Successfully connected
TLS 1.3 OK; HelloRetryRequest used;
Detailed description:
v.0.24.4-p
(This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, X25519MLKEM768, SecP256r1MLKEM768, X25519Kyber768, ESNI, etc.)
HelloRetryRequest used to (re)negotiate DH group
First ClientHello, key shares: 0x001D
Second ClientHello, key shares: 0x0017
CRYPTO_CONTEXT
Protocol version: 0x0304
Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
Key exchange: 0x0017 (Secp256r1)
(Handshake level)
Handshake secrets:
Client: 0xF3C290D0B14D5ACB44BCC4CA0BDDCE12ABB0A9A9A64B691DD838E14F482180DFEB036A3F62868745AE0D6802CE1A4AB1
Server: 0xD6243E28B6FCCD8769781E2082BE97747551316CB6C2995D7BFD5A200F3AE6B03938495199BE7DEDFAD97C38D3983CD3
Handshake keys:
Client write: 0x0822C707450CB8EA62A082FD16B3D5341DCEF988BDF3D589CEFB980BA9A735B4
Server write: 0xC79F93618CF52EB8FD2352BA9457B105C60434D14F229D0AA6C289BC3BB51688
Handshake IVs:
Client write (IV): 0x8942E216156995CB8669092F
Server write (IV): 0x04B2E382D01C8031BF4DD88B
(Traffic level)
Traffic secrets:
Client: 0x89AE1E00C5A2AAD9D5E7AC25DEF706C4397A250031584CE5AC260DEFECDBA4DC3A732B4B79CD0B1FA4401A43084D82A9
Server: 0x2B8A70B7F72F6B55BA381BF6B6DC3F8B75B0E539BCEE0D01004ACDD5149584813F527F21AACD7A2EEFE2748C0DC41B1B
Traffic keys:
Client write: 0xE8313E4ECAA948AE388E05DD764465E6B18B89EB43316DED0BDF74FE863FE088
Server write: 0x2F191B99D6564979270251B6E5AF6DBB90E1158A8295CC353EDE6BB924E7EED7
Traffic base IVs:
Client write (base IV): 0x8940DE5085ABD40938D7AF6E
Server write (base IV): 0xD5DC4E77F9D7A8092AF63611
--- Messages ---
CLIENT_HELLO (recieved)
Version: 0x0303
Cipher suites:
0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
0xCCA8,0x00FF
Client Random: AA:A2:EC:9F:BC:6A:33:D0:15:37:93:BC:BF:0A:C1:4D:4A:4A:E9:FD:BC:F4:B8:30:D2:F9:69:60:1C:EE:8D:EF
Client SessionID: 9D:B7:AF:76:10:2E:D0:63:61:37:11:12:50:6D:30:22:39:21:C2:9D:A5:23:C9:40:C5:06:7D:DC:AC:2E:59:BA
Extensions:
Type: 11 (0x000B); /non-TLS-1.3/
01:00
Type: 16 (0x0010); "application_layer_protocol_negotiation"
68:32 (HTTP/2/TLS)
68:74:74:70:2F:31:2E:31 (HTTP/1.1)
Type: 00 (0x0000); "server_name"
00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
hostname: tls13.1d.pw
Type: 10 (0x000A); "supported_groups"
0x001D (X25519)
0x0017 (Secp256r1)
0x0018 (Secp384r1)
Type: 23 (0x0017); /non-TLS-1.3/
Type: 35 (0x0023); /non-TLS-1.3/
Type: 45 (0x002D); "psk_key_exchange_modes"
01:01
Type: 51 (0x0033); "key_share"
X25519 (0x001D)
x = 0xB9592CDEB1338427482C28D124DBC01EFB65BF80DC51BE41DE664C3D2EF47521
Type: 05 (0x0005); "status_request"
01:00:00:00:00
Type: 13 (0x000D); "signature_algorithms"
0x0503 (ECDSA_SECP384R1_SHA384)
0x0403 (ECDSA_SECP256R1_SHA256)
0x0807 (ED25519)
0x0806 (RSA_PSS_RSAE_SHA512)
0x0805 (RSA_PSS_RSAE_SHA384)
0x0804 (RSA_PSS_RSAE_SHA256)
0x0601 (RSA_PKCS1_SHA512)
0x0501 (RSA_PKCS1_SHA384)
0x0401 (RSA_PKCS1_SHA256)
Type: 43 (0x002B); "supported_versions"
0x0304 (TLS 1.3)
0x0303 (TLS 1.2)
HELLO_RETRY_REQUEST (sent, server)
Legacy Version: 0x0303
Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C
SessionID: 9D:B7:AF:76:10:2E:D0:63:61:37:11:12:50:6D:30:22:39:21:C2:9D:A5:23:C9:40:C5:06:7D:DC:AC:2E:59:BA
Extensions:
Type: 51 (0x0033); "key_share"
Secp256r1 (0x0017)
Type: 44 (0x002C); "cookie"
00:08:0C:00:FE:E1:C0:DE:FA:57
Type: 43 (0x002B); "supported_versions"
0x0304
[Legacy ChangeCipherSpec message sent (server)]
[Legacy ChangeCipherSpec message present (client)]
CLIENT_HELLO (recieved)
Version: 0x0303
Cipher suites:
0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
0xCCA8,0x00FF
Client Random: AA:A2:EC:9F:BC:6A:33:D0:15:37:93:BC:BF:0A:C1:4D:4A:4A:E9:FD:BC:F4:B8:30:D2:F9:69:60:1C:EE:8D:EF
Client SessionID: 9D:B7:AF:76:10:2E:D0:63:61:37:11:12:50:6D:30:22:39:21:C2:9D:A5:23:C9:40:C5:06:7D:DC:AC:2E:59:BA
Extensions:
Type: 11 (0x000B); /non-TLS-1.3/
01:00
Type: 16 (0x0010); "application_layer_protocol_negotiation"
68:32 (HTTP/2/TLS)
68:74:74:70:2F:31:2E:31 (HTTP/1.1)
Type: 00 (0x0000); "server_name"
00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
hostname: tls13.1d.pw
Type: 10 (0x000A); "supported_groups"
0x001D (X25519)
0x0017 (Secp256r1)
0x0018 (Secp384r1)
Type: 23 (0x0017); /non-TLS-1.3/
Type: 35 (0x0023); /non-TLS-1.3/
Type: 44 (0x002C); "cookie"
00:08:0C:00:FE:E1:C0:DE:FA:57
Type: 45 (0x002D); "psk_key_exchange_modes"
01:01
Type: 51 (0x0033); "key_share"
Secp256r1 (0x0017)
x = 0x096BFB8D82B91CC1CDA2AC35E17E328A1248A2E1599A1CA247928F3D7A1534E7
y = 0x82776C3117363FB1783EE400FD610E923F40C8C1271C556E73BEC95F5BB13E07
Type: 05 (0x0005); "status_request"
01:00:00:00:00
Type: 13 (0x000D); "signature_algorithms"
0x0503 (ECDSA_SECP384R1_SHA384)
0x0403 (ECDSA_SECP256R1_SHA256)
0x0807 (ED25519)
0x0806 (RSA_PSS_RSAE_SHA512)
0x0805 (RSA_PSS_RSAE_SHA384)
0x0804 (RSA_PSS_RSAE_SHA256)
0x0601 (RSA_PKCS1_SHA512)
0x0501 (RSA_PKCS1_SHA384)
0x0401 (RSA_PKCS1_SHA256)
Type: 43 (0x002B); "supported_versions"
0x0304 (TLS 1.3)
0x0303 (TLS 1.2)
SERVER_HELLO (sent)
Legacy Version: 0x0303
Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
SessionID: 9D:B7:AF:76:10:2E:D0:63:61:37:11:12:50:6D:30:22:39:21:C2:9D:A5:23:C9:40:C5:06:7D:DC:AC:2E:59:BA
Extensions:
Type: 51 (0x0033); "key_share"
Secp256r1 (0x0017)
x = 0x1FADAC79156E08C8532CE88DF887273141ACE16E44E9C268CE496596F41B65FA
y = 0xF82394637B6ACF004AB253F956BD2CD6CA6C9AD8454BF1FBF281A6C54A93D99C
Type: 43 (0x002B); "supported_versions"
0x0304
[Legacy ChangeCipherSpec message sent (server)]
SERVER_HANDSHAKE_MESSAGES (sent)
Type: 8 (0x08) - "encrypted_extensions"
Length (octets, dec.): 2
00:00
Type: 11 (0x0B) - "certificate"
Length (octets, dec.): 3401
[...] /skipped 3401 data octets/
Type: 15 (0x0F) - "certificate_verify"
Length (octets, dec.): 108
05:03:00:68:30:66:02:31:00:A3:92:DF:74:3F:75:D0:E0:21:2C:7A:4F:47:3E:88:1C:A1:B4:45:CE:97:7A:48
70:B6:24:8E:78:E0:F5:03:C1:45:66:7D:A0:0F:3A:05:69:2D:03:73:9C:10:15:E1:78:02:31:00:B3:9F:B3:7C
8D:FA:2C:B9:6C:73:82:A5:9A:A1:F5:BB:50:EF:DB:7D:E2:0F:FD:54:B6:45:56:6C:30:D3:5D:41:25:BC:E2:C6
A1:61:8B:E0:53:B1:23:3A:6E:1E:21:BB
Type: 20 (0x14) - "finished"
Length (octets, dec.): 48
E0:64:3C:50:92:FC:E3:0B:2E:1F:FC:8F:0E:AD:A2:2C:21:3D:BC:6B:66:CF:16:90:1A:1D:51:59:22:21:0C:7E
E8:C5:FA:EE:66:72:DE:5E:8E:08:78:FF:DE:BE:5C:F4
CLIENT_FINISHED (received)
Finished value: 0x241CC6A6DA6BE8B28B301650620179620B5906644F8FDC3CE5BA6ABB6E097874BCA35500A098EB84FD4239BD97EC7B58
Client Finished status: OK
CLIENT_APPLICATION_DATA (recieved)
ASCII dump (filtered):
GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit
/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo
t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host
: tls13.1d.pw....
TCP: server: 194.87.103.72:443; client: 216.73.216.240:18781; timestamp: 1779387398
Contacts: dxdt.ru, alex/()\/abaabb.xyz.
/\_/\
( 0.0 )
= ^ =
/|_|\
(") (")=~
Provide ESNI to get second ASCII cat
Elapsed server side: 282ms; ServerHello sent: 143ms (including HelloRetryRequest time); TLS connection established: 281ms.