0.000 Creating connection with server4:443 with v1 0.081 Setting up connection for downloading https://server4:443/owbyaoxxsy at 24:54.541 on ClientConnection[c82ae3ae3120ae95/b0fe65d4b09a0ace(V1) with server4/193.167.100.100:443] 0.083 Original destination connection id: c82ae3ae3120ae95 (scid: b0fe65d4b09a0ace) >- CryptoStream[I|ClientHello] 0.234 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 197 millis, based on 0.435/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.229 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.435 loss detection timeout handler running Sending probe 0, because no ack since 0.229. Current RTT: 100/25. 0.436 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 0.438 (Probe is an initial retransmit) 0.441 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.841/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.441 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 0.487 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 0.487 Discarding packet (523 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 0.488 Discarding packet (132 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 0.488 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 0.481 <- (5) Packet I|1|L|56|1 Token=[] AckFrame[1|Δ1] 0.495 probe count not reset on ack because handshake not yet confirmed 0.499 Retransmitting CryptoFrame[0,257] on level Initial 0.501 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.901/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.501 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 0.503 Cwnd(-): 6000; inflight: 0 0.505 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 0.905/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 0.533 <- (6) Packet I|2|L|55|1 Token=[] AckFrame[2-1|Δ0] 0.533 probe count not reset on ack because handshake not yet confirmed 0.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 229 millis, based on 0.764/Initial, because peerAwaitingAddressValidation | RTT:39/19 0.763 loss detection timeout handler running Sending probe 1, because no ack since 0.501. Current RTT: 38/16. 0.763 Sending probe because peer awaiting address validation 0.763 (Probe is Initial ping, because there is no Initial data to retransmit) 0.765 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 1.173/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/16 0.765 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 1.172 loss detection timeout handler running Sending probe 2, because no ack since 0.765. Current RTT: 38/16. 1.172 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 1.173 (Probe is Initial ping, because there is no Initial data to retransmit) 1.174 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 815 millis, based on 1.990/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/16 1.173 -> Packet PI|4|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 1.175 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 815 millis, based on 1.991/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/16 1.174 -> Packet PI|5|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 1.205 <- (7) Packet I|4|L|55|1 Token=[] AckFrame[4-1|Δ0] 1.206 probe count not reset on ack because handshake not yet confirmed 1.206 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 815 millis, based on 2.022/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:38/16 1.206 <- (8) Packet I|5|L|55|1 Token=[] AckFrame[5-1|Δ0] 1.207 probe count not reset on ack because handshake not yet confirmed 1.207 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 743 millis, based on 1.951/Initial, because peerAwaitingAddressValidation | RTT:37/14 1.230 <- (9) Packet I|6|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 1.249 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.249 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 83 millis, based on 1.333/Handshake, because peerAwaitingAddressValidation | RTT:36/12 reschedule loss detection timer for PTO over 83 millis, based on 1.333/Handshake, because peerAwaitingAddressValidation | RTT:36/12 1.250 Discarding pn space Initial because first Handshake message is being sent 1.249 -> Packet I|6|L|1201|2 Token=[] AckFrame[6-4,2-1|Δ0] Padding(1147) 1.250 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 1.333 loss detection timeout handler running 1.333 Sending probe 0. Current RTT: 36/12. 1.333 Sending probe because peer awaiting address validation 1.333 (Probe is a handshake ping) 1.334 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 167 millis, based on 1.502/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/12 1.334 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 1.501 loss detection timeout handler running Sending probe 1, because no ack since 1.334. Current RTT: 36/12. 1.501 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.502 (Probe is a handshake ping) 1.502 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 335 millis, based on 1.838/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/12 1.502 -> Packet PH|1|L|48|2 PingFrame[] Padding(2) 1.503 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 335 millis, based on 1.839/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/12 1.503 -> Packet PH|2|L|48|2 PingFrame[] Padding(2) 1.533 <- (11) Packet H|7|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|] 1.537 -> Packet H|3|L|50|1 AckFrame[7|Δ0] 1.838 loss detection timeout handler running Sending probe 2, because no ack since 1.503. Current RTT: 36/12. 1.839 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 1.839 (Probe is a handshake ping) 1.839 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 671 millis, based on 2.511/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/12 1.839 -> Packet PH|4|L|48|2 PingFrame[] Padding(2) 1.840 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 671 millis, based on 2.512/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:36/12 1.840 -> Packet PH|5|L|48|2 PingFrame[] Padding(2) 1.871 <- (12) Packet H|11|L|56|1 AckFrame[5,1|Δ0] 1.872 probe count not reset on ack because handshake not yet confirmed 1.873 Cwnd(-): 3000; inflight: 48 1.879 loss detection timeout handler running 1.879 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 1.994 <- (13) Packet H|12|L|177|1 CryptoFrame[0,124] 1.997 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate] 1.994 <- (14) Packet H|13|L|523|1 CryptoFrame[124,469] 2.001 -> Packet H|6|L|52|1 AckFrame[12-11,7|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 2.002 -> Packet H|7|L|52|1 AckFrame[13-11,7|Δ0] 2.033 <- (15) Packet H|15|L|89|1 CryptoFrame[671,36] -< CryptoStream[H|EncryptedExtensions,Certificate] 2.034 -> Packet H|8|L|54|1 AckFrame[15,13-11,7|Δ0] 2.087 <- (16) Packet H|16|L|132|1 CryptoFrame[593,78] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 631 millis, based on 2.736/Handshake, because ackElicitingInFlight | RTT:35/11 2.104 -> Packet H|9|L|94|2 CryptoFrame[0,36] AckFrame[15,13-11,7|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.109 -> Packet H|10|L|54|1 AckFrame[16-15,13-11,7|Δ0] 2.109 Starting downloading https://server4:443/owbyaoxxsy at 24:56.584 on ClientConnection[c82ae3ae3120ae95/b0fe65d4b09a0ace(V1) with server4/193.167.100.100:443] 2.131 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 605 millis, based on 2.736/Handshake, because ackElicitingInFlight | RTT:35/11 2.130 -> Packet A|0|S0|eddc4aaa5b62da760d154f7f|51|1 StreamFrame[0(CIB),0,17,fin] 2.136 <- (17) Packet A|0|S0|b0fe65d4b09a0ace|30|1 HandshakeDoneFrame[] 2.144 State is set to Confirmed reschedule loss detection timer for PTO over 592 millis, based on 2.736/Handshake, because ackElicitingInFlight | RTT:35/11 reschedule loss detection timer for PTO over 87 millis, based on 2.234/App, because ackElicitingInFlight | RTT:35/11 2.147 Discarding pn space Handshake because HandshakeDone is received 2.137 <- (18) Packet A|9|S0|b0fe65d4b09a0ace|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 2.148 Discarding packet (55 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 2.148 -> Packet A|1|S0|eddc4aaa5b62da760d154f7f|37|1 AckFrame[9,0|Δ0] 2.187 <- (20) Packet A|13|S0|b0fe65d4b09a0ace|35|1 AckFrame[1-0|Δ26] 2.189 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 2.190 <- (21) Packet A|14|S0|b0fe65d4b09a0ace|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.211 -> Packet A|2|S0|eddc4aaa5b62da760d154f7f|36|1 AckFrame[14-13|Δ19] 2.243 <- (22) Packet A|17|S0|b0fe65d4b09a0ace|40|1 NewTokenFrame[00c1a70064681ba578] 2.263 -> Packet A|3|S0|eddc4aaa5b62da760d154f7f|38|1 AckFrame[17,14-13|Δ19] 2.302 <- (23) Packet A|19|S0|b0fe65d4b09a0ace|1057|1 StreamFrame[0(CIB),0,1024,fin] 2.304 Finished downloading https://server4:443/owbyaoxxsy at 24:56.779 on ClientConnection[c82ae3ae3120ae95/b0fe65d4b09a0ace(V1) with server4/193.167.100.100:443] 2.305 Closing ClientConnection[c82ae3ae3120ae95/b0fe65d4b09a0ace(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.307 Creating connection with server4:443 with v1 2.308 Setting up connection for downloading https://server4:443/oqbtbkfuqe at 24:56.783 on ClientConnection[52de8a7bc02a1b1e/d0b1747f508feae2(V1) with server4/193.167.100.100:443] 2.308 Original destination connection id: 52de8a7bc02a1b1e (scid: d0b1747f508feae2) >- CryptoStream[I|ClientHello] 2.307 -> Packet A|4|S0|eddc4aaa5b62da760d154f7f|44|2 ConnectionCloseFrame[0|0|] AckFrame[19,17,14-13|Δ4] 2.311 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.511/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.311 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.338 <- (24) Packet A|20|S0|b0fe65d4b09a0ace|33|1 ConnectionCloseFrame[0|0|] 2.345 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 2.350 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.550/Handshake, because peerAwaitingAddressValidation | RTT:100/25 2.350 Discarding pn space Initial because first Handshake message is being sent 2.350 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.550/Handshake, because peerAwaitingAddressValidation | RTT:100/25 2.345 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 2.350 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 2.351 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 2.345 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 2.352 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 2.346 <- (4) Packet H|3|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|EncryptedExtensions,Certificate] 2.352 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] 2.352 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 2.353 -> Packet H|2|L|52|1 AckFrame[3,1-0|Δ0] 2.389 <- (6) Packet H|4|L|133|1 CryptoFrame[593,79] >- CryptoStream[H|Finished] 2.393 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.593/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.393 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[3,1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.394 Starting downloading https://server4:443/oqbtbkfuqe at 24:56.869 on ClientConnection[52de8a7bc02a1b1e/d0b1747f508feae2(V1) with server4/193.167.100.100:443] 2.394 -> Packet H|4|L|52|1 AckFrame[4-3,1-0|Δ0] 2.395 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.595/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.394 -> Packet A|0|S0|49aa23bf33d6ae8e7d7ee63c|51|1 StreamFrame[0(CIB),0,17,fin] 2.424 <- (7) Packet A|0|S0|d0b1747f508feae2|30|1 HandshakeDoneFrame[] 2.425 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 2.593/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 2.619/App, because ackElicitingInFlight | RTT:100/25 2.425 Discarding pn space Handshake because HandshakeDone is received 2.424 <- (8) Packet A|4|S0|d0b1747f508feae2|40|1 NewTokenFrame[00c1a70064681ba578] 2.425 <- (9) Packet A|6|S0|d0b1747f508feae2|291|1 CryptoFrame[257,257] 2.426 -> Packet A|1|S0|49aa23bf33d6ae8e7d7ee63c|37|1 AckFrame[4,0|Δ0] -< CryptoStream[A|] 2.426 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 2.426 <- (11) Packet A|8|S0|d0b1747f508feae2|1057|1 StreamFrame[0(CIB),0,1024,fin] 2.427 Finished downloading https://server4:443/oqbtbkfuqe at 24:56.903 on ClientConnection[52de8a7bc02a1b1e/d0b1747f508feae2(V1) with server4/193.167.100.100:443] 2.427 -> Packet A|2|S0|49aa23bf33d6ae8e7d7ee63c|41|1 AckFrame[8,6,4,0|Δ0] 2.427 Closing ClientConnection[52de8a7bc02a1b1e/d0b1747f508feae2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.428 Creating connection with server4:443 with v1 2.428 -> Packet A|3|S0|49aa23bf33d6ae8e7d7ee63c|45|2 ConnectionCloseFrame[0|0|] AckFrame[8,6,4,0|Δ0] 2.429 Setting up connection for downloading https://server4:443/erldjovvim at 24:56.904 on ClientConnection[3eafbeec0d93c0dc/740512a40b44f776(V1) with server4/193.167.100.100:443] 2.429 Original destination connection id: 3eafbeec0d93c0dc (scid: 740512a40b44f776) >- CryptoStream[I|ClientHello] 2.431 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.632/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.431 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.458 <- (12) Packet A|10|S0|d0b1747f508feae2|290|1 CryptoFrame[0,257] 2.459 <- (13) Packet A|11|S0|d0b1747f508feae2|33|1 ConnectionCloseFrame[0|0|] 2.459 -> Packet A|4|S0|49aa23bf33d6ae8e7d7ee63c|45|2 ConnectionCloseFrame[0|0|] AckFrame[8,6,4,0|Δ0] 2.465 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 2.470 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.670/Handshake, because peerAwaitingAddressValidation | RTT:100/25 2.471 Discarding pn space Initial because first Handshake message is being sent 2.471 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.671/Handshake, because peerAwaitingAddressValidation | RTT:100/25 2.466 <- (2) Packet H|1|L|523|1 CryptoFrame[124,469] 2.471 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) -< CryptoStream[H|] 2.472 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 2.509 <- (3) Packet H|4|L|177|1 CryptoFrame[0,124] 2.509 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate] 2.510 -> Packet H|1|L|52|1 AckFrame[4,1|Δ0] 2.541 <- (4) Packet H|5|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 2.541 <- (5) Packet H|6|L|89|1 CryptoFrame[672,36] 2.544 -> Packet H|2|L|52|1 AckFrame[5-4,1|Δ0] >- CryptoStream[H|Finished] 2.545 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.745/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.545 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[5-4,1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 2.546 Starting downloading https://server4:443/erldjovvim at 24:57.021 on ClientConnection[3eafbeec0d93c0dc/740512a40b44f776(V1) with server4/193.167.100.100:443] 2.546 -> Packet H|4|L|52|1 AckFrame[6-4,1|Δ0] 2.547 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 2.747/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.546 -> Packet A|0|S0|49437c9ba9267480a7067203|51|1 StreamFrame[0(CIB),0,17,fin] 2.576 <- (6) Packet A|0|S0|740512a40b44f776|30|1 HandshakeDoneFrame[] 2.577 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 2.745/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 2.771/App, because ackElicitingInFlight | RTT:100/25 2.577 Discarding pn space Handshake because HandshakeDone is received 2.576 <- (7) Packet A|3|S0|740512a40b44f776|40|1 NewTokenFrame[00c1a70064681ba579] 2.576 <- (8) Packet A|4|S0|740512a40b44f776|290|1 CryptoFrame[0,257] 2.578 -> Packet A|1|S0|49437c9ba9267480a7067203|37|1 AckFrame[3,0|Δ0] -< CryptoStream[A|NewSessionTicket] 2.577 <- (9) Packet A|5|S0|740512a40b44f776|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 2.579 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 2.579 -> Packet A|2|S0|49437c9ba9267480a7067203|37|1 AckFrame[5-3,0|Δ0] 2.577 <- (11) Packet A|6|S0|740512a40b44f776|61|1 NewConnectionIdFrame[1,<0|4518faf3cedb86264aa4a27d|6b309f223c1c851e721eed06676b4c0d] 2.578 <- (12) Packet A|7|S0|740512a40b44f776|1057|1 StreamFrame[0(CIB),0,1024,fin] 2.583 Finished downloading https://server4:443/erldjovvim at 24:57.059 on ClientConnection[3eafbeec0d93c0dc/740512a40b44f776(V1) with server4/193.167.100.100:443] 2.583 -> Packet A|3|S0|49437c9ba9267480a7067203|37|1 AckFrame[7-3,0|Δ0] 2.584 Closing ClientConnection[3eafbeec0d93c0dc/740512a40b44f776(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 2.584 -> Packet A|4|S0|49437c9ba9267480a7067203|41|2 ConnectionCloseFrame[0|0|] AckFrame[7-3,0|Δ0] 2.584 Creating connection with server4:443 with v1 2.585 Setting up connection for downloading https://server4:443/cxkezkwdoy at 24:57.061 on ClientConnection[4f2d7ad2c9c0ff15/61001e49e47dd25b(V1) with server4/193.167.100.100:443] 2.585 Original destination connection id: 4f2d7ad2c9c0ff15 (scid: 61001e49e47dd25b) >- CryptoStream[I|ClientHello] 2.587 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.787/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 2.587 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 2.621 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 2.621 Discarding packet (523 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 2.622 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 2.621 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 2.622 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 2.822/Initial, because peerAwaitingAddressValidation | RTT:100/25 2.821 loss detection timeout handler running Sending probe 0, because no ack since 2.587. Current RTT: 34/17. 2.822 Sending probe because peer awaiting address validation 2.822 (Probe is Initial ping, because there is no Initial data to retransmit) 2.823 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 3.027/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 2.822 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 3.026 loss detection timeout handler running Sending probe 1, because no ack since 2.822. Current RTT: 34/17. 3.026 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 3.026 (Probe is Initial ping, because there is no Initial data to retransmit) 3.027 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 3.435/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.026 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 3.028 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 3.436/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.027 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 3.058 <- (5) Packet I|2|L|57|1 Token=[] AckFrame[2,0|Δ0] 3.059 probe count not reset on ack because handshake not yet confirmed 3.059 Cwnd(-): 6000; inflight: 1201 3.059 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 3.467/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 3.373 <- (6) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 3.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 3.466/Handshake, because peerAwaitingAddressValidation | RTT:34/14 3.376 Discarding pn space Initial because first Handshake message is being sent 3.376 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 3.467/Handshake, because peerAwaitingAddressValidation | RTT:34/14 3.376 -> Packet I|4|L|1201|2 Token=[] AckFrame[4,2-1|Δ0] Padding(1147) 3.408 <- (7) Packet H|4|L|177|1 CryptoFrame[0,124] 3.409 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 3.409 <- (8) Packet H|5|L|523|1 CryptoFrame[124,469] 3.410 -> Packet H|0|L|50|1 AckFrame[4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 3.411 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 3.442 <- (9) Packet H|6|L|132|1 CryptoFrame[593,78] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 3.444 -> Packet H|2|L|50|1 AckFrame[6-4|Δ0] 3.442 <- (10) Packet H|7|L|89|1 CryptoFrame[671,36] >- CryptoStream[H|Finished] 3.445 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 3.535/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 3.445 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[6-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.446 Starting downloading https://server4:443/cxkezkwdoy at 24:57.922 on ClientConnection[4f2d7ad2c9c0ff15/61001e49e47dd25b(V1) with server4/193.167.100.100:443] 3.446 -> Packet H|4|L|50|1 AckFrame[7-4|Δ0] 3.447 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 3.537/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 3.447 -> Packet A|0|S0|235bf49220cc3c1c41a4c8a2|51|1 StreamFrame[0(CIB),0,17,fin] 3.476 <- (11) Packet A|0|S0|61001e49e47dd25b|30|1 HandshakeDoneFrame[] 3.477 State is set to Confirmed reschedule loss detection timer for PTO over 57 millis, based on 3.535/Handshake, because ackElicitingInFlight | RTT:34/14 reschedule loss detection timer for PTO over 84 millis, based on 3.562/App, because ackElicitingInFlight | RTT:34/14 3.477 Discarding pn space Handshake because HandshakeDone is received 3.477 <- (12) Packet A|2|S0|61001e49e47dd25b|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 3.477 <- (13) Packet A|3|S0|61001e49e47dd25b|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 3.478 -> Packet A|1|S0|235bf49220cc3c1c41a4c8a2|37|1 AckFrame[2,0|Δ0] 3.479 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 3.477 <- (15) Packet A|11|S0|61001e49e47dd25b|61|1 NewConnectionIdFrame[1,<0|6b547d5b899ea975515c2179|517107d5ba0f1997f29c050f92a00d5e] 3.479 <- (16) Packet A|12|S0|61001e49e47dd25b|1057|1 StreamFrame[0(CIB),0,1024,fin] 3.479 -> Packet A|2|S0|235bf49220cc3c1c41a4c8a2|39|1 AckFrame[11,3-2,0|Δ0] 3.480 Finished downloading https://server4:443/cxkezkwdoy at 24:57.955 on ClientConnection[4f2d7ad2c9c0ff15/61001e49e47dd25b(V1) with server4/193.167.100.100:443] 3.480 Closing ClientConnection[4f2d7ad2c9c0ff15/61001e49e47dd25b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.480 Creating connection with server4:443 with v1 3.480 -> Packet A|3|S0|235bf49220cc3c1c41a4c8a2|43|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,3-2,0|Δ0] 3.481 Setting up connection for downloading https://server4:443/fgqxkqklfe at 24:57.957 on ClientConnection[0ad57e92bedebe6d/fc1b275697d5cb1d(V1) with server4/193.167.100.100:443] 3.481 Original destination connection id: 0ad57e92bedebe6d (scid: fc1b275697d5cb1d) >- CryptoStream[I|ClientHello] 3.483 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 3.683/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.483 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.511 <- (17) Packet A|15|S0|61001e49e47dd25b|33|1 ConnectionCloseFrame[0|0|] 3.517 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 3.521 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.721/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.521 Discarding pn space Initial because first Handshake message is being sent 3.521 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.721/Handshake, because peerAwaitingAddressValidation | RTT:100/25 3.521 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 3.517 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 3.522 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 3.517 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 3.522 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 3.517 <- (4) Packet H|3|L|89|1 CryptoFrame[673,36] -< CryptoStream[H|EncryptedExtensions,Certificate] 3.523 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] 3.523 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 3.523 -> Packet H|2|L|52|1 AckFrame[3,1-0|Δ0] 3.610 <- (6) Packet H|4|L|134|1 CryptoFrame[593,80] >- CryptoStream[H|Finished] 3.613 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.813/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.613 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[3,1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.613 Starting downloading https://server4:443/fgqxkqklfe at 24:58.089 on ClientConnection[0ad57e92bedebe6d/fc1b275697d5cb1d(V1) with server4/193.167.100.100:443] 3.610 <- (7) Packet H|5|L|89|1 CryptoFrame[673,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 3.614 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 3.814/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.614 -> [Packet H|4|L|52|1 AckFrame[5-3,1-0|Δ0], Packet A|0|S0|2f8c63e443cecdfc71e6305c|51|1 StreamFrame[0(CIB),0,17,fin]] 3.813 loss detection timeout handler running Sending probe 0, because no ack since 3.613. Current RTT: 100/25. 3.814 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 3.814 (Probe is a handshake retransmit) 3.814 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 4.215/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.814 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 3.845 <- (8) Packet A|0|S0|fc1b275697d5cb1d|30|1 HandshakeDoneFrame[] 3.846 State is set to Confirmed reschedule loss detection timer for PTO over 217 millis, based on 4.064/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -7 millis, based on 3.839/App, because ackElicitingInFlight | RTT:100/25 3.846 loss detection timeout handler running 3.846 Discarding pn space Handshake because HandshakeDone is received Sending probe 0, because no ack since 3.614. Current RTT: 100/25. 3.846 <- (9) Packet A|3|S0|fc1b275697d5cb1d|291|1 CryptoFrame[257,257] 3.847 (Probe is retransmit on level App) -< CryptoStream[A|] 3.847 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 3.846 <- (11) Packet A|4|S0|fc1b275697d5cb1d|61|1 NewConnectionIdFrame[1,<0|2adf59fb79afb8d1e2cdfa21|141ed20e9c68b41df582e08fc48eed3c] 3.847 -> Packet A|1|S0|2f8c63e443cecdfc71e6305c|37|1 AckFrame[3,0|Δ0] reschedule loss detection timer for PTO over 449 millis, based on 4.297/App, because ackElicitingInFlight | RTT:100/25 3.847 -> Packet PA|2|S0|2f8c63e443cecdfc71e6305c|51|1 StreamFrame[0(CIB),0,17,fin] 3.867 -> Packet A|3|S0|2f8c63e443cecdfc71e6305c|38|1 AckFrame[4-3,0|Δ19] 3.879 <- (12) Packet A|5|S0|fc1b275697d5cb1d|1057|1 StreamFrame[0(CIB),0,1024,fin] 3.880 Finished downloading https://server4:443/fgqxkqklfe at 24:58.356 on ClientConnection[0ad57e92bedebe6d/fc1b275697d5cb1d(V1) with server4/193.167.100.100:443] 3.880 Closing ClientConnection[0ad57e92bedebe6d/fc1b275697d5cb1d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 3.880 -> Packet A|4|S0|2f8c63e443cecdfc71e6305c|41|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,0|Δ0] 3.881 Creating connection with server4:443 with v1 3.881 Setting up connection for downloading https://server4:443/hsekvudrcg at 24:58.357 on ClientConnection[bd489033cd06355c/cf069347943c9c40(V1) with server4/193.167.100.100:443] 3.881 Original destination connection id: bd489033cd06355c (scid: cf069347943c9c40) >- CryptoStream[I|ClientHello] 3.883 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 4.083/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 3.883 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 3.887 <- (13) Packet A|6|S0|fc1b275697d5cb1d|40|1 NewTokenFrame[00c1a70064681ba57a] 3.887 <- (14) Packet A|7|S0|fc1b275697d5cb1d|290|1 CryptoFrame[0,257] 3.887 -> Packet A|5|S0|2f8c63e443cecdfc71e6305c|41|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,0|Δ0] 3.888 -> Packet A|6|S0|2f8c63e443cecdfc71e6305c|41|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,0|Δ0] 3.911 <- (15) Packet A|9|S0|fc1b275697d5cb1d|33|1 ConnectionCloseFrame[0|0|] 4.082 loss detection timeout handler running Sending probe 0, because no ack since 3.883. Current RTT: 100/25. 4.083 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.083 (Probe is an initial retransmit) 4.083 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.483/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 4.083 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 4.118 Discarding packet (523 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 4.118 <- (2) Packet I|1|L|56|1 Token=[] AckFrame[1|Δ1] 4.118 probe count not reset on ack because handshake not yet confirmed 4.118 Retransmitting CryptoFrame[0,257] on level Initial 4.118 Cwnd(-): 6000; inflight: 0 4.118 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 4.519/Initial, because peerAwaitingAddressValidation | RTT:100/25 4.119 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 4.323/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.119 -> Packet I|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 4.322 loss detection timeout handler running Sending probe 1, because no ack since 4.119. Current RTT: 34/17. 4.322 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.322 (Probe is an initial retransmit) 4.322 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 4.731/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.322 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 4.324 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 4.732/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.323 -> Packet PI|4|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 4.731 loss detection timeout handler running Sending probe 2, because no ack since 4.323. Current RTT: 34/17. 4.731 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.731 (Probe is an initial retransmit) 4.732 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 815 millis, based on 5.548/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.731 -> Packet PI|5|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 4.732 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 815 millis, based on 5.549/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.732 -> Packet PI|6|L|1200|2 Token=[] CryptoFrame[0,257] Padding(892) 4.763 <- (3) Packet I|2|L|57|1 Token=[] AckFrame[5,1|Δ0] 4.764 probe count not reset on ack because handshake not yet confirmed 4.768 Cwnd(+): 6240 (CongestionAvoidance); inflight: 6000 4.768 Retransmitting CryptoFrame[0,257] on level Initial 4.768 Cwnd(-): 3120; inflight: 1200 4.768 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 815 millis, based on 5.584/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 4.769 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 4.764 <- (4) Packet I|3|L|57|1 Token=[] AckFrame[6-5,1|Δ0] reschedule loss detection timer for PTO over 687 millis, based on 5.457/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/13 4.769 probe count not reset on ack because handshake not yet confirmed 4.768 -> Packet I|7|L|1200|3 Token=[] CryptoFrame[0,257] AckFrame[1|Δ0] Padding(887) 4.769 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 687 millis, based on 5.457/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/13 4.867 <- (5) Packet I|5|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 4.874 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 4.952/Handshake, because peerAwaitingAddressValidation | RTT:34/11 4.875 Discarding pn space Initial because first Handshake message is being sent 4.875 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 4.875 Packet not sent because keys are discarded: Packet I|8|L|.|2 Token=[] AckFrame[5,3-1|Δ0] Padding(1147) 4.952 loss detection timeout handler running 4.952 Sending probe 0. Current RTT: 34/11. 4.952 Sending probe because peer awaiting address validation 4.952 (Probe is a handshake ping) 4.952 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 155 millis, based on 5.108/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 4.952 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 4.984 <- (7) Packet H|5|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|] 4.984 <- (8) Packet H|6|L|54|1 AckFrame[0|Δ0] 4.984 -> Packet H|1|L|50|1 AckFrame[5|Δ0] 4.985 probe count not reset on ack because handshake not yet confirmed 4.985 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 5.015 <- (9) Packet H|7|L|132|1 CryptoFrame[593,78] -< CryptoStream[H|] 5.016 <- (10) Packet H|8|L|89|1 CryptoFrame[671,36] -< CryptoStream[H|] 5.016 -> Packet H|2|L|50|1 AckFrame[7-5|Δ0] 5.016 -> Packet H|3|L|50|1 AckFrame[8-5|Δ0] 5.020 <- (11) Packet H|9|L|177|1 CryptoFrame[0,124] 5.020 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 139 millis, based on 5.163/Handshake, because ackElicitingInFlight | RTT:34/9 5.023 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[8-5|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.024 Starting downloading https://server4:443/hsekvudrcg at 24:59.499 on ClientConnection[bd489033cd06355c/cf069347943c9c40(V1) with server4/193.167.100.100:443] 5.024 -> Packet H|5|L|50|1 AckFrame[9-5|Δ0] 5.024 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 138 millis, based on 5.163/Handshake, because ackElicitingInFlight | RTT:34/9 5.024 -> Packet A|0|S0|085b505852b963cf06b7013b|51|1 StreamFrame[0(CIB),0,17,fin] 5.054 <- (12) Packet A|0|S0|cf069347943c9c40|30|1 HandshakeDoneFrame[] 5.055 State is set to Confirmed reschedule loss detection timer for PTO over 107 millis, based on 5.163/Handshake, because ackElicitingInFlight | RTT:34/9 reschedule loss detection timer for PTO over 64 millis, based on 5.119/App, because ackElicitingInFlight | RTT:34/9 5.055 Discarding pn space Handshake because HandshakeDone is received 5.054 <- (13) Packet A|6|S0|cf069347943c9c40|40|1 NewTokenFrame[00c1a70064681ba57b] 5.055 <- (14) Packet A|7|S0|cf069347943c9c40|290|1 CryptoFrame[0,257] 5.056 -> Packet A|1|S0|085b505852b963cf06b7013b|37|1 AckFrame[6,0|Δ0] -< CryptoStream[A|NewSessionTicket] 5.055 <- (15) Packet A|8|S0|cf069347943c9c40|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 5.056 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 5.055 <- (17) Packet A|9|S0|cf069347943c9c40|61|1 NewConnectionIdFrame[1,<0|ce1818ae329c37f33cf41a8e|d1f1c2f7fc786a8577336ecdf7dfb356] 5.056 -> Packet A|2|S0|085b505852b963cf06b7013b|37|1 AckFrame[8-6,0|Δ0] 5.056 <- (18) Packet A|10|S0|cf069347943c9c40|1057|1 StreamFrame[0(CIB),0,1024,fin] 5.057 Finished downloading https://server4:443/hsekvudrcg at 24:59.533 on ClientConnection[bd489033cd06355c/cf069347943c9c40(V1) with server4/193.167.100.100:443] 5.058 Closing ClientConnection[bd489033cd06355c/cf069347943c9c40(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 5.058 Creating connection with server4:443 with v1 5.058 -> Packet A|3|S0|085b505852b963cf06b7013b|42|2 ConnectionCloseFrame[0|0|] AckFrame[10-6,0|Δ1] 5.059 Setting up connection for downloading https://server4:443/evqhzxaddz at 24:59.534 on ClientConnection[febc1912044c2411/6d589c5e1bfec2e2(V1) with server4/193.167.100.100:443] 5.059 Original destination connection id: febc1912044c2411 (scid: 6d589c5e1bfec2e2) >- CryptoStream[I|ClientHello] 5.061 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.261/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 5.061 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 5.080 <- (19) Packet A|11|S0|cf069347943c9c40|35|1 AckFrame[0|Δ25] 5.081 -> Packet A|4|S0|085b505852b963cf06b7013b|41|2 ConnectionCloseFrame[0|0|] AckFrame[10-6,0|Δ0] 5.089 <- (20) Packet A|12|S0|cf069347943c9c40|33|1 ConnectionCloseFrame[0|0|] 5.095 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 5.095 Discarding packet (523 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 5.095 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 5.095 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 5.096 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 5.296/Initial, because peerAwaitingAddressValidation | RTT:100/25 5.295 loss detection timeout handler running Sending probe 0, because no ack since 5.061. Current RTT: 34/17. 5.295 Sending probe because peer awaiting address validation 5.295 (Probe is Initial ping, because there is no Initial data to retransmit) 5.296 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 5.500/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.295 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 5.499 loss detection timeout handler running Sending probe 1, because no ack since 5.295. Current RTT: 34/17. 5.499 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 5.499 (Probe is Initial ping, because there is no Initial data to retransmit) 5.499 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 5.907/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.499 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 5.500 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 5.908/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.500 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 5.531 <- (5) Packet I|2|L|57|1 Token=[] AckFrame[2,0|Δ0] 5.531 probe count not reset on ack because handshake not yet confirmed 5.532 Cwnd(-): 6000; inflight: 1201 5.532 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 5.940/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 5.846 <- (6) Packet I|3|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 5.850 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 5.940/Handshake, because peerAwaitingAddressValidation | RTT:34/14 5.850 Discarding pn space Initial because first Handshake message is being sent 5.850 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 5.940/Handshake, because peerAwaitingAddressValidation | RTT:34/14 5.850 -> Packet I|4|L|1201|2 Token=[] AckFrame[3-1|Δ0] Padding(1149) 5.882 <- (7) Packet H|4|L|177|1 CryptoFrame[0,124] 5.884 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 5.884 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 5.916 <- (8) Packet H|6|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions] 5.916 <- (9) Packet H|7|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|EncryptedExtensions] 5.917 -> Packet H|1|L|52|1 AckFrame[6,4|Δ0] 5.917 -> Packet H|2|L|52|1 AckFrame[7-6,4|Δ0] 5.939 loss detection timeout handler running 5.940 Sending probe 0. Current RTT: 34/14. 5.940 Sending probe because peer awaiting address validation 5.940 (Probe is a handshake ping) 5.940 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 179 millis, based on 6.120/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 5.940 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) 5.948 <- (10) Packet H|8|L|523|1 CryptoFrame[124,469] >- CryptoStream[H|Finished] 5.951 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 179 millis, based on 6.131/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 5.951 -> Packet H|4|L|91|2 CryptoFrame[0,36] AckFrame[7-6,4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 5.952 Starting downloading https://server4:443/evqhzxaddz at 25:00.428 on ClientConnection[febc1912044c2411/6d589c5e1bfec2e2(V1) with server4/193.167.100.100:443] 5.952 -> Packet H|5|L|52|1 AckFrame[8-6,4|Δ0] 5.953 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 179 millis, based on 6.133/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 5.953 -> Packet A|0|S0|9b7cf40ba03a78a9af3e2e8f|51|1 StreamFrame[0(CIB),0,17,fin] 5.983 <- (11) Packet A|0|S0|6d589c5e1bfec2e2|30|1 HandshakeDoneFrame[] 5.984 State is set to Confirmed reschedule loss detection timer for PTO over 147 millis, based on 6.131/Handshake, because ackElicitingInFlight | RTT:34/14 reschedule loss detection timer for PTO over 83 millis, based on 6.068/App, because ackElicitingInFlight | RTT:34/14 5.984 Discarding pn space Handshake because HandshakeDone is received 5.983 <- (12) Packet A|4|S0|6d589c5e1bfec2e2|40|1 NewTokenFrame[00c1a70064681ba57c] 5.983 <- (13) Packet A|5|S0|6d589c5e1bfec2e2|290|1 CryptoFrame[0,257] 5.985 -> Packet A|1|S0|9b7cf40ba03a78a9af3e2e8f|37|1 AckFrame[4,0|Δ0] -< CryptoStream[A|NewSessionTicket] 5.984 <- (14) Packet A|6|S0|6d589c5e1bfec2e2|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 5.986 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 5.986 -> Packet A|2|S0|9b7cf40ba03a78a9af3e2e8f|37|1 AckFrame[6-4,0|Δ0] 5.984 <- (16) Packet A|7|S0|6d589c5e1bfec2e2|61|1 NewConnectionIdFrame[1,<0|08ea7c3cb5771078b627159e|a6cd9d8f6dbbf3df61526876bdf53744] 6.005 -> Packet A|3|S0|9b7cf40ba03a78a9af3e2e8f|38|1 AckFrame[7-4,0|Δ19] 6.067 loss detection timeout handler running Sending probe 0, because no ack since 5.953. Current RTT: 34/14. 6.068 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 229 millis, based on 6.298/App, because ackElicitingInFlight | RTT:34/14 6.068 -> Packet PA|4|S0|9b7cf40ba03a78a9af3e2e8f|51|1 StreamFrame[0(CIB),0,17,fin] 6.100 <- (17) Packet A|10|S0|6d589c5e1bfec2e2|1057|1 StreamFrame[0(CIB),0,1024,fin] 6.101 Finished downloading https://server4:443/evqhzxaddz at 25:00.577 on ClientConnection[febc1912044c2411/6d589c5e1bfec2e2(V1) with server4/193.167.100.100:443] 6.101 Closing ClientConnection[febc1912044c2411/6d589c5e1bfec2e2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.102 Creating connection with server4:443 with v1 6.102 -> Packet A|5|S0|9b7cf40ba03a78a9af3e2e8f|43|2 ConnectionCloseFrame[0|0|] AckFrame[10,7-4,0|Δ0] 6.102 Setting up connection for downloading https://server4:443/vojuprujhx at 25:00.578 on ClientConnection[edffce5299f3715f/259e3eea0bdc22c9(V1) with server4/193.167.100.100:443] 6.103 Original destination connection id: edffce5299f3715f (scid: 259e3eea0bdc22c9) >- CryptoStream[I|ClientHello] 6.104 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.304/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.104 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.124 <- (18) Packet A|11|S0|6d589c5e1bfec2e2|37|1 AckFrame[4,2-1|Δ25] 6.125 -> Packet A|6|S0|9b7cf40ba03a78a9af3e2e8f|43|2 ConnectionCloseFrame[0|0|] AckFrame[10,7-4,0|Δ0] 6.138 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 6.142 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.342/Handshake, because peerAwaitingAddressValidation | RTT:100/25 6.142 Discarding pn space Initial because first Handshake message is being sent 6.142 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.342/Handshake, because peerAwaitingAddressValidation | RTT:100/25 6.142 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 6.138 <- (2) Packet H|3|L|89|1 CryptoFrame[671,36] -< CryptoStream[H|] 6.143 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.143 -> Packet H|0|L|50|1 AckFrame[3|Δ0] 6.175 <- (4) Packet H|4|L|177|1 CryptoFrame[0,124] 6.175 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 6.176 -> Packet H|1|L|50|1 AckFrame[4-3|Δ0] 6.274 <- (5) Packet H|8|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 6.275 -> Packet H|2|L|52|1 AckFrame[8,4-3|Δ0] 6.306 <- (6) Packet H|9|L|132|1 CryptoFrame[593,78] >- CryptoStream[H|Finished] 6.309 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.509/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.309 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[8,4-3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.310 Starting downloading https://server4:443/vojuprujhx at 25:00.785 on ClientConnection[edffce5299f3715f/259e3eea0bdc22c9(V1) with server4/193.167.100.100:443] 6.310 -> Packet H|4|L|52|1 AckFrame[9-8,4-3|Δ0] 6.310 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.510/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.310 -> Packet A|0|S0|9085ef2e363f347740c918f3|51|1 StreamFrame[0(CIB),0,17,fin] 6.340 <- (7) Packet A|0|S0|259e3eea0bdc22c9|30|1 HandshakeDoneFrame[] 6.341 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 6.509/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 6.535/App, because ackElicitingInFlight | RTT:100/25 6.342 Discarding pn space Handshake because HandshakeDone is received 6.340 <- (8) Packet A|1|S0|259e3eea0bdc22c9|40|1 NewTokenFrame[00c1a70064681ba57c] 6.341 <- (9) Packet A|2|S0|259e3eea0bdc22c9|290|1 CryptoFrame[0,257] 6.342 -> Packet A|1|S0|9085ef2e363f347740c918f3|35|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 6.341 <- (10) Packet A|3|S0|259e3eea0bdc22c9|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 6.343 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 6.343 -> Packet A|2|S0|9085ef2e363f347740c918f3|35|1 AckFrame[3-0|Δ0] 6.341 <- (12) Packet A|7|S0|259e3eea0bdc22c9|61|1 NewConnectionIdFrame[1,<0|55ea099e59138f9975e482b4|44c76a3ca958713715abba4b07b649ee] 6.362 -> Packet A|3|S0|9085ef2e363f347740c918f3|38|1 AckFrame[7,3-0|Δ19] 6.367 <- (13) Packet A|9|S0|259e3eea0bdc22c9|35|1 AckFrame[0|Δ25] 6.367 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.451 <- (14) Packet A|10|S0|259e3eea0bdc22c9|30|1 HandshakeDoneFrame[] 6.451 <- (15) Packet A|11|S0|259e3eea0bdc22c9|40|1 NewTokenFrame[00c1a70064681ba57c] 6.452 -> Packet A|4|S0|9085ef2e363f347740c918f3|39|1 AckFrame[11-9,7,3-0|Δ0] 6.585 <- (16) Packet A|13|S0|259e3eea0bdc22c9|1057|1 StreamFrame[0(CIB),0,1024,fin] 6.586 Finished downloading https://server4:443/vojuprujhx at 25:01.062 on ClientConnection[edffce5299f3715f/259e3eea0bdc22c9(V1) with server4/193.167.100.100:443] 6.586 Closing ClientConnection[edffce5299f3715f/259e3eea0bdc22c9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 6.587 -> Packet A|5|S0|9085ef2e363f347740c918f3|45|2 ConnectionCloseFrame[0|0|] AckFrame[13,11-9,7,3-0|Δ0] 6.587 Creating connection with server4:443 with v1 6.588 Setting up connection for downloading https://server4:443/qppybmeezd at 25:01.063 on ClientConnection[f67d6f7b2b6692cf/4933b6f611a5802d(V1) with server4/193.167.100.100:443] 6.588 Original destination connection id: f67d6f7b2b6692cf (scid: 4933b6f611a5802d) >- CryptoStream[I|ClientHello] 6.590 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 6.790/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.589 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 6.618 <- (17) Packet A|15|S0|259e3eea0bdc22c9|33|1 ConnectionCloseFrame[0|0|] 6.623 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 6.627 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.827/Handshake, because peerAwaitingAddressValidation | RTT:100/25 6.627 Discarding pn space Initial because first Handshake message is being sent 6.627 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 6.827/Handshake, because peerAwaitingAddressValidation | RTT:100/25 6.627 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 6.623 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 6.628 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 6.624 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 6.628 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 6.628 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 6.629 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] 6.734 <- (5) Packet H|4|L|177|1 CryptoFrame[0,124] -< CryptoStream[H|EncryptedExtensions,Certificate] 6.735 -> Packet H|2|L|52|1 AckFrame[4,1-0|Δ0] 6.767 <- (6) Packet H|6|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 6.769 -> Packet H|3|L|54|1 AckFrame[6,4,1-0|Δ0] 6.826 loss detection timeout handler running 6.826 Sending probe 0. Current RTT: 100/25. 6.826 Sending probe because peer awaiting address validation 6.827 (Probe is a handshake ping) 6.827 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 7.227/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 6.827 -> Packet PH|4|L|48|2 PingFrame[] Padding(2) 6.858 <- (7) Packet H|8|L|56|1 AckFrame[4,2|Δ0] 6.859 probe count not reset on ack because handshake not yet confirmed 6.859 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 6.864 <- (8) Packet H|10|L|89|1 CryptoFrame[672,36] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 181 millis, based on 7.046/Handshake, because ackElicitingInFlight | RTT:31/15 6.864 -> Packet H|5|L|91|2 CryptoFrame[0,36] AckFrame[8,6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 6.865 Starting downloading https://server4:443/qppybmeezd at 25:01.341 on ClientConnection[f67d6f7b2b6692cf/4933b6f611a5802d(V1) with server4/193.167.100.100:443] 6.865 -> Packet H|6|L|54|1 AckFrame[10,8,6|Δ0] 6.866 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 180 millis, based on 7.046/Handshake, because ackElicitingInFlight | RTT:31/15 6.866 -> Packet A|0|S0|b3efa52aea08279312fad3b9|51|1 StreamFrame[0(CIB),0,17,fin] 6.896 <- (9) Packet A|0|S0|4933b6f611a5802d|30|1 HandshakeDoneFrame[] 6.897 State is set to Confirmed reschedule loss detection timer for PTO over 149 millis, based on 7.046/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 84 millis, based on 6.982/App, because ackElicitingInFlight | RTT:31/15 6.898 Discarding pn space Handshake because HandshakeDone is received 6.896 <- (10) Packet A|1|S0|4933b6f611a5802d|40|1 NewTokenFrame[00c1a70064681ba57d] 6.897 <- (11) Packet A|2|S0|4933b6f611a5802d|290|1 CryptoFrame[0,257] 6.898 -> Packet A|1|S0|b3efa52aea08279312fad3b9|35|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 6.899 Discarding packet (55 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 6.897 <- (13) Packet A|4|S0|4933b6f611a5802d|61|1 NewConnectionIdFrame[1,<0|0c477610b85bf0f001501975|265c0d5c3c9495059591b74299b7d146] 6.899 -> Packet A|2|S0|b3efa52aea08279312fad3b9|37|1 AckFrame[4,2-0|Δ0] 6.982 loss detection timeout handler running Sending probe 0, because no ack since 6.866. Current RTT: 31/15. 6.982 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 7.214/App, because ackElicitingInFlight | RTT:31/15 6.982 -> Packet PA|3|S0|b3efa52aea08279312fad3b9|51|1 StreamFrame[0(CIB),0,17,fin] 6.987 <- (14) Packet A|5|S0|4933b6f611a5802d|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.007 -> Packet A|4|S0|b3efa52aea08279312fad3b9|38|1 AckFrame[5-4,2-0|Δ19] 7.159 <- (15) Packet A|12|S0|4933b6f611a5802d|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.180 -> Packet A|5|S0|b3efa52aea08279312fad3b9|40|1 AckFrame[12,5-4,2-0|Δ19] 7.214 loss detection timeout handler running Sending probe 1, because no ack since 6.982. Current RTT: 31/15. 7.214 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 463 millis, based on 7.678/App, because ackElicitingInFlight | RTT:31/15 7.214 -> Packet PA|6|S0|b3efa52aea08279312fad3b9|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 463 millis, based on 7.679/App, because ackElicitingInFlight | RTT:31/15 7.215 -> Packet PA|7|S0|b3efa52aea08279312fad3b9|51|1 StreamFrame[0(CIB),0,17,fin] 7.247 <- (16) Packet A|13|S0|4933b6f611a5802d|1057|1 StreamFrame[0(CIB),0,1024,fin] 7.248 Finished downloading https://server4:443/qppybmeezd at 25:01.724 on ClientConnection[f67d6f7b2b6692cf/4933b6f611a5802d(V1) with server4/193.167.100.100:443] 7.248 Closing ClientConnection[f67d6f7b2b6692cf/4933b6f611a5802d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.249 -> Packet A|8|S0|b3efa52aea08279312fad3b9|43|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,5-4,2-0|Δ0] 7.249 Creating connection with server4:443 with v1 7.249 Setting up connection for downloading https://server4:443/lrxsxfzooh at 25:01.725 on ClientConnection[6eddecf6243db0e4/3d509e59812b582f(V1) with server4/193.167.100.100:443] 7.250 Original destination connection id: 6eddecf6243db0e4 (scid: 3d509e59812b582f) >- CryptoStream[I|ClientHello] 7.251 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.451/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.251 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.272 <- (17) Packet A|14|S0|4933b6f611a5802d|39|1 AckFrame[7,5,2-1|Δ25] 7.272 -> Packet A|9|S0|b3efa52aea08279312fad3b9|43|2 ConnectionCloseFrame[0|0|] AckFrame[13-12,5-4,2-0|Δ0] 7.285 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 7.288 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.488/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.289 Discarding pn space Initial because first Handshake message is being sent 7.289 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.489/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.289 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 7.285 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 7.289 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 7.286 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 7.290 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 7.286 <- (4) Packet H|2|L|133|1 CryptoFrame[593,79] 7.290 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 7.293 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] 7.303 <- (18) Packet A|15|S0|4933b6f611a5802d|33|1 ConnectionCloseFrame[0|0|] 7.377 <- (5) Packet H|4|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 7.378 -> Packet H|3|L|52|1 AckFrame[4,2-0|Δ0] 7.459 <- (6) Packet H|6|L|89|1 CryptoFrame[672,36] >- CryptoStream[H|Finished] 7.460 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.660/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.460 -> Packet H|4|L|91|2 CryptoFrame[0,36] AckFrame[4,2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.461 Starting downloading https://server4:443/lrxsxfzooh at 25:01.936 on ClientConnection[6eddecf6243db0e4/3d509e59812b582f(V1) with server4/193.167.100.100:443] 7.462 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.662/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.461 -> [Packet H|5|L|54|1 AckFrame[6,4,2-0|Δ0], Packet A|0|S0|f7844273280ca67bb4fc44b5|51|1 StreamFrame[0(CIB),0,17,fin]] 7.492 <- (7) Packet A|0|S0|3d509e59812b582f|30|1 HandshakeDoneFrame[] 7.493 State is set to Confirmed reschedule loss detection timer for PTO over 167 millis, based on 7.660/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 7.686/App, because ackElicitingInFlight | RTT:100/25 7.493 Discarding pn space Handshake because HandshakeDone is received 7.492 <- (8) Packet A|7|S0|3d509e59812b582f|40|1 NewTokenFrame[00c1a70064681ba57d] 7.492 <- (9) Packet A|8|S0|3d509e59812b582f|290|1 CryptoFrame[0,257] 7.493 -> Packet A|1|S0|f7844273280ca67bb4fc44b5|37|1 AckFrame[7,0|Δ0] -< CryptoStream[A|NewSessionTicket] 7.492 <- (10) Packet A|9|S0|3d509e59812b582f|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 7.492 <- (11) Packet A|10|S0|3d509e59812b582f|61|1 NewConnectionIdFrame[1,<0|2cc5b0b88dcd992811ee6410|5f4a4627b89a99ee832ba22bbeebf83e] 7.494 -> Packet A|2|S0|f7844273280ca67bb4fc44b5|37|1 AckFrame[9-7,0|Δ0] 7.514 -> Packet A|3|S0|f7844273280ca67bb4fc44b5|38|1 AckFrame[10-7,0|Δ19] 7.686 loss detection timeout handler running Sending probe 0, because no ack since 7.461. Current RTT: 100/25. 7.686 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 8.137/App, because ackElicitingInFlight | RTT:100/25 7.687 -> Packet PA|4|S0|f7844273280ca67bb4fc44b5|51|1 StreamFrame[0(CIB),0,17,fin] 7.719 <- (12) Packet A|11|S0|3d509e59812b582f|1057|1 StreamFrame[0(CIB),0,1024,fin] 7.720 Finished downloading https://server4:443/lrxsxfzooh at 25:02.195 on ClientConnection[6eddecf6243db0e4/3d509e59812b582f(V1) with server4/193.167.100.100:443] 7.720 Closing ClientConnection[6eddecf6243db0e4/3d509e59812b582f(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 7.720 Creating connection with server4:443 with v1 7.720 -> Packet A|5|S0|f7844273280ca67bb4fc44b5|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-7,0|Δ0] 7.721 Setting up connection for downloading https://server4:443/jieofwnlzv at 25:02.196 on ClientConnection[345674441b0ad984/92debae296ebbd3b(V1) with server4/193.167.100.100:443] 7.721 Original destination connection id: 345674441b0ad984 (scid: 92debae296ebbd3b) >- CryptoStream[I|ClientHello] 7.722 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 7.922/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.722 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 7.751 <- (13) Packet A|13|S0|3d509e59812b582f|33|1 ConnectionCloseFrame[0|0|] 7.756 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 7.759 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.959/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.759 Discarding pn space Initial because first Handshake message is being sent 7.759 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 7.959/Handshake, because peerAwaitingAddressValidation | RTT:100/25 7.756 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 7.759 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 7.760 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 7.756 <- (3) Packet H|2|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions] 7.757 <- (4) Packet H|3|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|EncryptedExtensions] 7.761 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 7.761 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 7.761 -> Packet H|1|L|52|1 AckFrame[3-2,0|Δ0] 7.877 <- (6) Packet H|5|L|523|1 CryptoFrame[124,469] >- CryptoStream[H|Finished] 7.880 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 8.080/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.880 -> Packet H|2|L|91|2 CryptoFrame[0,36] AckFrame[3-2,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.881 Starting downloading https://server4:443/jieofwnlzv at 25:02.356 on ClientConnection[345674441b0ad984/92debae296ebbd3b(V1) with server4/193.167.100.100:443] 7.878 <- (7) Packet H|6|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 7.881 -> Packet H|3|L|54|1 AckFrame[5,3-2,0|Δ0] 7.881 -> Packet H|4|L|54|1 AckFrame[6-5,3-2,0|Δ0] 7.881 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 8.081/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 7.881 -> Packet A|0|S0|0a3c6ec133bd18d0c7b8e1bc|51|1 StreamFrame[0(CIB),0,17,fin] 8.081 loss detection timeout handler running Sending probe 0, because no ack since 7.880. Current RTT: 100/25. 8.081 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 8.081 (Probe is a handshake retransmit) 8.081 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 8.481/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.081 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 8.113 <- (8) Packet A|0|S0|92debae296ebbd3b|30|1 HandshakeDoneFrame[] 8.113 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 8.331/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -7 millis, based on 8.106/App, because ackElicitingInFlight | RTT:100/25 8.114 Discarding pn space Handshake because HandshakeDone is received 8.114 loss detection timeout handler running Sending probe 0, because no ack since 7.881. Current RTT: 100/25. 8.114 (Probe is retransmit on level App) 8.113 <- (9) Packet A|1|S0|92debae296ebbd3b|40|1 NewTokenFrame[00c1a70064681ba57e] 8.113 <- (10) Packet A|5|S0|92debae296ebbd3b|61|1 NewConnectionIdFrame[1,<0|04402fd59609ed6ec16be9d2|d15907b6ec574d364cb1445350247cf1] reschedule loss detection timer for PTO over 449 millis, based on 8.564/App, because ackElicitingInFlight | RTT:100/25 8.114 -> Packet PA|1|S0|0a3c6ec133bd18d0c7b8e1bc|56|2 AckFrame[1-0|Δ0] StreamFrame[0(CIB),0,17,fin] 8.133 -> Packet A|2|S0|0a3c6ec133bd18d0c7b8e1bc|38|1 AckFrame[5,1-0|Δ19] 8.209 <- (11) Packet A|6|S0|92debae296ebbd3b|30|1 HandshakeDoneFrame[] 8.229 -> Packet A|3|S0|0a3c6ec133bd18d0c7b8e1bc|38|1 AckFrame[6-5,1-0|Δ19] 8.364 <- (12) Packet A|10|S0|92debae296ebbd3b|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 8.384 -> Packet A|4|S0|0a3c6ec133bd18d0c7b8e1bc|40|1 AckFrame[10,6-5,1-0|Δ19] 8.563 loss detection timeout handler running Sending probe 1, because no ack since 8.114. Current RTT: 100/25. 8.563 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 9.464/App, because ackElicitingInFlight | RTT:100/25 8.564 -> Packet PA|5|S0|0a3c6ec133bd18d0c7b8e1bc|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 9.465/App, because ackElicitingInFlight | RTT:100/25 8.565 -> Packet PA|6|S0|0a3c6ec133bd18d0c7b8e1bc|51|1 StreamFrame[0(CIB),0,17,fin] 8.569 <- (13) Packet A|12|S0|92debae296ebbd3b|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 8.589 -> Packet A|7|S0|0a3c6ec133bd18d0c7b8e1bc|42|1 AckFrame[12,10,6-5,1-0|Δ19] 8.596 <- (14) Packet A|14|S0|92debae296ebbd3b|1057|1 StreamFrame[0(CIB),0,1024,fin] 8.596 Finished downloading https://server4:443/jieofwnlzv at 25:03.072 on ClientConnection[345674441b0ad984/92debae296ebbd3b(V1) with server4/193.167.100.100:443] 8.597 Closing ClientConnection[345674441b0ad984/92debae296ebbd3b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 8.597 Creating connection with server4:443 with v1 8.597 -> Packet A|8|S0|0a3c6ec133bd18d0c7b8e1bc|47|2 ConnectionCloseFrame[0|0|] AckFrame[14,12,10,6-5,1-0|Δ0] 8.598 Setting up connection for downloading https://server4:443/nylclmqegt at 25:03.073 on ClientConnection[15f462bcbccecb08/f138fbba992421a2(V1) with server4/193.167.100.100:443] 8.598 Original destination connection id: 15f462bcbccecb08 (scid: f138fbba992421a2) >- CryptoStream[I|ClientHello] 8.599 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 8.799/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.599 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 8.620 <- (15) Packet A|15|S0|92debae296ebbd3b|37|1 AckFrame[5,3|Δ25] 8.621 -> Packet A|9|S0|0a3c6ec133bd18d0c7b8e1bc|47|2 ConnectionCloseFrame[0|0|] AckFrame[14,12,10,6-5,1-0|Δ0] 8.628 <- (16) Packet A|16|S0|92debae296ebbd3b|33|1 ConnectionCloseFrame[0|0|] 8.798 loss detection timeout handler running Sending probe 0, because no ack since 8.599. Current RTT: 100/25. 8.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 8.799 (Probe is an initial retransmit) 8.799 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 9.199/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 8.799 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.199 loss detection timeout handler running Sending probe 1, because no ack since 8.799. Current RTT: 100/25. 9.199 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.199 (Probe is an initial retransmit) 9.200 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.000/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.199 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.200 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 10.000/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.200 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.233 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 9.237 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.437/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.237 Discarding pn space Initial because first Handshake message is being sent 9.237 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.437/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.233 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 9.237 -> Packet I|4|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 9.238 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 9.234 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 9.238 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 9.234 <- (4) Packet H|3|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|EncryptedExtensions,Certificate] 9.239 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] 9.239 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.239 Discarding packet (55 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.239 -> Packet H|2|L|52|1 AckFrame[3,1-0|Δ0] 9.312 <- (7) Packet H|4|L|133|1 CryptoFrame[593,79] >- CryptoStream[H|Finished] 9.315 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.515/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.315 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[3,1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.312 <- (8) Packet H|5|L|89|1 CryptoFrame[672,36] 9.316 Starting downloading https://server4:443/nylclmqegt at 25:03.791 on ClientConnection[15f462bcbccecb08/f138fbba992421a2(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.316 -> Packet H|4|L|52|1 AckFrame[5-3,1-0|Δ0] 9.316 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.516/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.316 -> Packet A|0|S0|4515648c688ee15b60f7c3e1|51|1 StreamFrame[0(CIB),0,17,fin] 9.515 loss detection timeout handler running Sending probe 0, because no ack since 9.315. Current RTT: 100/25. 9.516 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.516 (Probe is a handshake retransmit) 9.516 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 9.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.516 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 9.548 <- (9) Packet A|0|S0|f138fbba992421a2|30|1 HandshakeDoneFrame[] 9.548 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 9.766/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -7 millis, based on 9.541/App, because ackElicitingInFlight | RTT:100/25 9.548 Discarding pn space Handshake because HandshakeDone is received 9.548 loss detection timeout handler running Sending probe 0, because no ack since 9.316. Current RTT: 100/25. 9.549 (Probe is retransmit on level App) 9.548 <- (10) Packet A|2|S0|f138fbba992421a2|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 449 millis, based on 9.999/App, because ackElicitingInFlight | RTT:100/25 9.548 <- (11) Packet A|3|S0|f138fbba992421a2|291|1 CryptoFrame[257,257] 9.549 -> Packet PA|1|S0|4515648c688ee15b60f7c3e1|51|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.549 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 9.549 -> Packet A|2|S0|4515648c688ee15b60f7c3e1|37|1 AckFrame[2,0|Δ0] 9.549 <- (13) Packet A|5|S0|f138fbba992421a2|1057|1 StreamFrame[0(CIB),0,1024,fin] 9.550 -> Packet A|3|S0|4515648c688ee15b60f7c3e1|39|1 AckFrame[5,3-2,0|Δ0] 9.550 Finished downloading https://server4:443/nylclmqegt at 25:04.026 on ClientConnection[15f462bcbccecb08/f138fbba992421a2(V1) with server4/193.167.100.100:443] 9.550 Closing ClientConnection[15f462bcbccecb08/f138fbba992421a2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.550 -> Packet A|4|S0|4515648c688ee15b60f7c3e1|43|2 ConnectionCloseFrame[0|0|] AckFrame[5,3-2,0|Δ0] 9.551 Creating connection with server4:443 with v1 9.551 Setting up connection for downloading https://server4:443/ftpujqtyzp at 25:04.027 on ClientConnection[69ac007f305f0749/12fb6728c81ea729(V1) with server4/193.167.100.100:443] 9.551 Original destination connection id: 69ac007f305f0749 (scid: 12fb6728c81ea729) >- CryptoStream[I|ClientHello] 9.553 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.753/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.553 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.581 <- (14) Packet A|13|S0|f138fbba992421a2|33|1 ConnectionCloseFrame[0|0|] 9.587 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 9.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.790/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.590 Discarding pn space Initial because first Handshake message is being sent 9.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.790/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.590 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 9.587 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 9.590 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 9.587 <- (3) Packet H|2|L|132|1 CryptoFrame[593,78] -< CryptoStream[H|EncryptedExtensions] 9.591 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 9.587 <- (4) Packet H|3|L|89|1 CryptoFrame[671,36] -< CryptoStream[H|EncryptedExtensions] 9.591 -> Packet H|1|L|52|1 AckFrame[2,0|Δ0] 9.591 -> Packet H|2|L|52|1 AckFrame[3-2,0|Δ0] 9.696 <- (5) Packet H|5|L|523|1 CryptoFrame[124,469] >- CryptoStream[H|Finished] 9.699 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.899/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.699 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[3-2,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.699 Starting downloading https://server4:443/ftpujqtyzp at 25:04.175 on ClientConnection[69ac007f305f0749/12fb6728c81ea729(V1) with server4/193.167.100.100:443] 9.696 <- (6) Packet H|6|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 9.700 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 9.900/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.700 -> [Packet H|4|L|54|1 AckFrame[6-5,3-2,0|Δ0], Packet A|0|S0|d0dfede3d111569230f46a54|51|1 StreamFrame[0(CIB),0,17,fin]] 9.730 <- (7) Packet A|1|S0|12fb6728c81ea729|40|1 NewTokenFrame[00c1a70064681ba580] 9.731 <- (8) Packet A|2|S0|12fb6728c81ea729|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 9.731 <- (9) Packet A|3|S0|12fb6728c81ea729|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 9.731 -> Packet A|1|S0|d0dfede3d111569230f46a54|35|1 AckFrame[2-1|Δ0] 9.731 <- (10) Packet H|7|L|54|1 AckFrame[3-0|Δ0] 9.732 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 9.732 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 9.731 <- (11) Packet A|4|S0|12fb6728c81ea729|61|1 NewConnectionIdFrame[1,<0|bb90f10787a580d773b9fb12|baf62c357b321f8f1ac49600e5a75336] 9.732 <- (12) Packet A|5|S0|12fb6728c81ea729|1057|1 StreamFrame[0(CIB),0,1024,fin] 9.732 -> Packet A|2|S0|d0dfede3d111569230f46a54|35|1 AckFrame[4-1|Δ0] 9.733 Finished downloading https://server4:443/ftpujqtyzp at 25:04.208 on ClientConnection[69ac007f305f0749/12fb6728c81ea729(V1) with server4/193.167.100.100:443] 9.733 Closing ClientConnection[69ac007f305f0749/12fb6728c81ea729(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 9.733 -> Packet A|3|S0|d0dfede3d111569230f46a54|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-1|Δ0] 9.734 Creating connection with server4:443 with v1 9.734 Setting up connection for downloading https://server4:443/pywushvdrk at 25:04.210 on ClientConnection[9e45e9e3f71c84c7/29ffaa7dead6e8ea(V1) with server4/193.167.100.100:443] 9.734 Original destination connection id: 9e45e9e3f71c84c7 (scid: 29ffaa7dead6e8ea) >- CryptoStream[I|ClientHello] 9.736 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 9.936/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.736 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.756 <- (13) Packet A|6|S0|12fb6728c81ea729|35|1 AckFrame[0|Δ25] 9.757 -> Packet A|4|S0|d0dfede3d111569230f46a54|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-1|Δ0] 9.763 <- (14) Packet A|7|S0|12fb6728c81ea729|30|1 HandshakeDoneFrame[] 9.764 -> Packet A|5|S0|d0dfede3d111569230f46a54|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-1|Δ0] 9.935 loss detection timeout handler running Sending probe 0, because no ack since 9.736. Current RTT: 100/25. 9.935 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 9.935 (Probe is an initial retransmit) 9.936 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.336/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 9.936 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 9.970 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 9.973 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.173/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.973 Discarding pn space Initial because first Handshake message is being sent 9.974 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 9.970 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] reschedule loss detection timer for PTO over 199 millis, based on 10.174/Handshake, because peerAwaitingAddressValidation | RTT:100/25 9.973 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 9.974 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 9.970 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 9.974 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 9.970 <- (4) Packet H|2|L|133|1 CryptoFrame[593,79] 9.974 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 9.976 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 9.976 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] 10.049 <- (6) Packet H|4|L|89|1 CryptoFrame[672,36] >- CryptoStream[H|Finished] 10.050 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.250/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.050 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.050 Starting downloading https://server4:443/pywushvdrk at 25:04.526 on ClientConnection[9e45e9e3f71c84c7/29ffaa7dead6e8ea(V1) with server4/193.167.100.100:443] 10.049 <- (7) Packet H|5|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.050 -> Packet H|4|L|52|1 AckFrame[4,2-0|Δ0] 10.051 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.251/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.051 -> [Packet H|5|L|52|1 AckFrame[5-4,2-0|Δ0], Packet A|0|S0|605ed0c8199e4a3785c77518|51|1 StreamFrame[0(CIB),0,17,fin]] 10.081 <- (8) Packet A|1|S0|29ffaa7dead6e8ea|40|1 NewTokenFrame[00c1a70064681ba580] 10.081 <- (9) Packet A|2|S0|29ffaa7dead6e8ea|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 10.082 <- (10) Packet A|3|S0|29ffaa7dead6e8ea|291|1 CryptoFrame[257,257] 10.082 -> Packet A|1|S0|605ed0c8199e4a3785c77518|35|1 AckFrame[2-1|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.082 <- (11) Packet H|6|L|54|1 AckFrame[3-0|Δ0] 10.082 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 10.082 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 10.082 <- (12) Packet A|4|S0|29ffaa7dead6e8ea|61|1 NewConnectionIdFrame[1,<0|67217585b3af5f6bfcd6583f|b3dde3c61fbf80ab950b916fb7b48bfb] 10.083 -> Packet A|2|S0|605ed0c8199e4a3785c77518|35|1 AckFrame[4-1|Δ0] 10.083 <- (13) Packet A|5|S0|29ffaa7dead6e8ea|1057|1 StreamFrame[0(CIB),0,1024,fin] 10.083 Finished downloading https://server4:443/pywushvdrk at 25:04.559 on ClientConnection[9e45e9e3f71c84c7/29ffaa7dead6e8ea(V1) with server4/193.167.100.100:443] 10.083 Closing ClientConnection[9e45e9e3f71c84c7/29ffaa7dead6e8ea(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.084 -> Packet A|3|S0|605ed0c8199e4a3785c77518|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-1|Δ0] 10.084 Creating connection with server4:443 with v1 10.085 Setting up connection for downloading https://server4:443/uefxpxmsyx at 25:04.561 on ClientConnection[27c087fa8e44d3bd/f8243056889af905(V1) with server4/193.167.100.100:443] 10.085 Original destination connection id: 27c087fa8e44d3bd (scid: f8243056889af905) >- CryptoStream[I|ClientHello] 10.086 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.286/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.086 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.107 <- (14) Packet A|6|S0|29ffaa7dead6e8ea|35|1 AckFrame[0|Δ25] 10.108 -> Packet A|4|S0|605ed0c8199e4a3785c77518|39|2 ConnectionCloseFrame[0|0|] AckFrame[5-1|Δ0] 10.115 <- (15) Packet A|8|S0|29ffaa7dead6e8ea|33|1 ConnectionCloseFrame[0|0|] 10.286 loss detection timeout handler running Sending probe 0, because no ack since 10.086. Current RTT: 100/25. 10.286 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.286 (Probe is an initial retransmit) 10.286 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 10.686/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.286 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.320 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 10.323 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.523/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.323 Discarding pn space Initial because first Handshake message is being sent 10.323 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.523/Handshake, because peerAwaitingAddressValidation | RTT:100/25 10.323 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 10.320 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 10.324 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 10.321 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] 10.324 -> Packet H|0|L|50|1 AckFrame[0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 10.321 <- (4) Packet H|2|L|133|1 CryptoFrame[593,79] 10.324 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 10.321 <- (5) Packet H|3|L|89|1 CryptoFrame[672,36] 10.327 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 10.328 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.528/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.327 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 10.328 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 10.328 Starting downloading https://server4:443/uefxpxmsyx at 25:04.804 on ClientConnection[27c087fa8e44d3bd/f8243056889af905(V1) with server4/193.167.100.100:443] 10.328 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 10.328 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 10.529/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.328 -> Packet A|0|S0|d814d0c1ebf4393d4548c227|51|1 StreamFrame[0(CIB),0,17,fin] 10.528 loss detection timeout handler running Sending probe 0, because no ack since 10.327. Current RTT: 100/25. 10.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 10.528 (Probe is a handshake retransmit) 10.528 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 10.928/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.528 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 10.560 <- (7) Packet A|0|S0|f8243056889af905|30|1 HandshakeDoneFrame[] 10.560 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 10.778/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 10.553/App, because ackElicitingInFlight | RTT:100/25 10.560 Discarding pn space Handshake because HandshakeDone is received 10.560 loss detection timeout handler running Sending probe 0, because no ack since 10.328. Current RTT: 100/25. 10.560 <- (8) Packet A|8|S0|f8243056889af905|40|1 NewTokenFrame[00c1a70064681ba581] 10.560 (Probe is retransmit on level App) 10.560 <- (9) Packet A|9|S0|f8243056889af905|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 10.561 <- (10) Packet A|10|S0|f8243056889af905|291|1 CryptoFrame[257,257] reschedule loss detection timer for PTO over 449 millis, based on 11.011/App, because ackElicitingInFlight | RTT:100/25 -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 10.561 -> Packet PA|1|S0|d814d0c1ebf4393d4548c227|58|2 AckFrame[9-8,0|Δ0] StreamFrame[0(CIB),0,17,fin] 10.561 <- (11) Packet A|11|S0|f8243056889af905|61|1 NewConnectionIdFrame[1,<0|c64d56a3b6993bf672435dc4|39375c9daa13439a9ae971250232a86f] 10.561 -> Packet A|2|S0|d814d0c1ebf4393d4548c227|37|1 AckFrame[11-8,0|Δ0] 10.561 <- (12) Packet A|12|S0|f8243056889af905|1057|1 StreamFrame[0(CIB),0,1024,fin] 10.561 <- (13) Packet A|13|S0|f8243056889af905|37|1 AckFrame[0|Δ201] 10.562 Finished downloading https://server4:443/uefxpxmsyx at 25:05.038 on ClientConnection[27c087fa8e44d3bd/f8243056889af905(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 223 millis, based on 10.786/App, because ackElicitingInFlight | RTT:100/25 10.562 Closing ClientConnection[27c087fa8e44d3bd/f8243056889af905(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 10.562 -> Packet A|3|S0|d814d0c1ebf4393d4548c227|41|2 ConnectionCloseFrame[0|0|] AckFrame[13-8,0|Δ0] 10.563 Creating connection with server4:443 with v1 10.563 Setting up connection for downloading https://server4:443/eudiiekncm at 25:05.039 on ClientConnection[dc948597a25da050/da08e2bb630d3f69(V1) with server4/193.167.100.100:443] 10.563 Original destination connection id: dc948597a25da050 (scid: da08e2bb630d3f69) >- CryptoStream[I|ClientHello] 10.564 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 10.764/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.564 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 10.593 <- (14) Packet A|14|S0|f8243056889af905|33|1 ConnectionCloseFrame[0|0|] 10.763 loss detection timeout handler running Sending probe 0, because no ack since 10.564. Current RTT: 100/25. 10.764 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 10.764 (Probe is an initial retransmit) 10.764 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 11.164/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 10.764 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.163 loss detection timeout handler running Sending probe 1, because no ack since 10.764. Current RTT: 100/25. 11.163 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 11.164 (Probe is an initial retransmit) 11.164 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.964/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.164 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.165 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 11.965/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.165 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.198 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 11.201 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.401/Handshake, because peerAwaitingAddressValidation | RTT:100/25 11.201 Discarding pn space Initial because first Handshake message is being sent 11.201 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.401/Handshake, because peerAwaitingAddressValidation | RTT:100/25 11.199 <- (2) Packet H|1|L|523|1 CryptoFrame[124,469] 11.201 -> Packet I|4|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) -< CryptoStream[H|] 11.201 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 11.202 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 11.329 <- (4) Packet H|5|L|177|1 CryptoFrame[0,124] 11.329 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate] 11.330 -> Packet H|1|L|52|1 AckFrame[5,1|Δ0] 11.400 loss detection timeout handler running 11.400 Sending probe 0. Current RTT: 100/25. 11.400 Sending probe because peer awaiting address validation 11.400 (Probe is a handshake ping) 11.401 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 11.801/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.401 -> Packet PH|2|L|48|2 PingFrame[] Padding(2) 11.441 <- (5) Packet H|9|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 11.443 -> Packet H|3|L|54|1 AckFrame[9,5,1|Δ0] 11.474 <- (6) Packet H|11|L|89|1 CryptoFrame[672,36] >- CryptoStream[H|Finished] 11.475 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 11.875/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.475 -> Packet H|4|L|94|2 CryptoFrame[0,36] AckFrame[9,5,1|Δ0] 11.475 Starting downloading https://server4:443/eudiiekncm at 25:05.951 on ClientConnection[dc948597a25da050/da08e2bb630d3f69(V1) with server4/193.167.100.100:443] 11.475 -> Packet H|5|L|56|1 AckFrame[11,9,5,1|Δ0] 11.476 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 11.876/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.476 -> Packet A|0|S0|f1c20bc2c375049b24e53b09|51|1 StreamFrame[0(CIB),0,17,fin] 11.506 <- (7) Packet A|0|S0|da08e2bb630d3f69|30|1 HandshakeDoneFrame[] 11.507 State is set to Confirmed reschedule loss detection timer for PTO over 368 millis, based on 11.875/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 11.701/App, because ackElicitingInFlight | RTT:100/25 11.507 Discarding pn space Handshake because HandshakeDone is received 11.507 <- (8) Packet A|5|S0|da08e2bb630d3f69|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 11.507 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 11.507 <- (10) Packet A|7|S0|da08e2bb630d3f69|61|1 NewConnectionIdFrame[1,<0|e60bb2dd844ad00e5f0c8b74|f41dacb75001ceb9936465bad330f6ab] 11.508 -> Packet A|1|S0|f1c20bc2c375049b24e53b09|37|1 AckFrame[5,0|Δ0] 11.508 <- (11) Packet A|8|S0|da08e2bb630d3f69|1057|1 StreamFrame[0(CIB),0,1024,fin] 11.508 -> Packet A|2|S0|f1c20bc2c375049b24e53b09|39|1 AckFrame[8-7,5,0|Δ0] 11.509 Finished downloading https://server4:443/eudiiekncm at 25:05.984 on ClientConnection[dc948597a25da050/da08e2bb630d3f69(V1) with server4/193.167.100.100:443] 11.509 Closing ClientConnection[dc948597a25da050/da08e2bb630d3f69(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.509 -> Packet A|3|S0|f1c20bc2c375049b24e53b09|43|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5,0|Δ0] 11.509 Creating connection with server4:443 with v1 11.510 Setting up connection for downloading https://server4:443/rjrvyyivxs at 25:05.986 on ClientConnection[2b93607ed770062b/bcd2bde8fc6c4370(V1) with server4/193.167.100.100:443] 11.510 Original destination connection id: 2b93607ed770062b (scid: bcd2bde8fc6c4370) >- CryptoStream[I|ClientHello] 11.512 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.712/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.512 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.540 <- (12) Packet A|10|S0|da08e2bb630d3f69|33|1 ConnectionCloseFrame[0|0|] 11.545 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 11.548 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.748/Handshake, because peerAwaitingAddressValidation | RTT:100/25 11.548 Discarding pn space Initial because first Handshake message is being sent 11.548 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.748/Handshake, because peerAwaitingAddressValidation | RTT:100/25 11.545 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 11.548 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 11.549 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 11.546 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 11.549 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 11.546 <- (4) Packet H|2|L|132|1 CryptoFrame[593,78] 11.549 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 11.552 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] 11.635 <- (5) Packet H|4|L|132|1 CryptoFrame[593,78] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 11.636 -> Packet H|3|L|52|1 AckFrame[4,2-0|Δ0] 11.715 <- (6) Packet H|6|L|89|1 CryptoFrame[671,36] >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 11.715 <- (7) Packet H|7|L|89|1 CryptoFrame[671,36] 11.716 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 11.716 Starting downloading https://server4:443/rjrvyyivxs at 25:06.192 on ClientConnection[2b93607ed770062b/bcd2bde8fc6c4370(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 199 millis, based on 11.916/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.716 -> Packet H|4|L|91|2 CryptoFrame[0,36] AckFrame[4,2-0|Δ0] 11.717 -> Packet H|5|L|54|1 AckFrame[7-6,4,2-0|Δ0] 11.717 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 11.917/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.717 -> Packet A|0|S0|b5bc519f480bfe4d72895f18|51|1 StreamFrame[0(CIB),0,17,fin] 11.747 <- (8) Packet A|0|S0|bcd2bde8fc6c4370|30|1 HandshakeDoneFrame[] 11.748 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 11.916/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 11.942/App, because ackElicitingInFlight | RTT:100/25 11.748 Discarding pn space Handshake because HandshakeDone is received 11.748 <- (9) Packet A|2|S0|bcd2bde8fc6c4370|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 11.748 <- (10) Packet A|3|S0|bcd2bde8fc6c4370|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 11.749 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 11.749 -> Packet A|1|S0|b5bc519f480bfe4d72895f18|37|1 AckFrame[2,0|Δ0] 11.749 <- (12) Packet A|8|S0|bcd2bde8fc6c4370|1057|1 StreamFrame[0(CIB),0,1024,fin] 11.750 -> Packet A|2|S0|b5bc519f480bfe4d72895f18|39|1 AckFrame[8,3-2,0|Δ0] 11.750 Finished downloading https://server4:443/rjrvyyivxs at 25:06.226 on ClientConnection[2b93607ed770062b/bcd2bde8fc6c4370(V1) with server4/193.167.100.100:443] 11.750 Closing ClientConnection[2b93607ed770062b/bcd2bde8fc6c4370(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 11.751 Creating connection with server4:443 with v1 11.750 -> Packet A|3|S0|b5bc519f480bfe4d72895f18|43|2 ConnectionCloseFrame[0|0|] AckFrame[8,3-2,0|Δ0] 11.751 Setting up connection for downloading https://server4:443/azyxixhtpq at 25:06.227 on ClientConnection[4aeffbf8bd524413/e8fff81b494e15cc(V1) with server4/193.167.100.100:443] 11.751 Original destination connection id: 4aeffbf8bd524413 (scid: e8fff81b494e15cc) >- CryptoStream[I|ClientHello] 11.753 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.953/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 11.753 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 11.774 <- (13) Packet A|9|S0|bcd2bde8fc6c4370|35|1 AckFrame[0|Δ25] 11.774 -> Packet A|4|S0|b5bc519f480bfe4d72895f18|43|2 ConnectionCloseFrame[0|0|] AckFrame[8,3-2,0|Δ0] 11.781 <- (14) Packet A|10|S0|bcd2bde8fc6c4370|33|1 ConnectionCloseFrame[0|0|] 11.786 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 11.787 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 11.787 <- (3) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ0] 11.787 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 11.987/Initial, because peerAwaitingAddressValidation | RTT:100/25 11.987 loss detection timeout handler running Sending probe 0, because no ack since 11.753. Current RTT: 34/17. 11.987 Sending probe because peer awaiting address validation 11.987 (Probe is Initial ping, because there is no Initial data to retransmit) 11.987 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 12.191/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 11.987 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 12.019 <- (4) Packet I|2|L|55|1 Token=[] AckFrame[1-0|Δ0] 12.020 probe count not reset on ack because handshake not yet confirmed 12.020 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 12.224/Initial, because peerAwaitingAddressValidation | RTT:34/17 12.223 loss detection timeout handler running Sending probe 1, because no ack since 11.987. Current RTT: 34/13. 12.223 Sending probe because peer awaiting address validation 12.223 (Probe is Initial ping, because there is no Initial data to retransmit) 12.224 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 343 millis, based on 12.568/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/13 12.223 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 12.256 <- (5) Packet I|3|L|55|1 Token=[] AckFrame[2-0|Δ0] 12.256 probe count not reset on ack because handshake not yet confirmed 12.256 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 343 millis, based on 12.600/Initial, because peerAwaitingAddressValidation | RTT:34/13 12.537 <- (6) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 12.541 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 73 millis, based on 12.615/Handshake, because peerAwaitingAddressValidation | RTT:34/10 12.541 Discarding pn space Initial because first Handshake message is being sent 12.541 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 73 millis, based on 12.615/Handshake, because peerAwaitingAddressValidation | RTT:34/10 12.541 -> Packet I|3|L|1201|2 Token=[] AckFrame[4-1|Δ0] Padding(1149) 12.573 <- (7) Packet H|4|L|177|1 CryptoFrame[0,124] 12.574 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 12.574 <- (8) Packet H|5|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 12.575 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 12.575 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 12.606 <- (9) Packet H|7|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|EncryptedExtensions,Certificate] 12.606 -> Packet H|2|L|52|1 AckFrame[7,5-4|Δ0] 12.614 loss detection timeout handler running 12.614 Sending probe 0. Current RTT: 34/10. 12.614 Sending probe because peer awaiting address validation 12.614 (Probe is a handshake ping) 12.614 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 147 millis, based on 12.763/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/10 12.614 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) 12.645 <- (10) Packet H|8|L|54|1 AckFrame[3-1|Δ0] 12.646 probe count not reset on ack because handshake not yet confirmed 12.646 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 12.647 <- (11) Packet H|9|L|133|1 CryptoFrame[593,79] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 139 millis, based on 12.789/Handshake, because ackElicitingInFlight | RTT:34/9 12.649 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[8|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.650 Starting downloading https://server4:443/azyxixhtpq at 25:07.125 on ClientConnection[4aeffbf8bd524413/e8fff81b494e15cc(V1) with server4/193.167.100.100:443] 12.650 -> Packet H|5|L|50|1 AckFrame[9-8|Δ0] 12.650 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 138 millis, based on 12.789/Handshake, because ackElicitingInFlight | RTT:34/9 12.650 -> Packet A|0|S0|5fe9f1338d53f56d060da531|51|1 StreamFrame[0(CIB),0,17,fin] 12.681 <- (12) Packet A|0|S0|e8fff81b494e15cc|30|1 HandshakeDoneFrame[] 12.681 State is set to Confirmed reschedule loss detection timer for PTO over 107 millis, based on 12.789/Handshake, because ackElicitingInFlight | RTT:34/9 reschedule loss detection timer for PTO over 63 millis, based on 12.745/App, because ackElicitingInFlight | RTT:34/9 12.681 Discarding pn space Handshake because HandshakeDone is received 12.681 <- (13) Packet A|3|S0|e8fff81b494e15cc|40|1 NewTokenFrame[00c1a70064681ba583] 12.681 <- (14) Packet A|5|S0|e8fff81b494e15cc|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 12.682 <- (15) Packet A|6|S0|e8fff81b494e15cc|61|1 NewConnectionIdFrame[1,<0|bcff18b54e4e02ffb2f07cdc|3bf4dc67e7ddc75f4dce133a49d7aef9] 12.682 -> Packet A|1|S0|5fe9f1338d53f56d060da531|37|1 AckFrame[3,0|Δ0] 12.682 -> Packet A|2|S0|5fe9f1338d53f56d060da531|39|1 AckFrame[6-5,3,0|Δ0] 12.682 <- (16) Packet A|7|S0|e8fff81b494e15cc|1057|1 StreamFrame[0(CIB),0,1024,fin] 12.683 Finished downloading https://server4:443/azyxixhtpq at 25:07.159 on ClientConnection[4aeffbf8bd524413/e8fff81b494e15cc(V1) with server4/193.167.100.100:443] 12.683 Closing ClientConnection[4aeffbf8bd524413/e8fff81b494e15cc(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.684 Creating connection with server4:443 with v1 12.683 -> Packet A|3|S0|5fe9f1338d53f56d060da531|43|2 ConnectionCloseFrame[0|0|] AckFrame[7-5,3,0|Δ0] 12.684 Setting up connection for downloading https://server4:443/qzvvdrmbkx at 25:07.160 on ClientConnection[1452c11af39a1af8/2f8bf34d665ac3f6(V1) with server4/193.167.100.100:443] 12.684 Original destination connection id: 1452c11af39a1af8 (scid: 2f8bf34d665ac3f6) >- CryptoStream[I|ClientHello] 12.685 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 12.885/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.685 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.719 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) 12.721 <- (17) Packet A|9|S0|e8fff81b494e15cc|290|1 CryptoFrame[0,257] 12.721 -> Packet A|4|S0|5fe9f1338d53f56d060da531|43|2 ConnectionCloseFrame[0|0|] AckFrame[7-5,3,0|Δ0] -< CryptoStream[I|ServerHello] 12.722 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.922/Handshake, because peerAwaitingAddressValidation | RTT:100/25 12.722 Discarding pn space Initial because first Handshake message is being sent 12.722 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.922/Handshake, because peerAwaitingAddressValidation | RTT:100/25 12.719 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 12.722 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 12.722 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 12.719 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 12.722 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 12.719 <- (4) Packet H|2|L|133|1 CryptoFrame[593,79] 12.722 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 12.724 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 12.724 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] 12.752 <- (18) Packet A|10|S0|e8fff81b494e15cc|33|1 ConnectionCloseFrame[0|0|] 12.795 <- (6) Packet H|4|L|89|1 CryptoFrame[672,36] >- CryptoStream[H|Finished] 12.796 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.996/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.796 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.796 Starting downloading https://server4:443/qzvvdrmbkx at 25:07.272 on ClientConnection[1452c11af39a1af8/2f8bf34d665ac3f6(V1) with server4/193.167.100.100:443] 12.796 -> Packet H|4|L|52|1 AckFrame[4,2-0|Δ0] 12.797 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 12.997/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.797 -> Packet A|0|S0|543552d6acff20406b579859|51|1 StreamFrame[0(CIB),0,17,fin] 12.827 <- (7) Packet A|0|S0|2f8bf34d665ac3f6|30|1 HandshakeDoneFrame[] 12.827 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 12.996/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 13.022/App, because ackElicitingInFlight | RTT:100/25 12.828 Discarding pn space Handshake because HandshakeDone is received 12.827 <- (8) Packet A|1|S0|2f8bf34d665ac3f6|40|1 NewTokenFrame[00c1a70064681ba583] 12.827 <- (9) Packet A|6|S0|2f8bf34d665ac3f6|290|1 CryptoFrame[0,257] 12.828 -> Packet A|1|S0|543552d6acff20406b579859|35|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 12.828 <- (10) Packet A|7|S0|2f8bf34d665ac3f6|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 12.829 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 12.828 <- (12) Packet A|8|S0|2f8bf34d665ac3f6|61|1 NewConnectionIdFrame[1,<0|535c0d27d4f406eba4645002|7d447b9e86b3d08df2f0fdb83cf1a41c] 12.829 -> Packet A|2|S0|543552d6acff20406b579859|37|1 AckFrame[7-6,1-0|Δ0] 12.848 -> Packet A|3|S0|543552d6acff20406b579859|38|1 AckFrame[8-6,1-0|Δ19] 12.918 <- (13) Packet A|11|S0|2f8bf34d665ac3f6|1057|1 StreamFrame[0(CIB),0,1024,fin] 12.919 Finished downloading https://server4:443/qzvvdrmbkx at 25:07.394 on ClientConnection[1452c11af39a1af8/2f8bf34d665ac3f6(V1) with server4/193.167.100.100:443] 12.919 Closing ClientConnection[1452c11af39a1af8/2f8bf34d665ac3f6(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.919 -> Packet A|4|S0|543552d6acff20406b579859|43|2 ConnectionCloseFrame[0|0|] AckFrame[11,8-6,1-0|Δ0] 12.919 Creating connection with server4:443 with v1 12.920 Setting up connection for downloading https://server4:443/ptgifleedd at 25:07.395 on ClientConnection[84bafe3bff6fad01/973954c17c191043(V1) with server4/193.167.100.100:443] 12.920 Original destination connection id: 84bafe3bff6fad01 (scid: 973954c17c191043) >- CryptoStream[I|ClientHello] 12.921 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.121/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.921 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 12.950 <- (14) Packet A|13|S0|2f8bf34d665ac3f6|33|1 ConnectionCloseFrame[0|0|] 12.955 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 12.958 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.158/Handshake, because peerAwaitingAddressValidation | RTT:100/25 12.958 Discarding pn space Initial because first Handshake message is being sent 12.958 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.158/Handshake, because peerAwaitingAddressValidation | RTT:100/25 12.955 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 12.958 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 12.958 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 12.956 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 12.958 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 12.956 <- (4) Packet H|2|L|133|1 CryptoFrame[593,79] 12.959 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 12.956 <- (5) Packet H|3|L|89|1 CryptoFrame[672,36] 12.960 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] 12.961 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.161/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.961 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 12.961 Starting downloading https://server4:443/ptgifleedd at 25:07.437 on ClientConnection[84bafe3bff6fad01/973954c17c191043(V1) with server4/193.167.100.100:443] 12.961 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 12.962 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 12.962 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.162/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.962 -> Packet A|0|S0|dc655d8ffe57c79c2c7452d3|51|1 StreamFrame[0(CIB),0,17,fin] 12.992 <- (7) Packet A|0|S0|973954c17c191043|30|1 HandshakeDoneFrame[] 12.992 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 13.161/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 13.187/App, because ackElicitingInFlight | RTT:100/25 12.992 Discarding pn space Handshake because HandshakeDone is received 12.992 <- (8) Packet A|3|S0|973954c17c191043|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 12.993 -> Packet A|1|S0|dc655d8ffe57c79c2c7452d3|37|1 AckFrame[3,0|Δ0] 12.994 <- (9) Packet A|5|S0|973954c17c191043|1057|1 StreamFrame[0(CIB),0,1024,fin] 12.994 Finished downloading https://server4:443/ptgifleedd at 25:07.470 on ClientConnection[84bafe3bff6fad01/973954c17c191043(V1) with server4/193.167.100.100:443] 12.994 Closing ClientConnection[84bafe3bff6fad01/973954c17c191043(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 12.994 -> Packet A|2|S0|dc655d8ffe57c79c2c7452d3|43|2 ConnectionCloseFrame[0|0|] AckFrame[5,3,0|Δ0] 12.995 Creating connection with server4:443 with v1 12.995 Setting up connection for downloading https://server4:443/pbdjdtizgf at 25:07.471 on ClientConnection[7e44d443aba08fd9/33269d3745c50e94(V1) with server4/193.167.100.100:443] 12.995 Original destination connection id: 7e44d443aba08fd9 (scid: 33269d3745c50e94) >- CryptoStream[I|ClientHello] 12.996 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.197/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 12.996 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.018 <- (10) Packet A|12|S0|973954c17c191043|35|1 AckFrame[0|Δ25] 13.018 -> Packet A|3|S0|dc655d8ffe57c79c2c7452d3|43|2 ConnectionCloseFrame[0|0|] AckFrame[5,3,0|Δ0] 13.030 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 13.032 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.232/Handshake, because peerAwaitingAddressValidation | RTT:100/25 13.033 Discarding pn space Initial because first Handshake message is being sent 13.031 <- (2) Packet H|3|L|89|1 CryptoFrame[671,36] 13.033 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.233/Handshake, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[H|] 13.033 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 13.033 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.033 -> Packet H|0|L|50|1 AckFrame[3|Δ0] 13.065 <- (4) Packet H|4|L|177|1 CryptoFrame[0,124] 13.066 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 13.066 -> Packet H|1|L|50|1 AckFrame[4-3|Δ0] 13.069 <- (5) Packet H|5|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 13.070 <- (6) Packet H|6|L|132|1 CryptoFrame[593,78] 13.070 -> Packet H|2|L|50|1 AckFrame[5-3|Δ0] >- CryptoStream[H|Finished] 13.073 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.273/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.073 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[5-3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.073 Starting downloading https://server4:443/pbdjdtizgf at 25:07.549 on ClientConnection[7e44d443aba08fd9/33269d3745c50e94(V1) with server4/193.167.100.100:443] 13.074 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.274/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.074 -> [Packet H|4|L|50|1 AckFrame[6-3|Δ0], Packet A|0|S0|46ddb00ec2ffcb657d9649c5|51|1 StreamFrame[0(CIB),0,17,fin]] 13.104 <- (7) Packet A|0|S0|33269d3745c50e94|30|1 HandshakeDoneFrame[] 13.104 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 13.273/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 13.299/App, because ackElicitingInFlight | RTT:100/25 13.104 Discarding pn space Handshake because HandshakeDone is received 13.104 <- (8) Packet A|7|S0|33269d3745c50e94|40|1 NewTokenFrame[00c1a70064681ba583] 13.104 <- (9) Packet A|8|S0|33269d3745c50e94|290|1 CryptoFrame[0,257] 13.105 -> Packet A|1|S0|46ddb00ec2ffcb657d9649c5|37|1 AckFrame[7,0|Δ0] -< CryptoStream[A|NewSessionTicket] 13.104 <- (10) Packet A|9|S0|33269d3745c50e94|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.105 Discarding packet (54 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 13.105 -> Packet A|2|S0|46ddb00ec2ffcb657d9649c5|37|1 AckFrame[9-7,0|Δ0] 13.193 <- (12) Packet A|11|S0|33269d3745c50e94|61|1 NewConnectionIdFrame[1,<0|75b989eb6d662b849151588b|0ba06da06d82842a2f3c3469481bab0c] 13.193 <- (13) Packet A|12|S0|33269d3745c50e94|61|1 NewConnectionIdFrame[1,<0|75b989eb6d662b849151588b|0ba06da06d82842a2f3c3469481bab0c] 13.194 -> Packet A|3|S0|46ddb00ec2ffcb657d9649c5|39|1 AckFrame[12-11,9-7,0|Δ0] 13.298 loss detection timeout handler running Sending probe 0, because no ack since 13.074. Current RTT: 100/25. 13.299 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 13.749/App, because ackElicitingInFlight | RTT:100/25 13.299 -> Packet PA|4|S0|46ddb00ec2ffcb657d9649c5|51|1 StreamFrame[0(CIB),0,17,fin] 13.331 <- (14) Packet A|13|S0|33269d3745c50e94|1057|1 StreamFrame[0(CIB),0,1024,fin] 13.331 Finished downloading https://server4:443/pbdjdtizgf at 25:07.807 on ClientConnection[7e44d443aba08fd9/33269d3745c50e94(V1) with server4/193.167.100.100:443] 13.331 Closing ClientConnection[7e44d443aba08fd9/33269d3745c50e94(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.332 -> Packet A|5|S0|46ddb00ec2ffcb657d9649c5|43|2 ConnectionCloseFrame[0|0|] AckFrame[13-11,9-7,0|Δ0] 13.332 Creating connection with server4:443 with v1 13.333 Setting up connection for downloading https://server4:443/qtdcngkdok at 25:07.808 on ClientConnection[a550230872c69de2/384a99e75ee8d7d5(V1) with server4/193.167.100.100:443] 13.333 Original destination connection id: a550230872c69de2 (scid: 384a99e75ee8d7d5) >- CryptoStream[I|ClientHello] 13.334 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 13.534/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.334 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.355 <- (15) Packet A|14|S0|33269d3745c50e94|37|1 AckFrame[4,2|Δ25] 13.355 -> Packet A|6|S0|46ddb00ec2ffcb657d9649c5|43|2 ConnectionCloseFrame[0|0|] AckFrame[13-11,9-7,0|Δ0] 13.363 <- (16) Packet A|15|S0|33269d3745c50e94|33|1 ConnectionCloseFrame[0|0|] 13.533 loss detection timeout handler running Sending probe 0, because no ack since 13.334. Current RTT: 100/25. 13.533 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 13.534 (Probe is an initial retransmit) 13.534 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 13.934/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.534 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.568 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 13.571 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.771/Handshake, because peerAwaitingAddressValidation | RTT:100/25 13.572 Discarding pn space Initial because first Handshake message is being sent 13.572 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.772/Handshake, because peerAwaitingAddressValidation | RTT:100/25 13.572 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 13.568 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 13.572 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 13.568 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 13.573 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 13.568 <- (4) Packet H|2|L|132|1 CryptoFrame[593,78] 13.573 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 13.575 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.575 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] 13.684 <- (6) Packet H|4|L|89|1 CryptoFrame[671,36] >- CryptoStream[H|Finished] 13.684 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.884/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.684 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.684 <- (7) Packet H|5|L|89|1 CryptoFrame[671,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 13.685 -> Packet H|4|L|52|1 AckFrame[4,2-0|Δ0] 13.685 -> Packet H|5|L|52|1 AckFrame[5-4,2-0|Δ0] 13.686 Starting downloading https://server4:443/qtdcngkdok at 25:08.161 on ClientConnection[a550230872c69de2/384a99e75ee8d7d5(V1) with server4/193.167.100.100:443] 13.686 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 13.886/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.686 -> Packet A|0|S0|a900e9131f3ea49f811a662b|51|1 StreamFrame[0(CIB),0,17,fin] 13.716 <- (8) Packet A|0|S0|384a99e75ee8d7d5|30|1 HandshakeDoneFrame[] 13.716 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 13.884/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 13.911/App, because ackElicitingInFlight | RTT:100/25 13.716 Discarding pn space Handshake because HandshakeDone is received 13.716 <- (9) Packet A|4|S0|384a99e75ee8d7d5|40|1 NewTokenFrame[00c1a70064681ba584] 13.717 <- (10) Packet A|6|S0|384a99e75ee8d7d5|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 13.717 -> Packet A|1|S0|a900e9131f3ea49f811a662b|37|1 AckFrame[4,0|Δ0] 13.717 <- (11) Packet A|7|S0|384a99e75ee8d7d5|61|1 NewConnectionIdFrame[1,<0|d2937d148281bf8550f941ae|89d1a9d9c42cbae554d91884a7dbd709] 13.717 -> Packet A|2|S0|a900e9131f3ea49f811a662b|39|1 AckFrame[7-6,4,0|Δ0] 13.759 <- (12) Packet A|8|S0|384a99e75ee8d7d5|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.779 -> Packet A|3|S0|a900e9131f3ea49f811a662b|40|1 AckFrame[8-6,4,0|Δ19] 13.877 <- (13) Packet A|10|S0|384a99e75ee8d7d5|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 13.897 -> Packet A|4|S0|a900e9131f3ea49f811a662b|42|1 AckFrame[10,8-6,4,0|Δ19] 13.910 loss detection timeout handler running Sending probe 0, because no ack since 13.686. Current RTT: 100/25. 13.910 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 14.361/App, because ackElicitingInFlight | RTT:100/25 13.911 -> Packet PA|5|S0|a900e9131f3ea49f811a662b|51|1 StreamFrame[0(CIB),0,17,fin] 13.942 <- (14) Packet A|11|S0|384a99e75ee8d7d5|1057|1 StreamFrame[0(CIB),0,1024,fin] 13.943 Finished downloading https://server4:443/qtdcngkdok at 25:08.419 on ClientConnection[a550230872c69de2/384a99e75ee8d7d5(V1) with server4/193.167.100.100:443] 13.943 Closing ClientConnection[a550230872c69de2/384a99e75ee8d7d5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 13.943 -> Packet A|6|S0|a900e9131f3ea49f811a662b|45|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,8-6,4,0|Δ0] 13.944 Creating connection with server4:443 with v1 13.944 Setting up connection for downloading https://server4:443/iafouthbwb at 25:08.420 on ClientConnection[6362820573d65c08/c8c6a3f960701624(V1) with server4/193.167.100.100:443] 13.944 Original destination connection id: 6362820573d65c08 (scid: c8c6a3f960701624) >- CryptoStream[I|ClientHello] 13.946 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.146/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 13.946 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 13.979 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 13.982 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 14.182/Handshake, because peerAwaitingAddressValidation | RTT:100/25 13.982 Discarding pn space Initial because first Handshake message is being sent 13.982 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 14.182/Handshake, because peerAwaitingAddressValidation | RTT:100/25 13.980 <- (2) Packet H|1|L|523|1 CryptoFrame[124,469] 13.982 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) -< CryptoStream[H|] 13.980 <- (3) Packet H|2|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|] 13.980 <- (4) Packet H|3|L|89|1 CryptoFrame[672,36] 13.982 -> Packet H|0|L|50|1 AckFrame[1|Δ0] -< CryptoStream[H|] 13.983 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 13.983 -> Packet H|1|L|50|1 AckFrame[2-1|Δ0] 13.983 -> Packet H|2|L|50|1 AckFrame[3-1|Δ0] 14.014 <- (6) Packet H|4|L|177|1 CryptoFrame[0,124] 14.015 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] 14.017 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 14.217/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.017 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[3-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 14.017 Starting downloading https://server4:443/iafouthbwb at 25:08.493 on ClientConnection[6362820573d65c08/c8c6a3f960701624(V1) with server4/193.167.100.100:443] 14.017 -> Packet H|4|L|50|1 AckFrame[4-1|Δ0] 14.018 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 14.218/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.018 -> Packet A|0|S0|22e8784072a91d87c94a1564|51|1 StreamFrame[0(CIB),0,17,fin] 14.048 <- (7) Packet A|0|S0|c8c6a3f960701624|30|1 HandshakeDoneFrame[] 14.048 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 14.217/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 14.243/App, because ackElicitingInFlight | RTT:100/25 14.049 Discarding pn space Handshake because HandshakeDone is received 14.049 <- (8) Packet A|2|S0|c8c6a3f960701624|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 14.049 <- (9) Packet A|3|S0|c8c6a3f960701624|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 14.049 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 14.049 -> Packet A|1|S0|22e8784072a91d87c94a1564|37|1 AckFrame[2,0|Δ0] 14.049 <- (11) Packet A|4|S0|c8c6a3f960701624|61|1 NewConnectionIdFrame[1,<0|07753a054fa9acb1637e51e9|d190745d9b6ab2ad1c91ba556d5a0f50] 14.050 -> Packet A|2|S0|22e8784072a91d87c94a1564|37|1 AckFrame[4-2,0|Δ0] 14.169 <- (12) Packet A|12|S0|c8c6a3f960701624|40|1 NewTokenFrame[00c1a70064681ba584] 14.188 -> Packet A|3|S0|22e8784072a91d87c94a1564|40|1 AckFrame[12,4-2,0|Δ19] 14.243 loss detection timeout handler running Sending probe 0, because no ack since 14.018. Current RTT: 100/25. 14.243 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 14.693/App, because ackElicitingInFlight | RTT:100/25 14.243 -> Packet PA|4|S0|22e8784072a91d87c94a1564|51|1 StreamFrame[0(CIB),0,17,fin] 14.692 loss detection timeout handler running Sending probe 1, because no ack since 14.243. Current RTT: 100/25. 14.692 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 15.593/App, because ackElicitingInFlight | RTT:100/25 14.693 -> Packet PA|5|S0|22e8784072a91d87c94a1564|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 15.594/App, because ackElicitingInFlight | RTT:100/25 14.694 -> Packet PA|6|S0|22e8784072a91d87c94a1564|51|1 StreamFrame[0(CIB),0,17,fin] 14.725 <- (13) Packet A|13|S0|c8c6a3f960701624|1057|1 StreamFrame[0(CIB),0,1024,fin] 14.725 <- (14) Packet A|14|S0|c8c6a3f960701624|36|1 AckFrame[6-5,3-1|Δ0] 14.725 Finished downloading https://server4:443/iafouthbwb at 25:09.201 on ClientConnection[6362820573d65c08/c8c6a3f960701624(V1) with server4/193.167.100.100:443] 14.725 Closing ClientConnection[6362820573d65c08/c8c6a3f960701624(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 14.726 -> Packet A|7|S0|22e8784072a91d87c94a1564|39|2 ConnectionCloseFrame[0|0|] AckFrame[13|Δ0] 14.726 Creating connection with server4:443 with v1 14.726 Cwnd(-): 6000; inflight: 0 14.726 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 14.726 Retransmitted lost stream frame StreamFrame[0(CIB),0,17,fin] 14.727 -> Packet A|8|S0|22e8784072a91d87c94a1564|56|2 StreamFrame[0(CIB),0,17,fin] AckFrame[13|Δ0] 14.727 Setting up connection for downloading https://server4:443/gaemoagmwe at 25:09.202 on ClientConnection[cdfa339695e5e74b/6279ba939ef0bbf9(V1) with server4/193.167.100.100:443] 14.727 Original destination connection id: cdfa339695e5e74b (scid: 6279ba939ef0bbf9) >- CryptoStream[I|ClientHello] 14.728 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 14.928/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.728 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 14.783 <- (15) Packet A|15|S0|c8c6a3f960701624|39|1 AckFrame[8,6-5,3-1|Δ25] 14.783 -> Packet A|9|S0|22e8784072a91d87c94a1564|39|2 ConnectionCloseFrame[0|0|] AckFrame[14-13|Δ0] 14.927 loss detection timeout handler running Sending probe 0, because no ack since 14.728. Current RTT: 100/25. 14.928 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 14.928 (Probe is an initial retransmit) 14.928 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 15.328/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 14.928 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.327 loss detection timeout handler running Sending probe 1, because no ack since 14.928. Current RTT: 100/25. 15.327 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.328 (Probe is an initial retransmit) 15.328 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.128/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.328 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.329 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 16.129/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.329 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.362 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 15.364 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.564/Handshake, because peerAwaitingAddressValidation | RTT:100/25 15.365 Discarding pn space Initial because first Handshake message is being sent 15.365 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.565/Handshake, because peerAwaitingAddressValidation | RTT:100/25 15.365 -> Packet I|4|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 15.362 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 15.365 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 15.362 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 15.365 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 15.362 <- (4) Packet H|2|L|132|1 CryptoFrame[593,78] 15.366 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 15.363 <- (5) Packet H|3|L|89|1 CryptoFrame[671,36] 15.367 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 15.368 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.568/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.368 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 15.368 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 15.368 Starting downloading https://server4:443/gaemoagmwe at 25:09.844 on ClientConnection[cdfa339695e5e74b/6279ba939ef0bbf9(V1) with server4/193.167.100.100:443] 15.368 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 15.369 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 15.569/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.368 -> Packet A|0|S0|19dca58264a446a8d553a900|51|1 StreamFrame[0(CIB),0,17,fin] 15.399 <- (7) Packet A|1|S0|6279ba939ef0bbf9|40|1 NewTokenFrame[00c1a70064681ba585] 15.399 <- (8) Packet A|2|S0|6279ba939ef0bbf9|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 15.400 <- (9) Packet H|4|L|54|1 AckFrame[3-0|Δ0] 15.400 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 15.400 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 15.400 <- (10) Packet A|4|S0|6279ba939ef0bbf9|61|1 NewConnectionIdFrame[1,<0|f007e6210cc872443066823a|b31bdd88bdce2cab1bd4812d6a99a668] 15.400 -> Packet A|1|S0|19dca58264a446a8d553a900|35|1 AckFrame[2-1|Δ0] 15.401 <- (11) Packet A|5|S0|6279ba939ef0bbf9|1057|1 StreamFrame[0(CIB),0,1024,fin] 15.401 Finished downloading https://server4:443/gaemoagmwe at 25:09.877 on ClientConnection[cdfa339695e5e74b/6279ba939ef0bbf9(V1) with server4/193.167.100.100:443] 15.401 Closing ClientConnection[cdfa339695e5e74b/6279ba939ef0bbf9(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 15.401 -> Packet A|2|S0|19dca58264a446a8d553a900|37|1 AckFrame[5-4,2-1|Δ0] 15.401 -> Packet A|3|S0|19dca58264a446a8d553a900|41|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2-1|Δ0] 15.402 Creating connection with server4:443 with v1 15.402 Setting up connection for downloading https://server4:443/wjrezcqmit at 25:09.878 on ClientConnection[8f924c54160577a9/d771c36b4a31181c(V1) with server4/193.167.100.100:443] 15.402 Original destination connection id: 8f924c54160577a9 (scid: d771c36b4a31181c) >- CryptoStream[I|ClientHello] 15.404 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.604/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 15.403 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 15.432 <- (12) Packet A|9|S0|6279ba939ef0bbf9|30|1 HandshakeDoneFrame[] 15.432 <- (13) Packet A|10|S0|6279ba939ef0bbf9|33|1 ConnectionCloseFrame[0|0|] 15.432 -> Packet A|4|S0|19dca58264a446a8d553a900|41|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2-1|Δ0] 15.438 Discarding packet (523 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 15.438 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 15.438 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 15.438 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 15.438 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 15.638/Initial, because peerAwaitingAddressValidation | RTT:100/25 15.638 loss detection timeout handler running Sending probe 0, because no ack since 15.403. Current RTT: 34/17. 15.638 Sending probe because peer awaiting address validation 15.638 (Probe is Initial ping, because there is no Initial data to retransmit) 15.638 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 15.842/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.638 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 15.841 loss detection timeout handler running Sending probe 1, because no ack since 15.638. Current RTT: 34/17. 15.841 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 15.841 (Probe is Initial ping, because there is no Initial data to retransmit) 15.842 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 16.250/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.841 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 15.843 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 16.251/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 15.843 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 16.189 <- (5) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 16.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.294/Handshake, because peerAwaitingAddressValidation | RTT:34/17 16.192 Discarding pn space Initial because first Handshake message is being sent 16.192 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.294/Handshake, because peerAwaitingAddressValidation | RTT:34/17 16.192 -> Packet I|4|L|1201|2 Token=[] AckFrame[4,1|Δ0] Padding(1147) 16.224 <- (6) Packet H|4|L|177|1 CryptoFrame[0,124] 16.224 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 16.224 <- (7) Packet H|5|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 16.225 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 16.225 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 16.256 <- (8) Packet H|6|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 16.256 <- (9) Packet H|7|L|89|1 CryptoFrame[672,36] 16.259 -> Packet H|2|L|50|1 AckFrame[6-4|Δ0] >- CryptoStream[H|Finished] 16.259 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.361/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.259 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[6-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.259 Starting downloading https://server4:443/wjrezcqmit at 25:10.735 on ClientConnection[8f924c54160577a9/d771c36b4a31181c(V1) with server4/193.167.100.100:443] 16.259 -> Packet H|4|L|50|1 AckFrame[7-4|Δ0] 16.260 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 101 millis, based on 16.362/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.260 -> Packet A|0|S0|61bbfbca3151b96b347468cb|51|1 StreamFrame[0(CIB),0,17,fin] 16.361 loss detection timeout handler running Sending probe 0, because no ack since 16.259. Current RTT: 34/17. 16.361 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.361 (Probe is a handshake retransmit) 16.362 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 203 millis, based on 16.566/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.361 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 16.565 loss detection timeout handler running Sending probe 1, because no ack since 16.260. Current RTT: 34/17. 16.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.565 (Probe is a handshake retransmit) 16.565 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 16.973/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.565 -> Packet PH|6|L|84|1 CryptoFrame[0,36] 16.566 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 407 millis, based on 16.974/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.566 -> Packet PH|7|L|84|1 CryptoFrame[0,36] 16.597 <- (10) Packet A|1|S0|d771c36b4a31181c|40|1 NewTokenFrame[00c1a70064681ba587] 16.597 <- (11) Packet A|2|S0|d771c36b4a31181c|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 16.598 <- (12) Packet A|5|S0|d771c36b4a31181c|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 16.598 -> Packet A|1|S0|61bbfbca3151b96b347468cb|35|1 AckFrame[2-1|Δ0] 16.599 <- (13) Packet A|7|S0|d771c36b4a31181c|1057|1 StreamFrame[0(CIB),0,1024,fin] 16.599 <- (14) Packet A|8|S0|d771c36b4a31181c|37|1 AckFrame[0|Δ307] 16.599 probe count not reset on ack because handshake not yet confirmed 16.599 -> Packet A|2|S0|61bbfbca3151b96b347468cb|39|1 AckFrame[7,5,2-1|Δ0] 16.599 Finished downloading https://server4:443/wjrezcqmit at 25:11.075 on ClientConnection[8f924c54160577a9/d771c36b4a31181c(V1) with server4/193.167.100.100:443] 16.599 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 16.599 Closing ClientConnection[8f924c54160577a9/d771c36b4a31181c(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) reschedule loss detection timer for PTO over 407 millis, based on 17.007/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 16.599 -> Packet A|3|S0|61bbfbca3151b96b347468cb|43|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5,2-1|Δ0] 16.600 Creating connection with server4:443 with v1 16.601 Setting up connection for downloading https://server4:443/sjlteuotwy at 25:11.076 on ClientConnection[e1fc1885528fa563/ed106ff4e51686c3(V1) with server4/193.167.100.100:443] 16.601 Original destination connection id: e1fc1885528fa563 (scid: ed106ff4e51686c3) >- CryptoStream[I|ClientHello] 16.602 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 16.802/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.602 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 16.636 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) 16.637 <- (15) Packet A|9|S0|d771c36b4a31181c|30|1 HandshakeDoneFrame[] 16.638 -> Packet A|4|S0|61bbfbca3151b96b347468cb|43|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,5,2-1|Δ0] -< CryptoStream[I|ServerHello] 16.639 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.840/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.640 Discarding pn space Initial because first Handshake message is being sent 16.640 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.840/Handshake, because peerAwaitingAddressValidation | RTT:100/25 16.636 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 16.640 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 16.640 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 16.637 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 16.640 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 16.637 <- (4) Packet H|2|L|133|1 CryptoFrame[593,79] 16.641 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 16.637 <- (5) Packet H|3|L|89|1 CryptoFrame[672,36] 16.642 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 16.643 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.843/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.643 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 16.643 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 16.643 Starting downloading https://server4:443/sjlteuotwy at 25:11.119 on ClientConnection[e1fc1885528fa563/ed106ff4e51686c3(V1) with server4/193.167.100.100:443] 16.643 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 16.644 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 16.844/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 16.644 -> Packet A|0|S0|fe3a175a36a4a0e44fa0aedf|51|1 StreamFrame[0(CIB),0,17,fin] 16.669 <- (16) Packet A|10|S0|d771c36b4a31181c|33|1 ConnectionCloseFrame[0|0|] 16.674 <- (7) Packet A|0|S0|ed106ff4e51686c3|30|1 HandshakeDoneFrame[] 16.674 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 16.843/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 16.869/App, because ackElicitingInFlight | RTT:100/25 16.675 Discarding pn space Handshake because HandshakeDone is received 16.674 <- (8) Packet A|1|S0|ed106ff4e51686c3|40|1 NewTokenFrame[00c1a70064681ba587] 16.675 <- (9) Packet A|2|S0|ed106ff4e51686c3|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 16.675 -> Packet A|1|S0|fe3a175a36a4a0e44fa0aedf|35|1 AckFrame[1-0|Δ0] 16.675 <- (10) Packet A|9|S0|ed106ff4e51686c3|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 16.676 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 16.676 -> Packet A|2|S0|fe3a175a36a4a0e44fa0aedf|37|1 AckFrame[9,2-0|Δ0] 16.765 <- (12) Packet A|12|S0|ed106ff4e51686c3|61|1 NewConnectionIdFrame[1,<0|4d365ee0fd22a7a07641712b|8560e915133a464166b84a54edbe112c] 16.785 -> Packet A|3|S0|fe3a175a36a4a0e44fa0aedf|40|1 AckFrame[12,9,2-0|Δ19] 16.868 loss detection timeout handler running Sending probe 0, because no ack since 16.644. Current RTT: 100/25. 16.868 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 17.318/App, because ackElicitingInFlight | RTT:100/25 16.868 -> Packet PA|4|S0|fe3a175a36a4a0e44fa0aedf|51|1 StreamFrame[0(CIB),0,17,fin] 17.317 loss detection timeout handler running Sending probe 1, because no ack since 16.868. Current RTT: 100/25. 17.318 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 899 millis, based on 18.218/App, because ackElicitingInFlight | RTT:100/25 17.318 -> Packet PA|5|S0|fe3a175a36a4a0e44fa0aedf|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 899 millis, based on 18.219/App, because ackElicitingInFlight | RTT:100/25 17.319 -> Packet PA|6|S0|fe3a175a36a4a0e44fa0aedf|51|1 StreamFrame[0(CIB),0,17,fin] 17.350 <- (13) Packet A|13|S0|ed106ff4e51686c3|1057|1 StreamFrame[0(CIB),0,1024,fin] 17.350 <- (14) Packet A|14|S0|ed106ff4e51686c3|36|1 AckFrame[6-5,3-2|Δ0] 17.351 Finished downloading https://server4:443/sjlteuotwy at 25:11.826 on ClientConnection[e1fc1885528fa563/ed106ff4e51686c3(V1) with server4/193.167.100.100:443] 17.351 Closing ClientConnection[e1fc1885528fa563/ed106ff4e51686c3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.351 Cwnd(-): 6000; inflight: 0 17.351 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.351 -> Packet A|7|S0|fe3a175a36a4a0e44fa0aedf|39|2 ConnectionCloseFrame[0|0|] AckFrame[14-13|Δ0] 17.351 Creating connection with server4:443 with v1 17.352 Setting up connection for downloading https://server4:443/rmhtblxega at 25:11.828 on ClientConnection[e70aa521fd11c16a/0146e556a359f06a(V1) with server4/193.167.100.100:443] 17.352 Original destination connection id: e70aa521fd11c16a (scid: 0146e556a359f06a) >- CryptoStream[I|ClientHello] 17.353 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.553/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.353 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.387 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 17.389 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.589/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.389 Discarding pn space Initial because first Handshake message is being sent 17.390 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.590/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.387 <- (2) Packet H|1|L|523|1 CryptoFrame[124,469] 17.389 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) -< CryptoStream[H|] 17.388 <- (3) Packet H|3|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|] 17.390 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 17.390 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 17.390 -> Packet H|1|L|52|1 AckFrame[3,1|Δ0] 17.422 <- (5) Packet H|4|L|177|1 CryptoFrame[0,124] 17.422 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate] 17.422 -> Packet H|2|L|52|1 AckFrame[4-3,1|Δ0] 17.426 <- (6) Packet H|5|L|133|1 CryptoFrame[593,79] >- CryptoStream[H|Finished] 17.428 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.628/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.428 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[4-3,1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 17.428 Starting downloading https://server4:443/rmhtblxega at 25:11.904 on ClientConnection[e70aa521fd11c16a/0146e556a359f06a(V1) with server4/193.167.100.100:443] 17.428 -> Packet H|4|L|52|1 AckFrame[5-3,1|Δ0] 17.429 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.629/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.429 -> Packet A|0|S0|b21b77cbfcd00f21ba46fd1c|51|1 StreamFrame[0(CIB),0,17,fin] 17.438 <- (15) Packet A|23|S0|ed106ff4e51686c3|1057|1 StreamFrame[0(CIB),0,1024,fin] 17.438 -> Packet A|8|S0|fe3a175a36a4a0e44fa0aedf|39|2 ConnectionCloseFrame[0|0|] AckFrame[14-13|Δ0] 17.459 <- (7) Packet A|0|S0|0146e556a359f06a|30|1 HandshakeDoneFrame[] 17.460 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 17.628/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 17.654/App, because ackElicitingInFlight | RTT:100/25 17.460 Discarding pn space Handshake because HandshakeDone is received 17.460 <- (8) Packet A|1|S0|0146e556a359f06a|40|1 NewTokenFrame[00c1a70064681ba587] 17.460 -> Packet A|1|S0|b21b77cbfcd00f21ba46fd1c|35|1 AckFrame[1-0|Δ0] 17.460 <- (9) Packet A|2|S0|0146e556a359f06a|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 17.460 <- (10) Packet A|3|S0|0146e556a359f06a|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 17.461 Discarding packet (55 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 17.461 -> Packet A|2|S0|b21b77cbfcd00f21ba46fd1c|35|1 AckFrame[3-0|Δ0] 17.460 <- (12) Packet A|4|S0|0146e556a359f06a|61|1 NewConnectionIdFrame[1,<0|1e511aadb53b0a3e3d9ce07a|08913a3252e834ee8b2c96b65a1ffcc6] 17.480 -> Packet A|3|S0|b21b77cbfcd00f21ba46fd1c|36|1 AckFrame[4-0|Δ19] 17.485 <- (13) Packet A|6|S0|0146e556a359f06a|35|1 AckFrame[0|Δ25] 17.486 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 17.550 <- (14) Packet A|7|S0|0146e556a359f06a|1057|1 StreamFrame[0(CIB),0,1024,fin] 17.551 Finished downloading https://server4:443/rmhtblxega at 25:12.026 on ClientConnection[e70aa521fd11c16a/0146e556a359f06a(V1) with server4/193.167.100.100:443] 17.551 Closing ClientConnection[e70aa521fd11c16a/0146e556a359f06a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 17.551 <- (15) Packet A|8|S0|0146e556a359f06a|1057|1 StreamFrame[0(CIB),0,1024,fin] 17.551 -> Packet A|4|S0|b21b77cbfcd00f21ba46fd1c|45|3 ConnectionCloseFrame[0|0|] AckFrame[7-6,4-0|Δ0] ConnectionCloseFrame[0|0|] 17.552 Creating connection with server4:443 with v1 17.552 Setting up connection for downloading https://server4:443/rtjuhuthgw at 25:12.028 on ClientConnection[9d5b598bdfe0f323/f0a86f495542b4bb(V1) with server4/193.167.100.100:443] 17.552 Original destination connection id: 9d5b598bdfe0f323 (scid: f0a86f495542b4bb) >- CryptoStream[I|ClientHello] 17.553 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 17.753/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.553 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 17.582 <- (16) Packet A|9|S0|0146e556a359f06a|33|1 ConnectionCloseFrame[0|0|] 17.587 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 17.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.790/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.590 Discarding pn space Initial because first Handshake message is being sent 17.590 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 17.790/Handshake, because peerAwaitingAddressValidation | RTT:100/25 17.587 <- (2) Packet H|1|L|523|1 CryptoFrame[124,469] 17.590 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) -< CryptoStream[H|] 17.588 <- (3) Packet H|2|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|] 17.590 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 17.590 -> Packet H|1|L|50|1 AckFrame[2-1|Δ0] 17.789 loss detection timeout handler running 17.789 Sending probe 0. Current RTT: 100/25. 17.789 Sending probe because peer awaiting address validation 17.789 (Probe is a handshake ping) 17.790 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 18.190/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 17.789 -> Packet PH|2|L|48|2 PingFrame[] Padding(2) 17.821 <- (4) Packet H|4|L|54|1 AckFrame[2|Δ0] 17.821 probe count not reset on ack because handshake not yet confirmed 17.821 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 18.338 <- (5) Packet H|5|L|177|1 CryptoFrame[0,124] 18.339 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 18.338 <- (6) Packet H|6|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 18.341 -> Packet H|3|L|52|1 AckFrame[5-4,2-1|Δ0] 18.341 -> Packet H|4|L|52|1 AckFrame[6-4,2-1|Δ0] 18.474 <- (7) Packet H|8|L|89|1 CryptoFrame[672,36] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 181 millis, based on 18.657/Handshake, because ackElicitingInFlight | RTT:31/15 18.475 -> Packet H|5|L|91|2 CryptoFrame[0,36] AckFrame[6-4,2-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.474 <- (8) Packet H|9|L|89|1 CryptoFrame[672,36] 18.476 Starting downloading https://server4:443/rtjuhuthgw at 25:12.951 on ClientConnection[9d5b598bdfe0f323/f0a86f495542b4bb(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 18.476 -> Packet H|6|L|54|1 AckFrame[8,6-4,2-1|Δ0] 18.476 -> Packet H|7|L|54|1 AckFrame[9-8,6-4,2-1|Δ0] 18.476 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 180 millis, based on 18.657/Handshake, because ackElicitingInFlight | RTT:31/15 18.476 -> Packet A|0|S0|981db0c5e37ceedfc5f7fc22|51|1 StreamFrame[0(CIB),0,17,fin] 18.506 <- (9) Packet A|0|S0|f0a86f495542b4bb|30|1 HandshakeDoneFrame[] 18.507 State is set to Confirmed reschedule loss detection timer for PTO over 150 millis, based on 18.657/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 85 millis, based on 18.592/App, because ackElicitingInFlight | RTT:31/15 18.507 Discarding pn space Handshake because HandshakeDone is received 18.507 <- (10) Packet A|2|S0|f0a86f495542b4bb|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 18.507 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 18.507 <- (12) Packet A|4|S0|f0a86f495542b4bb|61|1 NewConnectionIdFrame[1,<0|3f51bdb7eac212d95f07f203|d043677e2cefcf0c0de0dc4a87773585] 18.507 -> Packet A|1|S0|981db0c5e37ceedfc5f7fc22|37|1 AckFrame[2,0|Δ0] 18.527 -> Packet A|2|S0|981db0c5e37ceedfc5f7fc22|40|1 AckFrame[4,2,0|Δ19] 18.592 loss detection timeout handler running Sending probe 0, because no ack since 18.476. Current RTT: 31/15. 18.592 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 231 millis, based on 18.824/App, because ackElicitingInFlight | RTT:31/15 18.592 -> Packet PA|3|S0|981db0c5e37ceedfc5f7fc22|51|1 StreamFrame[0(CIB),0,17,fin] 18.608 <- (13) Packet A|5|S0|f0a86f495542b4bb|40|1 NewTokenFrame[00c1a70064681ba588] 18.608 <- (14) Packet A|6|S0|f0a86f495542b4bb|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 18.609 -> Packet A|4|S0|981db0c5e37ceedfc5f7fc22|39|1 AckFrame[6-4,2,0|Δ0] 18.737 <- (15) Packet A|8|S0|f0a86f495542b4bb|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 18.756 -> Packet A|5|S0|981db0c5e37ceedfc5f7fc22|42|1 AckFrame[8,6-4,2,0|Δ19] 18.824 loss detection timeout handler running Sending probe 1, because no ack since 18.592. Current RTT: 31/15. 18.824 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 463 millis, based on 19.288/App, because ackElicitingInFlight | RTT:31/15 18.824 -> Packet PA|6|S0|981db0c5e37ceedfc5f7fc22|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 463 millis, based on 19.289/App, because ackElicitingInFlight | RTT:31/15 18.825 -> Packet PA|7|S0|981db0c5e37ceedfc5f7fc22|51|1 StreamFrame[0(CIB),0,17,fin] 18.856 <- (16) Packet A|14|S0|f0a86f495542b4bb|1057|1 StreamFrame[0(CIB),0,1024,fin] 18.856 Finished downloading https://server4:443/rtjuhuthgw at 25:13.332 on ClientConnection[9d5b598bdfe0f323/f0a86f495542b4bb(V1) with server4/193.167.100.100:443] 18.856 Closing ClientConnection[9d5b598bdfe0f323/f0a86f495542b4bb(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 18.857 -> Packet A|8|S0|981db0c5e37ceedfc5f7fc22|47|2 ConnectionCloseFrame[0|0|] AckFrame[14,8,6-4,2,0|Δ0] 18.857 Creating connection with server4:443 with v1 18.858 Setting up connection for downloading https://server4:443/gvpcygprlu at 25:13.333 on ClientConnection[85fd2ee563116fe9/3266a1932de1dfd1(V1) with server4/193.167.100.100:443] 18.858 Original destination connection id: 85fd2ee563116fe9 (scid: 3266a1932de1dfd1) >- CryptoStream[I|ClientHello] 18.859 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.059/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 18.859 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 18.984 <- (17) Packet A|16|S0|f0a86f495542b4bb|1057|1 StreamFrame[0(CIB),0,1024,fin] 18.984 -> Packet A|9|S0|981db0c5e37ceedfc5f7fc22|47|2 ConnectionCloseFrame[0|0|] AckFrame[14,8,6-4,2,0|Δ0] 18.985 <- (18) Packet A|17|S0|f0a86f495542b4bb|1057|1 StreamFrame[0(CIB),0,1024,fin] 18.985 -> Packet A|10|S0|981db0c5e37ceedfc5f7fc22|47|2 ConnectionCloseFrame[0|0|] AckFrame[14,8,6-4,2,0|Δ0] 19.015 <- (19) Packet A|18|S0|f0a86f495542b4bb|33|1 ConnectionCloseFrame[0|0|] 19.058 loss detection timeout handler running Sending probe 0, because no ack since 18.859. Current RTT: 100/25. 19.058 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 19.058 (Probe is an initial retransmit) 19.059 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 19.459/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.058 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.092 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 19.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.295/Handshake, because peerAwaitingAddressValidation | RTT:100/25 19.095 Discarding pn space Initial because first Handshake message is being sent 19.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.295/Handshake, because peerAwaitingAddressValidation | RTT:100/25 19.095 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 19.092 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 19.095 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 19.093 <- (3) Packet H|3|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|EncryptedExtensions] 19.096 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.096 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 19.096 -> Packet H|1|L|52|1 AckFrame[3,0|Δ0] 19.132 <- (5) Packet H|4|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 19.132 -> Packet H|2|L|52|1 AckFrame[4-3,0|Δ0] 19.211 <- (6) Packet H|6|L|133|1 CryptoFrame[593,79] >- CryptoStream[H|Finished] 19.213 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.413/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.213 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[4-3,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.213 -> Packet H|4|L|54|1 AckFrame[6,4-3,0|Δ0] 19.213 Starting downloading https://server4:443/gvpcygprlu at 25:13.689 on ClientConnection[85fd2ee563116fe9/3266a1932de1dfd1(V1) with server4/193.167.100.100:443] 19.214 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.414/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.214 -> Packet A|0|S0|8535b7b6504fd0ee8b5bcb51|51|1 StreamFrame[0(CIB),0,17,fin] 19.368 <- (7) Packet H|9|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.369 -> Packet H|5|L|56|1 AckFrame[9,6,4-3,0|Δ0] 19.413 loss detection timeout handler running Sending probe 0, because no ack since 19.213. Current RTT: 100/25. 19.413 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.413 (Probe is a handshake retransmit) 19.413 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 19.813/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.413 -> Packet PH|6|L|84|1 CryptoFrame[0,36] 19.445 <- (8) Packet A|0|S0|3266a1932de1dfd1|30|1 HandshakeDoneFrame[] 19.445 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 19.664/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 19.439/App, because ackElicitingInFlight | RTT:100/25 19.445 Discarding pn space Handshake because HandshakeDone is received 19.445 loss detection timeout handler running 19.445 <- (9) Packet A|1|S0|3266a1932de1dfd1|40|1 NewTokenFrame[00c1a70064681ba589] Sending probe 0, because no ack since 19.214. Current RTT: 100/25. 19.445 (Probe is retransmit on level App) 19.445 -> Packet A|1|S0|8535b7b6504fd0ee8b5bcb51|35|1 AckFrame[1-0|Δ0] 19.445 <- (10) Packet A|2|S0|3266a1932de1dfd1|290|1 CryptoFrame[0,257] reschedule loss detection timer for PTO over 449 millis, based on 19.895/App, because ackElicitingInFlight | RTT:100/25 19.445 -> Packet PA|2|S0|8535b7b6504fd0ee8b5bcb51|51|1 StreamFrame[0(CIB),0,17,fin] -< CryptoStream[A|NewSessionTicket] 19.446 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 19.445 <- (12) Packet A|4|S0|3266a1932de1dfd1|61|1 NewConnectionIdFrame[1,<0|212b5be2c008f749f2f98046|b0b4d002fe828faf2d957039d248d01d] 19.446 -> Packet A|3|S0|8535b7b6504fd0ee8b5bcb51|37|1 AckFrame[4,2-0|Δ0] 19.478 <- (13) Packet A|5|S0|3266a1932de1dfd1|1057|1 StreamFrame[0(CIB),0,1024,fin] 19.478 Finished downloading https://server4:443/gvpcygprlu at 25:13.954 on ClientConnection[85fd2ee563116fe9/3266a1932de1dfd1(V1) with server4/193.167.100.100:443] 19.478 Closing ClientConnection[85fd2ee563116fe9/3266a1932de1dfd1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.479 -> Packet A|4|S0|8535b7b6504fd0ee8b5bcb51|41|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2-0|Δ0] 19.479 Creating connection with server4:443 with v1 19.479 Setting up connection for downloading https://server4:443/yuwbfsawaj at 25:13.955 on ClientConnection[6a3c3f2e299e0858/23506243f23e62e3(V1) with server4/193.167.100.100:443] 19.479 Original destination connection id: 6a3c3f2e299e0858 (scid: 23506243f23e62e3) >- CryptoStream[I|ClientHello] 19.480 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 19.680/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.480 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 19.502 <- (14) Packet A|7|S0|3266a1932de1dfd1|35|1 AckFrame[2-1|Δ25] 19.502 -> Packet A|5|S0|8535b7b6504fd0ee8b5bcb51|41|2 ConnectionCloseFrame[0|0|] AckFrame[5-4,2-0|Δ0] 19.509 <- (15) Packet A|8|S0|3266a1932de1dfd1|33|1 ConnectionCloseFrame[0|0|] 19.514 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 19.516 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.716/Handshake, because peerAwaitingAddressValidation | RTT:100/25 19.516 Discarding pn space Initial because first Handshake message is being sent 19.516 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 19.514 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] reschedule loss detection timer for PTO over 199 millis, based on 19.716/Handshake, because peerAwaitingAddressValidation | RTT:100/25 19.516 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 19.517 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 19.515 <- (3) Packet H|2|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions] 19.515 <- (4) Packet H|3|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|EncryptedExtensions] 19.517 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 19.517 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 19.517 -> Packet H|1|L|52|1 AckFrame[3-2,0|Δ0] 19.553 <- (6) Packet H|4|L|523|1 CryptoFrame[124,469] >- CryptoStream[H|Finished] 19.555 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.755/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.555 -> Packet H|2|L|91|2 CryptoFrame[0,36] AckFrame[3-2,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 19.555 Starting downloading https://server4:443/yuwbfsawaj at 25:14.031 on ClientConnection[6a3c3f2e299e0858/23506243f23e62e3(V1) with server4/193.167.100.100:443] 19.555 -> Packet H|3|L|52|1 AckFrame[4-2,0|Δ0] 19.556 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 19.756/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.556 -> Packet A|0|S0|fc9cb62eebaaf5bbbce38909|51|1 StreamFrame[0(CIB),0,17,fin] 19.587 <- (7) Packet A|0|S0|23506243f23e62e3|30|1 HandshakeDoneFrame[] 19.587 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 19.755/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 19.781/App, because ackElicitingInFlight | RTT:100/25 19.587 Discarding pn space Handshake because HandshakeDone is received 19.587 <- (8) Packet A|1|S0|23506243f23e62e3|40|1 NewTokenFrame[00c1a70064681ba58a] 19.587 -> Packet A|1|S0|fc9cb62eebaaf5bbbce38909|35|1 AckFrame[1-0|Δ0] 19.587 <- (9) Packet A|4|S0|23506243f23e62e3|61|1 NewConnectionIdFrame[1,<0|de651d64f8263bdddaeab780|353e79b485763d280f467f8216d918c0] 19.607 -> Packet A|2|S0|fc9cb62eebaaf5bbbce38909|38|1 AckFrame[4,1-0|Δ19] 19.700 <- (10) Packet A|9|S0|23506243f23e62e3|30|1 HandshakeDoneFrame[] 19.700 <- (11) Packet A|10|S0|23506243f23e62e3|40|1 NewTokenFrame[00c1a70064681ba58a] 19.701 -> Packet A|3|S0|fc9cb62eebaaf5bbbce38909|39|1 AckFrame[10-9,4,1-0|Δ0] 19.780 loss detection timeout handler running Sending probe 0, because no ack since 19.556. Current RTT: 100/25. 19.780 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 20.230/App, because ackElicitingInFlight | RTT:100/25 19.780 -> Packet PA|4|S0|fc9cb62eebaaf5bbbce38909|51|1 StreamFrame[0(CIB),0,17,fin] 19.836 <- (12) Packet A|11|S0|23506243f23e62e3|37|1 AckFrame[4,0|Δ25] 19.837 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 19.926 <- (13) Packet A|12|S0|23506243f23e62e3|30|1 HandshakeDoneFrame[] 19.945 -> Packet A|5|S0|fc9cb62eebaaf5bbbce38909|40|1 AckFrame[12-9,4,1-0|Δ19] 19.977 <- (14) Packet A|21|S0|23506243f23e62e3|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 19.978 <- (15) Packet A|22|S0|23506243f23e62e3|1057|1 StreamFrame[0(CIB),0,1024,fin] 19.978 -> Packet A|6|S0|fc9cb62eebaaf5bbbce38909|41|1 AckFrame[22-21,12-9,4,1-0|Δ0] 19.978 Finished downloading https://server4:443/yuwbfsawaj at 25:14.454 on ClientConnection[6a3c3f2e299e0858/23506243f23e62e3(V1) with server4/193.167.100.100:443] 19.978 Closing ClientConnection[6a3c3f2e299e0858/23506243f23e62e3(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 19.979 -> Packet A|7|S0|fc9cb62eebaaf5bbbce38909|45|2 ConnectionCloseFrame[0|0|] AckFrame[22-21,12-9,4,1-0|Δ0] 19.979 Creating connection with server4:443 with v1 19.980 Setting up connection for downloading https://server4:443/xupupuwaar at 25:14.455 on ClientConnection[ece00160528beb49/8dfffe4ce0543e90(V1) with server4/193.167.100.100:443] 19.980 Original destination connection id: ece00160528beb49 (scid: 8dfffe4ce0543e90) >- CryptoStream[I|ClientHello] 19.981 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.181/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 19.981 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.157 <- (16) Packet A|24|S0|23506243f23e62e3|290|1 CryptoFrame[0,257] 20.157 <- (17) Packet A|25|S0|23506243f23e62e3|290|1 CryptoFrame[0,257] 20.157 -> Packet A|8|S0|fc9cb62eebaaf5bbbce38909|45|2 ConnectionCloseFrame[0|0|] AckFrame[22-21,12-9,4,1-0|Δ0] 20.158 -> Packet A|9|S0|fc9cb62eebaaf5bbbce38909|45|2 ConnectionCloseFrame[0|0|] AckFrame[22-21,12-9,4,1-0|Δ0] 20.180 loss detection timeout handler running Sending probe 0, because no ack since 19.981. Current RTT: 100/25. 20.180 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.180 (Probe is an initial retransmit) 20.181 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 20.581/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.181 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.214 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 20.217 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.417/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.217 Discarding pn space Initial because first Handshake message is being sent 20.217 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.417/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.217 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 20.215 <- (2) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|] 20.215 <- (3) Packet H|2|L|132|1 CryptoFrame[593,78] -< CryptoStream[H|] 20.217 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 20.215 <- (4) Packet H|3|L|89|1 CryptoFrame[671,36] -< CryptoStream[H|] 20.218 -> Packet H|1|L|50|1 AckFrame[2-1|Δ0] 20.218 -> Packet H|2|L|50|1 AckFrame[3-1|Δ0] 20.249 <- (5) Packet H|4|L|177|1 CryptoFrame[0,124] 20.250 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] 20.252 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.452/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.252 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[3-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.252 Starting downloading https://server4:443/xupupuwaar at 25:14.728 on ClientConnection[ece00160528beb49/8dfffe4ce0543e90(V1) with server4/193.167.100.100:443] 20.252 -> Packet H|4|L|50|1 AckFrame[4-1|Δ0] 20.253 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.453/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.252 -> Packet A|0|S0|52aa789f8e4858b4a904990e|51|1 StreamFrame[0(CIB),0,17,fin] 20.452 loss detection timeout handler running Sending probe 0, because no ack since 20.252. Current RTT: 100/25. 20.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.452 (Probe is a handshake retransmit) 20.452 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 20.852/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.452 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 20.484 <- (6) Packet A|0|S0|8dfffe4ce0543e90|30|1 HandshakeDoneFrame[] 20.484 State is set to Confirmed reschedule loss detection timer for PTO over 218 millis, based on 20.702/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -6 millis, based on 20.477/App, because ackElicitingInFlight | RTT:100/25 20.484 Discarding pn space Handshake because HandshakeDone is received 20.484 loss detection timeout handler running 20.484 <- (7) Packet A|5|S0|8dfffe4ce0543e90|40|1 NewTokenFrame[00c1a70064681ba58a] Sending probe 0, because no ack since 20.252. Current RTT: 100/25. 20.485 (Probe is retransmit on level App) 20.484 <- (8) Packet A|7|S0|8dfffe4ce0543e90|291|1 CryptoFrame[257,257] -< CryptoStream[A|] reschedule loss detection timer for PTO over 449 millis, based on 20.935/App, because ackElicitingInFlight | RTT:100/25 20.484 <- (9) Packet A|8|S0|8dfffe4ce0543e90|61|1 NewConnectionIdFrame[1,<0|06fd75229cf36d2921bae1f4|2dd46547ef58ca6912e08bc13ca2f02a] 20.485 -> Packet PA|1|S0|52aa789f8e4858b4a904990e|58|2 AckFrame[5,0|Δ0] StreamFrame[0(CIB),0,17,fin] 20.485 -> Packet A|2|S0|52aa789f8e4858b4a904990e|39|1 AckFrame[8-7,5,0|Δ0] 20.485 <- (10) Packet A|9|S0|8dfffe4ce0543e90|1057|1 StreamFrame[0(CIB),0,1024,fin] 20.486 Finished downloading https://server4:443/xupupuwaar at 25:14.962 on ClientConnection[ece00160528beb49/8dfffe4ce0543e90(V1) with server4/193.167.100.100:443] 20.486 Closing ClientConnection[ece00160528beb49/8dfffe4ce0543e90(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.486 -> Packet A|3|S0|52aa789f8e4858b4a904990e|43|2 ConnectionCloseFrame[0|0|] AckFrame[9-7,5,0|Δ0] 20.487 Creating connection with server4:443 with v1 20.487 Setting up connection for downloading https://server4:443/rgqmcqmunu at 25:14.963 on ClientConnection[b425d86b74a0e5d7/def0cc6390d512b4(V1) with server4/193.167.100.100:443] 20.488 Original destination connection id: b425d86b74a0e5d7 (scid: def0cc6390d512b4) >- CryptoStream[I|ClientHello] 20.489 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 20.689/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.489 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.517 <- (11) Packet A|11|S0|8dfffe4ce0543e90|33|1 ConnectionCloseFrame[0|0|] 20.688 loss detection timeout handler running Sending probe 0, because no ack since 20.489. Current RTT: 100/25. 20.688 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 20.688 (Probe is an initial retransmit) 20.689 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.089/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.688 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.722 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 20.725 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.925/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.725 Discarding pn space Initial because first Handshake message is being sent 20.725 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.925/Handshake, because peerAwaitingAddressValidation | RTT:100/25 20.722 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 20.725 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 20.726 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 20.723 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] 20.726 -> Packet H|0|L|50|1 AckFrame[0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 20.723 <- (4) Packet H|2|L|134|1 CryptoFrame[593,80] 20.726 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 20.723 <- (5) Packet H|3|L|89|1 CryptoFrame[673,36] 20.728 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 20.728 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.928/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.728 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 20.729 Starting downloading https://server4:443/rgqmcqmunu at 25:15.205 on ClientConnection[b425d86b74a0e5d7/def0cc6390d512b4(V1) with server4/193.167.100.100:443] 20.729 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 20.929/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.729 -> [Packet H|4|L|50|1 AckFrame[3-0|Δ0], Packet A|0|S0|720eb0569ff86cb8aa36ce51|51|1 StreamFrame[0(CIB),0,17,fin]] 20.929 loss detection timeout handler running Sending probe 0, because no ack since 20.728. Current RTT: 100/25. 20.929 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 20.929 (Probe is a handshake retransmit) 20.929 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 21.329/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.929 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 20.961 <- (6) Packet A|1|S0|def0cc6390d512b4|40|1 NewTokenFrame[00c1a70064681ba58b] 20.961 <- (7) Packet A|2|S0|def0cc6390d512b4|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 20.961 <- (8) Packet A|3|S0|def0cc6390d512b4|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 20.962 -> Packet A|1|S0|720eb0569ff86cb8aa36ce51|35|1 AckFrame[2-1|Δ0] 20.961 <- (9) Packet H|4|L|57|1 AckFrame[5-4,2-0|Δ0] 20.962 probe count not reset on ack because handshake not yet confirmed 20.962 Retransmitting CryptoFrame[0,36] on level Handshake 20.962 Cwnd(-): 6000; inflight: 51 20.962 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 20.962 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 20.962 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 399 millis, based on 21.362/Handshake, because ackElicitingInFlight | RTT:32/16 20.962 -> Packet H|6|L|84|1 CryptoFrame[0,36] 20.961 <- (10) Packet A|4|S0|def0cc6390d512b4|61|1 NewConnectionIdFrame[1,<0|d1f6dd660b6f06604888c45f|b5929879e09816c4f9a455d46c0e046c] 20.962 -> Packet A|2|S0|720eb0569ff86cb8aa36ce51|35|1 AckFrame[4-1|Δ0] 20.962 <- (11) Packet A|5|S0|def0cc6390d512b4|1057|1 StreamFrame[0(CIB),0,1024,fin] 20.962 <- (12) Packet A|6|S0|def0cc6390d512b4|37|1 AckFrame[0|Δ201] reschedule loss detection timer for PTO over 95 millis, based on 21.058/Handshake, because ackElicitingInFlight | RTT:32/16 20.963 Finished downloading https://server4:443/rgqmcqmunu at 25:15.439 on ClientConnection[b425d86b74a0e5d7/def0cc6390d512b4(V1) with server4/193.167.100.100:443] 20.963 Closing ClientConnection[b425d86b74a0e5d7/def0cc6390d512b4(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 20.963 -> Packet A|3|S0|720eb0569ff86cb8aa36ce51|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-1|Δ0] 20.964 Creating connection with server4:443 with v1 20.964 Setting up connection for downloading https://server4:443/qxcocesesn at 25:15.440 on ClientConnection[ebec2150a8741cb3/af51b1e6ca6b9918(V1) with server4/193.167.100.100:443] 20.964 Original destination connection id: ebec2150a8741cb3 (scid: af51b1e6ca6b9918) >- CryptoStream[I|ClientHello] 20.966 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.166/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 20.965 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 20.993 <- (13) Packet H|5|L|56|1 AckFrame[6-4,2-0|Δ0] 20.993 -> Packet H|7|L|54|2 ConnectionCloseFrame[0|0|] AckFrame[4|Δ0] 20.993 <- (14) Packet A|8|S0|def0cc6390d512b4|30|1 HandshakeDoneFrame[] 20.994 -> Packet A|4|S0|720eb0569ff86cb8aa36ce51|39|2 ConnectionCloseFrame[0|0|] AckFrame[6-1|Δ0] 20.994 <- (15) Packet A|9|S0|def0cc6390d512b4|33|1 ConnectionCloseFrame[0|0|] 21.165 loss detection timeout handler running Sending probe 0, because no ack since 20.965. Current RTT: 100/25. 21.165 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 21.165 (Probe is an initial retransmit) 21.165 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 21.565/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.165 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.199 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 21.201 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.401/Handshake, because peerAwaitingAddressValidation | RTT:100/25 21.201 Discarding pn space Initial because first Handshake message is being sent 21.201 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.401/Handshake, because peerAwaitingAddressValidation | RTT:100/25 21.201 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 21.199 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 21.202 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 21.200 <- (3) Packet H|2|L|134|1 CryptoFrame[593,80] -< CryptoStream[H|EncryptedExtensions] 21.200 <- (4) Packet H|3|L|89|1 CryptoFrame[673,36] 21.202 -> Packet H|0|L|50|1 AckFrame[0|Δ0] -< CryptoStream[H|EncryptedExtensions] 21.202 -> Packet H|1|L|52|1 AckFrame[2,0|Δ0] 21.202 -> Packet H|2|L|52|1 AckFrame[3-2,0|Δ0] 21.288 <- (5) Packet H|4|L|523|1 CryptoFrame[124,469] >- CryptoStream[H|Finished] 21.290 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.490/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.290 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[3-2,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.288 <- (6) Packet H|5|L|134|1 CryptoFrame[593,80] 21.291 Starting downloading https://server4:443/qxcocesesn at 25:15.766 on ClientConnection[ebec2150a8741cb3/af51b1e6ca6b9918(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 21.291 -> Packet H|4|L|52|1 AckFrame[4-2,0|Δ0] 21.291 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 21.491/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.291 -> [Packet H|5|L|52|1 AckFrame[5-2,0|Δ0], Packet A|0|S0|2595942ea66a273902393631|51|1 StreamFrame[0(CIB),0,17,fin]] 21.322 <- (7) Packet A|0|S0|af51b1e6ca6b9918|30|1 HandshakeDoneFrame[] 21.322 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 21.490/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 21.516/App, because ackElicitingInFlight | RTT:100/25 21.322 Discarding pn space Handshake because HandshakeDone is received 21.322 <- (8) Packet A|1|S0|af51b1e6ca6b9918|40|1 NewTokenFrame[00c1a70064681ba58b] 21.322 <- (9) Packet A|2|S0|af51b1e6ca6b9918|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 21.323 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 21.323 -> Packet A|1|S0|2595942ea66a273902393631|35|1 AckFrame[1-0|Δ0] 21.342 -> Packet A|2|S0|2595942ea66a273902393631|36|1 AckFrame[2-0|Δ19] 21.348 <- (11) Packet A|11|S0|af51b1e6ca6b9918|35|1 AckFrame[0|Δ25] 21.348 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 21.495 <- (12) Packet A|12|S0|af51b1e6ca6b9918|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 21.515 -> Packet A|3|S0|2595942ea66a273902393631|38|1 AckFrame[12-11,2-0|Δ19] 21.698 <- (13) Packet A|16|S0|af51b1e6ca6b9918|1057|1 StreamFrame[0(CIB),0,1024,fin] 21.699 Finished downloading https://server4:443/qxcocesesn at 25:16.175 on ClientConnection[ebec2150a8741cb3/af51b1e6ca6b9918(V1) with server4/193.167.100.100:443] 21.699 Closing ClientConnection[ebec2150a8741cb3/af51b1e6ca6b9918(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 21.699 -> Packet A|4|S0|2595942ea66a273902393631|43|2 ConnectionCloseFrame[0|0|] AckFrame[16,12-11,2-0|Δ0] 21.701 Creating connection with server4:443 with v1 21.702 Setting up connection for downloading https://server4:443/zzsqzzwpgx at 25:16.177 on ClientConnection[ddfa760b0c9717d2/5714d1816b92d078(V1) with server4/193.167.100.100:443] 21.702 Original destination connection id: ddfa760b0c9717d2 (scid: 5714d1816b92d078) >- CryptoStream[I|ClientHello] 21.703 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.903/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 21.703 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 21.730 <- (14) Packet A|17|S0|af51b1e6ca6b9918|33|1 ConnectionCloseFrame[0|0|] 21.737 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 21.737 Discarding packet (523 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 21.737 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 21.737 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ0] 21.738 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 21.938/Initial, because peerAwaitingAddressValidation | RTT:100/25 21.937 loss detection timeout handler running Sending probe 0, because no ack since 21.703. Current RTT: 34/17. 21.937 Sending probe because peer awaiting address validation 21.937 (Probe is Initial ping, because there is no Initial data to retransmit) 21.937 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 22.141/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 21.937 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 22.140 loss detection timeout handler running Sending probe 1, because no ack since 21.937. Current RTT: 34/17. 22.140 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 22.140 (Probe is Initial ping, because there is no Initial data to retransmit) 22.141 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 22.549/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.141 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 22.142 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 22.550/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.142 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 22.172 <- (5) Packet I|2|L|57|1 Token=[] AckFrame[2,0|Δ0] 22.173 probe count not reset on ack because handshake not yet confirmed 22.173 Cwnd(-): 6000; inflight: 1201 22.173 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 22.581/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 22.488 <- (6) Packet I|5|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 22.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 22.581/Handshake, because peerAwaitingAddressValidation | RTT:34/14 22.491 Discarding pn space Initial because first Handshake message is being sent 22.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 22.581/Handshake, because peerAwaitingAddressValidation | RTT:34/14 22.491 -> Packet I|4|L|1201|2 Token=[] AckFrame[5,2-1|Δ0] Padding(1147) 22.580 loss detection timeout handler running 22.580 Sending probe 0. Current RTT: 34/14. 22.580 Sending probe because peer awaiting address validation 22.580 (Probe is a handshake ping) 22.580 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 179 millis, based on 22.760/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 22.580 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 22.611 <- (7) Packet H|6|L|54|1 AckFrame[0|Δ0] 22.612 probe count not reset on ack because handshake not yet confirmed 22.612 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 22.631 <- (8) Packet H|8|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|] 22.631 -> Packet H|1|L|52|1 AckFrame[8,6|Δ0] 23.278 <- (9) Packet H|12|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|] 23.278 -> Packet H|2|L|54|1 AckFrame[12,8,6|Δ0] 24.138 <- (10) Packet H|13|L|177|1 CryptoFrame[0,124] 24.138 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate] 24.139 -> Packet H|3|L|54|1 AckFrame[13-12,8,6|Δ0] 24.170 <- (11) Packet H|15|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 24.170 <- (12) Packet H|16|L|89|1 CryptoFrame[672,36] 24.172 -> Packet H|4|L|56|1 AckFrame[15,13-12,8,6|Δ0] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 163 millis, based on 24.336/Handshake, because ackElicitingInFlight | RTT:34/12 24.172 -> Packet H|5|L|96|2 CryptoFrame[0,36] AckFrame[15,13-12,8,6|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.173 Starting downloading https://server4:443/zzsqzzwpgx at 25:18.648 on ClientConnection[ddfa760b0c9717d2/5714d1816b92d078(V1) with server4/193.167.100.100:443] 24.173 -> Packet H|6|L|56|1 AckFrame[16-15,13-12,8,6|Δ0] 24.173 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 162 millis, based on 24.336/Handshake, because ackElicitingInFlight | RTT:34/12 24.173 -> Packet A|0|S0|78859b84a8f28428366305cc|51|1 StreamFrame[0(CIB),0,17,fin] 24.204 <- (13) Packet A|0|S0|5714d1816b92d078|30|1 HandshakeDoneFrame[] 24.204 State is set to Confirmed reschedule loss detection timer for PTO over 132 millis, based on 24.336/Handshake, because ackElicitingInFlight | RTT:34/12 reschedule loss detection timer for PTO over 75 millis, based on 24.280/App, because ackElicitingInFlight | RTT:34/12 24.204 Discarding pn space Handshake because HandshakeDone is received 24.204 <- (14) Packet A|4|S0|5714d1816b92d078|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 24.204 <- (15) Packet A|5|S0|5714d1816b92d078|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.205 -> Packet A|1|S0|78859b84a8f28428366305cc|37|1 AckFrame[4,0|Δ0] 24.204 <- (16) Packet A|6|S0|5714d1816b92d078|61|1 NewConnectionIdFrame[1,<0|5530cf4e0282d531fdb29614|e41014b235331883011997233d60ba26] 24.205 -> Packet A|2|S0|78859b84a8f28428366305cc|37|1 AckFrame[6-4,0|Δ0] 24.205 <- (17) Packet A|7|S0|5714d1816b92d078|1057|1 StreamFrame[0(CIB),0,1024,fin] 24.206 Finished downloading https://server4:443/zzsqzzwpgx at 25:18.681 on ClientConnection[ddfa760b0c9717d2/5714d1816b92d078(V1) with server4/193.167.100.100:443] 24.206 Closing ClientConnection[ddfa760b0c9717d2/5714d1816b92d078(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.206 Creating connection with server4:443 with v1 24.206 -> Packet A|3|S0|78859b84a8f28428366305cc|41|2 ConnectionCloseFrame[0|0|] AckFrame[7-4,0|Δ0] 24.207 Setting up connection for downloading https://server4:443/hcrcivffmv at 25:18.683 on ClientConnection[12ffa960ba95dc3d/477c755e7328877b(V1) with server4/193.167.100.100:443] 24.207 Original destination connection id: 12ffa960ba95dc3d (scid: 477c755e7328877b) >- CryptoStream[I|ClientHello] 24.208 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.408/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.208 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.230 <- (18) Packet A|8|S0|5714d1816b92d078|35|1 AckFrame[0|Δ25] 24.230 -> Packet A|4|S0|78859b84a8f28428366305cc|41|2 ConnectionCloseFrame[0|0|] AckFrame[7-4,0|Δ0] 24.236 <- (19) Packet A|9|S0|5714d1816b92d078|40|1 NewTokenFrame[00c1a70064681ba58e] 24.236 -> Packet A|5|S0|78859b84a8f28428366305cc|41|2 ConnectionCloseFrame[0|0|] AckFrame[7-4,0|Δ0] 24.267 <- (20) Packet A|10|S0|5714d1816b92d078|33|1 ConnectionCloseFrame[0|0|] 24.407 loss detection timeout handler running Sending probe 0, because no ack since 24.208. Current RTT: 100/25. 24.408 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 24.408 (Probe is an initial retransmit) 24.408 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 24.808/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.408 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.441 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 24.444 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.644/Handshake, because peerAwaitingAddressValidation | RTT:100/25 24.444 Discarding pn space Initial because first Handshake message is being sent 24.444 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.644/Handshake, because peerAwaitingAddressValidation | RTT:100/25 24.444 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 24.442 <- (2) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|] 24.442 <- (3) Packet H|3|L|89|1 CryptoFrame[673,36] -< CryptoStream[H|] 24.444 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 24.445 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.445 -> Packet H|1|L|52|1 AckFrame[3,1|Δ0] 24.477 <- (5) Packet H|4|L|177|1 CryptoFrame[0,124] 24.477 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate] 24.478 -> Packet H|2|L|52|1 AckFrame[4-3,1|Δ0] 24.481 <- (6) Packet H|5|L|134|1 CryptoFrame[593,80] >- CryptoStream[H|Finished] 24.483 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.683/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.483 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[4-3,1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.484 Starting downloading https://server4:443/hcrcivffmv at 25:18.959 on ClientConnection[12ffa960ba95dc3d/477c755e7328877b(V1) with server4/193.167.100.100:443] 24.484 -> Packet H|4|L|52|1 AckFrame[5-3,1|Δ0] 24.484 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.684/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.484 -> Packet A|0|S0|35974ba9d4e9c862d4fac140|51|1 StreamFrame[0(CIB),0,17,fin] 24.515 <- (7) Packet A|0|S0|477c755e7328877b|30|1 HandshakeDoneFrame[] 24.515 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 24.683/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 24.709/App, because ackElicitingInFlight | RTT:100/25 24.515 Discarding pn space Handshake because HandshakeDone is received 24.515 <- (8) Packet A|1|S0|477c755e7328877b|40|1 NewTokenFrame[00c1a70064681ba58e] 24.515 -> Packet A|1|S0|35974ba9d4e9c862d4fac140|35|1 AckFrame[1-0|Δ0] 24.515 <- (9) Packet A|3|S0|477c755e7328877b|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 24.516 <- (10) Packet A|4|S0|477c755e7328877b|61|1 NewConnectionIdFrame[1,<0|3eb5e88084f21858b0329182|3bebc5927784d6ccb08ea78e0e07ce87] 24.516 -> Packet A|2|S0|35974ba9d4e9c862d4fac140|37|1 AckFrame[4-3,1-0|Δ0] 24.606 <- (11) Packet A|11|S0|477c755e7328877b|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 24.625 -> Packet A|3|S0|35974ba9d4e9c862d4fac140|40|1 AckFrame[11,4-3,1-0|Δ19] 24.657 <- (12) Packet A|12|S0|477c755e7328877b|1057|1 StreamFrame[0(CIB),0,1024,fin] 24.658 Finished downloading https://server4:443/hcrcivffmv at 25:19.133 on ClientConnection[12ffa960ba95dc3d/477c755e7328877b(V1) with server4/193.167.100.100:443] 24.658 Closing ClientConnection[12ffa960ba95dc3d/477c755e7328877b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 24.658 -> Packet A|4|S0|35974ba9d4e9c862d4fac140|43|2 ConnectionCloseFrame[0|0|] AckFrame[12-11,4-3,1-0|Δ0] 24.658 Creating connection with server4:443 with v1 24.659 Setting up connection for downloading https://server4:443/hjdvcfonnl at 25:19.134 on ClientConnection[f2f7b5c7a2104452/3c5079a80b9b2029(V1) with server4/193.167.100.100:443] 24.659 Original destination connection id: f2f7b5c7a2104452 (scid: 3c5079a80b9b2029) >- CryptoStream[I|ClientHello] 24.660 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 24.860/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.660 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 24.689 <- (13) Packet A|13|S0|477c755e7328877b|33|1 ConnectionCloseFrame[0|0|] 24.694 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 24.696 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.896/Handshake, because peerAwaitingAddressValidation | RTT:100/25 24.696 Discarding pn space Initial because first Handshake message is being sent 24.696 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 24.896/Handshake, because peerAwaitingAddressValidation | RTT:100/25 24.694 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 24.696 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 24.697 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 24.694 <- (3) Packet H|2|L|134|1 CryptoFrame[593,80] -< CryptoStream[H|EncryptedExtensions] 24.697 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 24.697 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 24.697 -> Packet H|1|L|52|1 AckFrame[2,0|Δ0] 24.734 <- (5) Packet H|4|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 24.737 -> Packet H|2|L|54|1 AckFrame[4,2,0|Δ0] 24.836 <- (6) Packet H|6|L|89|1 CryptoFrame[673,36] >- CryptoStream[H|Finished] 24.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.037/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.837 -> Packet H|3|L|94|2 CryptoFrame[0,36] AckFrame[4,2,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.836 <- (7) Packet H|7|L|89|1 CryptoFrame[673,36] 24.837 Starting downloading https://server4:443/hjdvcfonnl at 25:19.313 on ClientConnection[f2f7b5c7a2104452/3c5079a80b9b2029(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 24.837 -> Packet H|4|L|56|1 AckFrame[6,4,2,0|Δ0] 24.837 -> Packet H|5|L|56|1 AckFrame[7-6,4,2,0|Δ0] 24.837 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.037/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 24.837 -> Packet A|0|S0|7bdd8f73b2d5dc7af4cafbde|51|1 StreamFrame[0(CIB),0,17,fin] 24.868 <- (8) Packet A|2|S0|3c5079a80b9b2029|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 24.869 <- (9) Packet A|3|S0|3c5079a80b9b2029|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 24.869 <- (10) Packet H|8|L|55|1 AckFrame[3-0|Δ0] 24.869 -> Packet A|1|S0|7bdd8f73b2d5dc7af4cafbde|35|1 AckFrame[3-2|Δ0] 24.869 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 24.869 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 24.869 <- (11) Packet A|4|S0|3c5079a80b9b2029|61|1 NewConnectionIdFrame[1,<0|fac885195e40b870b1ffb8ec|42479897d73ec4aeb5df134e5f83582c] 24.889 -> Packet A|2|S0|7bdd8f73b2d5dc7af4cafbde|36|1 AckFrame[4-2|Δ19] 24.894 <- (12) Packet A|9|S0|3c5079a80b9b2029|35|1 AckFrame[0|Δ25] 24.895 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.920 <- (13) Packet A|10|S0|3c5079a80b9b2029|30|1 HandshakeDoneFrame[] 24.920 State is set to Confirmed 24.920 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.920 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 24.920 Discarding pn space Handshake because HandshakeDone is received 24.920 <- (14) Packet A|11|S0|3c5079a80b9b2029|40|1 NewTokenFrame[00c1a70064681ba58f] 24.920 -> Packet A|3|S0|7bdd8f73b2d5dc7af4cafbde|37|1 AckFrame[11-9,4-2|Δ0] 25.023 <- (15) Packet A|12|S0|3c5079a80b9b2029|30|1 HandshakeDoneFrame[] 25.023 <- (16) Packet A|13|S0|3c5079a80b9b2029|40|1 NewTokenFrame[00c1a70064681ba58f] 25.023 -> Packet A|4|S0|7bdd8f73b2d5dc7af4cafbde|37|1 AckFrame[13-9,4-2|Δ0] 25.055 <- (17) Packet A|14|S0|3c5079a80b9b2029|1057|1 StreamFrame[0(CIB),0,1024,fin] 25.055 Finished downloading https://server4:443/hjdvcfonnl at 25:19.531 on ClientConnection[f2f7b5c7a2104452/3c5079a80b9b2029(V1) with server4/193.167.100.100:443] 25.055 Closing ClientConnection[f2f7b5c7a2104452/3c5079a80b9b2029(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.056 -> Packet A|5|S0|7bdd8f73b2d5dc7af4cafbde|41|2 ConnectionCloseFrame[0|0|] AckFrame[14-9,4-2|Δ0] 25.056 Creating connection with server4:443 with v1 25.057 Setting up connection for downloading https://server4:443/xpotymtptz at 25:19.532 on ClientConnection[7c5dbfee951faa7c/f7327350e6e43430(V1) with server4/193.167.100.100:443] 25.057 Original destination connection id: 7c5dbfee951faa7c (scid: f7327350e6e43430) >- CryptoStream[I|ClientHello] 25.058 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.258/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.058 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.086 <- (18) Packet A|15|S0|3c5079a80b9b2029|33|1 ConnectionCloseFrame[0|0|] 25.257 loss detection timeout handler running Sending probe 0, because no ack since 25.058. Current RTT: 100/25. 25.257 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 25.257 (Probe is an initial retransmit) 25.257 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 25.658/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.257 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.291 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 25.294 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.494/Handshake, because peerAwaitingAddressValidation | RTT:100/25 25.294 Discarding pn space Initial because first Handshake message is being sent 25.294 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.494/Handshake, because peerAwaitingAddressValidation | RTT:100/25 25.292 <- (2) Packet H|3|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|] 25.294 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 25.294 -> Packet H|0|L|50|1 AckFrame[3|Δ0] 25.326 <- (3) Packet H|4|L|177|1 CryptoFrame[0,124] 25.326 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 25.326 -> Packet H|1|L|50|1 AckFrame[4-3|Δ0] 25.331 <- (4) Packet H|6|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions] 25.331 -> Packet H|2|L|52|1 AckFrame[6,4-3|Δ0] 25.371 <- (5) Packet H|7|L|523|1 CryptoFrame[124,469] >- CryptoStream[H|Finished] 25.373 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.573/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.373 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[6,4-3|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.373 Starting downloading https://server4:443/xpotymtptz at 25:19.849 on ClientConnection[7c5dbfee951faa7c/f7327350e6e43430(V1) with server4/193.167.100.100:443] 25.373 -> Packet H|4|L|52|1 AckFrame[7-6,4-3|Δ0] 25.374 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.574/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.374 -> Packet A|0|S0|29082a0dd3d9a47c82473217|51|1 StreamFrame[0(CIB),0,17,fin] 25.573 loss detection timeout handler running Sending probe 0, because no ack since 25.373. Current RTT: 100/25. 25.573 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.573 (Probe is a handshake retransmit) 25.573 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 25.973/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.573 -> Packet PH|5|L|84|1 CryptoFrame[0,36] 25.605 <- (6) Packet A|1|S0|f7327350e6e43430|40|1 NewTokenFrame[00c1a70064681ba590] 25.605 <- (7) Packet A|2|S0|f7327350e6e43430|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 25.605 <- (8) Packet A|3|S0|f7327350e6e43430|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 25.605 -> Packet A|1|S0|29082a0dd3d9a47c82473217|35|1 AckFrame[2-1|Δ0] 25.605 <- (9) Packet H|8|L|59|1 AckFrame[5-4,2,0|Δ0] 25.605 probe count not reset on ack because handshake not yet confirmed 25.606 Retransmitting CryptoFrame[0,36] on level Handshake 25.606 Cwnd(-): 6000; inflight: 51 25.606 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 25.606 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 399 millis, based on 26.006/Handshake, because ackElicitingInFlight | RTT:100/25 25.606 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 25.606 -> Packet H|6|L|84|1 CryptoFrame[0,36] 25.605 <- (10) Packet A|4|S0|f7327350e6e43430|61|1 NewConnectionIdFrame[1,<0|8e1b1d41432b126e08fa8ae8|e4567dae46b8110a9ee94144717e1a46] 25.606 <- (11) Packet A|5|S0|f7327350e6e43430|1057|1 StreamFrame[0(CIB),0,1024,fin] 25.606 -> Packet A|2|S0|29082a0dd3d9a47c82473217|35|1 AckFrame[4-1|Δ0] 25.606 <- (12) Packet A|12|S0|f7327350e6e43430|37|1 AckFrame[0|Δ201] 25.606 Finished downloading https://server4:443/xpotymtptz at 25:20.082 on ClientConnection[7c5dbfee951faa7c/f7327350e6e43430(V1) with server4/193.167.100.100:443] reschedule loss detection timer for PTO over 95 millis, based on 25.702/Handshake, because ackElicitingInFlight | RTT:32/16 25.606 Closing ClientConnection[7c5dbfee951faa7c/f7327350e6e43430(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 25.607 -> Packet A|3|S0|29082a0dd3d9a47c82473217|41|2 ConnectionCloseFrame[0|0|] AckFrame[12,5-1|Δ0] 25.607 Creating connection with server4:443 with v1 25.607 Setting up connection for downloading https://server4:443/okhlqqiagy at 25:20.083 on ClientConnection[e3dbe8275a507033/28c75512b4a1bfba(V1) with server4/193.167.100.100:443] 25.607 Original destination connection id: e3dbe8275a507033 (scid: 28c75512b4a1bfba) >- CryptoStream[I|ClientHello] 25.609 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 25.809/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.608 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 25.642 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) 25.643 <- (13) Packet A|13|S0|f7327350e6e43430|30|1 HandshakeDoneFrame[] 25.643 -> Packet A|4|S0|29082a0dd3d9a47c82473217|41|2 ConnectionCloseFrame[0|0|] AckFrame[12,5-1|Δ0] -< CryptoStream[I|ServerHello] 25.645 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.845/Handshake, because peerAwaitingAddressValidation | RTT:100/25 25.645 Discarding pn space Initial because first Handshake message is being sent 25.645 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 25.643 <- (2) Packet H|1|L|523|1 CryptoFrame[124,469] reschedule loss detection timer for PTO over 199 millis, based on 25.845/Handshake, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[H|] 25.645 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 25.643 <- (3) Packet H|3|L|89|1 CryptoFrame[671,36] -< CryptoStream[H|] 25.645 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 25.645 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 25.645 -> Packet H|1|L|52|1 AckFrame[3,1|Δ0] 25.677 <- (5) Packet H|4|L|177|1 CryptoFrame[0,124] 25.677 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate] 25.678 -> Packet H|2|L|52|1 AckFrame[4-3,1|Δ0] 25.681 <- (6) Packet H|5|L|132|1 CryptoFrame[593,78] >- CryptoStream[H|Finished] 25.683 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.883/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.683 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[4-3,1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 25.683 Starting downloading https://server4:443/okhlqqiagy at 25:20.159 on ClientConnection[e3dbe8275a507033/28c75512b4a1bfba(V1) with server4/193.167.100.100:443] 25.683 -> Packet H|4|L|52|1 AckFrame[5-3,1|Δ0] 25.684 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 25.884/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 25.684 -> Packet A|0|S0|8e588faa586a4ae35fe9e18f|51|1 StreamFrame[0(CIB),0,17,fin] 25.715 <- (7) Packet A|1|S0|28c75512b4a1bfba|40|1 NewTokenFrame[00c1a70064681ba590] 25.715 <- (8) Packet A|2|S0|28c75512b4a1bfba|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 25.715 -> Packet A|1|S0|8e588faa586a4ae35fe9e18f|35|1 AckFrame[2-1|Δ0] 25.715 <- (9) Packet H|6|L|57|1 AckFrame[3,1|Δ0] 25.716 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 25.716 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 25.754 <- (10) Packet A|5|S0|28c75512b4a1bfba|30|1 HandshakeDoneFrame[] 25.755 State is set to Confirmed reschedule loss detection timer for PTO over 49 millis, based on 25.805/App, because ackElicitingInFlight | RTT:32/16 reschedule loss detection timer for PTO over 49 millis, based on 25.805/App, because ackElicitingInFlight | RTT:32/16 25.755 Discarding pn space Handshake because HandshakeDone is received 25.774 -> Packet A|2|S0|8e588faa586a4ae35fe9e18f|38|1 AckFrame[5,2-1|Δ19] 25.804 loss detection timeout handler running Sending probe 0, because no ack since 25.684. Current RTT: 32/16. 25.804 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 26.046/App, because ackElicitingInFlight | RTT:32/16 25.804 -> Packet PA|3|S0|8e588faa586a4ae35fe9e18f|51|1 StreamFrame[0(CIB),0,17,fin] 25.902 <- (11) Packet A|11|S0|28c75512b4a1bfba|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 25.922 -> Packet A|4|S0|8e588faa586a4ae35fe9e18f|40|1 AckFrame[11,5,2-1|Δ19] 25.952 <- (12) Packet A|13|S0|28c75512b4a1bfba|61|1 NewConnectionIdFrame[1,<0|63f323c8a202a0b2d829f1b4|3cf5ff64925a5ae8f04c33ba14bcc688] 25.972 -> Packet A|5|S0|8e588faa586a4ae35fe9e18f|42|1 AckFrame[13,11,5,2-1|Δ19] 26.043 <- (13) Packet A|14|S0|28c75512b4a1bfba|61|1 NewConnectionIdFrame[1,<0|63f323c8a202a0b2d829f1b4|3cf5ff64925a5ae8f04c33ba14bcc688] 26.043 <- (14) Packet A|15|S0|28c75512b4a1bfba|61|1 NewConnectionIdFrame[1,<0|63f323c8a202a0b2d829f1b4|3cf5ff64925a5ae8f04c33ba14bcc688] 26.043 -> Packet A|6|S0|8e588faa586a4ae35fe9e18f|41|1 AckFrame[15-13,11,5,2-1|Δ0] 26.045 loss detection timeout handler running Sending probe 1, because no ack since 25.804. Current RTT: 32/16. 26.045 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 483 millis, based on 26.529/App, because ackElicitingInFlight | RTT:32/16 26.045 -> Packet PA|7|S0|8e588faa586a4ae35fe9e18f|51|1 StreamFrame[0(CIB),0,17,fin] reschedule loss detection timer for PTO over 483 millis, based on 26.531/App, because ackElicitingInFlight | RTT:32/16 26.047 -> Packet PA|8|S0|8e588faa586a4ae35fe9e18f|51|1 StreamFrame[0(CIB),0,17,fin] 26.077 <- (15) Packet A|16|S0|28c75512b4a1bfba|1057|1 StreamFrame[0(CIB),0,1024,fin] 26.078 Finished downloading https://server4:443/okhlqqiagy at 25:20.553 on ClientConnection[e3dbe8275a507033/28c75512b4a1bfba(V1) with server4/193.167.100.100:443] 26.078 Closing ClientConnection[e3dbe8275a507033/28c75512b4a1bfba(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 26.078 -> Packet A|9|S0|8e588faa586a4ae35fe9e18f|45|2 ConnectionCloseFrame[0|0|] AckFrame[16-13,11,5,2-1|Δ0] 26.078 Creating connection with server4:443 with v1 26.079 Setting up connection for downloading https://server4:443/ojpppazuku at 25:20.554 on ClientConnection[3b3fbc29680117be/94f65839742c9a21(V1) with server4/193.167.100.100:443] 26.079 Original destination connection id: 3b3fbc29680117be (scid: 94f65839742c9a21) >- CryptoStream[I|ClientHello] 26.080 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.280/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 26.079 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 26.102 <- (16) Packet A|17|S0|28c75512b4a1bfba|39|1 AckFrame[7-6,4,2-1|Δ25] 26.102 -> Packet A|10|S0|8e588faa586a4ae35fe9e18f|45|2 ConnectionCloseFrame[0|0|] AckFrame[16-13,11,5,2-1|Δ0] 26.114 Discarding packet (523 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 26.114 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 26.114 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 26.114 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 26.115 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 26.315/Initial, because peerAwaitingAddressValidation | RTT:100/25 26.314 loss detection timeout handler running Sending probe 0, because no ack since 26.079. Current RTT: 34/17. 26.314 Sending probe because peer awaiting address validation 26.314 (Probe is Initial ping, because there is no Initial data to retransmit) 26.314 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 26.518/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.314 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 26.517 loss detection timeout handler running Sending probe 1, because no ack since 26.314. Current RTT: 34/17. 26.517 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 26.517 (Probe is Initial ping, because there is no Initial data to retransmit) 26.517 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 26.925/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.517 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 26.518 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 26.926/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 26.518 -> Packet PI|3|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 26.550 <- (5) Packet I|3|L|57|1 Token=[] AckFrame[3-2,0|Δ0] 26.550 probe count not reset on ack because handshake not yet confirmed 26.550 Cwnd(-): 6000; inflight: 0 26.550 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 407 millis, based on 26.958/Initial, because peerAwaitingAddressValidation | RTT:34/17 26.866 <- (6) Packet I|5|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 26.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 26.958/Handshake, because peerAwaitingAddressValidation | RTT:34/14 26.868 Discarding pn space Initial because first Handshake message is being sent 26.868 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 26.958/Handshake, because peerAwaitingAddressValidation | RTT:34/14 26.868 -> Packet I|4|L|1201|2 Token=[] AckFrame[5,3,1|Δ0] Padding(1145) 26.900 <- (7) Packet H|4|L|177|1 CryptoFrame[0,124] 26.900 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 26.901 <- (8) Packet H|5|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 26.901 -> Packet H|0|L|50|1 AckFrame[4|Δ0] 26.901 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 26.932 <- (9) Packet H|7|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|EncryptedExtensions,Certificate] 26.932 -> Packet H|2|L|52|1 AckFrame[7,5-4|Δ0] 26.957 loss detection timeout handler running 26.957 Sending probe 0. Current RTT: 34/14. 26.957 Sending probe because peer awaiting address validation 26.957 (Probe is a handshake ping) 26.958 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 179 millis, based on 27.138/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 26.957 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) 26.988 <- (10) Packet H|9|L|54|1 AckFrame[3-0|Δ0] 26.989 probe count not reset on ack because handshake not yet confirmed 26.989 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 27.046 <- (11) Packet H|10|L|133|1 CryptoFrame[593,79] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 163 millis, based on 27.212/Handshake, because ackElicitingInFlight | RTT:34/12 27.048 -> Packet H|4|L|89|2 CryptoFrame[0,36] AckFrame[9|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.046 <- (12) Packet H|11|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.048 -> Packet H|5|L|50|1 AckFrame[10-9|Δ0] 27.048 Starting downloading https://server4:443/ojpppazuku at 25:21.524 on ClientConnection[3b3fbc29680117be/94f65839742c9a21(V1) with server4/193.167.100.100:443] 27.048 -> Packet H|6|L|50|1 AckFrame[11-9|Δ0] 27.049 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 163 millis, based on 27.212/Handshake, because ackElicitingInFlight | RTT:34/12 27.049 -> Packet A|0|S0|bc40c5b52c2edaf2dd4d43aa|51|1 StreamFrame[0(CIB),0,17,fin] 27.079 <- (13) Packet A|0|S0|94f65839742c9a21|30|1 HandshakeDoneFrame[] 27.079 State is set to Confirmed reschedule loss detection timer for PTO over 132 millis, based on 27.212/Handshake, because ackElicitingInFlight | RTT:34/12 reschedule loss detection timer for PTO over 75 millis, based on 27.156/App, because ackElicitingInFlight | RTT:34/12 27.080 Discarding pn space Handshake because HandshakeDone is received 27.079 <- (14) Packet A|8|S0|94f65839742c9a21|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 27.080 <- (15) Packet A|9|S0|94f65839742c9a21|291|1 CryptoFrame[257,257] 27.080 -> Packet A|1|S0|bc40c5b52c2edaf2dd4d43aa|37|1 AckFrame[8,0|Δ0] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 27.080 Discarding packet (55 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 27.080 <- (17) Packet A|10|S0|94f65839742c9a21|61|1 NewConnectionIdFrame[1,<0|d871edcc6c15994bf78bc490|02c7aaf87e1084aba3906b5219c8e65f] 27.080 -> Packet A|2|S0|bc40c5b52c2edaf2dd4d43aa|37|1 AckFrame[10-8,0|Δ0] 27.081 <- (18) Packet A|11|S0|94f65839742c9a21|1057|1 StreamFrame[0(CIB),0,1024,fin] 27.081 Finished downloading https://server4:443/ojpppazuku at 25:21.557 on ClientConnection[3b3fbc29680117be/94f65839742c9a21(V1) with server4/193.167.100.100:443] 27.081 Closing ClientConnection[3b3fbc29680117be/94f65839742c9a21(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.082 -> Packet A|3|S0|bc40c5b52c2edaf2dd4d43aa|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-8,0|Δ0] 27.082 Creating connection with server4:443 with v1 27.082 Setting up connection for downloading https://server4:443/mmkklrtkki at 25:21.558 on ClientConnection[5cb226bb19eb886d/7b015611c0b74a33(V1) with server4/193.167.100.100:443] 27.082 Original destination connection id: 5cb226bb19eb886d (scid: 7b015611c0b74a33) >- CryptoStream[I|ClientHello] 27.084 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.284/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.084 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.112 <- (19) Packet A|13|S0|94f65839742c9a21|33|1 ConnectionCloseFrame[0|0|] 27.117 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 27.120 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 27.320/Handshake, because peerAwaitingAddressValidation | RTT:100/25 27.120 Discarding pn space Initial because first Handshake message is being sent 27.120 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 27.320/Handshake, because peerAwaitingAddressValidation | RTT:100/25 27.120 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 27.117 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 27.120 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 27.118 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 27.121 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 27.118 <- (4) Packet H|2|L|133|1 CryptoFrame[593,79] 27.121 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 27.118 <- (5) Packet H|3|L|89|1 CryptoFrame[672,36] 27.122 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 27.122 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 27.322/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.122 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 27.123 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 27.123 Starting downloading https://server4:443/mmkklrtkki at 25:21.598 on ClientConnection[5cb226bb19eb886d/7b015611c0b74a33(V1) with server4/193.167.100.100:443] 27.123 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 27.123 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 27.323/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.123 -> Packet A|0|S0|f2386b9e262c3cce1bd19104|51|1 StreamFrame[0(CIB),0,17,fin] 27.154 <- (7) Packet A|7|S0|7b015611c0b74a33|40|1 NewTokenFrame[00c1a70064681ba591] 27.154 <- (8) Packet A|8|S0|7b015611c0b74a33|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 27.154 -> Packet A|1|S0|f2386b9e262c3cce1bd19104|35|1 AckFrame[8-7|Δ0] 27.154 <- (9) Packet H|4|L|56|1 AckFrame[3-2,0|Δ0] 27.155 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 27.155 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 27.154 <- (10) Packet A|10|S0|7b015611c0b74a33|61|1 NewConnectionIdFrame[1,<0|f7a34adcfca1fb50d3c8bfe0|bc9f4f859675cc593ef62a40d6ca4ac4] 27.155 <- (11) Packet A|11|S0|7b015611c0b74a33|1057|1 StreamFrame[0(CIB),0,1024,fin] 27.156 -> Packet A|2|S0|f2386b9e262c3cce1bd19104|37|1 AckFrame[11-10,8-7|Δ0] 27.156 Finished downloading https://server4:443/mmkklrtkki at 25:21.631 on ClientConnection[5cb226bb19eb886d/7b015611c0b74a33(V1) with server4/193.167.100.100:443] 27.156 Closing ClientConnection[5cb226bb19eb886d/7b015611c0b74a33(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 27.156 -> Packet A|3|S0|f2386b9e262c3cce1bd19104|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,8-7|Δ0] 27.156 Creating connection with server4:443 with v1 27.157 Setting up connection for downloading https://server4:443/ekqyhttgfm at 25:21.632 on ClientConnection[e776588f9717b22f/7ac958043bf9fdf5(V1) with server4/193.167.100.100:443] 27.157 Original destination connection id: e776588f9717b22f (scid: 7ac958043bf9fdf5) >- CryptoStream[I|ClientHello] 27.158 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.358/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 27.158 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 27.180 <- (12) Packet A|12|S0|7b015611c0b74a33|35|1 AckFrame[0|Δ25] 27.180 -> Packet A|4|S0|f2386b9e262c3cce1bd19104|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,8-7|Δ0] 27.185 <- (13) Packet A|13|S0|7b015611c0b74a33|30|1 HandshakeDoneFrame[] 27.186 -> Packet A|5|S0|f2386b9e262c3cce1bd19104|41|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,8-7|Δ0] 27.187 <- (14) Packet A|14|S0|7b015611c0b74a33|33|1 ConnectionCloseFrame[0|0|] 27.192 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 27.192 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 27.192 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 27.192 <- (4) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 27.192 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 27.393/Initial, because peerAwaitingAddressValidation | RTT:100/25 27.392 loss detection timeout handler running Sending probe 0, because no ack since 27.158. Current RTT: 34/17. 27.392 Sending probe because peer awaiting address validation 27.392 (Probe is Initial ping, because there is no Initial data to retransmit) 27.392 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 27.596/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 27.392 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 27.424 <- (5) Packet I|2|L|55|1 Token=[] AckFrame[1-0|Δ0] 27.424 probe count not reset on ack because handshake not yet confirmed 27.424 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 27.628/Initial, because peerAwaitingAddressValidation | RTT:34/17 27.627 loss detection timeout handler running Sending probe 1, because no ack since 27.392. Current RTT: 34/14. 27.627 Sending probe because peer awaiting address validation 27.627 (Probe is Initial ping, because there is no Initial data to retransmit) 27.627 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 27.987/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 27.627 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 27.659 <- (6) Packet I|3|L|55|1 Token=[] AckFrame[2-0|Δ0] 27.660 probe count not reset on ack because handshake not yet confirmed 27.660 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 28.020/Initial, because peerAwaitingAddressValidation | RTT:34/14 27.943 <- (7) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 27.945 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 77 millis, based on 28.023/Handshake, because peerAwaitingAddressValidation | RTT:34/11 27.945 Discarding pn space Initial because first Handshake message is being sent 27.945 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 27.945 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) reschedule loss detection timer for PTO over 77 millis, based on 28.023/Handshake, because peerAwaitingAddressValidation | RTT:34/11 27.945 -> Packet I|3|L|1201|2 Token=[] AckFrame[4-1|Δ0] Padding(1149) 28.023 loss detection timeout handler running 28.023 Sending probe 0. Current RTT: 34/11. 28.023 Sending probe because peer awaiting address validation 28.023 (Probe is a handshake ping) 28.023 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 155 millis, based on 28.179/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 28.023 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 28.178 loss detection timeout handler running Sending probe 1, because no ack since 28.023. Current RTT: 34/11. 28.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.178 (Probe is a handshake ping) 28.178 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 311 millis, based on 28.490/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 28.178 -> Packet PH|1|L|48|2 PingFrame[] Padding(2) 28.179 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 311 millis, based on 28.491/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 28.179 -> Packet PH|2|L|48|2 PingFrame[] Padding(2) 28.491 loss detection timeout handler running Sending probe 2, because no ack since 28.179. Current RTT: 34/11. 28.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 28.491 (Probe is a handshake ping) 28.491 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 623 millis, based on 29.115/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 28.491 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) 28.492 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 623 millis, based on 29.116/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 28.492 -> Packet PH|4|L|48|2 PingFrame[] Padding(2) 28.961 <- (9) Packet H|9|L|177|1 CryptoFrame[0,124] 28.961 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 28.962 -> Packet H|5|L|50|1 AckFrame[9|Δ0] 28.993 <- (10) Packet H|11|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions] 28.993 <- (11) Packet H|12|L|89|1 CryptoFrame[672,36] -< CryptoStream[H|EncryptedExtensions] 28.993 -> Packet H|6|L|52|1 AckFrame[11,9|Δ0] 28.993 -> Packet H|7|L|52|1 AckFrame[12-11,9|Δ0] 28.993 <- (12) Packet H|13|L|523|1 CryptoFrame[124,469] >- CryptoStream[H|Finished] 28.995 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 623 millis, based on 29.619/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 28.995 -> Packet H|8|L|91|2 CryptoFrame[0,36] AckFrame[12-11,9|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 28.996 Starting downloading https://server4:443/ekqyhttgfm at 25:23.471 on ClientConnection[e776588f9717b22f/7ac958043bf9fdf5(V1) with server4/193.167.100.100:443] 28.996 -> Packet H|9|L|52|1 AckFrame[13-11,9|Δ0] 28.996 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 623 millis, based on 29.620/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/11 28.996 -> Packet A|0|S0|ddfe6c8cc576606d78283b81|51|1 StreamFrame[0(CIB),0,17,fin] 29.025 <- (13) Packet H|14|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 29.025 -> Packet H|10|L|52|1 AckFrame[14-11,9|Δ0] 29.026 <- (14) Packet A|0|S0|7ac958043bf9fdf5|30|1 HandshakeDoneFrame[] 29.026 State is set to Confirmed reschedule loss detection timer for PTO over 592 millis, based on 29.619/Handshake, because ackElicitingInFlight | RTT:34/11 reschedule loss detection timer for PTO over 72 millis, based on 29.099/App, because ackElicitingInFlight | RTT:34/11 29.027 Discarding pn space Handshake because HandshakeDone is received 29.026 <- (15) Packet A|1|S0|7ac958043bf9fdf5|40|1 NewTokenFrame[00c1a70064681ba593] 29.027 <- (16) Packet A|4|S0|7ac958043bf9fdf5|290|1 CryptoFrame[0,257] 29.027 -> Packet A|1|S0|ddfe6c8cc576606d78283b81|35|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 29.027 <- (17) Packet A|5|S0|7ac958043bf9fdf5|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 29.027 -> Packet A|2|S0|ddfe6c8cc576606d78283b81|37|1 AckFrame[5-4,1-0|Δ0] 29.028 <- (18) Packet A|7|S0|7ac958043bf9fdf5|1057|1 StreamFrame[0(CIB),0,1024,fin] 29.028 Finished downloading https://server4:443/ekqyhttgfm at 25:23.504 on ClientConnection[e776588f9717b22f/7ac958043bf9fdf5(V1) with server4/193.167.100.100:443] 29.028 Closing ClientConnection[e776588f9717b22f/7ac958043bf9fdf5(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 29.029 -> Packet A|3|S0|ddfe6c8cc576606d78283b81|43|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4,1-0|Δ0] 29.029 Creating connection with server4:443 with v1 29.030 Setting up connection for downloading https://server4:443/lxcshzqdao at 25:23.505 on ClientConnection[9deaae9c03de280a/80e2897e5a32c4d2(V1) with server4/193.167.100.100:443] 29.030 Original destination connection id: 9deaae9c03de280a (scid: 80e2897e5a32c4d2) >- CryptoStream[I|ClientHello] 29.031 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 29.231/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.031 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.052 <- (19) Packet A|8|S0|7ac958043bf9fdf5|35|1 AckFrame[0|Δ25] 29.053 -> Packet A|4|S0|ddfe6c8cc576606d78283b81|43|2 ConnectionCloseFrame[0|0|] AckFrame[7,5-4,1-0|Δ0] 29.230 loss detection timeout handler running Sending probe 0, because no ack since 29.031. Current RTT: 100/25. 29.230 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 29.230 (Probe is an initial retransmit) 29.230 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 29.630/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.230 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 29.264 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 29.266 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 29.466/Handshake, because peerAwaitingAddressValidation | RTT:100/25 29.267 Discarding pn space Initial because first Handshake message is being sent 29.267 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 29.467/Handshake, because peerAwaitingAddressValidation | RTT:100/25 29.264 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 29.267 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 29.267 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 29.265 <- (3) Packet H|2|L|134|1 CryptoFrame[593,80] -< CryptoStream[H|EncryptedExtensions] 29.265 <- (4) Packet H|3|L|89|1 CryptoFrame[673,36] -< CryptoStream[H|EncryptedExtensions] 29.267 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 29.267 -> Packet H|1|L|52|1 AckFrame[3-2,0|Δ0] 29.353 <- (5) Packet H|5|L|134|1 CryptoFrame[593,80] -< CryptoStream[H|EncryptedExtensions] 29.353 -> Packet H|2|L|54|1 AckFrame[5,3-2,0|Δ0] 29.466 loss detection timeout handler running 29.466 Sending probe 0. Current RTT: 100/25. 29.466 Sending probe because peer awaiting address validation 29.466 (Probe is a handshake ping) 29.466 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 29.866/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 29.466 -> Packet PH|3|L|48|2 PingFrame[] Padding(2) 29.497 <- (6) Packet H|8|L|56|1 AckFrame[3,0|Δ0] 29.498 probe count not reset on ack because handshake not yet confirmed 29.498 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 29.674 <- (7) Packet H|10|L|134|1 CryptoFrame[593,80] -< CryptoStream[H|EncryptedExtensions] 29.675 -> Packet H|4|L|56|1 AckFrame[10,8,5,3-2|Δ0] 30.027 <- (8) Packet H|11|L|523|1 CryptoFrame[124,469] >- CryptoStream[H|Finished] reschedule loss detection timer for PTO over 181 millis, based on 30.211/Handshake, because ackElicitingInFlight | RTT:31/15 30.029 -> Packet H|5|L|96|2 CryptoFrame[0,36] AckFrame[10,8,5,3-2|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.027 <- (9) Packet H|12|L|134|1 CryptoFrame[593,80] 30.030 Starting downloading https://server4:443/lxcshzqdao at 25:24.506 on ClientConnection[9deaae9c03de280a/80e2897e5a32c4d2(V1) with server4/193.167.100.100:443] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 30.030 -> Packet H|6|L|56|1 AckFrame[11-10,8,5,3-2|Δ0] 30.030 -> Packet H|7|L|56|1 AckFrame[12-10,8,5,3-2|Δ0] 30.030 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 180 millis, based on 30.211/Handshake, because ackElicitingInFlight | RTT:31/15 30.030 -> Packet A|0|S0|5937552c978387db3b3534ce|51|1 StreamFrame[0(CIB),0,17,fin] 30.061 <- (10) Packet A|0|S0|80e2897e5a32c4d2|30|1 HandshakeDoneFrame[] 30.061 State is set to Confirmed reschedule loss detection timer for PTO over 150 millis, based on 30.211/Handshake, because ackElicitingInFlight | RTT:31/15 reschedule loss detection timer for PTO over 84 millis, based on 30.146/App, because ackElicitingInFlight | RTT:31/15 30.061 Discarding pn space Handshake because HandshakeDone is received 30.062 Discarding packet (55 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 30.062 <- (12) Packet A|7|S0|80e2897e5a32c4d2|61|1 NewConnectionIdFrame[1,<0|9bb52e265e3851dd33fc48b5|a74ad907dd296e70c59c1e7f9f94be18] 30.062 -> Packet A|1|S0|5937552c978387db3b3534ce|37|1 AckFrame[7,0|Δ0] 30.063 <- (13) Packet A|8|S0|80e2897e5a32c4d2|1057|1 StreamFrame[0(CIB),0,1024,fin] 30.063 Finished downloading https://server4:443/lxcshzqdao at 25:24.539 on ClientConnection[9deaae9c03de280a/80e2897e5a32c4d2(V1) with server4/193.167.100.100:443] 30.063 Closing ClientConnection[9deaae9c03de280a/80e2897e5a32c4d2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 30.064 -> Packet A|2|S0|5937552c978387db3b3534ce|41|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,0|Δ0] 30.064 Creating connection with server4:443 with v1 30.065 Setting up connection for downloading https://server4:443/aqnkpkdklq at 25:24.540 on ClientConnection[5e1f843fbb7b1ab7/baa5689c5d55074a(V1) with server4/193.167.100.100:443] 30.065 Original destination connection id: 5e1f843fbb7b1ab7 (scid: baa5689c5d55074a) >- CryptoStream[I|ClientHello] 30.066 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 30.266/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.066 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.087 <- (14) Packet A|9|S0|80e2897e5a32c4d2|35|1 AckFrame[0|Δ25] 30.088 -> Packet A|3|S0|5937552c978387db3b3534ce|41|2 ConnectionCloseFrame[0|0|] AckFrame[8-7,0|Δ0] 30.094 <- (15) Packet A|10|S0|80e2897e5a32c4d2|33|1 ConnectionCloseFrame[0|0|] 30.100 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 30.100 Discarding packet (523 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 30.100 Discarding packet (133 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 30.100 Discarding packet (89 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 30.265 loss detection timeout handler running Sending probe 0, because no ack since 30.066. Current RTT: 100/25. 30.265 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.265 (Probe is an initial retransmit) 30.265 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 30.665/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.265 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.665 loss detection timeout handler running Sending probe 1, because no ack since 30.265. Current RTT: 100/25. 30.665 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 30.665 (Probe is an initial retransmit) 30.665 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 31.465/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.665 -> Packet PI|2|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.666 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 31.466/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 30.666 -> Packet PI|3|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 30.698 <- (5) Packet I|3|L|57|1 Token=[] AckFrame[3-2,0|Δ0] 30.698 probe count not reset on ack because handshake not yet confirmed 30.698 Cwnd(-): 6000; inflight: 0 30.698 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 799 millis, based on 31.498/Initial, because peerAwaitingAddressValidation | RTT:100/25 30.850 <- (6) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 30.853 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 90 millis, based on 30.944/Handshake, because peerAwaitingAddressValidation | RTT:31/15 30.853 Discarding pn space Initial because first Handshake message is being sent 30.853 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 30.853 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) reschedule loss detection timer for PTO over 90 millis, based on 30.944/Handshake, because peerAwaitingAddressValidation | RTT:31/15 30.853 -> Packet I|4|L|1201|2 Token=[] AckFrame[4-3|Δ0] Padding(1149) 30.943 loss detection timeout handler running 30.944 Sending probe 0. Current RTT: 31/15. 30.944 Sending probe because peer awaiting address validation 30.944 (Probe is a handshake ping) 30.944 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 181 millis, based on 31.126/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:31/15 30.944 -> Packet PH|0|L|48|2 PingFrame[] Padding(2) 30.975 <- (8) Packet H|5|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|] 30.975 <- (9) Packet H|6|L|54|1 AckFrame[0|Δ0] 30.976 -> Packet H|1|L|50|1 AckFrame[5|Δ0] 30.976 probe count not reset on ack because handshake not yet confirmed 30.976 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 35.481 <- (10) Packet H|9|L|177|1 CryptoFrame[0,124] 35.481 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions,Certificate] 35.481 <- (11) Packet H|10|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 35.482 -> Packet H|2|L|52|1 AckFrame[9,6-5|Δ0] 35.482 -> Packet H|3|L|52|1 AckFrame[10-9,6-5|Δ0] 41.487 <- (12) Packet H|11|L|177|1 CryptoFrame[0,124] -< CryptoStream[H|EncryptedExtensions,Certificate] 41.487 <- (13) Packet H|12|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 41.487 -> Packet H|4|L|52|1 AckFrame[11-9,6-5|Δ0] 41.488 -> Packet H|5|L|52|1 AckFrame[12-9,6-5|Δ0] 41.519 <- (14) Packet H|13|L|133|1 CryptoFrame[593,79] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 41.519 <- (15) Packet H|14|L|89|1 CryptoFrame[672,36] >- CryptoStream[H|Finished] 41.521 -> Packet H|6|L|52|1 AckFrame[13-9,6-5|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] reschedule loss detection timer for PTO over 149 millis, based on 41.672/Handshake, because ackElicitingInFlight | RTT:31/11 41.522 -> Packet H|7|L|91|2 CryptoFrame[0,36] AckFrame[13-9,6-5|Δ0] 41.522 -> Packet H|8|L|52|1 AckFrame[14-9,6-5|Δ0] 41.522 Starting downloading https://server4:443/aqnkpkdklq at 25:35.998 on ClientConnection[5e1f843fbb7b1ab7/baa5689c5d55074a(V1) with server4/193.167.100.100:443] 41.523 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! reschedule loss detection timer for PTO over 148 millis, based on 41.672/Handshake, because ackElicitingInFlight | RTT:31/11 41.523 -> Packet A|0|S0|5bfa6bb8bb091332f1cd360a|51|1 StreamFrame[0(CIB),0,17,fin] 41.554 <- (16) Packet A|2|S0|baa5689c5d55074a|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 41.554 <- (17) Packet A|3|S0|baa5689c5d55074a|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 41.554 <- (18) Packet H|15|L|56|1 AckFrame[7-4,0|Δ0] 41.554 -> Packet A|1|S0|5bfa6bb8bb091332f1cd360a|35|1 AckFrame[3-2|Δ0] 41.555 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 41.555 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 41.554 <- (19) Packet A|8|S0|baa5689c5d55074a|61|1 NewConnectionIdFrame[1,<0|b5c796ffd3643ee278c42f03|07d6217bd3e631c3389a158b8a5451d3] 41.574 -> Packet A|2|S0|5bfa6bb8bb091332f1cd360a|38|1 AckFrame[8,3-2|Δ19] 41.579 <- (20) Packet A|10|S0|baa5689c5d55074a|35|1 AckFrame[0|Δ25] 41.580 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 41.661 <- (21) Packet A|12|S0|baa5689c5d55074a|40|1 NewTokenFrame[00c1a70064681ba5a0] 41.680 -> Packet A|3|S0|5bfa6bb8bb091332f1cd360a|42|1 AckFrame[12,10,8,3-2|Δ19] 41.718 <- (22) Packet A|14|S0|baa5689c5d55074a|30|1 HandshakeDoneFrame[] 41.718 State is set to Confirmed 41.718 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 41.718 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 41.718 Discarding pn space Handshake because HandshakeDone is received 41.737 -> Packet A|4|S0|5bfa6bb8bb091332f1cd360a|44|1 AckFrame[14,12,10,8,3-2|Δ19] 41.769 <- (23) Packet A|15|S0|baa5689c5d55074a|1057|1 StreamFrame[0(CIB),0,1024,fin] 41.770 Finished downloading https://server4:443/aqnkpkdklq at 25:36.245 on ClientConnection[5e1f843fbb7b1ab7/baa5689c5d55074a(V1) with server4/193.167.100.100:443] 41.770 Closing ClientConnection[5e1f843fbb7b1ab7/baa5689c5d55074a(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 41.770 -> Packet A|5|S0|5bfa6bb8bb091332f1cd360a|47|2 ConnectionCloseFrame[0|0|] AckFrame[15-14,12,10,8,3-2|Δ0] 41.770 Creating connection with server4:443 with v1 41.771 Setting up connection for downloading https://server4:443/ehrtgbiyug at 25:36.246 on ClientConnection[21d016324e9f0d64/22c9ad10e8974b44(V1) with server4/193.167.100.100:443] 41.771 Original destination connection id: 21d016324e9f0d64 (scid: 22c9ad10e8974b44) >- CryptoStream[I|ClientHello] 41.772 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 41.972/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.772 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 41.801 <- (24) Packet A|16|S0|baa5689c5d55074a|33|1 ConnectionCloseFrame[0|0|] 41.971 loss detection timeout handler running Sending probe 0, because no ack since 41.772. Current RTT: 100/25. 41.971 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 41.971 (Probe is an initial retransmit) 41.972 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 42.372/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 41.971 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.005 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 42.008 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 42.208/Handshake, because peerAwaitingAddressValidation | RTT:100/25 42.008 Discarding pn space Initial because first Handshake message is being sent 42.008 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 42.208/Handshake, because peerAwaitingAddressValidation | RTT:100/25 42.005 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 42.008 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 42.008 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 42.006 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 42.009 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 42.006 <- (4) Packet H|3|L|89|1 CryptoFrame[671,36] -< CryptoStream[H|EncryptedExtensions,Certificate] 42.009 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] 42.009 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 42.009 -> Packet H|2|L|52|1 AckFrame[3,1-0|Δ0] 42.046 <- (6) Packet H|4|L|132|1 CryptoFrame[593,78] >- CryptoStream[H|Finished] 42.048 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 42.248/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.048 -> Packet H|3|L|91|2 CryptoFrame[0,36] AckFrame[3,1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 42.048 Starting downloading https://server4:443/ehrtgbiyug at 25:36.524 on ClientConnection[21d016324e9f0d64/22c9ad10e8974b44(V1) with server4/193.167.100.100:443] 42.048 -> Packet H|4|L|52|1 AckFrame[4-3,1-0|Δ0] 42.049 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 42.249/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.048 -> Packet A|0|S0|56b872d1674562b9164c3411|51|1 StreamFrame[0(CIB),0,17,fin] 42.079 <- (7) Packet A|0|S0|22c9ad10e8974b44|30|1 HandshakeDoneFrame[] 42.079 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 42.248/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 42.273/App, because ackElicitingInFlight | RTT:100/25 42.080 Discarding pn space Handshake because HandshakeDone is received 42.079 <- (8) Packet A|7|S0|22c9ad10e8974b44|40|1 NewTokenFrame[00c1a70064681ba5a0] 42.080 <- (9) Packet A|8|S0|22c9ad10e8974b44|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 42.080 -> Packet A|1|S0|56b872d1674562b9164c3411|37|1 AckFrame[7,0|Δ0] 42.080 Discarding packet (55 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 42.080 <- (11) Packet A|10|S0|22c9ad10e8974b44|61|1 NewConnectionIdFrame[1,<0|fe6cb8bc53994f62c473d36a|385a52a63028f6185a11113260e4a598] 42.080 -> Packet A|2|S0|56b872d1674562b9164c3411|39|1 AckFrame[10,8-7,0|Δ0] 42.119 <- (12) Packet A|11|S0|22c9ad10e8974b44|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 42.139 -> Packet A|3|S0|56b872d1674562b9164c3411|40|1 AckFrame[11-10,8-7,0|Δ19] 42.274 loss detection timeout handler running Sending probe 0, because no ack since 42.048. Current RTT: 100/25. 42.274 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 449 millis, based on 42.724/App, because ackElicitingInFlight | RTT:100/25 42.274 -> Packet PA|4|S0|56b872d1674562b9164c3411|51|1 StreamFrame[0(CIB),0,17,fin] 42.306 <- (13) Packet A|12|S0|22c9ad10e8974b44|1057|1 StreamFrame[0(CIB),0,1024,fin] 42.306 Finished downloading https://server4:443/ehrtgbiyug at 25:36.782 on ClientConnection[21d016324e9f0d64/22c9ad10e8974b44(V1) with server4/193.167.100.100:443] 42.306 Closing ClientConnection[21d016324e9f0d64/22c9ad10e8974b44(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 42.306 -> Packet A|5|S0|56b872d1674562b9164c3411|43|2 ConnectionCloseFrame[0|0|] AckFrame[12-10,8-7,0|Δ0] 42.307 Creating connection with server4:443 with v1 42.307 Setting up connection for downloading https://server4:443/zuptkkhhqj at 25:36.783 on ClientConnection[c3dc444789c2f8b0/52e00e7b198635e1(V1) with server4/193.167.100.100:443] 42.307 Original destination connection id: c3dc444789c2f8b0 (scid: 52e00e7b198635e1) >- CryptoStream[I|ClientHello] 42.308 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 42.508/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.308 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.330 <- (14) Packet A|13|S0|22c9ad10e8974b44|35|1 AckFrame[4-1|Δ25] 42.330 -> Packet A|6|S0|56b872d1674562b9164c3411|43|2 ConnectionCloseFrame[0|0|] AckFrame[12-10,8-7,0|Δ0] 42.507 loss detection timeout handler running Sending probe 0, because no ack since 42.308. Current RTT: 100/25. 42.507 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial 42.507 (Probe is an initial retransmit) 42.508 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 399 millis, based on 42.908/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.507 -> Packet PI|1|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.541 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 42.544 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 42.744/Handshake, because peerAwaitingAddressValidation | RTT:100/25 42.544 Discarding pn space Initial because first Handshake message is being sent 42.544 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 42.744/Handshake, because peerAwaitingAddressValidation | RTT:100/25 42.544 -> Packet I|2|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 42.541 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 42.544 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 42.542 <- (3) Packet H|2|L|134|1 CryptoFrame[593,80] -< CryptoStream[H|EncryptedExtensions] 42.544 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 42.544 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 42.544 -> Packet H|1|L|52|1 AckFrame[2,0|Δ0] 42.582 <- (5) Packet H|4|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 42.584 -> Packet H|2|L|54|1 AckFrame[4,2,0|Δ0] 42.658 <- (6) Packet H|5|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 42.658 <- (7) Packet H|6|L|89|1 CryptoFrame[673,36] 42.658 -> Packet H|3|L|54|1 AckFrame[5-4,2,0|Δ0] >- CryptoStream[H|Finished] 42.658 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 42.858/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.658 -> Packet H|4|L|94|2 CryptoFrame[0,36] AckFrame[5-4,2,0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 42.658 Starting downloading https://server4:443/zuptkkhhqj at 25:37.134 on ClientConnection[c3dc444789c2f8b0/52e00e7b198635e1(V1) with server4/193.167.100.100:443] 42.658 -> Packet H|5|L|54|1 AckFrame[6-4,2,0|Δ0] 42.659 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 42.859/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.659 -> Packet A|0|S0|2b465cfb4c1603d8d6123132|51|1 StreamFrame[0(CIB),0,17,fin] 42.690 <- (8) Packet A|2|S0|52e00e7b198635e1|40|1 NewTokenFrame[00c1a70064681ba5a1] 42.691 <- (9) Packet A|3|S0|52e00e7b198635e1|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket] 42.691 <- (10) Packet H|7|L|56|1 AckFrame[4-3,1-0|Δ0] 42.691 -> Packet A|1|S0|2b465cfb4c1603d8d6123132|35|1 AckFrame[3-2|Δ0] 42.691 getPtoTimeAndSpace is skipping level App, because handshake not yet confirmed! 42.691 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (1)) 42.691 <- (11) Packet A|5|S0|52e00e7b198635e1|61|1 NewConnectionIdFrame[1,<0|b926ff8d425562b0e9bc60f8|6d0633a52f059614ee07f0705e4d52f4] 42.711 -> Packet A|2|S0|2b465cfb4c1603d8d6123132|38|1 AckFrame[5,3-2|Δ19] 42.748 <- (12) Packet A|7|S0|52e00e7b198635e1|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 42.768 -> Packet A|3|S0|2b465cfb4c1603d8d6123132|40|1 AckFrame[7,5,3-2|Δ19] 42.799 <- (13) Packet A|8|S0|52e00e7b198635e1|30|1 HandshakeDoneFrame[] 42.799 State is set to Confirmed reschedule loss detection timer for PTO over -19 millis, based on 42.780/App, because ackElicitingInFlight | RTT:32/16 42.799 loss detection timeout handler running Sending probe 0, because no ack since 42.659. Current RTT: 32/16. reschedule loss detection timer for PTO over -19 millis, based on 42.780/App, because ackElicitingInFlight | RTT:32/16 42.799 Discarding pn space Handshake because HandshakeDone is received 42.799 (Probe is retransmit on level App) reschedule loss detection timer for PTO over 241 millis, based on 43.041/App, because ackElicitingInFlight | RTT:32/16 42.799 -> Packet PA|4|S0|2b465cfb4c1603d8d6123132|51|1 StreamFrame[0(CIB),0,17,fin] 42.818 -> Packet A|5|S0|2b465cfb4c1603d8d6123132|40|1 AckFrame[8-7,5,3-2|Δ19] 42.831 <- (14) Packet A|9|S0|52e00e7b198635e1|1057|1 StreamFrame[0(CIB),0,1024,fin] 42.831 Finished downloading https://server4:443/zuptkkhhqj at 25:37.307 on ClientConnection[c3dc444789c2f8b0/52e00e7b198635e1(V1) with server4/193.167.100.100:443] 42.831 Closing ClientConnection[c3dc444789c2f8b0/52e00e7b198635e1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 42.832 -> Packet A|6|S0|2b465cfb4c1603d8d6123132|43|2 ConnectionCloseFrame[0|0|] AckFrame[9-7,5,3-2|Δ0] 42.832 Creating connection with server4:443 with v1 42.832 Setting up connection for downloading https://server4:443/opfehsigys at 25:37.308 on ClientConnection[f76f5d1ed8cc769e/7cf384a5996f704d(V1) with server4/193.167.100.100:443] 42.832 Original destination connection id: f76f5d1ed8cc769e (scid: 7cf384a5996f704d) >- CryptoStream[I|ClientHello] 42.833 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 43.033/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 42.833 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 42.867 Discarding packet (177 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 42.868 Discarding packet (523 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys not installed)) 42.868 <- (3) Packet I|1|L|56|1 Token=[] AckFrame[0|Δ1] 42.868 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 43.068/Initial, because peerAwaitingAddressValidation | RTT:100/25 42.908 <- (15) Packet A|11|S0|52e00e7b198635e1|1057|1 StreamFrame[0(CIB),0,1024,fin] 42.908 -> Packet A|7|S0|2b465cfb4c1603d8d6123132|43|2 ConnectionCloseFrame[0|0|] AckFrame[9-7,5,3-2|Δ0] 42.908 <- (16) Packet A|12|S0|52e00e7b198635e1|1057|1 StreamFrame[0(CIB),0,1024,fin] 42.909 -> Packet A|8|S0|2b465cfb4c1603d8d6123132|43|2 ConnectionCloseFrame[0|0|] AckFrame[9-7,5,3-2|Δ0] 42.939 <- (17) Packet A|13|S0|52e00e7b198635e1|33|1 ConnectionCloseFrame[0|0|] 43.067 loss detection timeout handler running Sending probe 0, because no ack since 42.833. Current RTT: 34/17. 43.067 Sending probe because peer awaiting address validation 43.067 (Probe is Initial ping, because there is no Initial data to retransmit) 43.068 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 43.272/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/17 43.068 -> Packet PI|1|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 43.099 <- (4) Packet I|2|L|55|1 Token=[] AckFrame[1-0|Δ0] 43.100 probe count not reset on ack because handshake not yet confirmed 43.100 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 203 millis, based on 43.304/Initial, because peerAwaitingAddressValidation | RTT:34/17 43.303 loss detection timeout handler running Sending probe 1, because no ack since 43.068. Current RTT: 34/14. 43.303 Sending probe because peer awaiting address validation 43.303 (Probe is Initial ping, because there is no Initial data to retransmit) 43.303 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 359 millis, based on 43.663/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 43.303 -> Packet PI|2|L|1201|3 Token=[] PingFrame[] Padding(2) Padding(1151) 43.618 <- (5) Packet I|4|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 43.620 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 43.710/Handshake, because peerAwaitingAddressValidation | RTT:34/14 43.620 Discarding pn space Initial because first Handshake message is being sent 43.620 Discarding packet (1200 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 43.620 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 89 millis, based on 43.710/Handshake, because peerAwaitingAddressValidation | RTT:34/14 43.620 -> Packet I|3|L|1201|2 Token=[] AckFrame[4,2-1|Δ0] Padding(1147) 43.652 <- (7) Packet H|4|L|177|1 CryptoFrame[0,124] 43.652 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 43.652 <- (8) Packet H|5|L|523|1 CryptoFrame[124,469] 43.653 -> Packet H|0|L|50|1 AckFrame[4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate] 43.653 -> Packet H|1|L|50|1 AckFrame[5-4|Δ0] 43.709 loss detection timeout handler running 43.709 Sending probe 0. Current RTT: 34/14. 43.709 Sending probe because peer awaiting address validation 43.709 (Probe is a handshake ping) 43.710 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 179 millis, based on 43.890/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 43.709 -> Packet PH|2|L|48|2 PingFrame[] Padding(2) 43.776 <- (9) Packet H|8|L|134|1 CryptoFrame[593,80] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 43.777 -> Packet H|3|L|52|1 AckFrame[8,5-4|Δ0] 43.809 <- (10) Packet H|10|L|89|1 CryptoFrame[673,36] >- CryptoStream[H|Finished] 43.809 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 179 millis, based on 43.989/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 43.809 -> Packet H|4|L|91|2 CryptoFrame[0,36] AckFrame[8,5-4|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 43.809 Starting downloading https://server4:443/opfehsigys at 25:38.285 on ClientConnection[f76f5d1ed8cc769e/7cf384a5996f704d(V1) with server4/193.167.100.100:443] 43.809 -> Packet H|5|L|54|1 AckFrame[10,8,5-4|Δ0] 43.810 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 179 millis, based on 43.990/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 43.810 -> Packet A|0|S0|340e1c0e34960a84822cd552|51|1 StreamFrame[0(CIB),0,17,fin] 43.888 <- (11) Packet H|11|L|89|1 CryptoFrame[673,36] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 43.888 -> Packet H|6|L|54|1 AckFrame[11-10,8,5-4|Δ0] 43.989 loss detection timeout handler running Sending probe 1, because no ack since 43.809. Current RTT: 34/14. 43.989 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 43.989 (Probe is a handshake retransmit) 43.989 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 359 millis, based on 44.349/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 43.989 -> Packet PH|7|L|84|1 CryptoFrame[0,36] 43.990 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 359 millis, based on 44.350/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:34/14 43.990 -> Packet PH|8|L|84|1 CryptoFrame[0,36] 44.020 <- (12) Packet A|0|S0|7cf384a5996f704d|30|1 HandshakeDoneFrame[] 44.021 State is set to Confirmed reschedule loss detection timer for PTO over 249 millis, based on 44.270/App, because ackElicitingInFlight | RTT:34/14 reschedule loss detection timer for PTO over -96 millis, based on 43.925/App, because ackElicitingInFlight | RTT:34/14 44.021 Discarding pn space Handshake because HandshakeDone is received 44.021 loss detection timeout handler running Sending probe 0, because no ack since 43.810. Current RTT: 34/14. 44.021 <- (13) Packet A|7|S0|7cf384a5996f704d|40|1 NewTokenFrame[00c1a70064681ba5a2] 44.021 (Probe is retransmit on level App) 44.021 <- (14) Packet A|8|S0|7cf384a5996f704d|290|1 CryptoFrame[0,257] 44.021 -> Packet A|1|S0|340e1c0e34960a84822cd552|37|1 AckFrame[7,0|Δ0] -< CryptoStream[A|NewSessionTicket] reschedule loss detection timer for PTO over 229 millis, based on 44.251/App, because ackElicitingInFlight | RTT:34/14 44.021 -> Packet PA|2|S0|340e1c0e34960a84822cd552|51|1 StreamFrame[0(CIB),0,17,fin] 44.021 <- (15) Packet A|10|S0|7cf384a5996f704d|61|1 NewConnectionIdFrame[1,<0|ed0a9639decb9beeb5b6d752|8d6f458cc7e6c29314a7b1558a738141] 44.022 -> Packet A|3|S0|340e1c0e34960a84822cd552|39|1 AckFrame[10,8-7,0|Δ0] 44.053 <- (16) Packet A|11|S0|7cf384a5996f704d|1057|1 StreamFrame[0(CIB),0,1024,fin] 44.054 Finished downloading https://server4:443/opfehsigys at 25:38.529 on ClientConnection[f76f5d1ed8cc769e/7cf384a5996f704d(V1) with server4/193.167.100.100:443] 44.054 Closing ClientConnection[f76f5d1ed8cc769e/7cf384a5996f704d(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 44.054 -> Packet A|4|S0|340e1c0e34960a84822cd552|43|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,8-7,0|Δ0] 44.054 Creating connection with server4:443 with v1 44.055 Setting up connection for downloading https://server4:443/ehzxerbqhf at 25:38.530 on ClientConnection[c486dfef731f788c/bab638f06497330b(V1) with server4/193.167.100.100:443] 44.055 Original destination connection id: c486dfef731f788c (scid: bab638f06497330b) >- CryptoStream[I|ClientHello] 44.055 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44.256/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.055 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.059 <- (17) Packet A|12|S0|7cf384a5996f704d|291|1 CryptoFrame[257,257] 44.059 -> Packet A|5|S0|340e1c0e34960a84822cd552|43|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,8-7,0|Δ0] 44.078 <- (18) Packet A|13|S0|7cf384a5996f704d|35|1 AckFrame[3-1|Δ26] 44.078 -> Packet A|6|S0|340e1c0e34960a84822cd552|43|2 ConnectionCloseFrame[0|0|] AckFrame[11-10,8-7,0|Δ0] 44.085 <- (19) Packet A|14|S0|7cf384a5996f704d|33|1 ConnectionCloseFrame[0|0|] 44.089 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 44.091 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.291/Handshake, because peerAwaitingAddressValidation | RTT:100/25 44.091 Discarding pn space Initial because first Handshake message is being sent 44.092 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 44.089 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] reschedule loss detection timer for PTO over 199 millis, based on 44.292/Handshake, because peerAwaitingAddressValidation | RTT:100/25 44.091 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 44.092 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 44.090 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 44.092 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 44.090 <- (4) Packet H|2|L|133|1 CryptoFrame[593,79] 44.092 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 44.090 <- (5) Packet H|3|L|89|1 CryptoFrame[672,36] 44.094 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] >- CryptoStream[H|Finished] 44.094 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.294/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.094 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 44.094 Starting downloading https://server4:443/ehzxerbqhf at 25:38.570 on ClientConnection[c486dfef731f788c/bab638f06497330b(V1) with server4/193.167.100.100:443] 44.094 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 44.094 -> Packet H|4|L|50|1 AckFrame[3-0|Δ0] 44.095 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.295/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.094 -> Packet A|0|S0|85c8a851d6feb9da0393289b|51|1 StreamFrame[0(CIB),0,17,fin] 44.125 <- (7) Packet A|0|S0|bab638f06497330b|30|1 HandshakeDoneFrame[] 44.125 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 44.294/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 44.319/App, because ackElicitingInFlight | RTT:100/25 44.125 Discarding pn space Handshake because HandshakeDone is received 44.125 <- (8) Packet A|1|S0|bab638f06497330b|40|1 NewTokenFrame[00c1a70064681ba5a2] 44.126 -> Packet A|1|S0|85c8a851d6feb9da0393289b|35|1 AckFrame[1-0|Δ0] 44.126 <- (9) Packet A|3|S0|bab638f06497330b|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 44.126 Discarding packet (57 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 44.126 <- (11) Packet A|4|S0|bab638f06497330b|61|1 NewConnectionIdFrame[1,<0|a6820294e12666035f97d3ba|4e6d638a8415c1c79e2c1dfe18f31d7f] 44.126 -> Packet A|2|S0|85c8a851d6feb9da0393289b|37|1 AckFrame[4-3,1-0|Δ0] 44.127 <- (12) Packet A|5|S0|bab638f06497330b|1057|1 StreamFrame[0(CIB),0,1024,fin] 44.127 Finished downloading https://server4:443/ehzxerbqhf at 25:38.603 on ClientConnection[c486dfef731f788c/bab638f06497330b(V1) with server4/193.167.100.100:443] 44.127 Closing ClientConnection[c486dfef731f788c/bab638f06497330b(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 44.127 -> Packet A|3|S0|85c8a851d6feb9da0393289b|41|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1-0|Δ0] 44.128 Creating connection with server4:443 with v1 44.128 Setting up connection for downloading https://server4:443/ppfajhokku at 25:38.604 on ClientConnection[0619bac79fbf3dfc/5d8bfbb5075b4481(V1) with server4/193.167.100.100:443] 44.128 Original destination connection id: 0619bac79fbf3dfc (scid: 5d8bfbb5075b4481) >- CryptoStream[I|ClientHello] 44.129 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44.329/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.129 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.151 <- (13) Packet A|6|S0|bab638f06497330b|35|1 AckFrame[0|Δ25] 44.152 -> Packet A|4|S0|85c8a851d6feb9da0393289b|41|2 ConnectionCloseFrame[0|0|] AckFrame[5-3,1-0|Δ0] 44.162 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 44.164 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.364/Handshake, because peerAwaitingAddressValidation | RTT:100/25 44.165 Discarding pn space Initial because first Handshake message is being sent 44.165 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.365/Handshake, because peerAwaitingAddressValidation | RTT:100/25 44.163 <- (2) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|] 44.164 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 44.163 <- (3) Packet H|2|L|132|1 CryptoFrame[593,78] -< CryptoStream[H|] 44.165 -> Packet H|0|L|50|1 AckFrame[1|Δ0] 44.163 <- (4) Packet H|3|L|89|1 CryptoFrame[671,36] -< CryptoStream[H|] 44.165 -> Packet H|1|L|50|1 AckFrame[2-1|Δ0] 44.165 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 44.165 -> Packet H|2|L|50|1 AckFrame[3-1|Δ0] 44.201 <- (6) Packet H|4|L|177|1 CryptoFrame[0,124] 44.202 - unknown transport parameter 0xf739bbc1b666d09, size 1 >- CryptoStream[H|Finished] 44.203 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.403/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.203 -> Packet H|3|L|89|2 CryptoFrame[0,36] AckFrame[3-1|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 44.204 Starting downloading https://server4:443/ppfajhokku at 25:38.679 on ClientConnection[0619bac79fbf3dfc/5d8bfbb5075b4481(V1) with server4/193.167.100.100:443] 44.204 -> Packet H|4|L|50|1 AckFrame[4-1|Δ0] 44.204 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.404/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.204 -> Packet A|0|S0|7f00f6bc710bba90ba060e2b|51|1 StreamFrame[0(CIB),0,17,fin] 44.235 <- (7) Packet A|0|S0|5d8bfbb5075b4481|30|1 HandshakeDoneFrame[] 44.235 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 44.403/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 193 millis, based on 44.429/App, because ackElicitingInFlight | RTT:100/25 44.235 Discarding pn space Handshake because HandshakeDone is received 44.235 <- (8) Packet A|1|S0|5d8bfbb5075b4481|40|1 NewTokenFrame[00c1a70064681ba5a2] 44.235 <- (9) Packet A|2|S0|5d8bfbb5075b4481|290|1 CryptoFrame[0,257] 44.235 -> Packet A|1|S0|7f00f6bc710bba90ba060e2b|35|1 AckFrame[1-0|Δ0] -< CryptoStream[A|NewSessionTicket] 44.236 <- (10) Packet A|8|S0|5d8bfbb5075b4481|291|1 CryptoFrame[257,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 44.236 <- (11) Packet A|9|S0|5d8bfbb5075b4481|61|1 NewConnectionIdFrame[1,<0|fa2f2279fcc8f58d2cd29049|af6285ce7139861461bd5c820e7cc3e4] 44.236 -> Packet A|2|S0|7f00f6bc710bba90ba060e2b|37|1 AckFrame[8,2-0|Δ0] 44.237 <- (12) Packet A|10|S0|5d8bfbb5075b4481|1057|1 StreamFrame[0(CIB),0,1024,fin] 44.237 -> Packet A|3|S0|7f00f6bc710bba90ba060e2b|37|1 AckFrame[10-8,2-0|Δ0] 44.237 Finished downloading https://server4:443/ppfajhokku at 25:38.713 on ClientConnection[0619bac79fbf3dfc/5d8bfbb5075b4481(V1) with server4/193.167.100.100:443] 44.237 Closing ClientConnection[0619bac79fbf3dfc/5d8bfbb5075b4481(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 44.237 Creating connection with server4:443 with v1 44.237 -> Packet A|4|S0|7f00f6bc710bba90ba060e2b|41|2 ConnectionCloseFrame[0|0|] AckFrame[10-8,2-0|Δ0] 44.238 Setting up connection for downloading https://server4:443/ibqghqposb at 25:38.713 on ClientConnection[7a1861afe61cc846/e2d22e5afe0259d2(V1) with server4/193.167.100.100:443] 44.238 Original destination connection id: 7a1861afe61cc846 (scid: e2d22e5afe0259d2) >- CryptoStream[I|ClientHello] 44.239 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44.439/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.239 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.272 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 44.274 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.474/Handshake, because peerAwaitingAddressValidation | RTT:100/25 44.274 Discarding pn space Initial because first Handshake message is being sent 44.274 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.474/Handshake, because peerAwaitingAddressValidation | RTT:100/25 44.274 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 44.272 <- (2) Packet H|0|L|177|1 CryptoFrame[0,124] 44.275 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 44.273 <- (3) Packet H|1|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate] 44.275 -> Packet H|0|L|50|1 AckFrame[0|Δ0] 44.273 <- (4) Packet H|2|L|134|1 CryptoFrame[593,80] 44.275 -> Packet H|1|L|50|1 AckFrame[1-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 44.276 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 44.276 -> Packet H|2|L|50|1 AckFrame[2-0|Δ0] 44.359 <- (6) Packet H|4|L|523|1 CryptoFrame[124,469] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 44.360 <- (7) Packet H|5|L|134|1 CryptoFrame[593,80] 44.360 -> Packet H|3|L|52|1 AckFrame[4,2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify] 44.360 -> Packet H|4|L|52|1 AckFrame[5-4,2-0|Δ0] 44.391 <- (8) Packet H|6|L|89|1 CryptoFrame[673,36] >- CryptoStream[H|Finished] 44.391 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.592/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.391 -> Packet H|5|L|91|2 CryptoFrame[0,36] AckFrame[5-4,2-0|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 44.392 Starting downloading https://server4:443/ibqghqposb at 25:38.868 on ClientConnection[7a1861afe61cc846/e2d22e5afe0259d2(V1) with server4/193.167.100.100:443] 44.392 -> Packet H|6|L|52|1 AckFrame[6-4,2-0|Δ0] 44.392 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.592/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.392 -> Packet A|0|S0|851674b356c878719242d261|51|1 StreamFrame[0(CIB),0,17,fin] 44.423 <- (9) Packet A|0|S0|e2d22e5afe0259d2|30|1 HandshakeDoneFrame[] 44.423 State is set to Confirmed reschedule loss detection timer for PTO over 168 millis, based on 44.591/Handshake, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over 194 millis, based on 44.617/App, because ackElicitingInFlight | RTT:100/25 44.423 Discarding pn space Handshake because HandshakeDone is received 44.423 <- (10) Packet A|1|S0|e2d22e5afe0259d2|40|1 NewTokenFrame[00c1a70064681ba5a2] 44.423 -> Packet A|1|S0|851674b356c878719242d261|35|1 AckFrame[1-0|Δ0] 44.423 <- (11) Packet A|3|S0|e2d22e5afe0259d2|291|1 CryptoFrame[257,257] -< CryptoStream[A|] 44.443 -> Packet A|2|S0|851674b356c878719242d261|38|1 AckFrame[3,1-0|Δ19] 44.449 <- (12) Packet A|8|S0|e2d22e5afe0259d2|35|1 AckFrame[0|Δ25] 44.450 cancelling loss detection timer (no loss time set, no ack eliciting in flight, peer not awaiting address validation (2)) 44.524 <- (13) Packet A|9|S0|e2d22e5afe0259d2|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 44.543 -> Packet A|3|S0|851674b356c878719242d261|40|1 AckFrame[9-8,3,1-0|Δ19] 44.613 <- (14) Packet A|10|S0|e2d22e5afe0259d2|290|1 CryptoFrame[0,257] -< CryptoStream[A|NewSessionTicket,NewSessionTicket] 44.632 -> Packet A|4|S0|851674b356c878719242d261|40|1 AckFrame[10-8,3,1-0|Δ19] 44.664 <- (15) Packet A|12|S0|e2d22e5afe0259d2|1057|1 StreamFrame[0(CIB),0,1024,fin] 44.664 Finished downloading https://server4:443/ibqghqposb at 25:39.140 on ClientConnection[7a1861afe61cc846/e2d22e5afe0259d2(V1) with server4/193.167.100.100:443] 44.665 Closing ClientConnection[7a1861afe61cc846/e2d22e5afe0259d2(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 44.665 -> Packet A|5|S0|851674b356c878719242d261|45|2 ConnectionCloseFrame[0|0|] AckFrame[12,10-8,3,1-0|Δ0] 44.665 Creating connection with server4:443 with v1 44.665 Setting up connection for downloading https://server4:443/hnvvopbvub at 25:39.141 on ClientConnection[f13664ce7e68ac8c/3cc7b7f8cb7827d1(V1) with server4/193.167.100.100:443] 44.665 Original destination connection id: f13664ce7e68ac8c (scid: 3cc7b7f8cb7827d1) >- CryptoStream[I|ClientHello] 44.666 getPtoTimeAndSpace: no ack eliciting in flight and no handshake keys -> probe Initial reschedule loss detection timer for PTO over 199 millis, based on 44.866/Initial, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.666 -> Packet I|0|L|1200|2 Token=[] CryptoFrame[0,257] Padding(896) 44.700 <- (1) Packet I|0|L|1200|2 Token=[] CryptoFrame[0,123] Padding(1023) -< CryptoStream[I|ServerHello] 44.702 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 44.902/Handshake, because peerAwaitingAddressValidation | RTT:100/25 44.702 Discarding pn space Initial because first Handshake message is being sent 44.703 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 44.701 <- (2) Packet H|2|L|134|1 CryptoFrame[593,80] reschedule loss detection timer for PTO over 199 millis, based on 44.903/Handshake, because peerAwaitingAddressValidation | RTT:100/25 -< CryptoStream[H|] 44.702 -> Packet I|1|L|1201|2 Token=[] AckFrame[0|Δ0] Padding(1149) 44.703 Discarding packet (56 bytes) that cannot be decrypted (Missing keys for encryption level Initial (keys discarded)) 44.703 -> Packet H|0|L|50|1 AckFrame[2|Δ0] 44.739 <- (4) Packet H|4|L|177|1 CryptoFrame[0,124] 44.739 - unknown transport parameter 0xf739bbc1b666d09, size 1 -< CryptoStream[H|EncryptedExtensions] 44.740 -> Packet H|1|L|52|1 AckFrame[4,2|Δ0] 44.771 <- (5) Packet H|6|L|89|1 CryptoFrame[673,36] -< CryptoStream[H|EncryptedExtensions] 44.771 -> Packet H|2|L|54|1 AckFrame[6,4,2|Δ0] 44.881 <- (6) Packet H|8|L|523|1 CryptoFrame[124,469] >- CryptoStream[H|Finished] 44.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 45.083/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.883 -> Packet H|3|L|94|2 CryptoFrame[0,36] AckFrame[6,4,2|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 44.881 <- (7) Packet H|9|L|523|1 CryptoFrame[124,469] 44.883 Starting downloading https://server4:443/hnvvopbvub at 25:39.359 on ClientConnection[f13664ce7e68ac8c/3cc7b7f8cb7827d1(V1) with server4/193.167.100.100:443] 44.883 -> Packet H|4|L|56|1 AckFrame[8,6,4,2|Δ0] -< CryptoStream[H|EncryptedExtensions,Certificate,CertificateVerify,Finished] 44.883 -> Packet H|5|L|56|1 AckFrame[9-8,6,4,2|Δ0] 44.883 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 199 millis, based on 45.083/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 44.883 -> Packet A|0|S0|396ba891ab5d5a35b425d731|51|1 StreamFrame[0(CIB),0,17,fin] 45.083 loss detection timeout handler running Sending probe 0, because no ack since 44.883. Current RTT: 100/25. 45.083 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 45.083 (Probe is a handshake retransmit) 45.083 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 399 millis, based on 45.483/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 45.083 -> Packet PH|6|L|84|1 CryptoFrame[0,36] 45.482 loss detection timeout handler running Sending probe 1, because no ack since 44.883. Current RTT: 100/25. 45.482 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake 45.482 (Probe is a handshake retransmit) 45.482 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 46.282/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 45.482 -> Packet PH|7|L|84|1 CryptoFrame[0,36] 45.483 getPtoTimeAndSpace: no ack eliciting in flight but handshake keys -> probe Handshake reschedule loss detection timer for PTO over 799 millis, based on 46.283/Handshake, because peerAwaitingAddressValidation ackElicitingInFlight | RTT:100/25 45.483 -> Packet PH|8|L|84|1 CryptoFrame[0,36] 45.514 <- (8) Packet A|0|S0|3cc7b7f8cb7827d1|30|1 HandshakeDoneFrame[] 45.514 State is set to Confirmed reschedule loss detection timer for PTO over 269 millis, based on 45.783/App, because ackElicitingInFlight | RTT:100/25 reschedule loss detection timer for PTO over -405 millis, based on 45.108/App, because ackElicitingInFlight | RTT:100/25 45.514 Discarding pn space Handshake because HandshakeDone is received 45.514 loss detection timeout handler running Sending probe 0, because no ack since 44.883. Current RTT: 100/25. 45.514 <- (9) Packet A|1|S0|3cc7b7f8cb7827d1|40|1 NewTokenFrame[00c1a70064681ba5a3] 45.514 (Probe is retransmit on level App) 45.514 <- (10) Packet A|2|S0|3cc7b7f8cb7827d1|290|1 CryptoFrame[0,257] reschedule loss detection timer for PTO over 449 millis, based on 45.964/App, because ackElicitingInFlight | RTT:100/25 -< CryptoStream[A|NewSessionTicket] 45.514 -> Packet PA|1|S0|396ba891ab5d5a35b425d731|56|2 AckFrame[1-0|Δ0] StreamFrame[0(CIB),0,17,fin] 45.514 Discarding packet (58 bytes) that cannot be decrypted (Missing keys for encryption level Handshake (keys discarded)) 45.534 -> Packet A|2|S0|396ba891ab5d5a35b425d731|36|1 AckFrame[2-0|Δ19] 45.546 <- (12) Packet A|7|S0|3cc7b7f8cb7827d1|1057|1 StreamFrame[0(CIB),0,1024,fin] 45.546 Finished downloading https://server4:443/hnvvopbvub at 25:40.022 on ClientConnection[f13664ce7e68ac8c/3cc7b7f8cb7827d1(V1) with server4/193.167.100.100:443] 45.546 Closing ClientConnection[f13664ce7e68ac8c/3cc7b7f8cb7827d1(V1) with server4/193.167.100.100:443] (reason: ImmediateClose) 45.547 -> Packet A|3|S0|396ba891ab5d5a35b425d731|41|2 ConnectionCloseFrame[0|0|] AckFrame[7,2-0|Δ0]