0.000 Creating connection with server4:443 with v1 0.084 Setting up connection for downloading https://server4:443/sebylnlwnl at 26:11.573 on ClientConnection[8e0b0370f87e4d6e/a8a293a00d5ecc7e(V1) with server4/193.167.100.100:443] 0.086 Original destination connection id: 8e0b0370f87e4d6e (scid: a8a293a00d5ecc7e) >- CryptoStream[I|ClientHello] 0.267 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 196 millis, based on 0.467/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.262 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.310 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 0.310 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 0.310 Discarding packet (134 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 0.311 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 0.303 <- (5) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 0.322 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 0.523/Initial, because peerAwaitingAddressValidation | RTT:100/25 0.522 loss detection timeout handler running Sending probe 0, because no ack since 0.262. Current RTT: 41/20. 0.523 Sending probe because peer awaiting address validation 0.524 (Probe is Initial ping, because there is no Initial data to retransmit) 0.527 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 241 millis, based on 0.769/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:41/20 0.527 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 0.559 <- (6) Packet I|2|L|55|1 Token=[] AckFrame[1-0|Δ0] 0.562 probe count not reset on ack because handshake not yet confirmed 0.563 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 241 millis, based on 0.805/Initial, because peerAwaitingAddressValidation | RTT:41/20 0.804 loss detection timeout handler running Sending probe 1, because no ack since 0.527. Current RTT: 40/17. 0.804 Sending probe because peer awaiting address validation 0.804 (Probe is Initial ping, because there is no Initial data to retransmit) 0.806 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 431 millis, based on 1.238/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/17 0.805 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 1.053 <- (7) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 1.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 107 millis, based on 1.180/Handshake, because peerAwaitingAddressValidation | RTT:40/17 reschedule loss detection timer for PTO over 107 millis, based on 1.180/Handshake, because peerAwaitingAddressValidation | RTT:40/17 1.072 Discarding pn space Initial because first Handshake message is being sent 1.069 -> Packet I|3|L|1201|2 Token=[] AckFrame[4,2-1|Δ0] Padding(1147) 1.072 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.101 <- (9) Packet H|4|L|177|1 CryptoFrame[0,124] 1.108 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 1.101 <- (10) Packet H|5|L|525|1 CryptoFrame[124,471] 1.112 -> Packet H|0|L|50|1 AckFrame[4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 1.113 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 1.143 <- (11) Packet H|7|L|89|1 CryptoFrame[675,36] -< CryptoStream[H|EncryptedExtensions,Certificate] 1.147 -> Packet H|2|L|52|1 AckFrame[7,5-4|Δ0] 1.179 loss detection timeout handler running 1.179 Sending probe 0. Current RTT: 40/17. 1.179 Sending probe because peer awaiting address validation 1.180 (Probe is a handshake ping) 1.180 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 215 millis, based on 1.396/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/17 1.180 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) 1.195 <- (12) Packet H|8|L|134|1 CryptoFrame[595,80] >- CryptoStream[H|Finished] 1.214 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 215 millis, based on 1.431/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/17 1.214 -> Packet H|4|L|91|2 CryptoFrame[0,36] AckFrame[7,5-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 1.219 Starting downloading https://server4:443/sebylnlwnl at 26:12.725 on ClientConnection[8e0b0370f87e4d6e/a8a293a00d5ecc7e(V1) with server4/193.167.100.100:443] 1.221 -> Packet H|5|L|52|1 AckFrame[8-7,5-4|Δ0] 1.243 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 215 millis, based on 1.459/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/17 1.247 <- (13) Packet A|1|S0|a8a293a00d5ecc7e|40|1 NewTokenFrame[00c1a70064681ba5c4] 1.243 -> Packet A|0|S0|65b762c0215dac92fe9c5451|51|1 StreamFrame[0(CIB),0,17,fin] 1.248 <- (14) Packet A|2|S0|a8a293a00d5ecc7e|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 1.248 <- (15) Packet A|3|S0|a8a293a00d5ecc7e|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 1.254 -> Packet A|1|S0|65b762c0215dac92fe9c5451|36|1 AckFrame[2-1|Δ1] 1.248 <- (16) Packet A|4|S0|a8a293a00d5ecc7e|61|1 NewConnectionIdFrame[1,<0|9f3e972b58fcf0cde2d42c58|bc0c947127dab75285e27d15eac8e2e1] 1.259 -> Packet A|2|S0|65b762c0215dac92fe9c5451|36|1 AckFrame[4-1|Δ4] 1.299 <- (17) Packet A|6|S0|a8a293a00d5ecc7e|35|1 AckFrame[0|Δ25] 1.300 probe count not reset on ack because handshake not yet confirmed 1.300 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 215 millis, based on 1.516/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:40/17 1.406 <- (18) Packet A|7|S0|a8a293a00d5ecc7e|30|1 HandshakeDoneFrame[] 1.407 State is set to Confirmed reschedule loss detection timer for PTO over 27 millis, based on 1.434/Handshake, because ackElicitingInFlight | RTT:42/17 1.407 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.407 Discarding pn space Handshake because HandshakeDone is received 1.406 <- (19) Packet A|8|S0|a8a293a00d5ecc7e|40|1 NewTokenFrame[00c1a70064681ba5c4] 1.408 -> Packet A|3|S0|65b762c0215dac92fe9c5451|37|1 AckFrame[8-6,4-1|Δ0] 1.669 <- (20) Packet A|13|S0|a8a293a00d5ecc7e|30|1 HandshakeDoneFrame[] 1.669 <- (21) Packet A|14|S0|a8a293a00d5ecc7e|40|1 NewTokenFrame[00c1a70064681ba5c4] 1.670 -> Packet A|4|S0|65b762c0215dac92fe9c5451|39|1 AckFrame[14-13,8-6,4-1|Δ0] 1.830 <- (22) Packet A|16|S0|a8a293a00d5ecc7e|1057|1 StreamFrame[0(CIB),0,1024,fin] 1.831 <- (23) Packet A|17|S0|a8a293a00d5ecc7e|1057|1 StreamFrame[0(CIB),0,1024,fin] 1.833 -> Packet A|5|S0|65b762c0215dac92fe9c5451|41|1 AckFrame[17-16,14-13,8-6,4-1|Δ0] 1.833 Finished downloading https://server4:443/sebylnlwnl at 26:13.340 on ClientConnection[8e0b0370f87e4d6e/a8a293a00d5ecc7e(V1) with server4/193.167.100.100:443] 1.835 Closing ClientConnection[8e0b0370f87e4d6e/a8a293a00d5ecc7e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 1.837 Creating connection with server4:443 with v1 1.838 Setting up connection for downloading https://server4:443/olbjvycgqq at 26:13.344 on ClientConnection[d6f3458d039f74c1/ee1789956e99dd42(V1) with server4/193.167.100.100:443] 1.838 Original destination connection id: d6f3458d039f74c1 (scid: ee1789956e99dd42) 1.836 -> Packet A|6|S0|65b762c0215dac92fe9c5451|45|2 ConnectionCloseFrame[0|0|] AckFrame[17-16,14-13,8-6,4-1|Δ0] >- CryptoStream[I|ClientHello] 1.841 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.041/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 1.841 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.040 loss detection timeout handler running Sending probe 0, because no ack since 1.841. Current RTT: 100/25. 2.040 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.041 (Probe is an initial retransmit) 2.042 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.442/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.042 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.076 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 2.077 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 2.077 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 2.077 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[1|Δ1] 2.078 probe count not reset on ack because handshake not yet confirmed 2.079 Retransmitting CryptoFrame[0,257] on level Initial 2.080 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.480/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.080 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 2.080 Cwnd(-): 6000; inflight: 1200 2.081 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 2.481/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.480 loss detection timeout handler running Sending probe 1, because no ack since 2.080. Current RTT: 34/17. 2.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 2.480 (Probe is an initial retransmit) 2.481 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 2.889/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.481 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 2.482 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 2.890/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.482 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 2.828 <- (5) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 2.832 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.934/Handshake, because peerAwaitingAddressValidation | RTT:34/17 2.832 Discarding pn space Initial because first Handshake message is being sent 2.832 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 2.934/Handshake, because peerAwaitingAddressValidation | RTT:34/17 2.832 -> Packet I|5|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1147) 2.934 loss detection timeout handler running 2.934 Sending probe 0. Current RTT: 34/17. 2.934 Sending probe because peer awaiting address validation 2.934 (Probe is a handshake ping) 2.935 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 3.139/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.935 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 2.966 <- (6) Packet H|6|L|54|1 AckFrame[0|Δ0] 2.966 probe count not reset on ack because handshake not yet confirmed 2.966 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.977 <- (7) Packet H|7|L|177|1 CryptoFrame[0,124] 2.978 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 2.977 <- (8) Packet H|8|L|525|1 CryptoFrame[124,471] 2.978 -> Packet H|1|L|50|1 AckFrame[7-6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 2.979 -> Packet H|2|L|50|1 AckFrame[8-6|Δ0] 3.010 <- (9) Packet H|9|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 3.010 <- (10) Packet H|10|L|89|1 CryptoFrame[674,36] 3.012 -> Packet H|3|L|50|1 AckFrame[9-6|Δ0] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 179 millis, based on 3.193/Handshake, because ackElicitingInFlight | RTT:34/14 3.013 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[9-6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.014 Starting downloading https://server4:443/olbjvycgqq at 26:14.521 on ClientConnection[d6f3458d039f74c1/ee1789956e99dd42(V1) with server4/193.167.100.100:443] 3.010 <- (11) Packet H|11|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.015 -> Packet H|5|L|50|1 AckFrame[10-6|Δ0] 3.016 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 177 millis, based on 3.193/Handshake, because ackElicitingInFlight | RTT:34/14 3.016 -> [Packet H|6|L|50|1 AckFrame[11-6|Δ0], Packet A|0|S0|e6ef6c0f700cce080f78fdd0|51|1 StreamFrame[0(CIB),0,17,fin]] 3.044 <- (12) Packet A|8|S0|ee1789956e99dd42|40|1 NewTokenFrame[00c1a70064681ba5c6] 3.045 <- (13) Packet A|9|S0|ee1789956e99dd42|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 3.045 <- (14) Packet A|10|S0|ee1789956e99dd42|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.046 -> Packet A|1|S0|e6ef6c0f700cce080f78fdd0|35|1 AckFrame[9-8|Δ0] 3.066 -> Packet A|2|S0|e6ef6c0f700cce080f78fdd0|36|1 AckFrame[10-8|Δ19] 3.077 <- (15) Packet A|12|S0|ee1789956e99dd42|30|1 HandshakeDoneFrame[] 3.078 State is set to Confirmed reschedule loss detection timer for PTO over 115 millis, based on 3.193/Handshake, because ackElicitingInFlight | RTT:34/14 reschedule loss detection timer for PTO over 52 millis, based on 3.131/App, because ackElicitingInFlight | RTT:34/14 3.078 Discarding pn space Handshake because HandshakeDone is received 3.097 -> Packet A|3|S0|e6ef6c0f700cce080f78fdd0|38|1 AckFrame[12,10-8|Δ19] 3.128 <- (16) Packet A|13|S0|ee1789956e99dd42|61|1 NewConnectionIdFrame[1,<0|372986d172cea7869470e989|5e32bb24c2779d3114318ab8c53a9d62] 3.130 loss detection timeout handler running Sending probe 0, because no ack since 3.016. Current RTT: 34/14. 3.130 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 229 millis, based on 3.361/App, because ackElicitingInFlight | RTT:34/14 3.131 -> Packet PA|4|S0|e6ef6c0f700cce080f78fdd0|51|1 StreamFrame[0(CIB),0,17,fin] 3.149 -> Packet A|5|S0|e6ef6c0f700cce080f78fdd0|38|1 AckFrame[13-12,10-8|Δ19] 3.258 <- (17) Packet A|16|S0|ee1789956e99dd42|61|1 NewConnectionIdFrame[1,<0|372986d172cea7869470e989|5e32bb24c2779d3114318ab8c53a9d62] 3.278 -> Packet A|6|S0|e6ef6c0f700cce080f78fdd0|40|1 AckFrame[16,13-12,10-8|Δ19] 3.310 <- (18) Packet A|18|S0|ee1789956e99dd42|1057|1 StreamFrame[0(CIB),0,1024,fin] 3.311 Finished downloading https://server4:443/olbjvycgqq at 26:14.817 on ClientConnection[d6f3458d039f74c1/ee1789956e99dd42(V1) with server4/193.167.100.100:443] 3.311 Closing ClientConnection[d6f3458d039f74c1/ee1789956e99dd42(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.311 -> Packet A|7|S0|e6ef6c0f700cce080f78fdd0|45|2 ConnectionCloseFrame[0|0|] AckFrame[18,16,13-12,10-8|Δ0] 3.311 Creating connection with server4:443 with v1 3.312 Setting up connection for downloading https://server4:443/gjjxmktydd at 26:14.819 on ClientConnection[3c1d7f1632b8d81b/04b1a78d81f2d868(V1) with server4/193.167.100.100:443] 3.312 Original destination connection id: 3c1d7f1632b8d81b (scid: 04b1a78d81f2d868) >- CryptoStream[I|ClientHello] 3.314 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.514/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.314 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.348 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 3.352 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.552/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.352 Discarding pn space Initial because first Handshake message is being sent 3.353 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.553/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.348 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 3.353 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 3.353 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 3.354 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.354 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 3.399 <- (19) Packet A|19|S0|ee1789956e99dd42|1057|1 StreamFrame[0(CIB),0,1024,fin] 3.400 -> Packet A|8|S0|e6ef6c0f700cce080f78fdd0|45|2 ConnectionCloseFrame[0|0|] AckFrame[18,16,13-12,10-8|Δ0] 3.442 <- (4) Packet H|4|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 3.443 -> Packet H|1|L|52|1 AckFrame[4,0|Δ0] 3.474 <- (5) Packet H|6|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions,Certificate] 3.474 -> Packet H|2|L|54|1 AckFrame[6,4,0|Δ0] 3.552 loss detection timeout handler running 3.552 Sending probe 0. Current RTT: 100/25. 3.552 Sending probe because peer awaiting address validation 3.552 (Probe is a handshake ping) 3.553 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.953/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.553 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) 3.559 <- (6) Packet H|7|L|133|1 CryptoFrame[595,79] >- CryptoStream[H|Finished] 3.563 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.563 -> Packet H|4|L|94|2 CryptoFrame[0,36] AckFrame[6,4,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.564 Starting downloading https://server4:443/gjjxmktydd at 26:15.070 on ClientConnection[3c1d7f1632b8d81b/04b1a78d81f2d868(V1) with server4/193.167.100.100:443] 3.559 <- (7) Packet H|8|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.564 -> Packet H|5|L|54|1 AckFrame[7-6,4,0|Δ0] 3.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 3.965/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.565 -> [Packet H|6|L|54|1 AckFrame[8-6,4,0|Δ0], Packet A|0|S0|f799f0e5c2671b1a4f25213c|51|1 StreamFrame[0(CIB),0,17,fin]] 3.594 <- (8) Packet A|1|S0|04b1a78d81f2d868|40|1 NewTokenFrame[00c1a70064681ba5c7] 3.594 <- (9) Packet A|8|S0|04b1a78d81f2d868|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 3.595 <- (10) Packet H|10|L|57|1 AckFrame[4-3,1-0|Δ0] 3.596 -> Packet A|1|S0|f799f0e5c2671b1a4f25213c|37|1 AckFrame[8,1|Δ0] 3.596 probe count not reset on ack because handshake not yet confirmed 3.597 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 3.597 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 3.595 <- (11) Packet A|10|S0|04b1a78d81f2d868|61|1 NewConnectionIdFrame[1,<0|c12706880342b5a4c757b378|9f69448ed6329c51554565b725469a61] 3.617 -> Packet A|2|S0|f799f0e5c2671b1a4f25213c|40|1 AckFrame[10,8,1|Δ19] 3.627 <- (12) Packet A|13|S0|04b1a78d81f2d868|30|1 HandshakeDoneFrame[] 3.627 State is set to Confirmed reschedule loss detection timer for PTO over 179 millis, based on 3.807/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 58 millis, based on 3.686/App, because ackElicitingInFlight | RTT:32/16 3.627 Discarding pn space Handshake because HandshakeDone is received 3.647 -> Packet A|3|S0|f799f0e5c2671b1a4f25213c|42|1 AckFrame[13,10,8,1|Δ19] 3.678 <- (13) Packet A|14|S0|04b1a78d81f2d868|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.679 <- (14) Packet A|15|S0|04b1a78d81f2d868|1057|1 StreamFrame[0(CIB),0,1024,fin] 3.679 Finished downloading https://server4:443/gjjxmktydd at 26:15.186 on ClientConnection[3c1d7f1632b8d81b/04b1a78d81f2d868(V1) with server4/193.167.100.100:443] 3.679 -> Packet A|4|S0|f799f0e5c2671b1a4f25213c|41|1 AckFrame[15-13,10,8,1|Δ0] 3.680 Closing ClientConnection[3c1d7f1632b8d81b/04b1a78d81f2d868(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.680 Creating connection with server4:443 with v1 3.680 -> Packet A|5|S0|f799f0e5c2671b1a4f25213c|45|2 ConnectionCloseFrame[0|0|] AckFrame[15-13,10,8,1|Δ0] 3.681 Setting up connection for downloading https://server4:443/csdqzyfwkf at 26:15.187 on ClientConnection[68e65853ed843853/194abd6fcf70e468(V1) with server4/193.167.100.100:443] 3.681 Original destination connection id: 68e65853ed843853 (scid: 194abd6fcf70e468) >- CryptoStream[I|ClientHello] 3.683 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.883/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.683 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.882 loss detection timeout handler running Sending probe 0, because no ack since 3.683. Current RTT: 100/25. 3.882 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.882 (Probe is an initial retransmit) 3.883 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.283/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.883 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.282 loss detection timeout handler running Sending probe 1, because no ack since 3.883. Current RTT: 100/25. 4.282 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.282 (Probe is an initial retransmit) 4.283 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.083/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.283 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.284 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.084/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.284 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.317 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 4.318 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 4.318 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 4.318 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[2|Δ1] 4.318 probe count not reset on ack because handshake not yet confirmed 4.319 Retransmitting CryptoFrame[0,257] on level Initial 4.319 Cwnd(-): 6000; inflight: 1200 4.319 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 5.119/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.319 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 4.727/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.318 <- (5) Packet I|2|L|55|1 Token=[] AckFrame[3-2|Δ0] 4.319 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 4.319 probe count not reset on ack because handshake not yet confirmed 4.319 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 4.727/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.351 <- (6) Packet I|3|L|55|1 Token=[] AckFrame[4-2|Δ0] 4.351 probe count not reset on ack because handshake not yet confirmed 4.351 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 343 millis, based on 4.696/Initial, because peerAwaitingAddressValidation | RTT:34/13 4.695 loss detection timeout handler running Sending probe 2, because no ack since 4.319. Current RTT: 34/11. 4.695 Sending probe because peer awaiting address validation 4.695 (Probe is Initial ping, because there is no Initial data to retransmit) 4.696 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 623 millis, based on 5.320/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 4.695 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 5.068 <- (7) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 5.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 5.150/Handshake, because peerAwaitingAddressValidation | RTT:34/11 5.072 Discarding pn space Initial because first Handshake message is being sent 5.072 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.072 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) reschedule loss detection timer for PTO over 77 millis, based on 5.150/Handshake, because peerAwaitingAddressValidation | RTT:34/11 5.072 -> Packet I|6|L|1201|2 Token=[] AckFrame[4-1|Δ0] Padding(1149) 5.149 loss detection timeout handler running 5.150 Sending probe 0. Current RTT: 34/11. 5.150 Sending probe because peer awaiting address validation 5.150 (Probe is a handshake ping) 5.150 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 155 millis, based on 5.306/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 5.150 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 5.181 <- (9) Packet H|4|L|177|1 CryptoFrame[0,124] 5.182 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 5.182 <- (10) Packet H|5|L|525|1 CryptoFrame[124,471] 5.183 -> Packet H|1|L|50|1 AckFrame[4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 5.183 -> Packet H|2|L|50|1 AckFrame[5-4|Δ0] 5.214 <- (11) Packet H|7|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 5.216 -> Packet H|3|L|52|1 AckFrame[7,5-4|Δ0] 5.306 loss detection timeout handler running Sending probe 1, because no ack since 5.150. Current RTT: 34/11. 5.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 5.306 (Probe is a handshake ping) 5.306 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 311 millis, based on 5.618/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 5.306 -> Packet PH|4|L|48|2 PingFrame[] Padding(2) 5.307 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 311 millis, based on 5.619/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 5.307 -> Packet PH|5|L|48|2 PingFrame[] Padding(2) 5.312 <- (12) Packet H|9|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 5.312 <- (13) Packet H|10|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 5.312 -> Packet H|6|L|54|1 AckFrame[9,7,5-4|Δ0] 5.313 -> Packet H|7|L|54|1 AckFrame[10-9,7,5-4|Δ0] 5.337 <- (14) Packet H|11|L|56|1 AckFrame[4,1-0|Δ0] 5.337 probe count not reset on ack because handshake not yet confirmed reschedule loss detection timer for PTO over 281 millis, based on 5.619/Handshake, because ackElicitingInFlight | RTT:34/11 5.425 <- (15) Packet H|14|L|89|1 CryptoFrame[674,36] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 279 millis, based on 5.706/Handshake, because ackElicitingInFlight | RTT:34/9 5.426 -> Packet H|8|L|94|2 CryptoFrame[0,36] AckFrame[11-9,7,5|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.426 <- (16) Packet H|15|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.428 Starting downloading https://server4:443/csdqzyfwkf at 26:16.934 on ClientConnection[68e65853ed843853/194abd6fcf70e468(V1) with server4/193.167.100.100:443] 5.428 -> Packet H|9|L|56|1 AckFrame[15-14,11-9,7,5|Δ0] 5.429 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 277 millis, based on 5.706/Handshake, because ackElicitingInFlight | RTT:34/9 5.429 -> Packet A|0|S0|398bf97df08877f36a87d30a|51|1 StreamFrame[0(CIB),0,17,fin] 5.587 <- (17) Packet H|16|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.587 <- (18) Packet H|17|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.588 -> Packet H|10|L|56|1 AckFrame[16-14,11-9,7,5|Δ0] 5.588 -> Packet H|11|L|56|1 AckFrame[17-14,11-9,7,5|Δ0] 5.706 loss detection timeout handler running Sending probe 2, because no ack since 5.426. Current RTT: 34/9. 5.706 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 5.706 (Probe is a handshake retransmit) 5.707 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 559 millis, based on 6.267/Handshake, because ackElicitingInFlight | RTT:34/9 5.707 -> Packet PH|12|L|84|1 CryptoFrame[0,36] 5.708 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 559 millis, based on 6.268/Handshake, because ackElicitingInFlight | RTT:34/9 5.708 -> Packet PH|13|L|84|1 CryptoFrame[0,36] 5.738 <- (19) Packet A|0|S0|194abd6fcf70e468|30|1 HandshakeDoneFrame[] 5.739 State is set to Confirmed reschedule loss detection timer for PTO over 449 millis, based on 6.189/App, because ackElicitingInFlight | RTT:34/9 reschedule loss detection timer for PTO over -215 millis, based on 5.524/App, because ackElicitingInFlight | RTT:34/9 5.739 Discarding pn space Handshake because HandshakeDone is received 5.739 loss detection timeout handler running Sending probe 0, because no ack since 5.429. Current RTT: 34/9. 5.740 (Probe is retransmit on level App) 5.739 <- (20) Packet A|9|S0|194abd6fcf70e468|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 189 millis, based on 5.930/App, because ackElicitingInFlight | RTT:34/9 5.740 -> Packet PA|1|S0|398bf97df08877f36a87d30a|51|1 StreamFrame[0(CIB),0,17,fin] 5.739 <- (21) Packet A|10|S0|194abd6fcf70e468|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 5.741 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 5.740 -> Packet A|2|S0|398bf97df08877f36a87d30a|37|1 AckFrame[9,0|Δ0] 5.739 <- (23) Packet A|11|S0|194abd6fcf70e468|61|1 NewConnectionIdFrame[1,<0|094f8dd2344e7272085323e5|0ce24d28dfbd412ed55572e60e288403] 5.741 -> Packet A|3|S0|398bf97df08877f36a87d30a|37|1 AckFrame[11-9,0|Δ0] 5.772 <- (24) Packet A|12|S0|194abd6fcf70e468|1057|1 StreamFrame[0(CIB),0,1024,fin] 5.772 <- (25) Packet A|13|S0|194abd6fcf70e468|40|1 NewTokenFrame[00c1a70064681ba5c9] 5.772 Finished downloading https://server4:443/csdqzyfwkf at 26:17.279 on ClientConnection[68e65853ed843853/194abd6fcf70e468(V1) with server4/193.167.100.100:443] 5.773 Closing ClientConnection[68e65853ed843853/194abd6fcf70e468(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.773 -> Packet A|4|S0|398bf97df08877f36a87d30a|37|1 AckFrame[13-9,0|Δ0] 5.773 -> Packet A|5|S0|398bf97df08877f36a87d30a|41|2 ConnectionCloseFrame[0|0|] AckFrame[13-9,0|Δ0] 5.773 Creating connection with server4:443 with v1 5.774 Setting up connection for downloading https://server4:443/oqasnqntxo at 26:17.280 on ClientConnection[d8b46e18d165c760/0d2bc8c260c86b60(V1) with server4/193.167.100.100:443] 5.774 Original destination connection id: d8b46e18d165c760 (scid: 0d2bc8c260c86b60) >- CryptoStream[I|ClientHello] 5.776 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.976/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.776 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.796 <- (26) Packet A|14|S0|194abd6fcf70e468|35|1 AckFrame[3-1|Δ25] 5.797 -> Packet A|6|S0|398bf97df08877f36a87d30a|41|2 ConnectionCloseFrame[0|0|] AckFrame[13-9,0|Δ0] 5.810 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 5.813 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.014/Handshake, because peerAwaitingAddressValidation | RTT:100/25 5.814 Discarding pn space Initial because first Handshake message is being sent 5.814 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.014/Handshake, because peerAwaitingAddressValidation | RTT:100/25 5.810 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 5.814 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 5.814 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 5.810 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 5.815 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 5.815 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 5.815 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] 5.827 <- (27) Packet A|15|S0|194abd6fcf70e468|33|1 ConnectionCloseFrame[0|0|] 5.920 <- (5) Packet H|4|L|177|1 CryptoFrame[0,124] -< CryptoStream[H|EncryptedExtensions,Certificate] 5.921 <- (6) Packet H|5|L|525|1 CryptoFrame[124,471] 5.921 -> Packet H|2|L|52|1 AckFrame[4,1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 5.921 -> Packet H|3|L|52|1 AckFrame[5-4,1-0|Δ0] 5.952 <- (7) Packet H|6|L|132|1 CryptoFrame[595,78] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 5.955 -> Packet H|4|L|52|1 AckFrame[6-4,1-0|Δ0] 6.013 loss detection timeout handler running 6.013 Sending probe 0. Current RTT: 100/25. 6.013 Sending probe because peer awaiting address validation 6.013 (Probe is a handshake ping) 6.013 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.414/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.013 -> Packet PH|5|L|48|2 PingFrame[] Padding(2) 6.036 <- (8) Packet H|9|L|89|1 CryptoFrame[673,36] >- CryptoStream[H|Finished] 6.037 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.437/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.037 -> Packet H|6|L|91|2 CryptoFrame[0,36] AckFrame[6-4,1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.038 Starting downloading https://server4:443/oqasnqntxo at 26:17.545 on ClientConnection[d8b46e18d165c760/0d2bc8c260c86b60(V1) with server4/193.167.100.100:443] 6.038 -> Packet H|7|L|54|1 AckFrame[9,6-4,1-0|Δ0] 6.039 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 6.439/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.039 -> Packet A|0|S0|1a189a46e78e0b367fb12f79|51|1 StreamFrame[0(CIB),0,17,fin] 6.121 <- (9) Packet H|12|L|89|1 CryptoFrame[673,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.122 -> Packet H|8|L|56|1 AckFrame[12,9,6-4,1-0|Δ0] 6.438 loss detection timeout handler running Sending probe 1, because no ack since 6.037. Current RTT: 100/25. 6.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 6.438 (Probe is a handshake retransmit) 6.439 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 7.239/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.439 -> Packet PH|9|L|84|1 CryptoFrame[0,36] 6.440 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 7.240/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.440 -> Packet PH|10|L|84|1 CryptoFrame[0,36] 6.470 <- (10) Packet A|1|S0|0d2bc8c260c86b60|40|1 NewTokenFrame[00c1a70064681ba5c9] 6.470 <- (11) Packet A|2|S0|0d2bc8c260c86b60|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 6.471 <- (12) Packet A|3|S0|0d2bc8c260c86b60|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.471 -> Packet A|1|S0|1a189a46e78e0b367fb12f79|35|1 AckFrame[2-1|Δ0] 6.471 <- (13) Packet H|13|L|56|1 AckFrame[9-8,5-2|Δ0] 6.472 probe count not reset on ack because handshake not yet confirmed 6.472 Retransmitting CryptoFrame[0,36] on level Handshake 6.472 Cwnd(-): 6000; inflight: 135 6.472 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 767 millis, based on 7.240/Handshake, because ackElicitingInFlight | RTT:100/25 6.472 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 799 millis, based on 7.272/Handshake, because ackElicitingInFlight | RTT:32/16 6.472 -> Packet H|11|L|84|1 CryptoFrame[0,36] 6.471 <- (14) Packet A|4|S0|0d2bc8c260c86b60|61|1 NewConnectionIdFrame[1,<0|9ca58cc9a7d0686aed977268|d5ca3bc223af4fc25fb344847fd1df0f] 6.471 <- (15) Packet H|14|L|56|1 AckFrame[10-8,5-2|Δ0] 6.473 -> Packet A|2|S0|1a189a46e78e0b367fb12f79|36|1 AckFrame[4-1|Δ1] 6.473 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 95 millis, based on 6.568/Handshake, because ackElicitingInFlight | RTT:32/16 6.503 <- (16) Packet H|15|L|56|1 AckFrame[11-8,5-2|Δ0] 6.503 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 6.504 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 6.540 <- (17) Packet A|5|S0|0d2bc8c260c86b60|30|1 HandshakeDoneFrame[] 6.540 State is set to Confirmed reschedule loss detection timer for PTO over -404 millis, based on 6.136/App, because ackElicitingInFlight | RTT:32/10 6.540 loss detection timeout handler running reschedule loss detection timer for PTO over -404 millis, based on 6.136/App, because ackElicitingInFlight | RTT:32/10 6.540 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 6.039. Current RTT: 32/10. 6.540 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 193 millis, based on 6.735/App, because ackElicitingInFlight | RTT:32/10 6.541 -> Packet PA|3|S0|1a189a46e78e0b367fb12f79|51|1 StreamFrame[0(CIB),0,17,fin] 6.560 -> Packet A|4|S0|1a189a46e78e0b367fb12f79|36|1 AckFrame[5-1|Δ19] 6.597 <- (18) Packet A|12|S0|0d2bc8c260c86b60|35|1 AckFrame[3-1|Δ25] 6.598 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.598 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 88 millis, based on 6.687/App, because ackElicitingInFlight | RTT:32/8 6.598 -> Packet A|5|S0|1a189a46e78e0b367fb12f79|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] 6.655 <- (19) Packet A|13|S0|0d2bc8c260c86b60|37|1 AckFrame[5,3-1|Δ25] 6.655 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.716 <- (20) Packet A|15|S0|0d2bc8c260c86b60|1057|1 StreamFrame[0(CIB),0,1024,fin] 6.717 Finished downloading https://server4:443/oqasnqntxo at 26:18.224 on ClientConnection[d8b46e18d165c760/0d2bc8c260c86b60(V1) with server4/193.167.100.100:443] 6.717 Closing ClientConnection[d8b46e18d165c760/0d2bc8c260c86b60(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.717 -> Packet A|6|S0|1a189a46e78e0b367fb12f79|41|2 ConnectionCloseFrame[0|0|] AckFrame[15,13-12|Δ0] 6.718 Creating connection with server4:443 with v1 6.718 Setting up connection for downloading https://server4:443/pyfgvkwujg at 26:18.225 on ClientConnection[a22acaf680a354aa/3b91843adb85df98(V1) with server4/193.167.100.100:443] 6.718 Original destination connection id: a22acaf680a354aa (scid: 3b91843adb85df98) >- CryptoStream[I|ClientHello] 6.724 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.924/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.724 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.748 <- (21) Packet A|16|S0|0d2bc8c260c86b60|33|1 ConnectionCloseFrame[0|0|] 6.923 loss detection timeout handler running Sending probe 0, because no ack since 6.724. Current RTT: 100/25. 6.923 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 6.924 (Probe is an initial retransmit) 6.924 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 7.324/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.924 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.323 loss detection timeout handler running Sending probe 1, because no ack since 6.924. Current RTT: 100/25. 7.323 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 7.323 (Probe is an initial retransmit) 7.324 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.124/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.323 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.325 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 8.125/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.325 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.358 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 7.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.563/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.363 Discarding pn space Initial because first Handshake message is being sent 7.363 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.563/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.363 -> Packet I|4|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 7.359 <- (2) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|] 7.359 <- (3) Packet H|2|L|132|1 CryptoFrame[595,78] -< CryptoStream[H|] 7.359 <- (4) Packet H|3|L|89|1 CryptoFrame[673,36] -< CryptoStream[H|] 7.364 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 7.364 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.364 -> Packet H|1|L|50|1 AckFrame[3-1|Δ0] 7.477 <- (6) Packet H|5|L|177|1 CryptoFrame[0,124] 7.478 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] 7.481 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.681/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.481 -> Packet H|2|L|89|2 CryptoFrame[0,36] AckFrame[3-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.481 Starting downloading https://server4:443/pyfgvkwujg at 26:18.988 on ClientConnection[a22acaf680a354aa/3b91843adb85df98(V1) with server4/193.167.100.100:443] 7.477 <- (7) Packet H|6|L|177|1 CryptoFrame[0,124] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.482 -> Packet H|3|L|52|1 AckFrame[5,3-1|Δ0] 7.482 -> Packet H|4|L|52|1 AckFrame[6-5,3-1|Δ0] 7.482 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.682/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.482 -> Packet A|0|S0|1f402045c178417d266f319f|51|1 StreamFrame[0(CIB),0,17,fin] 7.512 <- (8) Packet A|0|S0|3b91843adb85df98|30|1 HandshakeDoneFrame[] 7.512 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 7.681/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 7.707/App, because ackElicitingInFlight | RTT:100/25 7.513 Discarding pn space Handshake because HandshakeDone is received 7.512 <- (9) Packet A|1|S0|3b91843adb85df98|40|1 NewTokenFrame[00c1a70064681ba5cb] 7.513 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 7.513 -> Packet A|1|S0|1f402045c178417d266f319f|35|1 AckFrame[1-0|Δ0] 7.513 <- (11) Packet A|4|S0|3b91843adb85df98|61|1 NewConnectionIdFrame[1,<0|880e7f9cef6d72c0152ee6cb|cfbc87fbb8a7142f4169c1905f419d99] 7.533 -> Packet A|2|S0|1f402045c178417d266f319f|38|1 AckFrame[4,1-0|Δ19] 7.538 <- (12) Packet A|6|S0|3b91843adb85df98|35|1 AckFrame[0|Δ25] 7.539 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 7.620 <- (13) Packet A|10|S0|3b91843adb85df98|40|1 NewTokenFrame[00c1a70064681ba5cb] 7.640 -> Packet A|3|S0|1f402045c178417d266f319f|42|1 AckFrame[10,6,4,1-0|Δ19] 7.671 <- (14) Packet A|11|S0|3b91843adb85df98|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 7.671 <- (15) Packet A|12|S0|3b91843adb85df98|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.672 <- (16) Packet A|13|S0|3b91843adb85df98|1057|1 StreamFrame[0(CIB),0,1024,fin] 7.672 -> Packet A|4|S0|1f402045c178417d266f319f|41|1 AckFrame[12-10,6,4,1-0|Δ0] 7.673 Finished downloading https://server4:443/pyfgvkwujg at 26:19.179 on ClientConnection[a22acaf680a354aa/3b91843adb85df98(V1) with server4/193.167.100.100:443] 7.673 Closing ClientConnection[a22acaf680a354aa/3b91843adb85df98(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.674 Creating connection with server4:443 with v1 7.673 -> Packet A|5|S0|1f402045c178417d266f319f|45|2 ConnectionCloseFrame[0|0|] AckFrame[13-10,6,4,1-0|Δ0] 7.674 Setting up connection for downloading https://server4:443/aursqphzxq at 26:19.181 on ClientConnection[05f2de2b1745943c/584a0f9c32473902(V1) with server4/193.167.100.100:443] 7.674 Original destination connection id: 05f2de2b1745943c (scid: 584a0f9c32473902) >- CryptoStream[I|ClientHello] 7.676 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.876/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.676 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.704 <- (17) Packet A|14|S0|3b91843adb85df98|33|1 ConnectionCloseFrame[0|0|] 7.710 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 7.713 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.913/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.713 Discarding pn space Initial because first Handshake message is being sent 7.714 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.914/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.714 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 7.710 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 7.714 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 7.711 <- (3) Packet H|2|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|EncryptedExtensions] 7.711 <- (4) Packet H|3|L|89|1 CryptoFrame[675,36] 7.715 -> Packet H|0|L|50|1 AckFrame[0|Δ0] -< CryptoStream[H|EncryptedExtensions] 7.715 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.715 -> Packet H|1|L|52|1 AckFrame[2,0|Δ0] 7.715 -> Packet H|2|L|52|1 AckFrame[3-2,0|Δ0] 7.752 <- (6) Packet H|4|L|525|1 CryptoFrame[124,471] >- CryptoStream[H|Finished] 7.755 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.955/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.755 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[3-2,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.756 Starting downloading https://server4:443/aursqphzxq at 26:19.262 on ClientConnection[05f2de2b1745943c/584a0f9c32473902(V1) with server4/193.167.100.100:443] 7.756 -> Packet H|4|L|52|1 AckFrame[4-2,0|Δ0] 7.756 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.956/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.756 -> Packet A|0|S0|f78594609240156c78af0ca1|51|1 StreamFrame[0(CIB),0,17,fin] 7.955 loss detection timeout handler running Sending probe 0, because no ack since 7.755. Current RTT: 100/25. 7.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 7.956 (Probe is a handshake retransmit) 7.956 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.356/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.956 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 7.988 <- (7) Packet A|0|S0|584a0f9c32473902|30|1 HandshakeDoneFrame[] 7.988 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 8.206/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 7.981/App, because ackElicitingInFlight | RTT:100/25 7.988 Discarding pn space Handshake because HandshakeDone is received 7.988 loss detection timeout handler running Sending probe 0, because no ack since 7.756. Current RTT: 100/25. 7.988 <- (8) Packet A|9|S0|584a0f9c32473902|291|1 CryptoFrame[257,257] 7.988 (Probe is retransmit on level App) -< CryptoStream[A|] 7.988 <- (9) Packet A|10|S0|584a0f9c32473902|61|1 NewConnectionIdFrame[1,<0|d9de1beb67567b48465f4048|997b29dbf665143ff392ef74a03af110] reschedule loss detection timer for PTO over 449 millis, based on 8.439/App, because ackElicitingInFlight | RTT:100/25 7.989 -> Packet PA|1|S0|f78594609240156c78af0ca1|51|1 StreamFrame[0(CIB),0,17,fin] 7.989 -> Packet A|2|S0|f78594609240156c78af0ca1|37|1 AckFrame[10-9,0|Δ0] 7.989 <- (10) Packet A|11|S0|584a0f9c32473902|1057|1 StreamFrame[0(CIB),0,1024,fin] 7.989 <- (11) Packet A|12|S0|584a0f9c32473902|37|1 AckFrame[0|Δ201] 7.990 Finished downloading https://server4:443/aursqphzxq at 26:19.496 on ClientConnection[05f2de2b1745943c/584a0f9c32473902(V1) with server4/193.167.100.100:443] 7.990 Closing ClientConnection[05f2de2b1745943c/584a0f9c32473902(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 223 millis, based on 8.214/App, because ackElicitingInFlight | RTT:100/25 7.990 -> Packet A|3|S0|f78594609240156c78af0ca1|41|2 ConnectionCloseFrame[0|0|] AckFrame[12-9,0|Δ0] 7.991 Creating connection with server4:443 with v1 7.991 Setting up connection for downloading https://server4:443/cwvwnduema at 26:19.498 on ClientConnection[f646a3a82e97bcdb/01035108b6e37d8c(V1) with server4/193.167.100.100:443] 7.991 Original destination connection id: f646a3a82e97bcdb (scid: 01035108b6e37d8c) >- CryptoStream[I|ClientHello] 7.993 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.193/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.992 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.020 <- (12) Packet A|13|S0|584a0f9c32473902|40|1 NewTokenFrame[00c1a70064681ba5cb] 8.021 -> Packet A|4|S0|f78594609240156c78af0ca1|41|2 ConnectionCloseFrame[0|0|] AckFrame[12-9,0|Δ0] 8.026 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 8.027 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 8.027 Discarding packet (134 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 8.027 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 8.027 <- (5) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ0] 8.028 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.228/Initial, because peerAwaitingAddressValidation | RTT:100/25 8.046 <- (13) Packet A|15|S0|584a0f9c32473902|35|1 AckFrame[2-0|Δ26] 8.047 -> Packet A|5|S0|f78594609240156c78af0ca1|41|2 ConnectionCloseFrame[0|0|] AckFrame[12-9,0|Δ0] 8.227 loss detection timeout handler running Sending probe 0, because no ack since 7.992. Current RTT: 34/17. 8.227 Sending probe because peer awaiting address validation 8.227 (Probe is Initial ping, because there is no Initial data to retransmit) 8.227 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 8.431/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 8.227 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 8.259 <- (6) Packet I|2|L|55|1 Token=[] AckFrame[1-0|Δ0] 8.260 probe count not reset on ack because handshake not yet confirmed 8.260 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 8.464/Initial, because peerAwaitingAddressValidation | RTT:34/17 8.463 loss detection timeout handler running Sending probe 1, because no ack since 8.227. Current RTT: 34/14. 8.463 Sending probe because peer awaiting address validation 8.463 (Probe is Initial ping, because there is no Initial data to retransmit) 8.463 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 8.823/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 8.463 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 8.777 <- (7) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 8.780 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 8.870/Handshake, because peerAwaitingAddressValidation | RTT:34/14 8.780 Discarding pn space Initial because first Handshake message is being sent 8.780 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 8.780 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 8.870/Handshake, because peerAwaitingAddressValidation | RTT:34/14 8.780 -> Packet I|3|L|1201|2 Token=[] AckFrame[4,2-1|Δ0] Padding(1147) 8.812 <- (9) Packet H|4|L|177|1 CryptoFrame[0,124] 8.813 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 8.813 <- (10) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 8.814 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 8.814 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 8.845 <- (11) Packet H|6|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 8.847 -> Packet H|2|L|50|1 AckFrame[6-4|Δ0] 8.869 loss detection timeout handler running 8.869 Sending probe 0. Current RTT: 34/14. 8.869 Sending probe because peer awaiting address validation 8.869 (Probe is a handshake ping) 8.870 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 179 millis, based on 9.050/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 8.870 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) 8.900 <- (12) Packet H|8|L|56|1 AckFrame[3-2,0|Δ0] 8.901 probe count not reset on ack because handshake not yet confirmed 8.901 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 8.926 <- (13) Packet H|9|L|89|1 CryptoFrame[675,36] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 163 millis, based on 9.091/Handshake, because ackElicitingInFlight | RTT:34/12 8.927 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[8|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.927 Starting downloading https://server4:443/cwvwnduema at 26:20.434 on ClientConnection[f646a3a82e97bcdb/01035108b6e37d8c(V1) with server4/193.167.100.100:443] 8.926 <- (14) Packet H|10|L|89|1 CryptoFrame[675,36] 8.927 -> Packet H|5|L|50|1 AckFrame[9-8|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 8.928 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 162 millis, based on 9.091/Handshake, because ackElicitingInFlight | RTT:34/12 8.928 -> [Packet H|6|L|50|1 AckFrame[10-8|Δ0], Packet A|0|S0|8a68fbc6888c792db36466db|51|1 StreamFrame[0(CIB),0,17,fin]] 8.958 <- (15) Packet A|1|S0|01035108b6e37d8c|40|1 NewTokenFrame[00c1a70064681ba5cc] 8.958 <- (16) Packet H|11|L|56|1 AckFrame[4-2,0|Δ0] 8.959 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 8.959 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 8.960 <- (17) Packet A|5|S0|01035108b6e37d8c|1057|1 StreamFrame[0(CIB),0,1024,fin] 8.960 -> Packet A|1|S0|8a68fbc6888c792db36466db|38|1 AckFrame[5,1|Δ1] 8.960 Finished downloading https://server4:443/cwvwnduema at 26:20.467 on ClientConnection[f646a3a82e97bcdb/01035108b6e37d8c(V1) with server4/193.167.100.100:443] 8.960 Closing ClientConnection[f646a3a82e97bcdb/01035108b6e37d8c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.961 -> Packet A|2|S0|8a68fbc6888c792db36466db|41|2 ConnectionCloseFrame[0|0|] AckFrame[5,1|Δ0] 8.961 Creating connection with server4:443 with v1 8.962 Setting up connection for downloading https://server4:443/wcozmauilo at 26:20.468 on ClientConnection[1681508649fa5c22/87018891f6bc15b5(V1) with server4/193.167.100.100:443] 8.962 Original destination connection id: 1681508649fa5c22 (scid: 87018891f6bc15b5) >- CryptoStream[I|ClientHello] 8.963 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.163/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.963 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.984 <- (18) Packet A|6|S0|01035108b6e37d8c|35|1 AckFrame[0|Δ25] 8.985 -> Packet A|3|S0|8a68fbc6888c792db36466db|41|2 ConnectionCloseFrame[0|0|] AckFrame[5,1|Δ0] 8.992 <- (19) Packet A|7|S0|01035108b6e37d8c|33|1 ConnectionCloseFrame[0|0|] 8.997 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 9.000 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.200/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.000 Discarding pn space Initial because first Handshake message is being sent 9.000 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.200/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.000 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 8.997 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 9.001 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 8.998 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 9.001 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 8.998 <- (4) Packet H|2|L|134|1 CryptoFrame[595,80] 9.002 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 8.998 <- (5) Packet H|3|L|89|1 CryptoFrame[675,36] 9.004 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 9.004 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.204/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.004 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.005 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.005 Starting downloading https://server4:443/wcozmauilo at 26:20.511 on ClientConnection[1681508649fa5c22/87018891f6bc15b5(V1) with server4/193.167.100.100:443] 9.005 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 9.006 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.206/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.006 -> Packet A|0|S0|ffbd325d6ff55b03495ec6d8|51|1 StreamFrame[0(CIB),0,17,fin] 9.035 <- (7) Packet A|0|S0|87018891f6bc15b5|30|1 HandshakeDoneFrame[] 9.036 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 9.204/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 9.231/App, because ackElicitingInFlight | RTT:100/25 9.036 Discarding pn space Handshake because HandshakeDone is received 9.036 <- (8) Packet A|2|S0|87018891f6bc15b5|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 9.036 <- (9) Packet A|3|S0|87018891f6bc15b5|291|1 CryptoFrame[257,257] 9.037 -> Packet A|1|S0|ffbd325d6ff55b03495ec6d8|37|1 AckFrame[2,0|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.037 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 9.037 <- (11) Packet A|12|S0|87018891f6bc15b5|1057|1 StreamFrame[0(CIB),0,1024,fin] 9.038 Finished downloading https://server4:443/wcozmauilo at 26:20.544 on ClientConnection[1681508649fa5c22/87018891f6bc15b5(V1) with server4/193.167.100.100:443] 9.038 -> Packet A|2|S0|ffbd325d6ff55b03495ec6d8|39|1 AckFrame[12,3-2,0|Δ0] 9.038 Closing ClientConnection[1681508649fa5c22/87018891f6bc15b5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.038 -> Packet A|3|S0|ffbd325d6ff55b03495ec6d8|43|2 ConnectionCloseFrame[0|0|] AckFrame[12,3-2,0|Δ0] 9.038 Creating connection with server4:443 with v1 9.039 Setting up connection for downloading https://server4:443/njpayutxyu at 26:20.545 on ClientConnection[394eb2c2831c8182/a3b4c99455197a4a(V1) with server4/193.167.100.100:443] 9.039 Original destination connection id: 394eb2c2831c8182 (scid: a3b4c99455197a4a) >- CryptoStream[I|ClientHello] 9.040 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.240/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.040 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.062 <- (12) Packet A|13|S0|87018891f6bc15b5|35|1 AckFrame[0|Δ25] 9.062 -> Packet A|4|S0|ffbd325d6ff55b03495ec6d8|43|2 ConnectionCloseFrame[0|0|] AckFrame[12,3-2,0|Δ0] 9.069 <- (13) Packet A|15|S0|87018891f6bc15b5|33|1 ConnectionCloseFrame[0|0|] 9.074 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 9.077 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.277/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.077 Discarding pn space Initial because first Handshake message is being sent 9.074 <- (2) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|] 9.075 <- (3) Packet H|2|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|] 9.075 <- (4) Packet H|3|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|] 9.079 Packet not sent because keys are discarded: Packet I|1|L|.|2 Token=[] AckFrame[0|Δ0] Padding(1099) 9.079 -> Packet H|0|L|50|1 AckFrame[3-1|Δ0] 9.110 <- (5) Packet H|4|L|177|1 CryptoFrame[0,124] 9.110 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] 9.113 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.313/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.113 -> Packet H|1|L|89|2 CryptoFrame[0,36] AckFrame[3-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.113 Starting downloading https://server4:443/njpayutxyu at 26:20.620 on ClientConnection[394eb2c2831c8182/a3b4c99455197a4a(V1) with server4/193.167.100.100:443] 9.113 -> Packet H|2|L|50|1 AckFrame[4-1|Δ0] 9.114 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.314/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.114 -> Packet A|0|S0|5d95607dbc8677bb51efd217|51|1 StreamFrame[0(CIB),0,17,fin] 9.144 <- (6) Packet A|0|S0|a3b4c99455197a4a|30|1 HandshakeDoneFrame[] 9.144 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 9.313/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 9.339/App, because ackElicitingInFlight | RTT:100/25 9.145 Discarding pn space Handshake because HandshakeDone is received 9.144 <- (7) Packet A|8|S0|a3b4c99455197a4a|40|1 NewTokenFrame[00c1a70064681ba5cc] 9.144 <- (8) Packet A|9|S0|a3b4c99455197a4a|290|1 CryptoFrame[0,257] 9.145 -> Packet A|1|S0|5d95607dbc8677bb51efd217|37|1 AckFrame[8,0|Δ0] -< CryptoStream[A|NewSessionTicket] 9.145 <- (9) Packet A|10|S0|a3b4c99455197a4a|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.145 <- (10) Packet A|11|S0|a3b4c99455197a4a|61|1 NewConnectionIdFrame[1,<0|be6c565ef6840b883ac0100a|21139ca84c73c6cedac54a19aef97797] 9.146 -> Packet A|2|S0|5d95607dbc8677bb51efd217|37|1 AckFrame[10-8,0|Δ0] 9.165 -> Packet A|3|S0|5d95607dbc8677bb51efd217|38|1 AckFrame[11-8,0|Δ19] 9.170 <- (11) Packet A|13|S0|a3b4c99455197a4a|35|1 AckFrame[0|Δ25] 9.171 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 9.468 <- (12) Packet A|16|S0|a3b4c99455197a4a|1057|1 StreamFrame[0(CIB),0,1024,fin] 9.468 Finished downloading https://server4:443/njpayutxyu at 26:20.975 on ClientConnection[394eb2c2831c8182/a3b4c99455197a4a(V1) with server4/193.167.100.100:443] 9.469 Closing ClientConnection[394eb2c2831c8182/a3b4c99455197a4a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.468 <- (13) Packet A|17|S0|a3b4c99455197a4a|1057|1 StreamFrame[0(CIB),0,1024,fin] 9.469 Creating connection with server4:443 with v1 9.469 -> Packet A|4|S0|5d95607dbc8677bb51efd217|49|3 ConnectionCloseFrame[0|0|] AckFrame[16,13,11-8,0|Δ0] ConnectionCloseFrame[0|0|] 9.470 Setting up connection for downloading https://server4:443/podrwxevut at 26:20.976 on ClientConnection[32c1fdb53e9204cb/97c1042a7e283a73(V1) with server4/193.167.100.100:443] 9.470 Original destination connection id: 32c1fdb53e9204cb (scid: 97c1042a7e283a73) >- CryptoStream[I|ClientHello] 9.471 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.671/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.471 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.500 <- (14) Packet A|18|S0|a3b4c99455197a4a|33|1 ConnectionCloseFrame[0|0|] 9.670 loss detection timeout handler running Sending probe 0, because no ack since 9.471. Current RTT: 100/25. 9.671 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.671 (Probe is an initial retransmit) 9.671 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.071/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.671 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.705 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 9.708 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.908/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.708 Discarding pn space Initial because first Handshake message is being sent 9.708 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.908/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.705 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 9.708 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 9.709 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 9.705 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 9.709 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.710 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 9.710 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] 9.814 <- (5) Packet H|4|L|177|1 CryptoFrame[0,124] -< CryptoStream[H|EncryptedExtensions,Certificate] 9.814 <- (6) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 9.814 -> Packet H|2|L|52|1 AckFrame[4,1-0|Δ0] 9.815 -> Packet H|3|L|52|1 AckFrame[5-4,1-0|Δ0] 9.846 <- (7) Packet H|6|L|132|1 CryptoFrame[595,78] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 9.846 <- (8) Packet H|7|L|89|1 CryptoFrame[673,36] 9.848 -> Packet H|4|L|52|1 AckFrame[6-4,1-0|Δ0] >- CryptoStream[H|Finished] 9.849 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.049/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.848 -> Packet H|5|L|91|2 CryptoFrame[0,36] AckFrame[6-4,1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.849 Starting downloading https://server4:443/podrwxevut at 26:21.355 on ClientConnection[32c1fdb53e9204cb/97c1042a7e283a73(V1) with server4/193.167.100.100:443] 9.850 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.050/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.850 -> [Packet H|6|L|52|1 AckFrame[7-4,1-0|Δ0], Packet A|0|S0|68054de7d0af948418c00fcb|51|1 StreamFrame[0(CIB),0,17,fin]] 9.880 <- (9) Packet A|0|S0|97c1042a7e283a73|30|1 HandshakeDoneFrame[] 9.881 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 10.048/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 10.075/App, because ackElicitingInFlight | RTT:100/25 9.881 Discarding pn space Handshake because HandshakeDone is received 9.880 <- (10) Packet A|3|S0|97c1042a7e283a73|40|1 NewTokenFrame[00c1a70064681ba5cd] 9.881 <- (11) Packet A|5|S0|97c1042a7e283a73|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 9.881 -> Packet A|1|S0|68054de7d0af948418c00fcb|37|1 AckFrame[3,0|Δ0] 9.881 <- (12) Packet A|6|S0|97c1042a7e283a73|61|1 NewConnectionIdFrame[1,<0|16e7f2df98257710a4f5dca1|8cd3d2c960d3a8f160e59640780fb90a] 9.882 -> Packet A|2|S0|68054de7d0af948418c00fcb|39|1 AckFrame[6-5,3,0|Δ0] 9.882 <- (13) Packet A|7|S0|97c1042a7e283a73|1057|1 StreamFrame[0(CIB),0,1024,fin] 9.883 Finished downloading https://server4:443/podrwxevut at 26:21.389 on ClientConnection[32c1fdb53e9204cb/97c1042a7e283a73(V1) with server4/193.167.100.100:443] 9.883 Closing ClientConnection[32c1fdb53e9204cb/97c1042a7e283a73(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.883 Creating connection with server4:443 with v1 9.883 -> Packet A|3|S0|68054de7d0af948418c00fcb|43|2 ConnectionCloseFrame[0|0|] AckFrame[7-5,3,0|Δ0] 9.884 Setting up connection for downloading https://server4:443/ocaaqbwijf at 26:21.390 on ClientConnection[904ed8bdd31e48b5/a7072879cd683182(V1) with server4/193.167.100.100:443] 9.884 Original destination connection id: 904ed8bdd31e48b5 (scid: a7072879cd683182) >- CryptoStream[I|ClientHello] 9.886 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.086/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.885 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.914 <- (14) Packet A|9|S0|97c1042a7e283a73|33|1 ConnectionCloseFrame[0|0|] 9.919 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 9.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.122/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.922 Discarding pn space Initial because first Handshake message is being sent 9.922 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.122/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.919 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 9.922 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 9.922 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 9.920 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 9.923 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 9.920 <- (4) Packet H|2|L|133|1 CryptoFrame[595,79] 9.923 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 9.920 <- (5) Packet H|3|L|89|1 CryptoFrame[674,36] 9.925 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 9.925 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.125/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.925 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.926 Starting downloading https://server4:443/ocaaqbwijf at 26:21.432 on ClientConnection[904ed8bdd31e48b5/a7072879cd683182(V1) with server4/193.167.100.100:443] 9.926 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 9.926 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.926 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) reschedule loss detection timer for PTO over 199 millis, based on 10.126/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.926 -> Packet A|0|S0|ea4d06c9c76817694b395bd5|51|1 StreamFrame[0(CIB),0,17,fin] 9.956 <- (7) Packet A|0|S0|a7072879cd683182|30|1 HandshakeDoneFrame[] 9.957 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 10.125/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 10.151/App, because ackElicitingInFlight | RTT:100/25 9.957 Discarding pn space Handshake because HandshakeDone is received 9.957 <- (8) Packet A|6|S0|a7072879cd683182|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 9.958 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 9.957 <- (10) Packet A|8|S0|a7072879cd683182|61|1 NewConnectionIdFrame[1,<0|e5bac898ca7319d19a93e2d2|5a7afda5435fcc5370848792eabdffdd] 9.958 -> Packet A|1|S0|ea4d06c9c76817694b395bd5|37|1 AckFrame[6,0|Δ0] 9.977 -> Packet A|2|S0|ea4d06c9c76817694b395bd5|40|1 AckFrame[8,6,0|Δ19] 9.983 <- (11) Packet A|10|S0|a7072879cd683182|35|1 AckFrame[0|Δ25] 9.983 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.008 <- (12) Packet A|11|S0|a7072879cd683182|40|1 NewTokenFrame[00c1a70064681ba5cd] 10.015 <- (13) Packet A|12|S0|a7072879cd683182|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.015 -> Packet A|3|S0|ea4d06c9c76817694b395bd5|42|1 AckFrame[12-10,8,6,0|Δ6] 10.047 <- (14) Packet A|13|S0|a7072879cd683182|1057|1 StreamFrame[0(CIB),0,1024,fin] 10.048 Finished downloading https://server4:443/ocaaqbwijf at 26:21.554 on ClientConnection[904ed8bdd31e48b5/a7072879cd683182(V1) with server4/193.167.100.100:443] 10.048 Closing ClientConnection[904ed8bdd31e48b5/a7072879cd683182(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.048 -> Packet A|4|S0|ea4d06c9c76817694b395bd5|45|2 ConnectionCloseFrame[0|0|] AckFrame[13-10,8,6,0|Δ0] 10.048 Creating connection with server4:443 with v1 10.049 Setting up connection for downloading https://server4:443/teypgaxqkd at 26:21.555 on ClientConnection[f36fa7290cea223e/440f5028de1e2031(V1) with server4/193.167.100.100:443] 10.049 Original destination connection id: f36fa7290cea223e (scid: 440f5028de1e2031) >- CryptoStream[I|ClientHello] 10.050 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.250/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.050 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.079 <- (15) Packet A|14|S0|a7072879cd683182|33|1 ConnectionCloseFrame[0|0|] 10.083 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 10.086 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.286/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.086 Discarding pn space Initial because first Handshake message is being sent 10.087 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.287/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.084 <- (2) Packet H|1|L|525|1 CryptoFrame[124,471] 10.086 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) -< CryptoStream[H|] 10.084 <- (3) Packet H|2|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|] 10.087 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 10.084 <- (4) Packet H|3|L|89|1 CryptoFrame[675,36] -< CryptoStream[H|] 10.087 -> Packet H|1|L|50|1 AckFrame[2-1|Δ0] 10.087 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.087 -> Packet H|2|L|50|1 AckFrame[3-1|Δ0] 10.119 <- (6) Packet H|4|L|177|1 CryptoFrame[0,124] 10.120 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] 10.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.322/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.122 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[3-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.122 Starting downloading https://server4:443/teypgaxqkd at 26:21.629 on ClientConnection[f36fa7290cea223e/440f5028de1e2031(V1) with server4/193.167.100.100:443] 10.122 -> Packet H|4|L|50|1 AckFrame[4-1|Δ0] 10.123 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.323/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.123 -> Packet A|0|S0|22d6135c9d49ea432ed61a5f|51|1 StreamFrame[0(CIB),0,17,fin] 10.322 loss detection timeout handler running Sending probe 0, because no ack since 10.122. Current RTT: 100/25. 10.322 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.322 (Probe is a handshake retransmit) 10.323 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 10.723/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.323 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 10.355 <- (7) Packet A|1|S0|440f5028de1e2031|40|1 NewTokenFrame[00c1a70064681ba5cd] 10.355 <- (8) Packet A|2|S0|440f5028de1e2031|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 10.355 <- (9) Packet A|3|S0|440f5028de1e2031|291|1 CryptoFrame[257,257] 10.356 -> Packet A|1|S0|22d6135c9d49ea432ed61a5f|35|1 AckFrame[2-1|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.356 <- (10) Packet A|5|S0|440f5028de1e2031|1057|1 StreamFrame[0(CIB),0,1024,fin] 10.357 -> Packet A|2|S0|22d6135c9d49ea432ed61a5f|37|1 AckFrame[5,3-1|Δ0] 10.357 Finished downloading https://server4:443/teypgaxqkd at 26:21.863 on ClientConnection[f36fa7290cea223e/440f5028de1e2031(V1) with server4/193.167.100.100:443] 10.357 Closing ClientConnection[f36fa7290cea223e/440f5028de1e2031(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.357 Creating connection with server4:443 with v1 10.357 -> Packet A|3|S0|22d6135c9d49ea432ed61a5f|41|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-1|Δ0] 10.358 Setting up connection for downloading https://server4:443/vtvpqgsczq at 26:21.864 on ClientConnection[1222d4f97284f835/86dc418f9d869583(V1) with server4/193.167.100.100:443] 10.358 Original destination connection id: 1222d4f97284f835 (scid: 86dc418f9d869583) >- CryptoStream[I|ClientHello] 10.360 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.560/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.359 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.393 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) 10.394 <- (11) Packet A|7|S0|440f5028de1e2031|30|1 HandshakeDoneFrame[] 10.394 -> Packet A|4|S0|22d6135c9d49ea432ed61a5f|41|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-1|Δ0] -< CryptoStream[I|ServerHello] 10.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.596/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.396 Discarding pn space Initial because first Handshake message is being sent 10.396 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.596/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.396 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 10.393 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 10.396 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 10.394 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 10.397 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 10.394 <- (4) Packet H|2|L|132|1 CryptoFrame[595,78] 10.397 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 10.394 <- (5) Packet H|3|L|89|1 CryptoFrame[673,36] 10.400 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 10.400 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.600/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.400 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.400 Starting downloading https://server4:443/vtvpqgsczq at 26:21.907 on ClientConnection[1222d4f97284f835/86dc418f9d869583(V1) with server4/193.167.100.100:443] 10.400 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.400 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 10.401 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.601/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.401 -> Packet A|0|S0|dca6dbb54e5f01809f4e3b30|51|1 StreamFrame[0(CIB),0,17,fin] 10.425 <- (12) Packet A|12|S0|440f5028de1e2031|33|1 ConnectionCloseFrame[0|0|] 10.431 <- (7) Packet A|1|S0|86dc418f9d869583|40|1 NewTokenFrame[00c1a70064681ba5cd] 10.431 <- (8) Packet A|2|S0|86dc418f9d869583|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 10.432 <- (9) Packet A|6|S0|86dc418f9d869583|291|1 CryptoFrame[257,257] 10.432 -> Packet A|1|S0|dca6dbb54e5f01809f4e3b30|35|1 AckFrame[2-1|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.432 <- (10) Packet H|4|L|56|1 AckFrame[3,1-0|Δ0] 10.433 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 10.433 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 10.452 -> Packet A|2|S0|dca6dbb54e5f01809f4e3b30|38|1 AckFrame[6,2-1|Δ19] 10.483 <- (11) Packet A|8|S0|86dc418f9d869583|30|1 HandshakeDoneFrame[] 10.483 State is set to Confirmed reschedule loss detection timer for PTO over 38 millis, based on 10.522/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 38 millis, based on 10.522/App, because ackElicitingInFlight | RTT:32/16 10.483 Discarding pn space Handshake because HandshakeDone is received 10.503 -> Packet A|3|S0|dca6dbb54e5f01809f4e3b30|40|1 AckFrame[8,6,2-1|Δ19] 10.521 loss detection timeout handler running Sending probe 0, because no ack since 10.401. Current RTT: 32/16. 10.522 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 10.764/App, because ackElicitingInFlight | RTT:32/16 10.522 -> Packet PA|4|S0|dca6dbb54e5f01809f4e3b30|51|1 StreamFrame[0(CIB),0,17,fin] 10.534 <- (12) Packet A|9|S0|86dc418f9d869583|61|1 NewConnectionIdFrame[1,<0|dadbdd546c34abd3edbbde7a|82951ec938fa4de5ab4d6714470e967d] 10.553 -> Packet A|5|S0|dca6dbb54e5f01809f4e3b30|40|1 AckFrame[9-8,6,2-1|Δ19] 10.647 <- (13) Packet A|10|S0|86dc418f9d869583|61|1 NewConnectionIdFrame[1,<0|dadbdd546c34abd3edbbde7a|82951ec938fa4de5ab4d6714470e967d] 10.647 <- (14) Packet A|11|S0|86dc418f9d869583|61|1 NewConnectionIdFrame[1,<0|dadbdd546c34abd3edbbde7a|82951ec938fa4de5ab4d6714470e967d] 10.648 -> Packet A|6|S0|dca6dbb54e5f01809f4e3b30|39|1 AckFrame[11-8,6,2-1|Δ0] 10.763 loss detection timeout handler running Sending probe 1, because no ack since 10.522. Current RTT: 32/16. 10.763 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 11.247/App, because ackElicitingInFlight | RTT:32/16 10.763 -> Packet PA|7|S0|dca6dbb54e5f01809f4e3b30|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 11.248/App, because ackElicitingInFlight | RTT:32/16 10.764 -> Packet PA|8|S0|dca6dbb54e5f01809f4e3b30|51|1 StreamFrame[0(CIB),0,17,fin] 10.795 <- (15) Packet A|12|S0|86dc418f9d869583|1057|1 StreamFrame[0(CIB),0,1024,fin] 10.795 <- (16) Packet A|13|S0|86dc418f9d869583|36|1 AckFrame[8-6,3-2|Δ0] 10.796 Finished downloading https://server4:443/vtvpqgsczq at 26:22.302 on ClientConnection[1222d4f97284f835/86dc418f9d869583(V1) with server4/193.167.100.100:443] 10.796 Closing ClientConnection[1222d4f97284f835/86dc418f9d869583(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.796 Cwnd(-): 6000; inflight: 0 10.796 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 10.796 -> Packet A|9|S0|dca6dbb54e5f01809f4e3b30|39|2 ConnectionCloseFrame[0|0|] AckFrame[13-12|Δ0] 10.796 Creating connection with server4:443 with v1 10.797 Setting up connection for downloading https://server4:443/svxtxnstgu at 26:22.303 on ClientConnection[be22f7d0b4a14ec4/14bfb78f82a170be(V1) with server4/193.167.100.100:443] 10.797 Original destination connection id: be22f7d0b4a14ec4 (scid: 14bfb78f82a170be) >- CryptoStream[I|ClientHello] 10.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.999/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.799 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.832 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 10.835 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.035/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.835 Discarding pn space Initial because first Handshake message is being sent 10.835 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.035/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.835 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 10.833 <- (2) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|] 10.833 <- (3) Packet H|2|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|] 10.836 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 10.833 <- (4) Packet H|3|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|] 10.836 -> Packet H|1|L|50|1 AckFrame[2-1|Δ0] 10.836 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.836 -> Packet H|2|L|50|1 AckFrame[3-1|Δ0] 10.868 <- (6) Packet H|4|L|177|1 CryptoFrame[0,124] 10.868 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] 10.870 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.070/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.870 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[3-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.871 Starting downloading https://server4:443/svxtxnstgu at 26:22.377 on ClientConnection[be22f7d0b4a14ec4/14bfb78f82a170be(V1) with server4/193.167.100.100:443] 10.871 -> Packet H|4|L|50|1 AckFrame[4-1|Δ0] 10.871 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.071/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.871 -> Packet A|0|S0|9c6c9091be06c0c95e50d7f2|51|1 StreamFrame[0(CIB),0,17,fin] 10.904 <- (17) Packet A|14|S0|86dc418f9d869583|1057|1 StreamFrame[0(CIB),0,1024,fin] 10.904 -> Packet A|10|S0|dca6dbb54e5f01809f4e3b30|39|2 ConnectionCloseFrame[0|0|] AckFrame[13-12|Δ0] 10.905 <- (18) Packet A|15|S0|86dc418f9d869583|1057|1 StreamFrame[0(CIB),0,1024,fin] 10.905 -> Packet A|11|S0|dca6dbb54e5f01809f4e3b30|39|2 ConnectionCloseFrame[0|0|] AckFrame[13-12|Δ0] 10.936 <- (19) Packet A|16|S0|86dc418f9d869583|33|1 ConnectionCloseFrame[0|0|] 11.070 loss detection timeout handler running Sending probe 0, because no ack since 10.870. Current RTT: 100/25. 11.070 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.070 (Probe is a handshake retransmit) 11.071 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 11.471/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.071 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 11.102 <- (7) Packet A|0|S0|14bfb78f82a170be|30|1 HandshakeDoneFrame[] 11.102 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 11.321/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 11.096/App, because ackElicitingInFlight | RTT:100/25 11.103 loss detection timeout handler running 11.103 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 10.871. Current RTT: 100/25. 11.103 <- (8) Packet A|2|S0|14bfb78f82a170be|290|1 CryptoFrame[0,257] 11.103 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] 11.103 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) reschedule loss detection timer for PTO over 449 millis, based on 11.553/App, because ackElicitingInFlight | RTT:100/25 11.103 -> Packet PA|1|S0|9c6c9091be06c0c95e50d7f2|51|1 StreamFrame[0(CIB),0,17,fin] 11.103 <- (10) Packet A|4|S0|14bfb78f82a170be|61|1 NewConnectionIdFrame[1,<0|21c961d92e2a6f34591489e2|360b8537e36fc1dae3f9effd72412672] 11.104 -> Packet A|2|S0|9c6c9091be06c0c95e50d7f2|37|1 AckFrame[2,0|Δ0] 11.104 <- (11) Packet A|6|S0|14bfb78f82a170be|37|1 AckFrame[0|Δ201] reschedule loss detection timer for PTO over 223 millis, based on 11.328/App, because ackElicitingInFlight | RTT:100/25 11.124 -> Packet A|3|S0|9c6c9091be06c0c95e50d7f2|42|1 AckFrame[6,4,2,0|Δ19] 11.142 <- (12) Packet A|7|S0|14bfb78f82a170be|40|1 NewTokenFrame[00c1a70064681ba5ce] 11.160 <- (13) Packet A|8|S0|14bfb78f82a170be|35|1 AckFrame[3-0|Δ25] 11.160 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 11.161 -> Packet A|4|S0|9c6c9091be06c0c95e50d7f2|36|1 AckFrame[8-7|Δ19] 11.447 <- (14) Packet A|18|S0|14bfb78f82a170be|40|1 NewTokenFrame[00c1a70064681ba5ce] 11.448 <- (15) Packet A|19|S0|14bfb78f82a170be|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 11.448 -> Packet A|5|S0|9c6c9091be06c0c95e50d7f2|37|1 AckFrame[19-18,8-7|Δ0] 11.827 <- (16) Packet A|26|S0|14bfb78f82a170be|40|1 NewTokenFrame[00c1a70064681ba5ce] 11.828 <- (17) Packet A|27|S0|14bfb78f82a170be|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 11.828 -> Packet A|6|S0|9c6c9091be06c0c95e50d7f2|39|1 AckFrame[27-26,19-18,8-7|Δ0] 11.860 <- (18) Packet A|28|S0|14bfb78f82a170be|1057|1 StreamFrame[0(CIB),0,1024,fin] 11.861 Finished downloading https://server4:443/svxtxnstgu at 26:23.367 on ClientConnection[be22f7d0b4a14ec4/14bfb78f82a170be(V1) with server4/193.167.100.100:443] 11.861 Closing ClientConnection[be22f7d0b4a14ec4/14bfb78f82a170be(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.861 -> Packet A|7|S0|9c6c9091be06c0c95e50d7f2|43|2 ConnectionCloseFrame[0|0|] AckFrame[28-26,19-18,8-7|Δ0] 11.861 Creating connection with server4:443 with v1 11.862 Setting up connection for downloading https://server4:443/jyldnpovyv at 26:23.368 on ClientConnection[7895046f99d04e30/8c7150d39618e1f7(V1) with server4/193.167.100.100:443] 11.862 Original destination connection id: 7895046f99d04e30 (scid: 8c7150d39618e1f7) >- CryptoStream[I|ClientHello] 11.863 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.063/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.863 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.897 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 11.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.100/Handshake, because peerAwaitingAddressValidation | RTT:100/25 11.900 Discarding pn space Initial because first Handshake message is being sent 11.900 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.100/Handshake, because peerAwaitingAddressValidation | RTT:100/25 11.900 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 11.897 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 11.901 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 11.898 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 11.901 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 11.898 <- (4) Packet H|2|L|132|1 CryptoFrame[595,78] 11.902 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 11.898 <- (5) Packet H|3|L|89|1 CryptoFrame[673,36] 11.904 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 11.904 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.104/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.904 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.904 Starting downloading https://server4:443/jyldnpovyv at 26:23.411 on ClientConnection[7895046f99d04e30/8c7150d39618e1f7(V1) with server4/193.167.100.100:443] 11.905 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 11.904 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 11.905 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.105/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.905 -> Packet A|0|S0|3ff2878bc1cda8247eeca36d|51|1 StreamFrame[0(CIB),0,17,fin] 11.935 <- (7) Packet A|0|S0|8c7150d39618e1f7|30|1 HandshakeDoneFrame[] 11.935 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 12.104/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 12.130/App, because ackElicitingInFlight | RTT:100/25 11.936 Discarding pn space Handshake because HandshakeDone is received 11.935 <- (8) Packet A|2|S0|8c7150d39618e1f7|40|1 NewTokenFrame[00c1a70064681ba5cf] 11.935 <- (9) Packet A|3|S0|8c7150d39618e1f7|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 11.936 -> Packet A|1|S0|3ff2878bc1cda8247eeca36d|37|1 AckFrame[2,0|Δ0] 11.936 <- (10) Packet A|4|S0|8c7150d39618e1f7|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 11.937 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 11.936 <- (12) Packet A|5|S0|8c7150d39618e1f7|61|1 NewConnectionIdFrame[1,<0|ccf8a65779d67f217d8bcfa6|39842b04c3e5696bcf780d5fda4c7354] 11.937 -> Packet A|2|S0|3ff2878bc1cda8247eeca36d|37|1 AckFrame[4-2,0|Δ0] 11.937 <- (13) Packet A|6|S0|8c7150d39618e1f7|1057|1 StreamFrame[0(CIB),0,1024,fin] 11.937 Finished downloading https://server4:443/jyldnpovyv at 26:23.444 on ClientConnection[7895046f99d04e30/8c7150d39618e1f7(V1) with server4/193.167.100.100:443] 11.937 -> Packet A|3|S0|3ff2878bc1cda8247eeca36d|37|1 AckFrame[6-2,0|Δ0] 11.937 Closing ClientConnection[7895046f99d04e30/8c7150d39618e1f7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.938 Creating connection with server4:443 with v1 11.938 -> Packet A|4|S0|3ff2878bc1cda8247eeca36d|41|2 ConnectionCloseFrame[0|0|] AckFrame[6-2,0|Δ0] 11.938 Setting up connection for downloading https://server4:443/rdatbiiqct at 26:23.445 on ClientConnection[5ca04318e8f2c638/60be60594c0df295(V1) with server4/193.167.100.100:443] 11.938 Original destination connection id: 5ca04318e8f2c638 (scid: 60be60594c0df295) >- CryptoStream[I|ClientHello] 11.940 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.140/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.940 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.949 <- (19) Packet A|29|S0|14bfb78f82a170be|1057|1 StreamFrame[0(CIB),0,1024,fin] 11.950 -> Packet A|8|S0|9c6c9091be06c0c95e50d7f2|43|2 ConnectionCloseFrame[0|0|] AckFrame[28-26,19-18,8-7|Δ0] 11.950 <- (20) Packet A|30|S0|14bfb78f82a170be|1057|1 StreamFrame[0(CIB),0,1024,fin] 11.951 -> Packet A|9|S0|9c6c9091be06c0c95e50d7f2|43|2 ConnectionCloseFrame[0|0|] AckFrame[28-26,19-18,8-7|Δ0] 11.962 <- (14) Packet A|7|S0|8c7150d39618e1f7|35|1 AckFrame[0|Δ25] 11.962 -> Packet A|5|S0|3ff2878bc1cda8247eeca36d|41|2 ConnectionCloseFrame[0|0|] AckFrame[6-2,0|Δ0] 11.969 <- (15) Packet A|8|S0|8c7150d39618e1f7|33|1 ConnectionCloseFrame[0|0|] 11.980 <- (21) Packet A|31|S0|14bfb78f82a170be|33|1 ConnectionCloseFrame[0|0|] 12.139 loss detection timeout handler running Sending probe 0, because no ack since 11.940. Current RTT: 100/25. 12.139 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.139 (Probe is an initial retransmit) 12.140 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 12.540/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.139 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.539 loss detection timeout handler running Sending probe 1, because no ack since 12.139. Current RTT: 100/25. 12.539 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.539 (Probe is an initial retransmit) 12.539 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.339/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.539 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.540 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.340/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.540 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.574 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 12.574 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 12.574 <- (3) Packet I|2|L|55|1 Token=[] AckFrame[3-2|Δ0] 12.575 probe count not reset on ack because handshake not yet confirmed 12.575 Retransmitting CryptoFrame[0,257] on level Initial 12.575 Cwnd(-): 6000; inflight: 0 12.575 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 13.375/Initial, because peerAwaitingAddressValidation | RTT:100/25 12.575 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 12.963/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.575 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 12.962 loss detection timeout handler running Sending probe 2, because no ack since 12.575. Current RTT: 33/16. 12.962 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 12.962 (Probe is an initial retransmit) 12.963 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 13.739/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.963 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 12.964 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 13.740/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.964 -> Packet PI|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 12.995 <- (4) Packet I|3|L|57|1 Token=[] AckFrame[5,3-2|Δ0] 12.995 probe count not reset on ack because handshake not yet confirmed 12.995 Retransmitting CryptoFrame[0,257] on level Initial 12.995 Cwnd(-): 3000; inflight: 1200 12.995 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 775 millis, based on 13.771/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 12.995 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 679 millis, based on 13.675/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/13 12.995 -> Packet I|7|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[2|Δ0] Padding(887) 13.027 <- (5) Packet I|5|L|57|1 Token=[] AckFrame[7-5,3-2|Δ0] 13.027 probe count not reset on ack because handshake not yet confirmed 13.027 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 679 millis, based on 13.707/Initial, because peerAwaitingAddressValidation | RTT:33/13 13.325 <- (6) Packet I|6|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 13.328 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 72 millis, based on 13.401/Handshake, because peerAwaitingAddressValidation | RTT:33/10 13.328 Discarding pn space Initial because first Handshake message is being sent 13.328 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.328 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 72 millis, based on 13.401/Handshake, because peerAwaitingAddressValidation | RTT:33/10 13.328 -> Packet I|8|L|1201|2 Token=[] AckFrame[6-5,3|Δ0] Padding(1147) 13.400 loss detection timeout handler running 13.400 Sending probe 0. Current RTT: 33/10. 13.400 Sending probe because peer awaiting address validation 13.400 (Probe is a handshake ping) 13.401 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 145 millis, based on 13.547/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/10 13.400 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 13.546 loss detection timeout handler running Sending probe 1, because no ack since 13.400. Current RTT: 33/10. 13.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 13.546 (Probe is a handshake ping) 13.546 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 291 millis, based on 13.838/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/10 13.546 -> Packet PH|1|L|48|2 PingFrame[] Padding(2) 13.547 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 291 millis, based on 13.839/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/10 13.547 -> Packet PH|2|L|48|2 PingFrame[] Padding(2) 13.578 <- (8) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|] 13.578 <- (9) Packet H|7|L|54|1 AckFrame[2-1|Δ0] 13.579 probe count not reset on ack because handshake not yet confirmed 13.579 -> Packet H|3|L|50|1 AckFrame[5|Δ0] 13.579 Cwnd(-): 2400; inflight: 0 13.579 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 13.614 <- (10) Packet H|10|L|177|1 CryptoFrame[0,124] 13.614 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate] 13.615 -> Packet H|4|L|54|1 AckFrame[10,7,5|Δ0] 13.710 <- (11) Packet H|11|L|177|1 CryptoFrame[0,124] -< CryptoStream[H|EncryptedExtensions,Certificate] 13.710 <- (12) Packet H|12|L|133|1 CryptoFrame[595,79] 13.710 -> Packet H|5|L|54|1 AckFrame[11-10,7,5|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 13.712 -> Packet H|6|L|54|1 AckFrame[12-10,7,5|Δ0] 13.741 <- (13) Packet H|14|L|89|1 CryptoFrame[674,36] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 259 millis, based on 14.002/Handshake, because ackElicitingInFlight | RTT:33/8 13.742 -> Packet H|7|L|94|2 CryptoFrame[0,36] AckFrame[12-10,7,5|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.742 Starting downloading https://server4:443/rdatbiiqct at 26:25.249 on ClientConnection[5ca04318e8f2c638/60be60594c0df295(V1) with server4/193.167.100.100:443] 13.742 -> Packet H|8|L|56|1 AckFrame[14,12-10,7,5|Δ0] 13.743 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 258 millis, based on 14.002/Handshake, because ackElicitingInFlight | RTT:33/8 13.743 -> Packet A|0|S0|c13ec12c1c985e0ed1c43b56|51|1 StreamFrame[0(CIB),0,17,fin] 13.773 <- (14) Packet A|0|S0|60be60594c0df295|30|1 HandshakeDoneFrame[] 13.773 State is set to Confirmed reschedule loss detection timer for PTO over 228 millis, based on 14.002/Handshake, because ackElicitingInFlight | RTT:33/8 reschedule loss detection timer for PTO over 59 millis, based on 13.833/App, because ackElicitingInFlight | RTT:33/8 13.773 Discarding pn space Handshake because HandshakeDone is received 13.774 <- (15) Packet A|3|S0|60be60594c0df295|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 13.774 -> Packet A|1|S0|c13ec12c1c985e0ed1c43b56|37|1 AckFrame[3,0|Δ0] 13.833 loss detection timeout handler running Sending probe 0, because no ack since 13.743. Current RTT: 33/8. 13.833 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 179 millis, based on 14.013/App, because ackElicitingInFlight | RTT:33/8 13.833 -> Packet PA|2|S0|c13ec12c1c985e0ed1c43b56|51|1 StreamFrame[0(CIB),0,17,fin] 13.865 <- (16) Packet A|8|S0|60be60594c0df295|1057|1 StreamFrame[0(CIB),0,1024,fin] 13.865 Finished downloading https://server4:443/rdatbiiqct at 26:25.372 on ClientConnection[5ca04318e8f2c638/60be60594c0df295(V1) with server4/193.167.100.100:443] 13.865 Closing ClientConnection[5ca04318e8f2c638/60be60594c0df295(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.866 -> Packet A|3|S0|c13ec12c1c985e0ed1c43b56|43|2 ConnectionCloseFrame[0|0|] AckFrame[8,3,0|Δ0] 13.866 Creating connection with server4:443 with v1 13.866 Setting up connection for downloading https://server4:443/tuwpfvcwsv at 26:25.373 on ClientConnection[a64cf65687747815/75dc58789332d7de(V1) with server4/193.167.100.100:443] 13.866 Original destination connection id: a64cf65687747815 (scid: 75dc58789332d7de) >- CryptoStream[I|ClientHello] 13.867 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.067/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.867 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.902 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 13.902 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 13.902 <- (3) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ0] 13.902 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.102/Initial, because peerAwaitingAddressValidation | RTT:100/25 13.960 <- (17) Packet A|10|S0|60be60594c0df295|30|1 HandshakeDoneFrame[] 13.960 -> Packet A|4|S0|c13ec12c1c985e0ed1c43b56|43|2 ConnectionCloseFrame[0|0|] AckFrame[8,3,0|Δ0] 13.991 <- (18) Packet A|12|S0|60be60594c0df295|33|1 ConnectionCloseFrame[0|0|] 14.101 loss detection timeout handler running Sending probe 0, because no ack since 13.867. Current RTT: 34/17. 14.102 Sending probe because peer awaiting address validation 14.102 (Probe is Initial ping, because there is no Initial data to retransmit) 14.102 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 14.306/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.102 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 14.305 loss detection timeout handler running Sending probe 1, because no ack since 14.102. Current RTT: 34/17. 14.305 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.305 (Probe is Initial ping, because there is no Initial data to retransmit) 14.305 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 14.714/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.305 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 14.307 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 14.715/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.306 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 14.652 <- (4) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 14.654 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 14.756/Handshake, because peerAwaitingAddressValidation | RTT:34/17 14.654 Discarding pn space Initial because first Handshake message is being sent 14.655 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.655 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) reschedule loss detection timer for PTO over 101 millis, based on 14.757/Handshake, because peerAwaitingAddressValidation | RTT:34/17 14.654 -> Packet I|4|L|1201|2 Token=[] AckFrame[4,1|Δ0] Padding(1147) 14.756 loss detection timeout handler running 14.756 Sending probe 0. Current RTT: 34/17. 14.756 Sending probe because peer awaiting address validation 14.756 (Probe is a handshake ping) 14.756 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 14.960/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.756 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 14.959 loss detection timeout handler running Sending probe 1, because no ack since 14.756. Current RTT: 34/17. 14.959 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 14.959 (Probe is a handshake ping) 14.960 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 15.368/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.960 -> Packet PH|1|L|48|2 PingFrame[] Padding(2) 14.961 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 15.369/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 14.961 -> Packet PH|2|L|48|2 PingFrame[] Padding(2) 14.992 <- (6) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|] 14.992 <- (7) Packet H|6|L|54|1 AckFrame[2|Δ0] 14.993 -> Packet H|3|L|50|1 AckFrame[5|Δ0] 14.993 probe count not reset on ack because handshake not yet confirmed 14.993 Cwnd(-): 6000; inflight: 48 14.997 loss detection timeout handler running 14.997 loss detection timeout handler running 14.997 loss detection timeout handler running 14.997 loss detection timeout handler running 14.997 loss detection timeout handler running 14.997 loss detection timeout handler running 14.997 loss detection timeout handler running 14.997 loss detection timeout handler running 14.997 loss detection timeout handler running 14.997 loss detection timeout handler running 14.997 loss detection timeout handler running 14.998 loss detection timeout handler running 14.998 loss detection timeout handler running 14.998 loss detection timeout handler running 14.998 loss detection timeout handler running 14.998 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.494 <- (8) Packet H|8|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|] 16.495 -> Packet H|4|L|52|1 AckFrame[8,6-5|Δ0] 16.526 <- (9) Packet H|9|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|] 16.526 <- (10) Packet H|10|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|] 16.526 -> Packet H|5|L|52|1 AckFrame[9-8,6-5|Δ0] 16.526 <- (11) Packet H|11|L|177|1 CryptoFrame[0,124] 16.527 -> Packet H|6|L|52|1 AckFrame[10-8,6-5|Δ0] 16.527 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 359 millis, based on 16.889/Handshake, because ackElicitingInFlight | RTT:34/14 16.529 -> Packet H|7|L|91|2 CryptoFrame[0,36] AckFrame[10-8,6-5|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.530 Starting downloading https://server4:443/tuwpfvcwsv at 26:28.036 on ClientConnection[a64cf65687747815/75dc58789332d7de(V1) with server4/193.167.100.100:443] 16.530 -> Packet H|8|L|52|1 AckFrame[11-8,6-5|Δ0] 16.530 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 358 millis, based on 16.889/Handshake, because ackElicitingInFlight | RTT:34/14 16.530 -> Packet A|0|S0|7e35fd102f8dbaed35f9c4e1|51|1 StreamFrame[0(CIB),0,17,fin] 16.530 <- (12) Packet H|12|L|177|1 CryptoFrame[0,124] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.531 -> Packet H|9|L|52|1 AckFrame[12-8,6-5|Δ0] 16.560 <- (13) Packet A|0|S0|75dc58789332d7de|30|1 HandshakeDoneFrame[] 16.561 State is set to Confirmed reschedule loss detection timer for PTO over 328 millis, based on 16.889/Handshake, because ackElicitingInFlight | RTT:34/14 reschedule loss detection timer for PTO over 84 millis, based on 16.645/App, because ackElicitingInFlight | RTT:34/14 16.561 Discarding pn space Handshake because HandshakeDone is received 16.561 <- (14) Packet A|8|S0|75dc58789332d7de|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 16.561 <- (15) Packet A|9|S0|75dc58789332d7de|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 16.561 -> Packet A|1|S0|7e35fd102f8dbaed35f9c4e1|37|1 AckFrame[8,0|Δ0] 16.561 <- (16) Packet A|10|S0|75dc58789332d7de|61|1 NewConnectionIdFrame[1,<0|e933a03f6398802033f4829b|26c33df88d23c23ebe487ee3b5f0a083] 16.562 -> Packet A|2|S0|7e35fd102f8dbaed35f9c4e1|37|1 AckFrame[10-8,0|Δ0] 16.562 <- (17) Packet A|11|S0|75dc58789332d7de|1057|1 StreamFrame[0(CIB),0,1024,fin] 16.562 Finished downloading https://server4:443/tuwpfvcwsv at 26:28.069 on ClientConnection[a64cf65687747815/75dc58789332d7de(V1) with server4/193.167.100.100:443] 16.562 Closing ClientConnection[a64cf65687747815/75dc58789332d7de(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.563 -> Packet A|3|S0|7e35fd102f8dbaed35f9c4e1|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-8,0|Δ0] 16.563 Creating connection with server4:443 with v1 16.563 Setting up connection for downloading https://server4:443/valdyzxqoc at 26:28.070 on ClientConnection[a760c244ef22b9b1/4839ead9a7fedefb(V1) with server4/193.167.100.100:443] 16.564 Original destination connection id: a760c244ef22b9b1 (scid: 4839ead9a7fedefb) >- CryptoStream[I|ClientHello] 16.565 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.765/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.565 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.587 <- (18) Packet A|12|S0|75dc58789332d7de|35|1 AckFrame[0|Δ25] 16.587 -> Packet A|4|S0|7e35fd102f8dbaed35f9c4e1|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-8,0|Δ0] 16.598 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 16.601 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.801/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.601 Discarding pn space Initial because first Handshake message is being sent 16.601 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.801/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.601 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 16.599 <- (2) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|] 16.599 <- (3) Packet H|2|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|] 16.601 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 16.599 <- (4) Packet H|3|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|] 16.601 -> Packet H|1|L|50|1 AckFrame[2-1|Δ0] 16.601 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.601 -> Packet H|2|L|50|1 AckFrame[3-1|Δ0] 16.618 <- (19) Packet A|14|S0|75dc58789332d7de|33|1 ConnectionCloseFrame[0|0|] 16.709 <- (6) Packet H|5|L|177|1 CryptoFrame[0,124] 16.710 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] 16.712 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.912/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.712 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[3-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.712 Starting downloading https://server4:443/valdyzxqoc at 26:28.219 on ClientConnection[a760c244ef22b9b1/4839ead9a7fedefb(V1) with server4/193.167.100.100:443] 16.709 <- (7) Packet H|6|L|177|1 CryptoFrame[0,124] 16.712 -> Packet H|4|L|52|1 AckFrame[5,3-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.713 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.913/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.713 -> [Packet H|5|L|52|1 AckFrame[6-5,3-1|Δ0], Packet A|0|S0|f360150c7fb2f5a336ac4676|51|1 StreamFrame[0(CIB),0,17,fin]] 16.743 <- (8) Packet A|2|S0|4839ead9a7fedefb|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 16.744 <- (9) Packet A|3|S0|4839ead9a7fedefb|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 16.744 <- (10) Packet H|7|L|54|1 AckFrame[3-1|Δ0] 16.744 -> Packet A|1|S0|f360150c7fb2f5a336ac4676|35|1 AckFrame[3-2|Δ0] 16.744 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 16.744 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 16.769 <- (11) Packet A|10|S0|4839ead9a7fedefb|35|1 AckFrame[0|Δ25] 16.770 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.775 <- (12) Packet A|11|S0|4839ead9a7fedefb|30|1 HandshakeDoneFrame[] 16.775 State is set to Confirmed 16.776 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.776 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 16.776 Discarding pn space Handshake because HandshakeDone is received 16.783 <- (13) Packet A|12|S0|4839ead9a7fedefb|40|1 NewTokenFrame[00c1a70064681ba5d4] 16.783 -> Packet A|2|S0|f360150c7fb2f5a336ac4676|38|1 AckFrame[12-10,3-2|Δ7] 16.814 <- (14) Packet A|13|S0|4839ead9a7fedefb|61|1 NewConnectionIdFrame[1,<0|d5cb43c8e6fb19ae5b0802d2|da28b46d841b89f52f431ace0702bb4f] 16.834 -> Packet A|3|S0|f360150c7fb2f5a336ac4676|38|1 AckFrame[13-10,3-2|Δ19] 16.900 <- (15) Packet A|15|S0|4839ead9a7fedefb|1057|1 StreamFrame[0(CIB),0,1024,fin] 16.901 Finished downloading https://server4:443/valdyzxqoc at 26:28.407 on ClientConnection[a760c244ef22b9b1/4839ead9a7fedefb(V1) with server4/193.167.100.100:443] 16.901 Closing ClientConnection[a760c244ef22b9b1/4839ead9a7fedefb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 16.901 Creating connection with server4:443 with v1 16.901 <- (16) Packet A|16|S0|4839ead9a7fedefb|1057|1 StreamFrame[0(CIB),0,1024,fin] 16.901 -> Packet A|4|S0|f360150c7fb2f5a336ac4676|43|2 ConnectionCloseFrame[0|0|] AckFrame[15,13-10,3-2|Δ0] 16.901 -> Packet A|5|S0|f360150c7fb2f5a336ac4676|43|2 ConnectionCloseFrame[0|0|] AckFrame[15,13-10,3-2|Δ0] 16.902 Setting up connection for downloading https://server4:443/nkkryhzikn at 26:28.408 on ClientConnection[f3e8d58608cf7da9/2ead21d181704c18(V1) with server4/193.167.100.100:443] 16.902 Original destination connection id: f3e8d58608cf7da9 (scid: 2ead21d181704c18) >- CryptoStream[I|ClientHello] 16.903 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.103/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.903 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.937 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 16.939 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.139/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.939 Discarding pn space Initial because first Handshake message is being sent 16.940 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.140/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.937 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 16.939 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 16.940 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 16.937 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 16.940 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 16.937 <- (4) Packet H|2|L|134|1 CryptoFrame[595,80] 16.941 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 16.937 <- (5) Packet H|3|L|89|1 CryptoFrame[675,36] 16.943 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 16.943 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.143/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.943 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.944 Starting downloading https://server4:443/nkkryhzikn at 26:28.450 on ClientConnection[f3e8d58608cf7da9/2ead21d181704c18(V1) with server4/193.167.100.100:443] 16.944 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 16.944 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.144/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.944 -> Packet A|0|S0|eef646e477f755461fad0d0f|51|1 StreamFrame[0(CIB),0,17,fin] 17.143 loss detection timeout handler running Sending probe 0, because no ack since 16.943. Current RTT: 100/25. 17.143 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.143 (Probe is a handshake retransmit) 17.144 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 17.544/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.144 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 17.543 loss detection timeout handler running Sending probe 1, because no ack since 16.944. Current RTT: 100/25. 17.543 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 17.543 (Probe is a handshake retransmit) 17.543 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 18.343/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.543 -> Packet PH|6|L|84|1 CryptoFrame[0,36] 17.544 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 18.344/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.544 -> Packet PH|7|L|84|1 CryptoFrame[0,36] 17.574 <- (6) Packet A|0|S0|2ead21d181704c18|30|1 HandshakeDoneFrame[] 17.575 State is set to Confirmed reschedule loss detection timer for PTO over 269 millis, based on 17.844/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -405 millis, based on 17.169/App, because ackElicitingInFlight | RTT:100/25 17.575 loss detection timeout handler running 17.575 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 16.944. Current RTT: 100/25. 17.575 (Probe is retransmit on level App) 17.574 <- (7) Packet A|1|S0|2ead21d181704c18|40|1 NewTokenFrame[00c1a70064681ba5d5] 17.575 <- (8) Packet A|2|S0|2ead21d181704c18|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 17.576 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 17.575 <- (10) Packet A|4|S0|2ead21d181704c18|61|1 NewConnectionIdFrame[1,<0|60d453b4fad535a4e3fa4286|4c03290cf3fd0b38e0adf52e3cbedf9d] reschedule loss detection timer for PTO over 449 millis, based on 18.025/App, because ackElicitingInFlight | RTT:100/25 17.575 -> Packet PA|1|S0|eef646e477f755461fad0d0f|51|1 StreamFrame[0(CIB),0,17,fin] 17.576 -> Packet A|2|S0|eef646e477f755461fad0d0f|37|1 AckFrame[4,2-0|Δ0] 17.663 <- (11) Packet A|7|S0|2ead21d181704c18|30|1 HandshakeDoneFrame[] 17.663 <- (12) Packet A|8|S0|2ead21d181704c18|40|1 NewTokenFrame[00c1a70064681ba5d5] 17.664 -> Packet A|3|S0|eef646e477f755461fad0d0f|39|1 AckFrame[8-7,4,2-0|Δ0] 17.695 <- (13) Packet A|9|S0|2ead21d181704c18|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.715 -> Packet A|4|S0|eef646e477f755461fad0d0f|40|1 AckFrame[9-7,4,2-0|Δ19] 18.025 loss detection timeout handler running Sending probe 1, because no ack since 17.575. Current RTT: 100/25. 18.025 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 18.925/App, because ackElicitingInFlight | RTT:100/25 18.025 -> Packet PA|5|S0|eef646e477f755461fad0d0f|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 18.926/App, because ackElicitingInFlight | RTT:100/25 18.026 -> Packet PA|6|S0|eef646e477f755461fad0d0f|51|1 StreamFrame[0(CIB),0,17,fin] 18.057 <- (14) Packet A|10|S0|2ead21d181704c18|1057|1 StreamFrame[0(CIB),0,1024,fin] 18.057 <- (15) Packet A|11|S0|2ead21d181704c18|34|1 AckFrame[6-3|Δ0] 18.058 Finished downloading https://server4:443/nkkryhzikn at 26:29.564 on ClientConnection[f3e8d58608cf7da9/2ead21d181704c18(V1) with server4/193.167.100.100:443] 18.058 Closing ClientConnection[f3e8d58608cf7da9/2ead21d181704c18(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.058 Cwnd(-): 6000; inflight: 0 18.058 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.058 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 18.058 -> Packet A|7|S0|eef646e477f755461fad0d0f|60|3 StreamFrame[0(CIB),0,17,fin] AckFrame[10|Δ0] ConnectionCloseFrame[0|0|] 18.058 Creating connection with server4:443 with v1 18.059 Setting up connection for downloading https://server4:443/qefmotfpwf at 26:29.565 on ClientConnection[9f1b496012a12a36/91d36379177e2b85(V1) with server4/193.167.100.100:443] 18.059 Original destination connection id: 9f1b496012a12a36 (scid: 91d36379177e2b85) >- CryptoStream[I|ClientHello] 18.060 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.260/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.060 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.089 <- (16) Packet A|12|S0|2ead21d181704c18|33|1 ConnectionCloseFrame[0|0|] 18.260 loss detection timeout handler running Sending probe 0, because no ack since 18.060. Current RTT: 100/25. 18.260 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.260 (Probe is an initial retransmit) 18.260 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.660/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.260 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.294 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 18.297 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.497/Handshake, because peerAwaitingAddressValidation | RTT:100/25 18.297 Discarding pn space Initial because first Handshake message is being sent 18.297 Packet not sent because keys are discarded: Packet I|2|L|.|2 Token=[] AckFrame[0|Δ0] Padding(1149) 18.294 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 18.298 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 18.294 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 18.294 <- (4) Packet H|2|L|132|1 CryptoFrame[595,78] 18.299 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 18.299 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 18.295 <- (5) Packet H|3|L|89|1 CryptoFrame[673,36] 18.301 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 18.302 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.502/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.302 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.302 Starting downloading https://server4:443/qefmotfpwf at 26:29.809 on ClientConnection[9f1b496012a12a36/91d36379177e2b85(V1) with server4/193.167.100.100:443] 18.302 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 18.302 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 18.303 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 18.503/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.303 -> Packet A|0|S0|d3394400dc4745b4c8229283|51|1 StreamFrame[0(CIB),0,17,fin] 18.333 <- (7) Packet A|0|S0|91d36379177e2b85|30|1 HandshakeDoneFrame[] 18.333 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 18.502/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 18.528/App, because ackElicitingInFlight | RTT:100/25 18.334 Discarding pn space Handshake because HandshakeDone is received 18.334 <- (8) Packet A|8|S0|91d36379177e2b85|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 18.335 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 18.334 <- (10) Packet A|10|S0|91d36379177e2b85|61|1 NewConnectionIdFrame[1,<0|7ac26e0a53c52efbde28045d|faa6ef7ec7fbbb5fb2191f82cbb7dd33] 18.335 -> Packet A|1|S0|d3394400dc4745b4c8229283|37|1 AckFrame[8,0|Δ0] 18.335 <- (11) Packet A|11|S0|91d36379177e2b85|1057|1 StreamFrame[0(CIB),0,1024,fin] 18.335 Finished downloading https://server4:443/qefmotfpwf at 26:29.842 on ClientConnection[9f1b496012a12a36/91d36379177e2b85(V1) with server4/193.167.100.100:443] 18.335 -> Packet A|2|S0|d3394400dc4745b4c8229283|39|1 AckFrame[11-10,8,0|Δ0] 18.335 Closing ClientConnection[9f1b496012a12a36/91d36379177e2b85(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.336 Creating connection with server4:443 with v1 18.336 -> Packet A|3|S0|d3394400dc4745b4c8229283|43|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,8,0|Δ0] 18.337 Setting up connection for downloading https://server4:443/emloszwmyj at 26:29.843 on ClientConnection[c0c7d30bc46b8650/ec8991dc7f76e9da(V1) with server4/193.167.100.100:443] 18.337 Original destination connection id: c0c7d30bc46b8650 (scid: ec8991dc7f76e9da) >- CryptoStream[I|ClientHello] 18.338 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 18.538/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.338 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.359 <- (12) Packet A|12|S0|91d36379177e2b85|35|1 AckFrame[0|Δ25] 18.360 -> Packet A|4|S0|d3394400dc4745b4c8229283|43|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,8,0|Δ0] 18.367 <- (13) Packet A|13|S0|91d36379177e2b85|33|1 ConnectionCloseFrame[0|0|] 18.537 loss detection timeout handler running Sending probe 0, because no ack since 18.338. Current RTT: 100/25. 18.537 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.537 (Probe is an initial retransmit) 18.537 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 18.937/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.537 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.937 loss detection timeout handler running Sending probe 1, because no ack since 18.537. Current RTT: 100/25. 18.937 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 18.937 (Probe is an initial retransmit) 18.937 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.737/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.937 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.938 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.738/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.938 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.971 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 18.971 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 18.972 Discarding packet (134 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 18.972 <- (4) Packet I|2|L|55|1 Token=[] AckFrame[3-2|Δ0] 18.972 probe count not reset on ack because handshake not yet confirmed 18.972 Retransmitting CryptoFrame[0,257] on level Initial 18.972 Cwnd(-): 6000; inflight: 0 18.972 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 19.772/Initial, because peerAwaitingAddressValidation | RTT:100/25 18.972 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 19.360/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/16 18.972 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 19.004 <- (5) Packet I|3|L|55|1 Token=[] AckFrame[4-2|Δ0] 19.004 probe count not reset on ack because handshake not yet confirmed 19.004 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 387 millis, based on 19.392/Initial, because peerAwaitingAddressValidation | RTT:33/16 19.392 loss detection timeout handler running Sending probe 2, because no ack since 18.972. Current RTT: 33/13. 19.392 Sending probe because peer awaiting address validation 19.392 (Probe is Initial ping, because there is no Initial data to retransmit) 19.392 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 679 millis, based on 20.072/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/13 19.392 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 19.722 <- (6) Packet I|6|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 19.725 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 84 millis, based on 19.810/Handshake, because peerAwaitingAddressValidation | RTT:33/13 19.725 Discarding pn space Initial because first Handshake message is being sent 19.725 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 84 millis, based on 19.810/Handshake, because peerAwaitingAddressValidation | RTT:33/13 19.725 -> Packet I|6|L|1201|2 Token=[] AckFrame[6,3-2|Δ0] Padding(1147) 19.757 <- (7) Packet H|4|L|177|1 CryptoFrame[0,124] 19.758 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 19.758 <- (8) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 19.758 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 19.759 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 19.790 <- (9) Packet H|7|L|89|1 CryptoFrame[675,36] -< CryptoStream[H|EncryptedExtensions,Certificate] 19.790 -> Packet H|2|L|52|1 AckFrame[7,5-4|Δ0] 19.809 loss detection timeout handler running 19.809 Sending probe 0. Current RTT: 33/13. 19.809 Sending probe because peer awaiting address validation 19.809 (Probe is a handshake ping) 19.810 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 169 millis, based on 19.980/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/13 19.810 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) 19.914 <- (10) Packet H|9|L|134|1 CryptoFrame[595,80] >- CryptoStream[H|Finished] 19.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 169 millis, based on 20.086/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/13 19.916 -> Packet H|4|L|91|2 CryptoFrame[0,36] AckFrame[7,5-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.916 Starting downloading https://server4:443/emloszwmyj at 26:31.423 on ClientConnection[c0c7d30bc46b8650/ec8991dc7f76e9da(V1) with server4/193.167.100.100:443] 19.916 -> Packet H|5|L|54|1 AckFrame[9,7,5-4|Δ0] 19.914 <- (11) Packet H|10|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.917 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 169 millis, based on 20.087/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/13 19.917 -> [Packet H|6|L|54|1 AckFrame[10-9,7,5-4|Δ0], Packet A|0|S0|924069745077086e2426ef09|51|1 StreamFrame[0(CIB),0,17,fin]] 20.086 loss detection timeout handler running Sending probe 1, because no ack since 19.916. Current RTT: 33/13. 20.086 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.086 (Probe is a handshake retransmit) 20.086 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 339 millis, based on 20.426/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/13 20.086 -> Packet PH|7|L|84|1 CryptoFrame[0,36] 20.088 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 339 millis, based on 20.428/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:33/13 20.087 -> Packet PH|8|L|84|1 CryptoFrame[0,36] 20.118 <- (12) Packet A|0|S0|ec8991dc7f76e9da|30|1 HandshakeDoneFrame[] 20.118 State is set to Confirmed reschedule loss detection timer for PTO over 238 millis, based on 20.357/App, because ackElicitingInFlight | RTT:33/13 reschedule loss detection timer for PTO over -91 millis, based on 20.027/App, because ackElicitingInFlight | RTT:33/13 20.119 Discarding pn space Handshake because HandshakeDone is received 20.119 loss detection timeout handler running Sending probe 0, because no ack since 19.917. Current RTT: 33/13. 20.119 (Probe is retransmit on level App) 20.118 <- (13) Packet A|1|S0|ec8991dc7f76e9da|40|1 NewTokenFrame[00c1a70064681ba5d7] 20.118 <- (14) Packet A|2|S0|ec8991dc7f76e9da|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 20.119 <- (15) Packet A|3|S0|ec8991dc7f76e9da|291|1 CryptoFrame[257,257] reschedule loss detection timer for PTO over 219 millis, based on 20.339/App, because ackElicitingInFlight | RTT:33/13 20.119 -> Packet PA|1|S0|924069745077086e2426ef09|56|2 AckFrame[1-0|Δ0] StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.119 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 20.119 <- (17) Packet A|4|S0|ec8991dc7f76e9da|61|1 NewConnectionIdFrame[1,<0|42200012d35e3eadb9d286b4|65d065ef08b751d02a32b36390cb8bf6] 20.119 -> Packet A|2|S0|924069745077086e2426ef09|35|1 AckFrame[3-0|Δ0] 20.120 <- (18) Packet A|12|S0|ec8991dc7f76e9da|1057|1 StreamFrame[0(CIB),0,1024,fin] 20.120 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 20.120 <- (20) Packet A|13|S0|ec8991dc7f76e9da|37|1 AckFrame[0|Δ171] 20.120 -> Packet A|3|S0|924069745077086e2426ef09|37|1 AckFrame[12,4-0|Δ0] 20.121 Finished downloading https://server4:443/emloszwmyj at 26:31.627 on ClientConnection[c0c7d30bc46b8650/ec8991dc7f76e9da(V1) with server4/193.167.100.100:443] 20.121 Closing ClientConnection[c0c7d30bc46b8650/ec8991dc7f76e9da(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 108 millis, based on 20.229/App, because ackElicitingInFlight | RTT:33/13 20.121 -> Packet A|4|S0|924069745077086e2426ef09|41|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,4-0|Δ0] 20.121 Creating connection with server4:443 with v1 20.122 Setting up connection for downloading https://server4:443/axbuorqqum at 26:31.628 on ClientConnection[894b485d830626de/d94d0e4bbfe70c6b(V1) with server4/193.167.100.100:443] 20.122 Original destination connection id: 894b485d830626de (scid: d94d0e4bbfe70c6b) >- CryptoStream[I|ClientHello] 20.123 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.323/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.123 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.157 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 20.159 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.359/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.159 Discarding pn space Initial because first Handshake message is being sent 20.157 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 20.160 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.360/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.160 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 20.160 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 20.158 <- (3) Packet H|2|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|EncryptedExtensions] 20.158 <- (4) Packet H|3|L|89|1 CryptoFrame[675,36] -< CryptoStream[H|EncryptedExtensions] 20.160 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 20.160 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 20.160 -> Packet H|1|L|52|1 AckFrame[3-2,0|Δ0] 20.359 loss detection timeout handler running 20.359 Sending probe 0. Current RTT: 100/25. 20.359 Sending probe because peer awaiting address validation 20.359 (Probe is a handshake ping) 20.359 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.759/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.359 -> Packet PH|2|L|48|2 PingFrame[] Padding(2) 20.391 <- (6) Packet H|6|L|525|1 CryptoFrame[124,471] >- CryptoStream[H|Finished] 20.393 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.793/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.393 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[3-2,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.393 Starting downloading https://server4:443/axbuorqqum at 26:31.900 on ClientConnection[894b485d830626de/d94d0e4bbfe70c6b(V1) with server4/193.167.100.100:443] 20.394 -> Packet H|4|L|54|1 AckFrame[6,3-2,0|Δ0] 20.394 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.794/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.394 -> Packet A|0|S0|ee3aa664644bcfdc02b6c2c6|51|1 StreamFrame[0(CIB),0,17,fin] 20.425 <- (7) Packet A|0|S0|d94d0e4bbfe70c6b|30|1 HandshakeDoneFrame[] 20.425 State is set to Confirmed reschedule loss detection timer for PTO over 367 millis, based on 20.793/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 20.619/App, because ackElicitingInFlight | RTT:100/25 20.425 Discarding pn space Handshake because HandshakeDone is received 20.425 <- (8) Packet A|1|S0|d94d0e4bbfe70c6b|40|1 NewTokenFrame[00c1a70064681ba5d7] 20.425 <- (9) Packet A|2|S0|d94d0e4bbfe70c6b|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 20.426 -> Packet A|1|S0|ee3aa664644bcfdc02b6c2c6|35|1 AckFrame[1-0|Δ0] 20.425 <- (10) Packet A|3|S0|d94d0e4bbfe70c6b|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.426 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 20.425 <- (12) Packet A|4|S0|d94d0e4bbfe70c6b|61|1 NewConnectionIdFrame[1,<0|ef88c0f52f0c6e0c1ae5d86f|0e57d64b626f979fbfc4fa81c088b31c] 20.426 -> Packet A|2|S0|ee3aa664644bcfdc02b6c2c6|35|1 AckFrame[3-0|Δ0] 20.445 -> Packet A|3|S0|ee3aa664644bcfdc02b6c2c6|36|1 AckFrame[4-0|Δ19] 20.618 loss detection timeout handler running Sending probe 0, because no ack since 20.394. Current RTT: 100/25. 20.618 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 21.069/App, because ackElicitingInFlight | RTT:100/25 20.619 -> Packet PA|4|S0|ee3aa664644bcfdc02b6c2c6|51|1 StreamFrame[0(CIB),0,17,fin] 20.675 <- (13) Packet A|6|S0|d94d0e4bbfe70c6b|35|1 AckFrame[4-2|Δ25] 20.676 Cwnd(-): 6000; inflight: 0 20.676 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 20.676 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) reschedule loss detection timer for PTO over 192 millis, based on 20.869/App, because ackElicitingInFlight | RTT:56/28 20.676 -> Packet A|5|S0|ee3aa664644bcfdc02b6c2c6|51|1 StreamFrame[0(CIB),0,17,fin] 20.868 loss detection timeout handler running Sending probe 0, because no ack since 20.676. Current RTT: 56/28. 20.868 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 385 millis, based on 21.254/App, because ackElicitingInFlight | RTT:56/28 20.868 -> Packet PA|6|S0|ee3aa664644bcfdc02b6c2c6|51|1 StreamFrame[0(CIB),0,17,fin] 20.946 <- (14) Packet A|12|S0|d94d0e4bbfe70c6b|1057|1 StreamFrame[0(CIB),0,1024,fin] 20.947 Finished downloading https://server4:443/axbuorqqum at 26:32.453 on ClientConnection[894b485d830626de/d94d0e4bbfe70c6b(V1) with server4/193.167.100.100:443] 20.947 Closing ClientConnection[894b485d830626de/d94d0e4bbfe70c6b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.947 <- (15) Packet A|13|S0|d94d0e4bbfe70c6b|1057|1 StreamFrame[0(CIB),0,1024,fin] 20.948 Creating connection with server4:443 with v1 20.948 -> Packet A|7|S0|ee3aa664644bcfdc02b6c2c6|45|3 ConnectionCloseFrame[0|0|] AckFrame[12,6|Δ0] ConnectionCloseFrame[0|0|] 20.948 Setting up connection for downloading https://server4:443/dvuocxzjgl at 26:32.455 on ClientConnection[693bd98fa0084daf/94dddc43af9f62e2(V1) with server4/193.167.100.100:443] 20.948 Original destination connection id: 693bd98fa0084daf (scid: 94dddc43af9f62e2) >- CryptoStream[I|ClientHello] 20.950 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.150/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.949 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.984 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 20.984 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 20.984 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 20.984 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 20.985 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.185/Initial, because peerAwaitingAddressValidation | RTT:100/25 21.184 loss detection timeout handler running Sending probe 0, because no ack since 20.949. Current RTT: 34/17. 21.184 Sending probe because peer awaiting address validation 21.184 (Probe is Initial ping, because there is no Initial data to retransmit) 21.184 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 21.388/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.184 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 21.387 loss detection timeout handler running Sending probe 1, because no ack since 21.184. Current RTT: 34/17. 21.388 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.388 (Probe is Initial ping, because there is no Initial data to retransmit) 21.388 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 21.796/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.388 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 21.389 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 21.797/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.389 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 21.735 <- (5) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 21.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.839/Handshake, because peerAwaitingAddressValidation | RTT:34/17 21.737 Discarding pn space Initial because first Handshake message is being sent 21.737 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 21.737 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.840/Handshake, because peerAwaitingAddressValidation | RTT:34/17 21.737 -> Packet I|4|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1147) 21.770 <- (7) Packet H|4|L|177|1 CryptoFrame[0,124] 21.770 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 21.770 <- (8) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 21.770 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 21.771 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 21.802 <- (9) Packet H|6|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 21.802 <- (10) Packet H|7|L|89|1 CryptoFrame[674,36] 21.804 -> Packet H|2|L|50|1 AckFrame[6-4|Δ0] >- CryptoStream[H|Finished] 21.804 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.906/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.804 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[6-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.804 Starting downloading https://server4:443/dvuocxzjgl at 26:33.311 on ClientConnection[693bd98fa0084daf/94dddc43af9f62e2(V1) with server4/193.167.100.100:443] 21.804 -> Packet H|4|L|50|1 AckFrame[7-4|Δ0] 21.805 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 21.907/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.805 -> Packet A|0|S0|361946a482eed6573c14db09|51|1 StreamFrame[0(CIB),0,17,fin] 21.906 loss detection timeout handler running Sending probe 0, because no ack since 21.804. Current RTT: 34/17. 21.906 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 21.906 (Probe is a handshake retransmit) 21.906 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 22.110/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.906 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 21.938 <- (11) Packet A|0|S0|94dddc43af9f62e2|30|1 HandshakeDoneFrame[] 21.938 State is set to Confirmed reschedule loss detection timer for PTO over 120 millis, based on 22.059/App, because ackElicitingInFlight | RTT:34/17 reschedule loss detection timer for PTO over -6 millis, based on 21.932/App, because ackElicitingInFlight | RTT:34/17 21.938 Discarding pn space Handshake because HandshakeDone is received 21.938 loss detection timeout handler running 21.938 <- (12) Packet A|2|S0|94dddc43af9f62e2|40|1 NewTokenFrame[00c1a70064681ba5d9] Sending probe 0, because no ack since 21.805. Current RTT: 34/17. 21.938 (Probe is retransmit on level App) 21.939 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 21.938 -> Packet A|1|S0|361946a482eed6573c14db09|37|1 AckFrame[2,0|Δ0] 21.938 <- (14) Packet A|5|S0|94dddc43af9f62e2|61|1 NewConnectionIdFrame[1,<0|86ebb03dd936802b67e4f840|f6a5c3f78b9477cca0f73e962854134f] reschedule loss detection timer for PTO over 253 millis, based on 22.193/App, because ackElicitingInFlight | RTT:34/17 21.939 -> Packet PA|2|S0|361946a482eed6573c14db09|51|1 StreamFrame[0(CIB),0,17,fin] 21.939 <- (15) Packet A|6|S0|94dddc43af9f62e2|1057|1 StreamFrame[0(CIB),0,1024,fin] 21.940 -> Packet A|3|S0|361946a482eed6573c14db09|39|1 AckFrame[6-5,2,0|Δ0] 21.940 Finished downloading https://server4:443/dvuocxzjgl at 26:33.446 on ClientConnection[693bd98fa0084daf/94dddc43af9f62e2(V1) with server4/193.167.100.100:443] 21.940 Closing ClientConnection[693bd98fa0084daf/94dddc43af9f62e2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.940 -> Packet A|4|S0|361946a482eed6573c14db09|43|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2,0|Δ0] 21.940 Creating connection with server4:443 with v1 21.941 Setting up connection for downloading https://server4:443/lrqovsgkqj at 26:33.447 on ClientConnection[0905ccdc27f17936/b7713a6fade5f689(V1) with server4/193.167.100.100:443] 21.941 Original destination connection id: 0905ccdc27f17936 (scid: b7713a6fade5f689) >- CryptoStream[I|ClientHello] 21.942 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.142/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.942 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.976 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 21.976 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 21.976 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 21.977 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 21.977 <- (5) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ0] 21.977 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 22.177/Initial, because peerAwaitingAddressValidation | RTT:100/25 22.035 <- (16) Packet A|9|S0|94dddc43af9f62e2|291|1 CryptoFrame[257,257] 22.035 -> Packet A|5|S0|361946a482eed6573c14db09|43|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,2,0|Δ0] 22.176 loss detection timeout handler running Sending probe 0, because no ack since 21.942. Current RTT: 34/17. 22.176 Sending probe because peer awaiting address validation 22.176 (Probe is Initial ping, because there is no Initial data to retransmit) 22.176 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 22.380/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.176 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 22.208 <- (6) Packet I|2|L|55|1 Token=[] AckFrame[1-0|Δ0] 22.208 probe count not reset on ack because handshake not yet confirmed 22.209 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 22.413/Initial, because peerAwaitingAddressValidation | RTT:34/17 22.412 loss detection timeout handler running Sending probe 1, because no ack since 22.176. Current RTT: 34/14. 22.412 Sending probe because peer awaiting address validation 22.412 (Probe is Initial ping, because there is no Initial data to retransmit) 22.412 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 22.772/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 22.412 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 22.444 <- (7) Packet I|3|L|55|1 Token=[] AckFrame[2-0|Δ0] 22.444 probe count not reset on ack because handshake not yet confirmed 22.445 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 22.805/Initial, because peerAwaitingAddressValidation | RTT:34/14 22.727 <- (8) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 22.729 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 22.807/Handshake, because peerAwaitingAddressValidation | RTT:34/11 22.730 Discarding pn space Initial because first Handshake message is being sent 22.730 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 22.808/Handshake, because peerAwaitingAddressValidation | RTT:34/11 22.730 -> Packet I|3|L|1201|2 Token=[] AckFrame[4-1|Δ0] Padding(1149) 22.807 loss detection timeout handler running 22.807 Sending probe 0. Current RTT: 34/11. 22.807 Sending probe because peer awaiting address validation 22.807 (Probe is a handshake ping) 22.807 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 155 millis, based on 22.963/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 22.807 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 22.962 loss detection timeout handler running Sending probe 1, because no ack since 22.807. Current RTT: 34/11. 22.962 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 22.962 (Probe is a handshake ping) 22.963 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 311 millis, based on 23.275/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 22.963 -> Packet PH|1|L|48|2 PingFrame[] Padding(2) 22.964 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 311 millis, based on 23.276/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 22.964 -> Packet PH|2|L|48|2 PingFrame[] Padding(2) 22.995 <- (9) Packet H|4|L|177|1 CryptoFrame[0,124] 22.995 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 22.995 <- (10) Packet H|5|L|525|1 CryptoFrame[124,471] 22.996 -> Packet H|3|L|50|1 AckFrame[4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 22.995 <- (11) Packet H|6|L|54|1 AckFrame[2|Δ0] 22.996 probe count not reset on ack because handshake not yet confirmed 22.996 -> Packet H|4|L|50|1 AckFrame[5-4|Δ0] 22.996 Cwnd(-): 6000; inflight: 48 23.000 loss detection timeout handler running 23.000 loss detection timeout handler running 23.000 loss detection timeout handler running 23.000 loss detection timeout handler running 23.000 loss detection timeout handler running 23.000 loss detection timeout handler running 23.001 loss detection timeout handler running 23.001 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 23.027 <- (12) Packet H|7|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 23.027 <- (13) Packet H|8|L|89|1 CryptoFrame[674,36] 23.029 -> Packet H|5|L|50|1 AckFrame[7-4|Δ0] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 279 millis, based on 23.309/Handshake, because ackElicitingInFlight | RTT:34/9 23.029 -> Packet H|6|L|89|2 CryptoFrame[0,36] AckFrame[7-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.030 Starting downloading https://server4:443/lrqovsgkqj at 26:34.536 on ClientConnection[0905ccdc27f17936/b7713a6fade5f689(V1) with server4/193.167.100.100:443] 23.030 -> Packet H|7|L|50|1 AckFrame[8-4|Δ0] 23.030 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 278 millis, based on 23.309/Handshake, because ackElicitingInFlight | RTT:34/9 23.030 -> Packet A|0|S0|29e921cac7f2fddb705f79e8|51|1 StreamFrame[0(CIB),0,17,fin] 23.062 <- (14) Packet A|8|S0|b7713a6fade5f689|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 23.062 <- (15) Packet A|9|S0|b7713a6fade5f689|61|1 NewConnectionIdFrame[1,<0|6ca626e2aa534dfcf0a61bad|fa3239a8bef38e1a27222aa06b8dfae5] 23.062 -> Packet A|1|S0|29e921cac7f2fddb705f79e8|35|1 AckFrame[9-8|Δ0] 23.063 <- (16) Packet A|10|S0|b7713a6fade5f689|1057|1 StreamFrame[0(CIB),0,1024,fin] 23.063 Finished downloading https://server4:443/lrqovsgkqj at 26:34.570 on ClientConnection[0905ccdc27f17936/b7713a6fade5f689(V1) with server4/193.167.100.100:443] 23.063 Closing ClientConnection[0905ccdc27f17936/b7713a6fade5f689(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.063 -> Packet A|2|S0|29e921cac7f2fddb705f79e8|39|2 ConnectionCloseFrame[0|0|] AckFrame[10-8|Δ0] 23.064 Creating connection with server4:443 with v1 23.064 Setting up connection for downloading https://server4:443/cpndcrvpam at 26:34.571 on ClientConnection[69f4d9735af5f0e6/02a96a01b204fae9(V1) with server4/193.167.100.100:443] 23.064 Original destination connection id: 69f4d9735af5f0e6 (scid: 02a96a01b204fae9) >- CryptoStream[I|ClientHello] 23.066 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.266/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.066 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.094 <- (17) Packet A|13|S0|b7713a6fade5f689|40|1 NewTokenFrame[00c1a70064681ba5da] 23.094 -> Packet A|3|S0|29e921cac7f2fddb705f79e8|39|2 ConnectionCloseFrame[0|0|] AckFrame[10-8|Δ0] 23.099 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 23.100 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 23.100 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 23.100 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 23.100 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 23.300/Initial, because peerAwaitingAddressValidation | RTT:100/25 23.300 loss detection timeout handler running Sending probe 0, because no ack since 23.066. Current RTT: 34/17. 23.300 Sending probe because peer awaiting address validation 23.300 (Probe is Initial ping, because there is no Initial data to retransmit) 23.300 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 23.504/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.300 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 23.503 loss detection timeout handler running Sending probe 1, because no ack since 23.300. Current RTT: 34/17. 23.503 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 23.503 (Probe is Initial ping, because there is no Initial data to retransmit) 23.503 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 23.911/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.503 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 23.504 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 23.913/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.504 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 23.535 <- (5) Packet I|3|L|55|1 Token=[] AckFrame[2-0|Δ0] 23.535 probe count not reset on ack because handshake not yet confirmed 23.536 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 23.944/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 23.536 <- (6) Packet I|4|L|55|1 Token=[] AckFrame[3-0|Δ0] 23.536 probe count not reset on ack because handshake not yet confirmed 23.536 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 23.896/Initial, because peerAwaitingAddressValidation | RTT:34/14 23.852 <- (7) Packet I|6|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 23.854 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 23.932/Handshake, because peerAwaitingAddressValidation | RTT:34/11 23.854 Discarding pn space Initial because first Handshake message is being sent 23.854 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 23.932/Handshake, because peerAwaitingAddressValidation | RTT:34/11 23.854 -> Packet I|4|L|1201|2 Token=[] AckFrame[6,4-3,1|Δ0] Padding(1145) 23.886 <- (8) Packet H|4|L|177|1 CryptoFrame[0,124] 23.887 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 23.887 <- (9) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 23.887 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 23.887 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 23.918 <- (10) Packet H|6|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 23.918 <- (11) Packet H|7|L|89|1 CryptoFrame[674,36] 23.920 -> Packet H|2|L|50|1 AckFrame[6-4|Δ0] >- CryptoStream[H|Finished] 23.920 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 23.998/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 23.920 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[6-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 23.921 Starting downloading https://server4:443/cpndcrvpam at 26:35.427 on ClientConnection[69f4d9735af5f0e6/02a96a01b204fae9(V1) with server4/193.167.100.100:443] 23.921 -> Packet H|4|L|50|1 AckFrame[7-4|Δ0] 23.921 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 23.999/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 23.921 -> Packet A|0|S0|09a12a39f571f77003379311|51|1 StreamFrame[0(CIB),0,17,fin] 23.952 <- (12) Packet A|0|S0|02a96a01b204fae9|30|1 HandshakeDoneFrame[] 23.952 State is set to Confirmed reschedule loss detection timer for PTO over 46 millis, based on 23.998/Handshake, because ackElicitingInFlight | RTT:34/11 reschedule loss detection timer for PTO over 72 millis, based on 24.024/App, because ackElicitingInFlight | RTT:34/11 23.952 Discarding pn space Handshake because HandshakeDone is received 23.952 <- (13) Packet A|7|S0|02a96a01b204fae9|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 23.953 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 23.952 <- (15) Packet A|8|S0|02a96a01b204fae9|61|1 NewConnectionIdFrame[1,<0|edd6de17c337406858326ec8|523e26a1c506f4ba420cd0646ca6e098] 23.953 -> Packet A|1|S0|09a12a39f571f77003379311|37|1 AckFrame[7,0|Δ0] 23.953 <- (16) Packet A|9|S0|02a96a01b204fae9|1057|1 StreamFrame[0(CIB),0,1024,fin] 23.954 -> Packet A|2|S0|09a12a39f571f77003379311|37|1 AckFrame[9-7,0|Δ0] 23.954 Finished downloading https://server4:443/cpndcrvpam at 26:35.460 on ClientConnection[69f4d9735af5f0e6/02a96a01b204fae9(V1) with server4/193.167.100.100:443] 23.954 Closing ClientConnection[69f4d9735af5f0e6/02a96a01b204fae9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 23.954 -> Packet A|3|S0|09a12a39f571f77003379311|41|2 ConnectionCloseFrame[0|0|] AckFrame[9-7,0|Δ0] 23.954 Creating connection with server4:443 with v1 23.955 Setting up connection for downloading https://server4:443/mphenlddxy at 26:35.461 on ClientConnection[13bbae526676147f/b0488c84175a35a1(V1) with server4/193.167.100.100:443] 23.955 Original destination connection id: 13bbae526676147f (scid: b0488c84175a35a1) >- CryptoStream[I|ClientHello] 23.956 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.156/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 23.956 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 23.978 <- (17) Packet A|10|S0|02a96a01b204fae9|35|1 AckFrame[0|Δ25] 23.978 -> Packet A|4|S0|09a12a39f571f77003379311|41|2 ConnectionCloseFrame[0|0|] AckFrame[9-7,0|Δ0] 23.985 <- (18) Packet A|13|S0|02a96a01b204fae9|33|1 ConnectionCloseFrame[0|0|] 24.155 loss detection timeout handler running Sending probe 0, because no ack since 23.956. Current RTT: 100/25. 24.155 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.155 (Probe is an initial retransmit) 24.156 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.556/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.155 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.189 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 24.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.392/Handshake, because peerAwaitingAddressValidation | RTT:100/25 24.192 Discarding pn space Initial because first Handshake message is being sent 24.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.392/Handshake, because peerAwaitingAddressValidation | RTT:100/25 24.189 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 24.192 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 24.192 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 24.190 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 24.192 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 24.192 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] 24.190 <- (4) Packet H|2|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 24.195 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] 24.266 <- (5) Packet H|4|L|89|1 CryptoFrame[675,36] >- CryptoStream[H|Finished] 24.267 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.467/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.267 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.267 Starting downloading https://server4:443/mphenlddxy at 26:35.774 on ClientConnection[13bbae526676147f/b0488c84175a35a1(V1) with server4/193.167.100.100:443] 24.266 <- (6) Packet H|5|L|89|1 CryptoFrame[675,36] 24.267 -> Packet H|4|L|52|1 AckFrame[4,2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.267 -> Packet H|5|L|52|1 AckFrame[5-4,2-0|Δ0] 24.268 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.468/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.267 -> Packet A|0|S0|dca79f982a2b8276810526af|51|1 StreamFrame[0(CIB),0,17,fin] 24.298 <- (7) Packet A|1|S0|b0488c84175a35a1|40|1 NewTokenFrame[00c1a70064681ba5db] 24.298 <- (8) Packet A|7|S0|b0488c84175a35a1|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 24.299 <- (9) Packet A|8|S0|b0488c84175a35a1|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.299 <- (10) Packet A|9|S0|b0488c84175a35a1|61|1 NewConnectionIdFrame[1,<0|1b516e19c454cfc1b5241af3|0c0641abfcfa4b7b82ac7c1caf397ce4] 24.299 -> Packet A|1|S0|dca79f982a2b8276810526af|37|1 AckFrame[7,1|Δ0] 24.299 -> Packet A|2|S0|dca79f982a2b8276810526af|37|1 AckFrame[9-7,1|Δ0] 24.330 <- (11) Packet A|12|S0|b0488c84175a35a1|30|1 HandshakeDoneFrame[] 24.331 State is set to Confirmed reschedule loss detection timer for PTO over 136 millis, based on 24.467/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 161 millis, based on 24.492/App, because ackElicitingInFlight | RTT:100/25 24.331 Discarding pn space Handshake because HandshakeDone is received 24.350 -> Packet A|3|S0|dca79f982a2b8276810526af|40|1 AckFrame[12,9-7,1|Δ19] 24.382 <- (12) Packet A|13|S0|b0488c84175a35a1|1057|1 StreamFrame[0(CIB),0,1024,fin] 24.382 Finished downloading https://server4:443/mphenlddxy at 26:35.889 on ClientConnection[13bbae526676147f/b0488c84175a35a1(V1) with server4/193.167.100.100:443] 24.382 Closing ClientConnection[13bbae526676147f/b0488c84175a35a1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.382 -> Packet A|4|S0|dca79f982a2b8276810526af|43|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,9-7,1|Δ0] 24.383 Creating connection with server4:443 with v1 24.383 Setting up connection for downloading https://server4:443/aucujnztrg at 26:35.890 on ClientConnection[532c0ba2390e51f2/8e3af097c2f53f37(V1) with server4/193.167.100.100:443] 24.383 Original destination connection id: 532c0ba2390e51f2 (scid: 8e3af097c2f53f37) >- CryptoStream[I|ClientHello] 24.384 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.584/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.384 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.418 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 24.421 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.621/Handshake, because peerAwaitingAddressValidation | RTT:100/25 24.421 Discarding pn space Initial because first Handshake message is being sent 24.421 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.621/Handshake, because peerAwaitingAddressValidation | RTT:100/25 24.418 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 24.421 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 24.421 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 24.419 <- (3) Packet H|2|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|EncryptedExtensions] 24.422 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 24.419 <- (4) Packet H|3|L|89|1 CryptoFrame[675,36] -< CryptoStream[H|EncryptedExtensions] 24.422 -> Packet H|1|L|52|1 AckFrame[2,0|Δ0] 24.422 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.422 -> Packet H|2|L|52|1 AckFrame[3-2,0|Δ0] 24.471 <- (13) Packet A|14|S0|b0488c84175a35a1|1057|1 StreamFrame[0(CIB),0,1024,fin] 24.472 -> Packet A|5|S0|dca79f982a2b8276810526af|43|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,9-7,1|Δ0] 24.472 <- (14) Packet A|15|S0|b0488c84175a35a1|1057|1 StreamFrame[0(CIB),0,1024,fin] 24.472 -> Packet A|6|S0|dca79f982a2b8276810526af|43|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,9-7,1|Δ0] 24.502 <- (15) Packet A|16|S0|b0488c84175a35a1|33|1 ConnectionCloseFrame[0|0|] 24.525 <- (6) Packet H|4|L|177|1 CryptoFrame[0,124] -< CryptoStream[H|EncryptedExtensions] 24.525 -> Packet H|3|L|52|1 AckFrame[4-2,0|Δ0] 24.525 <- (7) Packet H|5|L|525|1 CryptoFrame[124,471] >- CryptoStream[H|Finished] 24.527 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.727/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.527 -> Packet H|4|L|91|2 CryptoFrame[0,36] AckFrame[4-2,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.528 Starting downloading https://server4:443/aucujnztrg at 26:36.034 on ClientConnection[532c0ba2390e51f2/8e3af097c2f53f37(V1) with server4/193.167.100.100:443] 24.528 -> Packet H|5|L|52|1 AckFrame[5-2,0|Δ0] 24.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.728/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.528 -> Packet A|0|S0|6f1dc8932b13c908024e637d|51|1 StreamFrame[0(CIB),0,17,fin] 24.559 <- (8) Packet A|0|S0|8e3af097c2f53f37|30|1 HandshakeDoneFrame[] 24.559 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 24.727/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 24.753/App, because ackElicitingInFlight | RTT:100/25 24.559 Discarding pn space Handshake because HandshakeDone is received 24.559 <- (9) Packet A|1|S0|8e3af097c2f53f37|40|1 NewTokenFrame[00c1a70064681ba5dc] 24.559 <- (10) Packet A|2|S0|8e3af097c2f53f37|290|1 CryptoFrame[0,257] 24.559 -> Packet A|1|S0|6f1dc8932b13c908024e637d|35|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 24.559 <- (11) Packet A|3|S0|8e3af097c2f53f37|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.559 <- (12) Packet A|4|S0|8e3af097c2f53f37|61|1 NewConnectionIdFrame[1,<0|469e9bd0f4c6423a13ecb270|aa8124ff381d50b994336c9eda5106e2] 24.560 -> Packet A|2|S0|6f1dc8932b13c908024e637d|35|1 AckFrame[3-0|Δ0] 24.579 -> Packet A|3|S0|6f1dc8932b13c908024e637d|36|1 AckFrame[4-0|Δ19] 24.753 loss detection timeout handler running Sending probe 0, because no ack since 24.528. Current RTT: 100/25. 24.753 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 25.203/App, because ackElicitingInFlight | RTT:100/25 24.753 -> Packet PA|4|S0|6f1dc8932b13c908024e637d|51|1 StreamFrame[0(CIB),0,17,fin] 25.203 loss detection timeout handler running Sending probe 1, because no ack since 24.753. Current RTT: 100/25. 25.203 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 26.103/App, because ackElicitingInFlight | RTT:100/25 25.203 -> Packet PA|5|S0|6f1dc8932b13c908024e637d|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 26.104/App, because ackElicitingInFlight | RTT:100/25 25.204 -> Packet PA|6|S0|6f1dc8932b13c908024e637d|51|1 StreamFrame[0(CIB),0,17,fin] 25.235 <- (13) Packet A|5|S0|8e3af097c2f53f37|1057|1 StreamFrame[0(CIB),0,1024,fin] 25.235 <- (14) Packet A|6|S0|8e3af097c2f53f37|36|1 AckFrame[6-5,3-1|Δ0] 25.235 Finished downloading https://server4:443/aucujnztrg at 26:36.742 on ClientConnection[532c0ba2390e51f2/8e3af097c2f53f37(V1) with server4/193.167.100.100:443] 25.235 Closing ClientConnection[532c0ba2390e51f2/8e3af097c2f53f37(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.235 Cwnd(-): 6000; inflight: 0 25.235 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 25.235 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 25.236 -> Packet A|7|S0|6f1dc8932b13c908024e637d|60|3 StreamFrame[0(CIB),0,17,fin] AckFrame[5|Δ0] ConnectionCloseFrame[0|0|] 25.236 Creating connection with server4:443 with v1 25.236 Setting up connection for downloading https://server4:443/nmliwyohqb at 26:36.743 on ClientConnection[37e6ff6896726885/40451d681e1bf52e(V1) with server4/193.167.100.100:443] 25.236 Original destination connection id: 37e6ff6896726885 (scid: 40451d681e1bf52e) >- CryptoStream[I|ClientHello] 25.238 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.438/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.238 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.267 <- (15) Packet A|7|S0|8e3af097c2f53f37|33|1 ConnectionCloseFrame[0|0|] 25.272 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 25.272 Discarding packet (134 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 25.272 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 25.437 loss detection timeout handler running Sending probe 0, because no ack since 25.238. Current RTT: 100/25. 25.437 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.437 (Probe is an initial retransmit) 25.437 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.837/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.437 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.469 <- (4) Packet I|2|L|55|1 Token=[] AckFrame[1-0|Δ0] 25.469 probe count not reset on ack because handshake not yet confirmed 25.470 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.870/Initial, because peerAwaitingAddressValidation | RTT:100/25 25.869 loss detection timeout handler running Sending probe 1, because no ack since 25.437. Current RTT: 31/15. 25.869 Sending probe because peer awaiting address validation 25.869 (Probe is Initial ping, because there is no Initial data to retransmit) 25.869 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 363 millis, based on 26.233/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 25.869 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 26.023 <- (5) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 26.026 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 26.117/Handshake, because peerAwaitingAddressValidation | RTT:31/15 26.026 Discarding pn space Initial because first Handshake message is being sent 26.026 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 26.117/Handshake, because peerAwaitingAddressValidation | RTT:31/15 26.026 -> Packet I|3|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1149) 26.058 <- (6) Packet H|4|L|177|1 CryptoFrame[0,124] 26.058 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 26.058 <- (7) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 26.059 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 26.059 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 26.090 <- (8) Packet H|6|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 26.090 <- (9) Packet H|7|L|89|1 CryptoFrame[675,36] 26.092 -> Packet H|2|L|50|1 AckFrame[6-4|Δ0] >- CryptoStream[H|Finished] 26.092 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 26.183/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 26.092 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[6-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 26.093 Starting downloading https://server4:443/nmliwyohqb at 26:37.599 on ClientConnection[37e6ff6896726885/40451d681e1bf52e(V1) with server4/193.167.100.100:443] 26.092 -> Packet H|4|L|50|1 AckFrame[7-4|Δ0] 26.093 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 26.184/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 26.093 -> Packet A|0|S0|9265377f5f1c1ebb2a996b22|51|1 StreamFrame[0(CIB),0,17,fin] 26.124 <- (10) Packet A|0|S0|40451d681e1bf52e|30|1 HandshakeDoneFrame[] 26.124 State is set to Confirmed reschedule loss detection timer for PTO over 59 millis, based on 26.183/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 85 millis, based on 26.209/App, because ackElicitingInFlight | RTT:31/15 26.124 Discarding pn space Handshake because HandshakeDone is received 26.124 <- (11) Packet A|1|S0|40451d681e1bf52e|40|1 NewTokenFrame[00c1a70064681ba5dd] 26.124 <- (12) Packet A|3|S0|40451d681e1bf52e|290|1 CryptoFrame[0,257] 26.124 -> Packet A|1|S0|9265377f5f1c1ebb2a996b22|35|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 26.124 <- (13) Packet A|4|S0|40451d681e1bf52e|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 26.125 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 26.125 -> Packet A|2|S0|9265377f5f1c1ebb2a996b22|37|1 AckFrame[4-3,1-0|Δ0] 26.124 <- (15) Packet A|5|S0|40451d681e1bf52e|61|1 NewConnectionIdFrame[1,<0|1266cba7a5934e26b92c811d|34f26acb1ecdf6d846eae85cdc7c52f4] 26.125 <- (16) Packet A|6|S0|40451d681e1bf52e|1057|1 StreamFrame[0(CIB),0,1024,fin] 26.125 -> Packet A|3|S0|9265377f5f1c1ebb2a996b22|37|1 AckFrame[6-3,1-0|Δ0] 26.126 Finished downloading https://server4:443/nmliwyohqb at 26:37.632 on ClientConnection[37e6ff6896726885/40451d681e1bf52e(V1) with server4/193.167.100.100:443] 26.126 Closing ClientConnection[37e6ff6896726885/40451d681e1bf52e(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.126 -> Packet A|4|S0|9265377f5f1c1ebb2a996b22|41|2 ConnectionCloseFrame[0|0|] AckFrame[6-3,1-0|Δ0] 26.126 Creating connection with server4:443 with v1 26.126 Setting up connection for downloading https://server4:443/crfsbvvktp at 26:37.633 on ClientConnection[42bee247f0c31684/e7e96f9bda7ce6a6(V1) with server4/193.167.100.100:443] 26.127 Original destination connection id: 42bee247f0c31684 (scid: e7e96f9bda7ce6a6) >- CryptoStream[I|ClientHello] 26.128 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.328/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.127 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.150 <- (17) Packet A|7|S0|40451d681e1bf52e|35|1 AckFrame[0|Δ25] 26.150 -> Packet A|5|S0|9265377f5f1c1ebb2a996b22|41|2 ConnectionCloseFrame[0|0|] AckFrame[6-3,1-0|Δ0] 26.157 <- (18) Packet A|8|S0|40451d681e1bf52e|33|1 ConnectionCloseFrame[0|0|] 26.162 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 26.162 <- (2) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ0] 26.162 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.362/Initial, because peerAwaitingAddressValidation | RTT:100/25 26.361 loss detection timeout handler running Sending probe 0, because no ack since 26.127. Current RTT: 34/17. 26.361 Sending probe because peer awaiting address validation 26.361 (Probe is Initial ping, because there is no Initial data to retransmit) 26.362 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 26.566/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.362 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 26.565 loss detection timeout handler running Sending probe 1, because no ack since 26.362. Current RTT: 34/17. 26.565 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.565 (Probe is Initial ping, because there is no Initial data to retransmit) 26.565 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 26.973/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.565 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 26.566 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 26.974/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.566 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 26.597 <- (3) Packet I|3|L|55|1 Token=[] AckFrame[2-0|Δ0] 26.597 probe count not reset on ack because handshake not yet confirmed 26.598 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 27.006/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.598 <- (4) Packet I|4|L|55|1 Token=[] AckFrame[3-0|Δ0] 26.598 probe count not reset on ack because handshake not yet confirmed 26.598 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 26.958/Initial, because peerAwaitingAddressValidation | RTT:34/14 26.957 loss detection timeout handler running Sending probe 2, because no ack since 26.566. Current RTT: 34/11. 26.958 Sending probe because peer awaiting address validation 26.958 (Probe is Initial ping, because there is no Initial data to retransmit) 26.958 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 623 millis, based on 27.582/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 26.958 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 27.581 loss detection timeout handler running Sending probe 3, because no ack since 26.958. Current RTT: 34/11. 27.581 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 27.581 (Probe is Initial ping, because there is no Initial data to retransmit) 27.581 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1247 millis, based on 28.829/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 27.581 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 27.582 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1247 millis, based on 28.830/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 27.582 -> Packet PI|6|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 27.613 <- (5) Packet I|7|L|57|1 Token=[] AckFrame[5,3-0|Δ0] 27.613 probe count not reset on ack because handshake not yet confirmed 27.613 Cwnd(-): 6000; inflight: 1201 27.613 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 1247 millis, based on 28.861/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 27.662 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 28.861 loss detection timeout handler running Sending probe 4, because no ack since 27.582. Current RTT: 34/9. 28.861 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 28.861 (Probe is Initial ping, because there is no Initial data to retransmit) 28.861 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2239 millis, based on 31.101/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/9 28.861 -> Packet PI|7|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 28.862 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2239 millis, based on 31.102/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/9 28.862 -> Packet PI|8|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 28.893 <- (7) Packet I|8|L|59|1 Token=[] AckFrame[7,5,3-0|Δ0] 28.893 probe count not reset on ack because handshake not yet confirmed 28.893 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 2239 millis, based on 31.133/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/9 29.913 <- (8) Packet I|10|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 29.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 65 millis, based on 29.982/Handshake, because peerAwaitingAddressValidation | RTT:34/8 29.916 Discarding pn space Initial because first Handshake message is being sent 29.916 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 29.916 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 65 millis, based on 29.982/Handshake, because peerAwaitingAddressValidation | RTT:34/8 29.916 -> Packet I|9|L|1201|2 Token=[] AckFrame[10,8-7,4-3,1|Δ0] Padding(1143) 29.949 <- (10) Packet H|7|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|] 29.949 -> Packet H|0|L|50|1 AckFrame[7|Δ0] 29.980 <- (11) Packet H|8|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|] 29.980 <- (12) Packet H|9|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|] 29.981 -> Packet H|1|L|50|1 AckFrame[8-7|Δ0] 29.981 <- (13) Packet H|10|L|177|1 CryptoFrame[0,124] 29.981 -> Packet H|2|L|50|1 AckFrame[9-7|Δ0] 29.981 - unknown transport parameter 0xf739bbc1b666d09, size 1 29.981 loss detection timeout handler running 29.981 Sending probe 0. Current RTT: 34/8. 29.981 Sending probe because peer awaiting address validation 29.981 (Probe is a handshake ping) 29.982 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 131 millis, based on 30.114/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/8 29.982 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) >- CryptoStream[H|Finished] 29.983 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 131 millis, based on 30.115/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/8 29.983 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[9-7|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.984 Starting downloading https://server4:443/crfsbvvktp at 26:41.490 on ClientConnection[42bee247f0c31684/e7e96f9bda7ce6a6(V1) with server4/193.167.100.100:443] 29.984 -> Packet H|5|L|50|1 AckFrame[10-7|Δ0] 29.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 131 millis, based on 30.116/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/8 29.984 -> Packet A|0|S0|4e68718ed4a28707ef7b2762|51|1 StreamFrame[0(CIB),0,17,fin] 30.014 <- (14) Packet A|0|S0|e7e96f9bda7ce6a6|30|1 HandshakeDoneFrame[] 30.015 State is set to Confirmed reschedule loss detection timer for PTO over 100 millis, based on 30.115/Handshake, because ackElicitingInFlight | RTT:34/8 reschedule loss detection timer for PTO over 60 millis, based on 30.075/App, because ackElicitingInFlight | RTT:34/8 30.015 Discarding pn space Handshake because HandshakeDone is received 30.015 <- (15) Packet A|2|S0|e7e96f9bda7ce6a6|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 30.015 <- (16) Packet A|3|S0|e7e96f9bda7ce6a6|291|1 CryptoFrame[257,257] 30.015 -> Packet A|1|S0|4e68718ed4a28707ef7b2762|37|1 AckFrame[2,0|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 30.016 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 30.015 <- (18) Packet A|4|S0|e7e96f9bda7ce6a6|61|1 NewConnectionIdFrame[1,<0|08288f0fe830092ee8d7a33e|fcc06684706d6b42f1aa9c32f2c383d3] 30.016 -> Packet A|2|S0|4e68718ed4a28707ef7b2762|37|1 AckFrame[4-2,0|Δ0] 30.075 loss detection timeout handler running Sending probe 0, because no ack since 29.984. Current RTT: 34/8. 30.075 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 181 millis, based on 30.257/App, because ackElicitingInFlight | RTT:34/8 30.075 -> Packet PA|3|S0|4e68718ed4a28707ef7b2762|51|1 StreamFrame[0(CIB),0,17,fin] 30.136 <- (19) Packet A|6|S0|e7e96f9bda7ce6a6|40|1 NewTokenFrame[00c1a70064681ba5e1] 30.136 <- (20) Packet A|14|S0|e7e96f9bda7ce6a6|40|1 NewTokenFrame[00c1a70064681ba5e1] 30.137 -> Packet A|4|S0|4e68718ed4a28707ef7b2762|41|1 AckFrame[14,6,4-2,0|Δ0] 30.256 loss detection timeout handler running Sending probe 1, because no ack since 30.075. Current RTT: 34/8. 30.257 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 363 millis, based on 30.621/App, because ackElicitingInFlight | RTT:34/8 30.257 -> Packet PA|5|S0|4e68718ed4a28707ef7b2762|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 363 millis, based on 30.622/App, because ackElicitingInFlight | RTT:34/8 30.258 -> Packet PA|6|S0|4e68718ed4a28707ef7b2762|51|1 StreamFrame[0(CIB),0,17,fin] 30.289 <- (21) Packet A|15|S0|e7e96f9bda7ce6a6|1057|1 StreamFrame[0(CIB),0,1024,fin] 30.289 Finished downloading https://server4:443/crfsbvvktp at 26:41.796 on ClientConnection[42bee247f0c31684/e7e96f9bda7ce6a6(V1) with server4/193.167.100.100:443] 30.289 Closing ClientConnection[42bee247f0c31684/e7e96f9bda7ce6a6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.290 -> Packet A|7|S0|4e68718ed4a28707ef7b2762|45|2 ConnectionCloseFrame[0|0|] AckFrame[15-14,6,4-2,0|Δ0] 30.290 Creating connection with server4:443 with v1 30.291 Setting up connection for downloading https://server4:443/vhksefwbsf at 26:41.797 on ClientConnection[e51f2c14d961e57d/1d68ce43c6efb278(V1) with server4/193.167.100.100:443] 30.291 Original destination connection id: e51f2c14d961e57d (scid: 1d68ce43c6efb278) >- CryptoStream[I|ClientHello] 30.292 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.492/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.292 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.313 <- (22) Packet A|16|S0|e7e96f9bda7ce6a6|37|1 AckFrame[5-4,2-1|Δ25] 30.313 -> Packet A|8|S0|4e68718ed4a28707ef7b2762|45|2 ConnectionCloseFrame[0|0|] AckFrame[15-14,6,4-2,0|Δ0] 30.321 <- (23) Packet A|17|S0|e7e96f9bda7ce6a6|33|1 ConnectionCloseFrame[0|0|] 30.326 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 30.328 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 30.528/Handshake, because peerAwaitingAddressValidation | RTT:100/25 30.328 Discarding pn space Initial because first Handshake message is being sent 30.328 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 30.528/Handshake, because peerAwaitingAddressValidation | RTT:100/25 30.326 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 30.328 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 30.329 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 30.326 <- (3) Packet H|3|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions] 30.329 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 30.329 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 30.329 -> Packet H|1|L|52|1 AckFrame[3,0|Δ0] 30.366 <- (5) Packet H|4|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 30.367 -> Packet H|2|L|52|1 AckFrame[4-3,0|Δ0] 30.435 <- (6) Packet H|7|L|133|1 CryptoFrame[595,79] >- CryptoStream[H|Finished] 30.437 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 30.637/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.437 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[4-3,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.437 Starting downloading https://server4:443/vhksefwbsf at 26:41.944 on ClientConnection[e51f2c14d961e57d/1d68ce43c6efb278(V1) with server4/193.167.100.100:443] 30.437 -> Packet H|4|L|54|1 AckFrame[7,4-3,0|Δ0] 30.438 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 30.638/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.438 -> Packet A|0|S0|41f98ed8b5270c0fc2964861|51|1 StreamFrame[0(CIB),0,17,fin] 30.469 <- (7) Packet A|2|S0|1d68ce43c6efb278|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 30.469 <- (8) Packet A|3|S0|1d68ce43c6efb278|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 30.469 <- (9) Packet H|8|L|55|1 AckFrame[3-0|Δ0] 30.470 -> Packet A|1|S0|41f98ed8b5270c0fc2964861|35|1 AckFrame[3-2|Δ0] 30.470 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 30.470 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 30.469 <- (10) Packet A|10|S0|1d68ce43c6efb278|61|1 NewConnectionIdFrame[1,<0|795b358cdeefe2b4eb739903|386428cc9434ed09dc3a4cf16634e9e8] 30.489 -> Packet A|2|S0|41f98ed8b5270c0fc2964861|38|1 AckFrame[10,3-2|Δ19] 30.501 <- (11) Packet A|11|S0|1d68ce43c6efb278|30|1 HandshakeDoneFrame[] 30.501 State is set to Confirmed reschedule loss detection timer for PTO over 58 millis, based on 30.559/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 58 millis, based on 30.559/App, because ackElicitingInFlight | RTT:32/16 30.501 Discarding pn space Handshake because HandshakeDone is received 30.508 <- (12) Packet A|12|S0|1d68ce43c6efb278|40|1 NewTokenFrame[00c1a70064681ba5e1] 30.508 -> Packet A|3|S0|41f98ed8b5270c0fc2964861|38|1 AckFrame[12-10,3-2|Δ7] 30.559 loss detection timeout handler running Sending probe 0, because no ack since 30.438. Current RTT: 32/16. 30.559 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 30.801/App, because ackElicitingInFlight | RTT:32/16 30.559 -> Packet PA|4|S0|41f98ed8b5270c0fc2964861|51|1 StreamFrame[0(CIB),0,17,fin] 30.800 loss detection timeout handler running Sending probe 1, because no ack since 30.559. Current RTT: 32/16. 30.801 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 31.285/App, because ackElicitingInFlight | RTT:32/16 30.801 -> Packet PA|5|S0|41f98ed8b5270c0fc2964861|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 31.286/App, because ackElicitingInFlight | RTT:32/16 30.802 -> Packet PA|6|S0|41f98ed8b5270c0fc2964861|51|1 StreamFrame[0(CIB),0,17,fin] 30.833 <- (13) Packet A|13|S0|1d68ce43c6efb278|1057|1 StreamFrame[0(CIB),0,1024,fin] 30.833 <- (14) Packet A|14|S0|1d68ce43c6efb278|36|1 AckFrame[6-5,3-1|Δ0] 30.833 Finished downloading https://server4:443/vhksefwbsf at 26:42.340 on ClientConnection[e51f2c14d961e57d/1d68ce43c6efb278(V1) with server4/193.167.100.100:443] 30.834 Closing ClientConnection[e51f2c14d961e57d/1d68ce43c6efb278(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.834 Cwnd(-): 6000; inflight: 0 30.834 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 30.834 -> Packet A|7|S0|41f98ed8b5270c0fc2964861|39|2 ConnectionCloseFrame[0|0|] AckFrame[14-13|Δ0] 30.834 Creating connection with server4:443 with v1 30.835 Setting up connection for downloading https://server4:443/clfnzxakln at 26:42.341 on ClientConnection[0bdb620eb5277057/86b2cd8d632d92c0(V1) with server4/193.167.100.100:443] 30.835 Original destination connection id: 0bdb620eb5277057 (scid: 86b2cd8d632d92c0) >- CryptoStream[I|ClientHello] 30.836 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.036/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.836 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.870 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 30.872 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 31.073/Handshake, because peerAwaitingAddressValidation | RTT:100/25 30.873 Discarding pn space Initial because first Handshake message is being sent 30.870 <- (2) Packet H|1|L|525|1 CryptoFrame[124,471] 30.873 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 31.073/Handshake, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[H|] 30.873 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 30.870 <- (3) Packet H|2|L|132|1 CryptoFrame[595,78] -< CryptoStream[H|] 30.870 <- (4) Packet H|3|L|89|1 CryptoFrame[673,36] 30.873 -> Packet H|0|L|50|1 AckFrame[1|Δ0] -< CryptoStream[H|] 30.873 -> Packet H|1|L|50|1 AckFrame[2-1|Δ0] 30.873 -> Packet H|2|L|50|1 AckFrame[3-1|Δ0] 30.905 <- (5) Packet H|4|L|177|1 CryptoFrame[0,124] 30.906 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] 30.908 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 31.108/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.908 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[3-1|Δ0] 30.908 Starting downloading https://server4:443/clfnzxakln at 26:42.415 on ClientConnection[0bdb620eb5277057/86b2cd8d632d92c0(V1) with server4/193.167.100.100:443] 30.908 -> Packet H|4|L|50|1 AckFrame[4-1|Δ0] 30.908 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 31.108/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.908 -> Packet A|0|S0|fa435ab5f8ddeb370260341c|51|1 StreamFrame[0(CIB),0,17,fin] 30.939 <- (6) Packet A|0|S0|86b2cd8d632d92c0|30|1 HandshakeDoneFrame[] 30.939 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 31.108/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 31.133/App, because ackElicitingInFlight | RTT:100/25 30.940 Discarding pn space Handshake because HandshakeDone is received 30.940 <- (7) Packet A|2|S0|86b2cd8d632d92c0|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 30.940 -> Packet A|1|S0|fa435ab5f8ddeb370260341c|37|1 AckFrame[2,0|Δ0] 30.940 <- (8) Packet A|3|S0|86b2cd8d632d92c0|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 30.960 -> Packet A|2|S0|fa435ab5f8ddeb370260341c|38|1 AckFrame[3-2,0|Δ19] 30.966 <- (9) Packet A|11|S0|86b2cd8d632d92c0|35|1 AckFrame[0|Δ25] 30.966 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 30.980 <- (10) Packet A|12|S0|86b2cd8d632d92c0|40|1 NewTokenFrame[00c1a70064681ba5e2] 30.999 -> Packet A|3|S0|fa435ab5f8ddeb370260341c|40|1 AckFrame[12-11,3-2,0|Δ19] 31.030 <- (11) Packet A|13|S0|86b2cd8d632d92c0|61|1 NewConnectionIdFrame[1,<0|4e6ea279713e3a163b708d28|31be3cef6accf94508de23973e93329e] 31.031 <- (12) Packet A|14|S0|86b2cd8d632d92c0|1057|1 StreamFrame[0(CIB),0,1024,fin] 31.032 -> Packet A|4|S0|fa435ab5f8ddeb370260341c|39|1 AckFrame[14-11,3-2,0|Δ0] 31.032 Finished downloading https://server4:443/clfnzxakln at 26:42.538 on ClientConnection[0bdb620eb5277057/86b2cd8d632d92c0(V1) with server4/193.167.100.100:443] 31.032 Closing ClientConnection[0bdb620eb5277057/86b2cd8d632d92c0(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 31.032 -> Packet A|5|S0|fa435ab5f8ddeb370260341c|43|2 ConnectionCloseFrame[0|0|] AckFrame[14-11,3-2,0|Δ0] 31.032 Creating connection with server4:443 with v1 31.033 Setting up connection for downloading https://server4:443/rzaqnwalqj at 26:42.539 on ClientConnection[77e8d2814aa034fb/0d5212a28c90af3c(V1) with server4/193.167.100.100:443] 31.033 Original destination connection id: 77e8d2814aa034fb (scid: 0d5212a28c90af3c) >- CryptoStream[I|ClientHello] 31.034 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 31.234/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.034 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.068 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 31.233 loss detection timeout handler running Sending probe 0, because no ack since 31.034. Current RTT: 100/25. 31.233 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 31.233 (Probe is an initial retransmit) 31.234 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.634/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 31.234 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 31.265 <- (2) Packet I|2|L|55|1 Token=[] AckFrame[1-0|Δ0] 31.266 probe count not reset on ack because handshake not yet confirmed 31.266 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 31.666/Initial, because peerAwaitingAddressValidation | RTT:100/25 31.665 loss detection timeout handler running Sending probe 1, because no ack since 31.234. Current RTT: 31/15. 31.665 Sending probe because peer awaiting address validation 31.665 (Probe is Initial ping, because there is no Initial data to retransmit) 31.665 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 363 millis, based on 32.029/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 31.665 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 31.819 <- (3) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 31.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 31.912/Handshake, because peerAwaitingAddressValidation | RTT:31/15 31.821 Discarding pn space Initial because first Handshake message is being sent 31.821 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 31.821 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 31.912/Handshake, because peerAwaitingAddressValidation | RTT:31/15 31.821 -> Packet I|3|L|1201|2 Token=[] AckFrame[3-2|Δ0] Padding(1149) 31.853 <- (5) Packet H|4|L|177|1 CryptoFrame[0,124] 31.854 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 31.854 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 31.885 <- (6) Packet H|6|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|EncryptedExtensions] 31.885 <- (7) Packet H|7|L|89|1 CryptoFrame[675,36] 31.885 -> Packet H|1|L|52|1 AckFrame[6,4|Δ0] -< CryptoStream[H|EncryptedExtensions] 31.886 -> Packet H|2|L|52|1 AckFrame[7-6,4|Δ0] 31.911 loss detection timeout handler running 31.911 Sending probe 0. Current RTT: 31/15. 31.911 Sending probe because peer awaiting address validation 31.911 (Probe is a handshake ping) 31.912 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 32.094/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 31.912 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) 31.917 <- (8) Packet H|8|L|525|1 CryptoFrame[124,471] >- CryptoStream[H|Finished] 31.919 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 32.101/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 31.919 -> Packet H|4|L|91|2 CryptoFrame[0,36] AckFrame[7-6,4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.919 Starting downloading https://server4:443/rzaqnwalqj at 26:43.426 on ClientConnection[77e8d2814aa034fb/0d5212a28c90af3c(V1) with server4/193.167.100.100:443] 31.919 -> Packet H|5|L|52|1 AckFrame[8-6,4|Δ0] 31.920 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 32.102/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 31.920 -> Packet A|0|S0|ec66cc8702c75a7755c5e765|51|1 StreamFrame[0(CIB),0,17,fin] 31.942 <- (9) Packet H|9|L|54|1 AckFrame[3-0|Δ0] 31.943 probe count not reset on ack because handshake not yet confirmed 31.943 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 157 millis, based on 32.101/Handshake, because ackElicitingInFlight | RTT:31/15 31.989 <- (10) Packet H|11|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 31.990 -> Packet H|6|L|52|1 AckFrame[11,9-8|Δ0] 32.100 loss detection timeout handler running Sending probe 1, because no ack since 31.919. Current RTT: 31/12. 32.100 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 32.100 (Probe is a handshake retransmit) 32.100 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 315 millis, based on 32.416/Handshake, because ackElicitingInFlight | RTT:31/12 32.100 -> Packet PH|7|L|84|1 CryptoFrame[0,36] 32.101 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 315 millis, based on 32.417/Handshake, because ackElicitingInFlight | RTT:31/12 32.101 -> Packet PH|8|L|84|1 CryptoFrame[0,36] 32.132 <- (11) Packet A|0|S0|0d5212a28c90af3c|30|1 HandshakeDoneFrame[] 32.132 State is set to Confirmed reschedule loss detection timer for PTO over 203 millis, based on 32.336/App, because ackElicitingInFlight | RTT:31/12 reschedule loss detection timer for PTO over -108 millis, based on 32.024/App, because ackElicitingInFlight | RTT:31/12 32.132 loss detection timeout handler running 32.132 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 31.920. Current RTT: 31/12. 32.132 (Probe is retransmit on level App) 32.132 <- (12) Packet A|2|S0|0d5212a28c90af3c|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 207 millis, based on 32.340/App, because ackElicitingInFlight | RTT:31/12 32.132 -> Packet PA|1|S0|ec66cc8702c75a7755c5e765|51|1 StreamFrame[0(CIB),0,17,fin] 32.133 -> Packet A|2|S0|ec66cc8702c75a7755c5e765|37|1 AckFrame[2,0|Δ0] 32.133 Discarding packet (55 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 32.134 <- (14) Packet A|10|S0|0d5212a28c90af3c|37|1 AckFrame[0|Δ182] reschedule loss detection timer for PTO over 102 millis, based on 32.236/App, because ackElicitingInFlight | RTT:31/12 32.222 <- (15) Packet A|11|S0|0d5212a28c90af3c|30|1 HandshakeDoneFrame[] 32.236 loss detection timeout handler running Sending probe 0, because no ack since 32.132. Current RTT: 51/48. 32.236 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 535 millis, based on 32.772/App, because ackElicitingInFlight | RTT:51/48 32.236 -> Packet PA|3|S0|ec66cc8702c75a7755c5e765|51|1 StreamFrame[0(CIB),0,17,fin] 32.241 -> Packet A|4|S0|ec66cc8702c75a7755c5e765|40|1 AckFrame[11-10,2,0|Δ19] 32.273 <- (16) Packet A|13|S0|0d5212a28c90af3c|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 32.274 <- (17) Packet A|15|S0|0d5212a28c90af3c|1057|1 StreamFrame[0(CIB),0,1024,fin] 32.274 -> Packet A|5|S0|ec66cc8702c75a7755c5e765|43|1 AckFrame[15,13,11-10,2,0|Δ0] 32.274 Finished downloading https://server4:443/rzaqnwalqj at 26:43.781 on ClientConnection[77e8d2814aa034fb/0d5212a28c90af3c(V1) with server4/193.167.100.100:443] 32.274 Closing ClientConnection[77e8d2814aa034fb/0d5212a28c90af3c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 32.274 -> Packet A|6|S0|ec66cc8702c75a7755c5e765|47|2 ConnectionCloseFrame[0|0|] AckFrame[15,13,11-10,2,0|Δ0] 32.275 Creating connection with server4:443 with v1 32.275 Setting up connection for downloading https://server4:443/xvljhmhqzj at 26:43.782 on ClientConnection[c27d5016490c3e8f/f46cdd599cb6f55a(V1) with server4/193.167.100.100:443] 32.275 Original destination connection id: c27d5016490c3e8f (scid: f46cdd599cb6f55a) >- CryptoStream[I|ClientHello] 32.276 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.476/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 32.276 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 32.292 <- (18) Packet A|16|S0|0d5212a28c90af3c|37|1 AckFrame[4-3,0|Δ25] 32.292 -> Packet A|7|S0|ec66cc8702c75a7755c5e765|47|2 ConnectionCloseFrame[0|0|] AckFrame[15,13,11-10,2,0|Δ0] 32.305 <- (19) Packet A|17|S0|0d5212a28c90af3c|40|1 NewTokenFrame[00c1a70064681ba5e3] 32.305 -> Packet A|8|S0|ec66cc8702c75a7755c5e765|47|2 ConnectionCloseFrame[0|0|] AckFrame[15,13,11-10,2,0|Δ0] 32.310 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 32.311 Discarding packet (132 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 32.311 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 32.311 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 32.311 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 32.511/Initial, because peerAwaitingAddressValidation | RTT:100/25 32.510 loss detection timeout handler running Sending probe 0, because no ack since 32.276. Current RTT: 34/17. 32.510 Sending probe because peer awaiting address validation 32.510 (Probe is Initial ping, because there is no Initial data to retransmit) 32.511 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 32.715/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.510 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 32.714 loss detection timeout handler running Sending probe 1, because no ack since 32.510. Current RTT: 34/17. 32.714 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 32.714 (Probe is Initial ping, because there is no Initial data to retransmit) 32.714 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 33.122/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.714 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 32.715 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 33.123/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.715 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 32.746 <- (5) Packet I|2|L|57|1 Token=[] AckFrame[2,0|Δ0] 32.746 probe count not reset on ack because handshake not yet confirmed 32.746 Cwnd(-): 6000; inflight: 1201 32.746 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 33.154/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 32.747 <- (6) Packet I|3|L|57|1 Token=[] AckFrame[3-2,0|Δ0] 32.747 probe count not reset on ack because handshake not yet confirmed 32.747 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 33.107/Initial, because peerAwaitingAddressValidation | RTT:34/14 33.061 <- (7) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 33.064 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 33.142/Handshake, because peerAwaitingAddressValidation | RTT:34/11 33.064 Discarding pn space Initial because first Handshake message is being sent 33.064 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 33.064 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 33.142/Handshake, because peerAwaitingAddressValidation | RTT:34/11 33.064 -> Packet I|4|L|1201|2 Token=[] AckFrame[4-1|Δ0] Padding(1149) 33.141 loss detection timeout handler running 33.141 Sending probe 0. Current RTT: 34/11. 33.141 Sending probe because peer awaiting address validation 33.141 (Probe is a handshake ping) 33.142 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 155 millis, based on 33.298/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 33.142 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 33.173 <- (9) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|] 33.173 <- (10) Packet H|6|L|54|1 AckFrame[0|Δ0] 33.174 -> Packet H|1|L|50|1 AckFrame[5|Δ0] 33.174 probe count not reset on ack because handshake not yet confirmed 33.174 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.205 <- (11) Packet H|7|L|132|1 CryptoFrame[595,78] -< CryptoStream[H|] 33.205 <- (12) Packet H|8|L|89|1 CryptoFrame[673,36] -< CryptoStream[H|] 33.205 -> Packet H|2|L|50|1 AckFrame[7-5|Δ0] 33.205 -> Packet H|3|L|50|1 AckFrame[8-5|Δ0] 33.209 <- (13) Packet H|9|L|177|1 CryptoFrame[0,124] 33.210 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 139 millis, based on 33.353/Handshake, because ackElicitingInFlight | RTT:34/9 33.213 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[8-5|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.213 Starting downloading https://server4:443/xvljhmhqzj at 26:44.720 on ClientConnection[c27d5016490c3e8f/f46cdd599cb6f55a(V1) with server4/193.167.100.100:443] 33.213 -> Packet H|5|L|50|1 AckFrame[9-5|Δ0] 33.214 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 138 millis, based on 33.353/Handshake, because ackElicitingInFlight | RTT:34/9 33.213 -> Packet A|0|S0|886faebe046fba917e10f25d|51|1 StreamFrame[0(CIB),0,17,fin] 33.244 <- (14) Packet A|0|S0|f46cdd599cb6f55a|30|1 HandshakeDoneFrame[] 33.244 State is set to Confirmed reschedule loss detection timer for PTO over 108 millis, based on 33.353/Handshake, because ackElicitingInFlight | RTT:34/9 reschedule loss detection timer for PTO over 64 millis, based on 33.308/App, because ackElicitingInFlight | RTT:34/9 33.244 Discarding pn space Handshake because HandshakeDone is received 33.245 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 33.245 <- (16) Packet A|4|S0|f46cdd599cb6f55a|61|1 NewConnectionIdFrame[1,<0|145a76207782eef74ba3ccd2|e821f772f91c7acfb8fdfed81f262968] 33.245 -> Packet A|1|S0|886faebe046fba917e10f25d|37|1 AckFrame[4,0|Δ0] 33.276 <- (17) Packet A|7|S0|f46cdd599cb6f55a|40|1 NewTokenFrame[00c1a70064681ba5e4] 33.295 -> Packet A|2|S0|886faebe046fba917e10f25d|40|1 AckFrame[7,4,0|Δ19] 33.308 loss detection timeout handler running Sending probe 0, because no ack since 33.213. Current RTT: 34/9. 33.308 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 189 millis, based on 33.499/App, because ackElicitingInFlight | RTT:34/9 33.309 -> Packet PA|3|S0|886faebe046fba917e10f25d|51|1 StreamFrame[0(CIB),0,17,fin] 33.365 <- (18) Packet A|10|S0|f46cdd599cb6f55a|37|1 AckFrame[3,1-0|Δ25] 33.365 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 33.381 <- (19) Packet A|11|S0|f46cdd599cb6f55a|40|1 NewTokenFrame[00c1a70064681ba5e4] 33.400 -> Packet A|4|S0|886faebe046fba917e10f25d|38|1 AckFrame[11-10,7|Δ19] 33.580 <- (20) Packet A|15|S0|f46cdd599cb6f55a|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 33.599 -> Packet A|5|S0|886faebe046fba917e10f25d|40|1 AckFrame[15,11-10,7|Δ19] 33.631 <- (21) Packet A|16|S0|f46cdd599cb6f55a|1057|1 StreamFrame[0(CIB),0,1024,fin] 33.631 <- (22) Packet A|17|S0|f46cdd599cb6f55a|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 33.632 Finished downloading https://server4:443/xvljhmhqzj at 26:45.138 on ClientConnection[c27d5016490c3e8f/f46cdd599cb6f55a(V1) with server4/193.167.100.100:443] 33.632 Closing ClientConnection[c27d5016490c3e8f/f46cdd599cb6f55a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 33.632 -> Packet A|6|S0|886faebe046fba917e10f25d|39|1 AckFrame[17-15,11-10,7|Δ0] 33.632 -> Packet A|7|S0|886faebe046fba917e10f25d|43|2 ConnectionCloseFrame[0|0|] AckFrame[17-15,11-10,7|Δ0] 33.633 Creating connection with server4:443 with v1 33.633 Setting up connection for downloading https://server4:443/rwlqezcgow at 26:45.140 on ClientConnection[675c5403fe2f8094/de35c2aa2501001c(V1) with server4/193.167.100.100:443] 33.633 Original destination connection id: 675c5403fe2f8094 (scid: de35c2aa2501001c) >- CryptoStream[I|ClientHello] 33.634 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 33.834/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.634 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 33.668 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 33.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.870/Handshake, because peerAwaitingAddressValidation | RTT:100/25 33.670 Discarding pn space Initial because first Handshake message is being sent 33.670 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.870/Handshake, because peerAwaitingAddressValidation | RTT:100/25 33.668 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 33.670 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 33.671 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 33.668 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 33.671 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 33.668 <- (4) Packet H|2|L|133|1 CryptoFrame[595,79] 33.671 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 33.668 <- (5) Packet H|3|L|89|1 CryptoFrame[674,36] 33.673 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 33.673 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.873/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.673 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] 33.674 Starting downloading https://server4:443/rwlqezcgow at 26:45.180 on ClientConnection[675c5403fe2f8094/de35c2aa2501001c(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 33.674 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 33.874/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 33.674 -> Packet A|0|S0|978858c9844997b7fcdd12b8|51|1 StreamFrame[0(CIB),0,17,fin] 33.674 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 33.705 <- (6) Packet A|1|S0|de35c2aa2501001c|40|1 NewTokenFrame[00c1a70064681ba5e5] 33.706 <- (7) Packet A|11|S0|de35c2aa2501001c|61|1 NewConnectionIdFrame[1,<0|89a6b683b3936a992d6e7d41|1a6c04fe7196b7da4c5f12df194bff3c] 33.706 -> Packet A|1|S0|978858c9844997b7fcdd12b8|37|1 AckFrame[11,1|Δ0] 33.737 <- (8) Packet A|14|S0|de35c2aa2501001c|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 33.757 -> Packet A|2|S0|978858c9844997b7fcdd12b8|40|1 AckFrame[14,11,1|Δ19] 33.794 <- (9) Packet A|15|S0|de35c2aa2501001c|30|1 HandshakeDoneFrame[] 33.794 State is set to Confirmed reschedule loss detection timer for PTO over 79 millis, based on 33.873/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 104 millis, based on 33.899/App, because ackElicitingInFlight | RTT:100/25 33.794 Discarding pn space Handshake because HandshakeDone is received 33.813 -> Packet A|3|S0|978858c9844997b7fcdd12b8|40|1 AckFrame[15-14,11,1|Δ19] 33.885 <- (10) Packet A|17|S0|de35c2aa2501001c|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 33.885 <- (11) Packet A|18|S0|de35c2aa2501001c|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 33.886 -> Packet A|4|S0|978858c9844997b7fcdd12b8|41|1 AckFrame[18-17,15-14,11,1|Δ0] 33.898 loss detection timeout handler running Sending probe 0, because no ack since 33.674. Current RTT: 100/25. 33.898 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 34.348/App, because ackElicitingInFlight | RTT:100/25 33.898 -> Packet PA|5|S0|978858c9844997b7fcdd12b8|51|1 StreamFrame[0(CIB),0,17,fin] 34.066 <- (12) Packet A|19|S0|de35c2aa2501001c|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 34.066 <- (13) Packet A|20|S0|de35c2aa2501001c|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 34.067 -> Packet A|6|S0|978858c9844997b7fcdd12b8|41|1 AckFrame[20-17,15-14,11,1|Δ0] 34.348 loss detection timeout handler running Sending probe 1, because no ack since 33.898. Current RTT: 100/25. 34.348 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 35.248/App, because ackElicitingInFlight | RTT:100/25 34.348 -> Packet PA|7|S0|978858c9844997b7fcdd12b8|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 35.249/App, because ackElicitingInFlight | RTT:100/25 34.349 -> Packet PA|8|S0|978858c9844997b7fcdd12b8|51|1 StreamFrame[0(CIB),0,17,fin] 34.380 <- (14) Packet A|21|S0|de35c2aa2501001c|1057|1 StreamFrame[0(CIB),0,1024,fin] 34.380 <- (15) Packet A|22|S0|de35c2aa2501001c|36|1 AckFrame[8-6,3-1|Δ0] 34.380 Finished downloading https://server4:443/rwlqezcgow at 26:45.887 on ClientConnection[675c5403fe2f8094/de35c2aa2501001c(V1) with server4/193.167.100.100:443] 34.380 Closing ClientConnection[675c5403fe2f8094/de35c2aa2501001c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 34.380 Cwnd(-): 6000; inflight: 0 34.380 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 34.381 -> Packet A|9|S0|978858c9844997b7fcdd12b8|39|2 ConnectionCloseFrame[0|0|] AckFrame[22-21|Δ0] 34.381 Creating connection with server4:443 with v1 34.381 Setting up connection for downloading https://server4:443/khfzfvnwfd at 26:45.888 on ClientConnection[3ceed35006b5f271/11c78278eb801dae(V1) with server4/193.167.100.100:443] 34.381 Original destination connection id: 3ceed35006b5f271 (scid: 11c78278eb801dae) >- CryptoStream[I|ClientHello] 34.383 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 34.583/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.383 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.412 <- (16) Packet A|26|S0|de35c2aa2501001c|33|1 ConnectionCloseFrame[0|0|] 34.416 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 34.419 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 34.619/Handshake, because peerAwaitingAddressValidation | RTT:100/25 34.419 Discarding pn space Initial because first Handshake message is being sent 34.419 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 34.619/Handshake, because peerAwaitingAddressValidation | RTT:100/25 34.417 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 34.419 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 34.419 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 34.417 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 34.420 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 34.417 <- (4) Packet H|3|L|89|1 CryptoFrame[675,36] 34.420 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 34.420 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 34.420 -> Packet H|2|L|52|1 AckFrame[3,1-0|Δ0] 34.457 <- (6) Packet H|4|L|134|1 CryptoFrame[595,80] >- CryptoStream[H|Finished] 34.459 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 34.659/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.459 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[3,1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 34.460 Starting downloading https://server4:443/khfzfvnwfd at 26:45.966 on ClientConnection[3ceed35006b5f271/11c78278eb801dae(V1) with server4/193.167.100.100:443] 34.460 -> Packet H|4|L|52|1 AckFrame[4-3,1-0|Δ0] 34.460 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 34.660/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.460 -> Packet A|0|S0|90aab79a8ed43fc21e0077df|51|1 StreamFrame[0(CIB),0,17,fin] 34.659 loss detection timeout handler running Sending probe 0, because no ack since 34.459. Current RTT: 100/25. 34.659 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 34.659 (Probe is a handshake retransmit) 34.659 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 35.059/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.659 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 34.683 <- (7) Packet H|8|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 34.684 -> Packet H|6|L|54|1 AckFrame[8,4-3,1-0|Δ0] 34.690 <- (8) Packet A|0|S0|11c78278eb801dae|30|1 HandshakeDoneFrame[] 34.691 State is set to Confirmed reschedule loss detection timer for PTO over 219 millis, based on 34.910/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -5 millis, based on 34.685/App, because ackElicitingInFlight | RTT:100/25 34.691 Discarding pn space Handshake because HandshakeDone is received 34.691 <- (9) Packet A|3|S0|11c78278eb801dae|40|1 NewTokenFrame[00c1a70064681ba5e6] 34.691 <- (10) Packet A|4|S0|11c78278eb801dae|290|1 CryptoFrame[0,257] 34.691 loss detection timeout handler running Sending probe 0, because no ack since 34.460. Current RTT: 100/25. 34.691 (Probe is retransmit on level App) -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 449 millis, based on 35.141/App, because ackElicitingInFlight | RTT:100/25 34.691 <- (11) Packet A|5|S0|11c78278eb801dae|291|1 CryptoFrame[257,257] 34.691 -> Packet PA|1|S0|90aab79a8ed43fc21e0077df|58|2 AckFrame[3,0|Δ0] StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 34.692 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 34.692 -> Packet A|2|S0|90aab79a8ed43fc21e0077df|37|1 AckFrame[5-3,0|Δ0] 34.723 <- (13) Packet A|7|S0|11c78278eb801dae|1057|1 StreamFrame[0(CIB),0,1024,fin] 34.724 Finished downloading https://server4:443/khfzfvnwfd at 26:46.230 on ClientConnection[3ceed35006b5f271/11c78278eb801dae(V1) with server4/193.167.100.100:443] 34.724 Closing ClientConnection[3ceed35006b5f271/11c78278eb801dae(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 34.724 -> Packet A|3|S0|90aab79a8ed43fc21e0077df|43|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-3,0|Δ0] 34.724 Creating connection with server4:443 with v1 34.725 Setting up connection for downloading https://server4:443/grzkinunyl at 26:46.231 on ClientConnection[34ad0f1e11c82121/bf7536dceaf13d6b(V1) with server4/193.167.100.100:443] 34.725 Original destination connection id: 34ad0f1e11c82121 (scid: bf7536dceaf13d6b) >- CryptoStream[I|ClientHello] 34.728 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 34.928/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.728 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 34.927 loss detection timeout handler running Sending probe 0, because no ack since 34.728. Current RTT: 100/25. 34.927 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 34.927 (Probe is an initial retransmit) 34.927 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 35.327/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 34.927 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.326 loss detection timeout handler running Sending probe 1, because no ack since 34.927. Current RTT: 100/25. 35.327 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 35.327 (Probe is an initial retransmit) 35.327 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 36.127/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.327 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.328 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 36.128/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 35.328 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 35.361 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 35.361 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 35.361 Discarding packet (132 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 36.113 <- (4) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 36.115 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.315/Handshake, because peerAwaitingAddressValidation | RTT:100/25 36.116 Discarding pn space Initial because first Handshake message is being sent 36.116 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.316/Handshake, because peerAwaitingAddressValidation | RTT:100/25 36.116 -> Packet I|4|L|1201|2 Token=[] AckFrame[3|Δ0] Padding(1149) 36.148 <- (5) Packet H|4|L|177|1 CryptoFrame[0,124] 36.148 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 36.148 <- (6) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 36.149 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 36.149 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 36.180 <- (7) Packet H|6|L|132|1 CryptoFrame[595,78] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 36.180 <- (8) Packet H|7|L|89|1 CryptoFrame[673,36] 36.182 -> Packet H|2|L|50|1 AckFrame[6-4|Δ0] >- CryptoStream[H|Finished] 36.182 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.382/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.182 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[6-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 36.183 Starting downloading https://server4:443/grzkinunyl at 26:47.689 on ClientConnection[34ad0f1e11c82121/bf7536dceaf13d6b(V1) with server4/193.167.100.100:443] 36.182 -> Packet H|4|L|50|1 AckFrame[7-4|Δ0] 36.183 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.383/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.183 -> Packet A|0|S0|8dd438cb3b192270d9591f7f|51|1 StreamFrame[0(CIB),0,17,fin] 36.213 <- (9) Packet A|0|S0|bf7536dceaf13d6b|30|1 HandshakeDoneFrame[] 36.214 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 36.382/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 36.408/App, because ackElicitingInFlight | RTT:100/25 36.214 Discarding pn space Handshake because HandshakeDone is received 36.214 <- (10) Packet A|2|S0|bf7536dceaf13d6b|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 36.214 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 36.214 <- (12) Packet A|4|S0|bf7536dceaf13d6b|61|1 NewConnectionIdFrame[1,<0|603c06c3bf05c67b38cbe913|9758830a972651f85931d640fc4d6339] 36.214 -> Packet A|1|S0|8dd438cb3b192270d9591f7f|37|1 AckFrame[2,0|Δ0] 36.215 <- (13) Packet A|5|S0|bf7536dceaf13d6b|1057|1 StreamFrame[0(CIB),0,1024,fin] 36.215 -> Packet A|2|S0|8dd438cb3b192270d9591f7f|40|1 AckFrame[5-4,2,0|Δ1] 36.216 Finished downloading https://server4:443/grzkinunyl at 26:47.722 on ClientConnection[34ad0f1e11c82121/bf7536dceaf13d6b(V1) with server4/193.167.100.100:443] 36.216 Closing ClientConnection[34ad0f1e11c82121/bf7536dceaf13d6b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 36.216 -> Packet A|3|S0|8dd438cb3b192270d9591f7f|43|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2,0|Δ0] 36.216 Creating connection with server4:443 with v1 36.217 Setting up connection for downloading https://server4:443/hbxubvnyea at 26:47.723 on ClientConnection[7ab2dd7795294ab8/1f1d305e6478c336(V1) with server4/193.167.100.100:443] 36.217 Original destination connection id: 7ab2dd7795294ab8 (scid: 1f1d305e6478c336) >- CryptoStream[I|ClientHello] 36.218 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 36.418/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.218 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.240 <- (14) Packet A|6|S0|bf7536dceaf13d6b|35|1 AckFrame[0|Δ25] 36.240 -> Packet A|4|S0|8dd438cb3b192270d9591f7f|43|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2,0|Δ0] 36.246 <- (15) Packet A|7|S0|bf7536dceaf13d6b|40|1 NewTokenFrame[00c1a70064681ba5e7] 36.247 -> Packet A|5|S0|8dd438cb3b192270d9591f7f|43|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2,0|Δ0] 36.247 <- (16) Packet A|8|S0|bf7536dceaf13d6b|33|1 ConnectionCloseFrame[0|0|] 36.417 loss detection timeout handler running Sending probe 0, because no ack since 36.218. Current RTT: 100/25. 36.417 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 36.417 (Probe is an initial retransmit) 36.417 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 36.817/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.417 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 36.451 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 36.454 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.654/Handshake, because peerAwaitingAddressValidation | RTT:100/25 36.454 Discarding pn space Initial because first Handshake message is being sent 36.454 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 36.654/Handshake, because peerAwaitingAddressValidation | RTT:100/25 36.454 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 36.451 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 36.454 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 36.451 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 36.452 <- (4) Packet H|2|L|133|1 CryptoFrame[595,79] 36.455 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 36.455 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 36.456 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] 36.526 <- (5) Packet H|4|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 36.527 -> Packet H|3|L|52|1 AckFrame[4,2-0|Δ0] 36.653 loss detection timeout handler running 36.653 Sending probe 0. Current RTT: 100/25. 36.653 Sending probe because peer awaiting address validation 36.653 (Probe is a handshake ping) 36.653 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 37.053/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 36.653 -> Packet PH|4|L|48|2 PingFrame[] Padding(2) 36.684 <- (6) Packet H|8|L|56|1 AckFrame[4,1-0|Δ0] 36.684 probe count not reset on ack because handshake not yet confirmed 36.685 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 36.755 <- (7) Packet H|9|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 36.755 <- (8) Packet H|10|L|89|1 CryptoFrame[674,36] 36.755 -> Packet H|5|L|54|1 AckFrame[9-8,4,2|Δ0] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 179 millis, based on 36.935/Handshake, because ackElicitingInFlight | RTT:30/15 36.755 -> Packet H|6|L|94|2 CryptoFrame[0,36] AckFrame[9-8,4,2|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 36.756 Starting downloading https://server4:443/hbxubvnyea at 26:48.262 on ClientConnection[7ab2dd7795294ab8/1f1d305e6478c336(V1) with server4/193.167.100.100:443] 36.756 -> Packet H|7|L|54|1 AckFrame[10-8,4,2|Δ0] 36.756 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 178 millis, based on 36.935/Handshake, because ackElicitingInFlight | RTT:30/15 36.756 -> Packet A|0|S0|561759126ace67143b859da7|51|1 StreamFrame[0(CIB),0,17,fin] 36.786 <- (9) Packet H|11|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 36.786 <- (10) Packet H|12|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 36.787 -> Packet H|8|L|54|1 AckFrame[11-8,4,2|Δ0] 36.787 -> Packet H|9|L|54|1 AckFrame[12-8,4,2|Δ0] 36.935 loss detection timeout handler running Sending probe 1, because no ack since 36.755. Current RTT: 30/15. 36.935 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 36.935 (Probe is a handshake retransmit) 36.935 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 359 millis, based on 37.295/Handshake, because ackElicitingInFlight | RTT:30/15 36.935 -> Packet PH|10|L|84|1 CryptoFrame[0,36] 36.936 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 359 millis, based on 37.296/Handshake, because ackElicitingInFlight | RTT:30/15 36.936 -> Packet PH|11|L|84|1 CryptoFrame[0,36] 37.295 loss detection timeout handler running Sending probe 2, because no ack since 36.756. Current RTT: 30/15. 37.295 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 37.295 (Probe is a handshake retransmit) 37.295 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 719 millis, based on 38.015/Handshake, because ackElicitingInFlight | RTT:30/15 37.295 -> Packet PH|12|L|84|1 CryptoFrame[0,36] 37.296 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 719 millis, based on 38.016/Handshake, because ackElicitingInFlight | RTT:30/15 37.296 -> Packet PH|13|L|84|1 CryptoFrame[0,36] 37.327 <- (11) Packet A|0|S0|1f1d305e6478c336|30|1 HandshakeDoneFrame[] 37.327 State is set to Confirmed reschedule loss detection timer for PTO over 349 millis, based on 37.676/App, because ackElicitingInFlight | RTT:30/15 reschedule loss detection timer for PTO over -455 millis, based on 36.871/App, because ackElicitingInFlight | RTT:30/15 37.327 Discarding pn space Handshake because HandshakeDone is received 37.327 loss detection timeout handler running Sending probe 0, because no ack since 36.756. Current RTT: 30/15. 37.327 <- (12) Packet A|1|S0|1f1d305e6478c336|40|1 NewTokenFrame[00c1a70064681ba5e8] 37.328 (Probe is retransmit on level App) 37.327 <- (13) Packet A|2|S0|1f1d305e6478c336|290|1 CryptoFrame[0,257] reschedule loss detection timer for PTO over 229 millis, based on 37.558/App, because ackElicitingInFlight | RTT:30/15 -< CryptoStream[A|NewSessionTicket] 37.328 -> Packet PA|1|S0|561759126ace67143b859da7|56|2 AckFrame[1-0|Δ0] StreamFrame[0(CIB),0,17,fin] 37.328 <- (14) Packet A|3|S0|1f1d305e6478c336|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 37.328 <- (15) Packet A|4|S0|1f1d305e6478c336|61|1 NewConnectionIdFrame[1,<0|14c6ffeb2e8d91846172556d|5be6f40ba053406e0339a2aca08f8c86] 37.328 -> Packet A|2|S0|561759126ace67143b859da7|35|1 AckFrame[3-0|Δ0] 37.329 <- (16) Packet A|5|S0|1f1d305e6478c336|1057|1 StreamFrame[0(CIB),0,1024,fin] 37.329 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 37.329 <- (18) Packet A|6|S0|1f1d305e6478c336|37|1 AckFrame[0|Δ540] 37.329 -> Packet A|3|S0|561759126ace67143b859da7|35|1 AckFrame[5-0|Δ0] reschedule loss detection timer for PTO over 113 millis, based on 37.443/App, because ackElicitingInFlight | RTT:30/15 37.329 Finished downloading https://server4:443/hbxubvnyea at 26:48.836 on ClientConnection[7ab2dd7795294ab8/1f1d305e6478c336(V1) with server4/193.167.100.100:443] 37.329 Closing ClientConnection[7ab2dd7795294ab8/1f1d305e6478c336(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 37.330 -> Packet A|4|S0|561759126ace67143b859da7|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-0|Δ0] 37.330 Creating connection with server4:443 with v1 37.330 Setting up connection for downloading https://server4:443/pcimcirjhl at 26:48.837 on ClientConnection[498b7fbbda3b4052/113892994683c591(V1) with server4/193.167.100.100:443] 37.330 Original destination connection id: 498b7fbbda3b4052 (scid: 113892994683c591) >- CryptoStream[I|ClientHello] 37.332 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 37.532/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.331 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 37.360 <- (19) Packet A|7|S0|1f1d305e6478c336|33|1 ConnectionCloseFrame[0|0|] 37.365 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 37.368 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 37.568/Handshake, because peerAwaitingAddressValidation | RTT:100/25 37.368 Discarding pn space Initial because first Handshake message is being sent 37.368 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 37.365 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] reschedule loss detection timer for PTO over 199 millis, based on 37.568/Handshake, because peerAwaitingAddressValidation | RTT:100/25 37.368 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 37.368 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 37.366 <- (3) Packet H|3|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions] 37.368 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 37.369 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 37.369 -> Packet H|1|L|52|1 AckFrame[3,0|Δ0] 37.406 <- (5) Packet H|5|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions] 37.406 -> Packet H|2|L|54|1 AckFrame[5,3,0|Δ0] 37.494 <- (6) Packet H|6|L|525|1 CryptoFrame[124,471] >- CryptoStream[H|Finished] 37.497 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 37.697/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.497 -> Packet H|3|L|94|2 CryptoFrame[0,36] AckFrame[5,3,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 37.494 <- (7) Packet H|7|L|133|1 CryptoFrame[595,79] 37.497 Starting downloading https://server4:443/pcimcirjhl at 26:49.004 on ClientConnection[498b7fbbda3b4052/113892994683c591(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 37.497 -> Packet H|4|L|54|1 AckFrame[6-5,3,0|Δ0] 37.498 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 37.698/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.498 -> [Packet H|5|L|54|1 AckFrame[7-5,3,0|Δ0], Packet A|0|S0|1c8c87bdb3b277611ee4218a|51|1 StreamFrame[0(CIB),0,17,fin]] 37.697 loss detection timeout handler running Sending probe 0, because no ack since 37.497. Current RTT: 100/25. 37.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 37.697 (Probe is a handshake retransmit) 37.697 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 38.097/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 37.697 -> Packet PH|6|L|84|1 CryptoFrame[0,36] 38.096 loss detection timeout handler running Sending probe 1, because no ack since 37.498. Current RTT: 100/25. 38.096 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 38.096 (Probe is a handshake retransmit) 38.097 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 38.897/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 38.097 -> Packet PH|7|L|84|1 CryptoFrame[0,36] 38.098 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 38.898/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 38.098 -> Packet PH|8|L|84|1 CryptoFrame[0,36] 38.128 <- (8) Packet A|1|S0|113892994683c591|40|1 NewTokenFrame[00c1a70064681ba5e9] 38.129 <- (9) Packet A|2|S0|113892994683c591|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 38.129 <- (10) Packet A|3|S0|113892994683c591|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 38.129 <- (11) Packet A|4|S0|113892994683c591|61|1 NewConnectionIdFrame[1,<0|7c182d2d77d23e37462df234|12420b49a85e713a28973416044babba] 38.129 -> Packet A|1|S0|1c8c87bdb3b277611ee4218a|35|1 AckFrame[2-1|Δ0] 38.129 -> Packet A|2|S0|1c8c87bdb3b277611ee4218a|35|1 AckFrame[4-1|Δ0] 38.130 <- (12) Packet H|9|L|58|1 AckFrame[8-7,5-4,1-0|Δ0] 38.130 probe count not reset on ack because handshake not yet confirmed 38.130 Retransmitting CryptoFrame[0,36] on level Handshake 38.130 Cwnd(-): 6000; inflight: 51 38.130 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 38.130 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 38.130 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 383 millis, based on 38.514/Handshake, because ackElicitingInFlight | RTT:32/16 38.130 -> Packet H|9|L|84|1 CryptoFrame[0,36] 38.160 <- (13) Packet A|7|S0|113892994683c591|30|1 HandshakeDoneFrame[] 38.160 State is set to Confirmed reschedule loss detection timer for PTO over -178 millis, based on 37.982/App, because ackElicitingInFlight | RTT:32/16 38.161 loss detection timeout handler running Sending probe 0, because no ack since 37.498. Current RTT: 32/16. reschedule loss detection timer for PTO over -541 millis, based on 37.619/App, because ackElicitingInFlight | RTT:32/16 38.161 Discarding pn space Handshake because HandshakeDone is received 38.161 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 38.403/App, because ackElicitingInFlight | RTT:32/16 38.161 -> Packet PA|3|S0|1c8c87bdb3b277611ee4218a|51|1 StreamFrame[0(CIB),0,17,fin] 38.161 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 38.180 -> Packet A|4|S0|1c8c87bdb3b277611ee4218a|38|1 AckFrame[7,4-1|Δ19] 38.212 <- (15) Packet A|8|S0|113892994683c591|1057|1 StreamFrame[0(CIB),0,1024,fin] 38.213 Finished downloading https://server4:443/pcimcirjhl at 26:49.719 on ClientConnection[498b7fbbda3b4052/113892994683c591(V1) with server4/193.167.100.100:443] 38.213 Closing ClientConnection[498b7fbbda3b4052/113892994683c591(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 38.213 -> Packet A|5|S0|1c8c87bdb3b277611ee4218a|41|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,4-1|Δ0] 38.213 Creating connection with server4:443 with v1 38.214 Setting up connection for downloading https://server4:443/wersqasuqb at 26:49.720 on ClientConnection[c1b9fcdea2a97c91/7e2dc3e8b07e4bc2(V1) with server4/193.167.100.100:443] 38.214 Original destination connection id: c1b9fcdea2a97c91 (scid: 7e2dc3e8b07e4bc2) >- CryptoStream[I|ClientHello] 38.215 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 38.415/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 38.215 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 38.217 <- (16) Packet A|9|S0|113892994683c591|35|1 AckFrame[4-0|Δ25] 38.217 -> Packet A|6|S0|1c8c87bdb3b277611ee4218a|41|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,4-1|Δ0] 38.244 <- (17) Packet A|10|S0|113892994683c591|33|1 ConnectionCloseFrame[0|0|] 38.249 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 38.249 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 38.249 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 38.250 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 38.249 <- (5) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 38.250 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 38.450/Initial, because peerAwaitingAddressValidation | RTT:100/25 38.449 loss detection timeout handler running Sending probe 0, because no ack since 38.215. Current RTT: 34/17. 38.449 Sending probe because peer awaiting address validation 38.449 (Probe is Initial ping, because there is no Initial data to retransmit) 38.449 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 38.653/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 38.449 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 38.652 loss detection timeout handler running Sending probe 1, because no ack since 38.449. Current RTT: 34/17. 38.653 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 38.653 (Probe is Initial ping, because there is no Initial data to retransmit) 38.653 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 39.061/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 38.653 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 38.654 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 39.062/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 38.654 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 39.000 <- (6) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 39.003 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 39.105/Handshake, because peerAwaitingAddressValidation | RTT:34/17 39.003 Discarding pn space Initial because first Handshake message is being sent 39.003 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 39.105/Handshake, because peerAwaitingAddressValidation | RTT:34/17 39.003 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 39.003 -> Packet I|4|L|1201|2 Token=[] AckFrame[3,1|Δ0] Padding(1147) 39.104 loss detection timeout handler running 39.104 Sending probe 0. Current RTT: 34/17. 39.104 Sending probe because peer awaiting address validation 39.104 (Probe is a handshake ping) 39.104 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 39.308/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 39.104 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 39.135 <- (8) Packet H|6|L|54|1 AckFrame[0|Δ0] 39.135 probe count not reset on ack because handshake not yet confirmed 39.135 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 39.140 <- (9) Packet H|7|L|177|1 CryptoFrame[0,124] 39.141 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 39.141 <- (10) Packet H|8|L|525|1 CryptoFrame[124,471] 39.141 -> Packet H|1|L|50|1 AckFrame[7-6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 39.141 -> Packet H|2|L|50|1 AckFrame[8-6|Δ0] 39.172 <- (11) Packet H|9|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 39.172 <- (12) Packet H|10|L|89|1 CryptoFrame[674,36] 39.174 -> Packet H|3|L|50|1 AckFrame[9-6|Δ0] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 179 millis, based on 39.355/Handshake, because ackElicitingInFlight | RTT:34/14 39.175 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[9-6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 39.173 <- (13) Packet H|11|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 39.175 Starting downloading https://server4:443/wersqasuqb at 26:50.681 on ClientConnection[c1b9fcdea2a97c91/7e2dc3e8b07e4bc2(V1) with server4/193.167.100.100:443] 39.175 -> Packet H|5|L|50|1 AckFrame[10-6|Δ0] 39.175 -> Packet H|6|L|50|1 AckFrame[11-6|Δ0] 39.175 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 179 millis, based on 39.355/Handshake, because ackElicitingInFlight | RTT:34/14 39.175 -> Packet A|0|S0|9007d364777508990fb0f64c|51|1 StreamFrame[0(CIB),0,17,fin] 39.206 <- (14) Packet A|0|S0|7e2dc3e8b07e4bc2|30|1 HandshakeDoneFrame[] 39.206 State is set to Confirmed reschedule loss detection timer for PTO over 148 millis, based on 39.355/Handshake, because ackElicitingInFlight | RTT:34/14 reschedule loss detection timer for PTO over 83 millis, based on 39.290/App, because ackElicitingInFlight | RTT:34/14 39.206 Discarding pn space Handshake because HandshakeDone is received 39.206 <- (15) Packet A|2|S0|7e2dc3e8b07e4bc2|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 39.207 <- (16) Packet A|3|S0|7e2dc3e8b07e4bc2|291|1 CryptoFrame[257,257] 39.207 -> Packet A|1|S0|9007d364777508990fb0f64c|37|1 AckFrame[2,0|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 39.207 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 39.207 <- (18) Packet A|4|S0|7e2dc3e8b07e4bc2|61|1 NewConnectionIdFrame[1,<0|0590ab1b998c79c1629d62ef|81a15fb43099b5cbe3419b82f6137f48] 39.207 -> Packet A|2|S0|9007d364777508990fb0f64c|37|1 AckFrame[4-2,0|Δ0] 39.289 loss detection timeout handler running Sending probe 0, because no ack since 39.175. Current RTT: 34/14. 39.290 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 229 millis, based on 39.520/App, because ackElicitingInFlight | RTT:34/14 39.290 -> Packet PA|3|S0|9007d364777508990fb0f64c|51|1 StreamFrame[0(CIB),0,17,fin] 39.409 <- (19) Packet A|9|S0|7e2dc3e8b07e4bc2|40|1 NewTokenFrame[00c1a70064681ba5ea] 39.409 <- (20) Packet A|10|S0|7e2dc3e8b07e4bc2|40|1 NewTokenFrame[00c1a70064681ba5ea] 39.410 -> Packet A|4|S0|9007d364777508990fb0f64c|39|1 AckFrame[10-9,4-2,0|Δ0] 39.441 <- (21) Packet A|11|S0|7e2dc3e8b07e4bc2|1057|1 StreamFrame[0(CIB),0,1024,fin] 39.442 Finished downloading https://server4:443/wersqasuqb at 26:50.948 on ClientConnection[c1b9fcdea2a97c91/7e2dc3e8b07e4bc2(V1) with server4/193.167.100.100:443] 39.442 Closing ClientConnection[c1b9fcdea2a97c91/7e2dc3e8b07e4bc2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 39.442 -> Packet A|5|S0|9007d364777508990fb0f64c|43|2 ConnectionCloseFrame[0|0|] AckFrame[11-9,4-2,0|Δ0] 39.442 Creating connection with server4:443 with v1 39.443 Setting up connection for downloading https://server4:443/gjcutkqgrq at 26:50.950 on ClientConnection[229706e19c762bb3/2c30ddbfef19d863(V1) with server4/193.167.100.100:443] 39.443 Original destination connection id: 229706e19c762bb3 (scid: 2c30ddbfef19d863) >- CryptoStream[I|ClientHello] 39.444 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 39.644/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.444 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.473 <- (22) Packet A|12|S0|7e2dc3e8b07e4bc2|33|1 ConnectionCloseFrame[0|0|] 39.478 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 39.480 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 39.680/Handshake, because peerAwaitingAddressValidation | RTT:100/25 39.480 Discarding pn space Initial because first Handshake message is being sent 39.480 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 39.680/Handshake, because peerAwaitingAddressValidation | RTT:100/25 39.478 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 39.480 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 39.481 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 39.479 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 39.479 <- (4) Packet H|2|L|133|1 CryptoFrame[595,79] 39.481 -> Packet H|0|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 39.479 <- (5) Packet H|3|L|89|1 CryptoFrame[674,36] 39.483 -> Packet H|1|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 39.483 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 39.683/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.483 -> Packet H|2|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 39.483 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 39.483 Starting downloading https://server4:443/gjcutkqgrq at 26:50.990 on ClientConnection[229706e19c762bb3/2c30ddbfef19d863(V1) with server4/193.167.100.100:443] 39.483 -> Packet H|3|L|50|1 AckFrame[3-0|Δ0] 39.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 39.684/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.484 -> Packet A|0|S0|fc91a5a786eb4f97cfd7e07c|51|1 StreamFrame[0(CIB),0,17,fin] 39.514 <- (7) Packet A|0|S0|2c30ddbfef19d863|30|1 HandshakeDoneFrame[] 39.514 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 39.683/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 39.709/App, because ackElicitingInFlight | RTT:100/25 39.515 Discarding pn space Handshake because HandshakeDone is received 39.514 <- (8) Packet A|2|S0|2c30ddbfef19d863|40|1 NewTokenFrame[00c1a70064681ba5eb] 39.515 <- (9) Packet A|4|S0|2c30ddbfef19d863|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 39.515 -> Packet A|1|S0|fc91a5a786eb4f97cfd7e07c|37|1 AckFrame[2,0|Δ0] 39.515 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 39.515 <- (11) Packet A|5|S0|2c30ddbfef19d863|61|1 NewConnectionIdFrame[1,<0|c0a3dfbf17c9612902f17323|6e220642eb61ac31493c5b56dfb2a8b3] 39.515 -> Packet A|2|S0|fc91a5a786eb4f97cfd7e07c|39|1 AckFrame[5-4,2,0|Δ0] 39.516 <- (12) Packet A|6|S0|2c30ddbfef19d863|1057|1 StreamFrame[0(CIB),0,1024,fin] 39.516 Finished downloading https://server4:443/gjcutkqgrq at 26:51.023 on ClientConnection[229706e19c762bb3/2c30ddbfef19d863(V1) with server4/193.167.100.100:443] 39.516 Closing ClientConnection[229706e19c762bb3/2c30ddbfef19d863(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 39.517 -> Packet A|3|S0|fc91a5a786eb4f97cfd7e07c|43|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,2,0|Δ0] 39.517 Creating connection with server4:443 with v1 39.518 Setting up connection for downloading https://server4:443/ohtpftdgyp at 26:51.024 on ClientConnection[4c544078ed1ad13a/6e9b54ed814cfa59(V1) with server4/193.167.100.100:443] 39.518 Original destination connection id: 4c544078ed1ad13a (scid: 6e9b54ed814cfa59) >- CryptoStream[I|ClientHello] 39.519 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 39.719/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.519 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 39.540 <- (13) Packet A|7|S0|2c30ddbfef19d863|35|1 AckFrame[0|Δ25] 39.540 -> Packet A|4|S0|fc91a5a786eb4f97cfd7e07c|43|2 ConnectionCloseFrame[0|0|] AckFrame[6-4,2,0|Δ0] 39.552 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 39.555 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 39.755/Handshake, because peerAwaitingAddressValidation | RTT:100/25 39.555 Discarding pn space Initial because first Handshake message is being sent 39.555 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 39.755/Handshake, because peerAwaitingAddressValidation | RTT:100/25 39.552 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 39.555 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 39.555 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 39.555 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 39.555 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 39.571 <- (14) Packet A|9|S0|2c30ddbfef19d863|33|1 ConnectionCloseFrame[0|0|] 39.657 <- (4) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 39.658 -> Packet H|1|L|52|1 AckFrame[5,0|Δ0] 39.754 loss detection timeout handler running 39.754 Sending probe 0. Current RTT: 100/25. 39.754 Sending probe because peer awaiting address validation 39.754 (Probe is a handshake ping) 39.754 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 40.154/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.754 -> Packet PH|2|L|48|2 PingFrame[] Padding(2) 39.781 <- (5) Packet H|8|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 39.781 <- (6) Packet H|9|L|89|1 CryptoFrame[674,36] 39.783 -> Packet H|3|L|54|1 AckFrame[8,5,0|Δ0] >- CryptoStream[H|Finished] 39.783 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 40.183/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.783 -> Packet H|4|L|94|2 CryptoFrame[0,36] AckFrame[8,5,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 39.784 Starting downloading https://server4:443/ohtpftdgyp at 26:51.290 on ClientConnection[4c544078ed1ad13a/6e9b54ed814cfa59(V1) with server4/193.167.100.100:443] 39.784 -> Packet H|5|L|54|1 AckFrame[9-8,5,0|Δ0] 39.784 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 40.184/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 39.784 -> Packet A|0|S0|079d009f6c13326aa2f0a4e0|51|1 StreamFrame[0(CIB),0,17,fin] 39.785 <- (7) Packet H|10|L|54|1 AckFrame[2-1|Δ0] 39.785 probe count not reset on ack because handshake not yet confirmed 39.785 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 397 millis, based on 40.183/Handshake, because ackElicitingInFlight | RTT:100/25 39.814 <- (8) Packet H|11|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 39.814 -> Packet H|6|L|50|1 AckFrame[11-8|Δ0] 39.815 <- (9) Packet A|1|S0|6e9b54ed814cfa59|40|1 NewTokenFrame[00c1a70064681ba5eb] 39.815 <- (10) Packet A|2|S0|6e9b54ed814cfa59|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 39.815 <- (11) Packet H|12|L|54|1 AckFrame[4-1|Δ0] 39.816 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 39.816 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 39.815 <- (12) Packet A|4|S0|6e9b54ed814cfa59|61|1 NewConnectionIdFrame[1,<0|9167a2f75526d439eb313f8d|ccb14c25585b3678c15d4186ff824a89] 39.815 -> Packet A|1|S0|079d009f6c13326aa2f0a4e0|35|1 AckFrame[2-1|Δ0] 39.835 -> Packet A|2|S0|079d009f6c13326aa2f0a4e0|38|1 AckFrame[4,2-1|Δ19] 39.916 <- (13) Packet A|6|S0|6e9b54ed814cfa59|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 39.936 -> Packet A|3|S0|079d009f6c13326aa2f0a4e0|40|1 AckFrame[6,4,2-1|Δ19] 40.017 <- (14) Packet A|7|S0|6e9b54ed814cfa59|30|1 HandshakeDoneFrame[] 40.017 State is set to Confirmed reschedule loss detection timer for PTO over -130 millis, based on 39.887/App, because ackElicitingInFlight | RTT:30/12 40.017 loss detection timeout handler running reschedule loss detection timer for PTO over -130 millis, based on 39.887/App, because ackElicitingInFlight | RTT:30/12 40.017 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 39.784. Current RTT: 30/12. 40.018 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 205 millis, based on 40.224/App, because ackElicitingInFlight | RTT:30/12 40.018 -> Packet PA|4|S0|079d009f6c13326aa2f0a4e0|51|1 StreamFrame[0(CIB),0,17,fin] 40.037 -> Packet A|5|S0|079d009f6c13326aa2f0a4e0|40|1 AckFrame[7-6,4,2-1|Δ19] 40.049 <- (15) Packet A|15|S0|6e9b54ed814cfa59|1057|1 StreamFrame[0(CIB),0,1024,fin] 40.050 Finished downloading https://server4:443/ohtpftdgyp at 26:51.556 on ClientConnection[4c544078ed1ad13a/6e9b54ed814cfa59(V1) with server4/193.167.100.100:443] 40.050 Closing ClientConnection[4c544078ed1ad13a/6e9b54ed814cfa59(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 40.050 -> Packet A|6|S0|079d009f6c13326aa2f0a4e0|45|2 ConnectionCloseFrame[0|0|] AckFrame[15,7-6,4,2-1|Δ0] 40.050 Creating connection with server4:443 with v1 40.051 Setting up connection for downloading https://server4:443/fjpbseftfi at 26:51.557 on ClientConnection[599b1aba5180fd57/19d855d631ba5cfe(V1) with server4/193.167.100.100:443] 40.051 Original destination connection id: 599b1aba5180fd57 (scid: 19d855d631ba5cfe) >- CryptoStream[I|ClientHello] 40.052 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.252/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 40.052 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 40.074 <- (16) Packet A|16|S0|6e9b54ed814cfa59|35|1 AckFrame[5-1|Δ25] 40.074 -> Packet A|7|S0|079d009f6c13326aa2f0a4e0|45|2 ConnectionCloseFrame[0|0|] AckFrame[15,7-6,4,2-1|Δ0] 40.081 <- (17) Packet A|17|S0|6e9b54ed814cfa59|33|1 ConnectionCloseFrame[0|0|] 40.086 Discarding packet (134 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 40.087 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 40.086 <- (3) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 40.087 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 40.287/Initial, because peerAwaitingAddressValidation | RTT:100/25 40.286 loss detection timeout handler running Sending probe 0, because no ack since 40.052. Current RTT: 34/17. 40.286 Sending probe because peer awaiting address validation 40.286 (Probe is Initial ping, because there is no Initial data to retransmit) 40.286 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 40.490/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 40.286 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 40.318 <- (4) Packet I|2|L|55|1 Token=[] AckFrame[1-0|Δ0] 40.318 probe count not reset on ack because handshake not yet confirmed 40.318 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 40.522/Initial, because peerAwaitingAddressValidation | RTT:34/17 40.521 loss detection timeout handler running Sending probe 1, because no ack since 40.286. Current RTT: 34/14. 40.521 Sending probe because peer awaiting address validation 40.521 (Probe is Initial ping, because there is no Initial data to retransmit) 40.522 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 40.882/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 40.522 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 40.553 <- (5) Packet I|3|L|55|1 Token=[] AckFrame[2-0|Δ0] 40.554 probe count not reset on ack because handshake not yet confirmed 40.554 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 40.914/Initial, because peerAwaitingAddressValidation | RTT:34/14 40.837 <- (6) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 40.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 40.918/Handshake, because peerAwaitingAddressValidation | RTT:34/11 40.840 Discarding pn space Initial because first Handshake message is being sent 40.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 40.840 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) reschedule loss detection timer for PTO over 77 millis, based on 40.918/Handshake, because peerAwaitingAddressValidation | RTT:34/11 40.840 -> Packet I|3|L|1201|2 Token=[] AckFrame[4-1|Δ0] Padding(1149) 40.872 <- (8) Packet H|4|L|177|1 CryptoFrame[0,124] 40.872 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 40.872 <- (9) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 40.873 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 40.873 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 40.904 <- (10) Packet H|6|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 40.904 <- (11) Packet H|7|L|89|1 CryptoFrame[675,36] 40.906 -> Packet H|2|L|50|1 AckFrame[6-4|Δ0] >- CryptoStream[H|Finished] 40.906 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 40.984/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 40.906 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[6-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 40.906 -> Packet H|4|L|50|1 AckFrame[7-4|Δ0] 40.907 Starting downloading https://server4:443/fjpbseftfi at 26:52.413 on ClientConnection[599b1aba5180fd57/19d855d631ba5cfe(V1) with server4/193.167.100.100:443] 40.907 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 40.985/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 40.907 -> Packet A|0|S0|fc15bf2d4c775ebed3a09d93|51|1 StreamFrame[0(CIB),0,17,fin] 40.984 loss detection timeout handler running Sending probe 0, because no ack since 40.906. Current RTT: 34/11. 40.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 40.984 (Probe is a handshake retransmit) 40.984 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 155 millis, based on 41.140/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 40.984 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 41.016 <- (12) Packet A|0|S0|19d855d631ba5cfe|30|1 HandshakeDoneFrame[] 41.016 State is set to Confirmed reschedule loss detection timer for PTO over 96 millis, based on 41.113/App, because ackElicitingInFlight | RTT:34/11 reschedule loss detection timer for PTO over -6 millis, based on 41.010/App, because ackElicitingInFlight | RTT:34/11 41.016 loss detection timeout handler running Sending probe 0, because no ack since 40.907. Current RTT: 34/11. 41.016 Discarding pn space Handshake because HandshakeDone is received 41.017 (Probe is retransmit on level App) 41.016 <- (13) Packet A|1|S0|19d855d631ba5cfe|40|1 NewTokenFrame[00c1a70064681ba5ec] 41.016 <- (14) Packet A|2|S0|19d855d631ba5cfe|290|1 CryptoFrame[0,257] reschedule loss detection timer for PTO over 205 millis, based on 41.223/App, because ackElicitingInFlight | RTT:34/11 41.017 -> Packet PA|1|S0|fc15bf2d4c775ebed3a09d93|51|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 41.017 <- (15) Packet A|9|S0|19d855d631ba5cfe|291|1 CryptoFrame[257,257] 41.017 -> Packet A|2|S0|fc15bf2d4c775ebed3a09d93|35|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 41.017 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 41.017 -> Packet A|3|S0|fc15bf2d4c775ebed3a09d93|37|1 AckFrame[9,2-0|Δ0] 41.018 <- (17) Packet A|11|S0|19d855d631ba5cfe|1057|1 StreamFrame[0(CIB),0,1024,fin] 41.018 Finished downloading https://server4:443/fjpbseftfi at 26:52.525 on ClientConnection[599b1aba5180fd57/19d855d631ba5cfe(V1) with server4/193.167.100.100:443] 41.018 Closing ClientConnection[599b1aba5180fd57/19d855d631ba5cfe(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 41.018 -> Packet A|4|S0|fc15bf2d4c775ebed3a09d93|43|2 ConnectionCloseFrame[0|0|] AckFrame[11,9,2-0|Δ0] 41.019 Creating connection with server4:443 with v1 41.019 Setting up connection for downloading https://server4:443/hbrvqejlun at 26:52.526 on ClientConnection[9cfc90144093436b/167dd46150761cdf(V1) with server4/193.167.100.100:443] 41.019 Original destination connection id: 9cfc90144093436b (scid: 167dd46150761cdf) >- CryptoStream[I|ClientHello] 41.020 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 41.220/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.020 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.049 <- (18) Packet A|13|S0|19d855d631ba5cfe|33|1 ConnectionCloseFrame[0|0|] 41.219 loss detection timeout handler running Sending probe 0, because no ack since 41.020. Current RTT: 100/25. 41.219 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 41.220 (Probe is an initial retransmit) 41.220 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 41.620/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.220 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.619 loss detection timeout handler running Sending probe 1, because no ack since 41.220. Current RTT: 100/25. 41.619 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 41.619 (Probe is an initial retransmit) 41.619 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 42.419/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.619 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.620 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 42.420/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.620 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.655 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 41.655 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 41.655 <- (3) Packet I|1|L|56|1 Token=[] AckFrame[3|Δ1] 41.655 probe count not reset on ack because handshake not yet confirmed 41.655 Retransmitting CryptoFrame[0,257] on level Initial 41.655 Cwnd(-): 6000; inflight: 1200 41.655 -> Packet I|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 41.731 loss detection timeout handler running 41.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 42.139/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.138 loss detection timeout handler running Sending probe 2, because no ack since 41.655. Current RTT: 34/17. 42.138 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 42.138 (Probe is an initial retransmit) 42.138 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 815 millis, based on 42.954/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.138 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 42.139 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 815 millis, based on 42.955/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 42.139 -> Packet PI|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 42.171 <- (4) Packet I|3|L|57|1 Token=[] AckFrame[6-5,3|Δ0] 42.171 probe count not reset on ack because handshake not yet confirmed 42.171 Retransmitting CryptoFrame[0,257] on level Initial 42.171 Cwnd(-): 3000; inflight: 0 42.171 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 815 millis, based on 42.987/Initial, because peerAwaitingAddressValidation | RTT:34/17 42.171 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 719 millis, based on 42.891/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 42.171 -> Packet I|7|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[1|Δ0] Padding(887) 42.203 <- (5) Packet I|4|L|57|1 Token=[] AckFrame[7-5,3|Δ0] 42.203 probe count not reset on ack because handshake not yet confirmed 42.203 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 719 millis, based on 42.923/Initial, because peerAwaitingAddressValidation | RTT:34/14 42.405 <- (6) Packet I|6|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 42.408 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 42.486/Handshake, because peerAwaitingAddressValidation | RTT:34/11 42.408 Discarding pn space Initial because first Handshake message is being sent 42.408 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 42.486/Handshake, because peerAwaitingAddressValidation | RTT:34/11 42.408 -> Packet I|8|L|1201|2 Token=[] AckFrame[6,4-3|Δ0] Padding(1147) 42.440 <- (7) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|] 42.441 -> Packet H|0|L|50|1 AckFrame[5|Δ0] 42.472 <- (8) Packet H|6|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|] 42.472 -> Packet H|1|L|50|1 AckFrame[6-5|Δ0] 42.485 loss detection timeout handler running 42.485 Sending probe 0. Current RTT: 34/11. 42.485 Sending probe because peer awaiting address validation 42.485 (Probe is a handshake ping) 42.485 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 155 millis, based on 42.641/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 42.485 -> Packet PH|2|L|48|2 PingFrame[] Padding(2) 42.516 <- (9) Packet H|9|L|54|1 AckFrame[2-0|Δ0] 42.516 probe count not reset on ack because handshake not yet confirmed 42.516 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 42.562 <- (10) Packet H|10|L|177|1 CryptoFrame[0,124] 42.563 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 42.562 <- (11) Packet H|11|L|89|1 CryptoFrame[674,36] 42.564 -> Packet H|3|L|50|1 AckFrame[10-9|Δ0] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 139 millis, based on 42.705/Handshake, because ackElicitingInFlight | RTT:34/9 42.565 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[10-9|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 42.565 -> Packet H|5|L|50|1 AckFrame[11-9|Δ0] 42.565 Starting downloading https://server4:443/hbrvqejlun at 26:54.071 on ClientConnection[9cfc90144093436b/167dd46150761cdf(V1) with server4/193.167.100.100:443] 42.565 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 139 millis, based on 42.705/Handshake, because ackElicitingInFlight | RTT:34/9 42.565 -> Packet A|0|S0|61e024ffee884a20b5f50434|51|1 StreamFrame[0(CIB),0,17,fin] 42.595 <- (12) Packet H|12|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 42.596 -> Packet H|6|L|50|1 AckFrame[12-9|Δ0] 42.596 <- (13) Packet A|0|S0|167dd46150761cdf|30|1 HandshakeDoneFrame[] 42.596 State is set to Confirmed reschedule loss detection timer for PTO over 108 millis, based on 42.705/Handshake, because ackElicitingInFlight | RTT:34/9 reschedule loss detection timer for PTO over 64 millis, based on 42.660/App, because ackElicitingInFlight | RTT:34/9 42.596 Discarding pn space Handshake because HandshakeDone is received 42.596 <- (14) Packet A|6|S0|167dd46150761cdf|40|1 NewTokenFrame[00c1a70064681ba5ee] 42.596 <- (15) Packet A|7|S0|167dd46150761cdf|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 42.597 <- (16) Packet A|8|S0|167dd46150761cdf|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 42.597 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 42.597 <- (18) Packet A|9|S0|167dd46150761cdf|61|1 NewConnectionIdFrame[1,<0|3d47a0ef16659daf17e71bb6|52802bc710eeec689f5a29cdadae3975] 42.597 -> Packet A|1|S0|61e024ffee884a20b5f50434|37|1 AckFrame[6,0|Δ0] 42.597 -> Packet A|2|S0|61e024ffee884a20b5f50434|37|1 AckFrame[9-6,0|Δ0] 42.660 loss detection timeout handler running Sending probe 0, because no ack since 42.565. Current RTT: 34/9. 42.660 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 189 millis, based on 42.851/App, because ackElicitingInFlight | RTT:34/9 42.661 -> Packet PA|3|S0|61e024ffee884a20b5f50434|51|1 StreamFrame[0(CIB),0,17,fin] 42.850 loss detection timeout handler running Sending probe 1, because no ack since 42.661. Current RTT: 34/9. 42.850 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 379 millis, based on 43.230/App, because ackElicitingInFlight | RTT:34/9 42.850 -> Packet PA|4|S0|61e024ffee884a20b5f50434|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 379 millis, based on 43.231/App, because ackElicitingInFlight | RTT:34/9 42.851 -> Packet PA|5|S0|61e024ffee884a20b5f50434|51|1 StreamFrame[0(CIB),0,17,fin] 42.882 <- (19) Packet A|10|S0|167dd46150761cdf|1057|1 StreamFrame[0(CIB),0,1024,fin] 42.883 Finished downloading https://server4:443/hbrvqejlun at 26:54.389 on ClientConnection[9cfc90144093436b/167dd46150761cdf(V1) with server4/193.167.100.100:443] 42.883 Closing ClientConnection[9cfc90144093436b/167dd46150761cdf(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 42.883 -> Packet A|6|S0|61e024ffee884a20b5f50434|41|2 ConnectionCloseFrame[0|0|] AckFrame[10-6,0|Δ0] 42.883 Creating connection with server4:443 with v1 42.884 Setting up connection for downloading https://server4:443/ngasdwsoqs at 26:54.390 on ClientConnection[a7391d38c7cd6e26/040e8ddd4ea841f9(V1) with server4/193.167.100.100:443] 42.884 Original destination connection id: a7391d38c7cd6e26 (scid: 040e8ddd4ea841f9) >- CryptoStream[I|ClientHello] 42.885 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 43.085/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.885 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.906 <- (20) Packet A|11|S0|167dd46150761cdf|37|1 AckFrame[4,2-1|Δ25] 42.907 -> Packet A|7|S0|61e024ffee884a20b5f50434|41|2 ConnectionCloseFrame[0|0|] AckFrame[10-6,0|Δ0] 42.914 <- (21) Packet A|12|S0|167dd46150761cdf|33|1 ConnectionCloseFrame[0|0|] 43.084 loss detection timeout handler running Sending probe 0, because no ack since 42.885. Current RTT: 100/25. 43.084 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 43.084 (Probe is an initial retransmit) 43.084 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 43.484/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.084 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 43.483 loss detection timeout handler running Sending probe 1, because no ack since 43.084. Current RTT: 100/25. 43.484 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 43.484 (Probe is an initial retransmit) 43.484 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 44.284/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.484 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 43.485 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 44.285/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.485 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 43.518 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 43.520 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 43.720/Handshake, because peerAwaitingAddressValidation | RTT:100/25 43.520 Discarding pn space Initial because first Handshake message is being sent 43.520 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 43.720/Handshake, because peerAwaitingAddressValidation | RTT:100/25 43.518 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 43.520 -> Packet I|4|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 43.520 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 43.518 <- (3) Packet H|1|L|525|1 CryptoFrame[124,471] 43.521 -> Packet H|0|L|50|1 AckFrame[0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 43.518 <- (4) Packet H|2|L|133|1 CryptoFrame[595,79] 43.521 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 43.522 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 43.522 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] 43.606 <- (6) Packet H|4|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 43.606 <- (7) Packet H|5|L|89|1 CryptoFrame[674,36] 43.606 -> Packet H|3|L|52|1 AckFrame[4,2-0|Δ0] >- CryptoStream[H|Finished] 43.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 43.807/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.607 -> Packet H|4|L|91|2 CryptoFrame[0,36] AckFrame[4,2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 43.607 Starting downloading https://server4:443/ngasdwsoqs at 26:55.114 on ClientConnection[a7391d38c7cd6e26/040e8ddd4ea841f9(V1) with server4/193.167.100.100:443] 43.607 -> Packet H|5|L|52|1 AckFrame[5-4,2-0|Δ0] 43.607 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 43.807/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 43.607 -> Packet A|0|S0|4ddc9511870b16cbbbf69a13|51|1 StreamFrame[0(CIB),0,17,fin] 43.639 <- (8) Packet A|3|S0|040e8ddd4ea841f9|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 43.658 -> Packet A|1|S0|4ddc9511870b16cbbbf69a13|36|1 AckFrame[3|Δ19] 43.689 <- (9) Packet A|7|S0|040e8ddd4ea841f9|30|1 HandshakeDoneFrame[] 43.689 State is set to Confirmed reschedule loss detection timer for PTO over 117 millis, based on 43.807/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 143 millis, based on 43.832/App, because ackElicitingInFlight | RTT:100/25 43.689 Discarding pn space Handshake because HandshakeDone is received 43.709 -> Packet A|2|S0|4ddc9511870b16cbbbf69a13|38|1 AckFrame[7,3|Δ19] 43.740 <- (10) Packet A|8|S0|040e8ddd4ea841f9|40|1 NewTokenFrame[00c1a70064681ba5ef] 43.740 <- (11) Packet A|9|S0|040e8ddd4ea841f9|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 43.740 -> Packet A|3|S0|4ddc9511870b16cbbbf69a13|37|1 AckFrame[9-7,3|Δ0] 43.771 <- (12) Packet A|10|S0|040e8ddd4ea841f9|61|1 NewConnectionIdFrame[1,<0|21eccf64af5a168703b3629e|3d7ffcade019c568e2ba9af8657a2d0c] 43.790 -> Packet A|4|S0|4ddc9511870b16cbbbf69a13|38|1 AckFrame[10-7,3|Δ19] 43.832 loss detection timeout handler running Sending probe 0, because no ack since 43.607. Current RTT: 100/25. 43.832 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 44.283/App, because ackElicitingInFlight | RTT:100/25 43.833 -> Packet PA|5|S0|4ddc9511870b16cbbbf69a13|51|1 StreamFrame[0(CIB),0,17,fin] 43.861 <- (13) Packet A|11|S0|040e8ddd4ea841f9|61|1 NewConnectionIdFrame[1,<0|21eccf64af5a168703b3629e|3d7ffcade019c568e2ba9af8657a2d0c] 43.861 <- (14) Packet A|12|S0|040e8ddd4ea841f9|61|1 NewConnectionIdFrame[1,<0|21eccf64af5a168703b3629e|3d7ffcade019c568e2ba9af8657a2d0c] 43.861 -> Packet A|6|S0|4ddc9511870b16cbbbf69a13|37|1 AckFrame[12-7,3|Δ0] 44.039 <- (15) Packet A|13|S0|040e8ddd4ea841f9|61|1 NewConnectionIdFrame[1,<0|21eccf64af5a168703b3629e|3d7ffcade019c568e2ba9af8657a2d0c] 44.059 -> Packet A|7|S0|4ddc9511870b16cbbbf69a13|38|1 AckFrame[13-7,3|Δ19] 44.282 loss detection timeout handler running Sending probe 1, because no ack since 43.833. Current RTT: 100/25. 44.282 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 45.182/App, because ackElicitingInFlight | RTT:100/25 44.282 -> Packet PA|8|S0|4ddc9511870b16cbbbf69a13|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 45.183/App, because ackElicitingInFlight | RTT:100/25 44.283 -> Packet PA|9|S0|4ddc9511870b16cbbbf69a13|51|1 StreamFrame[0(CIB),0,17,fin] 44.314 <- (16) Packet A|15|S0|040e8ddd4ea841f9|1057|1 StreamFrame[0(CIB),0,1024,fin] 44.314 <- (17) Packet A|16|S0|040e8ddd4ea841f9|38|1 AckFrame[9-7,3,1|Δ0] 44.314 Finished downloading https://server4:443/ngasdwsoqs at 26:55.821 on ClientConnection[a7391d38c7cd6e26/040e8ddd4ea841f9(V1) with server4/193.167.100.100:443] 44.315 Closing ClientConnection[a7391d38c7cd6e26/040e8ddd4ea841f9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 44.315 Cwnd(-): 6000; inflight: 0 44.315 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 44.315 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 44.315 -> Packet A|10|S0|4ddc9511870b16cbbbf69a13|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[15|Δ0] 44.315 -> Packet A|11|S0|4ddc9511870b16cbbbf69a13|39|2 ConnectionCloseFrame[0|0|] AckFrame[16-15|Δ0] 44.315 Creating connection with server4:443 with v1 44.316 Setting up connection for downloading https://server4:443/zuzrjdmmqi at 26:55.822 on ClientConnection[1d837d93e9f92ded/91144886069b6f56(V1) with server4/193.167.100.100:443] 44.316 Original destination connection id: 1d837d93e9f92ded (scid: 91144886069b6f56) >- CryptoStream[I|ClientHello] 44.317 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44.517/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.317 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.350 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 44.353 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.553/Handshake, because peerAwaitingAddressValidation | RTT:100/25 44.353 Discarding pn space Initial because first Handshake message is being sent 44.353 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.553/Handshake, because peerAwaitingAddressValidation | RTT:100/25 44.351 <- (2) Packet H|1|L|525|1 CryptoFrame[124,471] 44.353 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) -< CryptoStream[H|] 44.351 <- (3) Packet H|2|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|] 44.351 <- (4) Packet H|3|L|89|1 CryptoFrame[674,36] 44.353 -> Packet H|0|L|50|1 AckFrame[1|Δ0] -< CryptoStream[H|] 44.353 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 44.353 -> Packet H|1|L|50|1 AckFrame[2-1|Δ0] 44.353 -> Packet H|2|L|50|1 AckFrame[3-1|Δ0] 44.474 <- (6) Packet H|6|L|177|1 CryptoFrame[0,124] 44.474 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] 44.476 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.676/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.476 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[3-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 44.476 Starting downloading https://server4:443/zuzrjdmmqi at 26:55.983 on ClientConnection[1d837d93e9f92ded/91144886069b6f56(V1) with server4/193.167.100.100:443] 44.476 -> Packet H|4|L|52|1 AckFrame[6,3-1|Δ0] 44.477 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.677/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.477 -> Packet A|0|S0|10d5ab305f8564bfcb86d382|51|1 StreamFrame[0(CIB),0,17,fin] 44.676 loss detection timeout handler running Sending probe 0, because no ack since 44.476. Current RTT: 100/25. 44.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 44.676 (Probe is a handshake retransmit) 44.676 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 45.076/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.676 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 44.708 <- (7) Packet A|0|S0|91144886069b6f56|30|1 HandshakeDoneFrame[] 44.708 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 44.927/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 44.702/App, because ackElicitingInFlight | RTT:100/25 44.708 Discarding pn space Handshake because HandshakeDone is received 44.708 loss detection timeout handler running Sending probe 0, because no ack since 44.477. Current RTT: 100/25. 44.708 <- (8) Packet A|1|S0|91144886069b6f56|40|1 NewTokenFrame[00c1a70064681ba5f0] 44.708 (Probe is retransmit on level App) 44.708 <- (9) Packet A|3|S0|91144886069b6f56|291|1 CryptoFrame[257,257] -< CryptoStream[A|] reschedule loss detection timer for PTO over 449 millis, based on 45.158/App, because ackElicitingInFlight | RTT:100/25 44.708 -> Packet PA|1|S0|10d5ab305f8564bfcb86d382|56|2 AckFrame[1-0|Δ0] StreamFrame[0(CIB),0,17,fin] 44.709 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 44.709 <- (11) Packet A|5|S0|91144886069b6f56|1057|1 StreamFrame[0(CIB),0,1024,fin] 44.709 <- (12) Packet A|6|S0|91144886069b6f56|37|1 AckFrame[0|Δ201] 44.710 -> Packet A|2|S0|10d5ab305f8564bfcb86d382|40|1 AckFrame[5,3,1-0|Δ1] 44.710 Finished downloading https://server4:443/zuzrjdmmqi at 26:56.216 on ClientConnection[1d837d93e9f92ded/91144886069b6f56(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 223 millis, based on 44.933/App, because ackElicitingInFlight | RTT:100/25 44.710 Closing ClientConnection[1d837d93e9f92ded/91144886069b6f56(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 44.710 -> Packet A|3|S0|10d5ab305f8564bfcb86d382|43|2 ConnectionCloseFrame[0|0|] AckFrame[6-5,3,1-0|Δ0] 44.710 Creating connection with server4:443 with v1 44.711 Setting up connection for downloading https://server4:443/cgggutobzf at 26:56.217 on ClientConnection[920083f3b48f0a33/5338dc93bc72060b(V1) with server4/193.167.100.100:443] 44.711 Original destination connection id: 920083f3b48f0a33 (scid: 5338dc93bc72060b) >- CryptoStream[I|ClientHello] 44.712 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44.912/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.712 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.741 <- (13) Packet A|8|S0|91144886069b6f56|33|1 ConnectionCloseFrame[0|0|] 44.745 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 44.746 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 44.746 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 44.746 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 44.746 <- (5) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 44.746 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44.946/Initial, because peerAwaitingAddressValidation | RTT:100/25 44.946 loss detection timeout handler running Sending probe 0, because no ack since 44.712. Current RTT: 34/17. 44.946 Sending probe because peer awaiting address validation 44.946 (Probe is Initial ping, because there is no Initial data to retransmit) 44.946 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 45.150/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 44.946 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 44.978 <- (6) Packet I|2|L|55|1 Token=[] AckFrame[1-0|Δ0] 44.978 probe count not reset on ack because handshake not yet confirmed 44.978 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 45.182/Initial, because peerAwaitingAddressValidation | RTT:34/17 45.181 loss detection timeout handler running Sending probe 1, because no ack since 44.946. Current RTT: 34/14. 45.181 Sending probe because peer awaiting address validation 45.181 (Probe is Initial ping, because there is no Initial data to retransmit) 45.182 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 45.542/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 45.181 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 45.213 <- (7) Packet I|3|L|55|1 Token=[] AckFrame[2-0|Δ0] 45.214 probe count not reset on ack because handshake not yet confirmed 45.214 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 45.574/Initial, because peerAwaitingAddressValidation | RTT:34/14 45.498 <- (8) Packet I|5|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 45.500 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 45.578/Handshake, because peerAwaitingAddressValidation | RTT:34/11 45.500 Discarding pn space Initial because first Handshake message is being sent 45.501 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 45.579/Handshake, because peerAwaitingAddressValidation | RTT:34/11 45.500 -> Packet I|3|L|1201|2 Token=[] AckFrame[5,3-1|Δ0] Padding(1147) 45.578 loss detection timeout handler running 45.578 Sending probe 0. Current RTT: 34/11. 45.578 Sending probe because peer awaiting address validation 45.578 (Probe is a handshake ping) 45.578 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 155 millis, based on 45.734/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 45.578 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 45.610 <- (9) Packet H|6|L|54|1 AckFrame[0|Δ0] 45.610 probe count not reset on ack because handshake not yet confirmed 45.610 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 47.112 <- (10) Packet H|7|L|177|1 CryptoFrame[0,124] 47.112 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 47.112 <- (11) Packet H|8|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 47.113 -> Packet H|1|L|50|1 AckFrame[7-6|Δ0] 47.113 -> Packet H|2|L|50|1 AckFrame[8-6|Δ0] 47.144 <- (12) Packet H|9|L|133|1 CryptoFrame[595,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 47.145 -> Packet H|3|L|50|1 AckFrame[9-6|Δ0] 47.225 <- (13) Packet H|11|L|89|1 CryptoFrame[674,36] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 139 millis, based on 47.365/Handshake, because ackElicitingInFlight | RTT:34/9 47.225 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[9-6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 47.225 <- (14) Packet H|12|L|89|1 CryptoFrame[674,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 47.226 Starting downloading https://server4:443/cgggutobzf at 26:58.732 on ClientConnection[920083f3b48f0a33/5338dc93bc72060b(V1) with server4/193.167.100.100:443] 47.226 -> Packet H|5|L|52|1 AckFrame[11,9-6|Δ0] 47.226 -> Packet H|6|L|52|1 AckFrame[12-11,9-6|Δ0] 47.226 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 138 millis, based on 47.365/Handshake, because ackElicitingInFlight | RTT:34/9 47.226 -> Packet A|0|S0|4d87a16161dd27a55aece425|51|1 StreamFrame[0(CIB),0,17,fin] 47.257 <- (15) Packet A|1|S0|5338dc93bc72060b|40|1 NewTokenFrame[00c1a70064681ba5f2] 47.257 <- (16) Packet A|2|S0|5338dc93bc72060b|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 47.257 <- (17) Packet A|3|S0|5338dc93bc72060b|291|1 CryptoFrame[257,257] 47.257 -> Packet A|1|S0|4d87a16161dd27a55aece425|35|1 AckFrame[2-1|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 47.257 <- (18) Packet H|13|L|57|1 AckFrame[4-2,0|Δ0] 47.258 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 47.258 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 47.258 <- (19) Packet A|4|S0|5338dc93bc72060b|61|1 NewConnectionIdFrame[1,<0|f8861cb2ec90c62c6d3a0d57|a9e74394604295aebcaeee4c2a89901e] 47.258 -> Packet A|2|S0|4d87a16161dd27a55aece425|35|1 AckFrame[4-1|Δ0] 47.259 <- (20) Packet A|12|S0|5338dc93bc72060b|1057|1 StreamFrame[0(CIB),0,1024,fin] 47.259 Finished downloading https://server4:443/cgggutobzf at 26:58.765 on ClientConnection[920083f3b48f0a33/5338dc93bc72060b(V1) with server4/193.167.100.100:443] 47.259 Closing ClientConnection[920083f3b48f0a33/5338dc93bc72060b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 47.259 -> Packet A|3|S0|4d87a16161dd27a55aece425|41|2 ConnectionCloseFrame[0|0|] AckFrame[12,4-1|Δ0] 47.259 Creating connection with server4:443 with v1 47.260 Setting up connection for downloading https://server4:443/hfaxtgtbzw at 26:58.766 on ClientConnection[e0e1bf40b3e06794/4e6847f55b741a75(V1) with server4/193.167.100.100:443] 47.260 Original destination connection id: e0e1bf40b3e06794 (scid: 4e6847f55b741a75) >- CryptoStream[I|ClientHello] 47.261 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 47.461/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 47.261 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 47.289 <- (21) Packet A|14|S0|5338dc93bc72060b|30|1 HandshakeDoneFrame[] 47.289 -> Packet A|4|S0|4d87a16161dd27a55aece425|41|2 ConnectionCloseFrame[0|0|] AckFrame[12,4-1|Δ0] 47.295 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 47.295 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 47.295 Discarding packet (132 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 47.295 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 47.296 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 47.496/Initial, because peerAwaitingAddressValidation | RTT:100/25 47.495 loss detection timeout handler running Sending probe 0, because no ack since 47.261. Current RTT: 34/17. 47.495 Sending probe because peer awaiting address validation 47.495 (Probe is Initial ping, because there is no Initial data to retransmit) 47.495 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 47.699/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 47.495 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 47.527 <- (5) Packet I|2|L|55|1 Token=[] AckFrame[1-0|Δ0] 47.527 probe count not reset on ack because handshake not yet confirmed 47.527 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 47.731/Initial, because peerAwaitingAddressValidation | RTT:34/17 47.730 loss detection timeout handler running Sending probe 1, because no ack since 47.495. Current RTT: 34/14. 47.730 Sending probe because peer awaiting address validation 47.730 (Probe is Initial ping, because there is no Initial data to retransmit) 47.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 48.091/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 47.731 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 47.762 <- (6) Packet I|3|L|55|1 Token=[] AckFrame[2-0|Δ0] 47.763 probe count not reset on ack because handshake not yet confirmed 47.763 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 48.123/Initial, because peerAwaitingAddressValidation | RTT:34/14 48.047 <- (7) Packet I|5|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 48.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 48.128/Handshake, because peerAwaitingAddressValidation | RTT:34/11 48.050 Discarding pn space Initial because first Handshake message is being sent 48.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 48.128/Handshake, because peerAwaitingAddressValidation | RTT:34/11 48.050 -> Packet I|3|L|1201|2 Token=[] AckFrame[5,3-1|Δ0] Padding(1147) 48.082 <- (8) Packet H|4|L|177|1 CryptoFrame[0,124] 48.082 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 48.082 <- (9) Packet H|5|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|EncryptedExtensions,Certificate] 48.083 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 48.083 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 48.114 <- (10) Packet H|6|L|132|1 CryptoFrame[595,78] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 48.115 -> Packet H|2|L|50|1 AckFrame[6-4|Δ0] 48.127 loss detection timeout handler running 48.127 Sending probe 0. Current RTT: 34/11. 48.127 Sending probe because peer awaiting address validation 48.127 (Probe is a handshake ping) 48.127 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 155 millis, based on 48.283/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 48.127 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) 48.187 <- (11) Packet H|9|L|89|1 CryptoFrame[673,36] >- CryptoStream[H|Finished] 48.188 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 155 millis, based on 48.344/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 48.188 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[6-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 48.188 Starting downloading https://server4:443/hfaxtgtbzw at 26:59.695 on ClientConnection[e0e1bf40b3e06794/4e6847f55b741a75(V1) with server4/193.167.100.100:443] 48.188 -> Packet H|5|L|52|1 AckFrame[9,6-4|Δ0] 48.189 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 155 millis, based on 48.345/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 48.189 -> Packet A|0|S0|7a8e64a834f81e368b860989|51|1 StreamFrame[0(CIB),0,17,fin] 48.219 <- (12) Packet A|0|S0|4e6847f55b741a75|30|1 HandshakeDoneFrame[] 48.219 State is set to Confirmed reschedule loss detection timer for PTO over 124 millis, based on 48.344/Handshake, because ackElicitingInFlight | RTT:34/11 reschedule loss detection timer for PTO over 72 millis, based on 48.292/App, because ackElicitingInFlight | RTT:34/11 48.219 Discarding pn space Handshake because HandshakeDone is received 48.219 <- (13) Packet A|7|S0|4e6847f55b741a75|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 48.220 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 48.220 -> Packet A|1|S0|7a8e64a834f81e368b860989|37|1 AckFrame[7,0|Δ0] 48.221 <- (15) Packet A|9|S0|4e6847f55b741a75|1057|1 StreamFrame[0(CIB),0,1024,fin] 48.221 Finished downloading https://server4:443/hfaxtgtbzw at 26:59.727 on ClientConnection[e0e1bf40b3e06794/4e6847f55b741a75(V1) with server4/193.167.100.100:443] 48.221 Closing ClientConnection[e0e1bf40b3e06794/4e6847f55b741a75(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 48.221 -> Packet A|2|S0|7a8e64a834f81e368b860989|43|2 ConnectionCloseFrame[0|0|] AckFrame[9,7,0|Δ0] 48.222 Creating connection with server4:443 with v1 48.222 Setting up connection for downloading https://server4:443/dreyoznkzo at 26:59.729 on ClientConnection[1f550071ac66af0b/6b944e887a7cf29c(V1) with server4/193.167.100.100:443] 48.222 Original destination connection id: 1f550071ac66af0b (scid: 6b944e887a7cf29c) >- CryptoStream[I|ClientHello] 48.223 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.423/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 48.223 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 48.245 <- (16) Packet A|10|S0|4e6847f55b741a75|35|1 AckFrame[0|Δ25] 48.245 -> Packet A|3|S0|7a8e64a834f81e368b860989|43|2 ConnectionCloseFrame[0|0|] AckFrame[9,7,0|Δ0] 48.251 <- (17) Packet A|11|S0|4e6847f55b741a75|40|1 NewTokenFrame[00c1a70064681ba5f3] 48.251 -> Packet A|4|S0|7a8e64a834f81e368b860989|43|2 ConnectionCloseFrame[0|0|] AckFrame[9,7,0|Δ0] 48.257 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 48.258 Discarding packet (134 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 48.258 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 48.258 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 48.258 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 48.458/Initial, because peerAwaitingAddressValidation | RTT:100/25 48.457 loss detection timeout handler running Sending probe 0, because no ack since 48.223. Current RTT: 34/17. 48.457 Sending probe because peer awaiting address validation 48.457 (Probe is Initial ping, because there is no Initial data to retransmit) 48.458 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 48.662/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.458 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 48.661 loss detection timeout handler running Sending probe 1, because no ack since 48.458. Current RTT: 34/17. 48.661 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 48.661 (Probe is Initial ping, because there is no Initial data to retransmit) 48.661 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 49.070/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.661 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 48.662 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 49.070/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 48.662 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 48.693 <- (5) Packet I|3|L|55|1 Token=[] AckFrame[2-0|Δ0] 48.694 probe count not reset on ack because handshake not yet confirmed 48.694 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 49.102/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 49.009 <- (6) Packet I|5|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 49.011 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 49.101/Handshake, because peerAwaitingAddressValidation | RTT:34/14 49.011 Discarding pn space Initial because first Handshake message is being sent 49.011 Packet not sent because keys are discarded: Packet I|4|L|.|2 Token=[] AckFrame[5,3,1|Δ0] Padding(1145) 49.100 loss detection timeout handler running 49.100 Sending probe 0. Current RTT: 34/14. 49.100 Sending probe because peer awaiting address validation 49.100 (Probe is a handshake ping) 49.101 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 179 millis, based on 49.281/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 49.101 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 49.132 <- (7) Packet H|4|L|177|1 CryptoFrame[0,124] 49.132 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 49.132 <- (8) Packet H|5|L|525|1 CryptoFrame[124,471] 49.133 -> Packet H|1|L|50|1 AckFrame[4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 49.132 <- (9) Packet H|6|L|54|1 AckFrame[0|Δ0] 49.133 -> Packet H|2|L|50|1 AckFrame[5-4|Δ0] 49.133 probe count not reset on ack because handshake not yet confirmed 49.133 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 49.164 <- (10) Packet H|7|L|134|1 CryptoFrame[595,80] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 49.164 <- (11) Packet H|8|L|89|1 CryptoFrame[675,36] 49.166 -> Packet H|3|L|50|1 AckFrame[7-4|Δ0] >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 155 millis, based on 49.322/Handshake, because ackElicitingInFlight | RTT:34/11 49.167 Starting downloading https://server4:443/dreyoznkzo at 27:00.673 on ClientConnection[1f550071ac66af0b/6b944e887a7cf29c(V1) with server4/193.167.100.100:443] 49.166 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[7-4|Δ0] 49.167 -> Packet H|5|L|50|1 AckFrame[8-4|Δ0] 49.167 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 155 millis, based on 49.322/Handshake, because ackElicitingInFlight | RTT:34/11 49.167 -> Packet A|0|S0|b6e0556f16699dab1f798ebb|51|1 StreamFrame[0(CIB),0,17,fin] 49.198 <- (12) Packet A|3|S0|6b944e887a7cf29c|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 49.199 <- (13) Packet A|10|S0|6b944e887a7cf29c|61|1 NewConnectionIdFrame[1,<0|7675bef1cc9c860f80b2e6a3|14642edb36c41af624861dbc71d4ec55] 49.199 -> Packet A|1|S0|b6e0556f16699dab1f798ebb|37|1 AckFrame[10,3|Δ0] 49.294 <- (14) Packet A|11|S0|6b944e887a7cf29c|30|1 HandshakeDoneFrame[] 49.294 State is set to Confirmed reschedule loss detection timer for PTO over 28 millis, based on 49.322/Handshake, because ackElicitingInFlight | RTT:34/11 reschedule loss detection timer for PTO over -24 millis, based on 49.270/App, because ackElicitingInFlight | RTT:34/11 49.294 Discarding pn space Handshake because HandshakeDone is received 49.294 loss detection timeout handler running Sending probe 0, because no ack since 49.167. Current RTT: 34/11. 49.294 (Probe is retransmit on level App) 49.294 <- (15) Packet A|12|S0|6b944e887a7cf29c|40|1 NewTokenFrame[00c1a70064681ba5f4] reschedule loss detection timer for PTO over 205 millis, based on 49.500/App, because ackElicitingInFlight | RTT:34/11 49.294 -> Packet PA|2|S0|b6e0556f16699dab1f798ebb|51|1 StreamFrame[0(CIB),0,17,fin] 49.295 -> Packet A|3|S0|b6e0556f16699dab1f798ebb|37|1 AckFrame[12-10,3|Δ0] 49.412 <- (16) Packet A|16|S0|6b944e887a7cf29c|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 49.412 <- (17) Packet A|17|S0|6b944e887a7cf29c|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 49.412 -> Packet A|4|S0|b6e0556f16699dab1f798ebb|39|1 AckFrame[17-16,12-10,3|Δ0] 49.500 loss detection timeout handler running Sending probe 1, because no ack since 49.294. Current RTT: 34/11. 49.500 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 411 millis, based on 49.912/App, because ackElicitingInFlight | RTT:34/11 49.500 -> Packet PA|5|S0|b6e0556f16699dab1f798ebb|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 411 millis, based on 49.913/App, because ackElicitingInFlight | RTT:34/11 49.501 -> Packet PA|6|S0|b6e0556f16699dab1f798ebb|51|1 StreamFrame[0(CIB),0,17,fin] 49.524 <- (18) Packet A|19|S0|6b944e887a7cf29c|1057|1 StreamFrame[0(CIB),0,1024,fin] 49.524 Finished downloading https://server4:443/dreyoznkzo at 27:01.030 on ClientConnection[1f550071ac66af0b/6b944e887a7cf29c(V1) with server4/193.167.100.100:443] 49.524 Closing ClientConnection[1f550071ac66af0b/6b944e887a7cf29c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 49.524 -> Packet A|7|S0|b6e0556f16699dab1f798ebb|45|2 ConnectionCloseFrame[0|0|] AckFrame[19,17-16,12-10,3|Δ0] 49.524 <- (19) Packet A|20|S0|6b944e887a7cf29c|1057|1 StreamFrame[0(CIB),0,1024,fin] 49.525 Creating connection with server4:443 with v1 49.525 -> Packet A|8|S0|b6e0556f16699dab1f798ebb|45|2 ConnectionCloseFrame[0|0|] AckFrame[19,17-16,12-10,3|Δ0] 49.525 Setting up connection for downloading https://server4:443/xoiyynwhbe at 27:01.032 on ClientConnection[cab092225e75dfdd/a02949ba118329f7(V1) with server4/193.167.100.100:443] 49.525 Original destination connection id: cab092225e75dfdd (scid: a02949ba118329f7) >- CryptoStream[I|ClientHello] 49.526 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 49.726/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 49.526 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 49.560 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 49.561 Discarding packet (525 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 49.561 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 49.561 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 49.561 <- (5) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 49.561 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 49.761/Initial, because peerAwaitingAddressValidation | RTT:100/25 49.760 loss detection timeout handler running Sending probe 0, because no ack since 49.526. Current RTT: 34/17. 49.760 Sending probe because peer awaiting address validation 49.761 (Probe is Initial ping, because there is no Initial data to retransmit) 49.761 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 49.965/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 49.761 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 49.964 loss detection timeout handler running Sending probe 1, because no ack since 49.761. Current RTT: 34/17. 49.964 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 49.964 (Probe is Initial ping, because there is no Initial data to retransmit) 49.964 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 50.372/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 49.964 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 49.965 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 50.373/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 49.965 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 49.997 <- (6) Packet I|4|L|55|1 Token=[] AckFrame[3-0|Δ0] 49.997 probe count not reset on ack because handshake not yet confirmed 49.997 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 50.405/Initial, because peerAwaitingAddressValidation | RTT:34/17 50.311 <- (7) Packet I|5|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 50.313 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 50.403/Handshake, because peerAwaitingAddressValidation | RTT:34/14 50.314 Discarding pn space Initial because first Handshake message is being sent 50.314 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 50.404/Handshake, because peerAwaitingAddressValidation | RTT:34/14 50.314 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 50.314 -> Packet I|4|L|1201|2 Token=[] AckFrame[5-4,1|Δ0] Padding(1147) 50.403 loss detection timeout handler running 50.403 Sending probe 0. Current RTT: 34/14. 50.403 Sending probe because peer awaiting address validation 50.403 (Probe is a handshake ping) 50.403 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 179 millis, based on 50.583/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 50.403 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 50.435 <- (9) Packet H|6|L|54|1 AckFrame[0|Δ0] 50.435 probe count not reset on ack because handshake not yet confirmed 50.435 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 51.937 <- (10) Packet H|8|L|525|1 CryptoFrame[124,471] -< CryptoStream[H|] 51.938 -> Packet H|1|L|52|1 AckFrame[8,6|Δ0] 51.973 <- (11) Packet H|12|L|177|1 CryptoFrame[0,124] 51.973 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate] 51.974 -> Packet H|2|L|54|1 AckFrame[12,8,6|Δ0] 52.069 <- (12) Packet H|13|L|177|1 CryptoFrame[0,124] -< CryptoStream[H|EncryptedExtensions,Certificate] 52.069 <- (13) Packet H|14|L|133|1 CryptoFrame[595,79] 52.069 -> Packet H|3|L|54|1 AckFrame[13-12,8,6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 52.071 -> Packet H|4|L|54|1 AckFrame[14-12,8,6|Δ0] 52.102 <- (14) Packet H|15|L|89|1 CryptoFrame[674,36] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 155 millis, based on 52.258/Handshake, because ackElicitingInFlight | RTT:34/11 52.102 -> Packet H|5|L|94|2 CryptoFrame[0,36] AckFrame[14-12,8,6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 52.103 -> Packet H|6|L|54|1 AckFrame[15-12,8,6|Δ0] 52.103 Starting downloading https://server4:443/xoiyynwhbe at 27:03.609 on ClientConnection[cab092225e75dfdd/a02949ba118329f7(V1) with server4/193.167.100.100:443] 52.103 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 154 millis, based on 52.258/Handshake, because ackElicitingInFlight | RTT:34/11 52.103 -> Packet A|0|S0|516a3d6535671ce66105d465|51|1 StreamFrame[0(CIB),0,17,fin] 52.134 <- (15) Packet A|0|S0|a02949ba118329f7|30|1 HandshakeDoneFrame[] 52.134 State is set to Confirmed reschedule loss detection timer for PTO over 124 millis, based on 52.258/Handshake, because ackElicitingInFlight | RTT:34/11 reschedule loss detection timer for PTO over 72 millis, based on 52.206/App, because ackElicitingInFlight | RTT:34/11 52.134 Discarding pn space Handshake because HandshakeDone is received 52.134 <- (16) Packet A|1|S0|a02949ba118329f7|40|1 NewTokenFrame[00c1a70064681ba5f7] 52.134 <- (17) Packet A|6|S0|a02949ba118329f7|290|1 CryptoFrame[0,257] 52.134 -> Packet A|1|S0|516a3d6535671ce66105d465|35|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 52.135 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 52.135 <- (19) Packet A|8|S0|a02949ba118329f7|61|1 NewConnectionIdFrame[1,<0|3ba21ba455663783b800b00b|b0610ff264882cd626d09e5467fe2107] 52.135 -> Packet A|2|S0|516a3d6535671ce66105d465|39|1 AckFrame[8,6,1-0|Δ0] 52.206 loss detection timeout handler running Sending probe 0, because no ack since 52.103. Current RTT: 34/11. 52.206 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 205 millis, based on 52.412/App, because ackElicitingInFlight | RTT:34/11 52.206 -> Packet PA|3|S0|516a3d6535671ce66105d465|51|1 StreamFrame[0(CIB),0,17,fin] 52.230 <- (20) Packet A|10|S0|a02949ba118329f7|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 52.249 -> Packet A|4|S0|516a3d6535671ce66105d465|42|1 AckFrame[10,8,6,1-0|Δ19] 52.411 loss detection timeout handler running Sending probe 1, because no ack since 52.206. Current RTT: 34/11. 52.411 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 411 millis, based on 52.824/App, because ackElicitingInFlight | RTT:34/11 52.412 -> Packet PA|5|S0|516a3d6535671ce66105d465|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 411 millis, based on 52.825/App, because ackElicitingInFlight | RTT:34/11 52.413 -> Packet PA|6|S0|516a3d6535671ce66105d465|51|1 StreamFrame[0(CIB),0,17,fin] 52.824 loss detection timeout handler running Sending probe 2, because no ack since 52.413. Current RTT: 34/11. 52.824 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 823 millis, based on 53.648/App, because ackElicitingInFlight | RTT:34/11 52.824 -> Packet PA|7|S0|516a3d6535671ce66105d465|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 823 millis, based on 53.649/App, because ackElicitingInFlight | RTT:34/11 52.825 -> Packet PA|8|S0|516a3d6535671ce66105d465|51|1 StreamFrame[0(CIB),0,17,fin] 52.856 <- (21) Packet A|11|S0|a02949ba118329f7|1057|1 StreamFrame[0(CIB),0,1024,fin] 52.856 <- (22) Packet A|12|S0|a02949ba118329f7|38|1 AckFrame[8-7,4,1|Δ0] 52.857 Cwnd(-): 6000; inflight: 0 52.857 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 52.857 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 52.857 Finished downloading https://server4:443/xoiyynwhbe at 27:04.363 on ClientConnection[cab092225e75dfdd/a02949ba118329f7(V1) with server4/193.167.100.100:443] 52.857 Closing ClientConnection[cab092225e75dfdd/a02949ba118329f7(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 94 millis, based on 52.952/App, because ackElicitingInFlight | RTT:34/9 52.857 -> Packet A|9|S0|516a3d6535671ce66105d465|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[11|Δ0] 52.857 -> Packet A|10|S0|516a3d6535671ce66105d465|39|2 ConnectionCloseFrame[0|0|] AckFrame[12-11|Δ0]