Successfully connected
TLS 1.3 OK; HelloRetryRequest used;
Detailed description:
v.0.23.4-p (This TLS-1.3-only server supports ESNI, HelloRetryRequest, KeyUpdate, X25519Kyber768/draft0, ECDHE, FFDHE, etc.) HelloRetryRequest used to (re)negotiate DH group First ClientHello, key shares: 0x001D Second ClientHello, key shares: 0x0017 CRYPTO_CONTEXT Protocol version: 0x0304 Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256) Key exchange: 0x0017 (Secp256r1) (Handshake level) Handshake secrets: Client: 0xF54B58C562B97094CD20CEBBA74281C7965AA36F749CB234441FC9C968598BB8 Server: 0xE6FCDD73BCE62ECF96627740522F1A81BEBA3667E064D76CF597C9360CFACE25 Handshake keys: Client write: 0x5540CEABFBBF9DB83B7D43ADA8FC032697EB8A2F0B0D553461912FF805354F84 Server write: 0x8BAC0475468EBC4C7B2B839491E98A8469372CA080A0E0C788FB59A6AF484EFD Handshake IVs: Client write (IV): 0xA0A2455CEBDBDE6C13D089FB Server write (IV): 0x089BC361B2DB0D820E9D3064 (Traffic level) Traffic secrets: Client: 0x8B73716D58BDC76376D762F911398546A552CD12508BAB71E3F3007026F9140B Server: 0x31C6980536B9F6D22CAFF10DCC58B174E7B01025696B666796C650C5D8F91BDE Traffic keys: Client write: 0x80E6587F7E8F07E64549453BA9B40A2786C2D81255092120E4E1169040985B6A Server write: 0xE48A976B9245B4951A7B6BC8CE27D7C89A817F42F74B1F267604EC2E8C6A9B71 Traffic base IVs: Client write (base IV): 0x3ED477424D5114D754FD9D26 Server write (base IV): 0x2BF9DD1FED4F9040F90B0293 --- Messages --- CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: 7F:4E:E0:FF:44:28:EF:CF:DF:37:20:21:1E:4A:B5:78:7A:EA:81:1D:8F:6A:D2:0B:4A:DD:64:DB:E7:45:92:35 Client SessionID: F3:C7:2A:63:D0:76:A1:DD:EE:DD:75:92:4C:A3:41:E8:C3:BE:2C:86:E1:B9:3E:17:FC:7B:B2:03:E6:E3:48:2D Extensions: Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 13 (0x000D); "signature_algorithms" 00:12:05:03:04:03:08:07:08:06:08:05:08:04:06:01 05:01:04:01 Type: 23 (0x0017); /non-TLS-1.3/ Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw Type: 18 (0x0012); "signed_certificate_timestamp" Type: 51 (0x0033); "key_share" X25519 (0x001D) x = 0xC684426496D26F67186A09AB0A097EEAE327B44009A267CCEAB4C2FE4393C83B Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 Type: 16 (0x0010); "application_layer_protocol_negotiation" 00:0C:02:68:32:08:68:74:74:70:2F:31:2E:31 Type: 35 (0x0023); /non-TLS-1.3/ HELLO_RETRY_REQUEST (sent, server) Legacy Version: 0x0303 Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256) HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C SessionID: F3:C7:2A:63:D0:76:A1:DD:EE:DD:75:92:4C:A3:41:E8:C3:BE:2C:86:E1:B9:3E:17:FC:7B:B2:03:E6:E3:48:2D Extensions: Type: 51 (0x0033); "key_share" Secp256r1 (0x0017) Type: 44 (0x002C); "cookie" 00:08:0C:00:FE:E1:C0:DE:FA:57 Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] [Legacy ChangeCipherSpec message present (client)] CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: 7F:4E:E0:FF:44:28:EF:CF:DF:37:20:21:1E:4A:B5:78:7A:EA:81:1D:8F:6A:D2:0B:4A:DD:64:DB:E7:45:92:35 Client SessionID: F3:C7:2A:63:D0:76:A1:DD:EE:DD:75:92:4C:A3:41:E8:C3:BE:2C:86:E1:B9:3E:17:FC:7B:B2:03:E6:E3:48:2D Extensions: Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 13 (0x000D); "signature_algorithms" 00:12:05:03:04:03:08:07:08:06:08:05:08:04:06:01 05:01:04:01 Type: 23 (0x0017); /non-TLS-1.3/ Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw Type: 18 (0x0012); "signed_certificate_timestamp" Type: 51 (0x0033); "key_share" Secp256r1 (0x0017) x = 0x08FDF7D463812F659B3FC66B183368A54B7DC02F06D9E31EEE873CBDA5698A2F y = 0xFA2759FD7C7424DFC60E8C29F9B31C87B22CE4EE84BA5EFFC63DD58BB17503F9 Type: 44 (0x002C); "cookie" 00:08:0C:00:FE:E1:C0:DE:FA:57 Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 Type: 16 (0x0010); "application_layer_protocol_negotiation" 00:0C:02:68:32:08:68:74:74:70:2F:31:2E:31 Type: 35 (0x0023); /non-TLS-1.3/ SERVER_HELLO (sent) Legacy Version: 0x0303 Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256) Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 SessionID: F3:C7:2A:63:D0:76:A1:DD:EE:DD:75:92:4C:A3:41:E8:C3:BE:2C:86:E1:B9:3E:17:FC:7B:B2:03:E6:E3:48:2D Extensions: Type: 51 (0x0033); "key_share" Secp256r1 (0x0017) x = 0x1FADAC79156E08C8532CE88DF887273141ACE16E44E9C268CE496596F41B65FA y = 0xF82394637B6ACF004AB253F956BD2CD6CA6C9AD8454BF1FBF281A6C54A93D99C Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] SERVER_HANDSHAKE_MESSAGES (sent) Type: 8 (0x08) - "encrypted_extensions" Length (octets, dec.): 2 00:00 Type: 11 (0x0B) - "certificate" Length (octets, dec.): 4195 [...] /skipped 4195 data octets/ Type: 15 (0x0F) - "certificate_verify" Length (octets, dec.): 107 05:03:00:67:30:65:02:30:57:02:D9:6F:F5:DC:9B:52:6D:ED:14:B3:0B:22:F9:8B:B7:DE:BC:50:98:9E:9C:E0 66:31:C7:28:B2:39:53:B8:1A:FB:46:C7:6E:15:80:6F:EB:08:60:54:D7:87:A6:C8:02:31:00:B4:E8:8A:A1:C9 B1:CF:33:19:41:3B:84:EB:64:3E:C1:69:93:B7:1A:67:CE:FB:9E:D3:32:46:E1:36:E5:D5:FA:27:1E:E4:1D:4D 00:C1:38:17:34:ED:AE:46:CF:B3:04 Type: 20 (0x14) - "finished" Length (octets, dec.): 32 53:D6:BE:17:0E:F9:3B:BA:85:29:0D:E4:24:85:BC:F2:8F:5D:B7:7A:1E:8D:D0:3F:FA:6C:29:BA:E2:7A:B6:83 CLIENT_FINISHED (received) Finished value: 0x4354786169E699F3E6D47EC2028EBCD91F7DF8AA08C1DA4379A994F82F5B399A Client Finished status: OK CLIENT_APPLICATION_DATA (recieved) ASCII dump (filtered): GET / HTTP/1.1..accept: */*..user-agent: claudebot..host: tls13. 1d.pw.... TCP: server: 194.87.109.56:443; client: 34.229.223.223:36984; timestamp: 1710812872 Contacts: dxdt.ru, alex/()\/abaabb.xyz. /\_/\ ( 0.0 ) = ^ = /|_|\ (") (")=~ Provide ESNI to get second ASCII cat Elapsed server side: 181ms; ServerHello sent: 92ms (including HelloRetryRequest time); TLS connection established: 181ms.