TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK; server-initiated key update accomplished;

Detailed description:

v.0.23.4-p
(This TLS-1.3-only server supports ESNI, HelloRetryRequest, KeyUpdate, X25519Kyber768/draft0, ECDHE, FFDHE, etc.)


CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	Key exchange: 0x001D (X25519)

	(Handshake level)
	Handshake secrets:
		Client: 0x46FB2C6B9B11A6D2CCF49FD447E01D4CA0C5ACF7368CFB8A8B1287F134396A4A68AADCB1B98C3CB780BF509408210EE0
		Server: 0xBCC804CA011CDFE2AE825544AB0C6C00D96AD43C6FAAB64786CEFC2A1211DB2FAF6E8BA5BDAC4DC9F0BCE4EA081FAF7F
	Handshake keys:
		Client write: 0xBD07534884624A88B0ED49FA8ABEB4D41D90CEDD6762A0CD4EDB45A0908EB9F8
		Server write: 0x16A6AE174102448665ABDAE1F760F663E654AB103BD590B86AB11F3E4A6B28C7
	Handshake IVs:
		Client write (IV): 0xF99FA8FBC436A6903C51ADBC
		Server write (IV): 0x0146AE2DD676859704CDB738

	(Traffic level)
	Traffic secrets:
		Client: 0xB90F68C6FDF7046F4F7B98DD0151B93F568D468A27B932C87993864D2996AD97136F00996DE8608013B15A1643C28A00
		Server: 0x31C185B752B49604712F1DABA8BBB9618513E0D3CF9F9A6406B015DB08C14BC910B7E5FA1E7D32899A80DB58C2F58597
		KeyUpdates log, server:
			0: 0xD27BE69017C855A146DEDE27AC4E9926B961E81E5B8EFCDF79901DBBA633E6D5F80B832AC13DDE048A7862BD1A118621
	Traffic keys:
		Client write: 0xB2974DF88F0429CD6D204233114583A9A08F322B69D352236E2DEDB179BABCFC
		Server write: 0x2D10824D4B693FA6E688A4AF66F32CA7D88409717B0A3C115D9CF053A77251F8
		KeyUpdates log, server:
			0: 0x0FEE2F9CB3523A17C0899D14CA5F6C3FC7A851459EC8BA43A569A24742D06E40
	Traffic base IVs:
		Client write (base IV): 0xDB141554FACC6EC191710DB0
		Server write (base IV): 0x82C87491DA2708C395072747
		KeyUpdates log, server:
			0: 0x719D3C5FDFEAA227731072F5

--- Messages ---

[Legacy ChangeCipherSpec message sent (server)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xCCA8
		0xC02F,0xC014,0xC013,0x009D,0x009C,0x0035,0x002F
	Client Random: 21:5F:51:FF:07:96:13:C1:A9:A9:BA:E9:D7:F8:C4:15:69:86:C7:11:45:EC:DC:EB:9D:2D:B9:0D:89:6C:89:1B
	Client SessionID: 96:3F:82:85:48:89:17:35:90:86:0A:8F:4D:E0:D9:A5:02:6A:87:42:FA:E5:04:42:6E:7B:1A:05:F9:CD:EF:52
	Extensions:
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
			0x0019 (Secp521r1)
			0x001E (X448)
			0x0100 (ffdhe2048)
			0x0101 (ffdhe3072)
			0x0102 (ffdhe4096)
			0x0103 (ffdhe6144)
			0x0104 (ffdhe8192)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 13 (0x000D); "signature_algorithms"
			00:26:04:03:05:03:06:03:08:04:08:05:08:06:08:09
			08:0A:08:0B:04:01:05:01:06:01:04:02:03:03:03:01
			03:02:02:03:02:01:02:02
		Type: 50 (0x0032); "signature_algorithms_cert"
			00:26:04:03:05:03:06:03:08:04:08:05:08:06:08:09
			08:0A:08:0B:04:01:05:01:06:01:04:02:03:03:03:01
			03:02:02:03:02:01:02:02
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			00:09:08:68:74:74:70:2F:31:2E:31
		Type: 17 (0x0011); /non-TLS-1.3/
			00:07:02:00:04:00:00:00:00
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0xB85C7AD7260901B13A8D530963EF440E536702FF2D860EF5E204D88B7FFC9305
		Type: 65281 (0xFF01); /non-TLS-1.3/
			00

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: 96:3F:82:85:48:89:17:35:90:86:0A:8F:4D:E0:D9:A5:02:6A:87:42:FA:E5:04:42:6E:7B:1A:05:F9:CD:EF:52
	Extensions:
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x145891E6697DAA111BD9A43EB39FA860847D09303D603128F82CE7451DAE456B
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 4192
		[...] /skipped 4192 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 107
		05:03:00:67:30:65:02:30:5A:58:ED:42:6F:C8:A8:F5:EA:70:2C:71:74:72:B1:93:E1:BF:44:F1:DF:D6:E2:89
		DE:01:52:20:2E:B0:ED:9D:51:1B:DC:0B:B2:4E:BA:F4:FA:98:95:67:38:CC:52:A3:02:31:00:A3:A9:B2:08:64
		FE:C0:BB:5E:6A:62:5D:9E:BB:C8:DE:97:77:BD:98:AA:8D:F6:24:9C:91:65:2A:38:7F:86:3E:48:27:E4:A3:7B
		4E:27:D9:8A:9E:CA:6B:93:4E:FF:01
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 48
		07:99:BC:DD:D3:05:C0:16:F0:4D:80:D6:FE:C6:4A:21:EE:76:A3:50:33:32:7F:DC:01:40:79:91:1A:C7:A5:F0
		63:66:4C:3E:BB:CB:B9:7C:FD:C8:EE:51:A4:50:0F:F0
[Legacy ChangeCipherSpec message present (client)]

CLIENT_FINISHED (received)

	Finished value: 0x40BA1290D440A08E5E2B946C9233EF7EBB9B37494A64A714B6C96CEA500BAA5D00563FFBACD3F3F72693E674CFDF5AF5
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..User-Agent: CCBot/2.0 (https://commoncrawl.org/f
		aq/)..Accept: text/html,application/xhtml+xml,application/xml;q=
		0.9,*/*;q=0.8..Accept-Language: en-US,en;q=0.5..If-Modified-Sinc
		e: Thu, 30 Nov 2023 10:51:55 GMT..Accept-Encoding: br,gzip..Host
		: tls13.1d.pw..Connection: Keep-Alive....

[Server KeyUpdate sent /message skipped/]



TCP: server: 194.87.109.56:443; client: 44.192.20.240:40110; timestamp: 1709266154


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 231ms; ServerHello sent: 4ms; TLS connection established: 231ms.