Successfully connected
TLS 1.3 OK; HelloRetryRequest used;
Detailed description:
v.0.23.4-p (This TLS-1.3-only server supports ESNI, HelloRetryRequest, KeyUpdate, X25519Kyber768/draft0, ECDHE, FFDHE, etc.) HelloRetryRequest used to (re)negotiate DH group First ClientHello, key shares: 0x001D Second ClientHello, key shares: 0x0017 CRYPTO_CONTEXT Protocol version: 0x0304 Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384) Key exchange: 0x0017 (Secp256r1) (Handshake level) Handshake secrets: Client: 0x9A68408822B10BDDB5C674A6718F131D44422AE2EC881B46A4404D75C32161392001836D5041CEDF98B354980C0E8A12 Server: 0x5C6F5B86DEA75962295FF5067812C2E42EC312641A5CCDEA6AE4D51529BFD629AE484C679308DE56DD9748E162342718 Handshake keys: Client write: 0x118FCC9E7DAABAFAF1D247064626E6A96C057813BBA60AE780B0A5D07DCA8CC6 Server write: 0x14873DEF26C70630C4A3515CDBDFAF98F6ED239F97A9193844F286007C6D6476 Handshake IVs: Client write (IV): 0xB94054515575A927FE14B5B4 Server write (IV): 0x0DBDB029F904B3266314C58D (Traffic level) Traffic secrets: Client: 0xD46A498B03DB74902B0B019334CFA776AC643EC707B92CB9C50469EC8AF0AB5A55F94FBF10F0D553166E32E5761B8DCD Server: 0x23BFAF0369FAFAC6DB485583930F06D558B7F1017C18C22E9F0B335C09FC9D02EF367261CA155BDD558D3D18D54F1BDB Traffic keys: Client write: 0x627F35252EA41DEEC4CAD154B46E14EC633E9F558792F6FBC9C28F14C5023F83 Server write: 0x42BF107517E9BD7EAFE36F95120415ED998D81B4C1C5D035F63A04A3E45F3803 Traffic base IVs: Client write (base IV): 0x91462C5E80658D25258F152A Server write (base IV): 0xCB8903CD268259EA54042BEF --- Messages --- CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: DC:52:52:B6:56:67:1E:44:23:D0:A8:8C:83:0A:AD:BD:5C:C6:AF:C7:CE:81:0F:AC:B9:DF:DA:58:0E:52:13:B2 Client SessionID: B5:D1:CC:6E:44:9F:36:73:B7:5D:CE:45:3D:30:FF:1F:A6:51:07:FB:20:19:5E:55:B7:C2:F5:CC:47:5E:D2:38 Extensions: Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 13 (0x000D); "signature_algorithms" 00:12:05:03:04:03:08:07:08:06:08:05:08:04:06:01 05:01:04:01 Type: 23 (0x0017); /non-TLS-1.3/ Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw Type: 18 (0x0012); "signed_certificate_timestamp" Type: 51 (0x0033); "key_share" X25519 (0x001D) x = 0x36D638A26749008164CAE96C2DA20D3C92A7A4D9E18AC286FA82A6FAA066E10A Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 Type: 16 (0x0010); "application_layer_protocol_negotiation" 00:0C:02:68:32:08:68:74:74:70:2F:31:2E:31 Type: 35 (0x0023); /non-TLS-1.3/ HELLO_RETRY_REQUEST (sent, server) Legacy Version: 0x0303 Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384) HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C SessionID: B5:D1:CC:6E:44:9F:36:73:B7:5D:CE:45:3D:30:FF:1F:A6:51:07:FB:20:19:5E:55:B7:C2:F5:CC:47:5E:D2:38 Extensions: Type: 51 (0x0033); "key_share" Secp256r1 (0x0017) Type: 44 (0x002C); "cookie" 00:08:0C:00:FE:E1:C0:DE:FA:57 Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] [Legacy ChangeCipherSpec message present (client)] CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: DC:52:52:B6:56:67:1E:44:23:D0:A8:8C:83:0A:AD:BD:5C:C6:AF:C7:CE:81:0F:AC:B9:DF:DA:58:0E:52:13:B2 Client SessionID: B5:D1:CC:6E:44:9F:36:73:B7:5D:CE:45:3D:30:FF:1F:A6:51:07:FB:20:19:5E:55:B7:C2:F5:CC:47:5E:D2:38 Extensions: Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 13 (0x000D); "signature_algorithms" 00:12:05:03:04:03:08:07:08:06:08:05:08:04:06:01 05:01:04:01 Type: 23 (0x0017); /non-TLS-1.3/ Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw Type: 18 (0x0012); "signed_certificate_timestamp" Type: 51 (0x0033); "key_share" Secp256r1 (0x0017) x = 0xEEDD19F02C058E059D913296D00865A718B6463D857AAC7306524BF62E01B131 y = 0x8EB41626C6B845B1735ABA0B5EDD9F8AD70941FFD1FF813EC7E6235DF71F94B1 Type: 44 (0x002C); "cookie" 00:08:0C:00:FE:E1:C0:DE:FA:57 Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 Type: 16 (0x0010); "application_layer_protocol_negotiation" 00:0C:02:68:32:08:68:74:74:70:2F:31:2E:31 Type: 35 (0x0023); /non-TLS-1.3/ SERVER_HELLO (sent) Legacy Version: 0x0303 Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384) Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 SessionID: B5:D1:CC:6E:44:9F:36:73:B7:5D:CE:45:3D:30:FF:1F:A6:51:07:FB:20:19:5E:55:B7:C2:F5:CC:47:5E:D2:38 Extensions: Type: 51 (0x0033); "key_share" Secp256r1 (0x0017) x = 0x1FADAC79156E08C8532CE88DF887273141ACE16E44E9C268CE496596F41B65FA y = 0xF82394637B6ACF004AB253F956BD2CD6CA6C9AD8454BF1FBF281A6C54A93D99C Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] SERVER_HANDSHAKE_MESSAGES (sent) Type: 8 (0x08) - "encrypted_extensions" Length (octets, dec.): 2 00:00 Type: 11 (0x0B) - "certificate" Length (octets, dec.): 4194 [...] /skipped 4194 data octets/ Type: 15 (0x0F) - "certificate_verify" Length (octets, dec.): 108 05:03:00:68:30:66:02:31:00:86:80:5E:D1:84:73:B6:E5:20:49:F6:D5:1B:21:13:0D:A1:55:A4:9B:68:22:2E 0E:95:9B:6C:91:BD:8C:9C:BF:C4:E4:69:CA:19:9B:B0:03:3D:9F:89:CB:2F:E5:53:BA:02:31:00:92:54:93:DA C9:DB:5B:14:86:22:E4:40:FF:F4:90:DB:98:68:B9:E5:42:BD:79:CE:A5:AF:EE:10:C3:B8:5E:11:44:3C:8A:D5 3C:7B:58:82:A7:6D:DC:27:BC:14:0D:EF Type: 20 (0x14) - "finished" Length (octets, dec.): 48 8E:EE:D3:BB:99:26:E0:5D:7B:1E:CB:5A:B7:32:73:E3:79:0E:97:FA:FA:CB:42:08:38:8C:E1:77:CA:98:5B:02 EB:21:14:40:EA:A7:AB:F2:6B:97:06:8B:2A:4B:3D:E6 CLIENT_FINISHED (received) Finished value: 0x433D1EC22D6DCB11A7726B99B77FA2B1D981C8F454458D3A9D3C6AA5121B80180D3E154A663E709C3F998F67596AC3AA Client Finished status: OK CLIENT_APPLICATION_DATA (recieved) ASCII dump (filtered): GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit /537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo t@anthropic.com)..host: tls13.1d.pw.... TCP: server: 194.87.109.56:443; client: 18.218.234.83:10627; timestamp: 1714113632 Contacts: dxdt.ru, alex/()\/abaabb.xyz. /\_/\ ( 0.0 ) = ^ = /|_|\ (") (")=~ Provide ESNI to get second ASCII cat Elapsed server side: 225ms; ServerHello sent: 113ms (including HelloRetryRequest time); TLS connection established: 224ms.