TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK; server-initiated key update accomplished;

Detailed description:

v.0.23.4-p
(This TLS-1.3-only server supports ESNI, HelloRetryRequest, KeyUpdate, X25519Kyber768/draft0, ECDHE, FFDHE, etc.)


CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1301 (TLS_AES_128_GCM_SHA256)
	Key exchange: 0x001D (X25519)

	(Handshake level)
	Handshake secrets:
		Client: 0xE591FF7CFCD36F4FD1D21CB408DB858301181253C8C8C0590B35E662E4E075A5
		Server: 0xC430EB2993915526664730CF9A5469FA4F7316CA675CB9AB4321D68E9979CDFE
	Handshake keys:
		Client write: 0x1967C32D219944E67314BA22FEE9B41A
		Server write: 0x0624F9A6AEE71732F196C2E3C23B9031
	Handshake IVs:
		Client write (IV): 0xA47118D9939DA083B2CAD645
		Server write (IV): 0x9EBF24425639F2185F2B7054

	(Traffic level)
	Traffic secrets:
		Client: 0x624E47A66014BF9A51238CC42248198D824CB343ED4A6F3EFFF9924774776E09
		Server: 0x683C6671C0DB0092F36C96E6937866A33D8C4BD9956BEDF1192402F1013153F9
		KeyUpdates log, server:
			0: 0xF9607F2A32B1574139E73CB3D974D2A8813F23BFFE3B65283CB1A3AD6EBE5E9E
	Traffic keys:
		Client write: 0x88CA4485D312AAEC10795D78F737EE4C
		Server write: 0x62AC0A31BDBC59ED0DBB78A82A3AE11D
		KeyUpdates log, server:
			0: 0x3CE3559613F90D8B6E6532CA5F2FEDEE
	Traffic base IVs:
		Client write (base IV): 0x35E068234BF516898B9F8D95
		Server write (base IV): 0xB89F6A3B7A7BEB347E566A94
		KeyUpdates log, server:
			0: 0x16094F719EAE6BB0BEC8D0DD

--- Messages ---

[Legacy ChangeCipherSpec message sent (server)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
		0xCCA8,0x00FF
	Client Random: BC:3E:57:D8:89:34:80:2A:5A:8D:4B:1D:4C:D2:E2:C6:76:12:F2:A2:25:A2:62:84:25:CB:28:C0:4B:57:9C:36
	Client SessionID: 19:D2:5B:9B:1D:C1:95:6A:32:D1:F7:A0:61:05:C8:B7:D5:0B:00:23:60:48:2A:99:0F:EE:8B:6B:65:80:81:D1
	Extensions:
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
		Type: 13 (0x000D); "signature_algorithms"
			00:12:05:03:04:03:08:07:08:06:08:05:08:04:06:01
			05:01:04:01
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 18 (0x0012); "signed_certificate_timestamp"
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0xD581EEA573EC221178C3ABCC0848C1F8F1D802E112A930527892F6A475674707
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			00:0C:02:68:32:08:68:74:74:70:2F:31:2E:31
		Type: 35 (0x0023); /non-TLS-1.3/

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1301 (TLS_AES_128_GCM_SHA256)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: 19:D2:5B:9B:1D:C1:95:6A:32:D1:F7:A0:61:05:C8:B7:D5:0B:00:23:60:48:2A:99:0F:EE:8B:6B:65:80:81:D1
	Extensions:
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x145891E6697DAA111BD9A43EB39FA860847D09303D603128F82CE7451DAE456B
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 4191
		[...] /skipped 4191 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 106
		05:03:00:66:30:64:02:30:56:64:F6:0C:88:95:75:D5:21:F8:40:67:C2:8A:FC:63:CB:ED:CD:FE:4F:83:A6:11
		62:74:A1:D6:7A:23:9B:8F:76:B3:43:CF:F1:57:F9:F4:BA:E8:FD:49:AB:06:B9:D4:02:30:34:30:6F:B6:A7:F7
		31:9E:86:15:B2:AF:A2:55:C5:E6:2A:1C:F8:A1:B8:ED:82:73:78:3F:34:7F:28:40:53:72:61:53:DE:26:76:BC
		12:56:F6:E9:10:6E:58:A0:9A:76
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 32
		50:B7:17:B1:CC:C4:37:1A:01:8C:F3:70:3F:6B:4D:F3:1B:E2:96:67:C6:EA:45:87:F9:A7:43:4C:07:27:2F:32

[Legacy ChangeCipherSpec message present (client)]

CLIENT_FINISHED (received)

	Finished value: 0x0CBF2056BC66492F5678096CEF8F37D3AD90B0FBC15E36B09D90FB6BAA06556F
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..accept: */*..user-agent: claudebot..referer: htt
		p://tls13.1d.pw/..host: tls13.1d.pw....

[Server KeyUpdate sent /message skipped/]



TCP: server: 194.87.109.56:443; client: 54.87.17.177:44938; timestamp: 1711676464


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 126ms; ServerHello sent: 4ms; TLS connection established: 125ms.