TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK; server-initiated key update accomplished;

Detailed description:

v.0.23.4-p
(This TLS-1.3-only server supports ESNI, HelloRetryRequest, KeyUpdate, X25519Kyber768/draft0, ECDHE, FFDHE, etc.)


CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
	Key exchange: 0x001D (X25519)

	(Handshake level)
	Handshake secrets:
		Client: 0x73BB5826F4D3B55CE2C544318359E2C9FD9FEF787BA620E0672A04FE210E3CF1
		Server: 0x273EBABB1091DA659CF628DB9F108B6875EC3956F26CF70C7F5CC3C30E2CC62B
	Handshake keys:
		Client write: 0xDA344554C2FC7A42F9B773AC12ECE2B45FEBA79B54FA986CCE64D2BA28EE06EE
		Server write: 0x946D7E0C228AF515C79FEBE6775DDCE02118EC930E9362A5A8650201F951D018
	Handshake IVs:
		Client write (IV): 0xB9E41AE4A9D688CEF0783958
		Server write (IV): 0x38311E7246B7388433C633B9

	(Traffic level)
	Traffic secrets:
		Client: 0x7B4AD8B95D0813C1EAE33AD68D4CBF6E96D946DC32C29131C29ECE1FCD65E11C
		Server: 0x2AC17EE4677B4255E75EC51672F9EC6DC68BE0DD060755E8013BBA556C2E3F1E
		KeyUpdates log, server:
			0: 0x2FB0BF9942F24999FAADBEA2548402CBE080BDC41D56BCE56A609D046C8570D8
	Traffic keys:
		Client write: 0xADD1B374C329DD49A48A945A53C7D9D9546E58F64EB5C663406FE1B671BA37EA
		Server write: 0x879C6785E874F2D8C00B2F9D192217D104210FCDEAF5F5694571ACC1DF1E96D5
		KeyUpdates log, server:
			0: 0xADF66CB6A3DC7F9A2F76962B493C579D71E1F06BB6992642F21A736062F6A86F
	Traffic base IVs:
		Client write (base IV): 0xE3F07250F9FDE41D606D4D7C
		Server write (base IV): 0x24740932696B1D30F00C82FE
		KeyUpdates log, server:
			0: 0x9E8009E3037AD6C6B393349C

--- Messages ---

[Legacy ChangeCipherSpec message sent (server)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
		0xCCA8,0x00FF
	Client Random: 18:05:F6:39:7B:59:6A:22:CE:05:59:9F:BA:B2:C9:BE:4C:F0:E1:A9:B9:E2:D0:B7:DE:87:19:88:7B:47:AF:65
	Client SessionID: 64:C9:45:72:C8:8E:BA:47:2B:29:06:AC:0E:08:7A:2D:E5:63:32:60:19:97:39:6C:20:9A:60:B5:69:5E:28:F6
	Extensions:
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
		Type: 13 (0x000D); "signature_algorithms"
			00:12:05:03:04:03:08:07:08:06:08:05:08:04:06:01
			05:01:04:01
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 18 (0x0012); "signed_certificate_timestamp"
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x4427B030A12421F080FE6A4C1DFACD3B809BDBB51F28B7DEEE053BFE77D9B658
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			00:0C:02:68:32:08:68:74:74:70:2F:31:2E:31
		Type: 35 (0x0023); /non-TLS-1.3/

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: 64:C9:45:72:C8:8E:BA:47:2B:29:06:AC:0E:08:7A:2D:E5:63:32:60:19:97:39:6C:20:9A:60:B5:69:5E:28:F6
	Extensions:
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x145891E6697DAA111BD9A43EB39FA860847D09303D603128F82CE7451DAE456B
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 4190
		[...] /skipped 4190 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 106
		05:03:00:66:30:64:02:30:51:B9:75:0F:35:E3:9C:27:63:BC:26:26:C1:A9:48:9F:46:AD:11:E7:AB:2C:DF:DC
		E0:06:2B:AC:4C:41:D0:FC:BA:67:AF:E3:99:7A:62:CB:59:DD:E0:50:31:99:9F:12:02:30:56:E7:E2:06:1A:B0
		CB:7E:2D:B7:17:C9:E8:8A:01:08:2B:85:EC:0C:BB:57:04:C6:74:20:69:E4:E3:81:7A:1D:A4:7B:F7:ED:50:F1
		A1:59:49:33:36:29:B4:D7:BA:19
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 32
		03:0D:FB:B3:5D:52:64:29:B8:24:CB:A9:54:44:7C:A5:C3:AF:55:C0:4C:2A:B9:94:DB:99:C9:CC:9E:C0:39:10

[Legacy ChangeCipherSpec message present (client)]

CLIENT_FINISHED (received)

	Finished value: 0x75A440664213CDA3A08FDB8F3F09200EEA1B9452A4966F0A47D67BFBF11A4F47
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit
		/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo
		t@anthropic.com)..host: tls13.1d.pw....

[Server KeyUpdate sent /message skipped/]



TCP: server: 194.87.109.56:443; client: 3.15.197.123:47635; timestamp: 1714449099


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 121ms; ServerHello sent: 7ms; TLS connection established: 119ms.