5e299c71c44f64f9: No root crt list specified -- certificate will not be verified. 5e299c71c44f64f9: Sending ALPN list (1): hq-interop 5e299c71c44f64f9: Sending transport parameter TLS extension (83 bytes): 5e299c71c44f64f9: Extension list (83 bytes): 5e299c71c44f64f9: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 5e299c71c44f64f9: Extension type: 4 (initial_max_data), length 4, 80100000 5e299c71c44f64f9: Extension type: 8 (max_streams_bidi), length 2, 4200 5e299c71c44f64f9: Extension type: 1 (idle_timeout), length 4, 8002bf20 5e299c71c44f64f9: Extension type: 3 (max_packet_size), length 2, 45a0 5e299c71c44f64f9: Extension type: 9 (max_streams_uni), length 2, 4200 5e299c71c44f64f9: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 5e299c71c44f64f9: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 5e299c71c44f64f9: Extension type: 14 (active_connection_id_limit), length 1, 08 5e299c71c44f64f9: Extension type: 11 (max_ack_delay), length 1, 0a 5e299c71c44f64f9: Extension type: 15 (hcid), length 8, 77009a5bc78a6094 5e299c71c44f64f9: Extension type: 2972 (unknown), length 2, 699c 5e299c71c44f64f9: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 5e299c71c44f64f9: Extension type: 29016 (enable_time_stamp), length 1, 03 5e299c71c44f64f9: Extension type: 10930 (grease_quic_bit), length 0 5e299c71c44f64f9: Sending packet type: 2 (initial), S0, Q1, Version 1, 5e299c71c44f64f9: <5e299c71c44f64f9>, <77009a5bc78a6094>, Seq: 99119, pl: 1226 5e299c71c44f64f9: Token length: 0 5e299c71c44f64f9: Prepared 1206 bytes 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: crypto_hs, offset 0, length 283: 010001170303f8bc... 5e299c71c44f64f9: padding, 918 bytes 5e299c71c44f64f9: Sending 1252 bytes to 193.167.100.100:443 at T=0.001790 (18ff36ae) 5e299c71c44f64f9: T= 0.252092, Lost packet type 2, number 99119, size 1236, DCID <>, reason: timer 5e299c71c44f64f9: Sending packet type: 2 (initial), S0, Q1, Version 1, 5e299c71c44f64f9: <5e299c71c44f64f9>, <77009a5bc78a6094>, Seq: 99120, pl: 1226 5e299c71c44f64f9: Token length: 0 5e299c71c44f64f9: Prepared 1206 bytes 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: crypto_hs, offset 0, length 283: 010001170303f8bc... 5e299c71c44f64f9: padding, 918 bytes 5e299c71c44f64f9: Sending 1252 bytes to 193.167.100.100:443 at T=0.252092 (1903086c) 5e299c71c44f64f9: T= 0.752643, Lost packet type 2, number 99120, size 1236, DCID <>, reason: timer 5e299c71c44f64f9: Sending packet type: 2 (initial), S0, Q1, Version 1, 5e299c71c44f64f9: <5e299c71c44f64f9>, <77009a5bc78a6094>, Seq: 99121, pl: 1226 5e299c71c44f64f9: Token length: 0 5e299c71c44f64f9: Prepared 1206 bytes 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: crypto_hs, offset 0, length 283: 010001170303f8bc... 5e299c71c44f64f9: padding, 918 bytes 5e299c71c44f64f9: Sending 1252 bytes to 193.167.100.100:443 at T=0.752643 (190aabb3) 5e299c71c44f64f9: Receiving 1200 bytes from 193.167.100.100:443 at T=0.786429 (190b2fad) 5e299c71c44f64f9: Receiving packet type: 2 (initial), S0, Q1, Version 1, 5e299c71c44f64f9: <77009a5bc78a6094>, , Seq: 2, pl: 1166 5e299c71c44f64f9: Token length: 0 5e299c71c44f64f9: Decrypted 1149 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 99119-99121, ect0=0, ect1=3, ce=0 5e299c71c44f64f9: padding, 1137 bytes 5e299c71c44f64f9: Sending packet type: 2 (initial), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 99122, pl: 1218 5e299c71c44f64f9: Token length: 0 5e299c71c44f64f9: Prepared 1198 bytes 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 2, ect0=1, ect1=0, ce=0 5e299c71c44f64f9: padding, 1188 bytes 5e299c71c44f64f9: Sending 1252 bytes to 193.167.100.100:443 at T=0.837204 (190bf604) 5e299c71c44f64f9: Receiving 1200 bytes from 193.167.100.100:443 at T=0.870878 (190c798e) 5e299c71c44f64f9: Receiving packet type: 2 (initial), S0, Q1, Version 1, 5e299c71c44f64f9: <77009a5bc78a6094>, , Seq: 3, pl: 1166 5e299c71c44f64f9: Token length: 0 5e299c71c44f64f9: Decrypted 1149 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 99119-99122, ect0=0, ect1=4, ce=0 5e299c71c44f64f9: crypto_hs, offset 0, length 123: 0200007703030179... 5e299c71c44f64f9: padding, 1010 bytes 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 0, pl: 21 5e299c71c44f64f9: Prepared 1 bytes 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: Sending 54 bytes to 193.167.100.100:443 at T=0.875168 (190c8a50) 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 1, pl: 21 5e299c71c44f64f9: Prepared 1 bytes 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: Sending 54 bytes to 193.167.100.100:443 at T=0.947150 (190da37e) 5e299c71c44f64f9: Receiving 749 bytes from 193.167.100.100:443 at T=1.035367 (190efc17) 5e299c71c44f64f9: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: <77009a5bc78a6094>, , Seq: 3, pl: 716 5e299c71c44f64f9: Decrypted 699 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 5e299c71c44f64f9: crypto_hs, offset 0, length 684: 08000060005e0000... 5e299c71c44f64f9: Received transport parameter TLS extension (69 bytes): 5e299c71c44f64f9: Extension list (69 bytes): 5e299c71c44f64f9: Extension type: 1 (idle_timeout), length 4, 800493e0 5e299c71c44f64f9: Extension type: 4 (initial_max_data), length 4, 80393870 5e299c71c44f64f9: Extension type: 5 (max_stream_data_bidi_local), length 4, 80393870 5e299c71c44f64f9: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80393870 5e299c71c44f64f9: Extension type: 7 (max_stream_data_uni), length 4, 80393870 5e299c71c44f64f9: Extension type: 8 (max_streams_bidi), length 2, 4064 5e299c71c44f64f9: Extension type: 9 (max_streams_uni), length 2, 4064 5e299c71c44f64f9: Extension type: 14 (active_connection_id_limit), length 1, 03 5e299c71c44f64f9: Extension type: 0 (ocid), length 8, 5e299c71c44f64f9 5e299c71c44f64f9: Extension type: 15 (hcid), length 16, fce9bc91ffb02f0f3c7392a8d7314b9b 5e299c71c44f64f9: Negotiated ALPN: hq-interop 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 2, pl: 67 5e299c71c44f64f9: Prepared 47 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 3, ect0=1, ect1=0, ce=0 5e299c71c44f64f9: crypto_hs, offset 0, length 36: 140000209f367c70... 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 0 (0), Phi: 0, 5e299c71c44f64f9: Prepared 149 bytes 5e299c71c44f64f9: new_connection_id[1]: 0xd02ce2c421336c68, ac81162ba1cec238d0af69d43fe845f7 5e299c71c44f64f9: new_connection_id[2]: 0x444c7e8adc7465cb, e948ca183c591c009c59e8750bdf400e 5e299c71c44f64f9: padding, 93 bytes 5e299c71c44f64f9: T= 1.035542, cwin: 20342,flight: 337,nb_ret: 2,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 283 bytes to 193.167.100.100:443 at T=1.035542 (190efcc6) 5e299c71c44f64f9: Connection established. Version = 1, I-CID: 5e299c71c44f64f9, verified: 1 5e299c71c44f64f9: Preparing GET on stream 0 for /giant-savory-thief 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 1 (1), Phi: 0, 5e299c71c44f64f9: Prepared 149 bytes 5e299c71c44f64f9: stream 0, offset 0, length 25, fin = 1: 474554202f676961... 5e299c71c44f64f9: padding, 121 bytes 5e299c71c44f64f9: T= 1.035672, cwin: 20342,flight: 520,nb_ret: 2,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=1.035672 (190efd48) 5e299c71c44f64f9: Receiving 749 bytes from 193.167.100.100:443 at T=1.035882 (190efe1a) 5e299c71c44f64f9: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: <77009a5bc78a6094>, , Seq: 5, pl: 716 5e299c71c44f64f9: Decrypted 699 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 5e299c71c44f64f9: crypto_hs, offset 0, length 684: 08000060005e0000... 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 3, pl: 150 5e299c71c44f64f9: Prepared 130 bytes 5e299c71c44f64f9: ack_ecn (nb=1), 5, 3, ect0=2, ect1=0, ce=0 5e299c71c44f64f9: padding, 120 bytes 5e299c71c44f64f9: T= 1.035919, cwin: 20342,flight: 703,nb_ret: 2,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=1.035919 (190efe3f) 5e299c71c44f64f9: T= 1.208860, Lost packet type 6, number 0, size 167, DCID , reason: timer 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 2 (2), Phi: 0, 5e299c71c44f64f9: Prepared 149 bytes 5e299c71c44f64f9: new_connection_id[1]: 0xd02ce2c421336c68, ac81162ba1cec238d0af69d43fe845f7 5e299c71c44f64f9: new_connection_id[2]: 0x444c7e8adc7465cb, e948ca183c591c009c59e8750bdf400e 5e299c71c44f64f9: padding, 93 bytes 5e299c71c44f64f9: T= 1.208860, cwin: 20342,flight: 703,nb_ret: 3,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=1.208860 (1911a1cc) 5e299c71c44f64f9: T= 1.382071, Lost packet type 4, number 1, size 38, DCID , reason: timer 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 4, pl: 150 5e299c71c44f64f9: Prepared 130 bytes 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: ack_ecn (nb=1), 5, 3, ect0=2, ect1=0, ce=0 5e299c71c44f64f9: padding, 116 bytes 5e299c71c44f64f9: T= 1.382071, cwin: 20342,flight: 832,nb_ret: 4,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=1.382071 (19144667) 5e299c71c44f64f9: T= 1.555009, Lost packet type 6, number 1, size 167, DCID , reason: timer 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 3 (3), Phi: 0, 5e299c71c44f64f9: Prepared 149 bytes 5e299c71c44f64f9: stream 0, offset 0, length 25, fin = 1: 474554202f676961... 5e299c71c44f64f9: padding, 121 bytes 5e299c71c44f64f9: T= 1.555009, cwin: 20342,flight: 832,nb_ret: 5,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=1.555009 (1916e9f1) 5e299c71c44f64f9: T= 1.728220, Lost packet type 4, number 2, size 84, DCID , reason: timer 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 5, pl: 150 5e299c71c44f64f9: Prepared 130 bytes 5e299c71c44f64f9: crypto_hs, offset 0, length 36: 140000209f367c70... 5e299c71c44f64f9: ack_ecn (nb=1), 5, 3, ect0=2, ect1=0, ce=0 5e299c71c44f64f9: padding, 78 bytes 5e299c71c44f64f9: T= 1.728220, cwin: 20342,flight: 915,nb_ret: 6,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=1.728220 (19198e8c) 5e299c71c44f64f9: T= 1.901158, Lost packet type 6, number 2, size 167, DCID , reason: timer 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 4 (4), Phi: 0, 5e299c71c44f64f9: Prepared 149 bytes 5e299c71c44f64f9: new_connection_id[1]: 0xd02ce2c421336c68, ac81162ba1cec238d0af69d43fe845f7 5e299c71c44f64f9: new_connection_id[2]: 0x444c7e8adc7465cb, e948ca183c591c009c59e8750bdf400e 5e299c71c44f64f9: padding, 93 bytes 5e299c71c44f64f9: T= 1.901158, cwin: 20342,flight: 915,nb_ret: 7,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=1.901158 (191c3216) 5e299c71c44f64f9: T= 2.074369, Lost packet type 4, number 3, size 167, DCID , reason: timer 5e299c71c44f64f9: T= 2.074369, Lost packet type 4, number 4, size 167, DCID , reason: timer 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 6, pl: 150 5e299c71c44f64f9: Prepared 130 bytes 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: ack_ecn (nb=1), 5, 3, ect0=2, ect1=0, ce=0 5e299c71c44f64f9: padding, 116 bytes 5e299c71c44f64f9: T= 2.074369, cwin: 20342,flight: 732,nb_ret: 9,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=2.074369 (191ed6b1) 5e299c71c44f64f9: T= 2.593580, Lost packet type 6, number 3, size 167, DCID , reason: timer 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 5 (5), Phi: 0, 5e299c71c44f64f9: Prepared 149 bytes 5e299c71c44f64f9: stream 0, offset 0, length 25, fin = 1: 474554202f676961... 5e299c71c44f64f9: padding, 121 bytes 5e299c71c44f64f9: T= 2.593580, cwin: 20342,flight: 732,nb_ret: 10,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=2.593580 (1926c2dc) 5e299c71c44f64f9: T= 2.766436, Lost packet type 4, number 5, size 167, DCID , reason: timer 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 7, pl: 150 5e299c71c44f64f9: Prepared 130 bytes 5e299c71c44f64f9: crypto_hs, offset 0, length 36: 140000209f367c70... 5e299c71c44f64f9: ack_ecn (nb=0), 5, ect0=2, ect1=0, ce=0 5e299c71c44f64f9: padding, 80 bytes 5e299c71c44f64f9: T= 2.766436, cwin: 20342,flight: 732,nb_ret: 11,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=2.766436 (19296614) 5e299c71c44f64f9: Receiving 749 bytes from 193.167.100.100:443 at T=3.034213 (192d7c15) 5e299c71c44f64f9: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: <77009a5bc78a6094>, , Seq: 7, pl: 716 5e299c71c44f64f9: Decrypted 699 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 5e299c71c44f64f9: crypto_hs, offset 0, length 684: 08000060005e0000... 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 8, pl: 150 5e299c71c44f64f9: Prepared 130 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 7, ect0=3, ect1=0, ce=0 5e299c71c44f64f9: padding, 122 bytes 5e299c71c44f64f9: T= 3.034313, cwin: 20342,flight: 915,nb_ret: 11,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=3.034313 (192d7c79) 5e299c71c44f64f9: Receiving 749 bytes from 193.167.100.100:443 at T=3.034782 (192d7e4e) 5e299c71c44f64f9: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: <77009a5bc78a6094>, , Seq: 9, pl: 716 5e299c71c44f64f9: Decrypted 699 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 5e299c71c44f64f9: crypto_hs, offset 0, length 684: 08000060005e0000... 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 9, pl: 150 5e299c71c44f64f9: Prepared 130 bytes 5e299c71c44f64f9: ack_ecn (nb=1), 9, 7, ect0=4, ect1=0, ce=0 5e299c71c44f64f9: padding, 120 bytes 5e299c71c44f64f9: T= 3.034851, cwin: 20342,flight: 1098,nb_ret: 11,rtt_min: 33674,rtt: 49575,rtt_var: 41129,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=3.034851 (192d7e93) 5e299c71c44f64f9: Receiving 69 bytes from 193.167.100.100:443 at T=3.130194 (192ef302) 5e299c71c44f64f9: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: <77009a5bc78a6094>, , Seq: 12, pl: 36 5e299c71c44f64f9: Decrypted 19 bytes 5e299c71c44f64f9: ack_ecn (nb=1), 8, 0, ect0=0, ect1=2, ce=0 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: padding, 5 bytes 5e299c71c44f64f9: Receiving 69 bytes from 193.167.100.100:443 at T=3.130263 (192ef347) 5e299c71c44f64f9: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: <77009a5bc78a6094>, , Seq: 14, pl: 36 5e299c71c44f64f9: Decrypted 19 bytes 5e299c71c44f64f9: ack_ecn (nb=1), 8, 0, ect0=0, ect1=2, ce=0 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: padding, 5 bytes 5e299c71c44f64f9: T= 3.130296, Lost packet type 4, number 6, size 167, DCID , reason: repeat 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 10, pl: 150 5e299c71c44f64f9: Prepared 130 bytes 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: ack_ecn (nb=2), 14, 12, 9, ect0=6, ect1=0, ce=0 5e299c71c44f64f9: padding, 117 bytes 5e299c71c44f64f9: T= 3.130296, cwin: 20509,flight: 915,nb_ret: 12,rtt_min: 33674,rtt: 55363,rtt_var: 42423,max_ack_delay: 0,state: 13 5e299c71c44f64f9: T= 3.130296, Lost packet type 4, number 7, size 167, DCID , reason: repeat 5e299c71c44f64f9: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5e299c71c44f64f9: , <77009a5bc78a6094>, Seq: 11, pl: 150 5e299c71c44f64f9: Prepared 130 bytes 5e299c71c44f64f9: crypto_hs, offset 0, length 36: 140000209f367c70... 5e299c71c44f64f9: ack_ecn (nb=2), 14, 12, 9, ect0=6, ect1=0, ce=0 5e299c71c44f64f9: padding, 79 bytes 5e299c71c44f64f9: T= 3.130296, cwin: 20509,flight: 915,nb_ret: 13,rtt_min: 33674,rtt: 55363,rtt_var: 42423,max_ack_delay: 0,state: 13 5e299c71c44f64f9: T= 3.130296, Lost packet type 6, number 4, size 167, DCID , reason: timer 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 6 (6), Phi: 0, 5e299c71c44f64f9: Prepared 149 bytes 5e299c71c44f64f9: new_connection_id[1]: 0xd02ce2c421336c68, ac81162ba1cec238d0af69d43fe845f7 5e299c71c44f64f9: new_connection_id[2]: 0x444c7e8adc7465cb, e948ca183c591c009c59e8750bdf400e 5e299c71c44f64f9: padding, 93 bytes 5e299c71c44f64f9: T= 3.130296, cwin: 20509,flight: 915,nb_ret: 14,rtt_min: 33674,rtt: 55363,rtt_var: 42423,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 549 bytes to 193.167.100.100:443 at T=3.130296 (192ef368) 5e299c71c44f64f9: T= 3.130296, Lost packet type 6, number 5, size 167, DCID , reason: timer 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 7 (7), Phi: 0, 5e299c71c44f64f9: Prepared 149 bytes 5e299c71c44f64f9: stream 0, offset 0, length 25, fin = 1: 474554202f676961... 5e299c71c44f64f9: padding, 121 bytes 5e299c71c44f64f9: T= 3.130296, cwin: 20509,flight: 915,nb_ret: 15,rtt_min: 33674,rtt: 55363,rtt_var: 42423,max_ack_delay: 0,state: 13 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=3.130296 (192ef368) 5e299c71c44f64f9: Receiving 146 bytes from 193.167.100.100:443 at T=3.163127 (192f73a7) 5e299c71c44f64f9: Receiving packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 0 (0), Phi: 0, 5e299c71c44f64f9: Decrypted 120 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 6, ect0=0, ect1=1, ce=0 5e299c71c44f64f9: handshake_done 5e299c71c44f64f9: new_connection_id[1]: 0xee985c649124971ebea6854aeaff4ea7, 1cfb2bd6fa215ec5ee557ace7a5d02e3, retire before: 1 5e299c71c44f64f9: new_connection_id[2]: 0x22a7f4a1a85d53d40f8d0c6350704f53, aa35bc21e4098b64a792db712f42e7c7, retire before: 1 5e299c71c44f64f9: new_connection_id[3]: 0x1d841be715aaa7801031c1240123f6d6, 42d52efa4abe005605401dde8f01141b, retire before: 1 5e299c71c44f64f9: retire_connection_id[0] 5e299c71c44f64f9: T= 3.163127, cwin: 20676,flight: 183,nb_ret: 15,rtt_min: 32831,rtt: 52546,rtt_var: 37450,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S1, Q1, 5e299c71c44f64f9: , Seq: 8 (8), Phi: 0, 5e299c71c44f64f9: Prepared 149 bytes 5e299c71c44f64f9: retire_connection_id[0] 5e299c71c44f64f9: new_connection_id[3]: 0xd94c62090331484c, b695dd4206341195fe0621c00a11b860 5e299c71c44f64f9: padding, 119 bytes 5e299c71c44f64f9: T= 3.163207, cwin: 20676,flight: 366,nb_ret: 15,rtt_min: 32831,rtt: 52546,rtt_var: 37450,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=3.163207 (192f73f7) 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S1, Q1, 5e299c71c44f64f9: , Seq: 9 (9), Phi: 0, 5e299c71c44f64f9: Prepared 21 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 0, ect0=1, ect1=0, ce=0 5e299c71c44f64f9: padding, 12 bytes 5e299c71c44f64f9: T= 3.173195, cwin: 20676,flight: 421,nb_ret: 15,rtt_min: 32831,rtt: 52546,rtt_var: 37450,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending 55 bytes to 193.167.100.100:443 at T=3.173195 (192f9afb) 5e299c71c44f64f9: Receiving 45 bytes from 193.167.100.100:443 at T=3.194545 (192fee61) 5e299c71c44f64f9: Receiving packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 1 (1), Phi: 0, 5e299c71c44f64f9: Decrypted 19 bytes 5e299c71c44f64f9: ack_ecn (nb=1), 8, 6, ect0=0, ect1=2, ce=0 5e299c71c44f64f9: handshake_done 5e299c71c44f64f9: padding, 8 bytes 5e299c71c44f64f9: T= 3.194545, Lost packet type 6, number 7, size 167, DCID , reason: repeat 5e299c71c44f64f9: T= 3.194545, cwin: 20676,flight: 55,nb_ret: 16,rtt_min: 31338,rtt: 49895,rtt_var: 33389,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S1, Q1, 5e299c71c44f64f9: , Seq: 10 (10), Phi: 0, 5e299c71c44f64f9: Prepared 149 bytes 5e299c71c44f64f9: stream 0, offset 0, length 25, fin = 1: 474554202f676961... 5e299c71c44f64f9: padding, 121 bytes 5e299c71c44f64f9: T= 3.194603, cwin: 20676,flight: 238,nb_ret: 16,rtt_min: 31338,rtt: 49895,rtt_var: 33389,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=3.194603 (192fee9b) 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S1, Q1, 5e299c71c44f64f9: , Seq: 11 (11), Phi: 0, 5e299c71c44f64f9: Prepared 21 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 0-1, ect0=2, ect1=0, ce=0 5e299c71c44f64f9: padding, 12 bytes 5e299c71c44f64f9: T= 3.204614, cwin: 20676,flight: 293,nb_ret: 16,rtt_min: 31338,rtt: 49895,rtt_var: 33389,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending 55 bytes to 193.167.100.100:443 at T=3.204614 (193015b6) 5e299c71c44f64f9: Receiving 45 bytes from 193.167.100.100:443 at T=3.302954 (193195da) 5e299c71c44f64f9: Receiving packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 5 (5), Phi: 0, 5e299c71c44f64f9: Decrypted 19 bytes 5e299c71c44f64f9: ack_ecn (nb=1), 8, 6, ect0=0, ect1=2, ce=0 5e299c71c44f64f9: handshake_done 5e299c71c44f64f9: padding, 7 bytes 5e299c71c44f64f9: T= 3.302954, cwin: 20676,flight: 293,nb_ret: 16,rtt_min: 31338,rtt: 49895,rtt_var: 33389,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S1, Q1, 5e299c71c44f64f9: , Seq: 12 (12), Phi: 0, 5e299c71c44f64f9: Prepared 21 bytes 5e299c71c44f64f9: ack_ecn (nb=1), 5, 0-1, ect0=3, ect1=0, ce=0 5e299c71c44f64f9: padding, 11 bytes 5e299c71c44f64f9: T= 3.303037, cwin: 20676,flight: 348,nb_ret: 16,rtt_min: 31338,rtt: 49895,rtt_var: 33389,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending 55 bytes to 193.167.100.100:443 at T=3.303037 (1931962d) 5e299c71c44f64f9: T= 3.478315, Lost packet type 6, number 10, size 167, DCID , reason: timer 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S1, Q1, 5e299c71c44f64f9: , Seq: 13 (13), Phi: 0, 5e299c71c44f64f9: Prepared 149 bytes 5e299c71c44f64f9: stream 0, offset 0, length 25, fin = 1: 474554202f676961... 5e299c71c44f64f9: padding, 121 bytes 5e299c71c44f64f9: T= 3.478315, cwin: 1600,flight: 293,nb_ret: 17,rtt_min: 31338,rtt: 49895,rtt_var: 33389,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending 183 bytes to 193.167.100.100:443 at T=3.478315 (193442db) 5e299c71c44f64f9: Receiving 1063 bytes from 193.167.100.100:443 at T=3.511371 (1934c3fb) 5e299c71c44f64f9: Receiving packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 6 (6), Phi: 0, 5e299c71c44f64f9: Decrypted 1037 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 12-13, ect0=0, ect1=4, ce=0 5e299c71c44f64f9: stream 0, offset 0, length 1024, fin = 0: bff83e9106a4b68f... 5e299c71c44f64f9: T= 3.511371, Lost packet type 6, number 11, size 39, DCID , reason: repeat 5e299c71c44f64f9: T= 3.511371, cwin: 20843,flight: 0,nb_ret: 18,rtt_min: 31338,rtt: 47673,rtt_var: 29485,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S1, Q1, 5e299c71c44f64f9: , Seq: 14 (14), Phi: 0, 5e299c71c44f64f9: Prepared 21 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 5-6, ect0=3, ect1=0, ce=1 5e299c71c44f64f9: padding, 12 bytes 5e299c71c44f64f9: T= 3.521436, cwin: 20843,flight: 55,nb_ret: 18,rtt_min: 31338,rtt: 47673,rtt_var: 29485,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending 55 bytes to 193.167.100.100:443 at T=3.521436 (1934eb4c) 5e299c71c44f64f9: Receiving 45 bytes from 193.167.100.100:443 at T=3.600557 (1936205d) 5e299c71c44f64f9: Receiving packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 9 (9), Phi: 0, 5e299c71c44f64f9: Decrypted 19 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 14, ect0=0, ect1=5, ce=0 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: padding, 9 bytes 5e299c71c44f64f9: T= 3.600557, cwin: 20882,flight: 0,nb_ret: 18,rtt_min: 31338,rtt: 50354,rtt_var: 27475,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S1, Q1, 5e299c71c44f64f9: , Seq: 15 (15), Phi: 0, 5e299c71c44f64f9: Prepared 21 bytes 5e299c71c44f64f9: ack_ecn (nb=1), 9, 6, ect0=4, ect1=0, ce=1 5e299c71c44f64f9: padding, 11 bytes 5e299c71c44f64f9: T= 3.600620, cwin: 20882,flight: 55,nb_ret: 18,rtt_min: 31338,rtt: 50354,rtt_var: 27475,max_ack_delay: 0,state: 14 5e299c71c44f64f9: Sending 55 bytes to 193.167.100.100:443 at T=3.600620 (1936209c) 5e299c71c44f64f9: Receiving 45 bytes from 193.167.100.100:443 at T=3.632027 (19369b4b) 5e299c71c44f64f9: Receiving packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 12 (12), Phi: 0, 5e299c71c44f64f9: Decrypted 19 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 15, ect0=0, ect1=6, ce=0 5e299c71c44f64f9: stream 0, offset 1024, length 0, fin = 1: 5e299c71c44f64f9: padding, 6 bytes 5e299c71c44f64f9: T= 3.632027, cwin: 20921,flight: 0,nb_ret: 18,rtt_min: 31338,rtt: 47985,rtt_var: 25343,max_ack_delay: 0,state: 14 5e299c71c44f64f9: All done, Closing the connection. 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S1, Q1, 5e299c71c44f64f9: , Seq: 16 (16), Phi: 0, 5e299c71c44f64f9: Prepared 13 bytes 5e299c71c44f64f9: ack_ecn (nb=1), 12, 9, ect0=5, ect1=0, ce=1 5e299c71c44f64f9: application_close, Error 0x0000, Reason length 0 5e299c71c44f64f9: Sending 48 bytes to 193.167.100.100:443 at T=3.632188 (19369bec) 5e299c71c44f64f9: Receiving 45 bytes from 193.167.100.100:443 at T=3.869580 (193a3b3c) 5e299c71c44f64f9: Receiving packet type: 6 (1rtt protected), S0, Q1, 5e299c71c44f64f9: , Seq: 20 (20), Phi: 0, 5e299c71c44f64f9: Decrypted 19 bytes 5e299c71c44f64f9: ack_ecn (nb=0), 15, ect0=0, ect1=6, ce=0 5e299c71c44f64f9: ping, 1 bytes 5e299c71c44f64f9: padding, 7 bytes 5e299c71c44f64f9: Sending packet type: 6 (1rtt protected), S1, Q1, 5e299c71c44f64f9: , Seq: 17 (17), Phi: 0, 5e299c71c44f64f9: Prepared 3 bytes 5e299c71c44f64f9: application_close, Error 0x0000, Reason length 0 5e299c71c44f64f9: Sending 38 bytes to 193.167.100.100:443 at T=3.869667 (193a3b93) 5e299c71c44f64f9: Received 1024 bytes in 4.079575 seconds, 0.002008 Mbps. 5e299c71c44f64f9: Sent 25 bytes in 4.079575 seconds, 0.000049 Mbps.