TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK;

Detailed description:

v.0.22.1-l
(This TLS-1.3-only server supports ESNI, HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, etc.)


CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1301 (TLS_AES_128_GCM_SHA256)
	Key exchange: 0x001D (X25519)

	(Handshake level)
	Handshake secrets:
		Client: 0x261191508DFFA5A5561926DB035DBCA717F1FC3BB3D82442996B2FC05E5E5DB4
		Server: 0xB77A09FF447C094AEF849455C89538AFC7862CE93450F4FE8F65E4A325AAE653
	Handshake keys:
		Client write: 0xDD2E5BE273F36BEFC6D23C48E35A374E
		Server write: 0xF31B79DA90F01298EA749B1322AABF78
	Handshake IVs:
		Client write (IV): 0x36B8355E42D75D269FA46A2E
		Server write (IV): 0x5CC903213BAF98491C99295E

	(Traffic level)
	Traffic secrets:
		Client: 0x52CFDA4D474804A98F80F135EB8A57C39023C8319457CEBD2112524CA6D1088E
		Server: 0xDF54BF049C1D44B3CC1637ED7FEA2C4A6303FD798BCE25DD6D997544D7AFC6FE
	Traffic keys:
		Client write: 0x9C87540C5D6C5890637D7B2679E65F3B
		Server write: 0xD473BD444075EB513EA99C0044EB9F26
	Traffic base IVs:
		Client write (base IV): 0xB7BBC946CC8976964EA89E87
		Server write (base IV): 0x9FDAF1FC86FEF72378EEB299

--- Messages ---

[Legacy ChangeCipherSpec message sent (server)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xCCA8
		0xC02F,0xC014,0xC013,0x009D,0x009C,0x0035,0x002F
	Client Random: 3B:8A:7F:E8:A3:73:9F:C8:53:53:91:CF:39:F2:C9:F5:51:B2:9E:A3:E2:D2:B8:BF:B7:8D:35:27:12:4A:3F:3D
	Client SessionID: n/a
	Extensions:
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
			0x0019 (Secp521r1)
			0x001E (X448)
			0x0100 (ffdhe2048)
			0x0101 (ffdhe3072)
			0x0102 (ffdhe4096)
			0x0103 (ffdhe6144)
			0x0104 (ffdhe8192)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 13 (0x000D); "signature_algorithms"
			00:26:04:03:05:03:06:03:08:04:08:05:08:06:08:09
			08:0A:08:0B:04:01:05:01:06:01:04:02:03:03:03:01
			03:02:02:03:02:01:02:02
		Type: 50 (0x0032); "signature_algorithms_cert"
			00:26:04:03:05:03:06:03:08:04:08:05:08:06:08:09
			08:0A:08:0B:04:01:05:01:06:01:04:02:03:03:03:01
			03:02:02:03:02:01:02:02
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			00:09:08:68:74:74:70:2F:31:2E:31
		Type: 17 (0x0011); /non-TLS-1.3/
			00:07:02:00:04:00:00:00:00
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 43 (0x002B); "supported_versions"
			0x0304
			0x0303
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x48204290AE8536CE98A1C5C62B783DC4218865C07887D7DC88032AF22EDCA927
		Type: 65281 (0xFF01); /non-TLS-1.3/
			00

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1301 (TLS_AES_128_GCM_SHA256)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: n/a
	Extensions:
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x145891E6697DAA111BD9A43EB39FA860847D09303D603128F82CE7451DAE456B
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 3570
		[...] /skipped 3570 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 108
		05:03:00:68:30:66:02:31:00:CD:F1:A3:21:9A:68:F7:19:D3:66:23:49:6B:7C:0C:3D:0F:33:84:87:5E:55:9F
		2E:B6:BF:9C:61:B5:77:63:1E:F9:49:25:4E:A2:1E:B3:73:D0:7B:99:35:33:55:FE:66:02:31:00:F8:EC:15:8A
		D0:EA:CD:1D:21:C2:EB:98:94:60:BE:8D:D3:4E:3F:FB:07:D9:61:25:DA:AF:47:3A:A7:C1:8A:2C:01:61:52:14
		3C:DD:D3:9C:A6:FB:96:61:D3:30:59:BD
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 32
		02:ED:DA:F2:C0:FE:2F:DF:08:D9:18:54:85:62:89:05:AF:29:31:BF:8D:47:C3:4A:49:A6:90:24:40:A1:FC:A1


CLIENT_FINISHED (received)

	Finished value: 0x40ACC324A85E2C2F764BF53FC60D9008DE4AC303B68EA8F4A8248A1487365121
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..User-Agent: CCBot/2.0 (https://commoncrawl.org/f
		aq/)..Accept: text/html,application/xhtml+xml,application/xml;q=
		0.9,*/*;q=0.8..Accept-Language: en-US,en;q=0.5..Accept-Encoding:
		 br,gzip..Host: tls13.1d.pw..Connection: Keep-Alive....

TCP: server: 194.87.109.56:443; client: 100.25.42.211:60634; timestamp: 1664765428


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 203ms; ServerHello sent: 11ms; TLS connection established: 112ms.