6e0c80bb42010210: No root crt list specified -- certificate will not be verified. 6e0c80bb42010210: Sending ALPN list (1): hq-interop 6e0c80bb42010210: Sending transport parameter TLS extension (83 bytes): 6e0c80bb42010210: Extension list (83 bytes): 6e0c80bb42010210: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 6e0c80bb42010210: Extension type: 4 (initial_max_data), length 4, 80100000 6e0c80bb42010210: Extension type: 8 (max_streams_bidi), length 2, 4200 6e0c80bb42010210: Extension type: 1 (idle_timeout), length 4, 8002bf20 6e0c80bb42010210: Extension type: 3 (max_packet_size), length 2, 45a0 6e0c80bb42010210: Extension type: 9 (max_streams_uni), length 2, 4200 6e0c80bb42010210: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 6e0c80bb42010210: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 6e0c80bb42010210: Extension type: 14 (active_connection_id_limit), length 1, 08 6e0c80bb42010210: Extension type: 11 (max_ack_delay), length 1, 0a 6e0c80bb42010210: Extension type: 15 (hcid), length 8, b6ee573e4e62c7ea 6e0c80bb42010210: Extension type: 3468 (unknown), length 2, 4c80 6e0c80bb42010210: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 6e0c80bb42010210: Extension type: 29016 (enable_time_stamp), length 1, 03 6e0c80bb42010210: Extension type: 10930 (grease_quic_bit), length 0 6e0c80bb42010210: Sending packet type: 2 (initial), S0, Q1, Version 1, 6e0c80bb42010210: <6e0c80bb42010210>, , Seq: 91736, pl: 1226 6e0c80bb42010210: Token length: 0 6e0c80bb42010210: Prepared 1206 bytes 6e0c80bb42010210: ping, 1 bytes 6e0c80bb42010210: crypto_hs, offset 0, length 283: 010001170303f8f7... 6e0c80bb42010210: padding, 918 bytes 6e0c80bb42010210: Sending 1252 bytes to 193.167.100.100:443 at T=0.002016 (19174ed9) 6e0c80bb42010210: Receiving 1232 bytes from 193.167.100.100:443 at T=0.042076 (1917eb55) 6e0c80bb42010210: Receiving packet type: 2 (initial), S0, Q1, Version 1, 6e0c80bb42010210: , <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 0, pl: 156 6e0c80bb42010210: Token length: 0 6e0c80bb42010210: Decrypted 139 bytes 6e0c80bb42010210: ack_ecn (nb=0), 91736, ect0=0, ect1=1, ce=0 6e0c80bb42010210: crypto_hs, offset 0, length 123: 0200007703037c41... 6e0c80bb42010210: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: , <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 0, pl: 1009 6e0c80bb42010210: Decrypted 992 bytes 6e0c80bb42010210: crypto_hs, offset 0, length 988: 08000060005e0000... 6e0c80bb42010210: Received transport parameter TLS extension (69 bytes): 6e0c80bb42010210: Extension list (69 bytes): 6e0c80bb42010210: Extension type: 1 (idle_timeout), length 4, 800493e0 6e0c80bb42010210: Extension type: 4 (initial_max_data), length 4, 80393870 6e0c80bb42010210: Extension type: 5 (max_stream_data_bidi_local), length 4, 80393870 6e0c80bb42010210: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80393870 6e0c80bb42010210: Extension type: 7 (max_stream_data_uni), length 4, 80393870 6e0c80bb42010210: Extension type: 8 (max_streams_bidi), length 2, 4064 6e0c80bb42010210: Extension type: 9 (max_streams_uni), length 2, 4064 6e0c80bb42010210: Extension type: 14 (active_connection_id_limit), length 1, 03 6e0c80bb42010210: Extension type: 0 (ocid), length 8, 6e0c80bb42010210 6e0c80bb42010210: Extension type: 15 (hcid), length 16, 715d8a49d913a0ff8b2d2aa4f1554654 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 0, pl: 28 6e0c80bb42010210: Prepared 8 bytes 6e0c80bb42010210: ack_ecn (nb=0), 0, ect0=1, ect1=0, ce=0 6e0c80bb42010210: Sending 61 bytes to 193.167.100.100:443 at T=0.042343 (1917ec60) 6e0c80bb42010210: Receiving 1232 bytes from 193.167.100.100:443 at T=0.043077 (1917ef3e) 6e0c80bb42010210: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: , <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 1, pl: 1199 6e0c80bb42010210: Decrypted 1182 bytes 6e0c80bb42010210: crypto_hs, offset 988, length 1177: 324d4775676b7969... 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 1, pl: 28 6e0c80bb42010210: Prepared 8 bytes 6e0c80bb42010210: ack_ecn (nb=0), 0-1, ect0=2, ect1=0, ce=0 6e0c80bb42010210: Sending 61 bytes to 193.167.100.100:443 at T=0.043163 (1917ef94) 6e0c80bb42010210: Receiving 1232 bytes from 193.167.100.100:443 at T=0.044073 (1917f322) 6e0c80bb42010210: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: , <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 2, pl: 1199 6e0c80bb42010210: Decrypted 1182 bytes 6e0c80bb42010210: crypto_hs, offset 2165, length 1177: 50346d567733374a... 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 2, pl: 28 6e0c80bb42010210: Prepared 8 bytes 6e0c80bb42010210: ack_ecn (nb=0), 0-2, ect0=3, ect1=0, ce=0 6e0c80bb42010210: Sending 61 bytes to 193.167.100.100:443 at T=0.044093 (1917f336) 6e0c80bb42010210: Receiving 1232 bytes from 193.167.100.100:443 at T=0.045066 (1917f703) 6e0c80bb42010210: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: , <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 3, pl: 1199 6e0c80bb42010210: Decrypted 1182 bytes 6e0c80bb42010210: crypto_hs, offset 3342, length 1177: 4e6e556e42646733... 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 3, pl: 28 6e0c80bb42010210: Prepared 8 bytes 6e0c80bb42010210: ack_ecn (nb=0), 0-3, ect0=4, ect1=0, ce=0 6e0c80bb42010210: Sending 61 bytes to 193.167.100.100:443 at T=0.045098 (1917f723) 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 4, pl: 30 6e0c80bb42010210: Prepared 10 bytes 6e0c80bb42010210: ping, 1 bytes 6e0c80bb42010210: ack_ecn (nb=0), 0-3, ect0=4, ect1=0, ce=0 6e0c80bb42010210: Sending 63 bytes to 193.167.100.100:443 at T=0.145399 (19197ef0) 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 5, pl: 32 6e0c80bb42010210: Prepared 12 bytes 6e0c80bb42010210: ping, 1 bytes 6e0c80bb42010210: ack_ecn (nb=0), 0-3, ect0=4, ect1=0, ce=0 6e0c80bb42010210: Sending 65 bytes to 193.167.100.100:443 at T=0.345947 (191c8e54) 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 6, pl: 32 6e0c80bb42010210: Prepared 12 bytes 6e0c80bb42010210: ping, 1 bytes 6e0c80bb42010210: ack_ecn (nb=0), 0-3, ect0=4, ect1=0, ce=0 6e0c80bb42010210: Sending 65 bytes to 193.167.100.100:443 at T=0.746969 (1922acd2) 6e0c80bb42010210: Receiving 1232 bytes from 193.167.100.100:443 at T=0.779861 (19232d4e) 6e0c80bb42010210: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: , <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 4, pl: 1199 6e0c80bb42010210: Decrypted 1182 bytes 6e0c80bb42010210: ack_ecn (nb=0), 6, ect0=0, ect1=1, ce=0 6e0c80bb42010210: crypto_hs, offset 4519, length 1168: 67416e5576333673... 6e0c80bb42010210: T= 0.779913, Lost packet type 4, number 0, size 45, DCID <715d8a49d913a0ff8b2d2aa4f1554654>, reason: repeat 6e0c80bb42010210: T= 0.779913, Lost packet type 4, number 1, size 45, DCID <715d8a49d913a0ff8b2d2aa4f1554654>, reason: repeat 6e0c80bb42010210: T= 0.779913, Lost packet type 4, number 2, size 45, DCID <715d8a49d913a0ff8b2d2aa4f1554654>, reason: repeat 6e0c80bb42010210: T= 0.779913, Lost packet type 4, number 3, size 45, DCID <715d8a49d913a0ff8b2d2aa4f1554654>, reason: repeat 6e0c80bb42010210: T= 0.779913, Lost packet type 4, number 4, size 47, DCID <715d8a49d913a0ff8b2d2aa4f1554654>, reason: repeat 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 7, pl: 29 6e0c80bb42010210: Prepared 9 bytes 6e0c80bb42010210: ping, 1 bytes 6e0c80bb42010210: ack_ecn (nb=0), 3-4, ect0=5, ect1=0, ce=0 6e0c80bb42010210: T= 0.779913, Lost packet type 4, number 5, size 49, DCID <715d8a49d913a0ff8b2d2aa4f1554654>, reason: repeat 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 8, pl: 29 6e0c80bb42010210: Prepared 9 bytes 6e0c80bb42010210: ping, 1 bytes 6e0c80bb42010210: ack_ecn (nb=0), 3-4, ect0=5, ect1=0, ce=0 6e0c80bb42010210: Sending 124 bytes to 193.167.100.100:443 at T=0.779913 (19232d82) 6e0c80bb42010210: Receiving 1232 bytes from 193.167.100.100:443 at T=0.780801 (192330fa) 6e0c80bb42010210: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: , <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 5, pl: 1199 6e0c80bb42010210: Decrypted 1182 bytes 6e0c80bb42010210: crypto_hs, offset 5687, length 1177: 040a0c1d696e7465... 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 9, pl: 28 6e0c80bb42010210: Prepared 8 bytes 6e0c80bb42010210: ack_ecn (nb=0), 3-5, ect0=6, ect1=0, ce=0 6e0c80bb42010210: Sending 61 bytes to 193.167.100.100:443 at T=0.780832 (19233119) 6e0c80bb42010210: Receiving 1232 bytes from 193.167.100.100:443 at T=0.781784 (192334d1) 6e0c80bb42010210: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: , <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 6, pl: 1199 6e0c80bb42010210: Decrypted 1182 bytes 6e0c80bb42010210: crypto_hs, offset 6864, length 1177: c15608dde22648b8... 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 10, pl: 28 6e0c80bb42010210: Prepared 8 bytes 6e0c80bb42010210: ack_ecn (nb=0), 3-6, ect0=7, ect1=0, ce=0 6e0c80bb42010210: Sending 61 bytes to 193.167.100.100:443 at T=0.781808 (192334e9) 6e0c80bb42010210: Receiving 1232 bytes from 193.167.100.100:443 at T=0.782791 (192338c0) 6e0c80bb42010210: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: , <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 7, pl: 1199 6e0c80bb42010210: Decrypted 1182 bytes 6e0c80bb42010210: crypto_hs, offset 8041, length 1177: 7664d062bbeca12c... 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 11, pl: 28 6e0c80bb42010210: Prepared 8 bytes 6e0c80bb42010210: ack_ecn (nb=0), 3-7, ect0=8, ect1=0, ce=0 6e0c80bb42010210: Sending 61 bytes to 193.167.100.100:443 at T=0.782822 (192338df) 6e0c80bb42010210: Receiving 768 bytes from 193.167.100.100:443 at T=0.783428 (19233b3d) 6e0c80bb42010210: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: , <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 8, pl: 735 6e0c80bb42010210: Decrypted 718 bytes 6e0c80bb42010210: crypto_hs, offset 9218, length 713: 8a6da1eda3b50634... 6e0c80bb42010210: Negotiated ALPN: hq-interop 6e0c80bb42010210: Sending packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, , Seq: 12, pl: 67 6e0c80bb42010210: Prepared 47 bytes 6e0c80bb42010210: ack_ecn (nb=0), 3-8, ect0=9, ect1=0, ce=0 6e0c80bb42010210: crypto_hs, offset 0, length 36: 14000020065a814e... 6e0c80bb42010210: Sending packet type: 6 (1rtt protected), S0, Q1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 0 (0), Phi: 0, 6e0c80bb42010210: Prepared 149 bytes 6e0c80bb42010210: new_connection_id[1]: 0xd7035514b0589c5f, 2ac896c97c014a401ccdafa94ddcc18f 6e0c80bb42010210: new_connection_id[2]: 0x8b2673fcf02f40ac, ff382b6a58d91f536a8648c7c439c908 6e0c80bb42010210: padding, 93 bytes 6e0c80bb42010210: T= 0.783499, cwin: 16645,flight: 590,nb_ret: 6,rtt_min: 32892,rtt: 39164,rtt_var: 16814,max_ack_delay: 0,state: 13 6e0c80bb42010210: Sending 283 bytes to 193.167.100.100:443 at T=0.783499 (19233b84) 6e0c80bb42010210: Connection established. Version = 1, I-CID: 6e0c80bb42010210, verified: 1 6e0c80bb42010210: Preparing GET on stream 0 for /mmdxdfoyih 6e0c80bb42010210: Sending packet type: 6 (1rtt protected), S0, Q1, 6e0c80bb42010210: <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 1 (1), Phi: 0, 6e0c80bb42010210: Prepared 21 bytes 6e0c80bb42010210: stream 0, offset 0, length 17, fin = 1: 474554202f6d6d64... 6e0c80bb42010210: padding, 1 bytes 6e0c80bb42010210: T= 0.783638, cwin: 16645,flight: 645,nb_ret: 6,rtt_min: 32892,rtt: 39164,rtt_var: 16814,max_ack_delay: 0,state: 13 6e0c80bb42010210: Sending 55 bytes to 193.167.100.100:443 at T=0.783638 (19233c0f) 6e0c80bb42010210: Receiving 69 bytes from 193.167.100.100:443 at T=0.811504 (1923a8e9) 6e0c80bb42010210: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 6e0c80bb42010210: , <715d8a49d913a0ff8b2d2aa4f1554654>, Seq: 9, pl: 36 6e0c80bb42010210: Decrypted 19 bytes 6e0c80bb42010210: ack_ecn (nb=0), 7-8, ect0=0, ect1=3, ce=0 6e0c80bb42010210: padding, 10 bytes 6e0c80bb42010210: Receiving 1452 bytes from 193.167.100.100:443 at T=0.816812 (1923bda5) 6e0c80bb42010210: Receiving packet type: 6 (1rtt protected), S0, Q1, 6e0c80bb42010210: , Seq: 0 (0), Phi: 0, 6e0c80bb42010210: Decrypted 1426 bytes 6e0c80bb42010210: ping, 1 bytes 6e0c80bb42010210: padding, 1425 bytes 6e0c80bb42010210: T= 0.816812, cwin: 16737,flight: 521,nb_ret: 6,rtt_min: 31591,rtt: 38217,rtt_var: 14503,max_ack_delay: 0,state: 13 6e0c80bb42010210: Receiving 146 bytes from 193.167.100.100:443 at T=0.816938 (1923be23) 6e0c80bb42010210: Receiving packet type: 6 (1rtt protected), S0, Q1, 6e0c80bb42010210: , Seq: 1 (1), Phi: 0, 6e0c80bb42010210: Decrypted 120 bytes 6e0c80bb42010210: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 6e0c80bb42010210: handshake_done 6e0c80bb42010210: new_connection_id[1]: 0xbce952ef1a06f1c02ead42cf619fbedd, bc3e769ad82056da697bd60d894502e2, retire before: 1 6e0c80bb42010210: new_connection_id[2]: 0x6b62a077338612b206ffdcd16b1dba08, 4dfa636aa47f914489a2eb3af88d5ee7, retire before: 1 6e0c80bb42010210: new_connection_id[3]: 0x0f4e7732f0292ca4d073b7eca8da62f1, 251ae68f0cbc7657ba3ace9fb54606d3, retire before: 1 6e0c80bb42010210: retire_connection_id[0] 6e0c80bb42010210: T= 0.816938, cwin: 16943,flight: 0,nb_ret: 6,rtt_min: 31591,rtt: 37488,rtt_var: 12334,max_ack_delay: 0,state: 14 6e0c80bb42010210: Sending packet type: 6 (1rtt protected), S1, Q1, 6e0c80bb42010210: , Seq: 2 (2), Phi: 0, 6e0c80bb42010210: Prepared 149 bytes 6e0c80bb42010210: retire_connection_id[0] 6e0c80bb42010210: new_connection_id[3]: 0xf8d167a97797cfb2, bf93b0b40937ec8fb9aba9fcd8f4c214 6e0c80bb42010210: padding, 119 bytes 6e0c80bb42010210: T= 0.816986, cwin: 16943,flight: 183,nb_ret: 6,rtt_min: 31591,rtt: 37488,rtt_var: 12334,max_ack_delay: 0,state: 14 6e0c80bb42010210: Sending 183 bytes to 193.167.100.100:443 at T=0.816986 (1923be53) 6e0c80bb42010210: Receiving 1232 bytes from 193.167.100.100:443 at T=0.818082 (1923c29b) 6e0c80bb42010210: Receiving packet type: 6 (1rtt protected), S0, Q1, 6e0c80bb42010210: , Seq: 2 (2), Phi: 0, 6e0c80bb42010210: Decrypted 1206 bytes 6e0c80bb42010210: handshake_done 6e0c80bb42010210: stream 0, offset 0, length 1203, fin = 0: 1aa7d534cfe2a242... 6e0c80bb42010210: T= 0.818082, cwin: 16943,flight: 183,nb_ret: 6,rtt_min: 31591,rtt: 37488,rtt_var: 12334,max_ack_delay: 0,state: 14 6e0c80bb42010210: Sending packet type: 6 (1rtt protected), S1, Q1, 6e0c80bb42010210: , Seq: 3 (3), Phi: 0, 6e0c80bb42010210: Prepared 21 bytes 6e0c80bb42010210: ack_ecn (nb=0), 0-2, ect0=3, ect1=0, ce=0 6e0c80bb42010210: padding, 13 bytes 6e0c80bb42010210: T= 0.818181, cwin: 16943,flight: 238,nb_ret: 6,rtt_min: 31591,rtt: 37488,rtt_var: 12334,max_ack_delay: 0,state: 14 6e0c80bb42010210: Sending 55 bytes to 193.167.100.100:443 at T=0.818181 (1923c2fe) 6e0c80bb42010210: Receiving 1232 bytes from 193.167.100.100:443 at T=0.819088 (1923c689) 6e0c80bb42010210: Receiving packet type: 6 (1rtt protected), S0, Q1, 6e0c80bb42010210: , Seq: 3 (3), Phi: 0, 6e0c80bb42010210: Decrypted 1206 bytes 6e0c80bb42010210: handshake_done 6e0c80bb42010210: stream 0, offset 1203, length 1201, fin = 0: d894ebeb9d50c857... 6e0c80bb42010210: T= 0.819088, cwin: 16943,flight: 238,nb_ret: 6,rtt_min: 31591,rtt: 37488,rtt_var: 12334,max_ack_delay: 0,state: 14 6e0c80bb42010210: Receiving 1232 bytes from 193.167.100.100:443 at T=0.820098 (1923ca7b) 6e0c80bb42010210: Receiving packet type: 6 (1rtt protected), S0, Q1, 6e0c80bb42010210: , Seq: 4 (4), Phi: 0, 6e0c80bb42010210: Decrypted 1206 bytes 6e0c80bb42010210: handshake_done 6e0c80bb42010210: stream 0, offset 2404, length 1201, fin = 0: 7d278d3e514c1d55... 6e0c80bb42010210: T= 0.820098, cwin: 16943,flight: 238,nb_ret: 6,rtt_min: 31591,rtt: 37488,rtt_var: 12334,max_ack_delay: 0,state: 14 6e0c80bb42010210: Sending packet type: 6 (1rtt protected), S1, Q1, 6e0c80bb42010210: , Seq: 4 (4), Phi: 0, 6e0c80bb42010210: Prepared 21 bytes 6e0c80bb42010210: ack_ecn (nb=0), 0-4, ect0=5, ect1=0, ce=0 6e0c80bb42010210: padding, 13 bytes 6e0c80bb42010210: T= 0.820133, cwin: 16943,flight: 293,nb_ret: 6,rtt_min: 31591,rtt: 37488,rtt_var: 12334,max_ack_delay: 0,state: 14 6e0c80bb42010210: Sending 55 bytes to 193.167.100.100:443 at T=0.820133 (1923ca9e) 6e0c80bb42010210: Receiving 524 bytes from 193.167.100.100:443 at T=0.820540 (1923cc35) 6e0c80bb42010210: Receiving packet type: 6 (1rtt protected), S0, Q1, 6e0c80bb42010210: , Seq: 5 (5), Phi: 0, 6e0c80bb42010210: Decrypted 498 bytes 6e0c80bb42010210: handshake_done 6e0c80bb42010210: stream 0, offset 3605, length 491, fin = 0: f73cb5634f6c5e10... 6e0c80bb42010210: T= 0.820540, cwin: 16943,flight: 293,nb_ret: 6,rtt_min: 31591,rtt: 37488,rtt_var: 12334,max_ack_delay: 0,state: 14 6e0c80bb42010210: Receiving 1057 bytes from 193.167.100.100:443 at T=0.822792 (1923d501) 6e0c80bb42010210: Receiving packet type: 6 (1rtt protected), S0, Q1, 6e0c80bb42010210: , Seq: 6 (6), Phi: 0, 6e0c80bb42010210: Decrypted 1031 bytes 6e0c80bb42010210: handshake_done 6e0c80bb42010210: stream 0, offset 4096, length 1024, fin = 1: 3e0d7e09bb3e51a8... 6e0c80bb42010210: T= 0.822792, cwin: 16943,flight: 293,nb_ret: 6,rtt_min: 31591,rtt: 37488,rtt_var: 12334,max_ack_delay: 0,state: 14 6e0c80bb42010210: All done, Closing the connection. 6e0c80bb42010210: Sending packet type: 6 (1rtt protected), S1, Q1, 6e0c80bb42010210: , Seq: 5 (5), Phi: 0, 6e0c80bb42010210: Prepared 11 bytes 6e0c80bb42010210: ack_ecn (nb=0), 0-6, ect0=7, ect1=0, ce=0 6e0c80bb42010210: application_close, Error 0x0000, Reason length 0 6e0c80bb42010210: Sending 45 bytes to 193.167.100.100:443 at T=0.822857 (1923d542) 6e0c80bb42010210: Received 5120 bytes in 1.121713 seconds, 0.036516 Mbps. 6e0c80bb42010210: Sent 17 bytes in 1.121713 seconds, 0.000121 Mbps.