Successfully connected
TLS 1.3 OK;
Detailed description:
v.0.24.4-p
(This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, X25519MLKEM768, SecP256r1MLKEM768, X25519Kyber768, ESNI, etc.)
CRYPTO_CONTEXT
Protocol version: 0x0304
Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
Key exchange: 0x0018 (Secp384r1)
(Handshake level)
Handshake secrets:
Client: 0x148456094F700B0210D6AA3581B881312E4397AFD7233B974008E65982D868EFEA775AB3CCE60CD767F44719597EE1E4
Server: 0xE2E8BFBEEC0DEB2F99A9C1CA685FC794FC2C26F4DB4072B9732A59BE9D4E6F6997249168ACFC5AE5FFD7C95BB44F7768
Handshake keys:
Client write: 0x26CF9E791BD7CC0BB96ABACF215A06336877C1524F92D7D0A8B9FE676BC93AFD
Server write: 0x702D43E955AD1B9AA82BEBE36B5D313A065FF680781CD70438353CEC0FB1FCA0
Handshake IVs:
Client write (IV): 0x99C85FD2D1804A938FB8B818
Server write (IV): 0xCFFE4CF1E21DBCA99C4C634B
(Traffic level)
Traffic secrets:
Client: 0x6B49A64027402922024A34004E04239D5BC4B31304ED2A4A64F50AC7552D03EC76CB2472FA1C7387A01C347C75196143
Server: 0x73C6DF4047A5EB0E3B8F0D9D68A386A80DE3CB73BE9CD0908EA6E4EA05E99033062DEF5FD71D7D0A0F55C8F65CAB54CA
Traffic keys:
Client write: 0x3A40697B8F68AD72ED4D681DBAEF20F17A9406040DA11EC33A09541E49B3F2A2
Server write: 0x19C01BA012D8273E1A0188DA912586F0970F4692B034E23860D16B1D7E72E78A
Traffic base IVs:
Client write (base IV): 0x0401C1AE5885E645C3C0E5A6
Server write (base IV): 0x4ACB1F78B850B468B25942E9
--- Messages ---
[Legacy ChangeCipherSpec message sent (server)]
CLIENT_HELLO (recieved)
Version: 0x0303
Cipher suites:
0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
0xCCA8,0x00FF
Client Random: 2D:D3:FB:A5:94:78:C7:FD:42:F5:E3:99:09:D6:C1:79:58:CF:67:2B:79:51:21:46:61:3B:10:8E:DA:14:C6:3F
Client SessionID: 88:9C:2A:B8:C0:44:4A:12:44:FF:C9:5E:26:32:6B:37:D8:8C:52:93:1F:25:25:9C:E9:FD:09:E6:8E:80:83:44
Extensions:
Type: 16 (0x0010); "application_layer_protocol_negotiation"
68:32 (HTTP/2/TLS)
68:74:74:70:2F:31:2E:31 (HTTP/1.1)
Type: 43 (0x002B); "supported_versions"
0x0304 (TLS 1.3)
0x0303 (TLS 1.2)
Type: 35 (0x0023); /non-TLS-1.3/
Type: 00 (0x0000); "server_name"
00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
hostname: tls13.1d.pw
Type: 45 (0x002D); "psk_key_exchange_modes"
01:01
Type: 10 (0x000A); "supported_groups"
0x001D (X25519)
0x0017 (Secp256r1)
0x0018 (Secp384r1)
Type: 13 (0x000D); "signature_algorithms"
0x0503 (ECDSA_SECP384R1_SHA384)
0x0403 (ECDSA_SECP256R1_SHA256)
0x0807 (ED25519)
0x0806 (RSA_PSS_RSAE_SHA512)
0x0805 (RSA_PSS_RSAE_SHA384)
0x0804 (RSA_PSS_RSAE_SHA256)
0x0601 (RSA_PKCS1_SHA512)
0x0501 (RSA_PKCS1_SHA384)
0x0401 (RSA_PKCS1_SHA256)
Type: 51 (0x0033); "key_share"
Secp384r1 (0x0018)
x = 0x7D4A51828D1722725D890B7E66890DC257E4875D8B6B4F7FA224C056ADCA84EC8E2CBA3577AB4EABF4D7494A7338A91C
y = 0x910C4FC4B4E5BA4C9BC63339F2E5D7A18D46856B59AF3D325CA5C4086DE2B98EC33D0B648E71E9B472ABA15C2CEF2522
Type: 23 (0x0017); /non-TLS-1.3/
Type: 05 (0x0005); "status_request"
01:00:00:00:00
Type: 11 (0x000B); /non-TLS-1.3/
01:00
SERVER_HELLO (sent)
Legacy Version: 0x0303
Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
SessionID: 88:9C:2A:B8:C0:44:4A:12:44:FF:C9:5E:26:32:6B:37:D8:8C:52:93:1F:25:25:9C:E9:FD:09:E6:8E:80:83:44
Extensions:
Type: 51 (0x0033); "key_share"
Secp384r1 (0x0018)
x = 0x884DFC0FE9602539133D59E3779E9DE8644D3532211C1061EFD16D15BE349D6723496325775E87CF3D396F1C02FCC5CF
y = 0x063315C18E34D26B9085A96A495F17B8557DB379DB6ABED0788C60417FCE917ADD8976BB955D9E7E1B1CC6C06F577280
Type: 43 (0x002B); "supported_versions"
0x0304
[Legacy ChangeCipherSpec message sent (server)]
SERVER_HANDSHAKE_MESSAGES (sent)
Type: 8 (0x08) - "encrypted_extensions"
Length (octets, dec.): 2
00:00
Type: 11 (0x0B) - "certificate"
Length (octets, dec.): 3402
[...] /skipped 3402 data octets/
Type: 15 (0x0F) - "certificate_verify"
Length (octets, dec.): 106
05:03:00:66:30:64:02:30:65:37:46:90:1D:8C:16:B2:CA:0A:19:2E:80:CF:C0:14:BE:AE:8F:FF:6D:8D:B9:F7
1D:06:33:7B:48:0B:FA:A0:77:50:06:EE:7A:13:C2:D2:AA:9C:F8:BB:59:CB:69:FF:02:30:72:79:54:DE:E1:4C
2B:FC:AE:F4:23:AF:1D:21:EE:26:0E:22:B8:D0:91:B1:6D:6E:BA:4D:7B:43:D5:15:76:03:98:E0:B6:80:61:7E
7C:4A:BA:AF:31:13:5E:C5:1F:33
Type: 20 (0x14) - "finished"
Length (octets, dec.): 48
C0:BE:41:E5:2C:43:E4:36:8A:C4:06:AB:F0:06:71:46:29:A4:53:DA:48:ED:1D:E5:5C:F2:B1:81:98:06:39:FC
E9:54:D7:F1:CD:DD:C7:B2:16:66:CF:72:37:AC:35:F4
[Legacy ChangeCipherSpec message present (client)]
CLIENT_FINISHED (received)
Finished value: 0x2CFF95C641C7BB94DCFDA484E077999210D20029DC9AD16FF78002E98B90DADEC9E4CF30095E5898E89E76EEDD5F3937
Client Finished status: OK
CLIENT_APPLICATION_DATA (recieved)
ASCII dump (filtered):
GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit
/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo
t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host
: tls13.1d.pw....
TCP: server: 194.87.103.72:443; client: 216.73.217.11:17283; timestamp: 1779659636
Contacts: dxdt.ru, alex/()\/abaabb.xyz.
/\_/\
( 0.0 )
= ^ =
/|_|\
(") (")=~
Provide ESNI to get second ASCII cat
Elapsed server side: 151ms; ServerHello sent: 8ms; TLS connection established: 151ms.