TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK;

Detailed description:

v.0.24.4-p
(This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, X25519MLKEM768, SecP256r1MLKEM768, X25519Kyber768, ESNI, etc.)


CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	Key exchange: 0x0017 (Secp256r1)

	(Handshake level)
	Handshake secrets:
		Client: 0xFCBD1D67144EC3C2932B9EDCEB72469CADFD3814CE0D51C3418543E992755FC96500A748468896F3F85ADA58BDB646E8
		Server: 0xCA41170D9FEEA254E6959B51560050E6C0435DECA72729CAA3155F02532484755DC91E1C2B0C73A6270BA6BBDDA22B71
	Handshake keys:
		Client write: 0x05B7ED735F78BD0B3E0C53BE9EBB3AF1FEDA5B298938DD16349DBD80E85F2557
		Server write: 0xD04651449EA65C1BDD955260C2FC57AAA2A437B702F8EE63C69E2458D6D9D957
	Handshake IVs:
		Client write (IV): 0x80E6DFC54E1CF36F1736C6C3
		Server write (IV): 0xB32531B3F19FFA0FB0A0FAE3

	(Traffic level)
	Traffic secrets:
		Client: 0x1BE52C61406588E6C866F0EE9D7CEE99B92AA46A4B17DEC980630FDBA73AE8FD1D213AF4B507C46E13C1C26DA35DC1E3
		Server: 0x6E0B047F214C111250116788F0B6411187A166A18DCA68136D246803113417D01DA6ECC085C03F95BC4B5ABD9AEEB787
	Traffic keys:
		Client write: 0xDED9288BA6A66AC3B62BEC97F81CE47A8D11111A33A8E543D46D3A532104F8AD
		Server write: 0x1BE1A5A26F9AA7B6B7F526B64B760AAC13B9F5688EA7477F11F1315BEEA47216
	Traffic base IVs:
		Client write (base IV): 0xAAFE83D8BF66A4897979C96E
		Server write (base IV): 0xB8BD1192CFA9A3532114133D

--- Messages ---

[Legacy ChangeCipherSpec message sent (server)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
		0xCCA8,0x00FF
	Client Random: F6:7C:76:80:3E:24:44:18:FD:F2:A1:33:BD:A4:BE:53:6B:30:2F:A5:3E:73:70:76:61:DE:84:63:A1:D6:6D:0D
	Client SessionID: 28:2C:94:C0:C2:37:FF:38:F8:CF:5A:62:A0:E1:18:75:70:AC:72:C9:0A:6E:D0:48:E0:27:F3:6F:A4:BD:2F:04
	Extensions:
		Type: 51 (0x0033); "key_share"
			Secp256r1 (0x0017)
				x = 0x6B633FF44E45A7F8EB68F323DDFAF7E046C94C543DA93DBDCA57ACF2463DE7CE
				y = 0x2854FA8BBFCCC7025832FC6F32F8BF60703B6791810A6011DD166B7EF39F8706
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			68:32 (HTTP/2/TLS)
			68:74:74:70:2F:31:2E:31 (HTTP/1.1)
		Type: 13 (0x000D); "signature_algorithms"
			0x0503 (ECDSA_SECP384R1_SHA384)
			0x0403 (ECDSA_SECP256R1_SHA256)
			0x0807 (ED25519)
			0x0806 (RSA_PSS_RSAE_SHA512)
			0x0805 (RSA_PSS_RSAE_SHA384)
			0x0804 (RSA_PSS_RSAE_SHA256)
			0x0601 (RSA_PKCS1_SHA512)
			0x0501 (RSA_PKCS1_SHA384)
			0x0401 (RSA_PKCS1_SHA256)
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
		Type: 35 (0x0023); /non-TLS-1.3/
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: 28:2C:94:C0:C2:37:FF:38:F8:CF:5A:62:A0:E1:18:75:70:AC:72:C9:0A:6E:D0:48:E0:27:F3:6F:A4:BD:2F:04
	Extensions:
		Type: 51 (0x0033); "key_share"
			Secp256r1 (0x0017)
				x = 0x1FADAC79156E08C8532CE88DF887273141ACE16E44E9C268CE496596F41B65FA
				y = 0xF82394637B6ACF004AB253F956BD2CD6CA6C9AD8454BF1FBF281A6C54A93D99C
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 3855
		[...] /skipped 3855 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 107
		05:03:00:67:30:65:02:31:00:B7:5E:75:60:D7:A2:EB:FB:92:05:70:BE:5C:B8:B6:0D:20:E0:C1:D1:48:5B:F6
		13:7E:2F:A8:5A:3A:78:59:94:70:AA:65:78:DE:86:8C:2C:9A:33:85:62:94:B9:35:70:02:30:08:16:85:92:42
		CD:A5:87:95:58:A9:78:4F:4A:DF:81:CF:68:6E:31:A3:CA:B3:4B:B4:91:D4:67:C5:AF:A7:A0:49:4B:88:8F:E7
		6D:CE:97:CC:84:58:FF:9E:7B:B5:C5
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 48
		6C:30:59:5A:33:59:55:9A:85:D6:CE:EC:BB:DE:26:F2:53:CB:ED:61:F5:70:D8:1A:21:A4:8F:1F:E4:9F:7A:1F
		58:2B:F3:E7:63:48:2E:9D:E9:76:62:FB:F6:0E:7E:2E
[Legacy ChangeCipherSpec message present (client)]

CLIENT_FINISHED (received)

	Finished value: 0xBC42D780E14DF0CB34E0C09DFF0AACA963B870F59DC0480C545F0E6068CFF1C8385CB8183A75724591F2D89CC97D91DA
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit
		/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo
		t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host
		: tls13.1d.pw....

TCP: server: 194.87.103.72:443; client: 216.73.216.84:7404; timestamp: 1764773236


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 159ms; ServerHello sent: 6ms; TLS connection established: 159ms.