Successfully connected
TLS 1.3 OK; HelloRetryRequest used; server-initiated key update accomplished;
Detailed description:
v.0.24.3-p (This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, X25519MLKEM768, X25519Kyber768, P256Kyber768, P384Kyber768, ECDHE, FFDHE, ESNI, etc.) HelloRetryRequest used to (re)negotiate DH group First ClientHello, key shares: 0x001D Second ClientHello, key shares: 0x0017 CRYPTO_CONTEXT Protocol version: 0x0304 Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256) Key exchange: 0x0017 (Secp256r1) (Handshake level) Handshake secrets: Client: 0x4E1FAA7865F7385740EBAEF707625B702E5A00208F0F4584C8FEF4370C72358B Server: 0x9F5FF62F1D9840A58CB8EF274798EFF63420F8F1B2702F3460A7BED5E21EDD06 Handshake keys: Client write: 0xFBC118DB8D0C1685097F2AA0A2832C535FD39BED1C22738E8710E093FF21EACC Server write: 0xAB3CEAF2526895C6E995EADA05F0CA7C6D6B183DAE10EEBB559E686FD9FAD775 Handshake IVs: Client write (IV): 0x9A2BD0F0E0E4CE40C5A62BEB Server write (IV): 0xB4DC145A2B5A5FAA90816943 (Traffic level) Traffic secrets: Client: 0x18034FC1B6048E86E9EBFBDE3853D72ADC5D5BE6585FBA7A98728A40DCB47F21 Server: 0xEDDDFA228725F3A203391B5B6EC227B1C1F11B713ADB6DBDA601928AC36A40EC KeyUpdates log, server: 0: 0x715FE3CD77196449F5BA958BB76545A69C76EA7DE81F8D2D9112071E4956A805 Traffic keys: Client write: 0x445F9AD0F95E03201EE7F262AE8CBCEFEFDDBB0CCE5D0077D4B0187A016CC91B Server write: 0x225A42E32943FC216260806BBE62F8481032801ADB5D8E2D448D5CAF584601B1 KeyUpdates log, server: 0: 0x07AC9E5E91973215F6589E37EA91FA85296295C81ABCE6E061E794716FF31049 Traffic base IVs: Client write (base IV): 0x9225154306238E9B2DCC7D2A Server write (base IV): 0x27ED991B0DB9523C6FA3D22E KeyUpdates log, server: 0: 0xCD4D669DF75D5EFA48440B79 --- Messages --- CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: 52:87:3A:87:58:15:FD:D4:7A:2E:3A:77:75:CF:A3:3D:B2:6C:95:0E:E8:7E:E9:51:2D:AC:B5:59:34:56:27:92 Client SessionID: C6:CC:4E:1A:6E:51:D8:EE:4C:EB:C0:3D:07:20:D5:85:26:71:F9:24:BF:1B:72:F0:99:58:8B:0D:5D:3E:6C:08 Extensions: Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw Type: 13 (0x000D); "signature_algorithms" 0x0503 (ECDSA_SECP384R1_SHA384) 0x0403 (ECDSA_SECP256R1_SHA256) 0x0807 (ED25519) 0x0806 (RSA_PSS_RSAE_SHA512) 0x0805 (RSA_PSS_RSAE_SHA384) 0x0804 (RSA_PSS_RSAE_SHA256) 0x0601 (RSA_PKCS1_SHA512) 0x0501 (RSA_PKCS1_SHA384) 0x0401 (RSA_PKCS1_SHA256) Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 16 (0x0010); "application_layer_protocol_negotiation" 68:32 (HTTP/2/TLS) 68:74:74:70:2F:31:2E:31 (HTTP/1.1) Type: 51 (0x0033); "key_share" X25519 (0x001D) x = 0x5FAFA433464963A0D90018C2F347C957E6C2D67458CCF2F9CF135874E5C52253 Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 35 (0x0023); /non-TLS-1.3/ Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 23 (0x0017); /non-TLS-1.3/ Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 HELLO_RETRY_REQUEST (sent, server) Legacy Version: 0x0303 Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256) HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C SessionID: C6:CC:4E:1A:6E:51:D8:EE:4C:EB:C0:3D:07:20:D5:85:26:71:F9:24:BF:1B:72:F0:99:58:8B:0D:5D:3E:6C:08 Extensions: Type: 51 (0x0033); "key_share" Secp256r1 (0x0017) Type: 44 (0x002C); "cookie" 00:08:0C:00:FE:E1:C0:DE:FA:57 Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] [Legacy ChangeCipherSpec message present (client)] CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: 52:87:3A:87:58:15:FD:D4:7A:2E:3A:77:75:CF:A3:3D:B2:6C:95:0E:E8:7E:E9:51:2D:AC:B5:59:34:56:27:92 Client SessionID: C6:CC:4E:1A:6E:51:D8:EE:4C:EB:C0:3D:07:20:D5:85:26:71:F9:24:BF:1B:72:F0:99:58:8B:0D:5D:3E:6C:08 Extensions: Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw Type: 13 (0x000D); "signature_algorithms" 0x0503 (ECDSA_SECP384R1_SHA384) 0x0403 (ECDSA_SECP256R1_SHA256) 0x0807 (ED25519) 0x0806 (RSA_PSS_RSAE_SHA512) 0x0805 (RSA_PSS_RSAE_SHA384) 0x0804 (RSA_PSS_RSAE_SHA256) 0x0601 (RSA_PKCS1_SHA512) 0x0501 (RSA_PKCS1_SHA384) 0x0401 (RSA_PKCS1_SHA256) Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 44 (0x002C); "cookie" 00:08:0C:00:FE:E1:C0:DE:FA:57 Type: 16 (0x0010); "application_layer_protocol_negotiation" 68:32 (HTTP/2/TLS) 68:74:74:70:2F:31:2E:31 (HTTP/1.1) Type: 51 (0x0033); "key_share" Secp256r1 (0x0017) x = 0x27C93CB81ACE9964839BBCD9E11C0FDF1DF6F6F80827F52864DF7456032E1822 y = 0x26ACC86A8334BF5C20737AC89B083E85CCC441E3D89FE5DA5B4AC2DD9D0864CA Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 35 (0x0023); /non-TLS-1.3/ Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 23 (0x0017); /non-TLS-1.3/ Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 SERVER_HELLO (sent) Legacy Version: 0x0303 Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256) Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 SessionID: C6:CC:4E:1A:6E:51:D8:EE:4C:EB:C0:3D:07:20:D5:85:26:71:F9:24:BF:1B:72:F0:99:58:8B:0D:5D:3E:6C:08 Extensions: Type: 51 (0x0033); "key_share" Secp256r1 (0x0017) x = 0x1FADAC79156E08C8532CE88DF887273141ACE16E44E9C268CE496596F41B65FA y = 0xF82394637B6ACF004AB253F956BD2CD6CA6C9AD8454BF1FBF281A6C54A93D99C Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] SERVER_HANDSHAKE_MESSAGES (sent) Type: 8 (0x08) - "encrypted_extensions" Length (octets, dec.): 2 00:00 Type: 11 (0x0B) - "certificate" Length (octets, dec.): 3840 [...] /skipped 3840 data octets/ Type: 15 (0x0F) - "certificate_verify" Length (octets, dec.): 106 05:03:00:66:30:64:02:30:20:3C:E1:1A:96:F7:1B:D5:2C:D9:42:13:EA:56:29:48:C7:C0:05:A1:96:22:4C:08 BC:7A:10:DD:17:13:80:F0:51:16:72:9B:FB:1D:6C:40:A3:4F:7B:C1:9D:14:16:C1:02:30:75:01:A2:AA:F6:6C 55:C5:A6:88:3B:C3:4C:C6:23:4E:98:82:B9:4B:05:23:D3:06:06:C0:78:EA:AB:22:95:42:A3:13:75:83:FE:65 F9:28:37:04:4A:5D:5E:85:37:26 Type: 20 (0x14) - "finished" Length (octets, dec.): 32 9E:09:26:A3:33:76:E4:B2:F2:F1:11:B3:52:73:50:0F:1B:86:D5:4D:78:FA:78:F3:DE:6F:BE:2E:11:31:F6:2E CLIENT_FINISHED (received) Finished value: 0xCD322EF4096E5F87189E4F5992709C1F61B0ECB40C7A9C18246C5D4913885178 Client Finished status: OK CLIENT_APPLICATION_DATA (recieved) ASCII dump (filtered): GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit /537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host : tls13.1d.pw.... [Server KeyUpdate sent /message skipped/] TCP: server: 194.87.109.56:443; client: 18.116.14.12:49148; timestamp: 1732143059 Contacts: dxdt.ru, alex/()\/abaabb.xyz. /\_/\ ( 0.0 ) = ^ = /|_|\ (") (")=~ Provide ESNI to get second ASCII cat Elapsed server side: 207ms; ServerHello sent: 103ms (including HelloRetryRequest time); TLS connection established: 206ms.