TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK; HelloRetryRequest used;

Detailed description:

v.0.24.4-p
(This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, X25519MLKEM768, SecP256r1MLKEM768, X25519Kyber768, ESNI, etc.)

HelloRetryRequest used to (re)negotiate DH group
	First ClientHello, key shares:	0x001D
	Second ClientHello, key shares:	0x0101

CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	Key exchange: 0x0101 (ffdhe3072)

	(Handshake level)
	Handshake secrets:
		Client: 0xEE32DF92329B79B37CB048F43FA564114526A797C9FA6C4B04C9247C3FF6A983219EA5FA095DE7DF489EF6A974DA28FA
		Server: 0x0200040631DE359731A4CF949D8C7C521F6AA9319A4C2E11CA6366081625C7C31DFC51D003FC7CED1957560BBDBAEE31
	Handshake keys:
		Client write: 0x88E004D3F21CA9F7E91FBB2453B45F4138D17D91B3653405BF4485E79E54964C
		Server write: 0xB22ACE13ADD1336C2EEF93FBDC907C5F51BBDE0F3A67ACBF62E5D5ADC4BE3ACF
	Handshake IVs:
		Client write (IV): 0x22B8DF849F9B409E85B8349A
		Server write (IV): 0xB158E258912390BA45796937

	(Traffic level)
	Traffic secrets:
		Client: 0xD5B04C8E6E58513D61B813234C8B730A8D74A976054BB3CDFF34E909EF763AC6B6DEE26C13C09C145B4FB603090FB851
		Server: 0xF866D07BE53479E0DAFC2458DD4B5B505C6657AC580DE1ADAC060FA037F3068376729DFD613CC08A5DF63ED898F6873D
	Traffic keys:
		Client write: 0x88F09A2E79BC38E0244D7EB1642ACFB6DA3F9B9CCA09EA143AC4269453EA0143
		Server write: 0x685780CE8202A61BDC9C2D11CE77BE665C3221CA4849AFBA2E67BBC064BB795C
	Traffic base IVs:
		Client write (base IV): 0xDCF99131FC3F3382C7989B3D
		Server write (base IV): 0x2DABE52A21EA015DF5863D3E

--- Messages ---

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xCCA8
		0xC02F,0xC014,0xC013,0x009D,0x009C,0x0035,0x002F
	Client Random: 85:92:92:A4:1F:43:3F:28:F7:00:F9:DA:25:C3:F7:20:F6:A0:FC:2A:7A:A1:35:4D:FC:41:E1:79:C2:9F:E4:49
	Client SessionID: E9:55:2F:EF:FC:7D:11:97:81:69:F4:6B:BA:F8:9B:5F:CF:E0:1E:07:F7:FE:FE:E0:55:F0:D1:CE:0F:D2:78:02
	Extensions:
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
			0x0019 (Secp521r1)
			0x001E (X448)
			0x0100 (ffdhe2048)
			0x0101 (ffdhe3072)
			0x0102 (ffdhe4096)
			0x0103 (ffdhe6144)
			0x0104 (ffdhe8192)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 13 (0x000D); "signature_algorithms"
			0x0403 (ECDSA_SECP256R1_SHA256)
			0x0503 (ECDSA_SECP384R1_SHA384)
			0x0603 (ECDSA_SECP521R1_SHA512)
			0x0804 (RSA_PSS_RSAE_SHA256)
			0x0805 (RSA_PSS_RSAE_SHA384)
			0x0806 (RSA_PSS_RSAE_SHA512)
			0x0809 (RSA_PSS_PSS_SHA256)
			0x080A (RSA_PSS_PSS_SHA384)
			0x080B (RSA_PSS_PSS_SHA512)
			0x0401 (RSA_PKCS1_SHA256)
			0x0501 (RSA_PKCS1_SHA384)
			0x0601 (RSA_PKCS1_SHA512)
			0x0402 _unknown_
			0x0303 _unknown_
			0x0301 _unknown_
			0x0302 _unknown_
			0x0203 (ECDSA_SHA1)
			0x0201 (RSA_PKCS1_SHA1)
			0x0202 _unknown_
		Type: 50 (0x0032); "signature_algorithms_cert"
			00:26:04:03:05:03:06:03:08:04:08:05:08:06:08:09
			08:0A:08:0B:04:01:05:01:06:01:04:02:03:03:03:01
			03:02:02:03:02:01:02:02
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			68:32 (HTTP/2/TLS)
			68:74:74:70:2F:31:2E:31 (HTTP/1.1)
		Type: 17 (0x0011); /non-TLS-1.3/
			00:07:02:00:04:00:00:00:00
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0xE450A4F4719D7E667151776AD1C4774D615E6BD6C4427E51D5BA158F3CF5A22D
		Type: 65281 (0xFF01); /non-TLS-1.3/
			00

HELLO_RETRY_REQUEST (sent, server)

	Legacy Version: 0x0303
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C
	SessionID: E9:55:2F:EF:FC:7D:11:97:81:69:F4:6B:BA:F8:9B:5F:CF:E0:1E:07:F7:FE:FE:E0:55:F0:D1:CE:0F:D2:78:02
	Extensions:
		Type: 51 (0x0033); "key_share"
			ffdhe3072 (0x0101)
		Type: 44 (0x002C); "cookie"
			00:08:0C:00:FE:E1:C0:DE:FA:57
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xCCA8
		0xC02F,0xC014,0xC013,0x009D,0x009C,0x0035,0x002F
	Client Random: 85:92:92:A4:1F:43:3F:28:F7:00:F9:DA:25:C3:F7:20:F6:A0:FC:2A:7A:A1:35:4D:FC:41:E1:79:C2:9F:E4:49
	Client SessionID: E9:55:2F:EF:FC:7D:11:97:81:69:F4:6B:BA:F8:9B:5F:CF:E0:1E:07:F7:FE:FE:E0:55:F0:D1:CE:0F:D2:78:02
	Extensions:
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
			0x0019 (Secp521r1)
			0x001E (X448)
			0x0100 (ffdhe2048)
			0x0101 (ffdhe3072)
			0x0102 (ffdhe4096)
			0x0103 (ffdhe6144)
			0x0104 (ffdhe8192)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 13 (0x000D); "signature_algorithms"
			0x0403 (ECDSA_SECP256R1_SHA256)
			0x0503 (ECDSA_SECP384R1_SHA384)
			0x0603 (ECDSA_SECP521R1_SHA512)
			0x0804 (RSA_PSS_RSAE_SHA256)
			0x0805 (RSA_PSS_RSAE_SHA384)
			0x0806 (RSA_PSS_RSAE_SHA512)
			0x0809 (RSA_PSS_PSS_SHA256)
			0x080A (RSA_PSS_PSS_SHA384)
			0x080B (RSA_PSS_PSS_SHA512)
			0x0401 (RSA_PKCS1_SHA256)
			0x0501 (RSA_PKCS1_SHA384)
			0x0601 (RSA_PKCS1_SHA512)
			0x0402 _unknown_
			0x0303 _unknown_
			0x0301 _unknown_
			0x0302 _unknown_
			0x0203 (ECDSA_SHA1)
			0x0201 (RSA_PKCS1_SHA1)
			0x0202 _unknown_
		Type: 50 (0x0032); "signature_algorithms_cert"
			00:26:04:03:05:03:06:03:08:04:08:05:08:06:08:09
			08:0A:08:0B:04:01:05:01:06:01:04:02:03:03:03:01
			03:02:02:03:02:01:02:02
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			68:32 (HTTP/2/TLS)
			68:74:74:70:2F:31:2E:31 (HTTP/1.1)
		Type: 17 (0x0011); /non-TLS-1.3/
			00:07:02:00:04:00:00:00:00
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 44 (0x002C); "cookie"
			00:08:0C:00:FE:E1:C0:DE:FA:57
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 51 (0x0033); "key_share"
			ffdhe3072 (0x0101)
				Len (octets, dec.): 384
				Key:
				7C:85:0E:8F:72:3C:82:92:4F:96:21:00:D4:FB:9A:F9:CD:3C:A8:01:8B:0F:13:43:87:02:E4:47:1E:04:1D:D1:E4
				11:88:E0:4C:D3:23:A9:10:1C:25:0F:68:56:FE:54:5C:3F:80:11:8B:33:01:13:B3:E5:23:58:70:C9:5E:E3:A2:96
				B5:A8:C8:46:E3:CF:06:CC:C8:8C:23:67:99:E3:12:1C:1E:A4:83:05:15:7F:52:6B:66:D0:4F:D0:3D:F2:D2:B5:8E
				F5:FA:0F:69:73:FF:92:1F:5B:E8:20:99:B7:79:C8:BA:E9:72:19:B4:B1:BD:D0:DC:D8:BD:EE:CF:FA:8F:AD:E2:4D
				E5:F2:DE:C0:E1:46:6F:E1:33:6F:AC:B7:C1:38:64:36:AA:A5:CD:23:22:4A:F0:5C:C8:E0:ED:99:97:15:87:1E:6A
				9B:4B:54:1A:B4:4C:E5:46:EF:6A:F1:8A:52:C7:3B:2D:E8:F4:0E:81:A6:38:F1:05:C3:B2:27:95:1C:17:3D:9D:54
				8E:91:73:B0:72:D0:AB:C1:C0:D4:B1:F3:EA:3B:CA:93:36:EA:47:95:F4:4A:26:72:73:32:D4:6E:34:91:2A:7E:14
				26:DA:8F:CA:BE:E4:75:A6:5B:08:63:D7:B8:43:2B:8A:BD:1F:2D:97:38:14:2C:2D:B6:B0:09:FE:79:5C:0D:84:A3
				4D:F1:8F:B2:C7:96:3B:00:31:71:BB:E4:2E:35:C9:92:BE:B0:32:79:DD:EF:CF:02:08:45:C1:AA:32:3A:7C:17:5B
				34:C1:8E:5D:EF:C2:CD:B0:A5:2A:77:C3:4B:A9:D0:9F:44:9D:96:8A:79:5B:C7:DB:5A:83:72:FA:9A:26:60:64:71
				34:D3:D5:86:A6:C7:86:F3:9D:C8:20:CB:10:9E:6E:9C:83:FD:A7:F9:41:A2:CB:40:2B:51:20:05:2B:63:95:98:30
				08:EE:57:70:23:FB:54:CA:ED:67:EC:F5:25:D6:93:9F:05:B8:D9:2A:C0
		Type: 65281 (0xFF01); /non-TLS-1.3/
			00

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: E9:55:2F:EF:FC:7D:11:97:81:69:F4:6B:BA:F8:9B:5F:CF:E0:1E:07:F7:FE:FE:E0:55:F0:D1:CE:0F:D2:78:02
	Extensions:
		Type: 51 (0x0033); "key_share"
			ffdhe3072 (0x0101)
				Len (octets, dec.): 384
				Key:
				4F:24:C0:64:3B:37:B7:7A:0F:14:C1:75:0F:2D:31:D1:3E:83:1B:36:AC:D4:A5:0D:3C:99:A8:57:23:D6:4F:1D:60
				D0:1F:7E:C7:57:E3:E0:AC:FA:C6:7B:0E:47:D7:9B:37:63:CC:D8:9A:96:72:5A:6B:C0:50:5E:F7:60:52:42:69:06
				E7:93:D0:1B:07:8E:0C:23:E5:78:B9:6B:AA:F7:19:B1:AB:9D:F3:C2:56:0C:F6:9C:11:BC:A1:48:7E:1D:3A:CF:3B
				0C:15:32:25:23:69:BF:DA:74:31:3F:7E:4C:78:F8:31:90:E7:30:6F:6E:FC:D4:CA:B8:52:A6:A0:59:16:9D:67:7E
				17:F5:09:83:E4:70:05:0B:E5:9E:9E:01:C7:B6:A1:A1:A7:33:50:8D:1E:06:63:2C:51:84:37:94:97:7F:BD:D8:1F
				DD:81:B5:53:A5:BB:F8:0F:7F:56:FC:8D:1E:7C:EC:E1:2A:6F:EB:8E:A8:CF:50:0D:47:9F:FE:69:89:D5:79:8B:5F
				5B:8D:BE:A5:01:20:8F:BD:22:96:E6:23:FC:6D:2D:55:CD:83:B7:1C:D8:92:09:40:83:9F:18:70:30:15:9E:96:76
				BE:92:C2:36:A9:2F:07:9E:9A:36:5C:15:04:0B:58:64:C9:27:F3:E2:EA:C6:FF:2C:D8:07:81:8C:5C:97:38:AD:E6
				83:4B:47:C8:5B:0A:31:45:7D:A1:48:13:2C:23:81:F3:A9:B1:16:65:84:66:93:72:81:09:9E:2E:D9:5F:55:F5:DC
				E1:CD:09:24:86:C2:BE:69:C6:78:3F:B4:5A:B7:46:6A:44:E4:0D:0F:F4:FD:29:11:A6:7A:D5:4A:44:B0:80:BC:8B
				7C:9F:50:75:C7:51:5E:88:C8:65:D0:C5:A1:02:AF:C4:D5:1B:2C:AE:2A:E3:A8:E8:51:EC:CD:8F:63:1E:3B:38:D1
				D3:8B:ED:28:8C:FB:15:5A:D3:0E:9A:85:80:3C:FC:C2:24:46:89:03:87
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 3843
		[...] /skipped 3843 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 107
		05:03:00:67:30:65:02:30:5A:34:8B:D1:61:D9:F5:24:BB:40:52:9D:6A:A2:0F:F1:C3:0C:65:19:6A:A1:B4:3D
		9C:59:EF:F0:20:22:5F:CD:53:C5:A5:FC:94:E2:86:7A:A1:51:D6:E0:D1:00:36:78:02:31:00:AD:FE:52:1B:A7
		5B:57:0B:DA:4D:F4:C6:64:8C:19:D2:A7:4C:7F:4E:1A:D9:9B:30:F2:90:75:E2:18:07:1A:3D:AF:D0:B8:8D:47
		DE:D9:45:1D:05:AC:51:B6:33:57:23
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 48
		33:51:A9:92:C1:44:64:F0:0F:F4:CD:AC:85:6A:6F:A8:D5:DC:6D:6A:56:73:D2:0C:AE:74:94:3A:71:EF:F0:08
		78:EC:5C:97:81:77:4C:61:0E:30:88:A2:57:DA:D2:94
[Legacy ChangeCipherSpec message present (client)]

CLIENT_FINISHED (received)

	Finished value: 0xA447420991C5F9E4CA929ED810F580BDD9739ABA7D8DCF195C17C97B3FE7391EB299BD695474D1E17993EEDD7DFE7A6C
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..User-Agent: CCBot/2.0 (https://commoncrawl.org/f
		aq/)..Accept: text/html,application/xhtml+xml,application/xml;q=
		0.9,*/*;q=0.8..Accept-Language: en-US,en;q=0.5..If-Modified-Sinc
		e: Sat, 25 Jan 2025 22:18:51 GMT..Accept-Encoding: br,gzip..Host
		: tls13.1d.pw..Connection: Keep-Alive....

TCP: server: 194.87.103.72:443; client: 18.97.14.87:48152; timestamp: 1739711271


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 458ms; ServerHello sent: 149ms (including HelloRetryRequest time); TLS connection established: 457ms.