Successfully connected
TLS 1.3 OK; server-initiated key update accomplished;
Detailed description:
v.0.23.4-p (This TLS-1.3-only server supports ESNI, HelloRetryRequest, KeyUpdate, X25519Kyber768/draft0, ECDHE, FFDHE, etc.) CRYPTO_CONTEXT Protocol version: 0x0304 Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256) Key exchange: 0x001D (X25519) (Handshake level) Handshake secrets: Client: 0x73BB5826F4D3B55CE2C544318359E2C9FD9FEF787BA620E0672A04FE210E3CF1 Server: 0x273EBABB1091DA659CF628DB9F108B6875EC3956F26CF70C7F5CC3C30E2CC62B Handshake keys: Client write: 0xDA344554C2FC7A42F9B773AC12ECE2B45FEBA79B54FA986CCE64D2BA28EE06EE Server write: 0x946D7E0C228AF515C79FEBE6775DDCE02118EC930E9362A5A8650201F951D018 Handshake IVs: Client write (IV): 0xB9E41AE4A9D688CEF0783958 Server write (IV): 0x38311E7246B7388433C633B9 (Traffic level) Traffic secrets: Client: 0x7B4AD8B95D0813C1EAE33AD68D4CBF6E96D946DC32C29131C29ECE1FCD65E11C Server: 0x2AC17EE4677B4255E75EC51672F9EC6DC68BE0DD060755E8013BBA556C2E3F1E KeyUpdates log, server: 0: 0x2FB0BF9942F24999FAADBEA2548402CBE080BDC41D56BCE56A609D046C8570D8 Traffic keys: Client write: 0xADD1B374C329DD49A48A945A53C7D9D9546E58F64EB5C663406FE1B671BA37EA Server write: 0x879C6785E874F2D8C00B2F9D192217D104210FCDEAF5F5694571ACC1DF1E96D5 KeyUpdates log, server: 0: 0xADF66CB6A3DC7F9A2F76962B493C579D71E1F06BB6992642F21A736062F6A86F Traffic base IVs: Client write (base IV): 0xE3F07250F9FDE41D606D4D7C Server write (base IV): 0x24740932696B1D30F00C82FE KeyUpdates log, server: 0: 0x9E8009E3037AD6C6B393349C --- Messages --- [Legacy ChangeCipherSpec message sent (server)] CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: 18:05:F6:39:7B:59:6A:22:CE:05:59:9F:BA:B2:C9:BE:4C:F0:E1:A9:B9:E2:D0:B7:DE:87:19:88:7B:47:AF:65 Client SessionID: 64:C9:45:72:C8:8E:BA:47:2B:29:06:AC:0E:08:7A:2D:E5:63:32:60:19:97:39:6C:20:9A:60:B5:69:5E:28:F6 Extensions: Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 13 (0x000D); "signature_algorithms" 00:12:05:03:04:03:08:07:08:06:08:05:08:04:06:01 05:01:04:01 Type: 23 (0x0017); /non-TLS-1.3/ Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw Type: 18 (0x0012); "signed_certificate_timestamp" Type: 51 (0x0033); "key_share" X25519 (0x001D) x = 0x4427B030A12421F080FE6A4C1DFACD3B809BDBB51F28B7DEEE053BFE77D9B658 Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 Type: 16 (0x0010); "application_layer_protocol_negotiation" 00:0C:02:68:32:08:68:74:74:70:2F:31:2E:31 Type: 35 (0x0023); /non-TLS-1.3/ SERVER_HELLO (sent) Legacy Version: 0x0303 Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256) Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 SessionID: 64:C9:45:72:C8:8E:BA:47:2B:29:06:AC:0E:08:7A:2D:E5:63:32:60:19:97:39:6C:20:9A:60:B5:69:5E:28:F6 Extensions: Type: 51 (0x0033); "key_share" X25519 (0x001D) x = 0x145891E6697DAA111BD9A43EB39FA860847D09303D603128F82CE7451DAE456B Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] SERVER_HANDSHAKE_MESSAGES (sent) Type: 8 (0x08) - "encrypted_extensions" Length (octets, dec.): 2 00:00 Type: 11 (0x0B) - "certificate" Length (octets, dec.): 4190 [...] /skipped 4190 data octets/ Type: 15 (0x0F) - "certificate_verify" Length (octets, dec.): 106 05:03:00:66:30:64:02:30:51:B9:75:0F:35:E3:9C:27:63:BC:26:26:C1:A9:48:9F:46:AD:11:E7:AB:2C:DF:DC E0:06:2B:AC:4C:41:D0:FC:BA:67:AF:E3:99:7A:62:CB:59:DD:E0:50:31:99:9F:12:02:30:56:E7:E2:06:1A:B0 CB:7E:2D:B7:17:C9:E8:8A:01:08:2B:85:EC:0C:BB:57:04:C6:74:20:69:E4:E3:81:7A:1D:A4:7B:F7:ED:50:F1 A1:59:49:33:36:29:B4:D7:BA:19 Type: 20 (0x14) - "finished" Length (octets, dec.): 32 03:0D:FB:B3:5D:52:64:29:B8:24:CB:A9:54:44:7C:A5:C3:AF:55:C0:4C:2A:B9:94:DB:99:C9:CC:9E:C0:39:10 [Legacy ChangeCipherSpec message present (client)] CLIENT_FINISHED (received) Finished value: 0x75A440664213CDA3A08FDB8F3F09200EEA1B9452A4966F0A47D67BFBF11A4F47 Client Finished status: OK CLIENT_APPLICATION_DATA (recieved) ASCII dump (filtered): GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit /537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo t@anthropic.com)..host: tls13.1d.pw.... [Server KeyUpdate sent /message skipped/] TCP: server: 194.87.109.56:443; client: 3.15.197.123:47635; timestamp: 1714449099 Contacts: dxdt.ru, alex/()\/abaabb.xyz. /\_/\ ( 0.0 ) = ^ = /|_|\ (") (")=~ Provide ESNI to get second ASCII cat Elapsed server side: 121ms; ServerHello sent: 7ms; TLS connection established: 119ms.