0.000 Creating connection with server4:443 with v1 0.081 Setting up connection for downloading https://server4:443/kjnmtvoduz at 32:44.599 on ClientConnection[ab370474ba0cd050/7dfb28c516313dfc(V1) with server4/193.167.100.100:443] 0.082 Original destination connection id: ab370474ba0cd050 (scid: 7dfb28c516313dfc) >- CryptoStream[I|ClientHello] 0.263 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.464/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.258 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.464 loss detection timeout handler running Sending probe 0, because no ack since 0.258. Current RTT: 100/25. 0.465 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.467 (Probe is an initial retransmit) 0.469 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.869/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.469 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.868 loss detection timeout handler running Sending probe 1, because no ack since 0.469. Current RTT: 100/25. 0.869 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.869 (Probe is an initial retransmit) 0.870 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 1.670/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.870 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.871 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 1.671/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.871 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.904 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[2-1|Δ2] Padding(1143) 0.917 probe count not reset on ack because handshake not yet confirmed 0.921 Retransmitting CryptoFrame[0,257] on level Initial 0.923 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 1.723/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.923 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) 0.923 Cwnd(-): 6000; inflight: 2400 0.925 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 1.725/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.511 <- (2) Packet I|6|L|186|2 Token=[] AckFrame[3-1|Δ4846] CryptoFrame[0,123] 1.512 probe count not reset on ack because handshake not yet confirmed 1.512 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 1.900/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[I|ServerHello] 1.530 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3059 millis, based on 4.590/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:109/164 1.530 -> Packet I|5|L|1201|2 Token=[] AckFrame[6,1|Δ0] Padding(1143) 1.511 <- (2) Packet H|4|L|1014|2 CryptoFrame[0,685] Padding(275) >- CryptoStream[H|Finished] 1.557 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3059 millis, based on 4.617/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:109/164 1.557 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.561 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 1.563 Starting downloading https://server4:443/kjnmtvoduz at 32:46.097 on ClientConnection[ab370474ba0cd050/7dfb28c516313dfc(V1) with server4/193.167.100.100:443] 1.569 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 764 millis, based on 2.334/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:109/164 1.569 Discarding pn space Initial because first Handshake message is being sent 1.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 764 millis, based on 2.355/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:109/164 1.590 <- (3) Packet A|0|S0|7dfb28c516313dfc|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|dec8b6f8805e926e2a7d34aa18c446b6|9266fcc00071ec924b190e0f067d31b9] NewConnectionIdFrame[2,<1|878a26700a9dd2d02d904d94170043be|95475c44e320fa258f16792032debbc6] 1.602 State is set to Confirmed 1.589 -> Packet A|0|S0|117c8e2665f4ff4764363c940554a1bf|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 720 millis, based on 2.322/Handshake, because ackElicitingInFlight | RTT:109/164 reschedule loss detection timer for PTO over 777 millis, based on 2.379/App, because ackElicitingInFlight | RTT:109/164 1.602 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 789 millis, based on 2.395/App, because ackElicitingInFlight | RTT:109/164 1.605 -> Packet A|1|S0|dec8b6f8805e926e2a7d34aa18c446b6|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 2.395 loss detection timeout handler running Sending probe 0, because no ack since 1.605. Current RTT: 109/164. 2.396 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 1579 millis, based on 3.976/App, because ackElicitingInFlight | RTT:109/164 2.396 -> Packet PA|2|S0|dec8b6f8805e926e2a7d34aa18c446b6|55|1 StreamFrame[0(CIB),0,17,fin] 3.976 loss detection timeout handler running Sending probe 1, because no ack since 2.396. Current RTT: 109/164. 3.976 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 3159 millis, based on 7.137/App, because ackElicitingInFlight | RTT:109/164 3.977 -> Packet PA|3|S0|dec8b6f8805e926e2a7d34aa18c446b6|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 3159 millis, based on 7.138/App, because ackElicitingInFlight | RTT:109/164 3.978 -> Packet PA|4|S0|dec8b6f8805e926e2a7d34aa18c446b6|55|1 StreamFrame[0(CIB),0,17,fin] 4.009 <- (4) Packet A|2|S0|7dfb28c516313dfc|45|2 AckFrame[3,1|Δ0] Padding(12) 4.011 Cwnd(-): 3000; inflight: 55 4.011 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 756 millis, based on 4.768/App, because ackElicitingInFlight | RTT:109/164 reschedule loss detection timer for PTO over 695 millis, based on 4.708/App, because ackElicitingInFlight | RTT:99/143 4.012 -> Packet A|5|S0|dec8b6f8805e926e2a7d34aa18c446b6|55|1 StreamFrame[0(CIB),0,17,fin] 4.011 <- (5) Packet A|4|S0|7dfb28c516313dfc|45|3 AckFrame[4-3,1|Δ1] StreamFrame[0(CIB),1024,0,fin] Padding(6) reschedule loss detection timer for PTO over 695 millis, based on 4.708/App, because ackElicitingInFlight | RTT:99/143 4.032 -> Packet A|6|S0|dec8b6f8805e926e2a7d34aa18c446b6|42|1 AckFrame[4,2|Δ19] 4.069 <- (6) Packet A|5|S0|7dfb28c516313dfc|45|2 AckFrame[5-3,1|Δ26] Padding(11) 4.070 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.508 <- (7) Packet A|13|S0|7dfb28c516313dfc|45|3 AckFrame[5-3,1|Δ464] PingFrame[] Padding(8) 4.509 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.528 -> Packet A|7|S0|dec8b6f8805e926e2a7d34aa18c446b6|44|1 AckFrame[13,5-4,2|Δ19] 4.561 <- (8) Packet A|14|S0|7dfb28c516313dfc|1060|2 AckFrame[7|Δ0] StreamFrame[0(CIB),0,1024,fin] 4.562 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 4.564 Finished downloading https://server4:443/kjnmtvoduz at 32:49.098 on ClientConnection[ab370474ba0cd050/7dfb28c516313dfc(V1) with server4/193.167.100.100:443] 4.566 Closing ClientConnection[ab370474ba0cd050/7dfb28c516313dfc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 4.568 Creating connection with server4:443 with v1 4.568 Setting up connection for downloading https://server4:443/vvuamwehhv at 32:49.103 on ClientConnection[b3d306a79225dea8/bd0122247f5aa127(V1) with server4/193.167.100.100:443] 4.569 Original destination connection id: b3d306a79225dea8 (scid: bd0122247f5aa127) >- CryptoStream[I|ClientHello] 4.571 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.771/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.571 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.568 -> Packet A|8|S0|dec8b6f8805e926e2a7d34aa18c446b6|44|2 ConnectionCloseFrame[0|0|] AckFrame[14|Δ5] 4.771 loss detection timeout handler running Sending probe 0, because no ack since 4.571. Current RTT: 100/25. 4.771 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.771 (Probe is an initial retransmit) 4.772 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.172/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.772 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.806 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ10] CryptoFrame[0,123] 4.807 probe count not reset on ack because handshake not yet confirmed 4.807 Retransmitting CryptoFrame[0,257] on level Initial 4.807 Cwnd(-): 6000; inflight: 0 4.808 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 5.208/Initial, because peerAwaitingAddressValidation | RTT:100/25 4.808 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 5.012/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.808 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 4.806 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 4.812 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 5.016/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.811 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 4.815 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 5.019/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.815 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 4.816 Starting downloading https://server4:443/vvuamwehhv at 32:49.350 on ClientConnection[b3d306a79225dea8/bd0122247f5aa127(V1) with server4/193.167.100.100:443] 4.816 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 4.816 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 4.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 4.919/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 101 millis, based on 4.919/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.817 Discarding pn space Initial because first Handshake message is being sent 4.817 -> Packet A|0|S0|58d62086c89698d082e9760b22f97047|55|1 StreamFrame[0(CIB),0,17,fin] 4.843 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.847 <- (3) Packet A|0|S0|bd0122247f5aa127|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|c93ca712c1e2624979d64c4740a12ae3|103f0bdd7bd97e2295804e0e849c6afb] NewConnectionIdFrame[2,<1|015e5fb30ea7695f79c05060657e1681|f30fe7f5817103d8500e942d4ba88b25] 4.847 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 4.917/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 4.944/App, because ackElicitingInFlight | RTT:34/17 4.848 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 4.975/App, because ackElicitingInFlight | RTT:34/17 4.848 -> Packet A|1|S0|c93ca712c1e2624979d64c4740a12ae3|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 4.905 <- (4) Packet A|1|S0|bd0122247f5aa127|45|2 AckFrame[1|Δ25] Padding(13) 4.906 Cwnd(-): 3000; inflight: 0 4.906 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 4.906 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 133 millis, based on 5.040/App, because ackElicitingInFlight | RTT:37/18 4.906 -> Packet A|2|S0|c93ca712c1e2624979d64c4740a12ae3|55|1 StreamFrame[0(CIB),0,17,fin] 5.040 loss detection timeout handler running Sending probe 0, because no ack since 4.906. Current RTT: 37/18. 5.040 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 267 millis, based on 5.308/App, because ackElicitingInFlight | RTT:37/18 5.040 -> Packet PA|3|S0|c93ca712c1e2624979d64c4740a12ae3|55|1 StreamFrame[0(CIB),0,17,fin] 5.073 <- (5) Packet A|4|S0|bd0122247f5aa127|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 5.093 -> Packet A|4|S0|c93ca712c1e2624979d64c4740a12ae3|42|1 AckFrame[4,1|Δ19] 5.131 <- (6) Packet A|5|S0|bd0122247f5aa127|1062|2 AckFrame[4-3,1|Δ5] StreamFrame[0(CIB),0,1024,fin] 5.132 Cwnd(-): 2400; inflight: 0 5.132 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 5.132 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 133 millis, based on 5.266/App, because ackElicitingInFlight | RTT:37/18 5.132 -> Packet A|5|S0|c93ca712c1e2624979d64c4740a12ae3|55|1 StreamFrame[0(CIB),0,17,fin] 5.132 Finished downloading https://server4:443/vvuamwehhv at 32:49.667 on ClientConnection[b3d306a79225dea8/bd0122247f5aa127(V1) with server4/193.167.100.100:443] 5.133 Closing ClientConnection[b3d306a79225dea8/bd0122247f5aa127(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.133 -> Packet A|6|S0|c93ca712c1e2624979d64c4740a12ae3|43|2 ConnectionCloseFrame[0|0|] AckFrame[5|Δ0] 5.133 Creating connection with server4:443 with v1 5.134 Setting up connection for downloading https://server4:443/florhubnsb at 32:49.669 on ClientConnection[c097b066974e76c3/6b4b44a87b53f055(V1) with server4/193.167.100.100:443] 5.134 Original destination connection id: c097b066974e76c3 (scid: 6b4b44a87b53f055) >- CryptoStream[I|ClientHello] 5.137 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.337/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.136 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.171 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ8] CryptoFrame[0,123] 5.172 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.372/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 5.171 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 5.177 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.279/Handshake, because peerAwaitingAddressValidation | RTT:34/17 5.177 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 5.181 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.283/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.181 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.182 Starting downloading https://server4:443/florhubnsb at 32:49.716 on ClientConnection[c097b066974e76c3/6b4b44a87b53f055(V1) with server4/193.167.100.100:443] 5.182 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.284/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.182 Discarding pn space Initial because first Handshake message is being sent 5.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 5.285/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.183 -> [Packet H|1|L|54|1 AckFrame[0|Δ0], Packet A|0|S0|6cdb6b752e02ab81e1862796861bc54a|55|1 StreamFrame[0(CIB),0,17,fin]] 5.284 loss detection timeout handler running Sending probe 0, because no ack since 5.181. Current RTT: 34/17. 5.284 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.284 (Probe is a handshake retransmit) 5.285 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 5.489/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.285 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 5.448 <- (2) Packet A|2|S0|6b4b44a87b53f055|45|2 HandshakeDoneFrame[] Padding(18) 5.448 State is set to Confirmed reschedule loss detection timer for PTO over -11 millis, based on 5.437/App, because ackElicitingInFlight | RTT:34/17 5.449 loss detection timeout handler running Sending probe 0, because no ack since 5.183. Current RTT: 34/17. reschedule loss detection timer for PTO over -138 millis, based on 5.310/App, because ackElicitingInFlight | RTT:34/17 5.449 Discarding pn space Handshake because HandshakeDone is received 5.449 (Probe is retransmit on level App) 5.448 <- (3) Packet A|4|S0|6b4b44a87b53f055|45|2 HandshakeDoneFrame[] Padding(18) reschedule loss detection timer for PTO over 253 millis, based on 5.703/App, because ackElicitingInFlight | RTT:34/17 5.449 -> Packet PA|1|S0|6cdb6b752e02ab81e1862796861bc54a|55|1 StreamFrame[0(CIB),0,17,fin] 5.450 -> Packet A|2|S0|6cdb6b752e02ab81e1862796861bc54a|41|1 AckFrame[4,2|Δ0] 5.481 <- (4) Packet A|5|S0|6b4b44a87b53f055|103|3 AckFrame[2-1|Δ0] NewConnectionIdFrame[1,<1|21c727dbfc22e968a5d3eacfb3630f70|fe6ab2793c420a2d76523f08a13b2152] NewConnectionIdFrame[2,<1|0315c0658f73cfc462f108c6155fd273|380a55f972ed0a6df51ef2530c8350a4] 5.482 Cwnd(-): 6000; inflight: 0 5.482 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 5.482 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 126 millis, based on 5.609/App, because ackElicitingInFlight | RTT:34/17 5.482 -> Packet A|3|S0|6cdb6b752e02ab81e1862796861bc54a|55|1 StreamFrame[0(CIB),0,17,fin] 5.482 <- (5) Packet A|6|S0|6b4b44a87b53f055|1054|1 StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 126 millis, based on 5.610/App, because ackElicitingInFlight | RTT:34/17 5.483 <- (6) Packet A|7|S0|6b4b44a87b53f055|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 5.483 -> Packet A|4|S0|21c727dbfc22e968a5d3eacfb3630f70|41|2 RetireConnectionIdFrame[0] AckFrame[5|Δ0] 5.484 -> Packet A|5|S0|21c727dbfc22e968a5d3eacfb3630f70|39|1 AckFrame[7-5|Δ0] 5.484 Finished downloading https://server4:443/florhubnsb at 32:50.019 on ClientConnection[c097b066974e76c3/6b4b44a87b53f055(V1) with server4/193.167.100.100:443] 5.484 Closing ClientConnection[c097b066974e76c3/6b4b44a87b53f055(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.485 Creating connection with server4:443 with v1 5.485 -> Packet A|6|S0|21c727dbfc22e968a5d3eacfb3630f70|43|2 ConnectionCloseFrame[0|0|] AckFrame[7-5|Δ0] 5.486 Setting up connection for downloading https://server4:443/qrmtrbgwto at 32:50.020 on ClientConnection[bb17a15e7c3a0f3b/59e182051ce9d562(V1) with server4/193.167.100.100:443] 5.486 Original destination connection id: bb17a15e7c3a0f3b (scid: 59e182051ce9d562) >- CryptoStream[I|ClientHello] 5.488 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.688/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.488 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.687 loss detection timeout handler running Sending probe 0, because no ack since 5.488. Current RTT: 100/25. 5.687 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.687 (Probe is an initial retransmit) 5.688 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 6.088/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.688 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.087 loss detection timeout handler running Sending probe 1, because no ack since 5.688. Current RTT: 100/25. 6.087 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.087 (Probe is an initial retransmit) 6.088 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.888/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.088 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.089 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 6.889/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.089 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.122 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[3,1|Δ2] Padding(1141) 6.123 probe count not reset on ack because handshake not yet confirmed 6.123 Retransmitting CryptoFrame[0,257] on level Initial 6.124 Cwnd(-): 6000; inflight: 1200 6.124 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) 6.157 <- (2) Packet I|2|L|1200|2 Token=[] AckFrame[4-3,1|Δ1] Padding(1141) 6.158 probe count not reset on ack because handshake not yet confirmed 6.158 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 6.546/Initial, because peerAwaitingAddressValidation | RTT:33/16 6.545 loss detection timeout handler running Sending probe 2, because no ack since 6.124. Current RTT: 33/12. 6.545 Sending probe because peer awaiting address validation 6.545 (Probe is Initial ping, because there is no Initial data to retransmit) 6.546 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 7.194/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 6.546 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 6.580 <- (3) Packet I|3|L|1200|2 Token=[] AckFrame[5-3,1|Δ2] Padding(1141) 6.580 probe count not reset on ack because handshake not yet confirmed 6.581 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 7.229/Initial, because peerAwaitingAddressValidation | RTT:33/12 7.228 loss detection timeout handler running Sending probe 3, because no ack since 6.546. Current RTT: 33/9. 7.228 Sending probe because peer awaiting address validation 7.228 (Probe is Initial ping, because there is no Initial data to retransmit) 7.229 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1103 millis, based on 8.333/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/9 7.229 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 7.262 <- (4) Packet I|8|L|1200|2 Token=[] AckFrame[6-3,1|Δ3] Padding(1141) 7.263 probe count not reset on ack because handshake not yet confirmed 7.263 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1103 millis, based on 8.367/Initial, because peerAwaitingAddressValidation | RTT:33/9 8.366 loss detection timeout handler running Sending probe 4, because no ack since 7.229. Current RTT: 33/7. 8.367 Sending probe because peer awaiting address validation 8.367 (Probe is Initial ping, because there is no Initial data to retransmit) 8.367 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1951 millis, based on 10.319/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 8.367 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 8.723 <- (5) Packet I|10|L|188|2 Token=[] AckFrame[6-3,1|Δ11685] CryptoFrame[0,123] 8.724 probe count not reset on ack because handshake not yet confirmed 8.724 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1951 millis, based on 10.676/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 -< CryptoStream[I|ServerHello] 8.727 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.723 <- (5) Packet H|6|L|1012|2 CryptoFrame[0,685] Padding(273) reschedule loss detection timer for PTO over 1951 millis, based on 10.679/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 8.727 -> Packet I|8|L|1201|2 Token=[] AckFrame[10,8,3-1|Δ0] Padding(1141) >- CryptoStream[H|Finished] 8.730 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1951 millis, based on 10.683/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 8.730 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.731 Starting downloading https://server4:443/qrmtrbgwto at 32:53.266 on ClientConnection[bb17a15e7c3a0f3b/59e182051ce9d562(V1) with server4/193.167.100.100:443] 8.731 -> Packet H|1|L|54|1 AckFrame[6|Δ0] 8.731 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 60 millis, based on 8.793/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 8.732 Discarding pn space Initial because first Handshake message is being sent 8.732 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.732 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 60 millis, based on 8.793/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 8.732 -> Packet A|0|S0|6410ec12758abe321ce51d249a21c9f5|55|1 StreamFrame[0(CIB),0,17,fin] 8.792 loss detection timeout handler running Sending probe 0, because no ack since 8.730. Current RTT: 33/7. 8.792 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.793 (Probe is a handshake retransmit) 8.793 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 121 millis, based on 8.915/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 8.793 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 8.914 loss detection timeout handler running Sending probe 1, because no ack since 8.732. Current RTT: 33/7. 8.914 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.914 (Probe is a handshake retransmit) 8.915 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 243 millis, based on 9.159/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 8.915 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 8.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 243 millis, based on 9.160/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 8.916 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 9.159 loss detection timeout handler running Sending probe 2, because no ack since 8.732. Current RTT: 33/7. 9.159 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.159 (Probe is a handshake retransmit) 9.160 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 487 millis, based on 9.648/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 9.160 -> Packet PH|5|L|88|1 CryptoFrame[0,36] 9.161 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 487 millis, based on 9.649/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 9.161 -> Packet PH|6|L|88|1 CryptoFrame[0,36] 9.648 loss detection timeout handler running Sending probe 3, because no ack since 8.732. Current RTT: 33/7. 9.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.648 (Probe is a handshake retransmit) 9.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 975 millis, based on 10.625/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 9.649 -> Packet PH|7|L|88|1 CryptoFrame[0,36] 9.650 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 975 millis, based on 10.626/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/7 9.650 -> Packet PH|8|L|88|1 CryptoFrame[0,36] 9.788 <- (7) Packet A|2|S0|59e182051ce9d562|45|2 HandshakeDoneFrame[] Padding(18) 9.788 State is set to Confirmed reschedule loss detection timer for PTO over 319 millis, based on 10.108/App, because ackElicitingInFlight | RTT:33/7 reschedule loss detection timer for PTO over -970 millis, based on 8.818/App, because ackElicitingInFlight | RTT:33/7 9.789 loss detection timeout handler running 9.789 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 8.732. Current RTT: 33/7. 9.789 (Probe is retransmit on level App) 9.788 <- (8) Packet A|4|S0|59e182051ce9d562|45|2 HandshakeDoneFrame[] Padding(18) reschedule loss detection timer for PTO over 171 millis, based on 9.961/App, because ackElicitingInFlight | RTT:33/7 9.789 -> Packet PA|1|S0|6410ec12758abe321ce51d249a21c9f5|55|1 StreamFrame[0(CIB),0,17,fin] 9.790 -> Packet A|2|S0|6410ec12758abe321ce51d249a21c9f5|41|1 AckFrame[4,2|Δ0] 9.823 <- (9) Packet A|6|S0|59e182051ce9d562|1054|1 StreamFrame[0(CIB),0,1024] 9.823 <- (10) Packet A|7|S0|59e182051ce9d562|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 9.824 Finished downloading https://server4:443/qrmtrbgwto at 32:54.359 on ClientConnection[bb17a15e7c3a0f3b/59e182051ce9d562(V1) with server4/193.167.100.100:443] 9.825 Closing ClientConnection[bb17a15e7c3a0f3b/59e182051ce9d562(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.824 -> Packet A|3|S0|6410ec12758abe321ce51d249a21c9f5|43|1 AckFrame[7-6,4,2|Δ0] 9.825 Creating connection with server4:443 with v1 9.825 -> Packet A|4|S0|6410ec12758abe321ce51d249a21c9f5|47|2 ConnectionCloseFrame[0|0|] AckFrame[7-6,4,2|Δ0] 9.826 Setting up connection for downloading https://server4:443/bzcpxycxak at 32:54.361 on ClientConnection[5503951d3f62f876/62514a18cb612616(V1) with server4/193.167.100.100:443] 9.826 Original destination connection id: 5503951d3f62f876 (scid: 62514a18cb612616) >- CryptoStream[I|ClientHello] 9.828 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.028/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.828 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.027 loss detection timeout handler running Sending probe 0, because no ack since 9.828. Current RTT: 100/25. 10.028 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.028 (Probe is an initial retransmit) 10.028 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.429/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.028 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.428 loss detection timeout handler running Sending probe 1, because no ack since 10.028. Current RTT: 100/25. 10.428 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.428 (Probe is an initial retransmit) 10.429 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.229/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.428 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.429 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.230/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.429 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.229 loss detection timeout handler running Sending probe 2, because no ack since 10.429. Current RTT: 100/25. 11.229 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.229 (Probe is an initial retransmit) 11.230 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 12.830/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.229 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.231 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 12.831/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.230 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.263 <- (1) Packet I|5|L|1200|2 Token=[] AckFrame[4,0|Δ3] Padding(1141) 11.264 probe count not reset on ack because handshake not yet confirmed 11.265 Cwnd(-): 6000; inflight: 1200 11.265 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 12.865/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.264 <- (2) Packet I|6|L|1200|2 Token=[] AckFrame[5-4,0|Δ1] Padding(1141) 11.265 probe count not reset on ack because handshake not yet confirmed 11.265 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 12.041/Initial, because peerAwaitingAddressValidation | RTT:33/16 12.040 loss detection timeout handler running Sending probe 3, because no ack since 11.230. Current RTT: 33/12. 12.041 Sending probe because peer awaiting address validation 12.041 (Probe is Initial ping, because there is no Initial data to retransmit) 12.041 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1295 millis, based on 13.337/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 12.041 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 12.862 <- (3) Packet I|8|L|188|2 Token=[] AckFrame[5-4,0|Δ12781] CryptoFrame[0,123] 12.863 probe count not reset on ack because handshake not yet confirmed 12.863 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1295 millis, based on 14.159/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 -< CryptoStream[I|ServerHello] 12.867 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1295 millis, based on 14.163/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 12.862 <- (3) Packet H|6|L|1012|2 CryptoFrame[0,684] Padding(274) 12.867 -> Packet I|7|L|1201|2 Token=[] AckFrame[8,6-5|Δ0] Padding(1143) >- CryptoStream[H|Finished] 12.870 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1295 millis, based on 14.166/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 12.870 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.871 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 12.871 Starting downloading https://server4:443/bzcpxycxak at 32:57.405 on ClientConnection[5503951d3f62f876/62514a18cb612616(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 80 millis, based on 12.952/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 12.871 Discarding pn space Initial because first Handshake message is being sent 12.871 -> Packet H|1|L|54|1 AckFrame[6|Δ0] 12.872 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 12.953/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 12.872 -> Packet A|0|S0|22ff2df4518b579f356bd1f9db3f5126|55|1 StreamFrame[0(CIB),0,17,fin] 12.900 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 12.902 <- (5) Packet A|0|S0|62514a18cb612616|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|0e8088ba93ca1b5427360a1fa7ad06fc|8a3c1026abad8e0b0bb58d7f190970c8] NewConnectionIdFrame[2,<1|fec8ab9c0c685e5fb7b286c9d9a64712|eb775bfc0230318398f7ed828bd31df4] 12.902 State is set to Confirmed reschedule loss detection timer for PTO over 48 millis, based on 12.951/Handshake, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 75 millis, based on 12.978/App, because ackElicitingInFlight | RTT:33/12 12.903 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 105 millis, based on 13.009/App, because ackElicitingInFlight | RTT:33/12 12.903 -> Packet A|1|S0|0e8088ba93ca1b5427360a1fa7ad06fc|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 13.008 loss detection timeout handler running Sending probe 0, because no ack since 12.903. Current RTT: 33/12. 13.008 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 211 millis, based on 13.221/App, because ackElicitingInFlight | RTT:33/12 13.009 -> Packet PA|2|S0|0e8088ba93ca1b5427360a1fa7ad06fc|55|1 StreamFrame[0(CIB),0,17,fin] 13.041 <- (6) Packet A|1|S0|62514a18cb612616|1061|3 AckFrame[2|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 13.042 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.042 Cwnd(-): 3000; inflight: 0 reschedule loss detection timer for PTO over 105 millis, based on 13.148/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 105 millis, based on 13.148/App, because ackElicitingInFlight | RTT:33/12 13.042 -> Packet A|3|S0|0e8088ba93ca1b5427360a1fa7ad06fc|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 13.041 <- (7) Packet A|2|S0|62514a18cb612616|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) reschedule loss detection timer for PTO over 93 millis, based on 13.137/App, because ackElicitingInFlight | RTT:33/9 13.043 Finished downloading https://server4:443/bzcpxycxak at 32:57.578 on ClientConnection[5503951d3f62f876/62514a18cb612616(V1) with server4/193.167.100.100:443] 13.043 -> Packet A|4|S0|0e8088ba93ca1b5427360a1fa7ad06fc|41|2 RetireConnectionIdFrame[0] AckFrame[1-0|Δ0] 13.043 Closing ClientConnection[5503951d3f62f876/62514a18cb612616(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.044 Creating connection with server4:443 with v1 13.044 -> Packet A|5|S0|0e8088ba93ca1b5427360a1fa7ad06fc|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 13.045 Setting up connection for downloading https://server4:443/dbhikqvwql at 32:57.579 on ClientConnection[ba46e294f11377bc/7414597835b318f0(V1) with server4/193.167.100.100:443] 13.045 Original destination connection id: ba46e294f11377bc (scid: 7414597835b318f0) >- CryptoStream[I|ClientHello] 13.047 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.247/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.047 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.081 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ8] CryptoFrame[0,123] 13.081 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.282/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 13.085 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.187/Handshake, because peerAwaitingAddressValidation | RTT:34/17 13.081 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 13.085 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 13.089 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.191/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.089 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.092 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.194/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.093 Discarding pn space Initial because first Handshake message is being sent 13.093 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 13.093 Starting downloading https://server4:443/dbhikqvwql at 32:57.628 on ClientConnection[ba46e294f11377bc/7414597835b318f0(V1) with server4/193.167.100.100:443] 13.094 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 13.196/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 13.094 -> Packet A|0|S0|013aac2b62d9b4b63823a3e6a952c310|55|1 StreamFrame[0(CIB),0,17,fin] 13.121 <- (2) Packet A|0|S0|7414597835b318f0|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|8f152dddf7caa5a36b2316ff355b118d|a57854857ad2be80d714137f5420b75e] NewConnectionIdFrame[2,<1|032c36edd2aa75f712cd86b9639938b6|4bf113e174ed12b734a1376b7c9cf636] 13.121 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 13.191/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 99 millis, based on 13.221/App, because ackElicitingInFlight | RTT:34/17 13.121 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 13.249/App, because ackElicitingInFlight | RTT:34/17 13.122 -> Packet A|1|S0|8f152dddf7caa5a36b2316ff355b118d|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 13.248 loss detection timeout handler running Sending probe 0, because no ack since 13.122. Current RTT: 34/17. 13.248 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 13.502/App, because ackElicitingInFlight | RTT:34/17 13.248 -> Packet PA|2|S0|8f152dddf7caa5a36b2316ff355b118d|55|1 StreamFrame[0(CIB),0,17,fin] 13.261 <- (3) Packet A|2|S0|7414597835b318f0|45|2 HandshakeDoneFrame[] Padding(18) 13.261 <- (4) Packet A|4|S0|7414597835b318f0|45|2 HandshakeDoneFrame[] Padding(18) 13.262 -> Packet A|3|S0|8f152dddf7caa5a36b2316ff355b118d|43|1 AckFrame[4,2,0|Δ0] 13.281 <- (5) Packet A|5|S0|7414597835b318f0|1061|3 AckFrame[2|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 13.282 Cwnd(-): 6000; inflight: 0 13.282 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 13.282 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 13.393/App, because ackElicitingInFlight | RTT:34/13 13.282 -> Packet A|4|S0|8f152dddf7caa5a36b2316ff355b118d|66|3 StreamFrame[0(CIB),0,17,fin] AckFrame[4,2,0|Δ0] RetireConnectionIdFrame[0] 13.301 -> Packet A|5|S0|8f152dddf7caa5a36b2316ff355b118d|44|1 AckFrame[5-4,2,0|Δ19] 13.313 <- (6) Packet A|7|S0|7414597835b318f0|45|2 AckFrame[4,2|Δ0] Padding(12) 13.314 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.411 <- (7) Packet A|9|S0|7414597835b318f0|45|3 AckFrame[5-4|Δ78] PingFrame[] Padding(12) 13.412 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.412 <- (8) Packet A|11|S0|7414597835b318f0|45|3 AckFrame[5-4|Δ78] PingFrame[] Padding(12) 13.413 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.413 -> Packet A|6|S0|8f152dddf7caa5a36b2316ff355b118d|43|1 AckFrame[11,9,7|Δ0] 13.444 <- (9) Packet A|12|S0|7414597835b318f0|45|3 AckFrame[6|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 13.445 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.445 Finished downloading https://server4:443/dbhikqvwql at 32:57.980 on ClientConnection[ba46e294f11377bc/7414597835b318f0(V1) with server4/193.167.100.100:443] 13.445 Closing ClientConnection[ba46e294f11377bc/7414597835b318f0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.446 Creating connection with server4:443 with v1 13.446 -> Packet A|7|S0|8f152dddf7caa5a36b2316ff355b118d|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 13.446 Setting up connection for downloading https://server4:443/omdvujuwbu at 32:57.981 on ClientConnection[cb57e210b0eec872/af35e1f8daefe8da(V1) with server4/193.167.100.100:443] 13.446 Original destination connection id: cb57e210b0eec872 (scid: af35e1f8daefe8da) >- CryptoStream[I|ClientHello] 13.448 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.648/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.448 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.567 <- (10) Packet A|16|S0|7414597835b318f0|45|3 AckFrame[6|Δ122] PingFrame[] Padding(12) 13.568 -> Packet A|8|S0|8f152dddf7caa5a36b2316ff355b118d|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 13.647 loss detection timeout handler running Sending probe 0, because no ack since 13.448. Current RTT: 100/25. 13.648 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.648 (Probe is an initial retransmit) 13.648 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 14.048/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.648 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.047 loss detection timeout handler running Sending probe 1, because no ack since 13.648. Current RTT: 100/25. 14.047 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.047 (Probe is an initial retransmit) 14.048 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.848/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.048 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.049 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.849/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.049 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.081 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[2,0|Δ2] Padding(1141) 14.082 probe count not reset on ack because handshake not yet confirmed 14.082 Cwnd(-): 6000; inflight: 1200 14.082 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 14.882/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.483 <- (2) Packet I|3|L|188|2 Token=[] AckFrame[2,0|Δ3212] CryptoFrame[0,123] 14.484 probe count not reset on ack because handshake not yet confirmed 14.484 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 14.872/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[I|ServerHello] 14.487 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.483 <- (2) Packet H|2|L|1012|2 CryptoFrame[0,685] Padding(273) reschedule loss detection timer for PTO over 387 millis, based on 14.875/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.487 -> Packet I|4|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 14.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 14.879/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.490 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.491 Starting downloading https://server4:443/omdvujuwbu at 32:59.026 on ClientConnection[cb57e210b0eec872/af35e1f8daefe8da(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 14.588/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.491 Discarding pn space Initial because first Handshake message is being sent 14.491 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 14.491 -> Packet H|1|L|54|1 AckFrame[2|Δ0] 14.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 14.589/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.492 -> Packet A|0|S0|dc36fc4a13581d22b45f4e77bf2a9495|55|1 StreamFrame[0(CIB),0,17,fin] 14.588 loss detection timeout handler running Sending probe 0, because no ack since 14.490. Current RTT: 33/16. 14.588 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.589 (Probe is a handshake retransmit) 14.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 193 millis, based on 14.783/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 14.589 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 14.606 <- (4) Packet H|8|L|69|3 AckFrame[1|Δ666] PingFrame[] Padding(10) 14.606 probe count not reset on ack because handshake not yet confirmed 14.607 Retransmitting CryptoFrame[0,36] on level Handshake 14.607 Cwnd(-): 3000; inflight: 143 14.607 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 176 millis, based on 14.783/Handshake, because ackElicitingInFlight | RTT:33/16 14.607 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 193 millis, based on 14.801/Handshake, because ackElicitingInFlight | RTT:33/16 14.607 -> Packet H|3|L|88|1 CryptoFrame[0,36] 14.607 -> Packet H|4|L|54|1 AckFrame[8|Δ0] 14.769 <- (5) Packet A|2|S0|af35e1f8daefe8da|45|2 HandshakeDoneFrame[] Padding(18) 14.770 State is set to Confirmed reschedule loss detection timer for PTO over -33 millis, based on 14.736/App, because ackElicitingInFlight | RTT:33/16 14.770 loss detection timeout handler running Sending probe 1, because no ack since 14.492. Current RTT: 33/16. reschedule loss detection timer for PTO over -155 millis, based on 14.614/App, because ackElicitingInFlight | RTT:33/16 14.770 Discarding pn space Handshake because HandshakeDone is received 14.770 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 243 millis, based on 15.014/App, because ackElicitingInFlight | RTT:33/16 14.770 -> Packet PA|1|S0|dc36fc4a13581d22b45f4e77bf2a9495|55|1 StreamFrame[0(CIB),0,17,fin] 14.790 -> Packet A|2|S0|dc36fc4a13581d22b45f4e77bf2a9495|40|1 AckFrame[2|Δ19] 15.013 loss detection timeout handler running Sending probe 1, because no ack since 14.770. Current RTT: 33/16. 15.014 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 487 millis, based on 15.502/App, because ackElicitingInFlight | RTT:33/16 15.014 -> Packet PA|3|S0|dc36fc4a13581d22b45f4e77bf2a9495|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 487 millis, based on 15.503/App, because ackElicitingInFlight | RTT:33/16 15.015 -> Packet PA|4|S0|dc36fc4a13581d22b45f4e77bf2a9495|55|1 StreamFrame[0(CIB),0,17,fin] 15.047 <- (6) Packet A|5|S0|af35e1f8daefe8da|1061|3 AckFrame[3|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 15.048 Cwnd(-): 2400; inflight: 55 15.048 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 89 millis, based on 15.137/App, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 105 millis, based on 15.154/App, because ackElicitingInFlight | RTT:33/12 15.048 -> Packet A|5|S0|dc36fc4a13581d22b45f4e77bf2a9495|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 15.047 <- (7) Packet A|6|S0|af35e1f8daefe8da|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 15.048 Finished downloading https://server4:443/omdvujuwbu at 32:59.583 on ClientConnection[cb57e210b0eec872/af35e1f8daefe8da(V1) with server4/193.167.100.100:443] 15.048 Closing ClientConnection[cb57e210b0eec872/af35e1f8daefe8da(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.048 -> Packet A|6|S0|dc36fc4a13581d22b45f4e77bf2a9495|41|1 AckFrame[6-5,2|Δ0] 15.049 -> Packet A|7|S0|dc36fc4a13581d22b45f4e77bf2a9495|45|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 15.049 Creating connection with server4:443 with v1 15.050 Setting up connection for downloading https://server4:443/rotlnkbycc at 32:59.584 on ClientConnection[b112820997657fe0/7c33bc616a376949(V1) with server4/193.167.100.100:443] 15.050 Original destination connection id: b112820997657fe0 (scid: 7c33bc616a376949) >- CryptoStream[I|ClientHello] 15.051 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.251/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.051 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.073 <- (8) Packet A|7|S0|af35e1f8daefe8da|45|3 AckFrame[4-3|Δ26] HandshakeDoneFrame[] Padding(12) 15.074 -> Packet A|8|S0|dc36fc4a13581d22b45f4e77bf2a9495|45|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 15.080 <- (9) Packet A|8|S0|af35e1f8daefe8da|105|4 AckFrame[5-3|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|a087fbdd9272ff45d8d0ecb45ddbec53|05ed8ea39ca54efc7a9f3d6c472fbdc4] NewConnectionIdFrame[2,<1|fafe5b46433d27be1b830830974f5b0f|b85902c3f604cd8db92944939b7bf272] 15.080 -> Packet A|9|S0|dc36fc4a13581d22b45f4e77bf2a9495|45|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 15.085 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ8] CryptoFrame[0,123] 15.086 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.286/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 15.085 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 15.089 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.191/Handshake, because peerAwaitingAddressValidation | RTT:34/17 15.088 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 15.091 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.193/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.091 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.092 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 15.092 Starting downloading https://server4:443/rotlnkbycc at 32:59.626 on ClientConnection[b112820997657fe0/7c33bc616a376949(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 15.194/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.092 Discarding pn space Initial because first Handshake message is being sent 15.092 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 15.093 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 15.195/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.093 -> Packet A|0|S0|f96b922e4e28c3938f41c87486c6ab9d|55|1 StreamFrame[0(CIB),0,17,fin] 15.123 <- (2) Packet A|0|S0|7c33bc616a376949|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|cb4ea601b30871bfec8aa037e316e3e6|e6866367bf051270e7d2ab9e055de7f4] NewConnectionIdFrame[2,<1|b9aa949651ff4059cfed7fb583488ad7|c20b7d547a46729532e68c980bb7d3b3] 15.123 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 15.193/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 96 millis, based on 15.220/App, because ackElicitingInFlight | RTT:34/17 15.124 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 15.251/App, because ackElicitingInFlight | RTT:34/17 15.124 -> Packet A|1|S0|cb4ea601b30871bfec8aa037e316e3e6|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 15.125 <- (3) Packet A|1|S0|7c33bc616a376949|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 15.251/App, because ackElicitingInFlight | RTT:34/17 15.125 <- (4) Packet A|2|S0|7c33bc616a376949|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 15.126 Finished downloading https://server4:443/rotlnkbycc at 32:59.660 on ClientConnection[b112820997657fe0/7c33bc616a376949(V1) with server4/193.167.100.100:443] 15.126 Closing ClientConnection[b112820997657fe0/7c33bc616a376949(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.126 -> Packet A|2|S0|cb4ea601b30871bfec8aa037e316e3e6|39|1 AckFrame[2-0|Δ0] 15.126 -> Packet A|3|S0|cb4ea601b30871bfec8aa037e316e3e6|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 15.127 Creating connection with server4:443 with v1 15.127 Setting up connection for downloading https://server4:443/tiglqtbkbj at 32:59.662 on ClientConnection[c4f57b0d1f7598cd/843810c8c0e5f829(V1) with server4/193.167.100.100:443] 15.127 Original destination connection id: c4f57b0d1f7598cd (scid: 843810c8c0e5f829) >- CryptoStream[I|ClientHello] 15.129 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.329/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.129 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.261 <- (5) Packet A|4|S0|7c33bc616a376949|45|3 AckFrame[0|Δ137] HandshakeDoneFrame[] Padding(10) 15.261 <- (6) Packet A|6|S0|7c33bc616a376949|45|3 AckFrame[0|Δ137] HandshakeDoneFrame[] Padding(10) 15.262 -> Packet A|4|S0|cb4ea601b30871bfec8aa037e316e3e6|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 15.262 -> Packet A|5|S0|cb4ea601b30871bfec8aa037e316e3e6|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 15.328 loss detection timeout handler running Sending probe 0, because no ack since 15.129. Current RTT: 100/25. 15.328 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.328 (Probe is an initial retransmit) 15.329 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.729/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.328 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.362 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[1-0|Δ2] Padding(1143) 15.363 probe count not reset on ack because handshake not yet confirmed 15.363 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.763/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.762 loss detection timeout handler running Sending probe 1, because no ack since 15.328. Current RTT: 33/16. 15.762 Sending probe because peer awaiting address validation 15.762 (Probe is Initial ping, because there is no Initial data to retransmit) 15.763 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 16.151/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 15.763 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 15.796 <- (2) Packet I|2|L|1200|2 Token=[] AckFrame[2-0|Δ3] Padding(1143) 15.797 probe count not reset on ack because handshake not yet confirmed 15.797 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 16.185/Initial, because peerAwaitingAddressValidation | RTT:33/16 16.165 <- (3) Packet I|6|L|186|2 Token=[] AckFrame[2-0|Δ2940] CryptoFrame[0,123] 16.165 probe count not reset on ack because handshake not yet confirmed 16.165 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 323 millis, based on 16.489/Initial, because peerAwaitingAddressValidation | RTT:33/12 -< CryptoStream[I|ServerHello] 16.165 <- (3) Packet H|4|L|1014|2 CryptoFrame[0,686] Padding(274) 16.169 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 323 millis, based on 16.493/Handshake, because peerAwaitingAddressValidation | RTT:33/12 16.169 -> Packet I|3|L|1201|2 Token=[] AckFrame[6,2-1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 16.172 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 323 millis, based on 16.496/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 16.172 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.172 Starting downloading https://server4:443/tiglqtbkbj at 33:00.707 on ClientConnection[c4f57b0d1f7598cd/843810c8c0e5f829(V1) with server4/193.167.100.100:443] 16.172 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 16.253/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 16.173 Discarding pn space Initial because first Handshake message is being sent 16.172 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 16.173 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 16.254/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 16.173 -> Packet A|0|S0|5f98da1a8f51e040047dcd52b189db56|55|1 StreamFrame[0(CIB),0,17,fin] 16.204 <- (4) Packet A|0|S0|843810c8c0e5f829|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|4de6ccdd504a6a46f47453c34f9f646e|db3e3f10e403d35fe4e19ee9ad759d1c] NewConnectionIdFrame[2,<1|a7b2f41196b01600dd8eea25511d04f4|99b6087d8af74481bddeb67aa3ed7f98] 16.205 State is set to Confirmed reschedule loss detection timer for PTO over 48 millis, based on 16.253/Handshake, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 74 millis, based on 16.279/App, because ackElicitingInFlight | RTT:33/12 16.205 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 105 millis, based on 16.311/App, because ackElicitingInFlight | RTT:33/12 16.205 -> Packet A|1|S0|4de6ccdd504a6a46f47453c34f9f646e|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 16.206 <- (5) Packet A|1|S0|843810c8c0e5f829|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 104 millis, based on 16.311/App, because ackElicitingInFlight | RTT:33/12 16.225 -> Packet A|2|S0|4de6ccdd504a6a46f47453c34f9f646e|40|1 AckFrame[1-0|Δ18] 16.310 loss detection timeout handler running Sending probe 0, because no ack since 16.205. Current RTT: 33/9. 16.311 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 187 millis, based on 16.499/App, because ackElicitingInFlight | RTT:33/9 16.311 -> Packet PA|3|S0|4de6ccdd504a6a46f47453c34f9f646e|37|2 RetireConnectionIdFrame[0] Padding(1) 16.340 <- (6) Packet A|4|S0|843810c8c0e5f829|45|3 AckFrame[2|Δ83] PingFrame[] Padding(12) 16.340 Cwnd(-): 6000; inflight: 37 reschedule loss detection timer for PTO over 64 millis, based on 16.405/App, because ackElicitingInFlight | RTT:33/9 reschedule loss detection timer for PTO over 93 millis, based on 16.434/App, because ackElicitingInFlight | RTT:33/9 16.340 -> Packet A|4|S0|4de6ccdd504a6a46f47453c34f9f646e|37|2 RetireConnectionIdFrame[0] Padding(1) 16.360 -> Packet A|5|S0|4de6ccdd504a6a46f47453c34f9f646e|40|1 AckFrame[4|Δ19] 16.368 <- (7) Packet A|7|S0|843810c8c0e5f829|45|2 AckFrame[3-2|Δ26] Padding(13) reschedule loss detection timer for PTO over 65 millis, based on 16.434/App, because ackElicitingInFlight | RTT:33/9 16.434 loss detection timeout handler running Sending probe 0, because no ack since 16.340. Current RTT: 33/7. 16.434 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 171 millis, based on 16.606/App, because ackElicitingInFlight | RTT:33/7 16.434 -> Packet PA|6|S0|4de6ccdd504a6a46f47453c34f9f646e|37|2 RetireConnectionIdFrame[0] Padding(1) 16.519 <- (8) Packet A|13|S0|843810c8c0e5f829|45|3 AckFrame[6-3|Δ53] PingFrame[] Padding(12) 16.519 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.539 -> Packet A|7|S0|4de6ccdd504a6a46f47453c34f9f646e|42|1 AckFrame[13,7|Δ19] 16.772 <- (9) Packet A|15|S0|843810c8c0e5f829|45|3 AckFrame[6-3|Δ306] PingFrame[] Padding(10) 16.772 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.792 -> Packet A|8|S0|4de6ccdd504a6a46f47453c34f9f646e|44|1 AckFrame[15,13,7|Δ19] 16.823 <- (10) Packet A|18|S0|843810c8c0e5f829|45|3 AckFrame[8,6-3|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(7) 16.824 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.824 Finished downloading https://server4:443/tiglqtbkbj at 33:01.359 on ClientConnection[c4f57b0d1f7598cd/843810c8c0e5f829(V1) with server4/193.167.100.100:443] 16.824 Closing ClientConnection[c4f57b0d1f7598cd/843810c8c0e5f829(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.825 -> Packet A|9|S0|4de6ccdd504a6a46f47453c34f9f646e|43|2 ConnectionCloseFrame[0|0|] AckFrame[18|Δ0] 16.825 Creating connection with server4:443 with v1 16.825 Setting up connection for downloading https://server4:443/tldphtbqql at 33:01.360 on ClientConnection[df450a5d685a0e0b/1770047c517e3a4c(V1) with server4/193.167.100.100:443] 16.826 Original destination connection id: df450a5d685a0e0b (scid: 1770047c517e3a4c) >- CryptoStream[I|ClientHello] 16.827 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.027/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.827 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.861 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 16.862 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.062/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 16.861 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 16.865 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.967/Handshake, because peerAwaitingAddressValidation | RTT:34/17 16.865 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 16.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.970/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.868 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.868 Starting downloading https://server4:443/tldphtbqql at 33:01.403 on ClientConnection[df450a5d685a0e0b/1770047c517e3a4c(V1) with server4/193.167.100.100:443] 16.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.971/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.869 Discarding pn space Initial because first Handshake message is being sent 16.868 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 16.869 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.971/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.869 -> Packet A|0|S0|c7256229a0d9237b8ca05d08705c9c2b|55|1 StreamFrame[0(CIB),0,17,fin] 16.900 <- (2) Packet A|0|S0|1770047c517e3a4c|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|897bb78ad36ea2c52b7046d25fba6c2b|cd1bba671d34e62e01cb136a67bec9ec] NewConnectionIdFrame[2,<1|41fe8ebc90b965891ad532341bdf721b|311608c5046ed96ee8ab8a2353975395] 16.901 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 16.970/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 16.996/App, because ackElicitingInFlight | RTT:34/17 16.901 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 17.028/App, because ackElicitingInFlight | RTT:34/17 16.901 -> Packet A|1|S0|897bb78ad36ea2c52b7046d25fba6c2b|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 16.902 <- (3) Packet A|1|S0|1770047c517e3a4c|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 17.028/App, because ackElicitingInFlight | RTT:34/17 16.903 <- (4) Packet A|2|S0|1770047c517e3a4c|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 16.903 Finished downloading https://server4:443/tldphtbqql at 33:01.438 on ClientConnection[df450a5d685a0e0b/1770047c517e3a4c(V1) with server4/193.167.100.100:443] 16.903 Closing ClientConnection[df450a5d685a0e0b/1770047c517e3a4c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.903 -> Packet A|2|S0|897bb78ad36ea2c52b7046d25fba6c2b|39|1 AckFrame[2-0|Δ0] 16.904 Creating connection with server4:443 with v1 16.904 -> Packet A|3|S0|897bb78ad36ea2c52b7046d25fba6c2b|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 16.904 Setting up connection for downloading https://server4:443/ovplwdiksd at 33:01.439 on ClientConnection[3bd4a8d62e399c5d/f30943e8e0f93d35(V1) with server4/193.167.100.100:443] 16.904 Original destination connection id: 3bd4a8d62e399c5d (scid: f30943e8e0f93d35) >- CryptoStream[I|ClientHello] 16.906 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.106/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.906 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.934 <- (5) Packet A|3|S0|1770047c517e3a4c|45|2 AckFrame[2-1|Δ0] Padding(14) 16.935 -> Packet A|4|S0|897bb78ad36ea2c52b7046d25fba6c2b|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 16.945 <- (11) Packet A|20|S0|843810c8c0e5f829|45|3 AckFrame[8,6-3|Δ121] PingFrame[] Padding(10) 16.945 <- (12) Packet A|22|S0|843810c8c0e5f829|45|3 AckFrame[8,6-3|Δ121] PingFrame[] Padding(10) 16.946 -> Packet A|10|S0|4de6ccdd504a6a46f47453c34f9f646e|43|2 ConnectionCloseFrame[0|0|] AckFrame[18|Δ0] 16.946 -> Packet A|11|S0|4de6ccdd504a6a46f47453c34f9f646e|43|2 ConnectionCloseFrame[0|0|] AckFrame[18|Δ0] 17.105 loss detection timeout handler running Sending probe 0, because no ack since 16.906. Current RTT: 100/25. 17.106 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.106 (Probe is an initial retransmit) 17.106 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 17.506/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.106 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.505 loss detection timeout handler running Sending probe 1, because no ack since 17.106. Current RTT: 100/25. 17.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 17.506 (Probe is an initial retransmit) 17.506 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.306/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.506 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.507 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.307/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.507 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.142 <- (1) Packet I|5|L|188|2 Token=[] AckFrame[3,1|Δ4801] CryptoFrame[0,123] 18.142 probe count not reset on ack because handshake not yet confirmed 18.143 Retransmitting CryptoFrame[0,257] on level Initial 18.143 Cwnd(-): 6000; inflight: 0 18.143 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 18.943/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.143 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 7607 millis, based on 25.751/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 18.143 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 18.146 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.142 <- (1) Packet H|4|L|1012|2 CryptoFrame[0,686] Padding(272) reschedule loss detection timer for PTO over 7607 millis, based on 25.754/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 18.146 -> Packet I|5|L|1201|2 Token=[] AckFrame[5|Δ0] Padding(1145) >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.149 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1901 millis, based on 20.051/Handshake, because peerAwaitingAddressValidation | RTT:634/317 18.150 Discarding pn space Initial because first Handshake message is being sent 18.150 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1901 millis, based on 20.052/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 18.149 -> Packet H|0|L|88|1 CryptoFrame[0,36] 18.150 Starting downloading https://server4:443/ovplwdiksd at 33:02.684 on ClientConnection[3bd4a8d62e399c5d/f30943e8e0f93d35(V1) with server4/193.167.100.100:443] 18.150 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 18.150 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1901 millis, based on 20.052/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:634/317 18.150 -> Packet A|0|S0|fa96a563850c231c00d389750930c888|55|1 StreamFrame[0(CIB),0,17,fin] 18.181 <- (2) Packet A|0|S0|f30943e8e0f93d35|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|c6f5db1202118811bd87c4a765c73ad8|f158cd32dc0d811a87803f18844c4186] NewConnectionIdFrame[2,<1|592ab778eb53a56c3694c25ca9ca2de0|8f4b611cd3082f793c74ee9587a5bed3] 18.182 State is set to Confirmed reschedule loss detection timer for PTO over 1869 millis, based on 20.051/Handshake, because ackElicitingInFlight | RTT:634/317 reschedule loss detection timer for PTO over 1895 millis, based on 20.077/App, because ackElicitingInFlight | RTT:634/317 18.182 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 1926 millis, based on 20.109/App, because ackElicitingInFlight | RTT:634/317 18.182 -> Packet A|1|S0|c6f5db1202118811bd87c4a765c73ad8|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 18.183 <- (3) Packet A|1|S0|f30943e8e0f93d35|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 1925 millis, based on 20.109/App, because ackElicitingInFlight | RTT:634/317 18.183 <- (4) Packet A|2|S0|f30943e8e0f93d35|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 18.184 Finished downloading https://server4:443/ovplwdiksd at 33:02.719 on ClientConnection[3bd4a8d62e399c5d/f30943e8e0f93d35(V1) with server4/193.167.100.100:443] 18.184 Closing ClientConnection[3bd4a8d62e399c5d/f30943e8e0f93d35(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.184 -> Packet A|2|S0|c6f5db1202118811bd87c4a765c73ad8|39|1 AckFrame[2-0|Δ0] 18.185 Creating connection with server4:443 with v1 18.185 -> Packet A|3|S0|c6f5db1202118811bd87c4a765c73ad8|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 18.185 Setting up connection for downloading https://server4:443/zzrofdrkgd at 33:02.720 on ClientConnection[c3495a2cb613b31f/5f5e6786a74a4e14(V1) with server4/193.167.100.100:443] 18.186 Original destination connection id: c3495a2cb613b31f (scid: 5f5e6786a74a4e14) >- CryptoStream[I|ClientHello] 18.187 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.387/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.187 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.221 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ11] CryptoFrame[0,123] 18.222 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.422/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 18.224 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.221 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) reschedule loss detection timer for PTO over 101 millis, based on 18.326/Handshake, because peerAwaitingAddressValidation | RTT:34/17 18.224 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 18.227 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.329/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.227 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.227 Starting downloading https://server4:443/zzrofdrkgd at 33:02.762 on ClientConnection[c3495a2cb613b31f/5f5e6786a74a4e14(V1) with server4/193.167.100.100:443] 18.227 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 18.227 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.329/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.227 Discarding pn space Initial because first Handshake message is being sent 18.228 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 18.330/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.228 -> Packet A|0|S0|afa3199038887439630fc3d3679c05e8|55|1 StreamFrame[0(CIB),0,17,fin] 18.313 <- (5) Packet A|5|S0|f30943e8e0f93d35|45|3 AckFrame[1-0|Δ99] PingFrame[] Padding(12) 18.314 <- (6) Packet A|7|S0|f30943e8e0f93d35|45|3 AckFrame[1-0|Δ99] PingFrame[] Padding(12) 18.314 -> Packet A|4|S0|c6f5db1202118811bd87c4a765c73ad8|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 18.314 -> Packet A|5|S0|c6f5db1202118811bd87c4a765c73ad8|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 18.329 loss detection timeout handler running Sending probe 0, because no ack since 18.227. Current RTT: 34/17. 18.329 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.329 (Probe is a handshake retransmit) 18.329 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 18.533/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.329 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 18.533 loss detection timeout handler running Sending probe 1, because no ack since 18.228. Current RTT: 34/17. 18.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.533 (Probe is a handshake retransmit) 18.533 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 18.941/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.533 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 18.534 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 18.942/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.534 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 18.941 loss detection timeout handler running Sending probe 2, because no ack since 18.228. Current RTT: 34/17. 18.941 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 18.941 (Probe is a handshake retransmit) 18.942 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 19.758/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.942 -> Packet PH|5|L|88|1 CryptoFrame[0,36] 18.943 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 19.759/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 18.943 -> Packet PH|6|L|88|1 CryptoFrame[0,36] 19.387 <- (2) Packet A|2|S0|5f5e6786a74a4e14|45|2 HandshakeDoneFrame[] Padding(18) 19.388 State is set to Confirmed reschedule loss detection timer for PTO over -144 millis, based on 19.244/App, because ackElicitingInFlight | RTT:34/17 19.388 loss detection timeout handler running Sending probe 3, because no ack since 18.228. Current RTT: 34/17. 19.388 (Probe is retransmit on level App) reschedule loss detection timer for PTO over -1033 millis, based on 18.355/App, because ackElicitingInFlight | RTT:34/17 19.388 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 19.515/App, because ackElicitingInFlight | RTT:34/17 19.388 -> Packet PA|1|S0|afa3199038887439630fc3d3679c05e8|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 126 millis, based on 19.516/App, because ackElicitingInFlight | RTT:34/17 19.389 -> Packet PA|2|S0|afa3199038887439630fc3d3679c05e8|55|1 StreamFrame[0(CIB),0,17,fin] 19.408 -> Packet A|3|S0|afa3199038887439630fc3d3679c05e8|40|1 AckFrame[2|Δ19] 19.422 <- (3) Packet A|5|S0|5f5e6786a74a4e14|1061|3 AckFrame[2|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 19.422 Cwnd(-): 6000; inflight: 55 19.422 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.423 -> Packet A|4|S0|afa3199038887439630fc3d3679c05e8|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 19.422 <- (4) Packet A|6|S0|5f5e6786a74a4e14|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 19.423 Finished downloading https://server4:443/zzrofdrkgd at 33:03.958 on ClientConnection[c3495a2cb613b31f/5f5e6786a74a4e14(V1) with server4/193.167.100.100:443] 19.423 -> Packet A|5|S0|afa3199038887439630fc3d3679c05e8|41|1 AckFrame[6-5,2|Δ0] 19.423 Closing ClientConnection[c3495a2cb613b31f/5f5e6786a74a4e14(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.424 -> Packet A|6|S0|afa3199038887439630fc3d3679c05e8|45|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 19.424 Creating connection with server4:443 with v1 19.424 Setting up connection for downloading https://server4:443/frozskbtdj at 33:03.959 on ClientConnection[62f20c45ace557ef/f06b04bec98a982d(V1) with server4/193.167.100.100:443] 19.424 Original destination connection id: 62f20c45ace557ef (scid: f06b04bec98a982d) >- CryptoStream[I|ClientHello] 19.426 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.626/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.426 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.439 <- (5) Packet A|7|S0|5f5e6786a74a4e14|105|4 AckFrame[3-2|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|4a88e4d8f1d374f6f3d67d52a7bbe079|c09e891c0ed2a37866dbb5fbb50a34e9] NewConnectionIdFrame[2,<1|c80ec7ee2a28e7dcb397df5d668656b5|4386e94020a9f2591dccb10d9929cf55] 19.440 -> Packet A|7|S0|afa3199038887439630fc3d3679c05e8|45|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2|Δ0] 19.460 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 19.461 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.661/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.460 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,686] Padding(276) 19.463 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.565/Handshake, because peerAwaitingAddressValidation | RTT:34/17 19.463 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 19.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.568/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.466 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.568/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.466 Discarding pn space Initial because first Handshake message is being sent 19.466 Starting downloading https://server4:443/frozskbtdj at 33:04.001 on ClientConnection[62f20c45ace557ef/f06b04bec98a982d(V1) with server4/193.167.100.100:443] 19.467 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 19.569/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.467 -> [Packet H|1|L|54|1 AckFrame[0|Δ0], Packet A|0|S0|811279e9a5194ec613af6fedcc00c224|55|1 StreamFrame[0(CIB),0,17,fin]] 19.497 <- (2) Packet A|0|S0|f06b04bec98a982d|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|af9c7e70eb9f8e5e26147b9f6cf461ca|f6e01348bf86b810bf361bc912117519] NewConnectionIdFrame[2,<1|03311ddd415c5e31864ad709b2dcef47|c85e58dfc42ca9787429ad0f6bd5e63a] 19.498 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 19.568/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 19.594/App, because ackElicitingInFlight | RTT:34/17 19.498 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 19.625/App, because ackElicitingInFlight | RTT:34/17 19.498 -> Packet A|1|S0|af9c7e70eb9f8e5e26147b9f6cf461ca|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 19.624 loss detection timeout handler running Sending probe 0, because no ack since 19.498. Current RTT: 34/17. 19.625 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 19.879/App, because ackElicitingInFlight | RTT:34/17 19.625 -> Packet PA|2|S0|af9c7e70eb9f8e5e26147b9f6cf461ca|55|1 StreamFrame[0(CIB),0,17,fin] 19.878 loss detection timeout handler running Sending probe 1, because no ack since 19.625. Current RTT: 34/17. 19.878 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 20.386/App, because ackElicitingInFlight | RTT:34/17 19.878 -> Packet PA|3|S0|af9c7e70eb9f8e5e26147b9f6cf461ca|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 20.387/App, because ackElicitingInFlight | RTT:34/17 19.879 -> Packet PA|4|S0|af9c7e70eb9f8e5e26147b9f6cf461ca|55|1 StreamFrame[0(CIB),0,17,fin] 19.910 <- (3) Packet A|2|S0|f06b04bec98a982d|45|2 AckFrame[3,1|Δ0] Padding(12) 19.911 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 19.911 Cwnd(-): 6000; inflight: 55 reschedule loss detection timer for PTO over 95 millis, based on 20.006/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 114 millis, based on 20.026/App, because ackElicitingInFlight | RTT:34/14 19.911 -> Packet A|5|S0|af9c7e70eb9f8e5e26147b9f6cf461ca|55|1 StreamFrame[0(CIB),0,17,fin] 19.912 <- (4) Packet A|3|S0|f06b04bec98a982d|1061|2 AckFrame[4-3,1|Δ0] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 113 millis, based on 20.026/App, because ackElicitingInFlight | RTT:34/14 19.912 <- (5) Packet A|4|S0|f06b04bec98a982d|45|3 AckFrame[4-3,1|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(6) reschedule loss detection timer for PTO over 100 millis, based on 20.014/App, because ackElicitingInFlight | RTT:34/11 19.913 Finished downloading https://server4:443/frozskbtdj at 33:04.447 on ClientConnection[62f20c45ace557ef/f06b04bec98a982d(V1) with server4/193.167.100.100:443] 19.913 Closing ClientConnection[62f20c45ace557ef/f06b04bec98a982d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.913 -> Packet A|6|S0|af9c7e70eb9f8e5e26147b9f6cf461ca|39|1 AckFrame[4-2|Δ0] 19.913 -> Packet A|7|S0|af9c7e70eb9f8e5e26147b9f6cf461ca|43|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 19.914 Creating connection with server4:443 with v1 19.914 Setting up connection for downloading https://server4:443/mxvfkrppnv at 33:04.449 on ClientConnection[cf6a0278b007546f/42d23137e84fa3df(V1) with server4/193.167.100.100:443] 19.914 Original destination connection id: cf6a0278b007546f (scid: 42d23137e84fa3df) >- CryptoStream[I|ClientHello] 19.916 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.116/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.916 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.950 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 19.951 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.151/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 19.950 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 19.953 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.055/Handshake, because peerAwaitingAddressValidation | RTT:34/17 19.953 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 19.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.058/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.956 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.956 Starting downloading https://server4:443/mxvfkrppnv at 33:04.491 on ClientConnection[cf6a0278b007546f/42d23137e84fa3df(V1) with server4/193.167.100.100:443] 19.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.058/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.956 Discarding pn space Initial because first Handshake message is being sent 19.956 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 19.957 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.059/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 19.957 -> Packet A|0|S0|5a5d17eafb0db32b0b89ec63394abfe6|55|1 StreamFrame[0(CIB),0,17,fin] 19.968 <- (6) Packet A|5|S0|f06b04bec98a982d|45|2 AckFrame[5-3,1|Δ25] Padding(11) 19.968 -> Packet A|8|S0|af9c7e70eb9f8e5e26147b9f6cf461ca|43|2 ConnectionCloseFrame[0|0|] AckFrame[4-2|Δ0] 19.987 <- (2) Packet A|0|S0|42d23137e84fa3df|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|e87b0603b1909c1e5a5eabb6548d239d|5a39ba400f7a2c4c394d350830ae7bbb] NewConnectionIdFrame[2,<1|bb6bda2a1449e2e446a5a9aaece1c673|32e8852fe4721afcd243da53a895d0cc] 19.988 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 20.058/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 20.084/App, because ackElicitingInFlight | RTT:34/17 19.988 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 20.115/App, because ackElicitingInFlight | RTT:34/17 19.988 -> Packet A|1|S0|e87b0603b1909c1e5a5eabb6548d239d|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 19.989 <- (3) Packet A|2|S0|42d23137e84fa3df|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 20.008 -> Packet A|2|S0|e87b0603b1909c1e5a5eabb6548d239d|42|1 AckFrame[2,0|Δ18] 20.046 <- (4) Packet A|3|S0|42d23137e84fa3df|1062|2 AckFrame[2,0|Δ6] StreamFrame[0(CIB),0,1024,fin] 20.047 Cwnd(-): 6000; inflight: 0 20.047 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 126 millis, based on 20.174/App, because ackElicitingInFlight | RTT:34/17 20.047 -> Packet A|3|S0|e87b0603b1909c1e5a5eabb6548d239d|37|2 RetireConnectionIdFrame[0] Padding(1) 20.047 Finished downloading https://server4:443/mxvfkrppnv at 33:04.582 on ClientConnection[cf6a0278b007546f/42d23137e84fa3df(V1) with server4/193.167.100.100:443] 20.047 Closing ClientConnection[cf6a0278b007546f/42d23137e84fa3df(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.048 -> Packet A|4|S0|e87b0603b1909c1e5a5eabb6548d239d|43|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 20.048 Creating connection with server4:443 with v1 20.049 Setting up connection for downloading https://server4:443/uiphclhgwk at 33:04.583 on ClientConnection[50f13c545ef96764/ed76722afe3118ef(V1) with server4/193.167.100.100:443] 20.049 Original destination connection id: 50f13c545ef96764 (scid: ed76722afe3118ef) >- CryptoStream[I|ClientHello] 20.050 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.250/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.050 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.249 loss detection timeout handler running Sending probe 0, because no ack since 20.050. Current RTT: 100/25. 20.249 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.249 (Probe is an initial retransmit) 20.249 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.649/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.249 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.284 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ9] CryptoFrame[0,123] 20.284 probe count not reset on ack because handshake not yet confirmed 20.284 Retransmitting CryptoFrame[0,257] on level Initial 20.284 Cwnd(-): 6000; inflight: 0 20.284 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.684/Initial, because peerAwaitingAddressValidation | RTT:100/25 20.285 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 20.489/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.284 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 20.287 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.284 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) reschedule loss detection timer for PTO over 203 millis, based on 20.491/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.287 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 20.290 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 20.494/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.289 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.290 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.290 Starting downloading https://server4:443/uiphclhgwk at 33:04.825 on ClientConnection[50f13c545ef96764/ed76722afe3118ef(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 20.392/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.290 Discarding pn space Initial because first Handshake message is being sent 20.290 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 20.291 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 20.393/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 20.291 -> Packet A|0|S0|b99b27e422af7dbb52a7e8cd6cf82ebe|55|1 StreamFrame[0(CIB),0,17,fin] 20.321 <- (2) Packet A|0|S0|ed76722afe3118ef|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|decaf9477083342f5a09986644c9a44a|5e29ae91dd598168500b24523a8900cd] NewConnectionIdFrame[2,<1|de87ab3fd22d49335bcba5a04e4fd432|f66f73d63f30f939c572b7a9e77cb2e8] 20.322 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 20.391/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 20.418/App, because ackElicitingInFlight | RTT:34/17 20.322 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 20.449/App, because ackElicitingInFlight | RTT:34/17 20.322 -> Packet A|1|S0|decaf9477083342f5a09986644c9a44a|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 20.323 <- (3) Packet A|2|S0|ed76722afe3118ef|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 20.342 -> Packet A|2|S0|decaf9477083342f5a09986644c9a44a|42|1 AckFrame[2,0|Δ18] 20.448 loss detection timeout handler running Sending probe 0, because no ack since 20.322. Current RTT: 34/17. 20.448 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 20.703/App, because ackElicitingInFlight | RTT:34/17 20.449 -> Packet PA|3|S0|decaf9477083342f5a09986644c9a44a|55|1 StreamFrame[0(CIB),0,17,fin] 20.702 loss detection timeout handler running Sending probe 1, because no ack since 20.449. Current RTT: 34/17. 20.702 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 21.210/App, because ackElicitingInFlight | RTT:34/17 20.702 -> Packet PA|4|S0|decaf9477083342f5a09986644c9a44a|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 21.211/App, because ackElicitingInFlight | RTT:34/17 20.703 -> Packet PA|5|S0|decaf9477083342f5a09986644c9a44a|55|1 StreamFrame[0(CIB),0,17,fin] 20.761 <- (4) Packet A|4|S0|ed76722afe3118ef|45|3 AckFrame[5-4,0|Δ26] HandshakeDoneFrame[] Padding(10) 20.761 Cwnd(-): 3000; inflight: 0 20.762 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 137 millis, based on 20.900/App, because ackElicitingInFlight | RTT:37/19 20.762 -> Packet A|6|S0|decaf9477083342f5a09986644c9a44a|43|2 RetireConnectionIdFrame[0] AckFrame[2,0|Δ0] 20.781 -> Packet A|7|S0|decaf9477083342f5a09986644c9a44a|44|1 AckFrame[4,2,0|Δ19] 20.899 loss detection timeout handler running Sending probe 0, because no ack since 20.762. Current RTT: 37/19. 20.899 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 275 millis, based on 21.175/App, because ackElicitingInFlight | RTT:37/19 20.899 -> Packet PA|8|S0|decaf9477083342f5a09986644c9a44a|37|2 RetireConnectionIdFrame[0] Padding(1) 21.174 loss detection timeout handler running Sending probe 1, because no ack since 20.899. Current RTT: 37/19. 21.175 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 551 millis, based on 21.727/App, because ackElicitingInFlight | RTT:37/19 21.175 -> Packet PA|9|S0|decaf9477083342f5a09986644c9a44a|37|2 RetireConnectionIdFrame[0] Padding(1) reschedule loss detection timer for PTO over 551 millis, based on 21.728/App, because ackElicitingInFlight | RTT:37/19 21.176 -> Packet PA|10|S0|decaf9477083342f5a09986644c9a44a|37|2 RetireConnectionIdFrame[0] Padding(1) 21.206 <- (5) Packet A|6|S0|ed76722afe3118ef|45|2 AckFrame[9,7-6|Δ0] Padding(12) 21.207 Cwnd(-): 2400; inflight: 37 reschedule loss detection timer for PTO over 107 millis, based on 21.314/App, because ackElicitingInFlight | RTT:37/19 21.233 <- (6) Packet A|7|S0|ed76722afe3118ef|45|2 AckFrame[10-9,7-6|Δ26] Padding(11) 21.234 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.379 <- (7) Packet A|9|S0|ed76722afe3118ef|45|3 AckFrame[10-9,7-6|Δ1172] PingFrame[] Padding(8) 22.380 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.399 -> Packet A|11|S0|decaf9477083342f5a09986644c9a44a|42|1 AckFrame[9,7-6|Δ19] 22.432 <- (8) Packet A|12|S0|ed76722afe3118ef|1061|2 AckFrame[11-9,7-6|Δ0] StreamFrame[0(CIB),0,1024,fin] 22.432 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.432 Finished downloading https://server4:443/uiphclhgwk at 33:06.967 on ClientConnection[50f13c545ef96764/ed76722afe3118ef(V1) with server4/193.167.100.100:443] 22.432 Closing ClientConnection[50f13c545ef96764/ed76722afe3118ef(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 22.433 -> Packet A|12|S0|decaf9477083342f5a09986644c9a44a|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 22.433 Creating connection with server4:443 with v1 22.433 Setting up connection for downloading https://server4:443/psefhsrmjg at 33:06.968 on ClientConnection[d7beeceea9ed6b3d/57e9cbb438b4c12f(V1) with server4/193.167.100.100:443] 22.433 Original destination connection id: d7beeceea9ed6b3d (scid: 57e9cbb438b4c12f) >- CryptoStream[I|ClientHello] 22.435 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.635/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.435 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 22.634 loss detection timeout handler running Sending probe 0, because no ack since 22.435. Current RTT: 100/25. 22.634 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.634 (Probe is an initial retransmit) 22.635 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 23.035/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 22.634 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.034 loss detection timeout handler running Sending probe 1, because no ack since 22.634. Current RTT: 100/25. 23.034 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.034 (Probe is an initial retransmit) 23.034 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.834/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.034 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.035 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.835/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.035 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.068 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[2,0|Δ2] Padding(1141) 23.068 probe count not reset on ack because handshake not yet confirmed 23.068 Cwnd(-): 6000; inflight: 1200 23.069 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 23.869/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.469 <- (2) Packet I|3|L|188|2 Token=[] AckFrame[2,0|Δ3213] CryptoFrame[0,123] 23.470 probe count not reset on ack because handshake not yet confirmed 23.470 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 23.858/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 -< CryptoStream[I|ServerHello] 23.469 <- (2) Packet H|2|L|1012|2 CryptoFrame[0,684] Padding(274) 23.473 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 23.861/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.472 -> Packet I|4|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 23.475 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 23.863/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.475 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.475 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.475 Starting downloading https://server4:443/psefhsrmjg at 33:08.010 on ClientConnection[d7beeceea9ed6b3d/57e9cbb438b4c12f(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 96 millis, based on 23.572/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.475 Discarding pn space Initial because first Handshake message is being sent 23.475 -> Packet H|1|L|54|1 AckFrame[2|Δ0] 23.476 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.573/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.476 -> Packet A|0|S0|2e1f3a18cb9759a9e7aef5be0466aa80|55|1 StreamFrame[0(CIB),0,17,fin] 23.509 <- (3) Packet A|1|S0|57e9cbb438b4c12f|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 23.509 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 23.606/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 23.509 State is set to Confirmed reschedule loss detection timer for PTO over 46 millis, based on 23.556/Handshake, because ackElicitingInFlight | RTT:33/12 23.509 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 23.509 Discarding pn space Handshake because HandshakeDone is received 23.509 <- (4) Packet A|2|S0|57e9cbb438b4c12f|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 23.510 Finished downloading https://server4:443/psefhsrmjg at 33:08.044 on ClientConnection[d7beeceea9ed6b3d/57e9cbb438b4c12f(V1) with server4/193.167.100.100:443] 23.510 Closing ClientConnection[d7beeceea9ed6b3d/57e9cbb438b4c12f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.510 -> Packet A|1|S0|2e1f3a18cb9759a9e7aef5be0466aa80|39|1 AckFrame[2-1|Δ0] 23.510 -> Packet A|2|S0|2e1f3a18cb9759a9e7aef5be0466aa80|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 23.510 Creating connection with server4:443 with v1 23.511 Setting up connection for downloading https://server4:443/ouadohzocu at 33:08.046 on ClientConnection[8cc6e69c207428b4/ea168474a7882472(V1) with server4/193.167.100.100:443] 23.511 Original destination connection id: 8cc6e69c207428b4 (scid: ea168474a7882472) >- CryptoStream[I|ClientHello] 23.512 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.712/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.512 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.546 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 23.547 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.747/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.546 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 23.549 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.651/Handshake, because peerAwaitingAddressValidation | RTT:34/17 23.549 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 23.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.654/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.552 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.552 Starting downloading https://server4:443/ouadohzocu at 33:08.087 on ClientConnection[8cc6e69c207428b4/ea168474a7882472(V1) with server4/193.167.100.100:443] 23.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.654/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.552 Discarding pn space Initial because first Handshake message is being sent 23.552 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 23.553 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.655/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.553 -> Packet A|0|S0|3e333cc90c4cbe722820e65175870517|55|1 StreamFrame[0(CIB),0,17,fin] 23.584 <- (2) Packet A|0|S0|ea168474a7882472|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|12d28ff5b99c62f283c5d3432cf2a1d3|91da361ed8412a009ce78cb54c9eeee6] NewConnectionIdFrame[2,<1|669624f9dbfbd81d146bfd36dd43f960|fef8563a88813d22bca59416c33746c3] 23.584 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 23.654/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 23.680/App, because ackElicitingInFlight | RTT:34/17 23.584 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 23.711/App, because ackElicitingInFlight | RTT:34/17 23.584 -> Packet A|1|S0|12d28ff5b99c62f283c5d3432cf2a1d3|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 23.586 <- (3) Packet A|2|S0|ea168474a7882472|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 23.604 -> Packet A|2|S0|12d28ff5b99c62f283c5d3432cf2a1d3|42|1 AckFrame[2,0|Δ18] 23.643 <- (4) Packet A|3|S0|ea168474a7882472|1062|2 AckFrame[2,0|Δ6] StreamFrame[0(CIB),0,1024,fin] 23.643 Cwnd(-): 6000; inflight: 0 23.643 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 126 millis, based on 23.770/App, because ackElicitingInFlight | RTT:34/17 23.643 -> Packet A|3|S0|12d28ff5b99c62f283c5d3432cf2a1d3|37|2 RetireConnectionIdFrame[0] Padding(1) 23.644 Finished downloading https://server4:443/ouadohzocu at 33:08.178 on ClientConnection[8cc6e69c207428b4/ea168474a7882472(V1) with server4/193.167.100.100:443] 23.644 Closing ClientConnection[8cc6e69c207428b4/ea168474a7882472(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.644 -> Packet A|4|S0|12d28ff5b99c62f283c5d3432cf2a1d3|43|2 ConnectionCloseFrame[0|0|] AckFrame[3|Δ0] 23.644 Creating connection with server4:443 with v1 23.645 Setting up connection for downloading https://server4:443/lfkrhdiuxl at 33:08.180 on ClientConnection[3e556b3511da3af3/a6ed02d65aff8767(V1) with server4/193.167.100.100:443] 23.645 Original destination connection id: 3e556b3511da3af3 (scid: a6ed02d65aff8767) >- CryptoStream[I|ClientHello] 23.646 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.846/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.646 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.680 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ8] CryptoFrame[0,123] 23.681 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.881/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 23.680 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 23.683 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.785/Handshake, because peerAwaitingAddressValidation | RTT:34/17 23.683 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 23.686 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.788/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.686 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.687 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.789/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.687 Discarding pn space Initial because first Handshake message is being sent 23.687 Starting downloading https://server4:443/lfkrhdiuxl at 33:08.221 on ClientConnection[3e556b3511da3af3/a6ed02d65aff8767(V1) with server4/193.167.100.100:443] 23.687 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 23.789/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.687 -> [Packet H|1|L|54|1 AckFrame[0|Δ0], Packet A|0|S0|62971cfd005b302b66996bd571982901|55|1 StreamFrame[0(CIB),0,17,fin]] 23.788 loss detection timeout handler running Sending probe 0, because no ack since 23.686. Current RTT: 34/17. 23.788 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 23.788 (Probe is a handshake retransmit) 23.789 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 23.993/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.789 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 23.939 <- (2) Packet A|4|S0|a6ed02d65aff8767|45|2 HandshakeDoneFrame[] Padding(18) 23.940 State is set to Confirmed reschedule loss detection timer for PTO over 1 millis, based on 23.941/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -125 millis, based on 23.814/App, because ackElicitingInFlight | RTT:34/17 23.940 Discarding pn space Handshake because HandshakeDone is received 23.940 loss detection timeout handler running Sending probe 0, because no ack since 23.687. Current RTT: 34/17. 23.940 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 24.194/App, because ackElicitingInFlight | RTT:34/17 23.940 -> Packet PA|1|S0|62971cfd005b302b66996bd571982901|55|1 StreamFrame[0(CIB),0,17,fin] 23.960 -> Packet A|2|S0|62971cfd005b302b66996bd571982901|40|1 AckFrame[4|Δ19] 24.193 loss detection timeout handler running Sending probe 1, because no ack since 23.940. Current RTT: 34/17. 24.193 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 507 millis, based on 24.702/App, because ackElicitingInFlight | RTT:34/17 24.194 -> Packet PA|3|S0|62971cfd005b302b66996bd571982901|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 507 millis, based on 24.703/App, because ackElicitingInFlight | RTT:34/17 24.195 -> Packet PA|4|S0|62971cfd005b302b66996bd571982901|55|1 StreamFrame[0(CIB),0,17,fin] 24.227 <- (3) Packet A|10|S0|a6ed02d65aff8767|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 24.246 -> Packet A|5|S0|62971cfd005b302b66996bd571982901|42|1 AckFrame[10,4|Δ19] 24.253 <- (4) Packet A|11|S0|a6ed02d65aff8767|45|3 AckFrame[4-3|Δ26] HandshakeDoneFrame[] Padding(12) 24.254 Cwnd(-): 6000; inflight: 0 24.254 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 24.254 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 137 millis, based on 24.392/App, because ackElicitingInFlight | RTT:37/19 24.254 -> Packet A|6|S0|62971cfd005b302b66996bd571982901|62|2 StreamFrame[0(CIB),0,17,fin] AckFrame[10,4|Δ0] 24.273 -> Packet A|7|S0|62971cfd005b302b66996bd571982901|42|1 AckFrame[11-10,4|Δ19] 24.285 <- (5) Packet A|13|S0|a6ed02d65aff8767|1061|3 AckFrame[5-3|Δ7] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024,fin] reschedule loss detection timer for PTO over 105 millis, based on 24.392/App, because ackElicitingInFlight | RTT:37/19 24.286 Finished downloading https://server4:443/lfkrhdiuxl at 33:08.821 on ClientConnection[3e556b3511da3af3/a6ed02d65aff8767(V1) with server4/193.167.100.100:443] 24.286 Closing ClientConnection[3e556b3511da3af3/a6ed02d65aff8767(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.287 -> Packet A|8|S0|62971cfd005b302b66996bd571982901|45|2 ConnectionCloseFrame[0|0|] AckFrame[13,11|Δ0] 24.287 Creating connection with server4:443 with v1 24.287 Setting up connection for downloading https://server4:443/nozyjuvbur at 33:08.822 on ClientConnection[370852663dc5d5b8/b338cfab774a94e1(V1) with server4/193.167.100.100:443] 24.288 Original destination connection id: 370852663dc5d5b8 (scid: b338cfab774a94e1) 24.289 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial >- CryptoStream[I|ClientHello] reschedule loss detection timer for PTO over 199 millis, based on 24.489/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.289 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.311 <- (6) Packet A|14|S0|a6ed02d65aff8767|45|2 AckFrame[7-3|Δ6] Padding(13) 24.311 -> Packet A|9|S0|62971cfd005b302b66996bd571982901|45|2 ConnectionCloseFrame[0|0|] AckFrame[13,11|Δ0] 24.323 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 24.324 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.524/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.323 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 24.327 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 24.429/Handshake, because peerAwaitingAddressValidation | RTT:34/17 24.327 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 24.329 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 101 millis, based on 24.431/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.329 -> Packet H|0|L|88|1 CryptoFrame[0,36] 24.329 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.329 Starting downloading https://server4:443/nozyjuvbur at 33:08.864 on ClientConnection[370852663dc5d5b8/b338cfab774a94e1(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 24.431/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.329 Discarding pn space Initial because first Handshake message is being sent 24.329 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 24.330 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 24.432/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.330 -> Packet A|0|S0|ff8cda2b22f6d4fbaa93557f407dfb13|55|1 StreamFrame[0(CIB),0,17,fin] 24.361 <- (2) Packet A|0|S0|b338cfab774a94e1|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|4590466a43d622d763095cdb5228fea6|50391c61e5e72229203138405622093e] NewConnectionIdFrame[2,<1|a8b9fb66ec37cd66add5e8674666157a|22b916212e4ca3be63ac1ba302024a39] 24.361 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 24.431/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 24.457/App, because ackElicitingInFlight | RTT:34/17 24.361 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 24.489/App, because ackElicitingInFlight | RTT:34/17 24.362 -> Packet A|1|S0|4590466a43d622d763095cdb5228fea6|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 24.363 <- (3) Packet A|1|S0|b338cfab774a94e1|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 24.489/App, because ackElicitingInFlight | RTT:34/17 24.363 <- (4) Packet A|2|S0|b338cfab774a94e1|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 24.364 Finished downloading https://server4:443/nozyjuvbur at 33:08.898 on ClientConnection[370852663dc5d5b8/b338cfab774a94e1(V1) with server4/193.167.100.100:443] 24.364 Closing ClientConnection[370852663dc5d5b8/b338cfab774a94e1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.364 -> Packet A|2|S0|4590466a43d622d763095cdb5228fea6|39|1 AckFrame[2-0|Δ0] 24.364 -> Packet A|3|S0|4590466a43d622d763095cdb5228fea6|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 24.364 Creating connection with server4:443 with v1 24.365 Setting up connection for downloading https://server4:443/ncwixztobo at 33:08.899 on ClientConnection[78491c61fd84a91d/aa823ed4234dd784(V1) with server4/193.167.100.100:443] 24.365 Original destination connection id: 78491c61fd84a91d (scid: aa823ed4234dd784) >- CryptoStream[I|ClientHello] 24.366 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.566/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.366 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.400 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ8] CryptoFrame[0,123] 24.400 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.600/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 24.400 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 24.403 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 24.505/Handshake, because peerAwaitingAddressValidation | RTT:34/17 24.403 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 24.405 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 24.507/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.405 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.405 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.405 Starting downloading https://server4:443/ncwixztobo at 33:08.940 on ClientConnection[78491c61fd84a91d/aa823ed4234dd784(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 24.507/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.405 Discarding pn space Initial because first Handshake message is being sent 24.405 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 24.406 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 24.508/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.406 -> Packet A|0|S0|df7a9cc2899d6e6415e728f438f37a19|55|1 StreamFrame[0(CIB),0,17,fin] 24.507 loss detection timeout handler running Sending probe 0, because no ack since 24.405. Current RTT: 34/17. 24.507 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.507 (Probe is a handshake retransmit) 24.507 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 24.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.507 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 24.539 <- (2) Packet A|0|S0|aa823ed4234dd784|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|47190fa8e434eb7086be00ea10a42b4a|620792f2cc10cdd4311eca654c06724c] NewConnectionIdFrame[2,<1|d7fb55628e82e2dc23a867be547f1e71|d7ed6a05b6ee47f02e9bc9c95dee5a29] 24.539 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 24.660/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 24.533/App, because ackElicitingInFlight | RTT:34/17 24.540 loss detection timeout handler running 24.540 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 24.406. Current RTT: 34/17. 24.540 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 24.794/App, because ackElicitingInFlight | RTT:34/17 24.540 -> Packet PA|1|S0|47190fa8e434eb7086be00ea10a42b4a|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 24.794/App, because ackElicitingInFlight | RTT:34/17 24.540 -> Packet A|2|S0|47190fa8e434eb7086be00ea10a42b4a|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 24.573 <- (3) Packet A|1|S0|aa823ed4234dd784|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] 24.574 Cwnd(-): 6000; inflight: 0 24.574 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 24.574 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 24.685/App, because ackElicitingInFlight | RTT:34/13 24.573 <- (4) Packet A|2|S0|aa823ed4234dd784|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 24.574 -> Packet A|3|S0|47190fa8e434eb7086be00ea10a42b4a|55|1 StreamFrame[0(CIB),0,17,fin] 24.574 -> Packet A|4|S0|47190fa8e434eb7086be00ea10a42b4a|39|1 AckFrame[2-1|Δ0] 24.574 Finished downloading https://server4:443/ncwixztobo at 33:09.109 on ClientConnection[78491c61fd84a91d/aa823ed4234dd784(V1) with server4/193.167.100.100:443] 24.574 Closing ClientConnection[78491c61fd84a91d/aa823ed4234dd784(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.575 -> Packet A|5|S0|47190fa8e434eb7086be00ea10a42b4a|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 24.575 Creating connection with server4:443 with v1 24.575 Setting up connection for downloading https://server4:443/hruhhrkyfl at 33:09.110 on ClientConnection[d3f8d5b1bead0639/578ddcdf99129f6e(V1) with server4/193.167.100.100:443] 24.576 Original destination connection id: d3f8d5b1bead0639 (scid: 578ddcdf99129f6e) >- CryptoStream[I|ClientHello] 24.577 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.777/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.577 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.606 <- (5) Packet A|3|S0|aa823ed4234dd784|45|2 AckFrame[4-3|Δ0] Padding(14) 24.606 -> Packet A|6|S0|47190fa8e434eb7086be00ea10a42b4a|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 24.776 loss detection timeout handler running Sending probe 0, because no ack since 24.577. Current RTT: 100/25. 24.776 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.776 (Probe is an initial retransmit) 24.777 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.177/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.777 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.811 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ9] CryptoFrame[0,123] 24.811 probe count not reset on ack because handshake not yet confirmed 24.812 Retransmitting CryptoFrame[0,257] on level Initial 24.812 Cwnd(-): 6000; inflight: 0 24.812 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.212/Initial, because peerAwaitingAddressValidation | RTT:100/25 24.812 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 25.016/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.812 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 24.814 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.811 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) reschedule loss detection timer for PTO over 203 millis, based on 25.018/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.814 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 24.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 25.021/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.817 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.817 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.817 Starting downloading https://server4:443/hruhhrkyfl at 33:09.352 on ClientConnection[d3f8d5b1bead0639/578ddcdf99129f6e(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 24.919/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.817 Discarding pn space Initial because first Handshake message is being sent 24.817 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 24.818 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 24.920/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.818 -> Packet A|0|S0|e3dd27b3455811fe949cdc195520f8e0|55|1 StreamFrame[0(CIB),0,17,fin] 24.845 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.919 loss detection timeout handler running Sending probe 0, because no ack since 24.817. Current RTT: 34/17. 24.919 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 24.919 (Probe is a handshake retransmit) 24.919 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 25.123/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 24.919 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 24.951 <- (3) Packet A|0|S0|578ddcdf99129f6e|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|420c684f858201254be8ebbfb609f053|9d12e1198345585c3097f11dcd93a505] NewConnectionIdFrame[2,<1|c8a41c88065fee63464942ad09ab62d4|73592101ac259849556b97636741aa67] 24.952 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 25.072/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 24.945/App, because ackElicitingInFlight | RTT:34/17 24.952 Discarding pn space Handshake because HandshakeDone is received 24.952 loss detection timeout handler running Sending probe 0, because no ack since 24.818. Current RTT: 34/17. 24.952 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 25.206/App, because ackElicitingInFlight | RTT:34/17 24.952 -> Packet PA|1|S0|420c684f858201254be8ebbfb609f053|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 25.206/App, because ackElicitingInFlight | RTT:34/17 24.952 -> Packet A|2|S0|420c684f858201254be8ebbfb609f053|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 24.985 <- (4) Packet A|1|S0|578ddcdf99129f6e|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] 24.985 Cwnd(-): 3000; inflight: 0 24.985 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 24.985 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 25.096/App, because ackElicitingInFlight | RTT:34/13 24.985 <- (5) Packet A|2|S0|578ddcdf99129f6e|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 24.985 -> Packet A|3|S0|420c684f858201254be8ebbfb609f053|55|1 StreamFrame[0(CIB),0,17,fin] 24.986 Finished downloading https://server4:443/hruhhrkyfl at 33:09.520 on ClientConnection[d3f8d5b1bead0639/578ddcdf99129f6e(V1) with server4/193.167.100.100:443] 24.986 -> Packet A|4|S0|420c684f858201254be8ebbfb609f053|39|1 AckFrame[2-1|Δ0] 24.986 Closing ClientConnection[d3f8d5b1bead0639/578ddcdf99129f6e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.986 -> Packet A|5|S0|420c684f858201254be8ebbfb609f053|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 24.986 Creating connection with server4:443 with v1 24.987 Setting up connection for downloading https://server4:443/mlvqwxykqf at 33:09.521 on ClientConnection[ffe530f49c1ed8c6/f8476aa229bc77bd(V1) with server4/193.167.100.100:443] 24.987 Original destination connection id: ffe530f49c1ed8c6 (scid: f8476aa229bc77bd) >- CryptoStream[I|ClientHello] 24.988 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.188/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.988 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.188 loss detection timeout handler running Sending probe 0, because no ack since 24.988. Current RTT: 100/25. 25.188 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.188 (Probe is an initial retransmit) 25.188 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.588/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.188 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.587 loss detection timeout handler running Sending probe 1, because no ack since 25.188. Current RTT: 100/25. 25.587 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.587 (Probe is an initial retransmit) 25.588 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.388/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.588 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.589 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 26.389/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.589 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.388 loss detection timeout handler running Sending probe 2, because no ack since 25.589. Current RTT: 100/25. 26.388 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.388 (Probe is an initial retransmit) 26.388 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 27.988/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.388 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.389 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 27.989/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.389 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.625 <- (1) Packet I|5|L|186|2 Token=[] AckFrame[4-3|Δ1620] CryptoFrame[0,123] 26.626 probe count not reset on ack because handshake not yet confirmed 26.626 Retransmitting CryptoFrame[0,257] on level Initial 26.626 Cwnd(-): 6000; inflight: 1200 26.626 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1599 millis, based on 28.226/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.626 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 5671 millis, based on 32.298/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:237/118 26.626 -> Packet I|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 26.629 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 5671 millis, based on 32.301/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:237/118 26.628 -> Packet I|7|L|1201|2 Token=[] AckFrame[5|Δ0] Padding(1145) 26.625 <- (1) Packet H|4|L|1014|2 CryptoFrame[0,684] Padding(276) >- CryptoStream[H|Finished] 26.631 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 5671 millis, based on 32.303/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:237/118 26.631 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.631 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 708 millis, based on 27.340/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:237/118 26.631 Starting downloading https://server4:443/mlvqwxykqf at 33:11.166 on ClientConnection[ffe530f49c1ed8c6/f8476aa229bc77bd(V1) with server4/193.167.100.100:443] 26.631 Discarding pn space Initial because first Handshake message is being sent 26.631 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 26.632 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 708 millis, based on 27.341/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:237/118 26.632 -> Packet A|0|S0|0a1985ae0a89cbbf04829c5f64b7efd1|55|1 StreamFrame[0(CIB),0,17,fin] 26.660 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 26.663 <- (3) Packet A|0|S0|f8476aa229bc77bd|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|c076f5c44cab2425edab329b6ccc765e|2c2a58ebaff8b1e271babb1965d3938b] NewConnectionIdFrame[2,<1|8d15ec6846bfcc32551b937eb2a8980f|476d1e0fe4cd495142672f653adef41b] 26.663 State is set to Confirmed reschedule loss detection timer for PTO over 676 millis, based on 27.340/Handshake, because ackElicitingInFlight | RTT:237/118 reschedule loss detection timer for PTO over 702 millis, based on 27.366/App, because ackElicitingInFlight | RTT:237/118 26.663 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 733 millis, based on 27.397/App, because ackElicitingInFlight | RTT:237/118 26.663 -> Packet A|1|S0|c076f5c44cab2425edab329b6ccc765e|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 26.665 <- (4) Packet A|1|S0|f8476aa229bc77bd|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 732 millis, based on 27.397/App, because ackElicitingInFlight | RTT:237/118 26.665 <- (5) Packet A|2|S0|f8476aa229bc77bd|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 26.665 Finished downloading https://server4:443/mlvqwxykqf at 33:11.200 on ClientConnection[ffe530f49c1ed8c6/f8476aa229bc77bd(V1) with server4/193.167.100.100:443] 26.666 Closing ClientConnection[ffe530f49c1ed8c6/f8476aa229bc77bd(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.665 -> Packet A|2|S0|c076f5c44cab2425edab329b6ccc765e|39|1 AckFrame[2-0|Δ0] 26.666 Creating connection with server4:443 with v1 26.666 -> Packet A|3|S0|c076f5c44cab2425edab329b6ccc765e|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 26.667 Setting up connection for downloading https://server4:443/mecxvwjnwy at 33:11.201 on ClientConnection[31862b97f785e691/484b08c3e3aef3a9(V1) with server4/193.167.100.100:443] 26.667 Original destination connection id: 31862b97f785e691 (scid: 484b08c3e3aef3a9) >- CryptoStream[I|ClientHello] 26.668 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.868/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.668 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.702 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 26.703 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.903/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 26.702 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 26.705 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.807/Handshake, because peerAwaitingAddressValidation | RTT:34/17 26.705 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 26.707 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.809/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.707 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.707 Starting downloading https://server4:443/mecxvwjnwy at 33:11.242 on ClientConnection[31862b97f785e691/484b08c3e3aef3a9(V1) with server4/193.167.100.100:443] 26.707 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.809/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.707 Discarding pn space Initial because first Handshake message is being sent 26.707 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 26.708 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.810/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.708 -> Packet A|0|S0|9ae58398a8e0813d36f93c54d2b5d6bb|55|1 StreamFrame[0(CIB),0,17,fin] 26.741 <- (2) Packet A|1|S0|484b08c3e3aef3a9|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 26.741 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 26.843/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.741 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 26.793/Handshake, because ackElicitingInFlight | RTT:34/13 26.741 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 26.741 Discarding pn space Handshake because HandshakeDone is received 26.760 -> Packet A|1|S0|9ae58398a8e0813d36f93c54d2b5d6bb|40|1 AckFrame[1|Δ19] 26.797 <- (3) Packet A|3|S0|484b08c3e3aef3a9|105|4 AckFrame[1|Δ5] HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|94948d9ad5d025f33afe048bcdd882c0|e78576d35d408d70bd217ba9e81c2587] NewConnectionIdFrame[2,<1|fe2bd764d2397687c8dc107d6bdad9f6|7895be4bb2d7073e87a7b4dfc2d7c393] 26.798 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 26.909/App, because ackElicitingInFlight | RTT:34/13 26.798 -> Packet A|2|S0|94948d9ad5d025f33afe048bcdd882c0|41|2 RetireConnectionIdFrame[0] AckFrame[3|Δ0] 26.908 loss detection timeout handler running Sending probe 0, because no ack since 26.798. Current RTT: 34/13. 26.908 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 27.130/App, because ackElicitingInFlight | RTT:34/13 26.908 -> Packet PA|3|S0|94948d9ad5d025f33afe048bcdd882c0|37|2 RetireConnectionIdFrame[0] Padding(1) 26.928 <- (4) Packet A|5|S0|484b08c3e3aef3a9|45|3 AckFrame[1|Δ136] HandshakeDoneFrame[] Padding(10) reschedule loss detection timer for PTO over 90 millis, based on 27.019/App, because ackElicitingInFlight | RTT:34/13 26.948 -> Packet A|4|S0|94948d9ad5d025f33afe048bcdd882c0|42|1 AckFrame[5,3|Δ19] 27.019 loss detection timeout handler running Sending probe 0, because no ack since 26.908. Current RTT: 34/13. 27.019 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 27.241/App, because ackElicitingInFlight | RTT:34/13 27.019 -> Packet PA|5|S0|94948d9ad5d025f33afe048bcdd882c0|37|2 RetireConnectionIdFrame[0] Padding(1) 27.050 <- (5) Packet A|9|S0|484b08c3e3aef3a9|45|3 AckFrame[5,3,1|Δ0] HandshakeDoneFrame[] Padding(9) 27.051 Cwnd(-): 6000; inflight: 0 27.051 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 102 millis, based on 27.154/App, because ackElicitingInFlight | RTT:34/11 27.051 -> Packet A|6|S0|94948d9ad5d025f33afe048bcdd882c0|43|2 RetireConnectionIdFrame[0] AckFrame[5,3|Δ0] 27.070 -> Packet A|7|S0|94948d9ad5d025f33afe048bcdd882c0|44|1 AckFrame[9,5,3|Δ19] 27.102 <- (6) Packet A|10|S0|484b08c3e3aef3a9|45|3 AckFrame[7|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(8) 27.102 Cwnd(-): 3000; inflight: 0 27.103 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 102 millis, based on 27.206/App, because ackElicitingInFlight | RTT:34/11 27.103 -> Packet A|8|S0|94948d9ad5d025f33afe048bcdd882c0|37|2 RetireConnectionIdFrame[0] Padding(1) 27.103 Finished downloading https://server4:443/mecxvwjnwy at 33:11.637 on ClientConnection[31862b97f785e691/484b08c3e3aef3a9(V1) with server4/193.167.100.100:443] 27.103 Closing ClientConnection[31862b97f785e691/484b08c3e3aef3a9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.103 -> Packet A|9|S0|94948d9ad5d025f33afe048bcdd882c0|43|2 ConnectionCloseFrame[0|0|] AckFrame[10|Δ0] 27.103 Creating connection with server4:443 with v1 27.104 Setting up connection for downloading https://server4:443/mvknopnsnv at 33:11.638 on ClientConnection[63b87105a128d334/fbac35c84c90f09a(V1) with server4/193.167.100.100:443] 27.104 Original destination connection id: 63b87105a128d334 (scid: fbac35c84c90f09a) >- CryptoStream[I|ClientHello] 27.105 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.305/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.105 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.139 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 27.140 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.340/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.139 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 27.142 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.244/Handshake, because peerAwaitingAddressValidation | RTT:34/17 27.142 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 27.144 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.246/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.144 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.144 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.144 Starting downloading https://server4:443/mvknopnsnv at 33:11.679 on ClientConnection[63b87105a128d334/fbac35c84c90f09a(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 27.246/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.144 Discarding pn space Initial because first Handshake message is being sent 27.144 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 27.145 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.247/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.145 -> Packet A|0|S0|e673bbaa127894364b9a1a75eabd6710|55|1 StreamFrame[0(CIB),0,17,fin] 27.178 <- (2) Packet A|1|S0|fbac35c84c90f09a|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 27.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.280/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.178 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 27.230/Handshake, because ackElicitingInFlight | RTT:34/13 27.178 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.178 Discarding pn space Handshake because HandshakeDone is received 27.197 -> Packet A|1|S0|e673bbaa127894364b9a1a75eabd6710|40|1 AckFrame[1|Δ19] 27.234 <- (3) Packet A|3|S0|fbac35c84c90f09a|105|4 AckFrame[1|Δ5] HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|ceeee40ddbda7d9177022297c2318fe3|f52ea7d79a6699a8c984f74756f68a78] NewConnectionIdFrame[2,<1|0c740f30ab235e86cbf812d34911e249|5d35458f85fb1ba9525c583fff0ff5fa] 27.235 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 27.346/App, because ackElicitingInFlight | RTT:34/13 27.235 -> Packet A|2|S0|ceeee40ddbda7d9177022297c2318fe3|41|2 RetireConnectionIdFrame[0] AckFrame[3|Δ0] 27.345 loss detection timeout handler running Sending probe 0, because no ack since 27.235. Current RTT: 34/13. 27.345 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 27.567/App, because ackElicitingInFlight | RTT:34/13 27.345 -> Packet PA|3|S0|ceeee40ddbda7d9177022297c2318fe3|37|2 RetireConnectionIdFrame[0] Padding(1) 27.567 loss detection timeout handler running Sending probe 1, because no ack since 27.345. Current RTT: 34/13. 27.567 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 443 millis, based on 28.011/App, because ackElicitingInFlight | RTT:34/13 27.567 -> Packet PA|4|S0|ceeee40ddbda7d9177022297c2318fe3|37|2 RetireConnectionIdFrame[0] Padding(1) reschedule loss detection timer for PTO over 443 millis, based on 28.012/App, because ackElicitingInFlight | RTT:34/13 27.568 -> Packet PA|5|S0|ceeee40ddbda7d9177022297c2318fe3|37|2 RetireConnectionIdFrame[0] Padding(1) 27.599 <- (4) Packet A|9|S0|fbac35c84c90f09a|45|3 AckFrame[5,3,1|Δ0] HandshakeDoneFrame[] Padding(9) 27.600 Cwnd(-): 6000; inflight: 37 27.600 -> Packet A|6|S0|ceeee40ddbda7d9177022297c2318fe3|41|2 RetireConnectionIdFrame[0] AckFrame[3|Δ0] 27.605 loss detection timeout handler running reschedule loss detection timer for PTO over 97 millis, based on 27.703/App, because ackElicitingInFlight | RTT:34/11 27.619 -> Packet A|7|S0|ceeee40ddbda7d9177022297c2318fe3|42|1 AckFrame[9,3|Δ19] 27.631 <- (5) Packet A|10|S0|fbac35c84c90f09a|45|4 AckFrame[6-5,3|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(6) 27.632 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.632 Finished downloading https://server4:443/mvknopnsnv at 33:12.166 on ClientConnection[63b87105a128d334/fbac35c84c90f09a(V1) with server4/193.167.100.100:443] 27.632 Closing ClientConnection[63b87105a128d334/fbac35c84c90f09a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.632 -> Packet A|8|S0|ceeee40ddbda7d9177022297c2318fe3|43|2 ConnectionCloseFrame[0|0|] AckFrame[10-9|Δ0] 27.632 Creating connection with server4:443 with v1 27.633 Setting up connection for downloading https://server4:443/wjvhwlexha at 33:12.167 on ClientConnection[9b54fdfed63c929d/b754a0098a3e770d(V1) with server4/193.167.100.100:443] 27.633 Original destination connection id: 9b54fdfed63c929d (scid: b754a0098a3e770d) >- CryptoStream[I|ClientHello] 27.634 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.834/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.634 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.669 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ13] CryptoFrame[0,123] 27.670 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.870/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.775/Handshake, because peerAwaitingAddressValidation | RTT:34/17 27.669 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 27.673 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 27.675 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.777/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.675 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.675 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.777/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.675 Starting downloading https://server4:443/wjvhwlexha at 33:12.210 on ClientConnection[9b54fdfed63c929d/b754a0098a3e770d(V1) with server4/193.167.100.100:443] 27.675 Discarding pn space Initial because first Handshake message is being sent 27.675 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 27.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.778/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.676 -> Packet A|0|S0|2894afb0d76ee9fb755e3e1987a50fc4|55|1 StreamFrame[0(CIB),0,17,fin] 27.777 loss detection timeout handler running Sending probe 0, because no ack since 27.675. Current RTT: 34/17. 27.777 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.777 (Probe is a handshake retransmit) 27.777 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 27.981/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.777 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 27.809 <- (2) Packet A|0|S0|b754a0098a3e770d|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|22cc4eb68aea071ac76c698778a1f41f|b89f4ccf934e1816d23f6ec8e24dcc9e] NewConnectionIdFrame[2,<1|36e57e4cd47be1c6603b0e9693e91145|88d74bf10a82fdaca9832538b2295105] 27.809 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 27.930/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 27.803/App, because ackElicitingInFlight | RTT:34/17 27.809 Discarding pn space Handshake because HandshakeDone is received 27.809 loss detection timeout handler running Sending probe 0, because no ack since 27.676. Current RTT: 34/17. 27.809 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 28.064/App, because ackElicitingInFlight | RTT:34/17 27.810 -> Packet PA|1|S0|22cc4eb68aea071ac76c698778a1f41f|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 28.064/App, because ackElicitingInFlight | RTT:34/17 27.810 -> Packet A|2|S0|22cc4eb68aea071ac76c698778a1f41f|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 27.842 <- (3) Packet A|1|S0|b754a0098a3e770d|1061|3 AckFrame[1|Δ1] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 27.843 Cwnd(-): 6000; inflight: 41 27.843 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 93 millis, based on 27.937/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 110 millis, based on 27.954/App, because ackElicitingInFlight | RTT:34/13 27.843 -> Packet A|3|S0|22cc4eb68aea071ac76c698778a1f41f|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 27.843 <- (4) Packet A|2|S0|b754a0098a3e770d|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 27.844 Finished downloading https://server4:443/wjvhwlexha at 33:12.378 on ClientConnection[9b54fdfed63c929d/b754a0098a3e770d(V1) with server4/193.167.100.100:443] 27.844 -> Packet A|4|S0|22cc4eb68aea071ac76c698778a1f41f|39|1 AckFrame[2-0|Δ0] 27.844 Closing ClientConnection[9b54fdfed63c929d/b754a0098a3e770d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.844 -> Packet A|5|S0|22cc4eb68aea071ac76c698778a1f41f|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 27.844 Creating connection with server4:443 with v1 27.845 Setting up connection for downloading https://server4:443/tpkmszakwr at 33:12.379 on ClientConnection[d8e46c0967fe5896/16d4612a27bcf8c0(V1) with server4/193.167.100.100:443] 27.845 Original destination connection id: d8e46c0967fe5896 (scid: 16d4612a27bcf8c0) >- CryptoStream[I|ClientHello] 27.846 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.046/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.846 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.880 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ8] CryptoFrame[0,123] 27.880 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 28.080/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 27.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.880 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) reschedule loss detection timer for PTO over 101 millis, based on 27.985/Handshake, because peerAwaitingAddressValidation | RTT:34/17 27.882 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 27.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.987/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.884 -> Packet H|0|L|88|1 CryptoFrame[0,36] 27.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.987/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.885 Discarding pn space Initial because first Handshake message is being sent 27.885 Starting downloading https://server4:443/tpkmszakwr at 33:12.419 on ClientConnection[d8e46c0967fe5896/16d4612a27bcf8c0(V1) with server4/193.167.100.100:443] 27.885 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 27.885 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 27.987/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.885 -> Packet A|0|S0|5453b13b8bc0bfed2f55f3dc2de9b798|55|1 StreamFrame[0(CIB),0,17,fin] 27.986 loss detection timeout handler running Sending probe 0, because no ack since 27.884. Current RTT: 34/17. 27.986 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.986 (Probe is a handshake retransmit) 27.987 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 28.191/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.987 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 28.190 loss detection timeout handler running Sending probe 1, because no ack since 27.885. Current RTT: 34/17. 28.190 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.190 (Probe is a handshake retransmit) 28.190 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 28.598/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 28.190 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 28.191 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 28.599/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 28.191 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 28.598 loss detection timeout handler running Sending probe 2, because no ack since 27.885. Current RTT: 34/17. 28.598 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.599 (Probe is a handshake retransmit) 28.599 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 29.415/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 28.599 -> Packet PH|5|L|88|1 CryptoFrame[0,36] 28.600 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 29.416/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 28.600 -> Packet PH|6|L|88|1 CryptoFrame[0,36] 28.944 <- (2) Packet A|4|S0|16d4612a27bcf8c0|45|3 AckFrame[0|Δ1026] HandshakeDoneFrame[] Padding(10) 28.945 probe count not reset on ack because handshake not yet confirmed 28.945 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 29.761/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 28.945 State is set to Confirmed reschedule loss detection timer for PTO over 9342 millis, based on 38.288/Handshake, because ackElicitingInFlight | RTT:159/263 28.945 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.945 Discarding pn space Handshake because HandshakeDone is received 28.944 <- (3) Packet A|6|S0|16d4612a27bcf8c0|45|3 AckFrame[0|Δ1026] HandshakeDoneFrame[] Padding(10) 28.945 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 28.945 -> Packet A|1|S0|5453b13b8bc0bfed2f55f3dc2de9b798|41|1 AckFrame[6,4|Δ0] 28.978 <- (4) Packet A|7|S0|16d4612a27bcf8c0|1132|4 AckFrame[1|Δ0] NewConnectionIdFrame[1,<1|9ce348dbacece44d8843234f137a397b|d9d12d39babc350aed4cb2bebf3f6bba] NewConnectionIdFrame[2,<1|b863a5ae7282da5f30f304676e8329a0|007e46c3a456fae919abbf3fcf91b9e6] StreamFrame[0(CIB),0,1024,fin] 28.979 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 1235 millis, based on 30.215/App, because ackElicitingInFlight | RTT:159/263 28.979 -> Packet A|2|S0|9ce348dbacece44d8843234f137a397b|41|2 RetireConnectionIdFrame[0] AckFrame[7|Δ0] 28.979 Finished downloading https://server4:443/tpkmszakwr at 33:13.514 on ClientConnection[d8e46c0967fe5896/16d4612a27bcf8c0(V1) with server4/193.167.100.100:443] 28.979 Closing ClientConnection[d8e46c0967fe5896/16d4612a27bcf8c0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 28.980 -> Packet A|3|S0|9ce348dbacece44d8843234f137a397b|43|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 28.980 Creating connection with server4:443 with v1 28.980 Setting up connection for downloading https://server4:443/ghpcslwlbw at 33:13.515 on ClientConnection[d37e18b3a9205667/61ca989bf4858bcb(V1) with server4/193.167.100.100:443] 28.981 Original destination connection id: d37e18b3a9205667 (scid: 61ca989bf4858bcb) >- CryptoStream[I|ClientHello] 28.982 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.182/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 28.982 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.181 loss detection timeout handler running Sending probe 0, because no ack since 28.982. Current RTT: 100/25. 29.181 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.181 (Probe is an initial retransmit) 29.181 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.581/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.181 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.216 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ10] CryptoFrame[0,123] 29.216 probe count not reset on ack because handshake not yet confirmed 29.216 Retransmitting CryptoFrame[0,257] on level Initial 29.216 Cwnd(-): 6000; inflight: 0 29.216 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.616/Initial, because peerAwaitingAddressValidation | RTT:100/25 29.216 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 29.420/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.216 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 29.216 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 29.218 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 29.422/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.218 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 29.221 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 29.425/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.221 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.221 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 29.221 Starting downloading https://server4:443/ghpcslwlbw at 33:13.755 on ClientConnection[d37e18b3a9205667/61ca989bf4858bcb(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 29.323/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.221 Discarding pn space Initial because first Handshake message is being sent 29.221 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 29.221 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.323/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.221 -> Packet A|0|S0|097bd31d7f32df914832da952d04e17b|55|1 StreamFrame[0(CIB),0,17,fin] 29.252 <- (2) Packet A|0|S0|61ca989bf4858bcb|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|392caad3014d7676dd7e85cedd1c1fcb|d5d7928a3e453d3caf5a6357e611bacb] NewConnectionIdFrame[2,<1|6844bd595f5e806bb6d52b4020f1ab93|c98e2872682f52a07fa5e21a0554ce6d] 29.253 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 29.323/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 29.348/App, because ackElicitingInFlight | RTT:34/17 29.253 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 29.380/App, because ackElicitingInFlight | RTT:34/17 29.253 -> Packet A|1|S0|392caad3014d7676dd7e85cedd1c1fcb|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 29.254 <- (3) Packet A|2|S0|61ca989bf4858bcb|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 29.273 -> Packet A|2|S0|392caad3014d7676dd7e85cedd1c1fcb|42|1 AckFrame[2,0|Δ18] 29.379 loss detection timeout handler running Sending probe 0, because no ack since 29.253. Current RTT: 34/17. 29.380 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 29.634/App, because ackElicitingInFlight | RTT:34/17 29.380 -> Packet PA|3|S0|392caad3014d7676dd7e85cedd1c1fcb|55|1 StreamFrame[0(CIB),0,17,fin] 29.435 <- (4) Packet A|5|S0|61ca989bf4858bcb|45|3 AckFrame[3-0|Δ23] PingFrame[] Padding(12) 29.435 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.435 <- (5) Packet A|7|S0|61ca989bf4858bcb|45|3 AckFrame[3-0|Δ23] PingFrame[] Padding(12) 29.435 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.435 -> Packet A|4|S0|392caad3014d7676dd7e85cedd1c1fcb|41|1 AckFrame[7,5|Δ0] 29.468 <- (6) Packet A|8|S0|61ca989bf4858bcb|1059|2 AckFrame[4|Δ0] StreamFrame[0(CIB),0,1024,fin] 29.468 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.468 Finished downloading https://server4:443/ghpcslwlbw at 33:14.003 on ClientConnection[d37e18b3a9205667/61ca989bf4858bcb(V1) with server4/193.167.100.100:443] 29.468 Closing ClientConnection[d37e18b3a9205667/61ca989bf4858bcb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.469 -> Packet A|5|S0|392caad3014d7676dd7e85cedd1c1fcb|43|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 29.469 Creating connection with server4:443 with v1 29.469 Setting up connection for downloading https://server4:443/hhqrennsfp at 33:14.004 on ClientConnection[6298bebed7a281bb/1ad108979512c9eb(V1) with server4/193.167.100.100:443] 29.469 Original destination connection id: 6298bebed7a281bb (scid: 1ad108979512c9eb) >- CryptoStream[I|ClientHello] 29.471 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.671/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.470 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.505 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 29.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.705/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 29.505 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 29.508 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.610/Handshake, because peerAwaitingAddressValidation | RTT:34/17 29.507 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 29.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.509 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.510 Starting downloading https://server4:443/hhqrennsfp at 33:14.044 on ClientConnection[6298bebed7a281bb/1ad108979512c9eb(V1) with server4/193.167.100.100:443] 29.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.510 Discarding pn space Initial because first Handshake message is being sent 29.510 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 29.510 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.612/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.510 -> Packet A|0|S0|7c4a16723912305add2ed5b86d2df90d|55|1 StreamFrame[0(CIB),0,17,fin] 29.543 <- (2) Packet A|1|S0|1ad108979512c9eb|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 29.544 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 29.646/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 29.544 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 29.595/Handshake, because ackElicitingInFlight | RTT:34/13 29.544 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.544 Discarding pn space Handshake because HandshakeDone is received 29.543 <- (3) Packet A|2|S0|1ad108979512c9eb|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 29.544 Finished downloading https://server4:443/hhqrennsfp at 33:14.079 on ClientConnection[6298bebed7a281bb/1ad108979512c9eb(V1) with server4/193.167.100.100:443] 29.544 Closing ClientConnection[6298bebed7a281bb/1ad108979512c9eb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.544 -> Packet A|1|S0|7c4a16723912305add2ed5b86d2df90d|39|1 AckFrame[2-1|Δ0] 29.545 -> Packet A|2|S0|7c4a16723912305add2ed5b86d2df90d|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 29.545 Creating connection with server4:443 with v1 29.545 Setting up connection for downloading https://server4:443/bxogdroufa at 33:14.080 on ClientConnection[b5605aced7a03343/3a601bc1efc38566(V1) with server4/193.167.100.100:443] 29.545 Original destination connection id: b5605aced7a03343 (scid: 3a601bc1efc38566) >- CryptoStream[I|ClientHello] 29.547 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.747/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.547 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.677 <- (4) Packet A|6|S0|1ad108979512c9eb|45|3 AckFrame[0|Δ134] HandshakeDoneFrame[] Padding(10) 29.677 -> Packet A|3|S0|7c4a16723912305add2ed5b86d2df90d|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 29.746 loss detection timeout handler running Sending probe 0, because no ack since 29.547. Current RTT: 100/25. 29.746 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.746 (Probe is an initial retransmit) 29.746 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 30.146/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.746 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.145 loss detection timeout handler running Sending probe 1, because no ack since 29.746. Current RTT: 100/25. 30.145 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.145 (Probe is an initial retransmit) 30.146 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.946/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.146 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.147 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.947/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.147 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.179 <- (1) Packet I|2|L|1200|2 Token=[] AckFrame[2-0|Δ2] Padding(1143) 30.180 probe count not reset on ack because handshake not yet confirmed 30.180 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 30.980/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.180 <- (2) Packet I|3|L|1200|2 Token=[] AckFrame[3-0|Δ2] Padding(1143) 30.180 probe count not reset on ack because handshake not yet confirmed 30.180 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 30.568/Initial, because peerAwaitingAddressValidation | RTT:33/16 30.567 loss detection timeout handler running Sending probe 2, because no ack since 30.147. Current RTT: 33/12. 30.567 Sending probe because peer awaiting address validation 30.568 (Probe is Initial ping, because there is no Initial data to retransmit) 30.568 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 31.216/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 30.568 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 30.582 <- (3) Packet I|5|L|186|2 Token=[] AckFrame[3-0|Δ3215] CryptoFrame[0,123] 30.582 probe count not reset on ack because handshake not yet confirmed 30.583 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 647 millis, based on 31.231/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 -< CryptoStream[I|ServerHello] 30.586 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.582 <- (3) Packet H|2|L|1014|2 CryptoFrame[0,684] Padding(276) reschedule loss detection timer for PTO over 647 millis, based on 31.234/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 30.586 -> Packet I|5|L|1201|2 Token=[] AckFrame[5,3-2|Δ0] Padding(1143) >- CryptoStream[H|Finished] 30.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 647 millis, based on 31.237/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 30.589 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 30.670/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 30.589 Discarding pn space Initial because first Handshake message is being sent 30.589 Starting downloading https://server4:443/bxogdroufa at 33:15.124 on ClientConnection[b5605aced7a03343/3a601bc1efc38566(V1) with server4/193.167.100.100:443] 30.589 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.590 -> Packet H|1|L|54|1 AckFrame[2|Δ0] 30.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 30.671/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 30.590 -> Packet A|0|S0|fd51cada117851978f8394f114b16bec|55|1 StreamFrame[0(CIB),0,17,fin] 30.601 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.620 <- (6) Packet A|0|S0|3a601bc1efc38566|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|c43b02dce50525cc8796ded797aed7db|f73780a69ede7bd9f9f9c49922159cb0] NewConnectionIdFrame[2,<1|9bf02a34810bd78d8a3e026e458d0ead|8e1bf139817b6dff9662464ddbb02dc2] 30.621 State is set to Confirmed reschedule loss detection timer for PTO over 49 millis, based on 30.670/Handshake, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over 75 millis, based on 30.696/App, because ackElicitingInFlight | RTT:33/12 30.621 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 105 millis, based on 30.727/App, because ackElicitingInFlight | RTT:33/12 30.621 -> Packet A|1|S0|c43b02dce50525cc8796ded797aed7db|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 30.726 loss detection timeout handler running Sending probe 0, because no ack since 30.621. Current RTT: 33/12. 30.726 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 211 millis, based on 30.938/App, because ackElicitingInFlight | RTT:33/12 30.726 -> Packet PA|2|S0|c43b02dce50525cc8796ded797aed7db|55|1 StreamFrame[0(CIB),0,17,fin] 30.746 <- (7) Packet A|5|S0|3a601bc1efc38566|45|3 AckFrame[1-0|Δ93] PingFrame[] Padding(12) reschedule loss detection timer for PTO over 86 millis, based on 30.832/App, because ackElicitingInFlight | RTT:33/12 30.746 <- (8) Packet A|7|S0|3a601bc1efc38566|45|3 AckFrame[1-0|Δ93] PingFrame[] Padding(12) reschedule loss detection timer for PTO over 149 millis, based on 30.896/App, because ackElicitingInFlight | RTT:41/26 30.747 -> Packet A|3|S0|c43b02dce50525cc8796ded797aed7db|41|1 AckFrame[7,5|Δ0] 30.896 loss detection timeout handler running Sending probe 0, because no ack since 30.726. Current RTT: 41/26. 30.896 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 339 millis, based on 31.236/App, because ackElicitingInFlight | RTT:41/26 30.896 -> Packet PA|4|S0|c43b02dce50525cc8796ded797aed7db|55|1 StreamFrame[0(CIB),0,17,fin] 30.991 <- (9) Packet A|9|S0|3a601bc1efc38566|45|3 AckFrame[1-0|Δ338] PingFrame[] Padding(10) reschedule loss detection timer for PTO over 74 millis, based on 31.066/App, because ackElicitingInFlight | RTT:41/26 31.010 -> Packet A|5|S0|c43b02dce50525cc8796ded797aed7db|44|1 AckFrame[9,7,5|Δ19] 31.065 loss detection timeout handler running Sending probe 0, because no ack since 30.896. Current RTT: 41/26. 31.065 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 339 millis, based on 31.405/App, because ackElicitingInFlight | RTT:41/26 31.065 -> Packet PA|6|S0|c43b02dce50525cc8796ded797aed7db|55|1 StreamFrame[0(CIB),0,17,fin] 31.122 <- (10) Packet A|13|S0|3a601bc1efc38566|45|2 AckFrame[6-5,1-0|Δ25] Padding(11) 31.123 Cwnd(-): 6000; inflight: 0 31.123 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.165 <- (11) Packet A|15|S0|3a601bc1efc38566|45|3 AckFrame[6-5,1-0|Δ68] PingFrame[] Padding(10) 31.166 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.185 -> Packet A|7|S0|c43b02dce50525cc8796ded797aed7db|42|1 AckFrame[15,13|Δ19] 31.217 <- (12) Packet A|18|S0|3a601bc1efc38566|1061|2 AckFrame[7-5,1-0|Δ0] StreamFrame[0(CIB),0,1024,fin] 31.218 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.218 Finished downloading https://server4:443/bxogdroufa at 33:15.753 on ClientConnection[b5605aced7a03343/3a601bc1efc38566(V1) with server4/193.167.100.100:443] 31.218 Closing ClientConnection[b5605aced7a03343/3a601bc1efc38566(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.219 -> Packet A|8|S0|c43b02dce50525cc8796ded797aed7db|43|2 ConnectionCloseFrame[0|0|] AckFrame[18|Δ0] 31.219 Creating connection with server4:443 with v1 31.219 Setting up connection for downloading https://server4:443/joslzhmepr at 33:15.754 on ClientConnection[68ae5b0d7116f54a/f19d5504b02185b4(V1) with server4/193.167.100.100:443] 31.219 Original destination connection id: 68ae5b0d7116f54a (scid: f19d5504b02185b4) >- CryptoStream[I|ClientHello] 31.221 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.421/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.220 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.420 loss detection timeout handler running Sending probe 0, because no ack since 31.220. Current RTT: 100/25. 31.420 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 31.420 (Probe is an initial retransmit) 31.420 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.820/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.420 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.454 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ10] CryptoFrame[0,123] 31.455 probe count not reset on ack because handshake not yet confirmed 31.455 Retransmitting CryptoFrame[0,257] on level Initial 31.455 Cwnd(-): 6000; inflight: 0 31.455 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.855/Initial, because peerAwaitingAddressValidation | RTT:100/25 31.455 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 31.659/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.455 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 31.454 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 31.457 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 31.661/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.457 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 31.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 31.663/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.459 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.561/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.459 Starting downloading https://server4:443/joslzhmepr at 33:15.994 on ClientConnection[68ae5b0d7116f54a/f19d5504b02185b4(V1) with server4/193.167.100.100:443] 31.459 Discarding pn space Initial because first Handshake message is being sent 31.459 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 31.460 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.562/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.460 -> Packet A|0|S0|c7245104d12ebc94abf50ef3ce297dd5|55|1 StreamFrame[0(CIB),0,17,fin] 31.488 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 31.561 loss detection timeout handler running Sending probe 0, because no ack since 31.459. Current RTT: 34/17. 31.561 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.561 (Probe is a handshake retransmit) 31.562 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 31.766/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.561 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 31.593 <- (3) Packet A|0|S0|f19d5504b02185b4|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|f4a3c0e6916eb208ae22dd8ad4581505|42e825a9bb51e9090620e64b212bc93f] NewConnectionIdFrame[2,<1|99ab134e32d47a1c5311abc2483faaae|9d7ac82704eee443afb03fa77f857580] 31.594 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 31.714/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -7 millis, based on 31.587/App, because ackElicitingInFlight | RTT:34/17 31.594 Discarding pn space Handshake because HandshakeDone is received 31.594 loss detection timeout handler running Sending probe 0, because no ack since 31.460. Current RTT: 34/17. 31.594 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 31.848/App, because ackElicitingInFlight | RTT:34/17 31.594 -> Packet PA|1|S0|f4a3c0e6916eb208ae22dd8ad4581505|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 31.848/App, because ackElicitingInFlight | RTT:34/17 31.594 -> Packet A|2|S0|f4a3c0e6916eb208ae22dd8ad4581505|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 31.627 <- (4) Packet A|1|S0|f19d5504b02185b4|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] 31.628 Cwnd(-): 3000; inflight: 0 31.628 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 31.628 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 31.739/App, because ackElicitingInFlight | RTT:34/13 31.628 -> Packet A|3|S0|f4a3c0e6916eb208ae22dd8ad4581505|55|1 StreamFrame[0(CIB),0,17,fin] 31.627 <- (5) Packet A|2|S0|f19d5504b02185b4|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 31.628 Finished downloading https://server4:443/joslzhmepr at 33:16.163 on ClientConnection[68ae5b0d7116f54a/f19d5504b02185b4(V1) with server4/193.167.100.100:443] 31.628 -> Packet A|4|S0|f4a3c0e6916eb208ae22dd8ad4581505|39|1 AckFrame[2-1|Δ0] 31.628 Closing ClientConnection[68ae5b0d7116f54a/f19d5504b02185b4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.628 -> Packet A|5|S0|f4a3c0e6916eb208ae22dd8ad4581505|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 31.629 Creating connection with server4:443 with v1 31.629 Setting up connection for downloading https://server4:443/qjfmggswth at 33:16.164 on ClientConnection[88906236105d333c/ea3b2a048770a0f6(V1) with server4/193.167.100.100:443] 31.629 Original destination connection id: 88906236105d333c (scid: ea3b2a048770a0f6) >- CryptoStream[I|ClientHello] 31.630 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.830/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.630 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.664 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 31.665 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.865/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 31.664 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,686] Padding(276) 31.668 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.770/Handshake, because peerAwaitingAddressValidation | RTT:34/17 31.668 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 31.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.772/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.670 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.671 Starting downloading https://server4:443/qjfmggswth at 33:16.205 on ClientConnection[88906236105d333c/ea3b2a048770a0f6(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 31.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.671 Discarding pn space Initial because first Handshake message is being sent 31.671 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 31.671 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.773/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.671 -> Packet A|0|S0|0b7aae1ea042bd19b546ec18578e4cf2|55|1 StreamFrame[0(CIB),0,17,fin] 31.704 <- (2) Packet A|1|S0|ea3b2a048770a0f6|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 31.704 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 31.806/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.704 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 31.756/Handshake, because ackElicitingInFlight | RTT:34/13 31.704 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 31.704 Discarding pn space Handshake because HandshakeDone is received 31.704 <- (3) Packet A|2|S0|ea3b2a048770a0f6|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 31.705 Finished downloading https://server4:443/qjfmggswth at 33:16.239 on ClientConnection[88906236105d333c/ea3b2a048770a0f6(V1) with server4/193.167.100.100:443] 31.705 Closing ClientConnection[88906236105d333c/ea3b2a048770a0f6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.705 -> Packet A|1|S0|0b7aae1ea042bd19b546ec18578e4cf2|39|1 AckFrame[2-1|Δ0] 31.705 Creating connection with server4:443 with v1 31.705 -> Packet A|2|S0|0b7aae1ea042bd19b546ec18578e4cf2|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 31.706 Setting up connection for downloading https://server4:443/wzmnhfoett at 33:16.240 on ClientConnection[c48a0875d05c6021/d33c961ddf145333(V1) with server4/193.167.100.100:443] 31.706 Original destination connection id: c48a0875d05c6021 (scid: d33c961ddf145333) >- CryptoStream[I|ClientHello] 31.707 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.907/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.707 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.906 loss detection timeout handler running Sending probe 0, because no ack since 31.707. Current RTT: 100/25. 31.906 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 31.906 (Probe is an initial retransmit) 31.907 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.307/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.907 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.941 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ10] CryptoFrame[0,123] 31.942 probe count not reset on ack because handshake not yet confirmed 31.942 Retransmitting CryptoFrame[0,257] on level Initial 31.942 Cwnd(-): 6000; inflight: 0 31.942 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.342/Initial, because peerAwaitingAddressValidation | RTT:100/25 31.942 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 32.146/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.942 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 31.944 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.941 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) reschedule loss detection timer for PTO over 203 millis, based on 32.148/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.944 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 31.946 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 32.151/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.946 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.947 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 31.947 Starting downloading https://server4:443/wzmnhfoett at 33:16.481 on ClientConnection[c48a0875d05c6021/d33c961ddf145333(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 32.049/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.947 Discarding pn space Initial because first Handshake message is being sent 31.947 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 31.947 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 32.049/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 31.947 -> Packet A|0|S0|312c434a09ee99aed7ddbcd9ed19c4f7|55|1 StreamFrame[0(CIB),0,17,fin] 31.978 <- (2) Packet A|0|S0|d33c961ddf145333|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|774b47b62d0691e37f201d39cfb0919f|f11f56a30fe08da70c423d72f51dd003] NewConnectionIdFrame[2,<1|13311c999e02d674604be932a7ec0f70|0782c402a7e383266529a403fe73c309] 31.979 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 32.048/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 32.074/App, because ackElicitingInFlight | RTT:34/17 31.979 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 32.106/App, because ackElicitingInFlight | RTT:34/17 31.979 -> Packet A|1|S0|774b47b62d0691e37f201d39cfb0919f|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 32.037 <- (3) Packet A|1|S0|d33c961ddf145333|45|2 AckFrame[1|Δ26] Padding(13) 32.037 Cwnd(-): 3000; inflight: 0 32.037 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 32.037 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 137 millis, based on 32.175/App, because ackElicitingInFlight | RTT:37/19 32.037 -> Packet A|2|S0|774b47b62d0691e37f201d39cfb0919f|55|1 StreamFrame[0(CIB),0,17,fin] 32.175 loss detection timeout handler running Sending probe 0, because no ack since 32.037. Current RTT: 37/19. 32.175 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 275 millis, based on 32.451/App, because ackElicitingInFlight | RTT:37/19 32.175 -> Packet PA|3|S0|774b47b62d0691e37f201d39cfb0919f|55|1 StreamFrame[0(CIB),0,17,fin] 32.208 <- (4) Packet A|3|S0|d33c961ddf145333|1062|2 AckFrame[3,1|Δ1] StreamFrame[0(CIB),0,1024] 32.208 Cwnd(-): 2400; inflight: 0 32.208 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 32.208 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 32.208 <- (5) Packet A|4|S0|d33c961ddf145333|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) reschedule loss detection timer for PTO over 121 millis, based on 32.330/App, because ackElicitingInFlight | RTT:37/15 32.208 -> Packet A|4|S0|774b47b62d0691e37f201d39cfb0919f|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[1|Δ0] 32.209 Finished downloading https://server4:443/wzmnhfoett at 33:16.743 on ClientConnection[c48a0875d05c6021/d33c961ddf145333(V1) with server4/193.167.100.100:443] 32.209 Closing ClientConnection[c48a0875d05c6021/d33c961ddf145333(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.209 -> Packet A|5|S0|774b47b62d0691e37f201d39cfb0919f|41|1 AckFrame[4-3,1|Δ0] 32.209 Creating connection with server4:443 with v1 32.209 -> Packet A|6|S0|774b47b62d0691e37f201d39cfb0919f|45|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1|Δ0] 32.210 Setting up connection for downloading https://server4:443/cazruetyya at 33:16.744 on ClientConnection[124437682c72d30d/1bc2546c2f157874(V1) with server4/193.167.100.100:443] 32.210 Original destination connection id: 124437682c72d30d (scid: 1bc2546c2f157874) >- CryptoStream[I|ClientHello] 32.211 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.411/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.211 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.240 <- (6) Packet A|5|S0|d33c961ddf145333|45|2 AckFrame[5-4|Δ0] Padding(14) 32.241 -> Packet A|7|S0|774b47b62d0691e37f201d39cfb0919f|45|2 ConnectionCloseFrame[0|0|] AckFrame[4-3,1|Δ0] 32.410 loss detection timeout handler running Sending probe 0, because no ack since 32.211. Current RTT: 100/25. 32.410 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.410 (Probe is an initial retransmit) 32.411 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.811/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.411 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.445 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ10] CryptoFrame[0,123] 32.445 probe count not reset on ack because handshake not yet confirmed 32.446 Retransmitting CryptoFrame[0,257] on level Initial 32.446 Cwnd(-): 6000; inflight: 0 32.446 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 32.846/Initial, because peerAwaitingAddressValidation | RTT:100/25 32.446 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 32.650/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.446 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 32.445 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 32.448 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 32.652/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.448 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 32.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 32.654/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.450 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 32.450 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 32.552/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.450 Discarding pn space Initial because first Handshake message is being sent 32.450 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 32.450 Starting downloading https://server4:443/cazruetyya at 33:16.985 on ClientConnection[124437682c72d30d/1bc2546c2f157874(V1) with server4/193.167.100.100:443] 32.451 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 32.553/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.451 -> Packet A|0|S0|5013fd4d9c2f26bd2fcae3557d624dc8|55|1 StreamFrame[0(CIB),0,17,fin] 32.479 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 32.552 loss detection timeout handler running Sending probe 0, because no ack since 32.450. Current RTT: 34/17. 32.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.552 (Probe is a handshake retransmit) 32.552 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 32.756/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.552 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 32.755 loss detection timeout handler running Sending probe 1, because no ack since 32.451. Current RTT: 34/17. 32.755 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 32.756 (Probe is a handshake retransmit) 32.756 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 33.164/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.756 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 32.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 33.165/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.757 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 33.164 loss detection timeout handler running Sending probe 2, because no ack since 32.451. Current RTT: 34/17. 33.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 33.164 (Probe is a handshake retransmit) 33.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 33.980/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 33.164 -> Packet PH|5|L|88|1 CryptoFrame[0,36] 33.165 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 815 millis, based on 33.981/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 33.165 -> Packet PH|6|L|88|1 CryptoFrame[0,36] 33.196 <- (3) Packet A|0|S0|1bc2546c2f157874|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|00979de501f1f9ca77dc2a30691ce7c2|9207176ecca74f166eb507240b5ae1f8] NewConnectionIdFrame[2,<1|395d8625084098c5f784b2b85fbeb334|87ddbca09c22c1e6fe57f5029b37ec8d] 33.197 State is set to Confirmed reschedule loss detection timer for PTO over 270 millis, based on 33.467/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -619 millis, based on 32.578/App, because ackElicitingInFlight | RTT:34/17 33.197 Discarding pn space Handshake because HandshakeDone is received 33.197 loss detection timeout handler running Sending probe 0, because no ack since 32.451. Current RTT: 34/17. 33.197 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 33.451/App, because ackElicitingInFlight | RTT:34/17 33.197 -> Packet A|1|S0|00979de501f1f9ca77dc2a30691ce7c2|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] reschedule loss detection timer for PTO over 253 millis, based on 33.451/App, because ackElicitingInFlight | RTT:34/17 33.197 -> Packet PA|2|S0|00979de501f1f9ca77dc2a30691ce7c2|55|1 StreamFrame[0(CIB),0,17,fin] 33.231 <- (4) Packet A|1|S0|1bc2546c2f157874|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] 33.231 Cwnd(-): 3000; inflight: 0 33.231 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.231 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 110 millis, based on 33.342/App, because ackElicitingInFlight | RTT:34/13 33.231 <- (5) Packet A|2|S0|1bc2546c2f157874|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 33.231 -> Packet A|3|S0|00979de501f1f9ca77dc2a30691ce7c2|55|1 StreamFrame[0(CIB),0,17,fin] 33.232 -> Packet A|4|S0|00979de501f1f9ca77dc2a30691ce7c2|39|1 AckFrame[2-1|Δ0] 33.232 Finished downloading https://server4:443/cazruetyya at 33:17.766 on ClientConnection[124437682c72d30d/1bc2546c2f157874(V1) with server4/193.167.100.100:443] 33.232 Closing ClientConnection[124437682c72d30d/1bc2546c2f157874(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.232 -> Packet A|5|S0|00979de501f1f9ca77dc2a30691ce7c2|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 33.232 Creating connection with server4:443 with v1 33.233 Setting up connection for downloading https://server4:443/xmskdaxcvg at 33:17.767 on ClientConnection[2ff85faf7ef26204/7b74c3c0f4ebcc84(V1) with server4/193.167.100.100:443] 33.233 Original destination connection id: 2ff85faf7ef26204 (scid: 7b74c3c0f4ebcc84) >- CryptoStream[I|ClientHello] 33.234 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.434/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.234 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.433 loss detection timeout handler running Sending probe 0, because no ack since 33.234. Current RTT: 100/25. 33.433 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 33.433 (Probe is an initial retransmit) 33.434 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 33.834/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.434 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.833 loss detection timeout handler running Sending probe 1, because no ack since 33.434. Current RTT: 100/25. 33.833 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 33.833 (Probe is an initial retransmit) 33.833 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 34.633/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.833 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.834 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 34.634/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.834 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.868 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[3,0|Δ2] Padding(1141) 33.868 probe count not reset on ack because handshake not yet confirmed 33.868 Cwnd(-): 6000; inflight: 1200 33.945 loss detection timeout handler running 33.945 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 34.333/Initial, because peerAwaitingAddressValidation | RTT:33/16 34.270 <- (2) Packet I|5|L|188|2 Token=[] AckFrame[3,0|Δ3212] CryptoFrame[0,123] 34.271 probe count not reset on ack because handshake not yet confirmed 34.271 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 34.659/Initial, because peerAwaitingAddressValidation | RTT:33/16 -< CryptoStream[I|ServerHello] 34.270 <- (2) Packet H|4|L|1012|2 CryptoFrame[0,686] Padding(272) 34.273 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 34.661/Handshake, because peerAwaitingAddressValidation | RTT:33/16 34.273 -> Packet I|4|L|1201|2 Token=[] AckFrame[5,1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 34.275 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 387 millis, based on 34.663/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.275 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 34.275 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.372/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.275 Discarding pn space Initial because first Handshake message is being sent 34.276 Starting downloading https://server4:443/xmskdaxcvg at 33:18.810 on ClientConnection[2ff85faf7ef26204/7b74c3c0f4ebcc84(V1) with server4/193.167.100.100:443] 34.275 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 34.276 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 96 millis, based on 34.373/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 34.276 -> Packet A|0|S0|fb6e1a8c91ee6094fb529ebe438479cf|55|1 StreamFrame[0(CIB),0,17,fin] 34.307 <- (3) Packet A|0|S0|7b74c3c0f4ebcc84|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|19cc8cd661319c3a5da4c8400fd6518b|53a89e03c34eafbeac70663d733cf40d] NewConnectionIdFrame[2,<1|94a0056e203126fdccde9ac04f81c43e|c0a964efa318ebf9c8258ee5aa1f47d1] 34.307 State is set to Confirmed reschedule loss detection timer for PTO over 64 millis, based on 34.372/Handshake, because ackElicitingInFlight | RTT:33/16 reschedule loss detection timer for PTO over 90 millis, based on 34.398/App, because ackElicitingInFlight | RTT:33/16 34.307 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 121 millis, based on 34.430/App, because ackElicitingInFlight | RTT:33/16 34.308 -> Packet A|1|S0|19cc8cd661319c3a5da4c8400fd6518b|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 34.364 <- (4) Packet A|1|S0|7b74c3c0f4ebcc84|45|2 AckFrame[1|Δ25] Padding(13) 34.365 Cwnd(-): 3000; inflight: 0 34.365 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 34.365 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 132 millis, based on 34.498/App, because ackElicitingInFlight | RTT:36/18 34.365 -> Packet A|2|S0|19cc8cd661319c3a5da4c8400fd6518b|55|1 StreamFrame[0(CIB),0,17,fin] 34.397 <- (5) Packet A|2|S0|7b74c3c0f4ebcc84|1060|2 AckFrame[2-1|Δ0] StreamFrame[0(CIB),0,1024] 34.398 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 34.417 -> Packet A|3|S0|19cc8cd661319c3a5da4c8400fd6518b|40|1 AckFrame[2-1|Δ19] 34.763 <- (6) Packet A|9|S0|7b74c3c0f4ebcc84|45|3 AckFrame[3|Δ314] PingFrame[] Padding(10) 34.763 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 34.783 -> Packet A|4|S0|19cc8cd661319c3a5da4c8400fd6518b|40|1 AckFrame[9|Δ19] 34.934 <- (7) Packet A|16|S0|7b74c3c0f4ebcc84|45|3 AckFrame[4-3|Δ120] PingFrame[] Padding(12) 34.935 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 34.954 -> Packet A|5|S0|19cc8cd661319c3a5da4c8400fd6518b|40|1 AckFrame[16|Δ19] 34.986 <- (8) Packet A|17|S0|7b74c3c0f4ebcc84|45|3 AckFrame[5|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 34.986 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 34.986 Finished downloading https://server4:443/xmskdaxcvg at 33:19.521 on ClientConnection[2ff85faf7ef26204/7b74c3c0f4ebcc84(V1) with server4/193.167.100.100:443] 34.986 Closing ClientConnection[2ff85faf7ef26204/7b74c3c0f4ebcc84(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 34.987 -> Packet A|6|S0|19cc8cd661319c3a5da4c8400fd6518b|43|2 ConnectionCloseFrame[0|0|] AckFrame[17|Δ0] 34.987 Creating connection with server4:443 with v1 34.987 Setting up connection for downloading https://server4:443/mwvhrrunrr at 33:19.522 on ClientConnection[f98e9a6df8c1b365/e12000f1696760d6(V1) with server4/193.167.100.100:443] 34.987 Original destination connection id: f98e9a6df8c1b365 (scid: e12000f1696760d6) >- CryptoStream[I|ClientHello] 34.989 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 35.189/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.988 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.188 loss detection timeout handler running Sending probe 0, because no ack since 34.988. Current RTT: 100/25. 35.188 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 35.188 (Probe is an initial retransmit) 35.188 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 35.588/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.188 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.587 loss detection timeout handler running Sending probe 1, because no ack since 35.188. Current RTT: 100/25. 35.587 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 35.587 (Probe is an initial retransmit) 35.588 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 36.388/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.588 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.589 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 36.389/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.589 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.224 <- (1) Packet I|5|L|186|2 Token=[] AckFrame[2-1|Δ4813] CryptoFrame[0,123] 36.224 probe count not reset on ack because handshake not yet confirmed 36.224 Retransmitting CryptoFrame[0,257] on level Initial 36.224 Cwnd(-): 6000; inflight: 1200 36.224 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 37.024/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.225 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 7631 millis, based on 43.857/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:636/318 36.224 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 36.224 <- (1) Packet H|4|L|1014|2 CryptoFrame[0,686] Padding(274) 36.227 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 7631 millis, based on 43.859/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:636/318 36.226 -> Packet I|5|L|1201|2 Token=[] AckFrame[5|Δ0] Padding(1145) >- CryptoStream[H|Finished] 36.229 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 7631 millis, based on 43.861/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:636/318 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 36.229 -> Packet H|0|L|88|1 CryptoFrame[0,36] 36.229 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1907 millis, based on 38.137/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:636/318 36.229 Discarding pn space Initial because first Handshake message is being sent 36.229 Starting downloading https://server4:443/mwvhrrunrr at 33:20.764 on ClientConnection[f98e9a6df8c1b365/e12000f1696760d6(V1) with server4/193.167.100.100:443] 36.229 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 36.230 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 1907 millis, based on 38.138/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:636/318 36.230 -> Packet A|0|S0|e80743afaa958ea042f5e883e30215d6|55|1 StreamFrame[0(CIB),0,17,fin] 36.258 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 36.397 <- (3) Packet A|2|S0|e12000f1696760d6|45|2 HandshakeDoneFrame[] Padding(18) 36.397 State is set to Confirmed reschedule loss detection timer for PTO over 1739 millis, based on 38.137/Handshake, because ackElicitingInFlight | RTT:636/318 reschedule loss detection timer for PTO over 1765 millis, based on 38.163/App, because ackElicitingInFlight | RTT:636/318 36.398 Discarding pn space Handshake because HandshakeDone is received 36.397 <- (4) Packet A|4|S0|e12000f1696760d6|45|2 HandshakeDoneFrame[] Padding(18) 36.398 -> Packet A|1|S0|e80743afaa958ea042f5e883e30215d6|41|1 AckFrame[4,2|Δ0] 36.670 <- (5) Packet A|6|S0|e12000f1696760d6|45|2 HandshakeDoneFrame[] Padding(18) 36.670 <- (6) Packet A|8|S0|e12000f1696760d6|45|2 HandshakeDoneFrame[] Padding(18) 36.670 -> Packet A|2|S0|e80743afaa958ea042f5e883e30215d6|45|1 AckFrame[8,6,4,2|Δ0] 37.215 <- (7) Packet A|12|S0|e12000f1696760d6|45|2 HandshakeDoneFrame[] Padding(18) 37.235 -> Packet A|3|S0|e80743afaa958ea042f5e883e30215d6|48|1 AckFrame[12,8,6,4,2|Δ19] 37.266 <- (8) Packet A|13|S0|e12000f1696760d6|104|3 AckFrame[3|Δ0] NewConnectionIdFrame[1,<1|56efc89070712721e35497be4b454795|c339c293f8ee67c5ff5941ddeda65c24] NewConnectionIdFrame[2,<1|ad721d8b2a04c8a89333d490d1ced11e|2ad510c917f87acbd260e2f7c8367fa7] 37.267 Cwnd(-): 3000; inflight: 0 37.267 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 37.267 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 1932 millis, based on 39.200/App, because ackElicitingInFlight | RTT:636/318 37.267 -> Packet A|4|S0|e80743afaa958ea042f5e883e30215d6|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 1932 millis, based on 39.200/App, because ackElicitingInFlight | RTT:636/318 37.267 -> Packet A|5|S0|56efc89070712721e35497be4b454795|41|2 RetireConnectionIdFrame[0] AckFrame[13|Δ0] 37.300 <- (9) Packet A|14|S0|e12000f1696760d6|1060|2 AckFrame[5-4|Δ0] StreamFrame[0(CIB),0,1024] 37.300 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 37.300 <- (10) Packet A|15|S0|e12000f1696760d6|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 37.301 Finished downloading https://server4:443/mwvhrrunrr at 33:21.835 on ClientConnection[f98e9a6df8c1b365/e12000f1696760d6(V1) with server4/193.167.100.100:443] 37.301 Closing ClientConnection[f98e9a6df8c1b365/e12000f1696760d6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 37.301 -> Packet A|6|S0|56efc89070712721e35497be4b454795|39|1 AckFrame[15-14|Δ0] 37.301 -> Packet A|7|S0|56efc89070712721e35497be4b454795|43|2 ConnectionCloseFrame[0|0|] AckFrame[15-14|Δ0] 37.302 Creating connection with server4:443 with v1 37.302 Setting up connection for downloading https://server4:443/kdeksepyoa at 33:21.837 on ClientConnection[5c83b510e4536699/990077bee944d748(V1) with server4/193.167.100.100:443] 37.302 Original destination connection id: 5c83b510e4536699 (scid: 990077bee944d748) >- CryptoStream[I|ClientHello] 37.303 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 37.503/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.303 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.332 <- (11) Packet A|16|S0|e12000f1696760d6|45|2 AckFrame[6|Δ0] Padding(14) 37.333 -> Packet A|8|S0|56efc89070712721e35497be4b454795|43|2 ConnectionCloseFrame[0|0|] AckFrame[15-14|Δ0] 37.338 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 37.338 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 37.538/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 37.338 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 37.341 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 37.443/Handshake, because peerAwaitingAddressValidation | RTT:34/17 37.341 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 37.343 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 37.445/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 37.343 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 37.344 Starting downloading https://server4:443/kdeksepyoa at 33:21.878 on ClientConnection[5c83b510e4536699/990077bee944d748(V1) with server4/193.167.100.100:443] 37.344 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 37.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 37.446/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 37.344 Discarding pn space Initial because first Handshake message is being sent 37.344 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 37.446/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 37.344 -> Packet A|0|S0|279a95086ec1677df8ff7d972df7b72b|55|1 StreamFrame[0(CIB),0,17,fin] 37.375 <- (2) Packet A|0|S0|990077bee944d748|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|a7c765ef4579b9cd290e408b46e49836|b0092c3f09a0d660c71364b06beab606] NewConnectionIdFrame[2,<1|4287c798ab806855b02b6266dbd74231|6327c57e5af81b9bde560ec87ea46ca7] 37.376 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 37.445/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 37.471/App, because ackElicitingInFlight | RTT:34/17 37.376 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 37.503/App, because ackElicitingInFlight | RTT:34/17 37.376 -> Packet A|1|S0|a7c765ef4579b9cd290e408b46e49836|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 37.377 <- (3) Packet A|2|S0|990077bee944d748|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 37.395 -> Packet A|2|S0|a7c765ef4579b9cd290e408b46e49836|42|1 AckFrame[2,0|Δ18] 37.502 loss detection timeout handler running Sending probe 0, because no ack since 37.376. Current RTT: 34/17. 37.502 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 37.757/App, because ackElicitingInFlight | RTT:34/17 37.503 -> Packet PA|3|S0|a7c765ef4579b9cd290e408b46e49836|55|1 StreamFrame[0(CIB),0,17,fin] 37.553 <- (4) Packet A|5|S0|990077bee944d748|45|3 AckFrame[2-0|Δ126] PingFrame[] Padding(12) reschedule loss detection timer for PTO over 76 millis, based on 37.630/App, because ackElicitingInFlight | RTT:34/17 37.553 <- (5) Packet A|7|S0|990077bee944d748|45|3 AckFrame[2-0|Δ126] PingFrame[] Padding(12) reschedule loss detection timer for PTO over 75 millis, based on 37.630/App, because ackElicitingInFlight | RTT:34/17 37.554 -> Packet A|4|S0|a7c765ef4579b9cd290e408b46e49836|41|1 AckFrame[7,5|Δ0] 37.586 <- (6) Packet A|8|S0|990077bee944d748|1059|2 AckFrame[4|Δ0] StreamFrame[0(CIB),0,1024,fin] 37.586 Cwnd(-): 6000; inflight: 0 37.586 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 37.587 Finished downloading https://server4:443/kdeksepyoa at 33:22.121 on ClientConnection[5c83b510e4536699/990077bee944d748(V1) with server4/193.167.100.100:443] 37.587 Closing ClientConnection[5c83b510e4536699/990077bee944d748(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 37.587 -> Packet A|5|S0|a7c765ef4579b9cd290e408b46e49836|43|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 37.587 Creating connection with server4:443 with v1 37.588 Setting up connection for downloading https://server4:443/izjjdkihyn at 33:22.122 on ClientConnection[051177e766f8cabe/a6e6cf1c5792660a(V1) with server4/193.167.100.100:443] 37.588 Original destination connection id: 051177e766f8cabe (scid: a6e6cf1c5792660a) >- CryptoStream[I|ClientHello] 37.589 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 37.789/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.589 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.788 loss detection timeout handler running Sending probe 0, because no ack since 37.589. Current RTT: 100/25. 37.788 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 37.788 (Probe is an initial retransmit) 37.789 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 38.189/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.789 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.822 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[1-0|Δ2] Padding(1143) 37.823 probe count not reset on ack because handshake not yet confirmed 37.823 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 38.223/Initial, because peerAwaitingAddressValidation | RTT:100/25 38.222 loss detection timeout handler running Sending probe 1, because no ack since 37.789. Current RTT: 33/16. 38.222 Sending probe because peer awaiting address validation 38.222 (Probe is Initial ping, because there is no Initial data to retransmit) 38.222 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 38.610/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 38.222 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 38.256 <- (2) Packet I|2|L|1200|2 Token=[] AckFrame[2-0|Δ2] Padding(1143) 38.256 probe count not reset on ack because handshake not yet confirmed 38.256 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 38.644/Initial, because peerAwaitingAddressValidation | RTT:33/16 38.624 <- (3) Packet I|4|L|186|2 Token=[] AckFrame[2-0|Δ2949] CryptoFrame[0,123] 38.625 probe count not reset on ack because handshake not yet confirmed 38.625 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 323 millis, based on 38.949/Initial, because peerAwaitingAddressValidation | RTT:33/12 -< CryptoStream[I|ServerHello] 38.624 <- (3) Packet H|2|L|1014|2 CryptoFrame[0,686] Padding(274) 38.627 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 323 millis, based on 38.951/Handshake, because peerAwaitingAddressValidation | RTT:33/12 38.627 -> Packet I|3|L|1201|2 Token=[] AckFrame[4,2-1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 38.630 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 323 millis, based on 38.954/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 38.629 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 38.630 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 38.630 Starting downloading https://server4:443/izjjdkihyn at 33:23.164 on ClientConnection[051177e766f8cabe/a6e6cf1c5792660a(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 80 millis, based on 38.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 38.630 Discarding pn space Initial because first Handshake message is being sent 38.630 -> Packet H|1|L|54|1 AckFrame[2|Δ0] 38.630 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 38.630 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 38.711/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 38.630 -> Packet A|0|S0|4ae5811d51d12839920d057852b96a16|55|1 StreamFrame[0(CIB),0,17,fin] 38.710 loss detection timeout handler running Sending probe 0, because no ack since 38.629. Current RTT: 33/12. 38.710 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 38.710 (Probe is a handshake retransmit) 38.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 161 millis, based on 38.873/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 38.711 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 38.798 <- (5) Packet A|2|S0|a6e6cf1c5792660a|45|2 HandshakeDoneFrame[] Padding(18) 38.798 State is set to Confirmed reschedule loss detection timer for PTO over 44 millis, based on 38.842/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over -61 millis, based on 38.736/App, because ackElicitingInFlight | RTT:33/12 38.798 Discarding pn space Handshake because HandshakeDone is received 38.798 loss detection timeout handler running Sending probe 0, because no ack since 38.630. Current RTT: 33/12. 38.798 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 211 millis, based on 39.010/App, because ackElicitingInFlight | RTT:33/12 38.798 -> Packet PA|1|S0|4ae5811d51d12839920d057852b96a16|55|1 StreamFrame[0(CIB),0,17,fin] 38.818 -> Packet A|2|S0|4ae5811d51d12839920d057852b96a16|40|1 AckFrame[2|Δ19] 38.831 <- (6) Packet A|5|S0|a6e6cf1c5792660a|1061|3 AckFrame[1|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 38.832 Cwnd(-): 6000; inflight: 0 38.832 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 38.832 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 93 millis, based on 38.926/App, because ackElicitingInFlight | RTT:33/9 38.832 -> Packet A|3|S0|4ae5811d51d12839920d057852b96a16|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[2|Δ0] 38.851 -> Packet A|4|S0|4ae5811d51d12839920d057852b96a16|42|1 AckFrame[5,2|Δ19] 38.925 loss detection timeout handler running Sending probe 0, because no ack since 38.832. Current RTT: 33/9. 38.925 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 187 millis, based on 39.113/App, because ackElicitingInFlight | RTT:33/9 38.925 -> Packet PA|5|S0|4ae5811d51d12839920d057852b96a16|55|1 StreamFrame[0(CIB),0,17,fin] 39.014 <- (7) Packet A|11|S0|a6e6cf1c5792660a|45|3 AckFrame[3,1|Δ150] HandshakeDoneFrame[] Padding(8) reschedule loss detection timer for PTO over 5 millis, based on 39.019/App, because ackElicitingInFlight | RTT:33/9 39.019 loss detection timeout handler running Sending probe 0, because no ack since 38.925. Current RTT: 48/38. 39.019 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 39.469/App, because ackElicitingInFlight | RTT:48/38 39.019 -> Packet PA|6|S0|4ae5811d51d12839920d057852b96a16|55|1 StreamFrame[0(CIB),0,17,fin] 39.034 -> Packet A|7|S0|4ae5811d51d12839920d057852b96a16|42|1 AckFrame[11,5|Δ19] 39.051 <- (8) Packet A|12|S0|a6e6cf1c5792660a|45|3 AckFrame[6,3,1|Δ0] HandshakeDoneFrame[] Padding(9) 39.070 -> Packet A|8|S0|4ae5811d51d12839920d057852b96a16|42|1 AckFrame[12-11,5|Δ19] 39.100 loss detection timeout handler running 39.100 Cwnd(-): 3000; inflight: 0 39.100 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 39.206 <- (9) Packet A|15|S0|a6e6cf1c5792660a|45|3 AckFrame[7-6,3|Δ140] HandshakeDoneFrame[] Padding(8) 39.206 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 39.206 <- (10) Packet A|17|S0|a6e6cf1c5792660a|45|3 AckFrame[7-6,3|Δ140] HandshakeDoneFrame[] Padding(8) 39.207 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 39.207 -> Packet A|9|S0|4ae5811d51d12839920d057852b96a16|43|1 AckFrame[17,15,12|Δ0] 39.368 <- (11) Packet A|20|S0|a6e6cf1c5792660a|45|3 AckFrame[9|Δ130] PingFrame[] Padding(12) 39.369 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 39.368 <- (12) Packet A|22|S0|a6e6cf1c5792660a|45|3 AckFrame[9|Δ130] PingFrame[] Padding(12) 39.369 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 39.369 -> Packet A|10|S0|4ae5811d51d12839920d057852b96a16|41|1 AckFrame[22,20|Δ0] 39.400 <- (13) Packet A|23|S0|a6e6cf1c5792660a|108|4 AckFrame[10|Δ0] NewConnectionIdFrame[1,<1|48aa0a5a15b6607b54c8b3d43c134f13|c2cf1cb344d73aeb8c4e86bbf60f0b4d] NewConnectionIdFrame[2,<1|db40d0f674c444bf4d829e3e39526b5b|d4b26743c8966aaa5dd5a1545c4a24e8] StreamFrame[0(CIB),1024,0,fin] 39.401 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 202 millis, based on 39.604/App, because ackElicitingInFlight | RTT:46/33 39.401 Finished downloading https://server4:443/izjjdkihyn at 33:23.936 on ClientConnection[051177e766f8cabe/a6e6cf1c5792660a(V1) with server4/193.167.100.100:443] 39.401 -> Packet A|11|S0|48aa0a5a15b6607b54c8b3d43c134f13|41|2 RetireConnectionIdFrame[0] AckFrame[23|Δ0] 39.401 Closing ClientConnection[051177e766f8cabe/a6e6cf1c5792660a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 39.402 -> Packet A|12|S0|48aa0a5a15b6607b54c8b3d43c134f13|43|2 ConnectionCloseFrame[0|0|] AckFrame[23|Δ0] 39.402 Creating connection with server4:443 with v1 39.402 Setting up connection for downloading https://server4:443/evicstnard at 33:23.937 on ClientConnection[ff3876aec1ccf978/8d3e670fa6e7a0e0(V1) with server4/193.167.100.100:443] 39.402 Original destination connection id: ff3876aec1ccf978 (scid: 8d3e670fa6e7a0e0) >- CryptoStream[I|ClientHello] 39.403 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 39.603/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.403 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.603 loss detection timeout handler running Sending probe 0, because no ack since 39.403. Current RTT: 100/25. 39.603 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 39.603 (Probe is an initial retransmit) 39.603 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 40.003/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.603 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.002 loss detection timeout handler running Sending probe 1, because no ack since 39.603. Current RTT: 100/25. 40.002 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 40.002 (Probe is an initial retransmit) 40.003 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 40.803/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.003 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.004 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 40.804/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.004 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.037 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[2|Δ10] CryptoFrame[0,123] 40.038 probe count not reset on ack because handshake not yet confirmed 40.038 Retransmitting CryptoFrame[0,257] on level Initial 40.038 Cwnd(-): 6000; inflight: 1200 40.038 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 40.838/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.038 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 40.446/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 40.038 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 40.037 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 40.041 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 40.449/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 40.040 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 40.043 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 40.451/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 40.042 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 40.043 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 40.145/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 40.043 Discarding pn space Initial because first Handshake message is being sent 40.043 Starting downloading https://server4:443/evicstnard at 33:24.577 on ClientConnection[ff3876aec1ccf978/8d3e670fa6e7a0e0(V1) with server4/193.167.100.100:443] 40.043 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 40.145/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 40.043 -> [Packet H|1|L|54|1 AckFrame[0|Δ0], Packet A|0|S0|5a1c54dde4201c1124e386c7440db1e3|55|1 StreamFrame[0(CIB),0,17,fin]] 40.071 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 40.074 <- (3) Packet A|0|S0|8d3e670fa6e7a0e0|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|b54f1b35b435ad08a87fa87a6735b93c|7e4883b4fa4cc12ba24f3075e9236243] NewConnectionIdFrame[2,<1|9f854e57973125a77acf406972975c69|89172d71489b9d00d821ff847b310d43] 40.075 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 40.144/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 40.170/App, because ackElicitingInFlight | RTT:34/17 40.075 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 40.202/App, because ackElicitingInFlight | RTT:34/17 40.075 -> Packet A|1|S0|b54f1b35b435ad08a87fa87a6735b93c|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 40.076 <- (4) Packet A|1|S0|8d3e670fa6e7a0e0|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 40.202/App, because ackElicitingInFlight | RTT:34/17 40.095 -> Packet A|2|S0|b54f1b35b435ad08a87fa87a6735b93c|40|1 AckFrame[1-0|Δ18] 40.201 loss detection timeout handler running Sending probe 0, because no ack since 40.075. Current RTT: 34/13. 40.201 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 40.424/App, because ackElicitingInFlight | RTT:34/13 40.202 -> Packet PA|3|S0|b54f1b35b435ad08a87fa87a6735b93c|37|2 RetireConnectionIdFrame[0] Padding(1) 40.207 <- (5) Packet A|4|S0|8d3e670fa6e7a0e0|45|3 AckFrame[2|Δ80] PingFrame[] Padding(12) 40.207 Cwnd(-): 3000; inflight: 37 reschedule loss detection timer for PTO over 105 millis, based on 40.313/App, because ackElicitingInFlight | RTT:34/13 reschedule loss detection timer for PTO over 110 millis, based on 40.318/App, because ackElicitingInFlight | RTT:34/13 40.207 -> Packet A|4|S0|b54f1b35b435ad08a87fa87a6735b93c|37|2 RetireConnectionIdFrame[0] Padding(1) 40.226 -> Packet A|5|S0|b54f1b35b435ad08a87fa87a6735b93c|40|1 AckFrame[4|Δ19] 40.258 <- (6) Packet A|7|S0|8d3e670fa6e7a0e0|45|3 AckFrame[5-3|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 40.258 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 40.259 Finished downloading https://server4:443/evicstnard at 33:24.793 on ClientConnection[ff3876aec1ccf978/8d3e670fa6e7a0e0(V1) with server4/193.167.100.100:443] 40.259 Closing ClientConnection[ff3876aec1ccf978/8d3e670fa6e7a0e0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 40.259 -> Packet A|6|S0|b54f1b35b435ad08a87fa87a6735b93c|43|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0] 40.259 Creating connection with server4:443 with v1 40.260 Setting up connection for downloading https://server4:443/ynoyeoyytz at 33:24.794 on ClientConnection[55995c1688424a24/92e09d64e73c56c6(V1) with server4/193.167.100.100:443] 40.260 Original destination connection id: 55995c1688424a24 (scid: 92e09d64e73c56c6) >- CryptoStream[I|ClientHello] 40.261 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.461/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.261 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.295 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 40.296 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.496/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 40.295 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 40.298 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 40.400/Handshake, because peerAwaitingAddressValidation | RTT:34/17 40.298 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 40.300 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 40.402/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 40.300 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 40.301 Starting downloading https://server4:443/ynoyeoyytz at 33:24.835 on ClientConnection[55995c1688424a24/92e09d64e73c56c6(V1) with server4/193.167.100.100:443] 40.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 40.403/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 40.301 Discarding pn space Initial because first Handshake message is being sent 40.301 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 40.301 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 40.403/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 40.301 -> Packet A|0|S0|d1611288d392b6c7b0693331a0122ff7|55|1 StreamFrame[0(CIB),0,17,fin] 40.332 <- (2) Packet A|0|S0|92e09d64e73c56c6|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|453be80e2e72d99a5c77b058be5c60a8|4d47e8c05ebace7993931a83b7fd8087] NewConnectionIdFrame[2,<1|240d7c14c2f14ee287cda8f9fe95da3c|831d3f31328765726796bec5e0e7ccbd] 40.332 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 40.402/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 40.428/App, because ackElicitingInFlight | RTT:34/17 40.333 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 40.460/App, because ackElicitingInFlight | RTT:34/17 40.333 -> Packet A|1|S0|453be80e2e72d99a5c77b058be5c60a8|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 40.334 <- (3) Packet A|1|S0|92e09d64e73c56c6|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 40.460/App, because ackElicitingInFlight | RTT:34/17 40.334 <- (4) Packet A|2|S0|92e09d64e73c56c6|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 40.335 Finished downloading https://server4:443/ynoyeoyytz at 33:24.869 on ClientConnection[55995c1688424a24/92e09d64e73c56c6(V1) with server4/193.167.100.100:443] 40.335 -> Packet A|2|S0|453be80e2e72d99a5c77b058be5c60a8|39|1 AckFrame[2-0|Δ0] 40.335 Closing ClientConnection[55995c1688424a24/92e09d64e73c56c6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 40.335 -> Packet A|3|S0|453be80e2e72d99a5c77b058be5c60a8|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 40.335 Creating connection with server4:443 with v1 40.336 Setting up connection for downloading https://server4:443/wnpbwwnfxh at 33:24.870 on ClientConnection[4afe512a8fa6edc4/541f967a5738c357(V1) with server4/193.167.100.100:443] 40.336 Original destination connection id: 4afe512a8fa6edc4 (scid: 541f967a5738c357) >- CryptoStream[I|ClientHello] 40.337 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.537/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.337 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.366 <- (5) Packet A|3|S0|92e09d64e73c56c6|45|2 AckFrame[2-1|Δ0] Padding(14) 40.366 -> Packet A|4|S0|453be80e2e72d99a5c77b058be5c60a8|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 40.536 loss detection timeout handler running Sending probe 0, because no ack since 40.337. Current RTT: 100/25. 40.536 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 40.536 (Probe is an initial retransmit) 40.537 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 40.937/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.537 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.570 <- (1) Packet I|1|L|1200|2 Token=[] AckFrame[1-0|Δ3] Padding(1143) 40.571 probe count not reset on ack because handshake not yet confirmed 40.571 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 40.971/Initial, because peerAwaitingAddressValidation | RTT:100/25 40.970 loss detection timeout handler running Sending probe 1, because no ack since 40.537. Current RTT: 33/16. 40.970 Sending probe because peer awaiting address validation 40.970 (Probe is Initial ping, because there is no Initial data to retransmit) 40.970 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 41.358/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 40.970 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1147) 41.004 <- (2) Packet I|2|L|1200|2 Token=[] AckFrame[2-0|Δ2] Padding(1143) 41.004 probe count not reset on ack because handshake not yet confirmed 41.004 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 41.392/Initial, because peerAwaitingAddressValidation | RTT:33/16 41.373 <- (3) Packet I|6|L|186|2 Token=[] AckFrame[2-0|Δ2941] CryptoFrame[0,123] 41.373 probe count not reset on ack because handshake not yet confirmed 41.373 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 323 millis, based on 41.697/Initial, because peerAwaitingAddressValidation | RTT:33/12 -< CryptoStream[I|ServerHello] 41.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 41.373 <- (3) Packet H|4|L|1014|2 CryptoFrame[0,685] Padding(275) reschedule loss detection timer for PTO over 323 millis, based on 41.700/Handshake, because peerAwaitingAddressValidation | RTT:33/12 41.376 -> Packet I|3|L|1201|2 Token=[] AckFrame[6,2-1|Δ0] Padding(1143) >- CryptoStream[H|Finished] 41.379 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 323 millis, based on 41.703/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 41.378 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 41.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 41.462/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 41.381 Discarding pn space Initial because first Handshake message is being sent 41.381 Starting downloading https://server4:443/wnpbwwnfxh at 33:25.915 on ClientConnection[4afe512a8fa6edc4/541f967a5738c357(V1) with server4/193.167.100.100:443] 41.381 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 41.381 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 80 millis, based on 41.462/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 41.381 -> Packet A|0|S0|61d01823de0084470b245920b8cd481b|55|1 StreamFrame[0(CIB),0,17,fin] 41.461 loss detection timeout handler running Sending probe 0, because no ack since 41.378. Current RTT: 33/12. 41.461 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 41.461 (Probe is a handshake retransmit) 41.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 161 millis, based on 41.624/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/12 41.462 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 41.550 <- (4) Packet A|4|S0|541f967a5738c357|45|2 HandshakeDoneFrame[] Padding(18) 41.550 State is set to Confirmed reschedule loss detection timer for PTO over 43 millis, based on 41.593/App, because ackElicitingInFlight | RTT:33/12 reschedule loss detection timer for PTO over -62 millis, based on 41.487/App, because ackElicitingInFlight | RTT:33/12 41.550 loss detection timeout handler running 41.550 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 41.381. Current RTT: 33/12. 41.550 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 211 millis, based on 41.762/App, because ackElicitingInFlight | RTT:33/12 41.550 -> Packet PA|1|S0|61d01823de0084470b245920b8cd481b|55|1 StreamFrame[0(CIB),0,17,fin] 41.570 -> Packet A|2|S0|61d01823de0084470b245920b8cd481b|40|1 AckFrame[4|Δ19] 41.583 <- (5) Packet A|5|S0|541f967a5738c357|1061|3 AckFrame[1|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 41.584 Cwnd(-): 6000; inflight: 0 41.584 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 41.584 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 41.583 <- (6) Packet A|6|S0|541f967a5738c357|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) reschedule loss detection timer for PTO over 93 millis, based on 41.678/App, because ackElicitingInFlight | RTT:33/9 41.584 -> Packet A|3|S0|61d01823de0084470b245920b8cd481b|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[4|Δ0] 41.584 Finished downloading https://server4:443/wnpbwwnfxh at 33:26.119 on ClientConnection[4afe512a8fa6edc4/541f967a5738c357(V1) with server4/193.167.100.100:443] 41.584 Closing ClientConnection[4afe512a8fa6edc4/541f967a5738c357(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 41.585 Creating connection with server4:443 with v1 41.585 -> Packet A|4|S0|61d01823de0084470b245920b8cd481b|43|2 ConnectionCloseFrame[0|0|] AckFrame[6-4|Δ0] 41.585 Setting up connection for downloading https://server4:443/pdaloirqsc at 33:26.120 on ClientConnection[05da6f062a472454/1fa631f867c7d8a7(V1) with server4/193.167.100.100:443] 41.585 Original destination connection id: 05da6f062a472454 (scid: 1fa631f867c7d8a7) >- CryptoStream[I|ClientHello] 41.587 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 41.787/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.587 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.601 <- (7) Packet A|7|S0|541f967a5738c357|105|4 AckFrame[2-1|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|86d71cd04ced14081bcfaddb2b8e4849|f186a1a89a2f921d42935a4278bdd1fc] NewConnectionIdFrame[2,<1|2793776418a3c5019505d2a8d4b770be|16b384158918fadedbf898099e994c04] 41.602 -> Packet A|5|S0|61d01823de0084470b245920b8cd481b|43|2 ConnectionCloseFrame[0|0|] AckFrame[6-4|Δ0] 41.786 loss detection timeout handler running Sending probe 0, because no ack since 41.587. Current RTT: 100/25. 41.786 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 41.786 (Probe is an initial retransmit) 41.787 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 42.187/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.786 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.821 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ11] CryptoFrame[0,123] 41.821 probe count not reset on ack because handshake not yet confirmed 41.821 Retransmitting CryptoFrame[0,257] on level Initial 41.822 Cwnd(-): 6000; inflight: 0 41.822 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 42.222/Initial, because peerAwaitingAddressValidation | RTT:100/25 41.822 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 42.026/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 41.822 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 41.821 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,684] Padding(278) 41.824 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 42.028/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 41.824 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 41.826 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 42.030/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 41.826 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 41.826 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 41.928/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 41.826 Discarding pn space Initial because first Handshake message is being sent 41.826 Starting downloading https://server4:443/pdaloirqsc at 33:26.361 on ClientConnection[05da6f062a472454/1fa631f867c7d8a7(V1) with server4/193.167.100.100:443] 41.826 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 41.827 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 41.929/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 41.827 -> Packet A|0|S0|5f9c4e61701eb8bc53539ff525f32ccd|55|1 StreamFrame[0(CIB),0,17,fin] 41.855 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 41.928 loss detection timeout handler running Sending probe 0, because no ack since 41.826. Current RTT: 34/17. 41.928 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 41.928 (Probe is a handshake retransmit) 41.928 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 42.132/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 41.928 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 42.131 loss detection timeout handler running Sending probe 1, because no ack since 41.827. Current RTT: 34/17. 42.131 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 42.131 (Probe is a handshake retransmit) 42.132 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 42.540/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.131 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 42.133 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 42.541/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.133 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 42.258 <- (3) Packet A|6|S0|1fa631f867c7d8a7|45|2 HandshakeDoneFrame[] Padding(18) 42.258 State is set to Confirmed reschedule loss detection timer for PTO over 76 millis, based on 42.335/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -304 millis, based on 41.954/App, because ackElicitingInFlight | RTT:34/17 42.258 Discarding pn space Handshake because HandshakeDone is received 42.258 loss detection timeout handler running Sending probe 0, because no ack since 41.827. Current RTT: 34/17. 42.258 (Probe is retransmit on level App) 42.258 <- (4) Packet A|8|S0|1fa631f867c7d8a7|45|2 HandshakeDoneFrame[] Padding(18) reschedule loss detection timer for PTO over 253 millis, based on 42.512/App, because ackElicitingInFlight | RTT:34/17 42.258 -> Packet PA|1|S0|5f9c4e61701eb8bc53539ff525f32ccd|55|1 StreamFrame[0(CIB),0,17,fin] 42.259 -> Packet A|2|S0|5f9c4e61701eb8bc53539ff525f32ccd|41|1 AckFrame[8,6|Δ0] 42.409 <- (5) Packet A|11|S0|1fa631f867c7d8a7|45|3 AckFrame[2|Δ119] PingFrame[] Padding(12) 42.409 Cwnd(-): 3000; inflight: 0 42.409 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 42.409 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 126 millis, based on 42.536/App, because ackElicitingInFlight | RTT:34/17 42.409 -> Packet A|3|S0|5f9c4e61701eb8bc53539ff525f32ccd|55|1 StreamFrame[0(CIB),0,17,fin] 42.429 -> Packet A|4|S0|5f9c4e61701eb8bc53539ff525f32ccd|40|1 AckFrame[11|Δ19] 42.460 <- (6) Packet A|14|S0|1fa631f867c7d8a7|105|3 AckFrame[4,2|Δ0] NewConnectionIdFrame[1,<1|fa172d3b426daf5ebf0165aa8fd74825|a6e23de2c3c15b417a1ceb191ab1fb79] NewConnectionIdFrame[2,<1|dcf569275023476125127c0130ef9332|b02498ee18dc92a45fff0fe0b3a2f3b4] 42.460 Cwnd(-): 2400; inflight: 0 42.461 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 42.461 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 126 millis, based on 42.588/App, because ackElicitingInFlight | RTT:34/17 42.461 -> Packet A|5|S0|5f9c4e61701eb8bc53539ff525f32ccd|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 126 millis, based on 42.588/App, because ackElicitingInFlight | RTT:34/17 42.461 -> Packet A|6|S0|fa172d3b426daf5ebf0165aa8fd74825|41|2 RetireConnectionIdFrame[0] AckFrame[14|Δ0] 42.519 <- (7) Packet A|15|S0|1fa631f867c7d8a7|45|2 AckFrame[6|Δ26] Padding(13) 42.519 Cwnd(-): 2400; inflight: 0 42.519 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 42.519 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 137 millis, based on 42.657/App, because ackElicitingInFlight | RTT:37/19 42.519 -> Packet A|7|S0|fa172d3b426daf5ebf0165aa8fd74825|55|1 StreamFrame[0(CIB),0,17,fin] 42.552 <- (8) Packet A|16|S0|1fa631f867c7d8a7|1060|2 AckFrame[7-6|Δ0] StreamFrame[0(CIB),0,1024] 42.553 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 42.552 <- (9) Packet A|17|S0|1fa631f867c7d8a7|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 42.553 -> Packet A|8|S0|fa172d3b426daf5ebf0165aa8fd74825|39|1 AckFrame[17-15|Δ0] 42.553 Finished downloading https://server4:443/pdaloirqsc at 33:27.088 on ClientConnection[05da6f062a472454/1fa631f867c7d8a7(V1) with server4/193.167.100.100:443] 42.553 Closing ClientConnection[05da6f062a472454/1fa631f867c7d8a7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 42.553 -> Packet A|9|S0|fa172d3b426daf5ebf0165aa8fd74825|43|2 ConnectionCloseFrame[0|0|] AckFrame[17-15|Δ0] 42.554 Creating connection with server4:443 with v1 42.555 Setting up connection for downloading https://server4:443/rwxqbbuwuf at 33:27.089 on ClientConnection[d82457b3994e50c1/db7cb445c33fab40(V1) with server4/193.167.100.100:443] 42.555 Original destination connection id: d82457b3994e50c1 (scid: db7cb445c33fab40) >- CryptoStream[I|ClientHello] 42.556 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 42.756/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.556 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.590 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 42.590 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 42.791/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 42.590 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 42.593 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 42.695/Handshake, because peerAwaitingAddressValidation | RTT:34/17 42.592 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 42.595 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 42.697/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.595 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 42.595 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 42.595 Starting downloading https://server4:443/rwxqbbuwuf at 33:27.129 on ClientConnection[d82457b3994e50c1/db7cb445c33fab40(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 42.697/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.595 Discarding pn space Initial because first Handshake message is being sent 42.595 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 42.595 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 42.697/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.595 -> Packet A|0|S0|c5fecea1852218f4fe9e3c10b819e426|55|1 StreamFrame[0(CIB),0,17,fin] 42.629 <- (2) Packet A|1|S0|db7cb445c33fab40|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 42.630 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 42.732/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.630 State is set to Confirmed reschedule loss detection timer for PTO over 50 millis, based on 42.681/Handshake, because ackElicitingInFlight | RTT:34/13 42.630 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 42.630 Discarding pn space Handshake because HandshakeDone is received 42.629 <- (3) Packet A|2|S0|db7cb445c33fab40|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 42.631 Finished downloading https://server4:443/rwxqbbuwuf at 33:27.165 on ClientConnection[d82457b3994e50c1/db7cb445c33fab40(V1) with server4/193.167.100.100:443] 42.631 Closing ClientConnection[d82457b3994e50c1/db7cb445c33fab40(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 42.631 -> Packet A|1|S0|c5fecea1852218f4fe9e3c10b819e426|39|1 AckFrame[2-1|Δ0] 42.631 -> Packet A|2|S0|c5fecea1852218f4fe9e3c10b819e426|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-1|Δ0] 42.631 Creating connection with server4:443 with v1 42.632 Setting up connection for downloading https://server4:443/nqdvhniffx at 33:27.167 on ClientConnection[21c1deced8d62dba/82f967af906a9349(V1) with server4/193.167.100.100:443] 42.632 Original destination connection id: 21c1deced8d62dba (scid: 82f967af906a9349) >- CryptoStream[I|ClientHello] 42.633 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 42.833/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.633 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.833 loss detection timeout handler running Sending probe 0, because no ack since 42.633. Current RTT: 100/25. 42.833 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 42.833 (Probe is an initial retransmit) 42.833 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 43.233/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.833 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.867 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ9] CryptoFrame[0,123] 42.868 probe count not reset on ack because handshake not yet confirmed 42.868 Retransmitting CryptoFrame[0,257] on level Initial 42.868 Cwnd(-): 6000; inflight: 0 42.868 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 43.268/Initial, because peerAwaitingAddressValidation | RTT:100/25 42.868 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 43.072/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.868 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 42.867 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 42.871 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 43.075/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.871 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 42.873 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 43.077/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.873 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 42.873 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 42.975/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.873 Discarding pn space Initial because first Handshake message is being sent 42.873 Starting downloading https://server4:443/nqdvhniffx at 33:27.408 on ClientConnection[21c1deced8d62dba/82f967af906a9349(V1) with server4/193.167.100.100:443] 42.874 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 42.976/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.874 -> [Packet H|1|L|54|1 AckFrame[0|Δ0], Packet A|0|S0|83b0892d84f752187b69230bd4bc4ad1|55|1 StreamFrame[0(CIB),0,17,fin]] 42.901 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 42.975 loss detection timeout handler running Sending probe 0, because no ack since 42.873. Current RTT: 34/17. 42.975 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 42.975 (Probe is a handshake retransmit) 42.975 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 43.179/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.975 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 43.040 <- (3) Packet A|2|S0|82f967af906a9349|45|2 HandshakeDoneFrame[] Padding(18) 43.040 State is set to Confirmed reschedule loss detection timer for PTO over 87 millis, based on 43.128/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -39 millis, based on 43.001/App, because ackElicitingInFlight | RTT:34/17 43.041 loss detection timeout handler running 43.041 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 42.874. Current RTT: 34/17. 43.041 (Probe is retransmit on level App) 43.040 <- (4) Packet A|4|S0|82f967af906a9349|45|2 HandshakeDoneFrame[] Padding(18) reschedule loss detection timer for PTO over 253 millis, based on 43.295/App, because ackElicitingInFlight | RTT:34/17 43.041 -> Packet PA|1|S0|83b0892d84f752187b69230bd4bc4ad1|55|1 StreamFrame[0(CIB),0,17,fin] 43.041 -> Packet A|2|S0|83b0892d84f752187b69230bd4bc4ad1|41|1 AckFrame[4,2|Δ0] 43.073 <- (5) Packet A|5|S0|82f967af906a9349|103|3 AckFrame[2-1|Δ0] NewConnectionIdFrame[1,<1|47d2a5891c8c135512dc7b3a8d73ee45|ee078fc17114b8ebe731d683e7f9bcdf] NewConnectionIdFrame[2,<1|b01cb92589d3451e77f9ad52ef7f478c|0442b3e381cdf87450bde4498526d050] 43.073 Cwnd(-): 3000; inflight: 0 43.073 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 43.073 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 126 millis, based on 43.200/App, because ackElicitingInFlight | RTT:34/17 43.073 -> Packet A|3|S0|83b0892d84f752187b69230bd4bc4ad1|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 126 millis, based on 43.200/App, because ackElicitingInFlight | RTT:34/17 43.073 -> Packet A|4|S0|47d2a5891c8c135512dc7b3a8d73ee45|41|2 RetireConnectionIdFrame[0] AckFrame[5|Δ0] 43.074 <- (6) Packet A|7|S0|82f967af906a9349|45|2 StreamFrame[0(CIB),1024,0,fin] Padding(14) 43.092 -> Packet A|5|S0|47d2a5891c8c135512dc7b3a8d73ee45|42|1 AckFrame[7,5|Δ18] 43.131 <- (7) Packet A|8|S0|82f967af906a9349|45|2 AckFrame[4-3|Δ25] Padding(13) 43.131 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 43.184 <- (8) Packet A|12|S0|82f967af906a9349|45|3 AckFrame[4-3|Δ78] PingFrame[] Padding(12) 43.184 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 43.203 -> Packet A|6|S0|47d2a5891c8c135512dc7b3a8d73ee45|42|1 AckFrame[12,8-7|Δ19] 43.236 <- (9) Packet A|13|S0|82f967af906a9349|1059|2 AckFrame[6|Δ0] StreamFrame[0(CIB),0,1024,fin] 43.236 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 43.236 Finished downloading https://server4:443/nqdvhniffx at 33:27.771 on ClientConnection[21c1deced8d62dba/82f967af906a9349(V1) with server4/193.167.100.100:443] 43.236 Closing ClientConnection[21c1deced8d62dba/82f967af906a9349(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 43.236 -> Packet A|7|S0|47d2a5891c8c135512dc7b3a8d73ee45|43|2 ConnectionCloseFrame[0|0|] AckFrame[13|Δ0] 43.237 Creating connection with server4:443 with v1 43.237 Setting up connection for downloading https://server4:443/czcxufadjo at 33:27.772 on ClientConnection[9e213258c334e404/51ba5f460b6d78ea(V1) with server4/193.167.100.100:443] 43.237 Original destination connection id: 9e213258c334e404 (scid: 51ba5f460b6d78ea) >- CryptoStream[I|ClientHello] 43.239 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 43.439/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.238 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 43.273 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ10] CryptoFrame[0,123] 43.273 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 43.473/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 43.273 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 43.275 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 43.377/Handshake, because peerAwaitingAddressValidation | RTT:34/17 43.275 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 43.278 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 43.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 43.278 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 43.278 Starting downloading https://server4:443/czcxufadjo at 33:27.812 on ClientConnection[9e213258c334e404/51ba5f460b6d78ea(V1) with server4/193.167.100.100:443] 43.278 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 43.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 43.278 Discarding pn space Initial because first Handshake message is being sent 43.278 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 43.278 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 43.380/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 43.278 -> Packet A|0|S0|5d31beb57a1b90a9217b4c3f8f76160f|55|1 StreamFrame[0(CIB),0,17,fin] 43.309 <- (2) Packet A|0|S0|51ba5f460b6d78ea|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|a0111b0b23c9e7f30947d763a6020aa0|3d4a4fda50a682763e44cdec4a1d500d] NewConnectionIdFrame[2,<1|48d3960cffc68c27f7f90fcbf1bb309a|f809d1f1f97f47f4419e1db627687a18] 43.310 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 43.380/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 43.405/App, because ackElicitingInFlight | RTT:34/17 43.310 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 43.437/App, because ackElicitingInFlight | RTT:34/17 43.310 -> Packet A|1|S0|a0111b0b23c9e7f30947d763a6020aa0|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 43.436 loss detection timeout handler running Sending probe 0, because no ack since 43.310. Current RTT: 34/17. 43.436 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 43.690/App, because ackElicitingInFlight | RTT:34/17 43.436 -> Packet PA|2|S0|a0111b0b23c9e7f30947d763a6020aa0|55|1 StreamFrame[0(CIB),0,17,fin] 43.469 <- (3) Packet A|1|S0|51ba5f460b6d78ea|1061|3 AckFrame[2|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 43.470 Cwnd(-): 6000; inflight: 0 43.470 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 43.470 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 110 millis, based on 43.581/App, because ackElicitingInFlight | RTT:34/13 43.469 <- (4) Packet A|2|S0|51ba5f460b6d78ea|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 43.470 -> Packet A|3|S0|a0111b0b23c9e7f30947d763a6020aa0|62|3 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] RetireConnectionIdFrame[0] 43.470 Finished downloading https://server4:443/czcxufadjo at 33:28.005 on ClientConnection[9e213258c334e404/51ba5f460b6d78ea(V1) with server4/193.167.100.100:443] 43.470 -> Packet A|4|S0|a0111b0b23c9e7f30947d763a6020aa0|39|1 AckFrame[2-0|Δ0] 43.470 Closing ClientConnection[9e213258c334e404/51ba5f460b6d78ea(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 43.470 -> Packet A|5|S0|a0111b0b23c9e7f30947d763a6020aa0|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 43.471 Creating connection with server4:443 with v1 43.471 Setting up connection for downloading https://server4:443/geigpmpzec at 33:28.006 on ClientConnection[89fb83f6dad74613/56d24ca20ea9e212(V1) with server4/193.167.100.100:443] 43.471 Original destination connection id: 89fb83f6dad74613 (scid: 56d24ca20ea9e212) >- CryptoStream[I|ClientHello] 43.472 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 43.672/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.472 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 43.671 loss detection timeout handler running Sending probe 0, because no ack since 43.472. Current RTT: 100/25. 43.671 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 43.671 (Probe is an initial retransmit) 43.672 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 44.072/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.672 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 43.706 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[1|Δ9] CryptoFrame[0,123] 43.706 probe count not reset on ack because handshake not yet confirmed 43.707 Retransmitting CryptoFrame[0,257] on level Initial 43.707 Cwnd(-): 6000; inflight: 0 43.707 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 44.107/Initial, because peerAwaitingAddressValidation | RTT:100/25 43.707 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 43.911/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 43.707 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 43.706 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 43.709 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 43.913/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 43.709 -> Packet I|3|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 43.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 43.915/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 43.711 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 43.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 43.813/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 43.711 Discarding pn space Initial because first Handshake message is being sent 43.711 Starting downloading https://server4:443/geigpmpzec at 33:28.246 on ClientConnection[89fb83f6dad74613/56d24ca20ea9e212(V1) with server4/193.167.100.100:443] 43.711 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 43.711 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 43.813/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 43.711 -> Packet A|0|S0|5056e22d9bda3af321f8979e3a505d02|55|1 StreamFrame[0(CIB),0,17,fin] 43.740 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 43.742 <- (3) Packet A|0|S0|56d24ca20ea9e212|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|ee88b28e34bfdf079142fe7147ed01eb|793338b9a893c27b384b6c886950d90f] NewConnectionIdFrame[2,<1|ef80374b7c9c73d08d1950ed93955e12|b77d4a7c42a978df96156a6ba71f4cd3] 43.743 State is set to Confirmed reschedule loss detection timer for PTO over 70 millis, based on 43.813/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 43.838/App, because ackElicitingInFlight | RTT:34/17 43.743 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 43.870/App, because ackElicitingInFlight | RTT:34/17 43.743 -> Packet A|1|S0|ee88b28e34bfdf079142fe7147ed01eb|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 43.744 <- (4) Packet A|1|S0|56d24ca20ea9e212|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 43.870/App, because ackElicitingInFlight | RTT:34/17 43.762 -> Packet A|2|S0|ee88b28e34bfdf079142fe7147ed01eb|40|1 AckFrame[1-0|Δ17] 43.863 <- (5) Packet A|5|S0|56d24ca20ea9e212|45|3 AckFrame[1-0|Δ89] PingFrame[] Padding(12) 43.864 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 43.883 -> Packet A|3|S0|ee88b28e34bfdf079142fe7147ed01eb|42|1 AckFrame[5,1|Δ19] 43.915 <- (6) Packet A|8|S0|56d24ca20ea9e212|45|3 AckFrame[3,1|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(7) 43.915 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 43.915 Finished downloading https://server4:443/geigpmpzec at 33:28.450 on ClientConnection[89fb83f6dad74613/56d24ca20ea9e212(V1) with server4/193.167.100.100:443] 43.915 Closing ClientConnection[89fb83f6dad74613/56d24ca20ea9e212(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 43.915 -> Packet A|4|S0|ee88b28e34bfdf079142fe7147ed01eb|43|2 ConnectionCloseFrame[0|0|] AckFrame[8|Δ0] 43.916 Creating connection with server4:443 with v1 43.916 Setting up connection for downloading https://server4:443/tamssawhpb at 33:28.451 on ClientConnection[e9cdb8096f065398/076cd2ecbb25b996(V1) with server4/193.167.100.100:443] 43.916 Original destination connection id: e9cdb8096f065398 (scid: 076cd2ecbb25b996) >- CryptoStream[I|ClientHello] 43.917 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44.117/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.917 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.116 loss detection timeout handler running Sending probe 0, because no ack since 43.917. Current RTT: 100/25. 44.116 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 44.116 (Probe is an initial retransmit) 44.116 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 44.516/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.116 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.516 loss detection timeout handler running Sending probe 1, because no ack since 44.116. Current RTT: 100/25. 44.516 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 44.516 (Probe is an initial retransmit) 44.516 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 45.316/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.516 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.517 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 45.317/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.517 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.551 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[2|Δ12] CryptoFrame[0,123] 44.551 probe count not reset on ack because handshake not yet confirmed 44.551 Retransmitting CryptoFrame[0,257] on level Initial 44.551 Cwnd(-): 6000; inflight: 1200 44.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 45.351/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.551 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 44.959/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 44.551 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(888) -< CryptoStream[I|ServerHello] 44.551 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 44.553 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 44.961/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 44.553 -> Packet I|5|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 44.555 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 44.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 44.555 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 44.555 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 44.657/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 44.556 Starting downloading https://server4:443/tamssawhpb at 33:29.090 on ClientConnection[e9cdb8096f065398/076cd2ecbb25b996(V1) with server4/193.167.100.100:443] 44.556 Discarding pn space Initial because first Handshake message is being sent 44.555 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 44.556 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 44.658/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 44.556 -> Packet A|0|S0|ca6ca5f09ae95969407e8c173cb2e73a|55|1 StreamFrame[0(CIB),0,17,fin] 44.585 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 44.589 <- (3) Packet A|1|S0|076cd2ecbb25b996|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 44.589 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 44.691/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 44.589 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 44.641/Handshake, because ackElicitingInFlight | RTT:34/13 44.589 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 44.589 Discarding pn space Handshake because HandshakeDone is received 44.609 -> Packet A|1|S0|ca6ca5f09ae95969407e8c173cb2e73a|40|1 AckFrame[1|Δ19] 45.614 <- (4) Packet A|4|S0|076cd2ecbb25b996|45|3 AckFrame[0|Δ1026] HandshakeDoneFrame[] Padding(10) 45.614 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 45.614 <- (5) Packet A|6|S0|076cd2ecbb25b996|45|3 AckFrame[0|Δ1026] HandshakeDoneFrame[] Padding(10) 45.615 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 45.615 -> Packet A|2|S0|ca6ca5f09ae95969407e8c173cb2e73a|43|1 AckFrame[6,4,1|Δ0] 47.663 <- (6) Packet A|8|S0|076cd2ecbb25b996|45|3 AckFrame[0|Δ3075] HandshakeDoneFrame[] Padding(10) 47.664 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 47.683 -> Packet A|3|S0|ca6ca5f09ae95969407e8c173cb2e73a|46|1 AckFrame[8,6,4,1|Δ19] 47.715 <- (7) Packet A|11|S0|076cd2ecbb25b996|110|5 AckFrame[3|Δ0] HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|d736554f4a331ce699fbf8c85e1ce08f|70803d5d84a24f3fefca7cba33d44d59] NewConnectionIdFrame[2,<1|17f1d5c3853610fe08be1ce29e873d12|784535469010b1e6037adb64d5e3ed87] StreamFrame[0(CIB),1024,0,fin] 47.715 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 47.827/App, because ackElicitingInFlight | RTT:34/13 47.716 Finished downloading https://server4:443/tamssawhpb at 33:32.250 on ClientConnection[e9cdb8096f065398/076cd2ecbb25b996(V1) with server4/193.167.100.100:443] 47.716 -> Packet A|4|S0|d736554f4a331ce699fbf8c85e1ce08f|41|2 RetireConnectionIdFrame[0] AckFrame[11|Δ0] 47.716 Closing ClientConnection[e9cdb8096f065398/076cd2ecbb25b996(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 47.716 -> Packet A|5|S0|d736554f4a331ce699fbf8c85e1ce08f|43|2 ConnectionCloseFrame[0|0|] AckFrame[11|Δ0] 47.716 Creating connection with server4:443 with v1 47.717 Setting up connection for downloading https://server4:443/cwlkssvemu at 33:32.251 on ClientConnection[e3a0e5f49012f9d2/fc1ca8e2117223a9(V1) with server4/193.167.100.100:443] 47.717 Original destination connection id: e3a0e5f49012f9d2 (scid: fc1ca8e2117223a9) >- CryptoStream[I|ClientHello] 47.718 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 47.918/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 47.718 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 47.752 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 47.752 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 47.952/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 47.754 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 47.752 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) reschedule loss detection timer for PTO over 101 millis, based on 47.856/Handshake, because peerAwaitingAddressValidation | RTT:34/17 47.754 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 47.756 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 47.858/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 47.756 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 47.756 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 47.756 Starting downloading https://server4:443/cwlkssvemu at 33:32.291 on ClientConnection[e3a0e5f49012f9d2/fc1ca8e2117223a9(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 101 millis, based on 47.858/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 47.756 Discarding pn space Initial because first Handshake message is being sent 47.756 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 47.757 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 47.859/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 47.757 -> Packet A|0|S0|dae8cbe1659356dd608603b62c4d6907|55|1 StreamFrame[0(CIB),0,17,fin] 47.788 <- (2) Packet A|0|S0|fc1ca8e2117223a9|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|fc9420658b62b4952365a4173a1170e0|0228c7c60f4b5c7cbe7d5f32c9ff0e43] NewConnectionIdFrame[2,<1|b8eaa1bc62aa4f54487b3503cf40f302|acbf01150a2dad76eff52defb23fec5c] 47.788 State is set to Confirmed reschedule loss detection timer for PTO over 69 millis, based on 47.858/Handshake, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 95 millis, based on 47.884/App, because ackElicitingInFlight | RTT:34/17 47.788 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 126 millis, based on 47.915/App, because ackElicitingInFlight | RTT:34/17 47.788 -> Packet A|1|S0|fc9420658b62b4952365a4173a1170e0|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 47.790 <- (3) Packet A|1|S0|fc1ca8e2117223a9|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] reschedule loss detection timer for PTO over 125 millis, based on 47.915/App, because ackElicitingInFlight | RTT:34/17 47.808 -> Packet A|2|S0|fc9420658b62b4952365a4173a1170e0|40|1 AckFrame[1-0|Δ18] 47.908 <- (4) Packet A|5|S0|fc1ca8e2117223a9|45|3 AckFrame[2-1|Δ68] PingFrame[] Padding(12) 47.909 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 47.908 <- (5) Packet A|7|S0|fc1ca8e2117223a9|45|3 AckFrame[2-1|Δ68] PingFrame[] Padding(12) 47.909 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 47.909 -> Packet A|3|S0|fc9420658b62b4952365a4173a1170e0|41|1 AckFrame[7,5|Δ0] 48.145 <- (6) Packet A|9|S0|fc1ca8e2117223a9|45|3 AckFrame[2-1|Δ305] PingFrame[] Padding(10) 48.145 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 48.164 -> Packet A|4|S0|fc9420658b62b4952365a4173a1170e0|44|1 AckFrame[9,7,5|Δ19] 48.196 <- (7) Packet A|12|S0|fc1ca8e2117223a9|45|3 AckFrame[4|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(9) 48.196 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 48.197 Finished downloading https://server4:443/cwlkssvemu at 33:32.731 on ClientConnection[e3a0e5f49012f9d2/fc1ca8e2117223a9(V1) with server4/193.167.100.100:443] 48.197 Closing ClientConnection[e3a0e5f49012f9d2/fc1ca8e2117223a9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 48.197 -> Packet A|5|S0|fc9420658b62b4952365a4173a1170e0|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 48.197 Creating connection with server4:443 with v1 48.197 Setting up connection for downloading https://server4:443/nprrzenjeo at 33:32.732 on ClientConnection[5454a5542675fb20/e212a48992a32962(V1) with server4/193.167.100.100:443] 48.197 Original destination connection id: 5454a5542675fb20 (scid: e212a48992a32962) >- CryptoStream[I|ClientHello] 48.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.399/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.198 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 48.233 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 48.233 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.433/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 48.233 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,685] Padding(277) 48.235 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 48.337/Handshake, because peerAwaitingAddressValidation | RTT:34/17 48.235 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 48.237 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 48.339/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.237 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 48.237 Starting downloading https://server4:443/nprrzenjeo at 33:32.772 on ClientConnection[5454a5542675fb20/e212a48992a32962(V1) with server4/193.167.100.100:443] 48.237 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 48.339/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.237 Discarding pn space Initial because first Handshake message is being sent 48.237 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 48.238 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 48.340/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.238 -> Packet A|0|S0|7288148433a1359c4b63fe344b058119|55|1 StreamFrame[0(CIB),0,17,fin] 48.315 <- (8) Packet A|14|S0|fc1ca8e2117223a9|45|3 AckFrame[4|Δ118] PingFrame[] Padding(12) 48.315 <- (9) Packet A|16|S0|fc1ca8e2117223a9|45|3 AckFrame[4|Δ118] PingFrame[] Padding(12) 48.315 -> Packet A|6|S0|fc9420658b62b4952365a4173a1170e0|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 48.315 -> Packet A|7|S0|fc9420658b62b4952365a4173a1170e0|43|2 ConnectionCloseFrame[0|0|] AckFrame[12|Δ0] 48.339 loss detection timeout handler running Sending probe 0, because no ack since 48.237. Current RTT: 34/17. 48.339 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 48.339 (Probe is a handshake retransmit) 48.339 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 48.543/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.339 -> Packet PH|2|L|88|1 CryptoFrame[0,36] 48.542 loss detection timeout handler running Sending probe 1, because no ack since 48.238. Current RTT: 34/17. 48.542 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 48.542 (Probe is a handshake retransmit) 48.542 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 48.950/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.542 -> Packet PH|3|L|88|1 CryptoFrame[0,36] 48.543 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 48.951/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.543 -> Packet PH|4|L|88|1 CryptoFrame[0,36] 48.574 <- (2) Packet A|0|S0|e212a48992a32962|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|2972f77cd83c9a2cc439de5d7f5aa32b|b420f09dded4e11973591890a7df9d48] NewConnectionIdFrame[2,<1|04cda007b1858703f53db8c732607b59|b09cc7111bec98b0ae9f4ae9c0b42ad6] 48.574 State is set to Confirmed reschedule loss detection timer for PTO over 171 millis, based on 48.746/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -209 millis, based on 48.365/App, because ackElicitingInFlight | RTT:34/17 48.574 loss detection timeout handler running 48.574 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 48.238. Current RTT: 34/17. 48.574 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 253 millis, based on 48.829/App, because ackElicitingInFlight | RTT:34/17 48.575 -> Packet PA|1|S0|2972f77cd83c9a2cc439de5d7f5aa32b|55|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 253 millis, based on 48.829/App, because ackElicitingInFlight | RTT:34/17 48.575 -> Packet A|2|S0|2972f77cd83c9a2cc439de5d7f5aa32b|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 48.607 <- (3) Packet A|1|S0|e212a48992a32962|1061|3 AckFrame[1|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 48.608 Cwnd(-): 6000; inflight: 41 48.608 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 93 millis, based on 48.702/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 110 millis, based on 48.719/App, because ackElicitingInFlight | RTT:34/13 48.608 -> Packet A|3|S0|2972f77cd83c9a2cc439de5d7f5aa32b|60|2 StreamFrame[0(CIB),0,17,fin] AckFrame[0|Δ0] 48.607 <- (4) Packet A|2|S0|e212a48992a32962|45|3 HandshakeDoneFrame[] StreamFrame[0(CIB),1024,0,fin] Padding(13) 48.608 -> Packet A|4|S0|2972f77cd83c9a2cc439de5d7f5aa32b|39|1 AckFrame[2-0|Δ0] 48.608 Finished downloading https://server4:443/nprrzenjeo at 33:33.143 on ClientConnection[5454a5542675fb20/e212a48992a32962(V1) with server4/193.167.100.100:443] 48.608 Closing ClientConnection[5454a5542675fb20/e212a48992a32962(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 48.609 -> Packet A|5|S0|2972f77cd83c9a2cc439de5d7f5aa32b|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 48.609 Creating connection with server4:443 with v1 48.609 Setting up connection for downloading https://server4:443/augsizusnj at 33:33.144 on ClientConnection[d8b6d4434cd21f89/ae225acfe8722c95(V1) with server4/193.167.100.100:443] 48.609 Original destination connection id: d8b6d4434cd21f89 (scid: ae225acfe8722c95) >- CryptoStream[I|ClientHello] 48.610 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.810/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.610 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 48.639 <- (5) Packet A|3|S0|e212a48992a32962|45|2 AckFrame[3,1|Δ0] Padding(12) 48.640 -> Packet A|6|S0|2972f77cd83c9a2cc439de5d7f5aa32b|43|2 ConnectionCloseFrame[0|0|] AckFrame[2-0|Δ0] 48.644 <- (1) Packet I|0|L|184|2 Token=[] AckFrame[0|Δ9] CryptoFrame[0,123] 48.645 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.845/Initial, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[I|ServerHello] 48.644 <- (1) Packet H|0|L|1016|2 CryptoFrame[0,683] Padding(279) 48.647 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 48.749/Handshake, because peerAwaitingAddressValidation | RTT:34/17 48.646 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1145) >- CryptoStream[H|Finished] 48.648 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 48.750/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.648 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 48.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 48.649 Starting downloading https://server4:443/augsizusnj at 33:33.183 on ClientConnection[d8b6d4434cd21f89/ae225acfe8722c95(V1) with server4/193.167.100.100:443] 48.649 -> Packet H|1|L|54|1 AckFrame[0|Δ0] 48.649 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 48.751/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over 101 millis, based on 48.751/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.649 Discarding pn space Initial because first Handshake message is being sent 48.649 -> Packet A|0|S0|050c3ae69ca1c5dfc0f35e3cb813dc1c|55|1 StreamFrame[0(CIB),0,17,fin] 48.682 <- (2) Packet A|1|S0|ae225acfe8722c95|1061|3 AckFrame[0|Δ0] HandshakeDoneFrame[] StreamFrame[0(CIB),0,1024] 48.682 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 48.784/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.682 State is set to Confirmed reschedule loss detection timer for PTO over 51 millis, based on 48.734/Handshake, because ackElicitingInFlight | RTT:34/13 48.683 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 48.683 Discarding pn space Handshake because HandshakeDone is received 48.702 -> Packet A|1|S0|050c3ae69ca1c5dfc0f35e3cb813dc1c|40|1 AckFrame[1|Δ19] 48.740 <- (3) Packet A|3|S0|ae225acfe8722c95|105|4 AckFrame[1|Δ6] HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|0b7ae58e68770c416e391e3afe0f4b5b|4dce0738598df55b2f61ab80ef29d3a7] NewConnectionIdFrame[2,<1|580197e5bcb6c6c8e488174162edbc26|269512dd1b7d7c49b2d992112e942f6b] 48.740 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 110 millis, based on 48.851/App, because ackElicitingInFlight | RTT:34/13 48.740 -> Packet A|2|S0|0b7ae58e68770c416e391e3afe0f4b5b|41|2 RetireConnectionIdFrame[0] AckFrame[3|Δ0] 48.850 loss detection timeout handler running Sending probe 0, because no ack since 48.740. Current RTT: 34/13. 48.851 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 221 millis, based on 49.073/App, because ackElicitingInFlight | RTT:34/13 48.851 -> Packet PA|3|S0|0b7ae58e68770c416e391e3afe0f4b5b|37|2 RetireConnectionIdFrame[0] Padding(1) 48.945 <- (4) Packet A|6|S0|ae225acfe8722c95|45|3 AckFrame[2|Δ173] PingFrame[] Padding(10) reschedule loss detection timer for PTO over 15 millis, based on 48.962/App, because ackElicitingInFlight | RTT:34/13 48.945 <- (5) Packet A|8|S0|ae225acfe8722c95|45|3 AckFrame[2|Δ173] PingFrame[] Padding(10) reschedule loss detection timer for PTO over 165 millis, based on 49.112/App, because ackElicitingInFlight | RTT:52/46 48.946 -> Packet A|4|S0|0b7ae58e68770c416e391e3afe0f4b5b|41|1 AckFrame[8,6|Δ0] 49.111 loss detection timeout handler running Sending probe 0, because no ack since 48.851. Current RTT: 52/46. 49.111 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 521 millis, based on 49.633/App, because ackElicitingInFlight | RTT:52/46 49.111 -> Packet PA|5|S0|0b7ae58e68770c416e391e3afe0f4b5b|37|2 RetireConnectionIdFrame[0] Padding(1) 49.141 <- (6) Packet A|11|S0|ae225acfe8722c95|45|3 AckFrame[4|Δ164] PingFrame[] Padding(10) 49.142 Cwnd(-): 6000; inflight: 37 reschedule loss detection timer for PTO over 230 millis, based on 49.372/App, because ackElicitingInFlight | RTT:52/46 49.142 <- (7) Packet A|13|S0|ae225acfe8722c95|45|3 AckFrame[4|Δ164] PingFrame[] Padding(10) reschedule loss detection timer for PTO over 229 millis, based on 49.372/App, because ackElicitingInFlight | RTT:52/46 49.142 -> Packet A|6|S0|0b7ae58e68770c416e391e3afe0f4b5b|41|1 AckFrame[13,11|Δ0] 49.169 <- (8) Packet A|14|S0|ae225acfe8722c95|45|2 AckFrame[5-4|Δ26] Padding(13) 49.169 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 50.122 <- (9) Packet A|22|S0|ae225acfe8722c95|45|3 AckFrame[5-4|Δ979] PingFrame[] Padding(10) 50.123 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 50.142 -> Packet A|7|S0|0b7ae58e68770c416e391e3afe0f4b5b|44|1 AckFrame[22,14-13,11|Δ19] 50.174 <- (10) Packet A|23|S0|ae225acfe8722c95|45|3 AckFrame[7|Δ0] StreamFrame[0(CIB),1024,0,fin] Padding(8) 50.174 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 50.174 Finished downloading https://server4:443/augsizusnj at 33:34.709 on ClientConnection[d8b6d4434cd21f89/ae225acfe8722c95(V1) with server4/193.167.100.100:443] 50.174 Closing ClientConnection[d8b6d4434cd21f89/ae225acfe8722c95(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 50.174 -> Packet A|8|S0|0b7ae58e68770c416e391e3afe0f4b5b|43|2 ConnectionCloseFrame[0|0|] AckFrame[23|Δ0] 50.175 Creating connection with server4:443 with v1 50.175 Setting up connection for downloading https://server4:443/kixhgqudvg at 33:34.710 on ClientConnection[0033bc92da98b70f/40825e33c80a7d29(V1) with server4/193.167.100.100:443] 50.175 Original destination connection id: 0033bc92da98b70f (scid: 40825e33c80a7d29) >- CryptoStream[I|ClientHello] 50.176 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 50.376/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.176 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.376 loss detection timeout handler running Sending probe 0, because no ack since 50.176. Current RTT: 100/25. 50.376 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 50.376 (Probe is an initial retransmit) 50.376 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 50.776/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.376 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.775 loss detection timeout handler running Sending probe 1, because no ack since 50.376. Current RTT: 100/25. 50.775 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 50.775 (Probe is an initial retransmit) 50.776 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 51.576/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.775 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 50.776 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 51.577/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 50.776 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 51.212 <- (1) Packet I|4|L|186|2 Token=[] AckFrame[0|Δ8009] CryptoFrame[0,123] 51.212 probe count not reset on ack because handshake not yet confirmed 51.212 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 52.012/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[I|ServerHello] 51.212 <- (1) Packet H|4|L|1014|2 CryptoFrame[0,685] Padding(275) 51.215 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 12411 millis, based on 63.627/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:1035/517 51.215 -> Packet I|4|L|1201|2 Token=[] AckFrame[4|Δ0] Padding(1145) >- CryptoStream[H|Finished] 51.217 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 12411 millis, based on 63.629/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:1035/517 51.217 -> Packet H|0|L|88|1 CryptoFrame[0,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 51.217 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3102 millis, based on 54.320/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:1035/517 51.217 Discarding pn space Initial because first Handshake message is being sent 51.217 Starting downloading https://server4:443/kixhgqudvg at 33:35.751 on ClientConnection[0033bc92da98b70f/40825e33c80a7d29(V1) with server4/193.167.100.100:443] 51.217 -> Packet H|1|L|54|1 AckFrame[4|Δ0] 51.217 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 3102 millis, based on 54.320/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:1035/517 51.217 -> Packet A|0|S0|b63b7ec453df96332ed62ba850c3c312|55|1 StreamFrame[0(CIB),0,17,fin] 51.248 <- (2) Packet A|0|S0|40825e33c80a7d29|99|3 HandshakeDoneFrame[] NewConnectionIdFrame[1,<1|326d9ed77fbf89b399934ead09d89c27|776e8aeb871d3471b6184d5cd8f4c3ea] NewConnectionIdFrame[2,<1|d0ca53cb00f0ee063a40391605dfcc63|92c0ebfe7ca64402ff319769a2963050] 51.249 State is set to Confirmed reschedule loss detection timer for PTO over 3070 millis, based on 54.320/Handshake, because ackElicitingInFlight | RTT:1035/517 reschedule loss detection timer for PTO over 3096 millis, based on 54.345/App, because ackElicitingInFlight | RTT:1035/517 51.249 Discarding pn space Handshake because HandshakeDone is received reschedule loss detection timer for PTO over 3127 millis, based on 54.377/App, because ackElicitingInFlight | RTT:1035/517 51.249 -> Packet A|1|S0|326d9ed77fbf89b399934ead09d89c27|41|2 RetireConnectionIdFrame[0] AckFrame[0|Δ0] 51.387 <- (3) Packet A|6|S0|40825e33c80a7d29|45|3 AckFrame[0|Δ138] HandshakeDoneFrame[] Padding(10) reschedule loss detection timer for PTO over 2989 millis, based on 54.377/App, because ackElicitingInFlight | RTT:1035/517 51.407 -> Packet A|2|S0|326d9ed77fbf89b399934ead09d89c27|42|1 AckFrame[6,0|Δ19] 51.439 <- (4) Packet A|7|S0|40825e33c80a7d29|1059|2 AckFrame[2|Δ0] StreamFrame[0(CIB),0,1024,fin] 51.440 Finished downloading https://server4:443/kixhgqudvg at 33:35.974 on ClientConnection[0033bc92da98b70f/40825e33c80a7d29(V1) with server4/193.167.100.100:443] 51.440 Closing ClientConnection[0033bc92da98b70f/40825e33c80a7d29(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 51.440 -> Packet A|3|S0|326d9ed77fbf89b399934ead09d89c27|43|2 ConnectionCloseFrame[0|0|] AckFrame[7|Δ0]