TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK; HelloRetryRequest used;

Detailed description:

v.0.23.4-p
(This TLS-1.3-only server supports ESNI, HelloRetryRequest, KeyUpdate, X25519Kyber768/draft0, ECDHE, FFDHE, etc.)

HelloRetryRequest used to (re)negotiate DH group
	First ClientHello, key shares:	0x001D
	Second ClientHello, key shares:	0x0017

CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	Key exchange: 0x0017 (Secp256r1)

	(Handshake level)
	Handshake secrets:
		Client: 0x9A68408822B10BDDB5C674A6718F131D44422AE2EC881B46A4404D75C32161392001836D5041CEDF98B354980C0E8A12
		Server: 0x5C6F5B86DEA75962295FF5067812C2E42EC312641A5CCDEA6AE4D51529BFD629AE484C679308DE56DD9748E162342718
	Handshake keys:
		Client write: 0x118FCC9E7DAABAFAF1D247064626E6A96C057813BBA60AE780B0A5D07DCA8CC6
		Server write: 0x14873DEF26C70630C4A3515CDBDFAF98F6ED239F97A9193844F286007C6D6476
	Handshake IVs:
		Client write (IV): 0xB94054515575A927FE14B5B4
		Server write (IV): 0x0DBDB029F904B3266314C58D

	(Traffic level)
	Traffic secrets:
		Client: 0xD46A498B03DB74902B0B019334CFA776AC643EC707B92CB9C50469EC8AF0AB5A55F94FBF10F0D553166E32E5761B8DCD
		Server: 0x23BFAF0369FAFAC6DB485583930F06D558B7F1017C18C22E9F0B335C09FC9D02EF367261CA155BDD558D3D18D54F1BDB
	Traffic keys:
		Client write: 0x627F35252EA41DEEC4CAD154B46E14EC633E9F558792F6FBC9C28F14C5023F83
		Server write: 0x42BF107517E9BD7EAFE36F95120415ED998D81B4C1C5D035F63A04A3E45F3803
	Traffic base IVs:
		Client write (base IV): 0x91462C5E80658D25258F152A
		Server write (base IV): 0xCB8903CD268259EA54042BEF

--- Messages ---

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
		0xCCA8,0x00FF
	Client Random: DC:52:52:B6:56:67:1E:44:23:D0:A8:8C:83:0A:AD:BD:5C:C6:AF:C7:CE:81:0F:AC:B9:DF:DA:58:0E:52:13:B2
	Client SessionID: B5:D1:CC:6E:44:9F:36:73:B7:5D:CE:45:3D:30:FF:1F:A6:51:07:FB:20:19:5E:55:B7:C2:F5:CC:47:5E:D2:38
	Extensions:
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
		Type: 13 (0x000D); "signature_algorithms"
			00:12:05:03:04:03:08:07:08:06:08:05:08:04:06:01
			05:01:04:01
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 18 (0x0012); "signed_certificate_timestamp"
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x36D638A26749008164CAE96C2DA20D3C92A7A4D9E18AC286FA82A6FAA066E10A
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			00:0C:02:68:32:08:68:74:74:70:2F:31:2E:31
		Type: 35 (0x0023); /non-TLS-1.3/

HELLO_RETRY_REQUEST (sent, server)

	Legacy Version: 0x0303
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C
	SessionID: B5:D1:CC:6E:44:9F:36:73:B7:5D:CE:45:3D:30:FF:1F:A6:51:07:FB:20:19:5E:55:B7:C2:F5:CC:47:5E:D2:38
	Extensions:
		Type: 51 (0x0033); "key_share"
			Secp256r1 (0x0017)
		Type: 44 (0x002C); "cookie"
			00:08:0C:00:FE:E1:C0:DE:FA:57
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

[Legacy ChangeCipherSpec message present (client)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
		0xCCA8,0x00FF
	Client Random: DC:52:52:B6:56:67:1E:44:23:D0:A8:8C:83:0A:AD:BD:5C:C6:AF:C7:CE:81:0F:AC:B9:DF:DA:58:0E:52:13:B2
	Client SessionID: B5:D1:CC:6E:44:9F:36:73:B7:5D:CE:45:3D:30:FF:1F:A6:51:07:FB:20:19:5E:55:B7:C2:F5:CC:47:5E:D2:38
	Extensions:
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
		Type: 13 (0x000D); "signature_algorithms"
			00:12:05:03:04:03:08:07:08:06:08:05:08:04:06:01
			05:01:04:01
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 18 (0x0012); "signed_certificate_timestamp"
		Type: 51 (0x0033); "key_share"
			Secp256r1 (0x0017)
				x = 0xEEDD19F02C058E059D913296D00865A718B6463D857AAC7306524BF62E01B131
				y = 0x8EB41626C6B845B1735ABA0B5EDD9F8AD70941FFD1FF813EC7E6235DF71F94B1
		Type: 44 (0x002C); "cookie"
			00:08:0C:00:FE:E1:C0:DE:FA:57
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			00:0C:02:68:32:08:68:74:74:70:2F:31:2E:31
		Type: 35 (0x0023); /non-TLS-1.3/

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: B5:D1:CC:6E:44:9F:36:73:B7:5D:CE:45:3D:30:FF:1F:A6:51:07:FB:20:19:5E:55:B7:C2:F5:CC:47:5E:D2:38
	Extensions:
		Type: 51 (0x0033); "key_share"
			Secp256r1 (0x0017)
				x = 0x1FADAC79156E08C8532CE88DF887273141ACE16E44E9C268CE496596F41B65FA
				y = 0xF82394637B6ACF004AB253F956BD2CD6CA6C9AD8454BF1FBF281A6C54A93D99C
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 4194
		[...] /skipped 4194 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 108
		05:03:00:68:30:66:02:31:00:86:80:5E:D1:84:73:B6:E5:20:49:F6:D5:1B:21:13:0D:A1:55:A4:9B:68:22:2E
		0E:95:9B:6C:91:BD:8C:9C:BF:C4:E4:69:CA:19:9B:B0:03:3D:9F:89:CB:2F:E5:53:BA:02:31:00:92:54:93:DA
		C9:DB:5B:14:86:22:E4:40:FF:F4:90:DB:98:68:B9:E5:42:BD:79:CE:A5:AF:EE:10:C3:B8:5E:11:44:3C:8A:D5
		3C:7B:58:82:A7:6D:DC:27:BC:14:0D:EF
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 48
		8E:EE:D3:BB:99:26:E0:5D:7B:1E:CB:5A:B7:32:73:E3:79:0E:97:FA:FA:CB:42:08:38:8C:E1:77:CA:98:5B:02
		EB:21:14:40:EA:A7:AB:F2:6B:97:06:8B:2A:4B:3D:E6

CLIENT_FINISHED (received)

	Finished value: 0x433D1EC22D6DCB11A7726B99B77FA2B1D981C8F454458D3A9D3C6AA5121B80180D3E154A663E709C3F998F67596AC3AA
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit
		/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo
		t@anthropic.com)..host: tls13.1d.pw....

TCP: server: 194.87.109.56:443; client: 18.218.234.83:10627; timestamp: 1714113632


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 225ms; ServerHello sent: 113ms (including HelloRetryRequest time); TLS connection established: 224ms.