Successfully connected
TLS 1.3 OK; HelloRetryRequest used;
Detailed description:
v.0.24.4-p
(This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, X25519MLKEM768, SecP256r1MLKEM768, X25519Kyber768, ESNI, etc.)
HelloRetryRequest used to (re)negotiate DH group
First ClientHello, key shares: 0x001D
Second ClientHello, key shares: 0x0018
CRYPTO_CONTEXT
Protocol version: 0x0304
Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
Key exchange: 0x0018 (Secp384r1)
(Handshake level)
Handshake secrets:
Client: 0x3D9D12FB5D8733E4D67D9A92C9F2485F1FE538D1136595EF4E8C45E0959DD329
Server: 0x8B410095BC596D2C22F676559A9ABBC12F82AD9BC1D3995772937A6C0ADBDE06
Handshake keys:
Client write: 0xFDB1C7A96D4A39A1C214AD628886AAF7BC141D2ABD7269D9AE3607948693C0BC
Server write: 0x6C48A5294E091E30C062E456BB5ED1D987E1CD7F8CAC87C939BF0EA92AA6A318
Handshake IVs:
Client write (IV): 0xB5F6E5DD3C2FB2EB5B3B32A8
Server write (IV): 0xF23A34BE16D24FA5B2317076
(Traffic level)
Traffic secrets:
Client: 0x6FC65B9F31A864554EB7DCDB28BDE3240AFEA4C64FBD9FCDC45DCAAAA9897089
Server: 0xEAD2DEE83CB91F4C7DCA9C07442AD40D348F53E6086432A9486777B41DAA704E
Traffic keys:
Client write: 0x816C0D8580E68FCA234AE8AE6A439A0578775EB45F96B71C39A7A97F06823BCC
Server write: 0x94E8ACE3853A6A3B133DA4D24D33B88A145227CE037752135060F7E03C6D0F39
Traffic base IVs:
Client write (base IV): 0xAFDB5D614F6C956552893455
Server write (base IV): 0x0E6E4EA220573CDE30FE2F9F
--- Messages ---
CLIENT_HELLO (recieved)
Version: 0x0303
Cipher suites:
0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
0xCCA8,0x00FF
Client Random: 32:74:F1:97:40:43:25:35:4E:5E:70:94:AC:70:D4:FA:16:C9:69:1B:2A:68:50:02:A2:B5:A1:F1:1D:A7:61:5F
Client SessionID: A0:32:EA:A5:C4:4B:23:B2:1D:58:88:6A:9A:3E:79:BA:3C:C5:35:46:8A:53:A5:04:AF:43:DD:8C:78:54:B5:23
Extensions:
Type: 43 (0x002B); "supported_versions"
0x0304 (TLS 1.3)
0x0303 (TLS 1.2)
Type: 11 (0x000B); /non-TLS-1.3/
01:00
Type: 16 (0x0010); "application_layer_protocol_negotiation"
68:32 (HTTP/2/TLS)
68:74:74:70:2F:31:2E:31 (HTTP/1.1)
Type: 05 (0x0005); "status_request"
01:00:00:00:00
Type: 35 (0x0023); /non-TLS-1.3/
Type: 10 (0x000A); "supported_groups"
0x001D (X25519)
0x0017 (Secp256r1)
0x0018 (Secp384r1)
Type: 00 (0x0000); "server_name"
00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
hostname: tls13.1d.pw
Type: 23 (0x0017); /non-TLS-1.3/
Type: 51 (0x0033); "key_share"
X25519 (0x001D)
x = 0x190B464CE837B344E7285421DA15992B0A1086CBA85D819472B913EE55CD3F4C
Type: 13 (0x000D); "signature_algorithms"
0x0503 (ECDSA_SECP384R1_SHA384)
0x0403 (ECDSA_SECP256R1_SHA256)
0x0807 (ED25519)
0x0806 (RSA_PSS_RSAE_SHA512)
0x0805 (RSA_PSS_RSAE_SHA384)
0x0804 (RSA_PSS_RSAE_SHA256)
0x0601 (RSA_PKCS1_SHA512)
0x0501 (RSA_PKCS1_SHA384)
0x0401 (RSA_PKCS1_SHA256)
Type: 45 (0x002D); "psk_key_exchange_modes"
01:01
HELLO_RETRY_REQUEST (sent, server)
Legacy Version: 0x0303
Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C
SessionID: A0:32:EA:A5:C4:4B:23:B2:1D:58:88:6A:9A:3E:79:BA:3C:C5:35:46:8A:53:A5:04:AF:43:DD:8C:78:54:B5:23
Extensions:
Type: 51 (0x0033); "key_share"
Secp384r1 (0x0018)
Type: 44 (0x002C); "cookie"
00:08:0C:00:FE:E1:C0:DE:FA:57
Type: 43 (0x002B); "supported_versions"
0x0304
[Legacy ChangeCipherSpec message sent (server)]
[Legacy ChangeCipherSpec message present (client)]
CLIENT_HELLO (recieved)
Version: 0x0303
Cipher suites:
0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
0xCCA8,0x00FF
Client Random: 32:74:F1:97:40:43:25:35:4E:5E:70:94:AC:70:D4:FA:16:C9:69:1B:2A:68:50:02:A2:B5:A1:F1:1D:A7:61:5F
Client SessionID: A0:32:EA:A5:C4:4B:23:B2:1D:58:88:6A:9A:3E:79:BA:3C:C5:35:46:8A:53:A5:04:AF:43:DD:8C:78:54:B5:23
Extensions:
Type: 43 (0x002B); "supported_versions"
0x0304 (TLS 1.3)
0x0303 (TLS 1.2)
Type: 11 (0x000B); /non-TLS-1.3/
01:00
Type: 16 (0x0010); "application_layer_protocol_negotiation"
68:32 (HTTP/2/TLS)
68:74:74:70:2F:31:2E:31 (HTTP/1.1)
Type: 05 (0x0005); "status_request"
01:00:00:00:00
Type: 35 (0x0023); /non-TLS-1.3/
Type: 10 (0x000A); "supported_groups"
0x001D (X25519)
0x0017 (Secp256r1)
0x0018 (Secp384r1)
Type: 00 (0x0000); "server_name"
00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
hostname: tls13.1d.pw
Type: 23 (0x0017); /non-TLS-1.3/
Type: 51 (0x0033); "key_share"
Secp384r1 (0x0018)
x = 0x251C01E31D81C4915E99B2858C0A9C42189E40809747F2821E3C7697EA7CBA15775A3CCCCA78DAA5001D162363B5E96E
y = 0x29E45229437738201D1FF1184A8E7C593DA7D3486D9C35DB46F0D58A2D816750C26F3D572D8ED8BF606AF544B917575F
Type: 13 (0x000D); "signature_algorithms"
0x0503 (ECDSA_SECP384R1_SHA384)
0x0403 (ECDSA_SECP256R1_SHA256)
0x0807 (ED25519)
0x0806 (RSA_PSS_RSAE_SHA512)
0x0805 (RSA_PSS_RSAE_SHA384)
0x0804 (RSA_PSS_RSAE_SHA256)
0x0601 (RSA_PKCS1_SHA512)
0x0501 (RSA_PKCS1_SHA384)
0x0401 (RSA_PKCS1_SHA256)
Type: 44 (0x002C); "cookie"
00:08:0C:00:FE:E1:C0:DE:FA:57
Type: 45 (0x002D); "psk_key_exchange_modes"
01:01
SERVER_HELLO (sent)
Legacy Version: 0x0303
Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
SessionID: A0:32:EA:A5:C4:4B:23:B2:1D:58:88:6A:9A:3E:79:BA:3C:C5:35:46:8A:53:A5:04:AF:43:DD:8C:78:54:B5:23
Extensions:
Type: 51 (0x0033); "key_share"
Secp384r1 (0x0018)
x = 0x884DFC0FE9602539133D59E3779E9DE8644D3532211C1061EFD16D15BE349D6723496325775E87CF3D396F1C02FCC5CF
y = 0x063315C18E34D26B9085A96A495F17B8557DB379DB6ABED0788C60417FCE917ADD8976BB955D9E7E1B1CC6C06F577280
Type: 43 (0x002B); "supported_versions"
0x0304
[Legacy ChangeCipherSpec message sent (server)]
SERVER_HANDSHAKE_MESSAGES (sent)
Type: 8 (0x08) - "encrypted_extensions"
Length (octets, dec.): 2
00:00
Type: 11 (0x0B) - "certificate"
Length (octets, dec.): 3857
[...] /skipped 3857 data octets/
Type: 15 (0x0F) - "certificate_verify"
Length (octets, dec.): 108
05:03:00:68:30:66:02:31:00:BF:38:44:49:32:58:40:3F:ED:DD:2C:4D:88:40:2A:5F:66:0F:0F:67:DB:E9:8B
C3:77:B3:67:20:35:00:AD:73:F9:ED:6E:B5:A1:B1:BB:11:E5:C7:30:9C:68:4C:E1:B3:02:31:00:CC:03:AC:99
72:9C:90:45:9E:5E:DC:97:66:37:BA:2A:AF:ED:EE:76:48:2B:99:73:EA:6A:62:6A:F0:9B:35:A8:0E:2B:DD:EC
27:2D:94:1D:E4:25:5A:C3:7B:07:95:CE
Type: 20 (0x14) - "finished"
Length (octets, dec.): 32
11:72:69:CD:E6:47:82:5B:B2:CF:D7:04:F7:A0:AC:60:8B:5D:05:76:98:65:7D:6C:BB:B1:32:B4:23:0B:06:71
CLIENT_FINISHED (received)
Finished value: 0x2156C43DFC003866096996A2F69594C8F9507458C17C15E86F8F9E1B13C90629
Client Finished status: OK
CLIENT_APPLICATION_DATA (recieved)
ASCII dump (filtered):
GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit
/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo
t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host
: tls13.1d.pw....
TCP: server: 194.87.103.72:443; client: 216.73.216.84:28043; timestamp: 1764937024
Contacts: dxdt.ru, alex/()\/abaabb.xyz.
/\_/\
( 0.0 )
= ^ =
/|_|\
(") (")=~
Provide ESNI to get second ASCII cat
Elapsed server side: 303ms; ServerHello sent: 152ms (including HelloRetryRequest time); TLS connection established: 303ms.