Successfully connected
TLS 1.3 OK;
Detailed description:
v.0.24.4-p
(This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, X25519MLKEM768, SecP256r1MLKEM768, X25519Kyber768, ESNI, etc.)
CRYPTO_CONTEXT
Protocol version: 0x0304
Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
Key exchange: 0x0017 (Secp256r1)
(Handshake level)
Handshake secrets:
Client: 0xFCBD1D67144EC3C2932B9EDCEB72469CADFD3814CE0D51C3418543E992755FC96500A748468896F3F85ADA58BDB646E8
Server: 0xCA41170D9FEEA254E6959B51560050E6C0435DECA72729CAA3155F02532484755DC91E1C2B0C73A6270BA6BBDDA22B71
Handshake keys:
Client write: 0x05B7ED735F78BD0B3E0C53BE9EBB3AF1FEDA5B298938DD16349DBD80E85F2557
Server write: 0xD04651449EA65C1BDD955260C2FC57AAA2A437B702F8EE63C69E2458D6D9D957
Handshake IVs:
Client write (IV): 0x80E6DFC54E1CF36F1736C6C3
Server write (IV): 0xB32531B3F19FFA0FB0A0FAE3
(Traffic level)
Traffic secrets:
Client: 0x1BE52C61406588E6C866F0EE9D7CEE99B92AA46A4B17DEC980630FDBA73AE8FD1D213AF4B507C46E13C1C26DA35DC1E3
Server: 0x6E0B047F214C111250116788F0B6411187A166A18DCA68136D246803113417D01DA6ECC085C03F95BC4B5ABD9AEEB787
Traffic keys:
Client write: 0xDED9288BA6A66AC3B62BEC97F81CE47A8D11111A33A8E543D46D3A532104F8AD
Server write: 0x1BE1A5A26F9AA7B6B7F526B64B760AAC13B9F5688EA7477F11F1315BEEA47216
Traffic base IVs:
Client write (base IV): 0xAAFE83D8BF66A4897979C96E
Server write (base IV): 0xB8BD1192CFA9A3532114133D
--- Messages ---
[Legacy ChangeCipherSpec message sent (server)]
CLIENT_HELLO (recieved)
Version: 0x0303
Cipher suites:
0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
0xCCA8,0x00FF
Client Random: F6:7C:76:80:3E:24:44:18:FD:F2:A1:33:BD:A4:BE:53:6B:30:2F:A5:3E:73:70:76:61:DE:84:63:A1:D6:6D:0D
Client SessionID: 28:2C:94:C0:C2:37:FF:38:F8:CF:5A:62:A0:E1:18:75:70:AC:72:C9:0A:6E:D0:48:E0:27:F3:6F:A4:BD:2F:04
Extensions:
Type: 51 (0x0033); "key_share"
Secp256r1 (0x0017)
x = 0x6B633FF44E45A7F8EB68F323DDFAF7E046C94C543DA93DBDCA57ACF2463DE7CE
y = 0x2854FA8BBFCCC7025832FC6F32F8BF60703B6791810A6011DD166B7EF39F8706
Type: 45 (0x002D); "psk_key_exchange_modes"
01:01
Type: 11 (0x000B); /non-TLS-1.3/
01:00
Type: 05 (0x0005); "status_request"
01:00:00:00:00
Type: 16 (0x0010); "application_layer_protocol_negotiation"
68:32 (HTTP/2/TLS)
68:74:74:70:2F:31:2E:31 (HTTP/1.1)
Type: 13 (0x000D); "signature_algorithms"
0x0503 (ECDSA_SECP384R1_SHA384)
0x0403 (ECDSA_SECP256R1_SHA256)
0x0807 (ED25519)
0x0806 (RSA_PSS_RSAE_SHA512)
0x0805 (RSA_PSS_RSAE_SHA384)
0x0804 (RSA_PSS_RSAE_SHA256)
0x0601 (RSA_PKCS1_SHA512)
0x0501 (RSA_PKCS1_SHA384)
0x0401 (RSA_PKCS1_SHA256)
Type: 00 (0x0000); "server_name"
00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
hostname: tls13.1d.pw
Type: 10 (0x000A); "supported_groups"
0x001D (X25519)
0x0017 (Secp256r1)
0x0018 (Secp384r1)
Type: 35 (0x0023); /non-TLS-1.3/
Type: 23 (0x0017); /non-TLS-1.3/
Type: 43 (0x002B); "supported_versions"
0x0304 (TLS 1.3)
0x0303 (TLS 1.2)
SERVER_HELLO (sent)
Legacy Version: 0x0303
Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
SessionID: 28:2C:94:C0:C2:37:FF:38:F8:CF:5A:62:A0:E1:18:75:70:AC:72:C9:0A:6E:D0:48:E0:27:F3:6F:A4:BD:2F:04
Extensions:
Type: 51 (0x0033); "key_share"
Secp256r1 (0x0017)
x = 0x1FADAC79156E08C8532CE88DF887273141ACE16E44E9C268CE496596F41B65FA
y = 0xF82394637B6ACF004AB253F956BD2CD6CA6C9AD8454BF1FBF281A6C54A93D99C
Type: 43 (0x002B); "supported_versions"
0x0304
[Legacy ChangeCipherSpec message sent (server)]
SERVER_HANDSHAKE_MESSAGES (sent)
Type: 8 (0x08) - "encrypted_extensions"
Length (octets, dec.): 2
00:00
Type: 11 (0x0B) - "certificate"
Length (octets, dec.): 3855
[...] /skipped 3855 data octets/
Type: 15 (0x0F) - "certificate_verify"
Length (octets, dec.): 107
05:03:00:67:30:65:02:31:00:B7:5E:75:60:D7:A2:EB:FB:92:05:70:BE:5C:B8:B6:0D:20:E0:C1:D1:48:5B:F6
13:7E:2F:A8:5A:3A:78:59:94:70:AA:65:78:DE:86:8C:2C:9A:33:85:62:94:B9:35:70:02:30:08:16:85:92:42
CD:A5:87:95:58:A9:78:4F:4A:DF:81:CF:68:6E:31:A3:CA:B3:4B:B4:91:D4:67:C5:AF:A7:A0:49:4B:88:8F:E7
6D:CE:97:CC:84:58:FF:9E:7B:B5:C5
Type: 20 (0x14) - "finished"
Length (octets, dec.): 48
6C:30:59:5A:33:59:55:9A:85:D6:CE:EC:BB:DE:26:F2:53:CB:ED:61:F5:70:D8:1A:21:A4:8F:1F:E4:9F:7A:1F
58:2B:F3:E7:63:48:2E:9D:E9:76:62:FB:F6:0E:7E:2E
[Legacy ChangeCipherSpec message present (client)]
CLIENT_FINISHED (received)
Finished value: 0xBC42D780E14DF0CB34E0C09DFF0AACA963B870F59DC0480C545F0E6068CFF1C8385CB8183A75724591F2D89CC97D91DA
Client Finished status: OK
CLIENT_APPLICATION_DATA (recieved)
ASCII dump (filtered):
GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit
/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo
t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host
: tls13.1d.pw....
TCP: server: 194.87.103.72:443; client: 216.73.216.84:7404; timestamp: 1764773236
Contacts: dxdt.ru, alex/()\/abaabb.xyz.
/\_/\
( 0.0 )
= ^ =
/|_|\
(") (")=~
Provide ESNI to get second ASCII cat
Elapsed server side: 159ms; ServerHello sent: 6ms; TLS connection established: 159ms.