack since 14.408. Current RTT: 100/25. 14.807 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.807 (Probe is an initial retransmit) 14.807 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.607/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.807 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.808 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.608/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.808 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.841 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[2,0|Δ2] Padding(1141) 14.842 probe count not reset on ack because handshake not yet confirmed 14.842 Cwnd(-): 6000; inflight: 1200 14.842 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 15.642/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.842 <- (2) Packet I|2|L|1200|2 Token=[] AckFrame[3-2,0|Δ1] Padding(1141) 14.842 probe count not reset on ack because handshake not yet confirmed 14.842 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 15.230/Initial, because peerAwaitingAddressValidation | RTT:33/16 15.229 loss detection timeout handler running Sending probe 2, because no ack since 14.808. Current RTT: 33/12. 15.229 Sending probe because peer awaiting address validation 15.229 (Probe is Initial ping, because there is no Initial data to retransmit) 15.230 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 15.878/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 15.230 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 15.243 <- (3) Packet I|4|L|188|2 Token=[] AckFrame[3-2,0|Δ3211] CryptoFrame[0,123] 15.244 probe count not reset on ack because handshake not yet confirmed 15.244 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 15.892/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 -< CryptoStream[I|ServerHello] 15.243 <- (3) Packet H|2|L|1012|2 CryptoFrame[0,684] Padding(274) 15.247 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 647 millis, based on 15.895/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 15.247 -> Packet I|5|L|1201|2 Token=[] AckFrame[4,2-1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 15.249 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 647 millis, based on 15.897/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.249 -> Packet H|0|L|88|1 CryptoFrame[0,36] 15.250 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.250 Starting downloading https://server4:443/klscdtonjy at 34:21.528 on ClientConnection[3b74b5b7b4961cbb/2c7aa830cff871f8(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 80 millis, based on 15.331/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 15.250 Discarding pn space Initial because first Handshake message is being sent 15.250 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.250 -> Packet H|1|L|54|1 AckFrame[2|Δ0] 15.250 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 15.331/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 15.250 -> Packet A|0|S0|3736f9a99934cbe90021f677c94cdeb0|55|1 StreamFrame[0(CIB),0,17,fin] 15.280 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.330 loss detection timeout handler running Sending probe 0, because no ack since 15.249. Current RTT: 33/12. 15.330 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.330 (Probe is a handshake retransmit) 15.331 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 161 millis, based on 15.493/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 15.331 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 15.338 <- (6) Packet H|6|L|69|3 AckFrame[1|Δ457] PingFrame[] Padding(10) 15.338 probe count not reset on ack because handshake not yet confirmed 15.339 Retransmitting CryptoFrame[0,36] on level Handshake 15.339 Cwnd(-): 3000; inflight: 143 15.339 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 153 millis, based on 15.493/Handshake, because ackElicitingInFlight | RTT:33/12 15.339 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 161 millis, based on 15.501/Handshake, because ackElicitingInFlight | RTT:33/12 15.339 -> Packet H|3|L|88|1 CryptoFrame[0,36] 15.338 <- (7) Packet H|8|L|69|3 AckFrame[1|Δ457] PingFrame[] Padding(10) 15.339 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 80 millis, based on 15.420/Handshake, because ackElicitingInFlight | RTT:33/12 15.339 -> Packet H|4|L|54|1 AckFrame[6|Δ0] 15.339 -> Packet H|5|L|56|1 AckFrame[8,6|Δ0] 15.362 <- (8) Packet A|0|S0|2c7aa830cff871f8|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|fafe6987fb3fa383581c7790c0ace7a9|f998decc803e9f87cf926f33b4405319] NewConnectionIdFrame[2,<1|eb65868a0c384857448f522b83ae8e21|7c56c1feab8b6034eb33a45d3d62a4a8] 15.363 State is set to Confirmed reschedule loss detection timer for PTO over -6 millis, based on 15.356/App, because ackElicitingInFlight | RTT:33/12 15.363 loss detection timeout handler running Sending probe 0, because no ack since 15.250. Current RTT: 33/12. reschedule loss detection timer for PTO over -6 millis, based on 15.356/App, because ackElicitingInFlight | RTT:33/12 15.363 Discarding pn space Handshake because HandshakeDone is received 15.363 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 105 millis, based on 15.469/App, because ackElicitingInFlight | RTT:33/12 15.363 -> Packet PA|1|S0|fafe6987fb3fa383581c7790c0ace7a9|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 105 millis, based on 15.470/App, because ackElicitingInFlight | RTT:33/12 15.364 -> Packet A|2|S0|fafe6987fb3fa383581c7790c0ace7a9|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 15.396 <- (9) Packet A|1|S0|2c7aa830cff871f8|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] 15.397 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.397 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 93 millis, based on 15.491/App, because ackElicitingInFlight | RTT:33/9 15.397 -> Packet A|3|S0|fafe6987fb3fa383581c7790c0ace7a9|55|1 StreamFrame[0(CIB),0,17,fin] 15.416 -> Packet A|4|S0|fafe6987fb3fa383581c7790c0ace7a9|40|1 AckFrame[1|Δ19] 15.454 <- (10) Packet A|3|S0|2c7aa830cff871f8|45|2 AckFrame[4-3|Δ6] Padding(13) 15.454 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.507 <- (11) Packet A|5|S0|2c7aa830cff871f8|45|3 AckFrame[4-3|Δ59] PingFrame[] Padding(12) 15.508 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.507 <- (12) Packet A|7|S0|2c7aa830cff871f8|45|3 AckFrame[4-3|Δ59] PingFrame[] Padding(12) 15.508 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.508 -> Packet A|5|S0|fafe6987fb3fa383581c7790c0ace7a9|43|1 AckFrame[7,5,3|Δ0] 15.540 <- (13) Packet A|8|S0|2c7aa830cff871f8|45|3 AckFrame[5|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 15.540 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 15.540 Finished downloading https://server4:443/klscdtonjy at 34:21.819 on ClientConnection[3b74b5b7b4961cbb/2c7aa830cff871f8(V1) with server4/193.167.100.100:443] 15.540 Closing ClientConnection[3b74b5b7b4961cbb/2c7aa830cff871f8(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.540 -> Packet A|6|S0|fafe6987fb3fa383581c7790c0ace7a9|43|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 15.541 Creating connection with server4:443 with v1 15.541 Setting up connection for downloading https://server4:443/vkzviyhnlp at 34:21.820 on ClientConnection[2c64e013e671142e/32ac8a6c6a8a9b79(V1) with server4/193.167.100.100:443] 15.541 Original destination connection id: 2c64e013e671142e (scid: 32ac8a6c6a8a9b79) >- CryptoStream[I|ClientHello] 15.543 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.743/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.543 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.742 loss detection timeout handler running Sending probe 0, because no ack since 15.543. Current RTT: 100/25. 15.742 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.742 (Probe is an initial retransmit) 15.742 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 16.142/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.742 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.142 loss detection timeout handler running Sending probe 1, because no ack since 15.742. Current RTT: 100/25. 16.142 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 16.142 (Probe is an initial retransmit) 16.142 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.942/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.142 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.143 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.943/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.143 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.177 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[2|Δ11] CryptoFrame[0,123] 16.177 probe count not reset on ack because handshake not yet confirmed 16.177 Retransmitting CryptoFrame[0,257] on level Initial 16.177 Cwnd(-): 6000; inflight: 1200 16.177 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.977/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.178 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 16.586/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.178 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 16.177 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 16.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 16.589/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.180 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 16.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 16.591/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.183 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.183 Starting downloading https://server4:443/vkzviyhnlp at 34:22.462 on ClientConnection[2c64e013e671142e/32ac8a6c6a8a9b79(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 16.285/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.183 Discarding pn space Initial because first Handshake message is being sent 16.183 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 16.184 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.184 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.286/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.184 -> Packet A|0|S0|d3c8a532c02291435f3bd2e137b6d031|55|1 StreamFrame[0(CIB),0,17,fin] 16.211 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.285 loss detection timeout handler running Sending probe 0, because no ack since 16.183. Current RTT: 34/17. 16.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.285 (Probe is a handshake retransmit) 16.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 16.489/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.285 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 16.317 <- (4) Packet A|0|S0|32ac8a6c6a8a9b79|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|2bb3d1bebd2ee7a0b322d07a531e0c18|557b49b7933e060bd7c3242492a2ffd6] NewConnectionIdFrame[2,<1|c4e2a8b96342f8e7c1d09495c951cd1c|65a9455d5244f7dccd10f3ac682b9a6a] 16.317 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 16.438/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 16.311/App, because ackElicitingInFlight | RTT:34/17 16.318 Discarding pn space Handshake because HandshakeDone is received 16.318 loss detection timeout handler running Sending probe 0, because no ack since 16.184. Current RTT: 34/17. 16.318 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 16.572/App, because ackElicitingInFlight | RTT:34/17 16.318 -> Packet PA|1|S0|2bb3d1bebd2ee7a0b322d07a531e0c18|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 16.572/App, because ackElicitingInFlight | RTT:34/17 16.318 -> Packet A|2|S0|2bb3d1bebd2ee7a0b322d07a531e0c18|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 16.571 loss detection timeout handler running Sending probe 1, because no ack since 16.318. Current RTT: 34/17. 16.571 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 17.080/App, because ackElicitingInFlight | RTT:34/17 16.572 -> Packet PA|3|S0|2bb3d1bebd2ee7a0b322d07a531e0c18|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 17.081/App, because ackElicitingInFlight | RTT:34/17 16.573 -> Packet PA|4|S0|2bb3d1bebd2ee7a0b322d07a531e0c18|55|1 StreamFrame[0(CIB),0,17,fin] 16.605 <- (5) Packet A|2|S0|32ac8a6c6a8a9b79|1060|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024,fin] 16.605 Cwnd(-): 3000; inflight: 55 16.605 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 94 millis, based on 16.700/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 110 millis, based on 16.716/App, because ackElicitingInFlight | RTT:34/13 16.605 -> Packet A|5|S0|2bb3d1bebd2ee7a0b322d07a531e0c18|55|1 StreamFrame[0(CIB),0,17,fin] 16.606 Finished downloading https://server4:443/vkzviyhnlp at 34:22.884 on ClientConnection[2c64e013e671142e/32ac8a6c6a8a9b79(V1) with server4/193.167.100.100:443] 16.606 Closing ClientConnection[2c64e013e671142e/32ac8a6c6a8a9b79(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.606 -> Packet A|6|S0|2bb3d1bebd2ee7a0b322d07a531e0c18|43|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 16.606 Creating connection with server4:443 with v1 16.607 Setting up connection for downloading https://server4:443/fvesrpxwsp at 34:22.886 on ClientConnection[de5d6efa36a3307e/1b4f55f446e00040(V1) with server4/193.167.100.100:443] 16.607 Original destination connection id: de5d6efa36a3307e (scid: 1b4f55f446e00040) >- CryptoStream[I|ClientHello] 16.608 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.808/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.608 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.636 <- (6) Packet A|3|S0|32ac8a6c6a8a9b79|45|2 AckFrame[5,3-2|Δ0] Padding(12) 16.637 -> Packet A|7|S0|2bb3d1bebd2ee7a0b322d07a531e0c18|43|2 ConnectionCloseFrame[0|0|] AckFrame[2|Δ0] 16.642 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 16.643 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.843/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.645 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.642 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) reschedule loss detection timer for PTO over 101 millis, based on 16.747/Handshake, because peerAwaitingAddressValidation | RTT:34/17 16.645 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 16.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.749/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.647 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.648 Starting downloading https://server4:443/fvesrpxwsp at 34:22.927 on ClientConnection[de5d6efa36a3307e/1b4f55f446e00040(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 16.750/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.648 Discarding pn space Initial because first Handshake message is being sent 16.648 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 16.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.750/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.648 -> Packet A|0|S0|f6bef4eb73dfd9ce85ed93a229f29539|55|1 StreamFrame[0(CIB),0,17,fin] 16.681 <- (2) Packet A|1|S0|1b4f55f446e00040|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 16.682 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.784/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.682 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 16.733/Handshake, because ackElicitingInFlight | RTT:34/13 16.682 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.682 Discarding pn space Handshake because HandshakeDone is received 16.681 <- (3) Packet A|2|S0|1b4f55f446e00040|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 16.682 Finished downloading https://server4:443/fvesrpxwsp at 34:22.961 on ClientConnection[de5d6efa36a3307e/1b4f55f446e00040(V1) with server4/193.167.100.100:443] 16.683 Closing ClientConnection[de5d6efa36a3307e/1b4f55f446e00040(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.682 -> Packet A|1|S0|f6bef4eb73dfd9ce85ed93a229f29539|39|1 AckFrame[2-1|Δ0] 16.683 -> Packet A|2|S0|f6bef4eb73dfd9ce85ed93a229f29539|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 16.683 Creating connection with server4:443 with v1 16.683 Setting up connection for downloading https://server4:443/lkwscqbtkt at 34:22.962 on ClientConnection[9b45a800284e90c1/a39ef3bbf4cf7319(V1) with server4/193.167.100.100:443] 16.683 Original destination connection id: 9b45a800284e90c1 (scid: a39ef3bbf4cf7319) >- CryptoStream[I|ClientHello] 16.685 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.885/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.685 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.719 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 16.720 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.920/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.719 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 16.722 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.824/Handshake, because peerAwaitingAddressValidation | RTT:34/17 16.722 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 16.724 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.826/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.724 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.725 Starting downloading https://server4:443/lkwscqbtkt at 34:23.003 on ClientConnection[9b45a800284e90c1/a39ef3bbf4cf7319(V1) with server4/193.167.100.100:443] 16.725 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.827/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.725 Discarding pn space Initial because first Handshake message is being sent 16.725 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 16.725 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.827/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.725 -> Packet A|0|S0|81def5353c73364c5031c1955a0e2886|55|1 StreamFrame[0(CIB),0,17,fin] 16.826 loss detection timeout handler running Sending probe 0, because no ack since 16.724. Current RTT: 34/17. 16.826 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.826 (Probe is a handshake retransmit) 16.827 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 17.031/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.826 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 16.858 <- (2) Packet A|0|S0|a39ef3bbf4cf7319|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|59828c22378318561781b7a7bea322ff|fae9ed1f4f12af547423bda16ed7a4a3] NewConnectionIdFrame[2,<1|bacc488b312f2a3a242ebcef2a91eac3|fae3b37fa36dadc99bdb57b1104a9523] 16.858 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 16.979/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 16.852/App, because ackElicitingInFlight | RTT:34/17 16.859 Discarding pn space Handshake because HandshakeDone is received 16.859 loss detection timeout handler running Sending probe 0, because no ack since 16.725. Current RTT: 34/17. 16.859 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 17.113/App, because ackElicitingInFlight | RTT:34/17 16.859 -> Packet A|1|S0|59828c22378318561781b7a7bea322ff|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] reschedule loss detection timer for PTO over 253 millis, based on 17.113/App, because ackElicitingInFlight | RTT:34/17 16.859 -> Packet PA|2|S0|59828c22378318561781b7a7bea322ff|55|1 StreamFrame[0(CIB),0,17,fin] 16.916 <- (3) Packet A|1|S0|a39ef3bbf4cf7319|45|2 AckFrame[1|Δ25] Padding(13) 16.916 Cwnd(-): 6000; inflight: 55 16.916 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 69 millis, based on 16.986/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 133 millis, based on 17.050/App, because ackElicitingInFlight | RTT:37/18 16.916 -> Packet A|3|S0|59828c22378318561781b7a7bea322ff|55|1 StreamFrame[0(CIB),0,17,fin] 16.948 <- (4) Packet A|2|S0|a39ef3bbf4cf7319|45|2 AckFrame[3,1|Δ0] Padding(12) 16.948 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.949 <- (5) Packet A|4|S0|a39ef3bbf4cf7319|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 16.969 -> Packet A|4|S0|59828c22378318561781b7a7bea322ff|42|1 AckFrame[4,2-1|Δ19] 17.067 <- (6) Packet A|6|S0|a39ef3bbf4cf7319|45|3 AckFrame[3,1|Δ119] PingFrame[] Padding(10) 17.068 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.068 <- (7) Packet A|8|S0|a39ef3bbf4cf7319|45|3 AckFrame[3,1|Δ119] PingFrame[] Padding(10) 17.068 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.068 -> Packet A|5|S0|59828c22378318561781b7a7bea322ff|45|1 AckFrame[8,6,4,2-1|Δ0] 17.101 <- (8) Packet A|9|S0|a39ef3bbf4cf7319|1059|2 AckFrame[5|Δ0] StreamFrame[0(CIB),0,1024,fin] 17.101 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.101 Finished downloading https://server4:443/lkwscqbtkt at 34:23.380 on ClientConnection[9b45a800284e90c1/a39ef3bbf4cf7319(V1) with server4/193.167.100.100:443] 17.102 Closing ClientConnection[9b45a800284e90c1/a39ef3bbf4cf7319(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.102 -> Packet A|6|S0|59828c22378318561781b7a7bea322ff|43|2 ConnectionCloseFrame[0|0|] AckFrame[9|Δ0] 17.102 Creating connection with server4:443 with v1 17.103 Setting up connection for downloading https://server4:443/uyinfxerlh at 34:23.382 on ClientConnection[14a40ed41606f220/7def35ef59c0eb12(V1) with server4/193.167.100.100:443] 17.103 Original destination connection id: 14a40ed41606f220 (scid: 7def35ef59c0eb12) >- CryptoStream[I|ClientHello] 17.104 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.304/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.104 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.138 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 17.139 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.339/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 17.138 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 17.141 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.243/Handshake, because peerAwaitingAddressValidation | RTT:34/17 17.141 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 17.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.245/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.143 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.144 Starting downloading https://server4:443/uyinfxerlh at 34:23.422 on ClientConnection[14a40ed41606f220/7def35ef59c0eb12(V1) with server4/193.167.100.100:443] 17.144 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 17.144 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.246/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.144 Discarding pn space Initial because first Handshake message is being sent 17.144 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 17.246/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.144 -> Packet A|0|S0|feb21e69cb9ef89a91dbc39d99fc0f6d|55|1 StreamFrame[0(CIB),0,17,fin] 17.245 loss detection timeout handler running Sending probe 0, because no ack since 17.143. Current RTT: 34/17. 17.245 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.245 (Probe is a handshake retransmit) 17.246 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 17.450/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.246 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 17.449 loss detection timeout handler running Sending probe 1, because no ack since 17.144. Current RTT: 34/17. 17.449 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.449 (Probe is a handshake retransmit) 17.449 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 17.857/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.449 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 17.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 17.858/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.450 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 17.857 loss detection timeout handler running Sending probe 2, because no ack since 17.144. Current RTT: 34/17. 17.857 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.858 (Probe is a handshake retransmit) 17.858 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 18.674/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.858 -> Packet PH|5|L|88|1 CryptoFrame[0,36] 17.859 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 18.675/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 17.859 -> Packet PH|6|L|88|1 CryptoFrame[0,36] 17.890 <- (2) Packet A|0|S0|7def35ef59c0eb12|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|f329a9cb786ff95b310bffc32e4059eb|6ea477cdca1288802836b467114eb14e] NewConnectionIdFrame[2,<1|32c17835893a31c31b0935b6548b610b|c2fdc5f48dba36c691fc7582555d3a02] 17.890 State is set to Confirmed reschedule loss detection timer for PTO over 270 millis, based on 18.160/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -619 millis, based on 17.271/App, because ackElicitingInFlight | RTT:34/17 17.890 loss detection timeout handler running 17.890 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 17.144. Current RTT: 34/17. 17.890 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 18.144/App, because ackElicitingInFlight | RTT:34/17 17.890 -> Packet PA|1|S0|f329a9cb786ff95b310bffc32e4059eb|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 18.145/App, because ackElicitingInFlight | RTT:34/17 17.891 -> Packet A|2|S0|f329a9cb786ff95b310bffc32e4059eb|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 17.948 <- (3) Packet A|1|S0|7def35ef59c0eb12|45|2 AckFrame[2|Δ25] Padding(13) 17.948 Cwnd(-): 6000; inflight: 0 17.948 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.948 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 133 millis, based on 18.082/App, because ackElicitingInFlight | RTT:37/18 17.948 -> Packet A|3|S0|f329a9cb786ff95b310bffc32e4059eb|55|1 StreamFrame[0(CIB),0,17,fin] 17.981 <- (4) Packet A|2|S0|7def35ef59c0eb12|1060|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024] 17.981 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.001 -> Packet A|4|S0|f329a9cb786ff95b310bffc32e4059eb|40|1 AckFrame[2-1|Δ19] 18.103 <- (5) Packet A|5|S0|7def35ef59c0eb12|45|3 AckFrame[4|Δ71] PingFrame[] Padding(12) 18.103 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.123 -> Packet A|5|S0|f329a9cb786ff95b310bffc32e4059eb|40|1 AckFrame[5|Δ19] 18.154 <- (6) Packet A|8|S0|7def35ef59c0eb12|45|3 AckFrame[5|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 18.155 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.155 Finished downloading https://server4:443/uyinfxerlh at 34:24.434 on ClientConnection[14a40ed41606f220/7def35ef59c0eb12(V1) with server4/193.167.100.100:443] 18.155 Closing ClientConnection[14a40ed41606f220/7def35ef59c0eb12(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.155 -> Packet A|6|S0|f329a9cb786ff95b310bffc32e4059eb|43|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 18.156 Creating connection with server4:443 with v1 18.156 Setting up connection for downloading https://server4:443/amoextmuci at 34:24.435 on ClientConnection[596b57ccd1dc80ea/20a4456afa85bf38(V1) with server4/193.167.100.100:443] 18.156 Original destination connection id: 596b57ccd1dc80ea (scid: 20a4456afa85bf38) >- CryptoStream[I|ClientHello] 18.157 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.358/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.157 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.192 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 18.192 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.392/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.195 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.192 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) reschedule loss detection timer for PTO over 101 millis, based on 18.297/Handshake, because peerAwaitingAddressValidation | RTT:34/17 18.195 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 18.197 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.299/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.197 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.197 Starting downloading https://server4:443/amoextmuci at 34:24.476 on ClientConnection[596b57ccd1dc80ea/20a4456afa85bf38(V1) with server4/193.167.100.100:443] 18.197 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.299/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.197 Discarding pn space Initial because first Handshake message is being sent 18.197 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 18.198 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.300/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.198 -> Packet A|0|S0|4e0a2b5ecdd8e9186fa5679be94f6492|55|1 StreamFrame[0(CIB),0,17,fin] 18.229 <- (2) Packet A|0|S0|20a4456afa85bf38|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|3a11940f4d4d4bd7a23ae3413ed398fe|b015e1d8c0f01e1dbf74861cee36f65b] NewConnectionIdFrame[2,<1|7b762c7e10e378b3aca8883adc4ede82|7820951cb69f404ea59645cc714a4cb0] 18.229 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 18.299/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 18.325/App, because ackElicitingInFlight | RTT:34/17 18.229 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 18.356/App, because ackElicitingInFlight | RTT:34/17 18.229 -> Packet A|1|S0|3a11940f4d4d4bd7a23ae3413ed398fe|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 18.355 loss detection timeout handler running Sending probe 0, because no ack since 18.229. Current RTT: 34/17. 18.356 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 18.610/App, because ackElicitingInFlight | RTT:34/17 18.356 -> Packet PA|2|S0|3a11940f4d4d4bd7a23ae3413ed398fe|55|1 StreamFrame[0(CIB),0,17,fin] 18.364 <- (3) Packet A|4|S0|20a4456afa85bf38|45|3 AckFrame[0|Δ134] HandshakeDoneFrame[] Padding(10) reschedule loss detection timer for PTO over 118 millis, based on 18.483/App, because ackElicitingInFlight | RTT:34/17 18.384 -> Packet A|3|S0|3a11940f4d4d4bd7a23ae3413ed398fe|42|1 AckFrame[4,0|Δ19] 18.483 loss detection timeout handler running Sending probe 0, because no ack since 18.356. Current RTT: 47/40. 18.483 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 463 millis, based on 18.947/App, because ackElicitingInFlight | RTT:47/40 18.483 -> Packet PA|4|S0|3a11940f4d4d4bd7a23ae3413ed398fe|37|2 RetireConnectionIdFrame[0] Padding(1) 18.541 <- (4) Packet A|9|S0|20a4456afa85bf38|45|2 AckFrame[4-2,0|Δ26] Padding(11) 18.541 Cwnd(-): 6000; inflight: 0 18.541 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 204 millis, based on 18.746/App, because ackElicitingInFlight | RTT:48/33 18.541 -> Packet A|5|S0|3a11940f4d4d4bd7a23ae3413ed398fe|37|2 RetireConnectionIdFrame[0] Padding(1) 18.545 <- (5) Packet A|11|S0|20a4456afa85bf38|45|3 AckFrame[4-2,0|Δ31] PingFrame[] Padding(10) reschedule loss detection timer for PTO over 200 millis, based on 18.746/App, because ackElicitingInFlight | RTT:48/33 18.565 -> Packet A|6|S0|3a11940f4d4d4bd7a23ae3413ed398fe|42|1 AckFrame[11,9|Δ19] 18.723 <- (6) Packet A|18|S0|20a4456afa85bf38|45|3 AckFrame[6-2,0|Δ126] PingFrame[] Padding(10) 18.723 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.743 -> Packet A|7|S0|3a11940f4d4d4bd7a23ae3413ed398fe|40|1 AckFrame[18|Δ19] 18.897 <- (7) Packet A|21|S0|20a4456afa85bf38|45|3 AckFrame[7|Δ122] PingFrame[] Padding(12) 18.897 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.897 <- (8) Packet A|23|S0|20a4456afa85bf38|45|3 AckFrame[7|Δ122] PingFrame[] Padding(12) 18.898 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.898 -> Packet A|8|S0|3a11940f4d4d4bd7a23ae3413ed398fe|41|1 AckFrame[23,21|Δ0] 18.930 <- (9) Packet A|24|S0|20a4456afa85bf38|1059|2 AckFrame[8|Δ0] StreamFrame[0(CIB),0,1024,fin] 18.931 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.931 Finished downloading https://server4:443/amoextmuci at 34:25.210 on ClientConnection[596b57ccd1dc80ea/20a4456afa85bf38(V1) with server4/193.167.100.100:443] 18.931 Closing ClientConnection[596b57ccd1dc80ea/20a4456afa85bf38(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.931 -> Packet A|9|S0|3a11940f4d4d4bd7a23ae3413ed398fe|43|2 ConnectionCloseFrame[0|0|] AckFrame[24|Δ0] 18.932 Creating connection with server4:443 with v1 18.932 Setting up connection for downloading https://server4:443/ukvzzgilfn at 34:25.211 on ClientConnection[5b7da082be981f6d/de081d02d1e75c47(V1) with server4/193.167.100.100:443] 18.932 Original destination connection id: 5b7da082be981f6d (scid: de081d02d1e75c47) >- CryptoStream[I|ClientHello] 18.934 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.134/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.934 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.968 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 18.968 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.168/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.968 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) 18.971 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.073/Handshake, because peerAwaitingAddressValidation | RTT:34/17 18.971 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 18.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.076/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.974 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.974 Starting downloading https://server4:443/ukvzzgilfn at 34:25.253 on ClientConnection[5b7da082be981f6d/de081d02d1e75c47(V1) with server4/193.167.100.100:443] 18.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.076/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.974 Discarding pn space Initial because first Handshake message is being sent 18.975 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.077/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.975 -> [Packet H|1|L|54|1 AckFrame[0|Δ0], Packet A|0|S0|9ed293dacae24832e829eebc17883239|55|1 StreamFrame[0(CIB),0,17,fin]] 19.005 <- (2) Packet A|0|S0|de081d02d1e75c47|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|ee8daf55daff6b6e80741b518847ec32|fef0c268e39ccfabe14d2c11fbcce20d] NewConnectionIdFrame[2,<1|839cdd38d0013cbb206feb5ad48906e4|2bc51a096ab32ac9337d9d627af049ce] 19.006 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 19.076/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 19.102/App, because ackElicitingInFlight | RTT:34/17 19.006 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 19.133/App, because ackElicitingInFlight | RTT:34/17 19.006 -> Packet A|1|S0|ee8daf55daff6b6e80741b518847ec32|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 19.007 <- (3) Packet A|1|S0|de081d02d1e75c47|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 19.133/App, because ackElicitingInFlight | RTT:34/17 19.026 -> Packet A|2|S0|ee8daf55daff6b6e80741b518847ec32|40|1 AckFrame[1-0|Δ18] 19.044 <- (10) Packet A|26|S0|20a4456afa85bf38|45|3 AckFrame[8|Δ114] PingFrame[] Padding(12) 19.044 -> Packet A|10|S0|3a11940f4d4d4bd7a23ae3413ed398fe|43|2 ConnectionCloseFrame[0|0|] AckFrame[24|Δ0] 19.064 <- (4) Packet A|3|S0|de081d02d1e75c47|45|2 AckFrame[1-0|Δ26] Padding(13) 19.064 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.126 <- (5) Packet A|7|S0|de081d02d1e75c47|45|3 AckFrame[1-0|Δ88] PingFrame[] Padding(12) 19.127 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.146 -> Packet A|3|S0|ee8daf55daff6b6e80741b518847ec32|44|1 AckFrame[7,3,1|Δ19] 19.365 <- (6) Packet A|9|S0|de081d02d1e75c47|45|3 AckFrame[1-0|Δ327] PingFrame[] Padding(10) 19.365 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.365 <- (7) Packet A|11|S0|de081d02d1e75c47|45|3 AckFrame[1-0|Δ327] PingFrame[] Padding(10) 19.366 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.366 -> Packet A|4|S0|ee8daf55daff6b6e80741b518847ec32|47|1 AckFrame[11,9,7,3,1|Δ0] 19.841 <- (8) Packet A|15|S0|de081d02d1e75c47|45|3 AckFrame[1-0|Δ803] PingFrame[] Padding(10) 19.841 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.861 -> Packet A|5|S0|ee8daf55daff6b6e80741b518847ec32|50|1 AckFrame[15,11,9,7,3,1|Δ19] 19.892 <- (9) Packet A|16|S0|de081d02d1e75c47|45|3 AckFrame[5|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(8) 19.893 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.893 Finished downloading https://server4:443/ukvzzgilfn at 34:26.172 on ClientConnection[5b7da082be981f6d/de081d02d1e75c47(V1) with server4/193.167.100.100:443] 19.893 Closing ClientConnection[5b7da082be981f6d/de081d02d1e75c47(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.893 -> Packet A|6|S0|ee8daf55daff6b6e80741b518847ec32|43|2 ConnectionCloseFrame[0|0|] AckFrame[16|Δ0] 19.894 Creating connection with server4:443 with v1 19.894 Setting up connection for downloading https://server4:443/ucppgywftv at 34:26.173 on ClientConnection[25e8ac83d5b4bef0/a2b3187caa61d853(V1) with server4/193.167.100.100:443] 19.894 Original destination connection id: 25e8ac83d5b4bef0 (scid: a2b3187caa61d853) >- CryptoStream[I|ClientHello] 19.896 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.096/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.896 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.095 loss detection timeout handler running Sending probe 0, because no ack since 19.896. Current RTT: 100/25. 20.095 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.095 (Probe is an initial retransmit) 20.096 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.496/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.095 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.495 loss detection timeout handler running Sending probe 1, because no ack since 20.095. Current RTT: 100/25. 20.495 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.495 (Probe is an initial retransmit) 20.495 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.295/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.495 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.496 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.296/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.496 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.530 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[2|Δ12] CryptoFrame[0,123] 20.531 probe count not reset on ack because handshake not yet confirmed 20.531 Retransmitting CryptoFrame[0,257] on level Initial 20.531 Cwnd(-): 6000; inflight: 1200 20.531 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 21.331/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.531 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 20.939/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.531 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 20.534 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 20.942/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.534 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) 20.530 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) >- CryptoStream[H|Finished] 20.536 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 20.945/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.536 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.537 Starting downloading https://server4:443/ucppgywftv at 34:26.816 on ClientConnection[25e8ac83d5b4bef0/a2b3187caa61d853(V1) with server4/193.167.100.100:443] 20.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.639/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.537 Discarding pn space Initial because first Handshake message is being sent 20.537 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 20.537 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.537 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.639/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.537 -> Packet A|0|S0|9e202dba5481e33805775464fdb6a78f|55|1 StreamFrame[0(CIB),0,17,fin] 20.570 <- (3) Packet A|2|S0|a2b3187caa61d853|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 20.570 State is set to Confirmed reschedule loss detection timer for PTO over 68 millis, based on 20.638/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 93 millis, based on 20.664/App, because ackElicitingInFlight | RTT:34/17 20.570 Discarding pn space Handshake because HandshakeDone is received 20.590 -> Packet A|1|S0|9e202dba5481e33805775464fdb6a78f|40|1 AckFrame[2|Δ19] 20.664 loss detection timeout handler running Sending probe 0, because no ack since 20.537. Current RTT: 34/17. 20.664 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 20.918/App, because ackElicitingInFlight | RTT:34/17 20.664 -> Packet PA|2|S0|9e202dba5481e33805775464fdb6a78f|55|1 StreamFrame[0(CIB),0,17,fin] 20.720 <- (4) Packet A|4|S0|a2b3187caa61d853|45|2 AckFrame[2-0|Δ25] Padding(13) 20.721 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.805 <- (5) Packet A|6|S0|a2b3187caa61d853|45|3 AckFrame[2-0|Δ110] PingFrame[] Padding(12) 20.806 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 20.825 -> Packet A|3|S0|9e202dba5481e33805775464fdb6a78f|42|1 AckFrame[6,4|Δ19] 21.011 <- (6) Packet A|11|S0|a2b3187caa61d853|45|3 AckFrame[3-0|Δ154] PingFrame[] Padding(10) 21.011 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.011 <- (7) Packet A|13|S0|a2b3187caa61d853|45|3 AckFrame[3-0|Δ154] PingFrame[] Padding(10) 21.012 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.012 -> Packet A|4|S0|9e202dba5481e33805775464fdb6a78f|41|1 AckFrame[13,11|Δ0] 21.317 <- (8) Packet A|15|S0|a2b3187caa61d853|45|3 AckFrame[3-0|Δ460] PingFrame[] Padding(10) 21.318 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.317 <- (9) Packet A|17|S0|a2b3187caa61d853|45|3 AckFrame[3-0|Δ460] PingFrame[] Padding(10) 21.318 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.318 -> Packet A|5|S0|9e202dba5481e33805775464fdb6a78f|45|1 AckFrame[17,15,13,11|Δ0] 21.502 <- (10) Packet A|22|S0|a2b3187caa61d853|45|3 AckFrame[5|Δ152] PingFrame[] Padding(10) 21.502 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.522 -> Packet A|6|S0|9e202dba5481e33805775464fdb6a78f|40|1 AckFrame[22|Δ19] 21.554 <- (11) Packet A|23|S0|a2b3187caa61d853|1131|4 AckFrame[6|Δ0] NewConnectionIdFrame[1,<1|23eeb1bdb408c5bbdb1a2cf9096f9e1a|4b7a9a022de9a908c9ddb29b09e109c8] NewConnectionIdFrame[2,<1|1020726fe0ea53e030a84b31042c6f98|371c6c4c0eb8ce066f73bd1bfedf869f] StreamFrame[0(CIB),0,1024,fin] 21.555 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 133 millis, based on 21.689/App, because ackElicitingInFlight | RTT:37/18 21.555 Finished downloading https://server4:443/ucppgywftv at 34:27.834 on ClientConnection[25e8ac83d5b4bef0/a2b3187caa61d853(V1) with server4/193.167.100.100:443] 21.555 -> Packet A|7|S0|23eeb1bdb408c5bbdb1a2cf9096f9e1a|41|2 RetireConnectionIdFrame[0] AckFrame[23|Δ0] 21.555 Closing ClientConnection[25e8ac83d5b4bef0/a2b3187caa61d853(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.555 -> Packet A|8|S0|23eeb1bdb408c5bbdb1a2cf9096f9e1a|43|2 ConnectionCloseFrame[0|0|] AckFrame[23|Δ0] 21.556 Creating connection with server4:443 with v1 21.556 Setting up connection for downloading https://server4:443/boukwwkhtb at 34:27.835 on ClientConnection[8db15c56ee6f6680/272914cad995edd0(V1) with server4/193.167.100.100:443] 21.556 Original destination connection id: 8db15c56ee6f6680 (scid: 272914cad995edd0) >- CryptoStream[I|ClientHello] 21.558 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.758/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.557 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.757 loss detection timeout handler running Sending probe 0, because no ack since 21.557. Current RTT: 100/25. 21.757 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.757 (Probe is an initial retransmit) 21.757 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.157/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.757 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.791 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ10] CryptoFrame[0,123] 21.792 probe count not reset on ack because handshake not yet confirmed 21.792 Retransmitting CryptoFrame[0,257] on level Initial 21.792 Cwnd(-): 6000; inflight: 0 21.792 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 22.192/Initial, because peerAwaitingAddressValidation | RTT:100/25 21.792 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 21.996/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.792 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 21.795 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.791 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) reschedule loss detection timer for PTO over 203 millis, based on 21.999/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.795 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 21.797 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 22.001/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.797 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.798 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.798 Starting downloading https://server4:443/boukwwkhtb at 34:28.076 on ClientConnection[8db15c56ee6f6680/272914cad995edd0(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 21.900/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.798 Discarding pn space Initial because first Handshake message is being sent 21.798 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 21.798 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.900/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.798 -> Packet A|0|S0|46ff5086ca89d3aa2047b815a32f8fe1|55|1 StreamFrame[0(CIB),0,17,fin] 21.826 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.899 loss detection timeout handler running Sending probe 0, because no ack since 21.797. Current RTT: 34/17. 21.899 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.899 (Probe is a handshake retransmit) 21.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 22.104/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.899 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 21.931 <- (3) Packet A|0|S0|272914cad995edd0|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|eb88bfea4f4741d6e4f581e8964ef5b2|ae5bd42811ba7ef35a5f3948080c22a3] NewConnectionIdFrame[2,<1|46fa01410e3d5e23c4fb6c2b166b9fd0|74e86539546f3a2c00acc38f7433a0b0] 21.932 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 22.052/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 21.925/App, because ackElicitingInFlight | RTT:34/17 21.932 loss detection timeout handler running Sending probe 0, because no ack since 21.798. Current RTT: 34/17. 21.932 Discarding pn space Handshake because HandshakeDone is received 21.932 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 22.186/App, because ackElicitingInFlight | RTT:34/17 21.932 -> Packet PA|1|S0|eb88bfea4f4741d6e4f581e8964ef5b2|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 22.186/App, because ackElicitingInFlight | RTT:34/17 21.932 -> Packet A|2|S0|eb88bfea4f4741d6e4f581e8964ef5b2|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 21.965 <- (4) Packet A|1|S0|272914cad995edd0|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] 21.966 Cwnd(-): 3000; inflight: 0 21.966 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 21.966 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 22.077/App, because ackElicitingInFlight | RTT:34/13 21.966 -> Packet A|3|S0|eb88bfea4f4741d6e4f581e8964ef5b2|55|1 StreamFrame[0(CIB),0,17,fin] 21.985 -> Packet A|4|S0|eb88bfea4f4741d6e4f581e8964ef5b2|40|1 AckFrame[1|Δ19] 22.023 <- (5) Packet A|3|S0|272914cad995edd0|45|2 AckFrame[3-1|Δ26] Padding(13) 22.024 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.073 <- (6) Packet A|5|S0|272914cad995edd0|45|3 AckFrame[3-1|Δ76] PingFrame[] Padding(12) 22.074 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.073 <- (7) Packet A|7|S0|272914cad995edd0|45|3 AckFrame[3-1|Δ76] PingFrame[] Padding(12) 22.074 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.074 -> Packet A|5|S0|eb88bfea4f4741d6e4f581e8964ef5b2|45|1 AckFrame[7,5,3,1|Δ0] 22.106 <- (8) Packet A|8|S0|272914cad995edd0|45|3 AckFrame[5|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 22.106 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.106 Finished downloading https://server4:443/boukwwkhtb at 34:28.385 on ClientConnection[8db15c56ee6f6680/272914cad995edd0(V1) with server4/193.167.100.100:443] 22.106 Closing ClientConnection[8db15c56ee6f6680/272914cad995edd0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.107 -> Packet A|6|S0|eb88bfea4f4741d6e4f581e8964ef5b2|43|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 22.107 Creating connection with server4:443 with v1 22.108 Setting up connection for downloading https://server4:443/kxdptgtrsl at 34:28.386 on ClientConnection[948436563c43fc58/dfe3860ad094aff4(V1) with server4/193.167.100.100:443] 22.108 Original destination connection id: 948436563c43fc58 (scid: dfe3860ad094aff4) >- CryptoStream[I|ClientHello] 22.109 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.309/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.109 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.143 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 22.143 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.344/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 22.143 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 22.146 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.248/Handshake, because peerAwaitingAddressValidation | RTT:34/17 22.146 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 22.148 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.250/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.148 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 22.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.251/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.149 Starting downloading https://server4:443/kxdptgtrsl at 34:28.428 on ClientConnection[948436563c43fc58/dfe3860ad094aff4(V1) with server4/193.167.100.100:443] 22.149 Discarding pn space Initial because first Handshake message is being sent 22.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 22.251/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.149 -> [Packet H|1|L|54|1 AckFrame[0|Δ0], Packet A|0|S0|80a7c7f6671ffd9198dbeb26881f50aa|55|1 StreamFrame[0(CIB),0,17,fin]] 22.251 loss detection timeout handler running Sending probe 0, because no ack since 22.148. Current RTT: 34/17. 22.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.251 (Probe is a handshake retransmit) 22.251 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 22.455/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.251 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 22.283 <- (2) Packet A|0|S0|dfe3860ad094aff4|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|ae32d7c1d1ced2d6338e42a4e48e9cad|d9a6bde3a5869dcdb9024152b880fc1d] NewConnectionIdFrame[2,<1|1dbba7cec84666338fb431bf1d0f6f57|4d091d41743c6e6f94e154da9e15d17a] 22.283 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 22.403/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 22.276/App, because ackElicitingInFlight | RTT:34/17 22.283 Discarding pn space Handshake because HandshakeDone is received 22.283 loss detection timeout handler running Sending probe 0, because no ack since 22.149. Current RTT: 34/17. 22.283 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 22.537/App, because ackElicitingInFlight | RTT:34/17 22.283 -> Packet PA|1|S0|ae32d7c1d1ced2d6338e42a4e48e9cad|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 22.538/App, because ackElicitingInFlight | RTT:34/17 22.284 -> Packet A|2|S0|ae32d7c1d1ced2d6338e42a4e48e9cad|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 22.537 loss detection timeout handler running Sending probe 1, because no ack since 22.284. Current RTT: 34/17. 22.537 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 23.045/App, because ackElicitingInFlight | RTT:34/17 22.537 -> Packet PA|3|S0|ae32d7c1d1ced2d6338e42a4e48e9cad|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 23.046/App, because ackElicitingInFlight | RTT:34/17 22.538 -> Packet PA|4|S0|ae32d7c1d1ced2d6338e42a4e48e9cad|55|1 StreamFrame[0(CIB),0,17,fin] 23.045 loss detection timeout handler running Sending probe 2, because no ack since 22.538. Current RTT: 34/17. 23.045 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1015 millis, based on 24.062/App, because ackElicitingInFlight | RTT:34/17 23.046 -> Packet PA|5|S0|ae32d7c1d1ced2d6338e42a4e48e9cad|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1015 millis, based on 24.063/App, because ackElicitingInFlight | RTT:34/17 23.047 -> Packet PA|6|S0|ae32d7c1d1ced2d6338e42a4e48e9cad|55|1 StreamFrame[0(CIB),0,17,fin] 23.077 <- (3) Packet A|2|S0|dfe3860ad094aff4|45|2 AckFrame[5,2|Δ0] Padding(12) 23.078 Cwnd(-): 6000; inflight: 55 23.078 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 95 millis, based on 23.174/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 114 millis, based on 23.193/App, because ackElicitingInFlight | RTT:34/14 23.078 -> Packet A|7|S0|ae32d7c1d1ced2d6338e42a4e48e9cad|55|1 StreamFrame[0(CIB),0,17,fin] 23.079 <- (4) Packet A|3|S0|dfe3860ad094aff4|1061|2 AckFrame[6-5,2|Δ0] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 113 millis, based on 23.193/App, because ackElicitingInFlight | RTT:34/14 23.079 <- (5) Packet A|4|S0|dfe3860ad094aff4|45|3 AckFrame[6-5,2|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(6) reschedule loss detection timer for PTO over 101 millis, based on 23.181/App, because ackElicitingInFlight | RTT:34/11 23.080 -> Packet A|8|S0|ae32d7c1d1ced2d6338e42a4e48e9cad|39|1 AckFrame[4-2|Δ0] 23.080 Finished downloading https://server4:443/kxdptgtrsl at 34:29.359 on ClientConnection[948436563c43fc58/dfe3860ad094aff4(V1) with server4/193.167.100.100:443] 23.080 Closing ClientConnection[948436563c43fc58/dfe3860ad094aff4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.081 -> Packet A|9|S0|ae32d7c1d1ced2d6338e42a4e48e9cad|43|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 23.081 Creating connection with server4:443 with v1 23.081 Setting up connection for downloading https://server4:443/pvwtyarukg at 34:29.360 on ClientConnection[9925acd542c59682/c76a62680db127c0(V1) with server4/193.167.100.100:443] 23.081 Original destination connection id: 9925acd542c59682 (scid: c76a62680db127c0) >- CryptoStream[I|ClientHello] 23.082 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.282/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.082 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.117 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 23.117 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.317/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.117 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) 23.119 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.221/Handshake, because peerAwaitingAddressValidation | RTT:34/17 23.119 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 23.121 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.223/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.121 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.122 Starting downloading https://server4:443/pvwtyarukg at 34:29.400 on ClientConnection[9925acd542c59682/c76a62680db127c0(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 23.224/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.122 Discarding pn space Initial because first Handshake message is being sent 23.122 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 23.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.224/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.122 -> Packet A|0|S0|1cb98d9342474f4bed766ea4e8001b12|55|1 StreamFrame[0(CIB),0,17,fin] 23.223 loss detection timeout handler running Sending probe 0, because no ack since 23.121. Current RTT: 34/17. 23.223 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.223 (Probe is a handshake retransmit) 23.224 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 23.428/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.223 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 23.285 <- (2) Packet A|2|S0|c76a62680db127c0|45|2 HandshakeDoneFrame[] Padding(18) 23.285 State is set to Confirmed reschedule loss detection timer for PTO over 90 millis, based on 23.376/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -36 millis, based on 23.249/App, because ackElicitingInFlight | RTT:34/17 23.286 Discarding pn space Handshake because HandshakeDone is received 23.286 loss detection timeout handler running Sending probe 0, because no ack since 23.122. Current RTT: 34/17. 23.286 (Probe is retransmit on level App) 23.285 <- (3) Packet A|4|S0|c76a62680db127c0|45|2 HandshakeDoneFrame[] Padding(18) reschedule loss detection timer for PTO over 253 millis, based on 23.540/App, because ackElicitingInFlight | RTT:34/17 23.286 -> Packet PA|1|S0|1cb98d9342474f4bed766ea4e8001b12|55|1 StreamFrame[0(CIB),0,17,fin] 23.286 -> Packet A|2|S0|1cb98d9342474f4bed766ea4e8001b12|41|1 AckFrame[4,2|Δ0] 23.319 <- (4) Packet A|6|S0|c76a62680db127c0|1054|1 StreamFrame[0(CIB),0,1024] 23.319 <- (5) Packet A|7|S0|c76a62680db127c0|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 23.320 Finished downloading https://server4:443/pvwtyarukg at 34:29.598 on ClientConnection[9925acd542c59682/c76a62680db127c0(V1) with server4/193.167.100.100:443] 23.320 Closing ClientConnection[9925acd542c59682/c76a62680db127c0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.320 -> Packet A|3|S0|1cb98d9342474f4bed766ea4e8001b12|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4,2|Δ0] 23.320 Creating connection with server4:443 with v1 23.321 Setting up connection for downloading https://server4:443/mnfxljnghd at 34:29.600 on ClientConnection[827aae8aad0b9548/b7fcbe7b29eeddba(V1) with server4/193.167.100.100:443] 23.321 Original destination connection id: 827aae8aad0b9548 (scid: b7fcbe7b29eeddba) >- CryptoStream[I|ClientHello] 23.322 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.522/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.322 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.357 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 23.357 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.557/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.357 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) 23.360 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.462/Handshake, because peerAwaitingAddressValidation | RTT:34/17 23.360 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 23.362 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.464/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.362 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.362 Starting downloading https://server4:443/mnfxljnghd at 34:29.641 on ClientConnection[827aae8aad0b9548/b7fcbe7b29eeddba(V1) with server4/193.167.100.100:443] 23.362 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.464/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.362 Discarding pn space Initial because first Handshake message is being sent 23.362 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 23.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.465/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.362 -> Packet A|0|S0|5a4472c1b71cfdcb3e7d4b9d9a090887|55|1 StreamFrame[0(CIB),0,17,fin] 23.437 <- (6) Packet A|9|S0|c76a62680db127c0|45|3 AckFrame[2-1|Δ119] PingFrame[] Padding(12) 23.437 <- (7) Packet A|11|S0|c76a62680db127c0|45|3 AckFrame[2-1|Δ119] PingFrame[] Padding(12) 23.437 -> Packet A|4|S0|1cb98d9342474f4bed766ea4e8001b12|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4,2|Δ0] 23.437 -> Packet A|5|S0|1cb98d9342474f4bed766ea4e8001b12|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4,2|Δ0] 23.464 loss detection timeout handler running Sending probe 0, because no ack since 23.362. Current RTT: 34/17. 23.464 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.464 (Probe is a handshake retransmit) 23.464 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 23.668/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.464 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 23.527 <- (2) Packet A|4|S0|b7fcbe7b29eeddba|45|2 HandshakeDoneFrame[] Padding(18) 23.528 State is set to Confirmed reschedule loss detection timer for PTO over 88 millis, based on 23.616/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -38 millis, based on 23.489/App, because ackElicitingInFlight | RTT:34/17 23.528 Discarding pn space Handshake because HandshakeDone is received 23.528 loss detection timeout handler running Sending probe 0, because no ack since 23.362. Current RTT: 34/17. 23.528 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 23.782/App, because ackElicitingInFlight | RTT:34/17 23.528 -> Packet PA|1|S0|5a4472c1b71cfdcb3e7d4b9d9a090887|55|1 StreamFrame[0(CIB),0,17,fin] 23.547 -> Packet A|2|S0|5a4472c1b71cfdcb3e7d4b9d9a090887|40|1 AckFrame[4|Δ19] 23.561 <- (3) Packet A|5|S0|b7fcbe7b29eeddba|1061|3 AckFrame[1|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 23.561 Cwnd(-): 6000; inflight: 0 23.561 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 23.561 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 23.672/App, because ackElicitingInFlight | RTT:34/13 23.561 -> Packet A|3|S0|5a4472c1b71cfdcb3e7d4b9d9a090887|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4|Δ0] 23.561 <- (4) Packet A|6|S0|b7fcbe7b29eeddba|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 23.561 -> Packet A|4|S0|5a4472c1b71cfdcb3e7d4b9d9a090887|39|1 AckFrame[6-4|Δ0] 23.562 Finished downloading https://server4:443/mnfxljnghd at 34:29.840 on ClientConnection[827aae8aad0b9548/b7fcbe7b29eeddba(V1) with server4/193.167.100.100:443] 23.562 Closing ClientConnection[827aae8aad0b9548/b7fcbe7b29eeddba(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.562 -> Packet A|5|S0|5a4472c1b71cfdcb3e7d4b9d9a090887|43|2 ConnectionCloseFrame[0|0|] AckFrame[6-4|Δ0] 23.562 Creating connection with server4:443 with v1 23.563 Setting up connection for downloading https://server4:443/csfkxwpbug at 34:29.842 on ClientConnection[defb0e4ebc1b4f56/a4ed0008b0b684a6(V1) with server4/193.167.100.100:443] 23.563 Original destination connection id: defb0e4ebc1b4f56 (scid: a4ed0008b0b684a6) >- CryptoStream[I|ClientHello] 23.564 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.764/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.564 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.593 <- (5) Packet A|7|S0|b7fcbe7b29eeddba|103|3 AckFrame[4|Δ0] NewConnectionIdFrame[1,<1|80684f52355f92cc64d4eef356f5ae3b|e045d98773b97ea5f833b1a6a67b91d6] NewConnectionIdFrame[2,<1|a078f067b5208bcd11d61b32d67f662c|857e0d12eebcfa109d0641e34af9fb9b] 23.593 -> Packet A|6|S0|5a4472c1b71cfdcb3e7d4b9d9a090887|43|2 ConnectionCloseFrame[0|0|] AckFrame[6-4|Δ0] 23.598 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 23.598 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.798/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.598 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) 23.601 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.703/Handshake, because peerAwaitingAddressValidation | RTT:34/17 23.601 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 23.603 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.705/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.603 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.603 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.603 Starting downloading https://server4:443/csfkxwpbug at 34:29.882 on ClientConnection[defb0e4ebc1b4f56/a4ed0008b0b684a6(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 23.705/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.604 Discarding pn space Initial because first Handshake message is being sent 23.603 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 23.604 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.706/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.604 -> Packet A|0|S0|61c2c7fbd27c5296ec583978ec8ca042|55|1 StreamFrame[0(CIB),0,17,fin] 23.705 loss detection timeout handler running Sending probe 0, because no ack since 23.603. Current RTT: 34/17. 23.705 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.705 (Probe is a handshake retransmit) 23.705 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 23.909/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.705 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 23.908 loss detection timeout handler running Sending probe 1, because no ack since 23.604. Current RTT: 34/17. 23.908 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.908 (Probe is a handshake retransmit) 23.909 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 24.317/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.909 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 23.910 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 24.318/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.910 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 23.940 <- (2) Packet A|0|S0|a4ed0008b0b684a6|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|8b03e2d4cad0246ee7566d37c20c2f5d|3086f2771d94522d6d6a0640d11fd511] NewConnectionIdFrame[2,<1|a7bbf2496bc1d5a3dbe812911d4fc20a|b721d93aa7553e84878a32b0a8cfa3f2] 23.941 State is set to Confirmed reschedule loss detection timer for PTO over 171 millis, based on 24.112/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -210 millis, based on 23.731/App, because ackElicitingInFlight | RTT:34/17 23.941 Discarding pn space Handshake because HandshakeDone is received 23.941 loss detection timeout handler running Sending probe 0, because no ack since 23.604. Current RTT: 34/17. 23.941 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 24.195/App, because ackElicitingInFlight | RTT:34/17 23.941 -> Packet PA|1|S0|8b03e2d4cad0246ee7566d37c20c2f5d|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 24.195/App, because ackElicitingInFlight | RTT:34/17 23.941 -> Packet A|2|S0|8b03e2d4cad0246ee7566d37c20c2f5d|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 23.998 <- (3) Packet A|1|S0|a4ed0008b0b684a6|45|2 AckFrame[2|Δ25] Padding(13) 23.999 Cwnd(-): 6000; inflight: 0 23.999 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 23.999 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 133 millis, based on 24.133/App, because ackElicitingInFlight | RTT:37/18 23.999 -> Packet A|3|S0|8b03e2d4cad0246ee7566d37c20c2f5d|55|1 StreamFrame[0(CIB),0,17,fin] 24.031 <- (4) Packet A|2|S0|a4ed0008b0b684a6|1060|2 AckFrame[3-2|Δ0] StreamFrame[0(CIB),0,1024] 24.032 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.051 -> Packet A|4|S0|8b03e2d4cad0246ee7566d37c20c2f5d|40|1 AckFrame[2-1|Δ19] 24.142 <- (5) Packet A|5|S0|a4ed0008b0b684a6|45|3 AckFrame[4|Δ59] PingFrame[] Padding(12) 24.142 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.162 -> Packet A|5|S0|8b03e2d4cad0246ee7566d37c20c2f5d|40|1 AckFrame[5|Δ19] 24.363 <- (6) Packet A|11|S0|a4ed0008b0b684a6|45|3 AckFrame[4|Δ280] PingFrame[] Padding(10) 24.363 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.382 -> Packet A|6|S0|8b03e2d4cad0246ee7566d37c20c2f5d|42|1 AckFrame[11,5|Δ19] 24.414 <- (7) Packet A|12|S0|a4ed0008b0b684a6|45|3 AckFrame[6|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(8) 24.414 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.415 Finished downloading https://server4:443/csfkxwpbug at 34:30.693 on ClientConnection[defb0e4ebc1b4f56/a4ed0008b0b684a6(V1) with server4/193.167.100.100:443] 24.415 Closing ClientConnection[defb0e4ebc1b4f56/a4ed0008b0b684a6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.415 -> Packet A|7|S0|8b03e2d4cad0246ee7566d37c20c2f5d|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 24.415 Creating connection with server4:443 with v1 24.416 Setting up connection for downloading https://server4:443/dgnuyoqmhs at 34:30.695 on ClientConnection[527f6068c12e1d4d/9b0bf83e20a27b79(V1) with server4/193.167.100.100:443] 24.416 Original destination connection id: 527f6068c12e1d4d (scid: 9b0bf83e20a27b79) >- CryptoStream[I|ClientHello] 24.418 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.618/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.417 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.452 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 24.452 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.652/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.452 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 24.455 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 24.557/Handshake, because peerAwaitingAddressValidation | RTT:34/17 24.455 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 24.457 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 24.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.457 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.457 Starting downloading https://server4:443/dgnuyoqmhs at 34:30.736 on ClientConnection[527f6068c12e1d4d/9b0bf83e20a27b79(V1) with server4/193.167.100.100:443] 24.457 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 24.559/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.457 Discarding pn space Initial because first Handshake message is being sent 24.457 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 24.458 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 24.560/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.458 -> Packet A|0|S0|7a54384f895a7311d72e284d68921c63|55|1 StreamFrame[0(CIB),0,17,fin] 24.526 <- (8) Packet A|14|S0|a4ed0008b0b684a6|45|3 AckFrame[6|Δ111] PingFrame[] Padding(12) 24.526 <- (9) Packet A|16|S0|a4ed0008b0b684a6|45|3 AckFrame[6|Δ111] PingFrame[] Padding(12) 24.526 -> Packet A|8|S0|8b03e2d4cad0246ee7566d37c20c2f5d|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 24.526 -> Packet A|9|S0|8b03e2d4cad0246ee7566d37c20c2f5d|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 24.559 loss detection timeout handler running Sending probe 0, because no ack since 24.457. Current RTT: 34/17. 24.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.559 (Probe is a handshake retransmit) 24.559 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 24.763/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.559 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 24.590 <- (2) Packet A|0|S0|9b0bf83e20a27b79|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|b5c636ed66dd88b696c238e5f8d71536|3ac749ed49c5f66afe2de0b3709c6fce] NewConnectionIdFrame[2,<1|6e47f0b2c1dc83a76c56bd5c5ffe7cdb|8dabcbb072000f4aff4361ffbaa56c1b] 24.591 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 24.712/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 24.585/App, because ackElicitingInFlight | RTT:34/17 24.591 Discarding pn space Handshake because HandshakeDone is received 24.591 loss detection timeout handler running Sending probe 0, because no ack since 24.458. Current RTT: 34/17. 24.591 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 24.845/App, because ackElicitingInFlight | RTT:34/17 24.591 -> Packet PA|1|S0|b5c636ed66dd88b696c238e5f8d71536|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 24.845/App, because ackElicitingInFlight | RTT:34/17 24.591 -> Packet A|2|S0|b5c636ed66dd88b696c238e5f8d71536|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 24.624 <- (3) Packet A|2|S0|9b0bf83e20a27b79|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 24.644 -> Packet A|3|S0|b5c636ed66dd88b696c238e5f8d71536|42|1 AckFrame[2,0|Δ19] 24.844 loss detection timeout handler running Sending probe 1, because no ack since 24.591. Current RTT: 34/17. 24.845 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 25.353/App, because ackElicitingInFlight | RTT:34/17 24.845 -> Packet PA|4|S0|b5c636ed66dd88b696c238e5f8d71536|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 25.354/App, because ackElicitingInFlight | RTT:34/17 24.846 -> Packet PA|5|S0|b5c636ed66dd88b696c238e5f8d71536|55|1 StreamFrame[0(CIB),0,17,fin] 24.946 <- (4) Packet A|8|S0|9b0bf83e20a27b79|45|3 AckFrame[2-1|Δ323] PingFrame[] Padding(10) 24.947 Cwnd(-): 6000; inflight: 110 24.947 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 25 millis, based on 24.973/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 443 millis, based on 25.391/App, because ackElicitingInFlight | RTT:71/87 24.947 -> Packet A|6|S0|b5c636ed66dd88b696c238e5f8d71536|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 24.966 -> Packet A|7|S0|b5c636ed66dd88b696c238e5f8d71536|42|1 AckFrame[8,2|Δ19] 24.978 <- (5) Packet A|11|S0|9b0bf83e20a27b79|45|2 AckFrame[6,2-1|Δ0] Padding(12) 25.024 <- (6) Packet A|12|S0|9b0bf83e20a27b79|1062|2 AckFrame[6,2-1|Δ45] StreamFrame[0(CIB),0,1024,fin] 25.025 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 25.025 Finished downloading https://server4:443/dgnuyoqmhs at 34:31.304 on ClientConnection[527f6068c12e1d4d/9b0bf83e20a27b79(V1) with server4/193.167.100.100:443] 25.025 Closing ClientConnection[527f6068c12e1d4d/9b0bf83e20a27b79(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.025 -> Packet A|8|S0|b5c636ed66dd88b696c238e5f8d71536|45|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,8|Δ0] 25.026 Creating connection with server4:443 with v1 25.026 Setting up connection for downloading https://server4:443/zyfwpqpocx at 34:31.305 on ClientConnection[7a35474eae886df5/f2f5a05f45d7c12f(V1) with server4/193.167.100.100:443] 25.026 Original destination connection id: 7a35474eae886df5 (scid: f2f5a05f45d7c12f) >- CryptoStream[I|ClientHello] 25.027 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.227/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.027 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.227 loss detection timeout handler running Sending probe 0, because no ack since 25.027. Current RTT: 100/25. 25.227 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.227 (Probe is an initial retransmit) 25.227 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.627/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.227 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.626 loss detection timeout handler running Sending probe 1, because no ack since 25.227. Current RTT: 100/25. 25.626 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.626 (Probe is an initial retransmit) 25.627 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.427/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.626 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.628 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.428/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.628 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.662 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[3-2|Δ1] Padding(1143) 25.662 probe count not reset on ack because handshake not yet confirmed 25.663 Retransmitting CryptoFrame[0,257] on level Initial 25.663 Cwnd(-): 6000; inflight: 0 25.663 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.463/Initial, because peerAwaitingAddressValidation | RTT:100/25 25.663 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 26.071/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 25.663 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) 25.696 <- (2) Packet I|2|L|1200|2 Token=[] AckFrame[4-2|Δ1] Padding(1143) 25.696 probe count not reset on ack because handshake not yet confirmed 25.696 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 26.104/Initial, because peerAwaitingAddressValidation | RTT:34/17 26.103 loss detection timeout handler running Sending probe 2, because no ack since 25.663. Current RTT: 34/13. 26.103 Sending probe because peer awaiting address validation 26.103 (Probe is Initial ping, because there is no Initial data to retransmit) 26.104 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 687 millis, based on 26.792/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/13 26.104 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 26.137 <- (3) Packet I|3|L|1200|2 Token=[] AckFrame[5-2|Δ2] Padding(1143) 26.138 probe count not reset on ack because handshake not yet confirmed 26.138 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 687 millis, based on 26.826/Initial, because peerAwaitingAddressValidation | RTT:34/13 26.663 <- (4) Packet I|7|L|186|2 Token=[] AckFrame[5-2|Δ4197] CryptoFrame[0,123] 26.664 probe count not reset on ack because handshake not yet confirmed 26.664 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 591 millis, based on 27.256/Initial, because peerAwaitingAddressValidation | RTT:34/10 -< CryptoStream[I|ServerHello] 26.667 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 591 millis, based on 27.259/Handshake, because peerAwaitingAddressValidation | RTT:34/10 26.667 -> Packet I|6|L|1201|2 Token=[] AckFrame[7,3-1|Δ0] Padding(1143) 26.663 <- (4) Packet H|4|L|1014|2 CryptoFrame[0,683] Padding(277) >- CryptoStream[H|Finished] 26.669 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 591 millis, based on 27.261/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.669 -> Packet H|0|L|88|1 CryptoFrame[0,36] 26.669 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 73 millis, based on 26.743/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 26.669 Discarding pn space Initial because first Handshake message is being sent 26.669 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 26.670 Starting downloading https://server4:443/zyfwpqpocx at 34:32.948 on ClientConnection[7a35474eae886df5/f2f5a05f45d7c12f(V1) with server4/193.167.100.100:443] 26.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 73 millis, based on 26.744/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 26.670 -> Packet A|0|S0|5d1d8b8a43330d0aa84cdcfeacf06d66|55|1 StreamFrame[0(CIB),0,17,fin] 26.743 loss detection timeout handler running Sending probe 0, because no ack since 26.669. Current RTT: 34/10. 26.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.743 (Probe is a handshake retransmit) 26.743 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 147 millis, based on 26.891/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 26.743 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 26.891 loss detection timeout handler running Sending probe 1, because no ack since 26.670. Current RTT: 34/10. 26.891 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 26.891 (Probe is a handshake retransmit) 26.891 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 295 millis, based on 27.187/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 26.891 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 26.892 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 295 millis, based on 27.188/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 26.892 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 26.923 <- (5) Packet A|0|S0|f2f5a05f45d7c12f|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|f3fc180bf095f3391b47f630e5707dde|c9823fe9994ece2bf6ef2f299287861e] NewConnectionIdFrame[2,<1|d5b54fcc8f482ca2afac7ad25fb2a74d|3a27b6c95d3805712e55324c8b1923c4] 26.923 State is set to Confirmed reschedule loss detection timer for PTO over 142 millis, based on 27.066/App, because ackElicitingInFlight | RTT:34/10 reschedule loss detection timer for PTO over -154 millis, based on 26.769/App, because ackElicitingInFlight | RTT:34/10 26.923 loss detection timeout handler running 26.923 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 26.670. Current RTT: 34/10. 26.923 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 197 millis, based on 27.121/App, because ackElicitingInFlight | RTT:34/10 26.923 -> Packet PA|1|S0|f3fc180bf095f3391b47f630e5707dde|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 197 millis, based on 27.122/App, because ackElicitingInFlight | RTT:34/10 26.924 -> Packet A|2|S0|f3fc180bf095f3391b47f630e5707dde|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 26.956 <- (6) Packet A|2|S0|f2f5a05f45d7c12f|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 26.976 -> Packet A|3|S0|f3fc180bf095f3391b47f630e5707dde|42|1 AckFrame[2,0|Δ19] 27.014 <- (7) Packet A|3|S0|f2f5a05f45d7c12f|1062|2 AckFrame[3,1|Δ6] StreamFrame[0(CIB),0,1024,fin] 27.015 Cwnd(-): 3000; inflight: 0 27.015 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.015 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 98 millis, based on 27.114/App, because ackElicitingInFlight | RTT:34/10 27.015 -> Packet A|4|S0|f3fc180bf095f3391b47f630e5707dde|57|2 StreamFrame[0(CIB),0,17,fin] RetireConnectionIdFrame[0] 27.015 Finished downloading https://server4:443/zyfwpqpocx at 34:33.294 on ClientConnection[7a35474eae886df5/f2f5a05f45d7c12f(V1) with server4/193.167.100.100:443] 27.015 Closing ClientConnection[7a35474eae886df5/f2f5a05f45d7c12f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.016 -> Packet A|5|S0|f3fc180bf095f3391b47f630e5707dde|43|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 27.016 Creating connection with server4:443 with v1 27.016 Setting up connection for downloading https://server4:443/fwpzggdjay at 34:33.295 on ClientConnection[2a86a9fbb711f286/98d246df4557efa7(V1) with server4/193.167.100.100:443] 27.016 Original destination connection id: 2a86a9fbb711f286 (scid: 98d246df4557efa7) >- CryptoStream[I|ClientHello] 27.017 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.217/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.017 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.073 <- (8) Packet A|4|S0|f2f5a05f45d7c12f|45|2 AckFrame[4-3,1|Δ26] Padding(11) 27.073 -> Packet A|6|S0|f3fc180bf095f3391b47f630e5707dde|43|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 27.216 loss detection timeout handler running Sending probe 0, because no ack since 27.017. Current RTT: 100/25. 27.217 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.217 (Probe is an initial retransmit) 27.217 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.617/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.217 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.251 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ9] CryptoFrame[0,123] 27.251 probe count not reset on ack because handshake not yet confirmed 27.252 Retransmitting CryptoFrame[0,257] on level Initial 27.252 Cwnd(-): 6000; inflight: 0 27.252 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 27.652/Initial, because peerAwaitingAddressValidation | RTT:100/25 27.252 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 27.456/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.252 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 27.251 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) 27.254 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 27.458/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.254 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 27.256 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 27.460/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.256 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.256 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.358/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.256 Discarding pn space Initial because first Handshake message is being sent 27.256 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 27.256 Starting downloading https://server4:443/fwpzggdjay at 34:33.535 on ClientConnection[2a86a9fbb711f286/98d246df4557efa7(V1) with server4/193.167.100.100:443] 27.257 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.359/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.257 -> Packet A|0|S0|6522b9fcc1147730608bd665213e927e|55|1 StreamFrame[0(CIB),0,17,fin] 27.358 loss detection timeout handler running Sending probe 0, because no ack since 27.256. Current RTT: 34/17. 27.358 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.358 (Probe is a handshake retransmit) 27.358 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 27.562/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.358 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 27.561 loss detection timeout handler running Sending probe 1, because no ack since 27.257. Current RTT: 34/17. 27.561 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.561 (Probe is a handshake retransmit) 27.562 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 27.970/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.561 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 27.563 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 27.971/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.563 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 27.594 <- (2) Packet A|0|S0|98d246df4557efa7|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|e5112710d840189268c9d436deba779e|ba5865801b9811cab2e7dff598295eda] NewConnectionIdFrame[2,<1|c26c5a9f8682dfca3be38fca89a0102b|fab48654d2f851ec49d853b3c4d18656] 27.595 State is set to Confirmed reschedule loss detection timer for PTO over 169 millis, based on 27.765/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -211 millis, based on 27.384/App, because ackElicitingInFlight | RTT:34/17 27.595 Discarding pn space Handshake because HandshakeDone is received 27.595 loss detection timeout handler running Sending probe 0, because no ack since 27.257. Current RTT: 34/17. 27.595 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 27.849/App, because ackElicitingInFlight | RTT:34/17 27.595 -> Packet PA|1|S0|e5112710d840189268c9d436deba779e|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 27.849/App, because ackElicitingInFlight | RTT:34/17 27.595 -> Packet A|2|S0|e5112710d840189268c9d436deba779e|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 27.628 <- (3) Packet A|1|S0|98d246df4557efa7|1061|3 AckFrame[1|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 27.628 Cwnd(-): 3000; inflight: 41 27.629 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 93 millis, based on 27.722/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 110 millis, based on 27.740/App, because ackElicitingInFlight | RTT:34/13 27.629 -> Packet A|3|S0|e5112710d840189268c9d436deba779e|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 27.628 <- (4) Packet A|2|S0|98d246df4557efa7|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 27.629 Finished downloading https://server4:443/fwpzggdjay at 34:33.908 on ClientConnection[2a86a9fbb711f286/98d246df4557efa7(V1) with server4/193.167.100.100:443] 27.629 -> Packet A|4|S0|e5112710d840189268c9d436deba779e|39|1 AckFrame[2-0|Δ0] 27.629 Closing ClientConnection[2a86a9fbb711f286/98d246df4557efa7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.629 -> Packet A|5|S0|e5112710d840189268c9d436deba779e|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 27.630 Creating connection with server4:443 with v1 27.630 Setting up connection for downloading https://server4:443/pybtmqsroo at 34:33.909 on ClientConnection[73bcc506fe42cecd/fb615fca7f8adb1c(V1) with server4/193.167.100.100:443] 27.630 Original destination connection id: 73bcc506fe42cecd (scid: fb615fca7f8adb1c) >- CryptoStream[I|ClientHello] 27.631 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.831/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.631 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.830 loss detection timeout handler running Sending probe 0, because no ack since 27.631. Current RTT: 100/25. 27.830 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.830 (Probe is an initial retransmit) 27.831 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.231/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.831 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.864 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[1-0|Δ2] Padding(1143) 27.864 probe count not reset on ack because handshake not yet confirmed 27.864 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 28.264/Initial, because peerAwaitingAddressValidation | RTT:100/25 28.263 loss detection timeout handler running Sending probe 1, because no ack since 27.831. Current RTT: 33/16. 28.264 Sending probe because peer awaiting address validation 28.264 (Probe is Initial ping, because there is no Initial data to retransmit) 28.264 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 28.652/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.264 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 28.651 loss detection timeout handler running Sending probe 2, because no ack since 28.264. Current RTT: 33/16. 28.651 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.651 (Probe is Initial ping, because there is no Initial data to retransmit) 28.651 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 29.427/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.651 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 28.652 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 29.429/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.652 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 28.666 <- (2) Packet I|3|L|186|2 Token=[] AckFrame[1-0|Δ6416] CryptoFrame[0,123] 28.667 probe count not reset on ack because handshake not yet confirmed 28.667 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 29.443/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[I|ServerHello] 28.666 <- (2) Packet H|2|L|1014|2 CryptoFrame[0,685] Padding(275) 28.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 29.446/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.670 -> Packet I|5|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 28.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 775 millis, based on 29.448/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.672 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.672 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.769/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.672 Discarding pn space Initial because first Handshake message is being sent 28.672 Starting downloading https://server4:443/pybtmqsroo at 34:34.951 on ClientConnection[73bcc506fe42cecd/fb615fca7f8adb1c(V1) with server4/193.167.100.100:443] 28.672 -> Packet H|1|L|54|1 AckFrame[2|Δ0] 28.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 28.770/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 28.673 -> Packet A|0|S0|e27fb1577dc218e922b36cb7df94c3ff|55|1 StreamFrame[0(CIB),0,17,fin] 28.685 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 28.686 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 28.704 <- (5) Packet A|0|S0|fb615fca7f8adb1c|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|ad982d67f0775e17212f811e855bacf2|db6712a15e48aca331bc2214fbd12fe3] NewConnectionIdFrame[2,<1|3754b3f9612febe6269ec28a74669259|ceb79bb92f16696325a7fbcc012722ac] 28.704 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 28.769/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 28.795/App, because ackElicitingInFlight | RTT:33/16 28.704 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 121 millis, based on 28.826/App, because ackElicitingInFlight | RTT:33/16 28.704 -> Packet A|1|S0|ad982d67f0775e17212f811e855bacf2|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 28.706 <- (6) Packet A|1|S0|fb615fca7f8adb1c|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 120 millis, based on 28.826/App, because ackElicitingInFlight | RTT:33/16 28.706 <- (7) Packet A|2|S0|fb615fca7f8adb1c|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 28.706 Finished downloading https://server4:443/pybtmqsroo at 34:34.985 on ClientConnection[73bcc506fe42cecd/fb615fca7f8adb1c(V1) with server4/193.167.100.100:443] 28.706 Closing ClientConnection[73bcc506fe42cecd/fb615fca7f8adb1c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.706 -> Packet A|2|S0|ad982d67f0775e17212f811e855bacf2|39|1 AckFrame[2-0|Δ0] 28.707 -> Packet A|3|S0|ad982d67f0775e17212f811e855bacf2|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 28.707 Creating connection with server4:443 with v1 28.708 Setting up connection for downloading https://server4:443/iktdxjvzks at 34:34.987 on ClientConnection[d88ab606235702a8/ecc32978411af1c4(V1) with server4/193.167.100.100:443] 28.708 Original destination connection id: d88ab606235702a8 (scid: ecc32978411af1c4) >- CryptoStream[I|ClientHello] 28.709 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.909/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.709 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 28.738 <- (8) Packet A|3|S0|fb615fca7f8adb1c|45|2 AckFrame[2-1|Δ0] Padding(14) 28.738 -> Packet A|4|S0|ad982d67f0775e17212f811e855bacf2|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 28.743 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ8] CryptoFrame[0,123] 28.743 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.943/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 28.743 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 28.745 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 28.847/Handshake, because peerAwaitingAddressValidation | RTT:34/17 28.745 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 28.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 28.850/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 28.748 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.748 Starting downloading https://server4:443/iktdxjvzks at 34:35.027 on ClientConnection[d88ab606235702a8/ecc32978411af1c4(V1) with server4/193.167.100.100:443] 28.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 28.850/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 28.748 Discarding pn space Initial because first Handshake message is being sent 28.748 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 28.748 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 28.850/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 28.748 -> Packet A|0|S0|db5eb9053803dd615fd0eb315da6c48a|55|1 StreamFrame[0(CIB),0,17,fin] 28.779 <- (2) Packet A|0|S0|ecc32978411af1c4|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|eb2fdf771845aa5e7feee69fb5dd1e78|5d4f2799ab3883fb287a6a0f28e4c284] NewConnectionIdFrame[2,<1|f2ef1b8f52f4ec3e95a888263dda116f|4e73263dbe4bdc9ce25d3e68892da13b] 28.780 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 28.850/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 28.875/App, because ackElicitingInFlight | RTT:34/17 28.780 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 28.907/App, because ackElicitingInFlight | RTT:34/17 28.780 -> Packet A|1|S0|eb2fdf771845aa5e7feee69fb5dd1e78|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 28.781 <- (3) Packet A|2|S0|ecc32978411af1c4|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 28.799 -> Packet A|2|S0|eb2fdf771845aa5e7feee69fb5dd1e78|42|1 AckFrame[2,0|Δ18] 28.906 loss detection timeout handler running Sending probe 0, because no ack since 28.780. Current RTT: 34/17. 28.906 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 29.160/App, because ackElicitingInFlight | RTT:34/17 28.906 -> Packet PA|3|S0|eb2fdf771845aa5e7feee69fb5dd1e78|55|1 StreamFrame[0(CIB),0,17,fin] 29.013 <- (4) Packet A|7|S0|ecc32978411af1c4|45|3 AckFrame[2,0|Δ181] PingFrame[] Padding(8) 29.013 Cwnd(-): 6000; inflight: 55 reschedule loss detection timer for PTO over 20 millis, based on 29.033/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 126 millis, based on 29.140/App, because ackElicitingInFlight | RTT:34/17 29.013 -> Packet A|4|S0|eb2fdf771845aa5e7feee69fb5dd1e78|37|2 RetireConnectionIdFrame[0] Padding(1) 29.032 -> Packet A|5|S0|eb2fdf771845aa5e7feee69fb5dd1e78|40|1 AckFrame[7|Δ19] 29.044 <- (5) Packet A|8|S0|ecc32978411af1c4|45|2 AckFrame[4,2,0|Δ0] Padding(10) 29.045 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.065 <- (6) Packet A|9|S0|ecc32978411af1c4|1059|2 AckFrame[5-4|Δ0] StreamFrame[0(CIB),0,1024,fin] 29.065 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.065 Finished downloading https://server4:443/iktdxjvzks at 34:35.344 on ClientConnection[d88ab606235702a8/ecc32978411af1c4(V1) with server4/193.167.100.100:443] 29.065 Closing ClientConnection[d88ab606235702a8/ecc32978411af1c4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.066 -> Packet A|6|S0|eb2fdf771845aa5e7feee69fb5dd1e78|43|2 ConnectionCloseFrame[0|0|] AckFrame[9-8|Δ0] 29.066 Creating connection with server4:443 with v1 29.067 Setting up connection for downloading https://server4:443/cchanbttbn at 34:35.345 on ClientConnection[2186ad89664dffd6/0aeff3a603149030(V1) with server4/193.167.100.100:443] 29.067 Original destination connection id: 2186ad89664dffd6 (scid: 0aeff3a603149030) >- CryptoStream[I|ClientHello] 29.068 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.268/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.068 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.267 loss detection timeout handler running Sending probe 0, because no ack since 29.068. Current RTT: 100/25. 29.267 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.267 (Probe is an initial retransmit) 29.267 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.667/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.267 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.667 loss detection timeout handler running Sending probe 1, because no ack since 29.267. Current RTT: 100/25. 29.667 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.667 (Probe is an initial retransmit) 29.667 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.467/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.667 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.668 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.468/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.668 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.302 <- (1) Packet I|4|L|186|2 Token=[] AckFrame[3-1|Δ4807] CryptoFrame[0,123] 30.303 probe count not reset on ack because handshake not yet confirmed 30.303 Retransmitting CryptoFrame[0,257] on level Initial 30.303 Cwnd(-): 6000; inflight: 0 30.303 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 31.103/Initial, because peerAwaitingAddressValidation | RTT:100/25 30.303 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 7607 millis, based on 37.911/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 30.303 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 30.302 <- (1) Packet H|2|L|1014|2 CryptoFrame[0,683] Padding(277) 30.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 7607 millis, based on 37.914/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 30.306 -> Packet I|5|L|1201|2 Token=[] AckFrame[4|Δ0] Padding(1145) >- CryptoStream[H|Finished] 30.309 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 7607 millis, based on 37.917/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 30.309 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.309 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.309 Starting downloading https://server4:443/cchanbttbn at 34:36.588 on ClientConnection[2186ad89664dffd6/0aeff3a603149030(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 1901 millis, based on 32.211/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 30.309 Discarding pn space Initial because first Handshake message is being sent 30.309 -> Packet H|1|L|54|1 AckFrame[2|Δ0] 30.309 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.310 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1901 millis, based on 32.212/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 30.310 -> Packet A|0|S0|e718f40bd71826005d02fe2919821964|55|1 StreamFrame[0(CIB),0,17,fin] 30.340 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.413 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.414 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.635 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 31.078 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 32.211 loss detection timeout handler running Sending probe 0, because no ack since 30.309. Current RTT: 634/317. 32.211 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.211 (Probe is a handshake retransmit) 32.211 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3803 millis, based on 36.015/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 32.211 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 36.014 loss detection timeout handler running Sending probe 1, because no ack since 30.310. Current RTT: 634/317. 36.014 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 36.015 (Probe is a handshake retransmit) 36.015 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 7607 millis, based on 43.623/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 36.015 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 36.016 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 7607 millis, based on 43.624/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 36.016 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 36.183 <- (8) Packet A|2|S0|0aeff3a603149030|45|2 HandshakeDoneFrame[] Padding(18) 36.184 State is set to Confirmed reschedule loss detection timer for PTO over 1833 millis, based on 38.018/App, because ackElicitingInFlight | RTT:634/317 reschedule loss detection timer for PTO over -3947 millis, based on 32.237/App, because ackElicitingInFlight | RTT:634/317 36.184 Discarding pn space Handshake because HandshakeDone is received 36.184 loss detection timeout handler running Sending probe 0, because no ack since 30.310. Current RTT: 634/317. 36.183 <- (9) Packet A|4|S0|0aeff3a603149030|45|2 HandshakeDoneFrame[] Padding(18) 36.184 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 3853 millis, based on 40.038/App, because ackElicitingInFlight | RTT:634/317 36.184 -> Packet PA|1|S0|e718f40bd71826005d02fe2919821964|62|2 AckFrame[4,2|Δ0] StreamFrame[0(CIB),0,17,fin] 36.453 <- (10) Packet A|8|S0|0aeff3a603149030|45|2 HandshakeDoneFrame[] Padding(18) 36.473 -> Packet A|2|S0|e718f40bd71826005d02fe2919821964|44|1 AckFrame[8,4,2|Δ19] 36.996 <- (11) Packet A|12|S0|0aeff3a603149030|45|2 HandshakeDoneFrame[] Padding(18) 37.015 -> Packet A|3|S0|e718f40bd71826005d02fe2919821964|46|1 AckFrame[12,8,4,2|Δ19] 37.047 <- (12) Packet A|13|S0|0aeff3a603149030|103|3 AckFrame[3|Δ0] NewConnectionIdFrame[1,<1|b79924fc9e944277a6b4561a858b9c33|88303670caec22bf3f93ec58e82cbea3] NewConnectionIdFrame[2,<1|60ef961d295fb0a50185243f0536b5d8|4933b3ef9bddb58cb4cb545bcb5b86f5] 37.048 Cwnd(-): 3000; inflight: 0 37.048 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 37.048 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 1926 millis, based on 38.975/App, because ackElicitingInFlight | RTT:634/317 37.048 -> Packet A|4|S0|e718f40bd71826005d02fe2919821964|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1926 millis, based on 38.975/App, because ackElicitingInFlight | RTT:634/317 37.048 -> Packet A|5|S0|b79924fc9e944277a6b4561a858b9c33|41|2 RetireConnectionIdFrame[0] AckFrame[13|Δ0] 37.081 <- (13) Packet A|14|S0|0aeff3a603149030|1060|2 AckFrame[5-4|Δ0] StreamFrame[0(CIB),0,1024] 37.081 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 37.081 <- (14) Packet A|15|S0|0aeff3a603149030|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 37.082 Finished downloading https://server4:443/cchanbttbn at 34:43.361 on ClientConnection[2186ad89664dffd6/0aeff3a603149030(V1) with server4/193.167.100.100:443] 37.082 -> Packet A|6|S0|b79924fc9e944277a6b4561a858b9c33|39|1 AckFrame[15-14|Δ0] 37.082 Closing ClientConnection[2186ad89664dffd6/0aeff3a603149030(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 37.082 -> Packet A|7|S0|b79924fc9e944277a6b4561a858b9c33|43|2 ConnectionCloseFrame[0|0|] AckFrame[15-14|Δ0] 37.083 Creating connection with server4:443 with v1 37.083 Setting up connection for downloading https://server4:443/txfdznvyft at 34:43.362 on ClientConnection[62765a8d1489852d/9bf8d973c7ba337b(V1) with server4/193.167.100.100:443] 37.083 Original destination connection id: 62765a8d1489852d (scid: 9bf8d973c7ba337b) >- CryptoStream[I|ClientHello] 37.084 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 37.284/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.084 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.283 loss detection timeout handler running Sending probe 0, because no ack since 37.084. Current RTT: 100/25. 37.283 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 37.283 (Probe is an initial retransmit) 37.284 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 37.684/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.284 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.317 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[1-0|Δ2] Padding(1143) 37.317 probe count not reset on ack because handshake not yet confirmed 37.317 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 37.717/Initial, because peerAwaitingAddressValidation | RTT:100/25 37.717 loss detection timeout handler running Sending probe 1, because no ack since 37.284. Current RTT: 33/16. 37.717 Sending probe because peer awaiting address validation 37.717 (Probe is Initial ping, because there is no Initial data to retransmit) 37.717 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 38.105/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 37.717 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 37.751 <- (2) Packet I|2|L|1200|2 Token=[] AckFrame[2-0|Δ2] Padding(1143) 37.751 probe count not reset on ack because handshake not yet confirmed 37.751 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 38.139/Initial, because peerAwaitingAddressValidation | RTT:33/16 38.119 <- (3) Packet I|4|L|186|2 Token=[] AckFrame[2-0|Δ2948] CryptoFrame[0,123] 38.120 probe count not reset on ack because handshake not yet confirmed 38.120 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 323 millis, based on 38.444/Initial, because peerAwaitingAddressValidation | RTT:33/12 -< CryptoStream[I|ServerHello] 38.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 323 millis, based on 38.446/Handshake, because peerAwaitingAddressValidation | RTT:33/12 38.122 -> Packet I|3|L|1201|2 Token=[] AckFrame[4,2-1|Δ0] Padding(1143) 38.119 <- (3) Packet H|2|L|1014|2 CryptoFrame[0,683] Padding(277) >- CryptoStream[H|Finished] 38.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 323 millis, based on 38.449/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 38.125 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 38.125 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 38.206/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 38.125 Discarding pn space Initial because first Handshake message is being sent 38.125 Starting downloading https://server4:443/txfdznvyft at 34:44.404 on ClientConnection[62765a8d1489852d/9bf8d973c7ba337b(V1) with server4/193.167.100.100:443] 38.125 -> Packet H|1|L|54|1 AckFrame[2|Δ0] 38.125 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 38.126 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 38.207/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 38.126 -> Packet A|0|S0|bb508eb6abe0bebe40d603d01c721596|55|1 StreamFrame[0(CIB),0,17,fin] 38.156 <- (5) Packet A|0|S0|9bf8d973c7ba337b|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|0266d7ae79bfbec80a5815a1075967bc|9ea0dc64a0990cc5e02c6507f6f0ae47] NewConnectionIdFrame[2,<1|4743634447a4161ad0dc383341c952ae|def9f6652532a46999696ecf0fd923ea] 38.157 State is set to Confirmed reschedule loss detection timer for PTO over 48 millis, based on 38.206/Handshake, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 74 millis, based on 38.232/App, because ackElicitingInFlight | RTT:33/12 38.157 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 105 millis, based on 38.263/App, because ackElicitingInFlight | RTT:33/12 38.157 -> Packet A|1|S0|0266d7ae79bfbec80a5815a1075967bc|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 38.159 <- (6) Packet A|1|S0|9bf8d973c7ba337b|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 104 millis, based on 38.263/App, because ackElicitingInFlight | RTT:33/12 38.159 <- (7) Packet A|2|S0|9bf8d973c7ba337b|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 38.159 Finished downloading https://server4:443/txfdznvyft at 34:44.438 on ClientConnection[62765a8d1489852d/9bf8d973c7ba337b(V1) with server4/193.167.100.100:443] 38.159 -> Packet A|2|S0|0266d7ae79bfbec80a5815a1075967bc|39|1 AckFrame[2-0|Δ0] 38.159 Closing ClientConnection[62765a8d1489852d/9bf8d973c7ba337b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 38.160 -> Packet A|3|S0|0266d7ae79bfbec80a5815a1075967bc|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 38.160 Creating connection with server4:443 with v1 38.160 Setting up connection for downloading https://server4:443/mgtxmrbiwn at 34:44.439 on ClientConnection[7be78d74621e686f/64116f16b409fdff(V1) with server4/193.167.100.100:443] 38.160 Original destination connection id: 7be78d74621e686f (scid: 64116f16b409fdff) >- CryptoStream[I|ClientHello] 38.162 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 38.362/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 38.161 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 38.191 <- (8) Packet A|3|S0|9bf8d973c7ba337b|45|2 AckFrame[2-1|Δ0] Padding(14) 38.191 -> Packet A|4|S0|0266d7ae79bfbec80a5815a1075967bc|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 38.196 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 38.196 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 38.396/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 38.196 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 38.198 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 38.300/Handshake, because peerAwaitingAddressValidation | RTT:34/17 38.198 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 38.201 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 38.303/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 38.201 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 38.201 Starting downloading https://server4:443/mgtxmrbiwn at 34:44.480 on ClientConnection[7be78d74621e686f/64116f16b409fdff(V1) with server4/193.167.100.100:443] 38.201 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 38.303/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 38.201 Discarding pn space Initial because first Handshake message is being sent 38.201 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 38.202 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 38.304/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 38.202 -> Packet A|0|S0|38080799a821a043132ed29b72078a87|55|1 StreamFrame[0(CIB),0,17,fin] 38.233 <- (2) Packet A|0|S0|64116f16b409fdff|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|15fab2eb2608e0f91ee03ae04573e848|21585b85904ac82928b885f8dda95282] NewConnectionIdFrame[2,<1|f13f6f4be81a21c67115789a6388548d|990579a6c3a1f0989d365dba022af2eb] 38.233 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 38.303/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 38.329/App, because ackElicitingInFlight | RTT:34/17 38.233 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 38.360/App, because ackElicitingInFlight | RTT:34/17 38.233 -> Packet A|1|S0|15fab2eb2608e0f91ee03ae04573e848|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 38.235 <- (3) Packet A|1|S0|64116f16b409fdff|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 38.360/App, because ackElicitingInFlight | RTT:34/17 38.253 -> Packet A|2|S0|15fab2eb2608e0f91ee03ae04573e848|40|1 AckFrame[1-0|Δ18] 38.290 <- (4) Packet A|3|S0|64116f16b409fdff|45|2 AckFrame[2-1|Δ5] Padding(13) 38.290 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 38.358 <- (5) Packet A|7|S0|64116f16b409fdff|45|3 AckFrame[2-1|Δ73] PingFrame[] Padding(12) 38.358 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 38.377 -> Packet A|3|S0|15fab2eb2608e0f91ee03ae04573e848|42|1 AckFrame[7,3|Δ19] 38.604 <- (6) Packet A|9|S0|64116f16b409fdff|45|3 AckFrame[2-1|Δ319] PingFrame[] Padding(10) 38.604 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 38.604 <- (7) Packet A|11|S0|64116f16b409fdff|45|3 AckFrame[2-1|Δ319] PingFrame[] Padding(10) 38.604 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 38.604 -> Packet A|4|S0|15fab2eb2608e0f91ee03ae04573e848|45|1 AckFrame[11,9,7,3|Δ0] 38.745 <- (8) Packet A|16|S0|64116f16b409fdff|45|3 AckFrame[4|Δ109] PingFrame[] Padding(12) 38.745 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 38.764 -> Packet A|5|S0|15fab2eb2608e0f91ee03ae04573e848|40|1 AckFrame[16|Δ19] 38.796 <- (9) Packet A|17|S0|64116f16b409fdff|45|3 AckFrame[5|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 38.796 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 38.797 Finished downloading https://server4:443/mgtxmrbiwn at 34:45.076 on ClientConnection[7be78d74621e686f/64116f16b409fdff(V1) with server4/193.167.100.100:443] 38.797 Closing ClientConnection[7be78d74621e686f/64116f16b409fdff(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 38.797 -> Packet A|6|S0|15fab2eb2608e0f91ee03ae04573e848|43|2 ConnectionCloseFrame[0|0|] AckFrame[17|Δ0] 38.797 Creating connection with server4:443 with v1 38.798 Setting up connection for downloading https://server4:443/mmbbbbgjpl at 34:45.077 on ClientConnection[287865a054620349/081f94cdbcceea3e(V1) with server4/193.167.100.100:443] 38.798 Original destination connection id: 287865a054620349 (scid: 081f94cdbcceea3e) >- CryptoStream[I|ClientHello] 38.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 38.999/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 38.799 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 38.833 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 38.833 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 39.033/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 38.833 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 38.836 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 38.938/Handshake, because peerAwaitingAddressValidation | RTT:34/17 38.836 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 38.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 38.940/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 38.838 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 38.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 38.838 Starting downloading https://server4:443/mmbbbbgjpl at 34:45.117 on ClientConnection[287865a054620349/081f94cdbcceea3e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 38.940/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 38.838 Discarding pn space Initial because first Handshake message is being sent 38.838 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 38.838 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 38.940/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 38.838 -> Packet A|0|S0|ff7198e8928c02d8e92fab7995c93a5f|55|1 StreamFrame[0(CIB),0,17,fin] 38.869 <- (2) Packet A|0|S0|081f94cdbcceea3e|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|6747c8c5855b96405d5788d1aa607cc8|e98a070f1c1c8bfb58e1876b20cb7767] NewConnectionIdFrame[2,<1|a2b38d0f78ff618d15b9f3b7cfd4ca08|852f0aba2b19724d92bae7ba3f8c183d] 38.870 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 38.940/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 38.965/App, because ackElicitingInFlight | RTT:34/17 38.870 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 38.997/App, because ackElicitingInFlight | RTT:34/17 38.870 -> Packet A|1|S0|6747c8c5855b96405d5788d1aa607cc8|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 38.910 <- (10) Packet A|19|S0|64116f16b409fdff|45|3 AckFrame[5|Δ113] PingFrame[] Padding(12) 38.910 <- (11) Packet A|21|S0|64116f16b409fdff|45|3 AckFrame[5|Δ113] PingFrame[] Padding(12) 38.910 -> Packet A|7|S0|15fab2eb2608e0f91ee03ae04573e848|43|2 ConnectionCloseFrame[0|0|] AckFrame[17|Δ0] 38.910 -> Packet A|8|S0|15fab2eb2608e0f91ee03ae04573e848|43|2 ConnectionCloseFrame[0|0|] AckFrame[17|Δ0] 38.989 <- (3) Packet A|5|S0|081f94cdbcceea3e|45|3 AckFrame[1-0|Δ88] PingFrame[] Padding(12) 38.990 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 38.990 <- (4) Packet A|7|S0|081f94cdbcceea3e|45|3 AckFrame[1-0|Δ88] PingFrame[] Padding(12) 38.990 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 38.990 -> Packet A|2|S0|6747c8c5855b96405d5788d1aa607cc8|41|1 AckFrame[7,5|Δ0] 39.225 <- (5) Packet A|11|S0|081f94cdbcceea3e|45|3 AckFrame[1-0|Δ323] PingFrame[] Padding(10) 39.225 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 39.244 -> Packet A|3|S0|6747c8c5855b96405d5788d1aa607cc8|44|1 AckFrame[11,7,5|Δ19] 39.277 <- (6) Packet A|12|S0|081f94cdbcceea3e|1059|2 AckFrame[3|Δ0] StreamFrame[0(CIB),0,1024,fin] 39.277 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 39.277 Finished downloading https://server4:443/mmbbbbgjpl at 34:45.556 on ClientConnection[287865a054620349/081f94cdbcceea3e(V1) with server4/193.167.100.100:443] 39.277 Closing ClientConnection[287865a054620349/081f94cdbcceea3e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 39.278 -> Packet A|4|S0|6747c8c5855b96405d5788d1aa607cc8|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 39.278 Creating connection with server4:443 with v1 39.278 Setting up connection for downloading https://server4:443/nfxbjmzuhw at 34:45.557 on ClientConnection[c376b40a1b7f8895/9458697d474a5037(V1) with server4/193.167.100.100:443] 39.279 Original destination connection id: c376b40a1b7f8895 (scid: 9458697d474a5037) >- CryptoStream[I|ClientHello] 39.280 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 39.480/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.280 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.396 <- (7) Packet A|14|S0|081f94cdbcceea3e|45|3 AckFrame[3|Δ119] PingFrame[] Padding(12) 39.396 <- (8) Packet A|16|S0|081f94cdbcceea3e|45|3 AckFrame[3|Δ119] PingFrame[] Padding(12) 39.396 -> Packet A|5|S0|6747c8c5855b96405d5788d1aa607cc8|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 39.396 -> Packet A|6|S0|6747c8c5855b96405d5788d1aa607cc8|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 39.479 loss detection timeout handler running Sending probe 0, because no ack since 39.280. Current RTT: 100/25. 39.479 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 39.479 (Probe is an initial retransmit) 39.479 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 39.879/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.479 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.878 loss detection timeout handler running Sending probe 1, because no ack since 39.479. Current RTT: 100/25. 39.878 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 39.878 (Probe is an initial retransmit) 39.879 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 40.679/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.879 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 40.680/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.880 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.679 loss detection timeout handler running Sending probe 2, because no ack since 39.880. Current RTT: 100/25. 40.679 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 40.679 (Probe is an initial retransmit) 40.679 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 42.279/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.679 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.680 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 42.280/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.680 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.714 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[5,3|Δ3] Padding(1141) 40.714 probe count not reset on ack because handshake not yet confirmed 40.714 Retransmitting CryptoFrame[0,257] on level Initial 40.714 Cwnd(-): 6000; inflight: 1200 40.714 -> Packet I|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) 40.748 <- (2) Packet I|2|L|1200|2 Token=[] AckFrame[6-5,3|Δ2] Padding(1141) 40.748 probe count not reset on ack because handshake not yet confirmed 40.748 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 41.524/Initial, because peerAwaitingAddressValidation | RTT:33/16 41.523 loss detection timeout handler running Sending probe 3, because no ack since 40.714. Current RTT: 33/12. 41.523 Sending probe because peer awaiting address validation 41.523 (Probe is Initial ping, because there is no Initial data to retransmit) 41.524 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1295 millis, based on 42.820/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 41.523 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 42.819 loss detection timeout handler running Sending probe 4, because no ack since 41.523. Current RTT: 33/12. 42.819 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 42.819 (Probe is Initial ping, because there is no Initial data to retransmit) 42.819 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2591 millis, based on 45.411/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 42.819 -> Packet PI|8|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 42.820 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2591 millis, based on 45.412/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 42.820 -> Packet PI|9|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 42.853 <- (3) Packet I|7|L|1200|2 Token=[] AckFrame[8,6-5,3|Δ2] Padding(1139) 42.853 probe count not reset on ack because handshake not yet confirmed 42.854 Cwnd(-): 3000; inflight: 1201 42.854 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2591 millis, based on 45.446/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 45.445 loss detection timeout handler running Sending probe 5, because no ack since 42.820. Current RTT: 33/9. 45.445 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 45.445 (Probe is Initial ping, because there is no Initial data to retransmit) 45.446 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 4415 millis, based on 49.862/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/9 45.445 -> Packet PI|10|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 45.446 Bytes in flight exceeds congestion window: 3603 > 3000 45.446 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 4415 millis, based on 49.862/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/9 45.446 -> Packet PI|11|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 45.480 <- (4) Packet I|13|L|1200|2 Token=[] AckFrame[11,9-8,6-5,3|Δ2] Padding(1137) 45.480 probe count not reset on ack because handshake not yet confirmed 45.484 Cwnd(+): 3480 (CongestionAvoidance); inflight: 3603 45.484 Cwnd(-): 2400; inflight: 0 45.484 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 4415 millis, based on 49.900/Initial, because peerAwaitingAddressValidation | RTT:33/9 46.911 <- (5) Packet I|17|L|192|2 Token=[] AckFrame[11,9-8,6-5,3|Δ11438] CryptoFrame[0,123] 46.912 probe count not reset on ack because handshake not yet confirmed 46.912 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 3903 millis, based on 50.816/Initial, because peerAwaitingAddressValidation | RTT:33/7 -< CryptoStream[I|ServerHello] 46.911 <- (5) Packet H|12|L|1008|2 CryptoFrame[0,684] Padding(270) 46.914 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3903 millis, based on 50.818/Handshake, because peerAwaitingAddressValidation | RTT:33/7 46.914 -> Packet I|12|L|1201|2 Token=[] AckFrame[17,13,7,2-1|Δ0] Padding(1139) >- CryptoStream[H|Finished] 46.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3903 millis, based on 50.820/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 46.916 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 46.917 Starting downloading https://server4:443/nfxbjmzuhw at 34:53.196 on ClientConnection[c376b40a1b7f8895/9458697d474a5037(V1) with server4/193.167.100.100:443] 46.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 60 millis, based on 46.978/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 46.917 Discarding pn space Initial because first Handshake message is being sent 46.917 -> Packet H|1|L|54|1 AckFrame[12|Δ0] 46.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 60 millis, based on 46.978/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 46.917 -> Packet A|0|S0|4cbd3f5c5529295f7db4e37612c6e6a9|55|1 StreamFrame[0(CIB),0,17,fin] 46.949 <- (6) Packet A|0|S0|9458697d474a5037|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|bd2f65e96246a741077b6fa4023580bc|540a51e442f7f986011cbf356c3dd709] NewConnectionIdFrame[2,<1|608b30da94dd7f07be566dbf80f327d5|1ff0e7c8bccb619358885ddfc05db35c] 46.949 State is set to Confirmed reschedule loss detection timer for PTO over 28 millis, based on 46.977/Handshake, because ackElicitingInFlight | RTT:33/7 reschedule loss detection timer for PTO over 54 millis, based on 47.003/App, because ackElicitingInFlight | RTT:33/7 46.949 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 85 millis, based on 47.035/App, because ackElicitingInFlight | RTT:33/7 46.949 -> Packet A|1|S0|bd2f65e96246a741077b6fa4023580bc|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 47.034 loss detection timeout handler running Sending probe 0, because no ack since 46.949. Current RTT: 33/7. 47.034 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 171 millis, based on 47.207/App, because ackElicitingInFlight | RTT:33/7 47.035 -> Packet PA|2|S0|bd2f65e96246a741077b6fa4023580bc|55|1 StreamFrame[0(CIB),0,17,fin] 47.206 loss detection timeout handler running Sending probe 1, because no ack since 47.035. Current RTT: 33/7. 47.206 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 343 millis, based on 47.550/App, because ackElicitingInFlight | RTT:33/7 47.206 -> Packet PA|3|S0|bd2f65e96246a741077b6fa4023580bc|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 343 millis, based on 47.551/App, because ackElicitingInFlight | RTT:33/7 47.207 -> Packet PA|4|S0|bd2f65e96246a741077b6fa4023580bc|55|1 StreamFrame[0(CIB),0,17,fin] 47.240 <- (7) Packet A|1|S0|9458697d474a5037|1060|3 AckFrame[4-3|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 47.240 Cwnd(-): 2400; inflight: 0 47.240 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 47.240 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 81 millis, based on 47.322/App, because ackElicitingInFlight | RTT:33/6 47.240 -> Packet A|5|S0|bd2f65e96246a741077b6fa4023580bc|62|3 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] RetireConnectionIdFrame[0] 47.260 -> Packet A|6|S0|bd2f65e96246a741077b6fa4023580bc|40|1 AckFrame[1-0|Δ19] 47.297 <- (8) Packet A|3|S0|9458697d474a5037|45|2 AckFrame[5-3|Δ25] Padding(13) 47.298 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 48.235 <- (9) Packet A|7|S0|9458697d474a5037|45|3 AckFrame[5-3|Δ962] PingFrame[] Padding(10) 48.235 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 48.255 -> Packet A|7|S0|bd2f65e96246a741077b6fa4023580bc|44|1 AckFrame[7,3,1|Δ19] 49.358 <- (10) Packet A|10|S0|9458697d474a5037|45|3 AckFrame[7|Δ1071] PingFrame[] Padding(10) 49.358 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 49.358 <- (11) Packet A|12|S0|9458697d474a5037|45|3 AckFrame[7|Δ1071] PingFrame[] Padding(10) 49.358 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 49.358 -> Packet A|8|S0|bd2f65e96246a741077b6fa4023580bc|41|1 AckFrame[12,10|Δ0] 50.498 <- (12) Packet A|17|S0|9458697d474a5037|45|3 AckFrame[8|Δ1108] PingFrame[] Padding(10) 50.499 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 50.518 -> Packet A|9|S0|bd2f65e96246a741077b6fa4023580bc|40|1 AckFrame[17|Δ19] 50.550 <- (13) Packet A|18|S0|9458697d474a5037|45|3 AckFrame[9|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 50.550 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 50.550 Finished downloading https://server4:443/nfxbjmzuhw at 34:56.829 on ClientConnection[c376b40a1b7f8895/9458697d474a5037(V1) with server4/193.167.100.100:443] 50.550 Closing ClientConnection[c376b40a1b7f8895/9458697d474a5037(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 50.551 -> Packet A|10|S0|bd2f65e96246a741077b6fa4023580bc|43|2 ConnectionCloseFrame[0|0|] AckFrame[18|Δ0] 50.551 Creating connection with server4:443 with v1 50.552 Setting up connection for downloading https://server4:443/nygqmswzhn at 34:56.831 on ClientConnection[76c308b69835afa0/db981f889eace268(V1) with server4/193.167.100.100:443] 50.552 Original destination connection id: 76c308b69835afa0 (scid: db981f889eace268) >- CryptoStream[I|ClientHello] 50.553 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 50.753/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.553 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.587 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 50.588 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 50.788/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 50.587 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 50.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 50.692/Handshake, because peerAwaitingAddressValidation | RTT:34/17 50.590 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 50.592 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 50.694/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 50.592 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 50.592 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 50.592 Starting downloading https://server4:443/nygqmswzhn at 34:56.871 on ClientConnection[76c308b69835afa0/db981f889eace268(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 50.694/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 50.592 Discarding pn space Initial because first Handshake message is being sent 50.592 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 50.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 50.695/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 50.593 -> Packet A|0|S0|c9ecb7a451f084ca4e9c2b2bf6242a52|55|1 StreamFrame[0(CIB),0,17,fin] 50.624 <- (2) Packet A|0|S0|db981f889eace268|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|78f0146a7f420812c97784d6fc730193|8c3b116b19f614a770ebe9ba3473de3e] NewConnectionIdFrame[2,<1|e05837b3be16b44ccdd23474631c23ba|d07039810936beb2762352389cc36e7b] 50.624 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 50.694/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 50.720/App, because ackElicitingInFlight | RTT:34/17 50.624 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 50.751/App, because ackElicitingInFlight | RTT:34/17 50.624 -> Packet A|1|S0|78f0146a7f420812c97784d6fc730193|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 50.750 loss detection timeout handler running Sending probe 0, because no ack since 50.624. Current RTT: 34/17. 50.751 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 51.005/App, because ackElicitingInFlight | RTT:34/17 50.751 -> Packet PA|2|S0|78f0146a7f420812c97784d6fc730193|55|1 StreamFrame[0(CIB),0,17,fin] 50.758 <- (3) Packet A|2|S0|db981f889eace268|45|2 HandshakeDoneFrame[] Padding(18) 50.778 -> Packet A|3|S0|78f0146a7f420812c97784d6fc730193|42|1 AckFrame[2,0|Δ19] 50.783 <- (4) Packet A|5|S0|db981f889eace268|1061|3 AckFrame[2|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 50.784 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 50.784 Cwnd(-): 6000; inflight: 0 50.784 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 50.895/App, because ackElicitingInFlight | RTT:34/13 50.784 -> Packet A|4|S0|78f0146a7f420812c97784d6fc730193|64|3 StreamFrame[0(CIB),0,17,fin] AckFrame[2,0|Δ0] RetireConnectionIdFrame[0] 50.803 -> Packet A|5|S0|78f0146a7f420812c97784d6fc730193|44|1 AckFrame[5,2,0|Δ19] 50.840 <- (5) Packet A|7|S0|db981f889eace268|45|2 AckFrame[5-3|Δ5] Padding(13) 50.841 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 50.910 <- (6) Packet A|9|S0|db981f889eace268|45|3 AckFrame[5-3|Δ74] PingFrame[] Padding(12) 50.910 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 50.929 -> Packet A|6|S0|78f0146a7f420812c97784d6fc730193|42|1 AckFrame[9,7|Δ19] 50.961 <- (7) Packet A|12|S0|db981f889eace268|45|3 AckFrame[6|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 50.962 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 50.962 Finished downloading https://server4:443/nygqmswzhn at 34:57.241 on ClientConnection[76c308b69835afa0/db981f889eace268(V1) with server4/193.167.100.100:443] 50.962 Closing ClientConnection[76c308b69835afa0/db981f889eace268(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 50.962 -> Packet A|7|S0|78f0146a7f420812c97784d6fc730193|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 50.962 Creating connection with server4:443 with v1 50.963 Setting up connection for downloading https://server4:443/cswxdbtshs at 34:57.242 on ClientConnection[73bbd6bb3929a94e/90b8a8bc9efd3c30(V1) with server4/193.167.100.100:443] 50.965 Original destination connection id: 73bbd6bb3929a94e (scid: 90b8a8bc9efd3c30) >- CryptoStream[I|ClientHello] 50.966 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 51.166/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.966 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 51.000 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 51.001 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 51.201/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 51.000 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 51.003 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.105/Handshake, because peerAwaitingAddressValidation | RTT:34/17 51.003 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 51.005 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.107/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 51.005 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 51.005 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.107/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 51.005 Discarding pn space Initial because first Handshake message is being sent 51.005 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 51.005 Starting downloading https://server4:443/cswxdbtshs at 34:57.284 on ClientConnection[73bbd6bb3929a94e/90b8a8bc9efd3c30(V1) with server4/193.167.100.100:443] 51.006 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.108/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 51.006 -> Packet A|0|S0|f99446fbb3c3a1c367412d4edc42e6ec|55|1 StreamFrame[0(CIB),0,17,fin] 51.037 <- (2) Packet A|0|S0|90b8a8bc9efd3c30|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|b09afc67ae73c6ecf67a96a361484e16|41d76b1502072d38d862b37814894721] NewConnectionIdFrame[2,<1|944b2b5dd4afcaaf1003d77ffb0b511c|2f3200e5ff0410b75f9eff96eecd6551] 51.037 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 51.107/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 51.133/App, because ackElicitingInFlight | RTT:34/17 51.037 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 51.164/App, because ackElicitingInFlight | RTT:34/17 51.037 -> Packet A|1|S0|b09afc67ae73c6ecf67a96a361484e16|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 51.164 loss detection timeout handler running Sending probe 0, because no ack since 51.037. Current RTT: 34/17. 51.164 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 51.418/App, because ackElicitingInFlight | RTT:34/17 51.164 -> Packet PA|2|S0|b09afc67ae73c6ecf67a96a361484e16|55|1 StreamFrame[0(CIB),0,17,fin] 51.417 loss detection timeout handler running Sending probe 1, because no ack since 51.164. Current RTT: 34/17. 51.417 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 51.926/App, because ackElicitingInFlight | RTT:34/17 51.418 -> Packet PA|3|S0|b09afc67ae73c6ecf67a96a361484e16|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 51.927/App, because ackElicitingInFlight | RTT:34/17 51.419 -> Packet PA|4|S0|b09afc67ae73c6ecf67a96a361484e16|55|1 StreamFrame[0(CIB),0,17,fin] 51.451 <- (3) Packet A|4|S0|90b8a8bc9efd3c30|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 51.471 -> Packet A|5|S0|b09afc67ae73c6ecf67a96a361484e16|42|1 AckFrame[4,0|Δ19] 51.634 <- (4) Packet A|7|S0|90b8a8bc9efd3c30|45|3 AckFrame[5,3,1|Δ130] PingFrame[] Padding(8) 51.634 Cwnd(-): 6000; inflight: 0 51.634 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 51.634 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 126 millis, based on 51.761/App, because ackElicitingInFlight | RTT:34/17 51.634 -> Packet A|6|S0|b09afc67ae73c6ecf67a96a361484e16|55|1 StreamFrame[0(CIB),0,17,fin] 51.654 -> Packet A|7|S0|b09afc67ae73c6ecf67a96a361484e16|40|1 AckFrame[7|Δ19] 51.686 <- (5) Packet A|10|S0|90b8a8bc9efd3c30|1063|2 AckFrame[7-5,3,1|Δ0] StreamFrame[0(CIB),0,1024,fin] 51.686 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 51.687 Finished downloading https://server4:443/cswxdbtshs at 34:57.965 on ClientConnection[73bbd6bb3929a94e/90b8a8bc9efd3c30(V1) with server4/193.167.100.100:443] 51.687 Closing ClientConnection[73bbd6bb3929a94e/90b8a8bc9efd3c30(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 51.687 -> Packet A|8|S0|b09afc67ae73c6ecf67a96a361484e16|43|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 51.687 Creating connection with server4:443 with v1 51.688 Setting up connection for downloading https://server4:443/glvzvebxmp at 34:57.966 on ClientConnection[2a6b556db4fb62a5/ac9851e7d468ed48(V1) with server4/193.167.100.100:443] 51.688 Original destination connection id: 2a6b556db4fb62a5 (scid: ac9851e7d468ed48) >- CryptoStream[I|ClientHello] 51.689 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 51.889/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 51.689 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 51.723 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ12] CryptoFrame[0,123] 51.724 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 51.924/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 51.723 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) 51.726 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.828/Handshake, because peerAwaitingAddressValidation | RTT:34/17 51.726 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 51.728 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.830/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 51.728 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 51.729 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.831/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 51.729 Discarding pn space Initial because first Handshake message is being sent 51.729 Starting downloading https://server4:443/glvzvebxmp at 34:58.007 on ClientConnection[2a6b556db4fb62a5/ac9851e7d468ed48(V1) with server4/193.167.100.100:443] 51.729 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 51.729 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.831/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 51.729 -> Packet A|0|S0|fb4df4621d05e4ed69522f91990b18e3|55|1 StreamFrame[0(CIB),0,17,fin] 51.760 <- (2) Packet A|0|S0|ac9851e7d468ed48|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|ce5d4fbbda067ba20d94767585316d45|fd99dd5fb903a12d52e8a9ecd2dcc481] NewConnectionIdFrame[2,<1|9beb2c8cb8d379ad480fbe8405c48910|d6419c5352fb19d73c957a340e20dd54] 51.760 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 51.830/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 51.856/App, because ackElicitingInFlight | RTT:34/17 51.760 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 51.887/App, because ackElicitingInFlight | RTT:34/17 51.760 -> Packet A|1|S0|ce5d4fbbda067ba20d94767585316d45|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 51.762 <- (3) Packet A|1|S0|ac9851e7d468ed48|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 51.887/App, because ackElicitingInFlight | RTT:34/17 51.762 <- (4) Packet A|2|S0|ac9851e7d468ed48|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 51.762 Finished downloading https://server4:443/glvzvebxmp at 34:58.041 on ClientConnection[2a6b556db4fb62a5/ac9851e7d468ed48(V1) with server4/193.167.100.100:443] 51.762 Closing ClientConnection[2a6b556db4fb62a5/ac9851e7d468ed48(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 51.762 -> Packet A|2|S0|ce5d4fbbda067ba20d94767585316d45|39|1 AckFrame[2-0|Δ0] 51.763 -> Packet A|3|S0|ce5d4fbbda067ba20d94767585316d45|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 51.763 Creating connection with server4:443 with v1 51.764 Setting up connection for downloading https://server4:443/raegkerdql at 34:58.043 on ClientConnection[56606e30716c2d63/e9f9b78bec6fbe7b(V1) with server4/193.167.100.100:443] 51.764 Original destination connection id: 56606e30716c2d63 (scid: e9f9b78bec6fbe7b) >- CryptoStream[I|ClientHello] 51.765 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 51.965/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 51.765 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 51.794 <- (5) Packet A|3|S0|ac9851e7d468ed48|45|2 AckFrame[2-1|Δ0] Padding(14) 51.794 -> Packet A|4|S0|ce5d4fbbda067ba20d94767585316d45|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 51.799 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 51.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 51.999/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 51.799 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 51.801 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.903/Handshake, because peerAwaitingAddressValidation | RTT:34/17 51.801 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 51.804 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.906/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 51.804 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 51.804 Starting downloading https://server4:443/raegkerdql at 34:58.083 on ClientConnection[56606e30716c2d63/e9f9b78bec6fbe7b(V1) with server4/193.167.100.100:443] 51.804 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.906/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 51.804 Discarding pn space Initial because first Handshake message is being sent 51.804 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 51.907/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 51.804 -> [Packet H|1|L|54|1 AckFrame[0|Δ0], Packet A|0|S0|15a79341dd0e3a13618ec302c601e0be|55|1 StreamFrame[0(CIB),0,17,fin]] 51.835 <- (2) Packet A|0|S0|e9f9b78bec6fbe7b|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|226cffc4b8a3f9dad09083f51b44a8e0|44d82d23ff76e56c42bea83ab2ca4691] NewConnectionIdFrame[2,<1|fc042b0ba68149e01e7d1326c66d249f|4beae5d19143afcc0b0353a51f725588] 51.836 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 51.906/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 51.931/App, because ackElicitingInFlight | RTT:34/17 51.836 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 51.963/App, because ackElicitingInFlight | RTT:34/17 51.836 -> Packet A|1|S0|226cffc4b8a3f9dad09083f51b44a8e0|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 51.837 <- (3) Packet A|2|S0|e9f9b78bec6fbe7b|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 51.856 -> Packet A|2|S0|226cffc4b8a3f9dad09083f51b44a8e0|42|1 AckFrame[2,0|Δ18] 51.894 <- (4) Packet A|3|S0|e9f9b78bec6fbe7b|1062|2 AckFrame[2,0|Δ6] StreamFrame[0(CIB),0,1024,fin] 51.895 Cwnd(-): 6000; inflight: 0 51.895 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 126 millis, based on 52.022/App, because ackElicitingInFlight | RTT:34/17 51.895 -> Packet A|3|S0|226cffc4b8a3f9dad09083f51b44a8e0|37|2 RetireConnectionIdFrame[0] Padding(1) 51.895 Finished downloading https://server4:443/raegkerdql at 34:58.174 on ClientConnection[56606e30716c2d63/e9f9b78bec6fbe7b(V1) with server4/193.167.100.100:443] 51.895 Closing ClientConnection[56606e30716c2d63/e9f9b78bec6fbe7b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 51.896 -> Packet A|4|S0|226cffc4b8a3f9dad09083f51b44a8e0|43|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 51.896 Creating connection with server4:443 with v1 51.897 Setting up connection for downloading https://server4:443/sjhlasajml at 34:58.175 on ClientConnection[5571811cc7763852/dc646ed3fb1755e0(V1) with server4/193.167.100.100:443] 51.897 Original destination connection id: 5571811cc7763852 (scid: dc646ed3fb1755e0) >- CryptoStream[I|ClientHello] 51.898 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 52.098/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 51.897 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 51.931 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ8] CryptoFrame[0,123] 51.932 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 52.132/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 51.931 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 51.934 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 52.031/Handshake, because peerAwaitingAddressValidation | RTT:33/16 51.934 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 51.937 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 52.034/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 51.936 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 51.937 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 52.034/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 51.937 Starting downloading https://server4:443/sjhlasajml at 34:58.216 on ClientConnection[5571811cc7763852/dc646ed3fb1755e0(V1) with server4/193.167.100.100:443] 51.937 Discarding pn space Initial because first Handshake message is being sent 51.937 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 51.937 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 52.034/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 51.937 -> Packet A|0|S0|9fb1451eeeaef19a8baeb25ec041b4dd|55|1 StreamFrame[0(CIB),0,17,fin] 51.951 <- (5) Packet A|4|S0|e9f9b78bec6fbe7b|45|2 AckFrame[3-2,0|Δ25] Padding(11) 51.953 -> Packet A|5|S0|226cffc4b8a3f9dad09083f51b44a8e0|43|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 51.968 <- (2) Packet A|0|S0|dc646ed3fb1755e0|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|460cb224b55b05c2ac9400e88f9edde6|15ede4ff5fe2fb9a5539d7e1e9845203] NewConnectionIdFrame[2,<1|566c44adc91b9115b46cbd22f0601114|ca43ef31954ddf0705ce57a8df62f7e5] 51.969 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 52.033/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 52.059/App, because ackElicitingInFlight | RTT:33/16 51.969 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 121 millis, based on 52.091/App, because ackElicitingInFlight | RTT:33/16 51.969 -> Packet A|1|S0|460cb224b55b05c2ac9400e88f9edde6|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 51.971 <- (3) Packet A|1|S0|dc646ed3fb1755e0|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 119 millis, based on 52.091/App, because ackElicitingInFlight | RTT:33/16 51.971 <- (4) Packet A|2|S0|dc646ed3fb1755e0|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 51.972 -> Packet A|2|S0|460cb224b55b05c2ac9400e88f9edde6|39|1 AckFrame[2-0|Δ0] 51.972 Finished downloading https://server4:443/sjhlasajml at 34:58.250 on ClientConnection[5571811cc7763852/dc646ed3fb1755e0(V1) with server4/193.167.100.100:443] 51.972 Closing ClientConnection[5571811cc7763852/dc646ed3fb1755e0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 51.972 -> Packet A|3|S0|460cb224b55b05c2ac9400e88f9edde6|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 51.972 Creating connection with server4:443 with v1 51.973 Setting up connection for downloading https://server4:443/ggvyhhpbfo at 34:58.252 on ClientConnection[282cd6e9be03bf91/b5bd4f3c5d334fcb(V1) with server4/193.167.100.100:443] 51.973 Original destination connection id: 282cd6e9be03bf91 (scid: b5bd4f3c5d334fcb) >- CryptoStream[I|ClientHello] 51.974 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 52.174/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 51.974 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 52.026 <- (5) Packet A|3|S0|dc646ed3fb1755e0|45|2 AckFrame[1-0|Δ25] Padding(13) 52.027 -> Packet A|4|S0|460cb224b55b05c2ac9400e88f9edde6|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 52.063 <- (6) Packet A|16|S0|90b8a8bc9efd3c30|45|3 AckFrame[7-5,3,1|Δ378] PingFrame[] Padding(6) 52.064 -> Packet A|9|S0|b09afc67ae73c6ecf67a96a361484e16|43|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 52.089 <- (6) Packet A|7|S0|dc646ed3fb1755e0|45|3 AckFrame[1-0|Δ88] PingFrame[] Padding(12) 52.090 -> Packet A|5|S0|460cb224b55b05c2ac9400e88f9edde6|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 52.173 loss detection timeout handler running Sending probe 0, because no ack since 51.974. Current RTT: 100/25. 52.174 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 52.174 (Probe is an initial retransmit) 52.174 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 52.574/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 52.174 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 52.573 loss detection timeout handler running Sending probe 1, because no ack since 52.174. Current RTT: 100/25. 52.573 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 52.573 (Probe is an initial retransmit) 52.573 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 53.373/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 52.573 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 52.574 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 53.374/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 52.574 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 52.607 <- (1) Packet I|2|L|1200|2 Token=[] AckFrame[2-0|Δ2] Padding(1143) 52.607 probe count not reset on ack because handshake not yet confirmed 52.607 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 53.407/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 52.608 <- (2) Packet I|3|L|1200|2 Token=[] AckFrame[3-0|Δ1] Padding(1143) 52.608 probe count not reset on ack because handshake not yet confirmed 52.608 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 52.996/Initial, because peerAwaitingAddressValidation | RTT:33/16 52.995 loss detection timeout handler running Sending probe 2, because no ack since 52.574. Current RTT: 33/12. 52.995 Sending probe because peer awaiting address validation 52.995 (Probe is Initial ping, because there is no Initial data to retransmit) 52.995 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 53.643/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 52.995 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 53.011 <- (3) Packet I|7|L|186|2 Token=[] AckFrame[3-0|Δ3214] CryptoFrame[0,123] 53.011 probe count not reset on ack because handshake not yet confirmed 53.011 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 53.659/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 -< CryptoStream[I|ServerHello] 53.011 <- (3) Packet H|4|L|1014|2 CryptoFrame[0,685] Padding(275) 53.014 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 647 millis, based on 53.662/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 53.014 -> Packet I|5|L|1201|2 Token=[] AckFrame[7,3-2|Δ0] Padding(1143) >- CryptoStream[H|Finished] 53.017 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 647 millis, based on 53.665/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 53.017 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 53.017 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 53.098/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 53.017 Discarding pn space Initial because first Handshake message is being sent 53.017 Starting downloading https://server4:443/ggvyhhpbfo at 34:59.296 on ClientConnection[282cd6e9be03bf91/b5bd4f3c5d334fcb(V1) with server4/193.167.100.100:443] 53.017 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 53.018 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 53.099/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 53.018 -> Packet A|0|S0|6314740178ed95316f5ecd88fd4e23f0|55|1 StreamFrame[0(CIB),0,17,fin] 53.049 <- (4) Packet A|0|S0|b5bd4f3c5d334fcb|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|98d1aa65340cf4142b671f0ce5e5f4e2|450935152b0b30573bfed6185dea0ab6] NewConnectionIdFrame[2,<1|98b88d2855ab08216d64d22d02d80240|8f12adb4ae47c5f968ff83f3490a12e5] 53.049 State is set to Confirmed reschedule loss detection timer for PTO over 48 millis, based on 53.098/Handshake, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 74 millis, based on 53.124/App, because ackElicitingInFlight | RTT:33/12 53.050 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 105 millis, based on 53.156/App, because ackElicitingInFlight | RTT:33/12 53.050 -> Packet A|1|S0|98d1aa65340cf4142b671f0ce5e5f4e2|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 53.107 <- (5) Packet A|1|S0|b5bd4f3c5d334fcb|45|2 AckFrame[1|Δ25] Padding(13) 53.107 Cwnd(-): 6000; inflight: 0 53.107 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 53.107 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 120 millis, based on 53.228/App, because ackElicitingInFlight | RTT:36/15 53.107 -> Packet A|2|S0|98d1aa65340cf4142b671f0ce5e5f4e2|55|1 StreamFrame[0(CIB),0,17,fin] 53.140 <- (6) Packet A|2|S0|b5bd4f3c5d334fcb|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] 53.141 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 53.140 <- (7) Packet A|3|S0|b5bd4f3c5d334fcb|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 53.141 -> Packet A|3|S0|98d1aa65340cf4142b671f0ce5e5f4e2|39|1 AckFrame[3-1|Δ0] 53.141 Finished downloading https://server4:443/ggvyhhpbfo at 34:59.420 on ClientConnection[282cd6e9be03bf91/b5bd4f3c5d334fcb(V1) with server4/193.167.100.100:443] 53.141 Closing ClientConnection[282cd6e9be03bf91/b5bd4f3c5d334fcb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 53.141 -> Packet A|4|S0|98d1aa65340cf4142b671f0ce5e5f4e2|43|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 53.142 Creating connection with server4:443 with v1 53.142 Setting up connection for downloading https://server4:443/hlgmgnpgdl at 34:59.421 on ClientConnection[19c8ba92313d1f1d/82bae15b7368384a(V1) with server4/193.167.100.100:443] 53.142 Original destination connection id: 19c8ba92313d1f1d (scid: 82bae15b7368384a) >- CryptoStream[I|ClientHello] 53.144 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 53.344/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 53.143 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 53.173 <- (8) Packet A|4|S0|b5bd4f3c5d334fcb|45|2 AckFrame[3|Δ0] Padding(13) 53.173 -> Packet A|5|S0|98d1aa65340cf4142b671f0ce5e5f4e2|43|2 ConnectionCloseFrame[0|0|] AckFrame[3-1|Δ0] 53.178 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 53.178 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 53.378/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 53.178 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 53.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 53.282/Handshake, because peerAwaitingAddressValidation | RTT:34/17 53.180 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 53.182 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 53.284/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 53.182 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 53.182 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 53.284/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 53.182 Starting downloading https://server4:443/hlgmgnpgdl at 34:59.461 on ClientConnection[19c8ba92313d1f1d/82bae15b7368384a(V1) with server4/193.167.100.100:443] 53.182 Discarding pn space Initial because first Handshake message is being sent 53.182 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 53.182 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 53.285/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 53.182 -> Packet A|0|S0|2554c9e4cb93cafad9e6d9a1c17cf708|55|1 StreamFrame[0(CIB),0,17,fin] 53.284 loss detection timeout handler running Sending probe 0, because no ack since 53.182. Current RTT: 34/17. 53.284 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 53.284 (Probe is a handshake retransmit) 53.284 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 53.488/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 53.284 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 53.487 loss detection timeout handler running Sending probe 1, because no ack since 53.182. Current RTT: 34/17. 53.487 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 53.487 (Probe is a handshake retransmit) 53.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 53.896/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 53.487 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 53.488 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 53.896/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 53.488 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 53.896 loss detection timeout handler running Sending probe 2, because no ack since 53.182. Current RTT: 34/17. 53.896 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 53.896 (Probe is a handshake retransmit) 53.896 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 54.712/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 53.896 -> Packet PH|5|L|88|1 CryptoFrame[0,36] 53.897 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 54.713/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 53.897 -> Packet PH|6|L|88|1 CryptoFrame[0,36] 54.239 <- (2) Packet A|4|S0|82bae15b7368384a|45|2 HandshakeDoneFrame[] Padding(18) 54.239 State is set to Confirmed reschedule loss detection timer for PTO over -40 millis, based on 54.198/App, because ackElicitingInFlight | RTT:34/17 54.239 loss detection timeout handler running Sending probe 3, because no ack since 53.182. Current RTT: 34/17. 54.239 (Probe is retransmit on level App) reschedule loss detection timer for PTO over -929 millis, based on 53.309/App, because ackElicitingInFlight | RTT:34/17 54.239 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 54.366/App, because ackElicitingInFlight | RTT:34/17 54.239 -> Packet PA|1|S0|2554c9e4cb93cafad9e6d9a1c17cf708|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 126 millis, based on 54.367/App, because ackElicitingInFlight | RTT:34/17 54.240 -> Packet PA|2|S0|2554c9e4cb93cafad9e6d9a1c17cf708|55|1 StreamFrame[0(CIB),0,17,fin] 54.259 -> Packet A|3|S0|2554c9e4cb93cafad9e6d9a1c17cf708|40|1 AckFrame[4|Δ19] 54.272 <- (3) Packet A|5|S0|82bae15b7368384a|1061|3 AckFrame[1|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 54.273 Cwnd(-): 6000; inflight: 55 54.273 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 94 millis, based on 54.367/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 110 millis, based on 54.384/App, because ackElicitingInFlight | RTT:34/13 54.273 -> Packet A|4|S0|2554c9e4cb93cafad9e6d9a1c17cf708|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4|Δ0] 54.272 <- (4) Packet A|6|S0|82bae15b7368384a|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 54.273 -> Packet A|5|S0|2554c9e4cb93cafad9e6d9a1c17cf708|39|1 AckFrame[6-4|Δ0] 54.273 Finished downloading https://server4:443/hlgmgnpgdl at 35:00.552 on ClientConnection[19c8ba92313d1f1d/82bae15b7368384a(V1) with server4/193.167.100.100:443] 54.273 Closing ClientConnection[19c8ba92313d1f1d/82bae15b7368384a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 54.273 -> Packet A|6|S0|2554c9e4cb93cafad9e6d9a1c17cf708|43|2 ConnectionCloseFrame[0|0|] AckFrame[6-4|Δ0] 54.274 Creating connection with server4:443 with v1 54.274 Setting up connection for downloading https://server4:443/asatbrcbta at 35:00.553 on ClientConnection[2a10155b6912d86b/57d87f1fbd41d41d(V1) with server4/193.167.100.100:443] 54.274 Original destination connection id: 2a10155b6912d86b (scid: 57d87f1fbd41d41d) >- CryptoStream[I|ClientHello] 54.276 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 54.476/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 54.276 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 54.290 <- (5) Packet A|7|S0|82bae15b7368384a|105|4 AckFrame[3-1|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|11a320bf7ac52268c642a03a5c4972bc|ea7ef398230d182ea9ddae6bd461bae3] NewConnectionIdFrame[2,<1|c7b4fe99c46a40897927c2210e2227d0|2fe18640c08de6f6aea0d57a178d43fb] 54.291 -> Packet A|7|S0|2554c9e4cb93cafad9e6d9a1c17cf708|43|2 ConnectionCloseFrame[0|0|] AckFrame[6-4|Δ0] 54.310 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 54.311 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 54.511/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 54.310 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 54.313 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 54.415/Handshake, because peerAwaitingAddressValidation | RTT:34/17 54.313 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 54.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 54.417/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 54.315 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 54.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 54.417/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 54.315 Discarding pn space Initial because first Handshake message is being sent 54.315 Starting downloading https://server4:443/asatbrcbta at 35:00.594 on ClientConnection[2a10155b6912d86b/57d87f1fbd41d41d(V1) with server4/193.167.100.100:443] 54.315 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 54.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 54.417/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 54.315 -> Packet A|0|S0|110c6ab8bb4731c61c7188f744d35a7b|55|1 StreamFrame[0(CIB),0,17,fin] 54.346 <- (2) Packet A|0|S0|57d87f1fbd41d41d|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|9144ae41f877f56ab5805dfaeb67ee67|6d14b4e2af6b6e0217e2e976f2b47113] NewConnectionIdFrame[2,<1|495030fe7de8e069a3f45038b939217a|fb6ecc542579f5ae1ab370e031a24d92] 54.347 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 54.417/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 54.442/App, because ackElicitingInFlight | RTT:34/17 54.347 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 54.474/App, because ackElicitingInFlight | RTT:34/17 54.347 -> Packet A|1|S0|9144ae41f877f56ab5805dfaeb67ee67|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 54.349 <- (3) Packet A|1|S0|57d87f1fbd41d41d|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 125 millis, based on 54.474/App, because ackElicitingInFlight | RTT:34/17 54.349 Finished downloading https://server4:443/asatbrcbta at 35:00.628 on ClientConnection[2a10155b6912d86b/57d87f1fbd41d41d(V1) with server4/193.167.100.100:443] 54.349 Closing ClientConnection[2a10155b6912d86b/57d87f1fbd41d41d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 54.350 -> Packet A|2|S0|9144ae41f877f56ab5805dfaeb67ee67|43|2 ConnectionCloseFrame[0|0|] AckFrame[1-0|Δ0] 54.350 Creating connection with server4:443 with v1 54.350 Setting up connection for downloading https://server4:443/dwpzwzuzoy at 35:00.629 on ClientConnection[ee612f46321d0484/c55341294a6b984e(V1) with server4/193.167.100.100:443] 54.350 Original destination connection id: ee612f46321d0484 (scid: c55341294a6b984e) >- CryptoStream[I|ClientHello] 54.351 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 54.551/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 54.351 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 54.550 loss detection timeout handler running Sending probe 0, because no ack since 54.351. Current RTT: 100/25. 54.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 54.551 (Probe is an initial retransmit) 54.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 54.951/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 54.551 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 54.585 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ10] CryptoFrame[0,123] 54.586 probe count not reset on ack because handshake not yet confirmed 54.586 Retransmitting CryptoFrame[0,257] on level Initial 54.586 Cwnd(-): 6000; inflight: 0 54.586 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 54.986/Initial, because peerAwaitingAddressValidation | RTT:100/25 54.586 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 54.790/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 54.586 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 54.585 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 54.588 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 54.792/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 54.588 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 54.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 54.794/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 54.590 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 54.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 54.590 Starting downloading https://server4:443/dwpzwzuzoy at 35:00.869 on ClientConnection[ee612f46321d0484/c55341294a6b984e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 54.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 54.590 Discarding pn space Initial because first Handshake message is being sent 54.590 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 54.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 54.692/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 54.590 -> Packet A|0|S0|3eb96e786e5d7b77d1e91d0330972127|55|1 StreamFrame[0(CIB),0,17,fin] 54.621 <- (2) Packet A|0|S0|c55341294a6b984e|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|8840d5fc86eca0383e7996828418f3af|dfa8de4f48b25d772e7cd7cad9469c4b] NewConnectionIdFrame[2,<1|9a920ce2fcd1407779a807afd7a8b0e3|adf4871498cc211f2b52c40f10237cb4] 54.622 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 54.692/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 54.717/App, because ackElicitingInFlight | RTT:34/17 54.622 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 54.749/App, because ackElicitingInFlight | RTT:34/17 54.622 -> Packet A|1|S0|8840d5fc86eca0383e7996828418f3af|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 54.748 loss detection timeout handler running Sending probe 0, because no ack since 54.622. Current RTT: 34/17. 54.748 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 55.002/App, because ackElicitingInFlight | RTT:34/17 54.748 -> Packet PA|2|S0|8840d5fc86eca0383e7996828418f3af|55|1 StreamFrame[0(CIB),0,17,fin] 54.755 <- (3) Packet A|2|S0|c55341294a6b984e|45|2 HandshakeDoneFrame[] Padding(18) 54.755 <- (4) Packet A|4|S0|c55341294a6b984e|45|2 HandshakeDoneFrame[] Padding(18) 54.755 -> Packet A|3|S0|8840d5fc86eca0383e7996828418f3af|43|1 AckFrame[4,2,0|Δ0] 54.781 <- (5) Packet A|5|S0|c55341294a6b984e|1061|3 AckFrame[2|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 54.781 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 54.781 Cwnd(-): 3000; inflight: 0 54.781 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 54.892/App, because ackElicitingInFlight | RTT:34/13 54.781 -> Packet A|4|S0|8840d5fc86eca0383e7996828418f3af|66|3 StreamFrame[0(CIB),0,17,fin] AckFrame[4,2,0|Δ0] RetireConnectionIdFrame[0] 54.781 <- (6) Packet A|6|S0|c55341294a6b984e|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 54.782 Finished downloading https://server4:443/dwpzwzuzoy at 35:01.061 on ClientConnection[ee612f46321d0484/c55341294a6b984e(V1) with server4/193.167.100.100:443] 54.782 -> Packet A|5|S0|8840d5fc86eca0383e7996828418f3af|43|1 AckFrame[6-4,2,0|Δ0] 54.782 Closing ClientConnection[ee612f46321d0484/c55341294a6b984e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 54.782 -> Packet A|6|S0|8840d5fc86eca0383e7996828418f3af|47|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,2,0|Δ0] 54.782 Creating connection with server4:443 with v1 54.783 Setting up connection for downloading https://server4:443/ksaztuamwd at 35:01.062 on ClientConnection[aea38a5668aa81ed/d6432d64e5786cf4(V1) with server4/193.167.100.100:443] 54.783 Original destination connection id: aea38a5668aa81ed (scid: d6432d64e5786cf4) >- CryptoStream[I|ClientHello] 54.784 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 54.984/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 54.784 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 54.818 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 54.819 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 55.019/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 54.818 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 54.820 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 54.923/Handshake, because peerAwaitingAddressValidation | RTT:34/17 54.820 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 54.822 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 54.924/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 54.822 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 54.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 54.823 Starting downloading https://server4:443/ksaztuamwd at 35:01.101 on ClientConnection[aea38a5668aa81ed/d6432d64e5786cf4(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 54.925/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 54.823 Discarding pn space Initial because first Handshake message is being sent 54.823 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 54.823 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 54.925/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 54.823 -> Packet A|0|S0|e04d70167aeb4f899aa9050c87ed1f64|55|1 StreamFrame[0(CIB),0,17,fin] 54.854 <- (2) Packet A|0|S0|d6432d64e5786cf4|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|baa07eca997d0c112e87124189effa88|bdf53445f1e758ba855fbcd66a5e71ab] NewConnectionIdFrame[2,<1|3e37f263411d3d528e34544c77584654|8754aed1712a3b0c88b7fdff3593c288] 54.854 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 54.924/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 54.950/App, because ackElicitingInFlight | RTT:34/17 54.854 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 54.982/App, because ackElicitingInFlight | RTT:34/17 54.855 -> Packet A|1|S0|baa07eca997d0c112e87124189effa88|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 54.856 <- (3) Packet A|2|S0|d6432d64e5786cf4|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 54.874 -> Packet A|2|S0|baa07eca997d0c112e87124189effa88|42|1 AckFrame[2,0|Δ18] 54.912 <- (4) Packet A|3|S0|d6432d64e5786cf4|1060|2 AckFrame[2-0|Δ5] StreamFrame[0(CIB),0,1024,fin] 54.912 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 54.913 Finished downloading https://server4:443/ksaztuamwd at 35:01.191 on ClientConnection[aea38a5668aa81ed/d6432d64e5786cf4(V1) with server4/193.167.100.100:443] 54.913 Closing ClientConnection[aea38a5668aa81ed/d6432d64e5786cf4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 54.913 -> Packet A|3|S0|baa07eca997d0c112e87124189effa88|43|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 54.913 Creating connection with server4:443 with v1 54.913 Setting up connection for downloading https://server4:443/ljuxiqjrvn at 35:01.192 on ClientConnection[aec73541677be018/22f80eccc4c3fade(V1) with server4/193.167.100.100:443] 54.913 Original destination connection id: aec73541677be018 (scid: 22f80eccc4c3fade) >- CryptoStream[I|ClientHello] 54.915 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 55.115/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 54.914 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.114 loss detection timeout handler running Sending probe 0, because no ack since 54.914. Current RTT: 100/25. 55.114 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 55.114 (Probe is an initial retransmit) 55.114 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 55.514/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 55.114 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.148 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ10] CryptoFrame[0,123] 55.149 probe count not reset on ack because handshake not yet confirmed 55.149 Retransmitting CryptoFrame[0,257] on level Initial 55.149 Cwnd(-): 6000; inflight: 0 55.149 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 55.549/Initial, because peerAwaitingAddressValidation | RTT:100/25 55.149 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 55.353/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 55.149 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 55.148 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 55.151 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 55.355/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 55.151 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 55.153 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 55.357/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 55.153 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 55.153 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 55.255/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 55.153 Starting downloading https://server4:443/ljuxiqjrvn at 35:01.432 on ClientConnection[aec73541677be018/22f80eccc4c3fade(V1) with server4/193.167.100.100:443] 55.153 Discarding pn space Initial because first Handshake message is being sent 55.153 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 55.154 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 55.256/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 55.154 -> Packet A|0|S0|39d16927889fa689e8b6b0c6076a7bd2|55|1 StreamFrame[0(CIB),0,17,fin] 55.182 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 55.185 <- (3) Packet A|0|S0|22f80eccc4c3fade|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|e5254b8a8ebc2c525badd761d2396948|a29155a3fcf25daeeffb77a6caf7bbff] NewConnectionIdFrame[2,<1|63b2e6c879f05733d2d88e06805c3c58|69381b11450928ebdac7f9a75751b4f8] 55.185 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 55.255/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 55.281/App, because ackElicitingInFlight | RTT:34/17 55.185 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 55.312/App, because ackElicitingInFlight | RTT:34/17 55.185 -> Packet A|1|S0|e5254b8a8ebc2c525badd761d2396948|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 55.187 <- (4) Packet A|2|S0|22f80eccc4c3fade|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 55.205 -> Packet A|2|S0|e5254b8a8ebc2c525badd761d2396948|42|1 AckFrame[2,0|Δ18] 55.312 loss detection timeout handler running Sending probe 0, because no ack since 55.185. Current RTT: 34/17. 55.312 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 55.566/App, because ackElicitingInFlight | RTT:34/17 55.312 -> Packet PA|3|S0|e5254b8a8ebc2c525badd761d2396948|55|1 StreamFrame[0(CIB),0,17,fin] 55.366 <- (5) Packet A|5|S0|22f80eccc4c3fade|45|3 AckFrame[3-0|Δ22] PingFrame[] Padding(12) 55.366 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 55.366 <- (6) Packet A|7|S0|22f80eccc4c3fade|45|3 AckFrame[3-0|Δ22] PingFrame[] Padding(12) 55.366 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 55.367 -> Packet A|4|S0|e5254b8a8ebc2c525badd761d2396948|41|1 AckFrame[7,5|Δ0] 55.399 <- (7) Packet A|8|S0|22f80eccc4c3fade|1059|2 AckFrame[4|Δ0] StreamFrame[0(CIB),0,1024,fin] 55.399 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 55.399 Finished downloading https://server4:443/ljuxiqjrvn at 35:01.678 on ClientConnection[aec73541677be018/22f80eccc4c3fade(V1) with server4/193.167.100.100:443] 55.400 Closing ClientConnection[aec73541677be018/22f80eccc4c3fade(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 55.400 -> Packet A|5|S0|e5254b8a8ebc2c525badd761d2396948|43|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 55.400 Creating connection with server4:443 with v1 55.400 Setting up connection for downloading https://server4:443/pxqkmfxbjt at 35:01.679 on ClientConnection[f2ae150755966b34/a3610f90c8666411(V1) with server4/193.167.100.100:443] 55.400 Original destination connection id: f2ae150755966b34 (scid: a3610f90c8666411) >- CryptoStream[I|ClientHello] 55.401 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 55.601/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 55.401 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.436 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 55.436 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 55.636/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 55.436 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 55.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 55.540/Handshake, because peerAwaitingAddressValidation | RTT:34/17 55.438 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 55.440 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 55.542/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 55.440 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 55.440 Starting downloading https://server4:443/pxqkmfxbjt at 35:01.719 on ClientConnection[f2ae150755966b34/a3610f90c8666411(V1) with server4/193.167.100.100:443] 55.440 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 55.542/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 55.440 Discarding pn space Initial because first Handshake message is being sent 55.440 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 55.440 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 55.542/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 55.440 -> Packet A|0|S0|d33d342710b11fd64d0e6c17e1b56e58|55|1 StreamFrame[0(CIB),0,17,fin] 55.471 <- (2) Packet A|0|S0|a3610f90c8666411|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|64067a8ec742eed4c8e99d648e01ec55|7a2d6124b32bd27fa1945c7eeadcbf47] NewConnectionIdFrame[2,<1|a266555491f934bd01f3a7fadfd2892b|c8a2abb3210fdafcf28c574952c928e5] 55.472 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 55.542/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 55.567/App, because ackElicitingInFlight | RTT:34/17 55.472 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 55.599/App, because ackElicitingInFlight | RTT:34/17 55.472 -> Packet A|1|S0|64067a8ec742eed4c8e99d648e01ec55|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 55.473 <- (3) Packet A|1|S0|a3610f90c8666411|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 55.599/App, because ackElicitingInFlight | RTT:34/17 55.473 <- (4) Packet A|2|S0|a3610f90c8666411|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 55.474 Finished downloading https://server4:443/pxqkmfxbjt at 35:01.753 on ClientConnection[f2ae150755966b34/a3610f90c8666411(V1) with server4/193.167.100.100:443] 55.474 -> Packet A|2|S0|64067a8ec742eed4c8e99d648e01ec55|39|1 AckFrame[2-0|Δ0] 55.474 Closing ClientConnection[f2ae150755966b34/a3610f90c8666411(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 55.474 -> Packet A|3|S0|64067a8ec742eed4c8e99d648e01ec55|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 55.474 Creating connection with server4:443 with v1 55.475 Setting up connection for downloading https://server4:443/iodcmokdae at 35:01.754 on ClientConnection[4aec72399da1201a/b77c34fb6d71e2a6(V1) with server4/193.167.100.100:443] 55.475 Original destination connection id: 4aec72399da1201a (scid: b77c34fb6d71e2a6) >- CryptoStream[I|ClientHello] 55.476 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 55.676/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 55.476 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 55.529 <- (5) Packet A|3|S0|a3610f90c8666411|45|2 AckFrame[1-0|Δ25] Padding(13) 55.529 -> Packet A|4|S0|64067a8ec742eed4c8e99d648e01ec55|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 55.675 loss detection timeout handler running Sending probe 0, because no ack since 55.476. Current RTT: 100/25. 55.675 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 55.675 (Probe is an initial retransmit) 55.675 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 56.075/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 55.675 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 56.075 loss detection timeout handler running Sending probe 1, because no ack since 55.675. Current RTT: 100/25. 56.075 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 56.075 (Probe is an initial retransmit) 56.075 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 56.875/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 56.075 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 56.076 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 56.876/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 56.076 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 56.875 loss detection timeout handler running Sending probe 2, because no ack since 56.076. Current RTT: 100/25. 56.875 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 56.875 (Probe is an initial retransmit) 56.875 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 58.475/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 56.875 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 56.877 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 58.477/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 56.876 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 56.909 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[4-3|Δ2] Padding(1143) 56.910 probe count not reset on ack because handshake not yet confirmed 56.910 Retransmitting CryptoFrame[0,257] on level Initial 56.910 Cwnd(-): 6000; inflight: 1200 56.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 58.510/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 56.910 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 57.686/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 56.910 -> Packet I|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) 57.111 <- (2) Packet I|4|L|186|2 Token=[] AckFrame[5-3|Δ1608] CryptoFrame[0,123] 57.112 probe count not reset on ack because handshake not yet confirmed 57.112 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 57.888/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[I|ServerHello] 57.111 <- (2) Packet H|2|L|1014|2 CryptoFrame[0,683] Padding(277) 57.114 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2447 millis, based on 59.562/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/62 57.114 -> Packet I|7|L|1201|2 Token=[] AckFrame[4,1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 57.116 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 2447 millis, based on 59.564/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/62 57.116 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 57.116 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 305 millis, based on 57.422/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/62 57.116 Starting downloading https://server4:443/iodcmokdae at 35:03.395 on ClientConnection[4aec72399da1201a/b77c34fb6d71e2a6(V1) with server4/193.167.100.100:443] 57.116 Discarding pn space Initial because first Handshake message is being sent 57.116 -> Packet H|1|L|54|1 AckFrame[2|Δ0] 57.117 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 305 millis, based on 57.423/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:58/62 57.117 -> Packet A|0|S0|a69fbb90c8959bed59591639dfc37964|55|1 StreamFrame[0(CIB),0,17,fin] 57.148 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 57.148 <- (4) Packet A|0|S0|b77c34fb6d71e2a6|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|3194cdcd44a0a4a0f42735316cc1cc5a|5fb5f3e116f12f0e58f45f9702879438] NewConnectionIdFrame[2,<1|79294520f059e78e914a8d364258b216|aeed205591ef8f0beceeb68a03812612] 57.148 State is set to Confirmed reschedule loss detection timer for PTO over 273 millis, based on 57.422/Handshake, because ackElicitingInFlight | RTT:58/62 reschedule loss detection timer for PTO over 299 millis, based on 57.448/App, because ackElicitingInFlight | RTT:58/62 57.148 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 330 millis, based on 57.479/App, because ackElicitingInFlight | RTT:58/62 57.148 -> Packet A|1|S0|3194cdcd44a0a4a0f42735316cc1cc5a|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 57.150 <- (5) Packet A|1|S0|b77c34fb6d71e2a6|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 329 millis, based on 57.479/App, because ackElicitingInFlight | RTT:58/62 57.168 -> Packet A|2|S0|3194cdcd44a0a4a0f42735316cc1cc5a|40|1 AckFrame[1-0|Δ18] 57.206 <- (6) Packet A|3|S0|b77c34fb6d71e2a6|45|2 AckFrame[2-1|Δ6] Padding(13) 57.206 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 57.270 <- (7) Packet A|5|S0|b77c34fb6d71e2a6|45|3 AckFrame[2-1|Δ70] PingFrame[] Padding(12) 57.270 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 57.289 -> Packet A|3|S0|3194cdcd44a0a4a0f42735316cc1cc5a|42|1 AckFrame[5,3|Δ19] 57.321 <- (8) Packet A|8|S0|b77c34fb6d71e2a6|45|3 AckFrame[3|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 57.321 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 57.322 Finished downloading https://server4:443/iodcmokdae at 35:03.600 on ClientConnection[4aec72399da1201a/b77c34fb6d71e2a6(V1) with server4/193.167.100.100:443] 57.322 Closing ClientConnection[4aec72399da1201a/b77c34fb6d71e2a6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 57.322 -> Packet A|4|S0|3194cdcd44a0a4a0f42735316cc1cc5a|43|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0]