Successfully connected
TLS 1.3 OK; server-initiated key update accomplished;
Detailed description:
v.0.23.4-p (This TLS-1.3-only server supports ESNI, HelloRetryRequest, KeyUpdate, X25519Kyber768/draft0, ECDHE, FFDHE, etc.) CRYPTO_CONTEXT Protocol version: 0x0304 Cipher suite: 0x1301 (TLS_AES_128_GCM_SHA256) Key exchange: 0x001D (X25519) (Handshake level) Handshake secrets: Client: 0xE591FF7CFCD36F4FD1D21CB408DB858301181253C8C8C0590B35E662E4E075A5 Server: 0xC430EB2993915526664730CF9A5469FA4F7316CA675CB9AB4321D68E9979CDFE Handshake keys: Client write: 0x1967C32D219944E67314BA22FEE9B41A Server write: 0x0624F9A6AEE71732F196C2E3C23B9031 Handshake IVs: Client write (IV): 0xA47118D9939DA083B2CAD645 Server write (IV): 0x9EBF24425639F2185F2B7054 (Traffic level) Traffic secrets: Client: 0x624E47A66014BF9A51238CC42248198D824CB343ED4A6F3EFFF9924774776E09 Server: 0x683C6671C0DB0092F36C96E6937866A33D8C4BD9956BEDF1192402F1013153F9 KeyUpdates log, server: 0: 0xF9607F2A32B1574139E73CB3D974D2A8813F23BFFE3B65283CB1A3AD6EBE5E9E Traffic keys: Client write: 0x88CA4485D312AAEC10795D78F737EE4C Server write: 0x62AC0A31BDBC59ED0DBB78A82A3AE11D KeyUpdates log, server: 0: 0x3CE3559613F90D8B6E6532CA5F2FEDEE Traffic base IVs: Client write (base IV): 0x35E068234BF516898B9F8D95 Server write (base IV): 0xB89F6A3B7A7BEB347E566A94 KeyUpdates log, server: 0: 0x16094F719EAE6BB0BEC8D0DD --- Messages --- [Legacy ChangeCipherSpec message sent (server)] CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: BC:3E:57:D8:89:34:80:2A:5A:8D:4B:1D:4C:D2:E2:C6:76:12:F2:A2:25:A2:62:84:25:CB:28:C0:4B:57:9C:36 Client SessionID: 19:D2:5B:9B:1D:C1:95:6A:32:D1:F7:A0:61:05:C8:B7:D5:0B:00:23:60:48:2A:99:0F:EE:8B:6B:65:80:81:D1 Extensions: Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 13 (0x000D); "signature_algorithms" 00:12:05:03:04:03:08:07:08:06:08:05:08:04:06:01 05:01:04:01 Type: 23 (0x0017); /non-TLS-1.3/ Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw Type: 18 (0x0012); "signed_certificate_timestamp" Type: 51 (0x0033); "key_share" X25519 (0x001D) x = 0xD581EEA573EC221178C3ABCC0848C1F8F1D802E112A930527892F6A475674707 Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 Type: 16 (0x0010); "application_layer_protocol_negotiation" 00:0C:02:68:32:08:68:74:74:70:2F:31:2E:31 Type: 35 (0x0023); /non-TLS-1.3/ SERVER_HELLO (sent) Legacy Version: 0x0303 Cipher suite: 0x1301 (TLS_AES_128_GCM_SHA256) Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 SessionID: 19:D2:5B:9B:1D:C1:95:6A:32:D1:F7:A0:61:05:C8:B7:D5:0B:00:23:60:48:2A:99:0F:EE:8B:6B:65:80:81:D1 Extensions: Type: 51 (0x0033); "key_share" X25519 (0x001D) x = 0x145891E6697DAA111BD9A43EB39FA860847D09303D603128F82CE7451DAE456B Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] SERVER_HANDSHAKE_MESSAGES (sent) Type: 8 (0x08) - "encrypted_extensions" Length (octets, dec.): 2 00:00 Type: 11 (0x0B) - "certificate" Length (octets, dec.): 4191 [...] /skipped 4191 data octets/ Type: 15 (0x0F) - "certificate_verify" Length (octets, dec.): 106 05:03:00:66:30:64:02:30:56:64:F6:0C:88:95:75:D5:21:F8:40:67:C2:8A:FC:63:CB:ED:CD:FE:4F:83:A6:11 62:74:A1:D6:7A:23:9B:8F:76:B3:43:CF:F1:57:F9:F4:BA:E8:FD:49:AB:06:B9:D4:02:30:34:30:6F:B6:A7:F7 31:9E:86:15:B2:AF:A2:55:C5:E6:2A:1C:F8:A1:B8:ED:82:73:78:3F:34:7F:28:40:53:72:61:53:DE:26:76:BC 12:56:F6:E9:10:6E:58:A0:9A:76 Type: 20 (0x14) - "finished" Length (octets, dec.): 32 50:B7:17:B1:CC:C4:37:1A:01:8C:F3:70:3F:6B:4D:F3:1B:E2:96:67:C6:EA:45:87:F9:A7:43:4C:07:27:2F:32 [Legacy ChangeCipherSpec message present (client)] CLIENT_FINISHED (received) Finished value: 0x0CBF2056BC66492F5678096CEF8F37D3AD90B0FBC15E36B09D90FB6BAA06556F Client Finished status: OK CLIENT_APPLICATION_DATA (recieved) ASCII dump (filtered): GET / HTTP/1.1..accept: */*..user-agent: claudebot..referer: htt p://tls13.1d.pw/..host: tls13.1d.pw.... [Server KeyUpdate sent /message skipped/] TCP: server: 194.87.109.56:443; client: 54.87.17.177:44938; timestamp: 1711676464 Contacts: dxdt.ru, alex/()\/abaabb.xyz. /\_/\ ( 0.0 ) = ^ = /|_|\ (") (")=~ Provide ESNI to get second ASCII cat Elapsed server side: 126ms; ServerHello sent: 4ms; TLS connection established: 125ms.