811cacc2253270c2: No root crt list specified -- certificate will not be verified. 811cacc2253270c2: Sending ALPN list (1): hq-interop 811cacc2253270c2: Sending transport parameter TLS extension (83 bytes): 811cacc2253270c2: Extension list (83 bytes): 811cacc2253270c2: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 811cacc2253270c2: Extension type: 4 (initial_max_data), length 4, 80100000 811cacc2253270c2: Extension type: 8 (max_streams_bidi), length 2, 4200 811cacc2253270c2: Extension type: 1 (idle_timeout), length 4, 8002bf20 811cacc2253270c2: Extension type: 3 (max_packet_size), length 2, 45a0 811cacc2253270c2: Extension type: 9 (max_streams_uni), length 2, 4200 811cacc2253270c2: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 811cacc2253270c2: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 811cacc2253270c2: Extension type: 14 (active_connection_id_limit), length 1, 08 811cacc2253270c2: Extension type: 11 (max_ack_delay), length 1, 0a 811cacc2253270c2: Extension type: 15 (hcid), length 8, 74dbadf71dc18ff2 811cacc2253270c2: Extension type: 4057 (unknown), length 2, 5cac 811cacc2253270c2: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 811cacc2253270c2: Extension type: 29016 (enable_time_stamp), length 1, 03 811cacc2253270c2: Extension type: 10930 (grease_quic_bit), length 0 811cacc2253270c2: Preparing GET on stream 0 for /navy-scalding-engineer 811cacc2253270c2: Sending packet type: 2 (initial), S0, Q1, Version 1, 811cacc2253270c2: <811cacc2253270c2>, <74dbadf71dc18ff2>, Seq: 114210, pl: 583 811cacc2253270c2: Token length: 37, Token: 43611df8e1f473406e30453400064fd9... 811cacc2253270c2: Prepared 563 bytes 811cacc2253270c2: ping, 1 bytes 811cacc2253270c2: crypto_hs, offset 0, length 558: 0100022a0303eb99... 811cacc2253270c2: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 811cacc2253270c2: <811cacc2253270c2>, <74dbadf71dc18ff2>, Seq: 0, pl: 581 811cacc2253270c2: Prepared 561 bytes 811cacc2253270c2: stream 0, offset 0, length 29, fin = 1: 474554202f6e6176... 811cacc2253270c2: padding, 529 bytes 811cacc2253270c2: Sending 1252 bytes to 193.167.100.100:443 at T=0.001870 (3410e118) 811cacc2253270c2: Receiving 1200 bytes from 193.167.100.100:443 at T=0.035976 (34116652) 811cacc2253270c2: Receiving packet type: 2 (initial), S0, Q1, Version 1, 811cacc2253270c2: <74dbadf71dc18ff2>, <443dc8e36d52b6108600bae5>, Seq: 0, pl: 1133 811cacc2253270c2: Token length: 37, Token: 43611df8e1f473406e30453400064fd9... 811cacc2253270c2: Decrypted 1113 bytes 811cacc2253270c2: crypto_hs, offset 0, length 129: 0200007d03037e10... 811cacc2253270c2: padding, 980 bytes 811cacc2253270c2: Receiving 89 bytes from 193.167.100.100:443 at T=0.036221 (34116747) 811cacc2253270c2: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 811cacc2253270c2: <74dbadf71dc18ff2>, <443dc8e36d52b6108600bae5>, Seq: 1, pl: 60 811cacc2253270c2: Decrypted 40 bytes 811cacc2253270c2: crypto_hs, offset 128, length 36: 14000020d9a68795... 811cacc2253270c2: Sending packet type: 4 (handshake), S0, Q1, Version 1, 811cacc2253270c2: <443dc8e36d52b6108600bae5>, <74dbadf71dc18ff2>, Seq: 0, pl: 25 811cacc2253270c2: Prepared 5 bytes 811cacc2253270c2: ack (nb=0), 1 811cacc2253270c2: Sending 54 bytes to 193.167.100.100:443 at T=0.036256 (3411676a) 811cacc2253270c2: Receiving 96 bytes from 193.167.100.100:443 at T=0.036335 (341167b9) 811cacc2253270c2: Receiving packet type: 2 (initial), S0, Q1, Version 1, 811cacc2253270c2: <74dbadf71dc18ff2>, <443dc8e36d52b6108600bae5>, Seq: 1, pl: 29 811cacc2253270c2: Token length: 37, Token: 43611df8e1f473406e30453400064fd9... 811cacc2253270c2: Decrypted 9 bytes 811cacc2253270c2: ack (nb=0), 114210 811cacc2253270c2: Received unpadded initial, length=96 811cacc2253270c2: Receiving 181 bytes from 193.167.100.100:443 at T=0.071543 (3411f141) 811cacc2253270c2: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 811cacc2253270c2: <74dbadf71dc18ff2>, <443dc8e36d52b6108600bae5>, Seq: 2, pl: 152 811cacc2253270c2: Decrypted 132 bytes 811cacc2253270c2: crypto_hs, offset 0, length 128: 0800007c007a0010... 811cacc2253270c2: Received transport parameter TLS extension (97 bytes): 811cacc2253270c2: Extension list (97 bytes): 811cacc2253270c2: Extension type: 0 (ocid), length 8, 811cacc2253270c2 811cacc2253270c2: Extension type: 1 (idle_timeout), length 4, 8001d4c0 811cacc2253270c2: Extension type: 2 (stateless_reset_token), length 16, d5b612359d13c4d1db3cfa2120a20319 811cacc2253270c2: Extension type: 3 (max_packet_size), length 2, 45dc 811cacc2253270c2: Extension type: 4 (initial_max_data), length 4, 80100000 811cacc2253270c2: Extension type: 5 (max_stream_data_bidi_local), length 4, 81000000 811cacc2253270c2: Extension type: 6 (max_stream_data_bidi_remote), length 4, 81000000 811cacc2253270c2: Extension type: 7 (max_stream_data_uni), length 4, 81000000 811cacc2253270c2: Extension type: 8 (max_streams_bidi), length 2, 4080 811cacc2253270c2: Extension type: 9 (max_streams_uni), length 2, 4080 811cacc2253270c2: Extension type: 14 (active_connection_id_limit), length 1, 08 811cacc2253270c2: Extension type: 15 (hcid), length 12, 443dc8e36d52b6108600bae5 811cacc2253270c2: Extension type: 1113404765106498825 (unknown), length 1, 08 811cacc2253270c2: The session was properly resumed! 811cacc2253270c2: Zero RTT data is accepted! 811cacc2253270c2: Negotiated ALPN: hq-interop 811cacc2253270c2: Sending packet type: 4 (handshake), S0, Q1, Version 1, 811cacc2253270c2: <443dc8e36d52b6108600bae5>, <74dbadf71dc18ff2>, Seq: 1, pl: 64 811cacc2253270c2: Prepared 44 bytes 811cacc2253270c2: ack (nb=0), 1-2 811cacc2253270c2: crypto_hs, offset 0, length 36: 14000020abae84a9... 811cacc2253270c2: Sending packet type: 6 (1rtt protected), S0, Q1, 811cacc2253270c2: <443dc8e36d52b6108600bae5>, Seq: 1 (1), Phi: 0, 811cacc2253270c2: Prepared 281 bytes 811cacc2253270c2: new_connection_id[1]: 0xa60b47886a057da2, 308860e4374b9aefad5395f5d6f21a4b 811cacc2253270c2: new_connection_id[2]: 0x325f3c3f3a11f1d6, 2d947587e5ab4362746c20a1eebdefc9 811cacc2253270c2: new_connection_id[3]: 0x74470449e3c5068f, 5bbe9b49b64a7d912c609092367182d2 811cacc2253270c2: new_connection_id[4]: 0xe44ca716d3d23743, 15998911a0f9c226d1e9fed1f285175e 811cacc2253270c2: new_connection_id[5]: 0xd201c16db7261156, 87e8a1a06c47b54240c453c36c0cd5c4 811cacc2253270c2: new_connection_id[6]: 0x6e5928090cb12701, 02d48ec2c58466fe3ba81cedd8225795 811cacc2253270c2: new_connection_id[7]: 0x97eb03869e3e9d35, cb7d3e70900a41ed9768c2d1a9f6f0d1 811cacc2253270c2: padding, 85 bytes 811cacc2253270c2: T= 0.071720, cwin: 15990,flight: 1064,nb_ret: 0,rtt_min: 34465,rtt: 34465,rtt_var: 17232,max_ack_delay: 0,state: 13 811cacc2253270c2: Sending 404 bytes to 193.167.100.100:443 at T=0.071720 (3411f1f2) 811cacc2253270c2: Connection established. Version = 1, I-CID: 811cacc2253270c2, verified: 1 811cacc2253270c2: Receiving 30 bytes from 193.167.100.100:443 at T=0.103390 (34126da8) 811cacc2253270c2: Receiving packet type: 6 (1rtt protected), S1, Q1, 811cacc2253270c2: <74dbadf71dc18ff2>, Seq: 3 (3), Phi: 0, 811cacc2253270c2: Decrypted 1 bytes 811cacc2253270c2: handshake_done 811cacc2253270c2: T= 0.103390, cwin: 16105,flight: 917,nb_ret: 0,rtt_min: 34465,rtt: 34465,rtt_var: 17232,max_ack_delay: 0,state: 14 811cacc2253270c2: Sending packet type: 6 (1rtt protected), S0, Q1, 811cacc2253270c2: <443dc8e36d52b6108600bae5>, Seq: 2 (2), Phi: 0, 811cacc2253270c2: Prepared 25 bytes 811cacc2253270c2: ack (nb=0), 3 811cacc2253270c2: padding, 20 bytes 811cacc2253270c2: T= 0.103467, cwin: 16105,flight: 972,nb_ret: 0,rtt_min: 34465,rtt: 34465,rtt_var: 17232,max_ack_delay: 0,state: 14 811cacc2253270c2: Sending 55 bytes to 193.167.100.100:443 at T=0.103467 (34126df5) 811cacc2253270c2: Receiving 290 bytes from 193.167.100.100:443 at T=0.103660 (34126eb6) 811cacc2253270c2: Receiving packet type: 6 (1rtt protected), S1, Q1, 811cacc2253270c2: <74dbadf71dc18ff2>, Seq: 4 (4), Phi: 0, 811cacc2253270c2: Decrypted 261 bytes 811cacc2253270c2: crypto_hs, offset 0, length 257: 040000fd00093a80... 811cacc2253270c2: T= 0.103660, cwin: 16105,flight: 972,nb_ret: 0,rtt_min: 34465,rtt: 34465,rtt_var: 17232,max_ack_delay: 0,state: 14 811cacc2253270c2: Receiving 55 bytes from 193.167.100.100:443 at T=0.103723 (34126ef5) 811cacc2253270c2: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 811cacc2253270c2: <74dbadf71dc18ff2>, <443dc8e36d52b6108600bae5>, Seq: -1, pl: 26 811cacc2253270c2: Header or encryption error: 429. 811cacc2253270c2: Receiving 35 bytes from 193.167.100.100:443 at T=0.103736 (34126f02) 811cacc2253270c2: Receiving packet type: 6 (1rtt protected), S1, Q1, 811cacc2253270c2: <74dbadf71dc18ff2>, Seq: 5 (5), Phi: 0, 811cacc2253270c2: Decrypted 6 bytes 811cacc2253270c2: ack (nb=0), 0-1 811cacc2253270c2: T= 0.103736, cwin: 16990,flight: 55,nb_ret: 0,rtt_min: 32016,rtt: 34158,rtt_var: 13536,max_ack_delay: 0,state: 14 811cacc2253270c2: Sending packet type: 6 (1rtt protected), S0, Q1, 811cacc2253270c2: <443dc8e36d52b6108600bae5>, Seq: 3 (3), Phi: 0, 811cacc2253270c2: Prepared 25 bytes 811cacc2253270c2: ack (nb=0), 3-5 811cacc2253270c2: padding, 20 bytes 811cacc2253270c2: T= 0.103768, cwin: 16990,flight: 110,nb_ret: 0,rtt_min: 32016,rtt: 34158,rtt_var: 13536,max_ack_delay: 0,state: 14 811cacc2253270c2: Sending 55 bytes to 193.167.100.100:443 at T=0.103768 (34126f22) 811cacc2253270c2: Receiving 61 bytes from 193.167.100.100:443 at T=0.103923 (34126fbd) 811cacc2253270c2: Receiving packet type: 6 (1rtt protected), S1, Q1, 811cacc2253270c2: <74dbadf71dc18ff2>, Seq: 6 (6), Phi: 0, 811cacc2253270c2: Decrypted 32 bytes 811cacc2253270c2: new_connection_id[1]: 0x34b1d49f3492a7427decaf04, 64ad54cbb43a29a915c304829331bcf9 811cacc2253270c2: T= 0.103923, cwin: 16990,flight: 110,nb_ret: 0,rtt_min: 32016,rtt: 34158,rtt_var: 13536,max_ack_delay: 0,state: 14 811cacc2253270c2: Sending packet type: 6 (1rtt protected), S0, Q1, 811cacc2253270c2: <443dc8e36d52b6108600bae5>, Seq: 4 (4), Phi: 0, 811cacc2253270c2: Prepared 25 bytes 811cacc2253270c2: ack (nb=0), 3-6 811cacc2253270c2: padding, 19 bytes 811cacc2253270c2: T= 0.107988, cwin: 16990,flight: 165,nb_ret: 0,rtt_min: 32016,rtt: 34158,rtt_var: 13536,max_ack_delay: 0,state: 14 811cacc2253270c2: Sending 55 bytes to 193.167.100.100:443 at T=0.107988 (34127f9e) 811cacc2253270c2: Receiving 1057 bytes from 193.167.100.100:443 at T=0.199536 (3413e53a) 811cacc2253270c2: Receiving packet type: 6 (1rtt protected), S1, Q1, 811cacc2253270c2: <74dbadf71dc18ff2>, Seq: 9 (9), Phi: 0, 811cacc2253270c2: Decrypted 1028 bytes 811cacc2253270c2: stream 0, offset 0, length 1024, fin = 1: cc05126842a212d0... 811cacc2253270c2: T= 0.199536, cwin: 16990,flight: 165,nb_ret: 0,rtt_min: 32016,rtt: 34158,rtt_var: 13536,max_ack_delay: 0,state: 14 811cacc2253270c2: All done, Closing the connection. 811cacc2253270c2: Receiving 61 bytes from 193.167.100.100:443 at T=0.199793 (3413e63b) 811cacc2253270c2: Receiving packet type: 6 (1rtt protected), S1, Q1, 811cacc2253270c2: <74dbadf71dc18ff2>, Seq: 10 (10), Phi: 0, 811cacc2253270c2: Decrypted 32 bytes 811cacc2253270c2: new_connection_id[2]: 0xb37e899318d35d685c04e9fb, 4d948b9aea06adb4a134950587e55e32 811cacc2253270c2: Sending packet type: 6 (1rtt protected), S0, Q1, 811cacc2253270c2: <443dc8e36d52b6108600bae5>, Seq: 5 (5), Phi: 0, 811cacc2253270c2: Prepared 10 bytes 811cacc2253270c2: ack (nb=1), 9-10, 3-6 811cacc2253270c2: application_close, Error 0x0000, Reason length 0 811cacc2253270c2: Sending 40 bytes to 193.167.100.100:443 at T=0.199832 (3413e662) 811cacc2253270c2: Out of 1 zero RTT packets, 1 were acked by the server. 811cacc2253270c2: Received 1024 bytes in 0.499603 seconds, 0.016397 Mbps. 811cacc2253270c2: Sent 29 bytes in 0.499603 seconds, 0.000464 Mbps.