TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK; HelloRetryRequest used; server-initiated key update accomplished;

Detailed description:

v.0.24.3-p
(This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, X25519MLKEM768, X25519Kyber768, P256Kyber768, P384Kyber768, ECDHE, FFDHE, ESNI, etc.)

HelloRetryRequest used to (re)negotiate DH group
	First ClientHello, key shares:	0x001D
	Second ClientHello, key shares:	0x0017

CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
	Key exchange: 0x0017 (Secp256r1)

	(Handshake level)
	Handshake secrets:
		Client: 0x4E1FAA7865F7385740EBAEF707625B702E5A00208F0F4584C8FEF4370C72358B
		Server: 0x9F5FF62F1D9840A58CB8EF274798EFF63420F8F1B2702F3460A7BED5E21EDD06
	Handshake keys:
		Client write: 0xFBC118DB8D0C1685097F2AA0A2832C535FD39BED1C22738E8710E093FF21EACC
		Server write: 0xAB3CEAF2526895C6E995EADA05F0CA7C6D6B183DAE10EEBB559E686FD9FAD775
	Handshake IVs:
		Client write (IV): 0x9A2BD0F0E0E4CE40C5A62BEB
		Server write (IV): 0xB4DC145A2B5A5FAA90816943

	(Traffic level)
	Traffic secrets:
		Client: 0x18034FC1B6048E86E9EBFBDE3853D72ADC5D5BE6585FBA7A98728A40DCB47F21
		Server: 0xEDDDFA228725F3A203391B5B6EC227B1C1F11B713ADB6DBDA601928AC36A40EC
		KeyUpdates log, server:
			0: 0x715FE3CD77196449F5BA958BB76545A69C76EA7DE81F8D2D9112071E4956A805
	Traffic keys:
		Client write: 0x445F9AD0F95E03201EE7F262AE8CBCEFEFDDBB0CCE5D0077D4B0187A016CC91B
		Server write: 0x225A42E32943FC216260806BBE62F8481032801ADB5D8E2D448D5CAF584601B1
		KeyUpdates log, server:
			0: 0x07AC9E5E91973215F6589E37EA91FA85296295C81ABCE6E061E794716FF31049
	Traffic base IVs:
		Client write (base IV): 0x9225154306238E9B2DCC7D2A
		Server write (base IV): 0x27ED991B0DB9523C6FA3D22E
		KeyUpdates log, server:
			0: 0xCD4D669DF75D5EFA48440B79

--- Messages ---

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
		0xCCA8,0x00FF
	Client Random: 52:87:3A:87:58:15:FD:D4:7A:2E:3A:77:75:CF:A3:3D:B2:6C:95:0E:E8:7E:E9:51:2D:AC:B5:59:34:56:27:92
	Client SessionID: C6:CC:4E:1A:6E:51:D8:EE:4C:EB:C0:3D:07:20:D5:85:26:71:F9:24:BF:1B:72:F0:99:58:8B:0D:5D:3E:6C:08
	Extensions:
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 13 (0x000D); "signature_algorithms"
			0x0503 (ECDSA_SECP384R1_SHA384)
			0x0403 (ECDSA_SECP256R1_SHA256)
			0x0807 (ED25519)
			0x0806 (RSA_PSS_RSAE_SHA512)
			0x0805 (RSA_PSS_RSAE_SHA384)
			0x0804 (RSA_PSS_RSAE_SHA256)
			0x0601 (RSA_PKCS1_SHA512)
			0x0501 (RSA_PKCS1_SHA384)
			0x0401 (RSA_PKCS1_SHA256)
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			68:32 (HTTP/2/TLS)
			68:74:74:70:2F:31:2E:31 (HTTP/1.1)
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x5FAFA433464963A0D90018C2F347C957E6C2D67458CCF2F9CF135874E5C52253
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
		Type: 35 (0x0023); /non-TLS-1.3/
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01

HELLO_RETRY_REQUEST (sent, server)

	Legacy Version: 0x0303
	Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
	HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C
	SessionID: C6:CC:4E:1A:6E:51:D8:EE:4C:EB:C0:3D:07:20:D5:85:26:71:F9:24:BF:1B:72:F0:99:58:8B:0D:5D:3E:6C:08
	Extensions:
		Type: 51 (0x0033); "key_share"
			Secp256r1 (0x0017)
		Type: 44 (0x002C); "cookie"
			00:08:0C:00:FE:E1:C0:DE:FA:57
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

[Legacy ChangeCipherSpec message present (client)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
		0xCCA8,0x00FF
	Client Random: 52:87:3A:87:58:15:FD:D4:7A:2E:3A:77:75:CF:A3:3D:B2:6C:95:0E:E8:7E:E9:51:2D:AC:B5:59:34:56:27:92
	Client SessionID: C6:CC:4E:1A:6E:51:D8:EE:4C:EB:C0:3D:07:20:D5:85:26:71:F9:24:BF:1B:72:F0:99:58:8B:0D:5D:3E:6C:08
	Extensions:
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 13 (0x000D); "signature_algorithms"
			0x0503 (ECDSA_SECP384R1_SHA384)
			0x0403 (ECDSA_SECP256R1_SHA256)
			0x0807 (ED25519)
			0x0806 (RSA_PSS_RSAE_SHA512)
			0x0805 (RSA_PSS_RSAE_SHA384)
			0x0804 (RSA_PSS_RSAE_SHA256)
			0x0601 (RSA_PKCS1_SHA512)
			0x0501 (RSA_PKCS1_SHA384)
			0x0401 (RSA_PKCS1_SHA256)
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 44 (0x002C); "cookie"
			00:08:0C:00:FE:E1:C0:DE:FA:57
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			68:32 (HTTP/2/TLS)
			68:74:74:70:2F:31:2E:31 (HTTP/1.1)
		Type: 51 (0x0033); "key_share"
			Secp256r1 (0x0017)
				x = 0x27C93CB81ACE9964839BBCD9E11C0FDF1DF6F6F80827F52864DF7456032E1822
				y = 0x26ACC86A8334BF5C20737AC89B083E85CCC441E3D89FE5DA5B4AC2DD9D0864CA
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
		Type: 35 (0x0023); /non-TLS-1.3/
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: C6:CC:4E:1A:6E:51:D8:EE:4C:EB:C0:3D:07:20:D5:85:26:71:F9:24:BF:1B:72:F0:99:58:8B:0D:5D:3E:6C:08
	Extensions:
		Type: 51 (0x0033); "key_share"
			Secp256r1 (0x0017)
				x = 0x1FADAC79156E08C8532CE88DF887273141ACE16E44E9C268CE496596F41B65FA
				y = 0xF82394637B6ACF004AB253F956BD2CD6CA6C9AD8454BF1FBF281A6C54A93D99C
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 3840
		[...] /skipped 3840 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 106
		05:03:00:66:30:64:02:30:20:3C:E1:1A:96:F7:1B:D5:2C:D9:42:13:EA:56:29:48:C7:C0:05:A1:96:22:4C:08
		BC:7A:10:DD:17:13:80:F0:51:16:72:9B:FB:1D:6C:40:A3:4F:7B:C1:9D:14:16:C1:02:30:75:01:A2:AA:F6:6C
		55:C5:A6:88:3B:C3:4C:C6:23:4E:98:82:B9:4B:05:23:D3:06:06:C0:78:EA:AB:22:95:42:A3:13:75:83:FE:65
		F9:28:37:04:4A:5D:5E:85:37:26
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 32
		9E:09:26:A3:33:76:E4:B2:F2:F1:11:B3:52:73:50:0F:1B:86:D5:4D:78:FA:78:F3:DE:6F:BE:2E:11:31:F6:2E


CLIENT_FINISHED (received)

	Finished value: 0xCD322EF4096E5F87189E4F5992709C1F61B0ECB40C7A9C18246C5D4913885178
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit
		/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo
		t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host
		: tls13.1d.pw....

[Server KeyUpdate sent /message skipped/]



TCP: server: 194.87.109.56:443; client: 18.116.14.12:49148; timestamp: 1732143059


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 207ms; ServerHello sent: 103ms (including HelloRetryRequest time); TLS connection established: 206ms.