e44ca56f4888c4de: No root crt list specified -- certificate will not be verified. e44ca56f4888c4de: Sending ALPN list (1): hq-interop e44ca56f4888c4de: Sending transport parameter TLS extension (85 bytes): e44ca56f4888c4de: Extension list (85 bytes): e44ca56f4888c4de: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 e44ca56f4888c4de: Extension type: 4 (initial_max_data), length 4, 80100000 e44ca56f4888c4de: Extension type: 8 (max_streams_bidi), length 2, 4200 e44ca56f4888c4de: Extension type: 1 (idle_timeout), length 4, 8002bf20 e44ca56f4888c4de: Extension type: 3 (max_packet_size), length 2, 45a0 e44ca56f4888c4de: Extension type: 9 (max_streams_uni), length 2, 4200 e44ca56f4888c4de: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 e44ca56f4888c4de: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff e44ca56f4888c4de: Extension type: 14 (active_connection_id_limit), length 1, 08 e44ca56f4888c4de: Extension type: 11 (max_ack_delay), length 1, 0a e44ca56f4888c4de: Extension type: 15 (hcid), length 8, 0156a30301305688 e44ca56f4888c4de: Extension type: 7126 (unknown), length 4, 80004ca5 e44ca56f4888c4de: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 e44ca56f4888c4de: Extension type: 29016 (enable_time_stamp), length 1, 03 e44ca56f4888c4de: Extension type: 10930 (grease_quic_bit), length 0 e44ca56f4888c4de: Sending packet type: 2 (initial), S0, Q1, Version 1, e44ca56f4888c4de: , <0156a30301305688>, Seq: 94943, pl: 1226 e44ca56f4888c4de: Token length: 0 e44ca56f4888c4de: Prepared 1206 bytes e44ca56f4888c4de: ping, 1 bytes e44ca56f4888c4de: crypto_hs, offset 0, length 285: 010001190303e44d... e44ca56f4888c4de: padding, 916 bytes e44ca56f4888c4de: Sending 1252 bytes to 193.167.100.100:443 at T=0.001846 (2590b056) e44ca56f4888c4de: Receiving 1200 bytes from 193.167.100.100:443 at T=0.036323 (25913703) e44ca56f4888c4de: Receiving packet type: 2 (initial), S0, Q1, Version 1, e44ca56f4888c4de: <0156a30301305688>, <7e453e2e3428dcf7235b05ec5636819d>, Seq: 0, pl: 156 e44ca56f4888c4de: Token length: 0 e44ca56f4888c4de: Decrypted 139 bytes e44ca56f4888c4de: ack_ecn (nb=0), 94943, ect0=0, ect1=1, ce=0 e44ca56f4888c4de: crypto_hs, offset 0, length 123: 020000770303358c... e44ca56f4888c4de: Receiving packet type: 4 (handshake), S0, Q1, Version 1, e44ca56f4888c4de: <0156a30301305688>, <7e453e2e3428dcf7235b05ec5636819d>, Seq: 0, pl: 977 e44ca56f4888c4de: Decrypted 960 bytes e44ca56f4888c4de: crypto_hs, offset 0, length 687: 08000060005e0000... e44ca56f4888c4de: padding, 269 bytes e44ca56f4888c4de: Received transport parameter TLS extension (69 bytes): e44ca56f4888c4de: Extension list (69 bytes): e44ca56f4888c4de: Extension type: 1 (idle_timeout), length 4, 800493e0 e44ca56f4888c4de: Extension type: 4 (initial_max_data), length 4, 80393870 e44ca56f4888c4de: Extension type: 5 (max_stream_data_bidi_local), length 4, 80393870 e44ca56f4888c4de: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80393870 e44ca56f4888c4de: Extension type: 7 (max_stream_data_uni), length 4, 80393870 e44ca56f4888c4de: Extension type: 8 (max_streams_bidi), length 2, 4064 e44ca56f4888c4de: Extension type: 9 (max_streams_uni), length 2, 4064 e44ca56f4888c4de: Extension type: 14 (active_connection_id_limit), length 1, 03 e44ca56f4888c4de: Extension type: 0 (ocid), length 8, e44ca56f4888c4de e44ca56f4888c4de: Extension type: 15 (hcid), length 16, 7e453e2e3428dcf7235b05ec5636819d e44ca56f4888c4de: Negotiated ALPN: hq-interop e44ca56f4888c4de: Sending packet type: 4 (handshake), S0, Q1, Version 1, e44ca56f4888c4de: <7e453e2e3428dcf7235b05ec5636819d>, <0156a30301305688>, Seq: 0, pl: 67 e44ca56f4888c4de: Prepared 47 bytes e44ca56f4888c4de: ack_ecn (nb=0), 0, ect0=1, ect1=0, ce=0 e44ca56f4888c4de: crypto_hs, offset 0, length 36: 140000204a659346... e44ca56f4888c4de: Sending packet type: 6 (1rtt protected), S0, Q1, e44ca56f4888c4de: <7e453e2e3428dcf7235b05ec5636819d>, Seq: 0 (0), Phi: 0, e44ca56f4888c4de: Prepared 149 bytes e44ca56f4888c4de: new_connection_id[1]: 0x6014e8b109a46717, cdcdb5a25707644da1e98e34c16a7238 e44ca56f4888c4de: new_connection_id[2]: 0xd15d07a384865c45, ab31e2b4de7bac87bafe2dc37118a20a e44ca56f4888c4de: padding, 93 bytes e44ca56f4888c4de: T= 0.036700, cwin: 16596,flight: 283,nb_ret: 0,rtt_min: 34477,rtt: 34477,rtt_var: 17238,max_ack_delay: 0,state: 13 e44ca56f4888c4de: Sending 283 bytes to 193.167.100.100:443 at T=0.036700 (2591387c) e44ca56f4888c4de: Connection established. Version = 1, I-CID: e44ca56f4888c4de, verified: 1 e44ca56f4888c4de: Preparing GET on stream 0 for /jxjuqkltji e44ca56f4888c4de: Sending packet type: 6 (1rtt protected), S0, Q1, e44ca56f4888c4de: <7e453e2e3428dcf7235b05ec5636819d>, Seq: 1 (1), Phi: 0, e44ca56f4888c4de: Prepared 21 bytes e44ca56f4888c4de: stream 0, offset 0, length 17, fin = 1: 474554202f6a786a... e44ca56f4888c4de: padding, 1 bytes e44ca56f4888c4de: T= 0.036895, cwin: 16596,flight: 338,nb_ret: 0,rtt_min: 34477,rtt: 34477,rtt_var: 17238,max_ack_delay: 0,state: 13 e44ca56f4888c4de: Sending 55 bytes to 193.167.100.100:443 at T=0.036895 (2591393f) e44ca56f4888c4de: Receiving 146 bytes from 193.167.100.100:443 at T=0.069039 (2591b6cf) e44ca56f4888c4de: Receiving packet type: 6 (1rtt protected), S0, Q1, e44ca56f4888c4de: <6014e8b109a46717>, Seq: 0 (0), Phi: 0, e44ca56f4888c4de: Decrypted 120 bytes e44ca56f4888c4de: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 e44ca56f4888c4de: handshake_done e44ca56f4888c4de: new_connection_id[1]: 0xc2f589a4b5daae5e4469d8128308f480, ab1abd6b5dacd70dbbf1e7a6b984dd4e, retire before: 1 e44ca56f4888c4de: new_connection_id[2]: 0x668d42bb44f575c860e6949d6a539705, 4aef5c331674ad6746ec0d4800873e88, retire before: 1 e44ca56f4888c4de: new_connection_id[3]: 0x97739db9db780ae9086255a86a8a00ac, 746cf35464ab4c65fb5b1327da2b78fc, retire before: 1 e44ca56f4888c4de: retire_connection_id[0] e44ca56f4888c4de: T= 0.069039, cwin: 16847,flight: 55,nb_ret: 0,rtt_min: 32339,rtt: 34477,rtt_var: 17238,max_ack_delay: 0,state: 14 e44ca56f4888c4de: Sending packet type: 6 (1rtt protected), S1, Q1, e44ca56f4888c4de: , Seq: 2 (2), Phi: 0, e44ca56f4888c4de: Prepared 149 bytes e44ca56f4888c4de: retire_connection_id[0] e44ca56f4888c4de: new_connection_id[3]: 0x17a1e98529fdd7f8, abde954ac3af5764c997e78d688621fd e44ca56f4888c4de: padding, 119 bytes e44ca56f4888c4de: T= 0.069138, cwin: 16847,flight: 238,nb_ret: 0,rtt_min: 32339,rtt: 34477,rtt_var: 17238,max_ack_delay: 0,state: 14 e44ca56f4888c4de: Sending 183 bytes to 193.167.100.100:443 at T=0.069138 (2591b732) e44ca56f4888c4de: Receiving 1064 bytes from 193.167.100.100:443 at T=0.070902 (2591be16) e44ca56f4888c4de: Receiving packet type: 6 (1rtt protected), S0, Q1, e44ca56f4888c4de: <6014e8b109a46717>, Seq: 1 (1), Phi: 0, e44ca56f4888c4de: Decrypted 1038 bytes e44ca56f4888c4de: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 e44ca56f4888c4de: handshake_done e44ca56f4888c4de: stream 0, offset 0, length 1024, fin = 0: f8f27dfdb5fd28b6... e44ca56f4888c4de: T= 0.070902, cwin: 16886,flight: 183,nb_ret: 0,rtt_min: 32339,rtt: 34274,rtt_var: 13463,max_ack_delay: 0,state: 14 e44ca56f4888c4de: Sending packet type: 6 (1rtt protected), S1, Q1, e44ca56f4888c4de: , Seq: 3 (3), Phi: 0, e44ca56f4888c4de: Prepared 21 bytes e44ca56f4888c4de: ack_ecn (nb=0), 0-1, ect0=2, ect1=0, ce=0 e44ca56f4888c4de: padding, 12 bytes e44ca56f4888c4de: T= 0.073149, cwin: 16886,flight: 238,nb_ret: 0,rtt_min: 32339,rtt: 34274,rtt_var: 13463,max_ack_delay: 0,state: 14 e44ca56f4888c4de: Sending 55 bytes to 193.167.100.100:443 at T=0.073149 (2591c6dd) e44ca56f4888c4de: Receiving 45 bytes from 193.167.100.100:443 at T=0.125926 (25929506) e44ca56f4888c4de: Receiving packet type: 6 (1rtt protected), S0, Q1, e44ca56f4888c4de: <6014e8b109a46717>, Seq: 3 (3), Phi: 0, e44ca56f4888c4de: Decrypted 19 bytes e44ca56f4888c4de: ack_ecn (nb=0), 0-2, ect0=0, ect1=3, ce=0 e44ca56f4888c4de: handshake_done e44ca56f4888c4de: padding, 9 bytes e44ca56f4888c4de: T= 0.125926, cwin: 17053,flight: 55,nb_ret: 0,rtt_min: 32339,rtt: 35838,rtt_var: 13225,max_ack_delay: 0,state: 14 e44ca56f4888c4de: Sending packet type: 6 (1rtt protected), S1, Q1, e44ca56f4888c4de: , Seq: 4 (4), Phi: 0, e44ca56f4888c4de: Prepared 21 bytes e44ca56f4888c4de: ack_ecn (nb=1), 3, 0-1, ect0=3, ect1=0, ce=0 e44ca56f4888c4de: padding, 11 bytes e44ca56f4888c4de: T= 0.126011, cwin: 17053,flight: 110,nb_ret: 0,rtt_min: 32339,rtt: 35838,rtt_var: 13225,max_ack_delay: 0,state: 14 e44ca56f4888c4de: Sending 55 bytes to 193.167.100.100:443 at T=0.126011 (2592955b) e44ca56f4888c4de: Receiving 45 bytes from 193.167.100.100:443 at T=0.252209 (25948251) e44ca56f4888c4de: Receiving packet type: 6 (1rtt protected), S0, Q1, e44ca56f4888c4de: <6014e8b109a46717>, Seq: 8 (8), Phi: 0, e44ca56f4888c4de: Decrypted 19 bytes e44ca56f4888c4de: ack_ecn (nb=0), 4, ect0=0, ect1=4, ce=0 e44ca56f4888c4de: ping, 1 bytes e44ca56f4888c4de: padding, 9 bytes e44ca56f4888c4de: T= 0.252209, cwin: 1362,flight: 0,nb_ret: 0,rtt_min: 32339,rtt: 35838,rtt_var: 13225,max_ack_delay: 0,state: 14 e44ca56f4888c4de: Sending packet type: 6 (1rtt protected), S1, Q1, e44ca56f4888c4de: , Seq: 5 (5), Phi: 0, e44ca56f4888c4de: Prepared 21 bytes e44ca56f4888c4de: ack_ecn (nb=2), 8, 3, 0-1, ect0=4, ect1=0, ce=0 e44ca56f4888c4de: padding, 9 bytes e44ca56f4888c4de: T= 0.252261, cwin: 1362,flight: 55,nb_ret: 0,rtt_min: 32339,rtt: 35838,rtt_var: 13225,max_ack_delay: 0,state: 14 e44ca56f4888c4de: Sending 55 bytes to 193.167.100.100:443 at T=0.252261 (25948285) e44ca56f4888c4de: Receiving 45 bytes from 193.167.100.100:443 at T=0.283927 (2594fe37) e44ca56f4888c4de: Receiving packet type: 6 (1rtt protected), S0, Q1, e44ca56f4888c4de: <6014e8b109a46717>, Seq: 9 (9), Phi: 0, e44ca56f4888c4de: Decrypted 19 bytes e44ca56f4888c4de: ack_ecn (nb=0), 5, ect0=0, ect1=5, ce=0 e44ca56f4888c4de: stream 0, offset 1024, length 0, fin = 1: e44ca56f4888c4de: padding, 6 bytes e44ca56f4888c4de: T= 0.283927, cwin: 17092,flight: 0,nb_ret: 0,rtt_min: 31666,rtt: 35316,rtt_var: 10961,max_ack_delay: 0,state: 14 e44ca56f4888c4de: All done, Closing the connection. e44ca56f4888c4de: Sending packet type: 6 (1rtt protected), S1, Q1, e44ca56f4888c4de: , Seq: 6 (6), Phi: 0, e44ca56f4888c4de: Prepared 11 bytes e44ca56f4888c4de: ack_ecn (nb=0), 8-9, ect0=5, ect1=0, ce=0 e44ca56f4888c4de: application_close, Error 0x0000, Reason length 0 e44ca56f4888c4de: Sending 45 bytes to 193.167.100.100:443 at T=0.284034 (2594fea2) e44ca56f4888c4de: Received 1024 bytes in 0.564002 seconds, 0.014525 Mbps. e44ca56f4888c4de: Sent 17 bytes in 0.564002 seconds, 0.000241 Mbps.