TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK; server-initiated key update accomplished;

Detailed description:

v.0.23.4-p
(This TLS-1.3-only server supports ESNI, HelloRetryRequest, KeyUpdate, X25519Kyber768/draft0, ECDHE, FFDHE, etc.)


CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1301 (TLS_AES_128_GCM_SHA256)
	Key exchange: 0x001D (X25519)

	(Handshake level)
	Handshake secrets:
		Client: 0x359E47C2B70E477B919534064EF26F34171364BC9E9DD97FAC1FE584E12AEA3A
		Server: 0x3FCA09F6D0B90ACE48F15CE82BDC8DC68DC40FD0CE4CC64EA1543167413B3D82
	Handshake keys:
		Client write: 0xC08957566490FF529CD579113D42B755
		Server write: 0x064DD5B8166A99D3DDC6785B568ABCDC
	Handshake IVs:
		Client write (IV): 0xA5FBADC5ADBDE2EFF478DA96
		Server write (IV): 0x22C3DCAE437C88D1B9553F8F

	(Traffic level)
	Traffic secrets:
		Client: 0x4E43E64EBD9D9776AF68F394DC2E5943FF3478783F61CAE4DB0DFBC7BD635B70
		Server: 0xC86BFBC72ABF4ECD8CD0F12790B02FAE609C4CCF1A2F341395FA0FE6BF7BD18F
		KeyUpdates log, server:
			0: 0xBE210DDC0D991831FCFE4C56271CFAAA734ACA5E720498D5B9D9897F6861D3E2
	Traffic keys:
		Client write: 0x4436D52C9DCCE0768F98F31162DD3319
		Server write: 0xF85384AF04AFA0C0CCA663BEC59FF64C
		KeyUpdates log, server:
			0: 0x34312FE3C5F1E5D35BFAAAEF146830A5
	Traffic base IVs:
		Client write (base IV): 0xC95C0C88A4027DDDC7BD4EB8
		Server write (base IV): 0x39CF0EB16790D34A7C30E232
		KeyUpdates log, server:
			0: 0xEE0253E23D3EB34B073C8F0B

--- Messages ---

[Legacy ChangeCipherSpec message sent (server)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
		0xCCA8,0x00FF
	Client Random: D8:A5:8C:3A:16:23:84:97:82:FB:07:2E:C5:CC:B6:84:10:59:30:CD:92:85:C1:47:CC:57:2A:E7:04:9D:BD:87
	Client SessionID: 4C:07:F1:45:6D:16:3C:E4:17:BB:29:19:52:3A:CE:86:AF:39:13:A8:45:FC:64:69:A6:9C:B0:DC:F4:72:63:FD
	Extensions:
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
		Type: 13 (0x000D); "signature_algorithms"
			00:12:05:03:04:03:08:07:08:06:08:05:08:04:06:01
			05:01:04:01
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 18 (0x0012); "signed_certificate_timestamp"
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0xBD963B1C600D007E0583812E136DABC8D46EE907DB01F203263C022FBEE2DA57
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			00:0C:02:68:32:08:68:74:74:70:2F:31:2E:31
		Type: 35 (0x0023); /non-TLS-1.3/

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1301 (TLS_AES_128_GCM_SHA256)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: 4C:07:F1:45:6D:16:3C:E4:17:BB:29:19:52:3A:CE:86:AF:39:13:A8:45:FC:64:69:A6:9C:B0:DC:F4:72:63:FD
	Extensions:
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x145891E6697DAA111BD9A43EB39FA860847D09303D603128F82CE7451DAE456B
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 4192
		[...] /skipped 4192 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 106
		05:03:00:66:30:64:02:30:5E:F7:A7:8B:AA:3C:08:07:07:CD:98:45:A9:5C:CC:C4:6E:EA:AA:50:CC:1F:AC:12
		8C:83:AA:EF:17:7D:3A:CE:FF:90:9F:2C:7B:8E:AC:5C:09:97:80:F5:B3:F9:E4:F9:02:30:43:DB:91:9C:1E:39
		57:8E:3B:1B:03:7A:37:69:C3:02:B3:39:DE:27:A3:B1:41:01:17:65:64:4F:65:79:9A:22:07:3A:FD:0A:9D:25
		22:6C:E0:5D:4A:82:36:0C:61:12
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 32
		4D:89:49:39:48:E5:39:3C:8F:B5:CF:21:E6:13:BC:0E:14:E9:A8:55:97:E3:2F:C4:55:81:4F:9E:E6:AD:68:32

[Legacy ChangeCipherSpec message present (client)]

CLIENT_FINISHED (received)

	Finished value: 0xFD7F6406A2BD36232C773C732B89B4D1EAC909482F4AF97C8F1E83AAAF29A490
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit
		/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo
		t@anthropic.com)..referer: http://tls13.1d.pw/assets/styles.css.
		.host: tls13.1d.pw....

[Server KeyUpdate sent /message skipped/]



TCP: server: 194.87.109.56:443; client: 18.191.13.255:58563; timestamp: 1714226998


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 121ms; ServerHello sent: 5ms; TLS connection established: 121ms.