TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK;

Detailed description:

v.0.22.1-l
(This TLS-1.3-only server supports ESNI, HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, etc.)


CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
	Key exchange: 0x001D (X25519)

	(Handshake level)
	Handshake secrets:
		Client: 0x2819E04A02D434DF7315220A418227AF74766E8F625CAB79DE0E8160E1645B83
		Server: 0x03492A4E0AB3F1C198443C7CFF299812B71A56A9184E0428EA07C81853E9A604
	Handshake keys:
		Client write: 0x2AD2AD82033949698AD0E397F03D1E52CB156978E44267FEBE429A73F19316BC
		Server write: 0xEA5640F9B36CF358DADC14E0F54ADE0FCA41706F66236BD56F6966FBEF0B7FA7
	Handshake IVs:
		Client write (IV): 0xA68B758956F4D00089925F98
		Server write (IV): 0x7885DEFFF8A0A51B5666BE2B

	(Traffic level)
	Traffic secrets:
		Client: 0xB643FE5CA85B8DDC995C61B52462803E900A9D3DE6873256F93D649BD7CAD8F1
		Server: 0x42B2D3336E50ABF0B6F1E6729EC7C8DD6E7CA73E3A5CC760C47D7DF14D2E2F76
	Traffic keys:
		Client write: 0x11CE3CA39D9939CD0C4793456C30D24F8B98D414857868D5ABEA0AA5F8B473DD
		Server write: 0xD29564681D63B579B17D73E03FCCBB9EFE6662AF477EEDA8FBDA7674F24E74A8
	Traffic base IVs:
		Client write (base IV): 0x6FA4CAEAD5BD3C2AFC36AA86
		Server write (base IV): 0xC447EC93F332AAC2B0DD34B0

--- Messages ---

[Legacy ChangeCipherSpec message sent (server)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xCCA8
		0xC02F,0xC014,0xC013,0x009D,0x009C,0x0035,0x002F
	Client Random: 02:24:B5:E4:61:0D:59:D3:56:92:40:F4:85:09:74:39:51:C1:49:92:91:2E:39:04:1C:F0:FA:2A:54:B8:72:10
	Client SessionID: 2E:A9:A2:98:39:2A:BD:44:22:E9:0B:52:AF:99:53:E1:12:FD:0C:93:E2:06:34:4A:91:C5:21:3F:C9:F6:38:66
	Extensions:
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
			0x0019 (Secp521r1)
			0x001E (X448)
			0x0100 (ffdhe2048)
			0x0101 (ffdhe3072)
			0x0102 (ffdhe4096)
			0x0103 (ffdhe6144)
			0x0104 (ffdhe8192)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 13 (0x000D); "signature_algorithms"
			00:26:04:03:05:03:06:03:08:04:08:05:08:06:08:09
			08:0A:08:0B:04:01:05:01:06:01:04:02:03:03:03:01
			03:02:02:03:02:01:02:02
		Type: 50 (0x0032); "signature_algorithms_cert"
			00:26:04:03:05:03:06:03:08:04:08:05:08:06:08:09
			08:0A:08:0B:04:01:05:01:06:01:04:02:03:03:03:01
			03:02:02:03:02:01:02:02
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			00:09:08:68:74:74:70:2F:31:2E:31
		Type: 17 (0x0011); /non-TLS-1.3/
			00:07:02:00:04:00:00:00:00
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 43 (0x002B); "supported_versions"
			0x0304
			0x0303
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x961D9253D339D5005AF42EDE1BA8C5F2D2E2CD69CC4C08A70B15C0F63CFCAC75
		Type: 65281 (0xFF01); /non-TLS-1.3/
			00

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: 2E:A9:A2:98:39:2A:BD:44:22:E9:0B:52:AF:99:53:E1:12:FD:0C:93:E2:06:34:4A:91:C5:21:3F:C9:F6:38:66
	Extensions:
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x145891E6697DAA111BD9A43EB39FA860847D09303D603128F82CE7451DAE456B
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 4250
		[...] /skipped 4250 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 108
		05:03:00:68:30:66:02:31:00:D0:D9:85:E0:04:18:17:E6:FC:5C:6C:49:49:84:39:6D:C8:A4:2B:E0:A1:1E:C9
		40:16:BA:CF:C4:1A:17:5D:C8:FB:0A:B0:CC:79:F0:0E:86:C3:A4:57:27:A0:BB:FC:8E:02:31:00:D0:9A:FD:D7
		B7:93:98:8B:7E:F8:D9:BC:5C:17:4E:B6:BC:58:0D:D7:96:FE:8B:81:B2:7C:17:E8:48:9F:2C:B2:F7:62:D4:B6
		E5:55:B3:5A:ED:14:ED:E7:05:BB:0E:B6
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 32
		20:C9:32:73:03:25:E3:96:47:C6:B9:03:FF:7C:4B:BC:4F:DF:31:85:F1:3A:02:69:C4:5B:DA:A7:CD:83:08:0F

[Legacy ChangeCipherSpec message present (client)]

CLIENT_FINISHED (received)

	Finished value: 0x0FDAB904587E2F46444988E27ABF4CE51BDD991519D7B62327EABE08FA760EE7
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..User-Agent: CCBot/2.0 (https://commoncrawl.org/f
		aq/)..Accept: text/html,application/xhtml+xml,application/xml;q=
		0.9,*/*;q=0.8..Accept-Language: en-US,en;q=0.5..If-Modified-Sinc
		e: Sun, 26 Mar 2023 05:41:16 GMT..Accept-Encoding: br,gzip..Host
		: tls13.1d.pw..Connection: Keep-Alive....

TCP: server: 194.87.109.56:443; client: 34.229.131.158:49696; timestamp: 1686419058


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 238ms; ServerHello sent: 10ms; TLS connection established: 238ms.