Successfully connected
TLS 1.3 OK; HelloRetryRequest used; server-initiated key update accomplished;
Detailed description:
v.0.24.2-p (This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, X25519Kyber768, P256Kyber768, P384Kyber768, ECDHE, FFDHE, ESNI, etc.) HelloRetryRequest used to (re)negotiate DH group First ClientHello, key shares: 0x0017 Second ClientHello, key shares: 0x0018 CRYPTO_CONTEXT Protocol version: 0x0304 Cipher suite: 0x1301 (TLS_AES_128_GCM_SHA256) Key exchange: 0x0018 (Secp384r1) (Handshake level) Handshake secrets: Client: 0x63AB0493BDCAB01947EC1CF68C5026C0BE83074CA318F92964E977729AE6865C Server: 0x369442C0207FA9FE7DE49B6FDD6A8BFADE9BD08A89F1AED633D00FBB3319C65D Handshake keys: Client write: 0x88F78A80CB7DD555C8264A514A814679 Server write: 0x8869B727D47A2563F37A94E799899E2C Handshake IVs: Client write (IV): 0x8EB1A6A2078E0E1811C17965 Server write (IV): 0x7E662525D47D69E5A3A7DF9F (Traffic level) Traffic secrets: Client: 0x1EA9DE39472D4292EB421F8CFA2ACC2EC0C472FABEEA13A8303BC9B38163A565 Server: 0xDE4E3723DACEA9FBAE3CD369E0C2B04B610854681D18570F6BB16FCDE94D5A5D KeyUpdates log, server: 0: 0x923E95B2AC24AC7F42E2193C10DA600685A59D3D59230DE2054D19717C2D270E Traffic keys: Client write: 0x343ECD5C156A18BB32FEA2DD9DF7CD7E Server write: 0x93DB8AFBA17DCDACBBC8BA8425884B13 KeyUpdates log, server: 0: 0xED484B73D43A515B65E5CCE743F3F691 Traffic base IVs: Client write (base IV): 0x9349E9110E755F1AF80CA2E0 Server write (base IV): 0xBF88D560B5990DEEC23C986A KeyUpdates log, server: 0: 0x3B8CEF9672C7DCF69FE80F4E --- Messages --- CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: DE:88:24:31:1B:0A:70:B8:DB:42:05:15:D0:1F:D1:E7:E0:49:3E:C8:2E:67:1A:22:1C:B9:E3:77:A6:7E:B2:B8 Client SessionID: CF:45:12:E8:79:79:88:C2:F2:E2:52:0E:AC:AB:6E:A1:95:FB:1F:EB:26:17:A7:07:BD:05:EA:15:E7:96:76:CD Extensions: Type: 16 (0x0010); "application_layer_protocol_negotiation" 68:32 (HTTP/2/TLS) 68:74:74:70:2F:31:2E:31 (HTTP/1.1) Type: 13 (0x000D); "signature_algorithms" 0x0503 (ECDSA_SECP384R1_SHA384) 0x0403 (ECDSA_SECP256R1_SHA256) 0x0807 (ED25519) 0x0806 (RSA_PSS_RSAE_SHA512) 0x0805 (RSA_PSS_RSAE_SHA384) 0x0804 (RSA_PSS_RSAE_SHA256) 0x0601 (RSA_PKCS1_SHA512) 0x0501 (RSA_PKCS1_SHA384) 0x0401 (RSA_PKCS1_SHA256) Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 51 (0x0033); "key_share" Secp256r1 (0x0017) x = 0x070782D26537FA44A944057EC13B461A4CA0F27D439A3E13A8D064DADC0DE93D y = 0x1FB4085E2E3A8ED329095D2E043C4568894F1E651665CD6EC84334285B0E568C Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 23 (0x0017); /non-TLS-1.3/ Type: 35 (0x0023); /non-TLS-1.3/ Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw HELLO_RETRY_REQUEST (sent, server) Legacy Version: 0x0303 Cipher suite: 0x1301 (TLS_AES_128_GCM_SHA256) HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C SessionID: CF:45:12:E8:79:79:88:C2:F2:E2:52:0E:AC:AB:6E:A1:95:FB:1F:EB:26:17:A7:07:BD:05:EA:15:E7:96:76:CD Extensions: Type: 51 (0x0033); "key_share" Secp384r1 (0x0018) Type: 44 (0x002C); "cookie" 00:08:0C:00:FE:E1:C0:DE:FA:57 Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] [Legacy ChangeCipherSpec message present (client)] CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: DE:88:24:31:1B:0A:70:B8:DB:42:05:15:D0:1F:D1:E7:E0:49:3E:C8:2E:67:1A:22:1C:B9:E3:77:A6:7E:B2:B8 Client SessionID: CF:45:12:E8:79:79:88:C2:F2:E2:52:0E:AC:AB:6E:A1:95:FB:1F:EB:26:17:A7:07:BD:05:EA:15:E7:96:76:CD Extensions: Type: 16 (0x0010); "application_layer_protocol_negotiation" 68:32 (HTTP/2/TLS) 68:74:74:70:2F:31:2E:31 (HTTP/1.1) Type: 13 (0x000D); "signature_algorithms" 0x0503 (ECDSA_SECP384R1_SHA384) 0x0403 (ECDSA_SECP256R1_SHA256) 0x0807 (ED25519) 0x0806 (RSA_PSS_RSAE_SHA512) 0x0805 (RSA_PSS_RSAE_SHA384) 0x0804 (RSA_PSS_RSAE_SHA256) 0x0601 (RSA_PKCS1_SHA512) 0x0501 (RSA_PKCS1_SHA384) 0x0401 (RSA_PKCS1_SHA256) Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 44 (0x002C); "cookie" 00:08:0C:00:FE:E1:C0:DE:FA:57 Type: 51 (0x0033); "key_share" Secp384r1 (0x0018) x = 0xEA937CD44A22550A3713C2C335880745C777468C3D52CE5529467173816E5ABA6F79F0819F787229A9AB3DA5418F5187 y = 0x440B5B8BB12B9BBBA5F2D8CEF266C15600A13881962EF267E076AA7B0DB85DEEDDA2CDD435E2720B8D0386E041EB50CA Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 23 (0x0017); /non-TLS-1.3/ Type: 35 (0x0023); /non-TLS-1.3/ Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw SERVER_HELLO (sent) Legacy Version: 0x0303 Cipher suite: 0x1301 (TLS_AES_128_GCM_SHA256) Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 SessionID: CF:45:12:E8:79:79:88:C2:F2:E2:52:0E:AC:AB:6E:A1:95:FB:1F:EB:26:17:A7:07:BD:05:EA:15:E7:96:76:CD Extensions: Type: 51 (0x0033); "key_share" Secp384r1 (0x0018) x = 0x884DFC0FE9602539133D59E3779E9DE8644D3532211C1061EFD16D15BE349D6723496325775E87CF3D396F1C02FCC5CF y = 0x063315C18E34D26B9085A96A495F17B8557DB379DB6ABED0788C60417FCE917ADD8976BB955D9E7E1B1CC6C06F577280 Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] SERVER_HANDSHAKE_MESSAGES (sent) Type: 8 (0x08) - "encrypted_extensions" Length (octets, dec.): 2 00:00 Type: 11 (0x0B) - "certificate" Length (octets, dec.): 3844 [...] /skipped 3844 data octets/ Type: 15 (0x0F) - "certificate_verify" Length (octets, dec.): 107 05:03:00:67:30:65:02:30:3D:44:B8:F8:8D:3C:68:CE:76:BD:27:41:C2:21:27:6B:42:EA:6C:85:94:7C:BA:7C 98:AA:E8:04:27:76:B6:22:FF:4D:98:9A:F5:16:4D:2D:E5:46:D1:7E:8E:AB:86:6D:02:31:00:99:64:42:32:4E F1:94:39:BE:0C:C1:CC:C3:48:E8:53:C4:A3:BE:73:E2:76:4A:44:27:CF:34:AF:DE:96:D3:15:30:3C:9D:4E:3E 80:64:31:67:4B:C2:3F:D3:8B:38:75 Type: 20 (0x14) - "finished" Length (octets, dec.): 32 78:6B:1C:C1:EE:34:41:5D:AE:EA:1C:00:06:BD:33:8C:E8:00:E7:06:E6:04:16:FA:37:6E:9B:15:FC:AB:5C:85 CLIENT_FINISHED (received) Finished value: 0xA42336ABDA357CF176C6757E77ACFB5B20648F5DD73DE60FE4C0233618EAEA6F Client Finished status: OK CLIENT_APPLICATION_DATA (recieved) ASCII dump (filtered): GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit /537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host : tls13.1d.pw.... [Server KeyUpdate sent /message skipped/] TCP: server: 194.87.109.56:443; client: 18.217.139.228:24314; timestamp: 1730190508 Contacts: dxdt.ru, alex/()\/abaabb.xyz. /\_/\ ( 0.0 ) = ^ = /|_|\ (") (")=~ Provide ESNI to get second ASCII cat Elapsed server side: 210ms; ServerHello sent: 106ms (including HelloRetryRequest time); TLS connection established: 209ms.