TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK; HelloRetryRequest used;

Detailed description:

v.0.24.2-p
(This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, X25519Kyber768, P256Kyber768, P384Kyber768, ECDHE, FFDHE, ESNI, etc.)

HelloRetryRequest used to (re)negotiate DH group
	First ClientHello, key shares:	0x001D
	Second ClientHello, key shares:	0x0017

CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
	Key exchange: 0x0017 (Secp256r1)

	(Handshake level)
	Handshake secrets:
		Client: 0x0B4ACBD638E4D6A36CC7BBA595FDAEAE4CB04967AC2810D0D4BF4C7BD3ED7F4D
		Server: 0x1C0A6B18666E56046F15B8D840467480D8F24C635631905D10F02DC97BD8004B
	Handshake keys:
		Client write: 0xA1C56AEB55B0F1145D18E3E211C5CC07967CB577A27E56A06026B8EA8703AB83
		Server write: 0x1A88F55B0EB33E97EB34065335366EB2E6FDC78BF809B34F7C7B36124525E1FE
	Handshake IVs:
		Client write (IV): 0x444D3E2A795F5EA7D62BFD9D
		Server write (IV): 0xE346AD999DE9319871887D6A

	(Traffic level)
	Traffic secrets:
		Client: 0x570785D66E4F0EC92361FC38014837431FFC550038C8CAC2CBFB6A0DE124C6DF
		Server: 0xF6172A6E97403F343D9656F895EC99E3B0A9B2F519C68D62E6A2145DC29877E3
	Traffic keys:
		Client write: 0x128DABE06D9A34AC57A97F922A6A06C8E037FD028C92C3F7F949000293E2D417
		Server write: 0xB1A50755513CE1324CA591CC2FD208C0BBAAA29D611AEE7CA6CD9C667BD29D18
	Traffic base IVs:
		Client write (base IV): 0x34DD611C573A2333F8401FDB
		Server write (base IV): 0x45603357F25A592C30EAD249

--- Messages ---

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xCCA8
		0xC02F,0xC014,0xC013,0x009D,0x009C,0x0035,0x002F
	Client Random: 3A:86:B6:DE:2D:3B:40:38:A0:C1:3C:20:49:66:FA:2C:73:48:CD:6C:F9:17:4D:34:23:63:7A:13:71:62:D3:26
	Client SessionID: CC:CB:CA:AD:67:F0:96:D7:51:3B:DA:EF:C8:7D:E2:8B:7F:7B:6F:E2:41:D1:6E:BE:52:5B:C3:20:BE:68:6C:93
	Extensions:
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
			0x0019 (Secp521r1)
			0x001E (X448)
			0x0100 (ffdhe2048)
			0x0101 (ffdhe3072)
			0x0102 (ffdhe4096)
			0x0103 (ffdhe6144)
			0x0104 (ffdhe8192)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 13 (0x000D); "signature_algorithms"
			0x0403 (ECDSA_SECP256R1_SHA256)
			0x0503 (ECDSA_SECP384R1_SHA384)
			0x0603 (ECDSA_SECP521R1_SHA512)
			0x0804 (RSA_PSS_RSAE_SHA256)
			0x0805 (RSA_PSS_RSAE_SHA384)
			0x0806 (RSA_PSS_RSAE_SHA512)
			0x0809 (RSA_PSS_PSS_SHA256)
			0x080A (RSA_PSS_PSS_SHA384)
			0x080B (RSA_PSS_PSS_SHA512)
			0x0401 (RSA_PKCS1_SHA256)
			0x0501 (RSA_PKCS1_SHA384)
			0x0601 (RSA_PKCS1_SHA512)
			0x0402 _unknown_
			0x0303 _unknown_
			0x0301 _unknown_
			0x0302 _unknown_
			0x0203 (ECDSA_SHA1)
			0x0201 (RSA_PKCS1_SHA1)
			0x0202 _unknown_
		Type: 50 (0x0032); "signature_algorithms_cert"
			00:26:04:03:05:03:06:03:08:04:08:05:08:06:08:09
			08:0A:08:0B:04:01:05:01:06:01:04:02:03:03:03:01
			03:02:02:03:02:01:02:02
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			68:74:74:70:2F:31:2E:31 (HTTP/1.1)
		Type: 17 (0x0011); /non-TLS-1.3/
			00:07:02:00:04:00:00:00:00
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x32A96FFAE45CDD9C01B3B5BE2CFF3FF3A6C179BADF2504E359247C67A52C5744
		Type: 65281 (0xFF01); /non-TLS-1.3/
			00

HELLO_RETRY_REQUEST (sent, server)

	Legacy Version: 0x0303
	Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
	HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C
	SessionID: CC:CB:CA:AD:67:F0:96:D7:51:3B:DA:EF:C8:7D:E2:8B:7F:7B:6F:E2:41:D1:6E:BE:52:5B:C3:20:BE:68:6C:93
	Extensions:
		Type: 51 (0x0033); "key_share"
			Secp256r1 (0x0017)
		Type: 44 (0x002C); "cookie"
			00:08:0C:00:FE:E1:C0:DE:FA:57
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xCCA8
		0xC02F,0xC014,0xC013,0x009D,0x009C,0x0035,0x002F
	Client Random: 3A:86:B6:DE:2D:3B:40:38:A0:C1:3C:20:49:66:FA:2C:73:48:CD:6C:F9:17:4D:34:23:63:7A:13:71:62:D3:26
	Client SessionID: CC:CB:CA:AD:67:F0:96:D7:51:3B:DA:EF:C8:7D:E2:8B:7F:7B:6F:E2:41:D1:6E:BE:52:5B:C3:20:BE:68:6C:93
	Extensions:
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
			0x0019 (Secp521r1)
			0x001E (X448)
			0x0100 (ffdhe2048)
			0x0101 (ffdhe3072)
			0x0102 (ffdhe4096)
			0x0103 (ffdhe6144)
			0x0104 (ffdhe8192)
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 13 (0x000D); "signature_algorithms"
			0x0403 (ECDSA_SECP256R1_SHA256)
			0x0503 (ECDSA_SECP384R1_SHA384)
			0x0603 (ECDSA_SECP521R1_SHA512)
			0x0804 (RSA_PSS_RSAE_SHA256)
			0x0805 (RSA_PSS_RSAE_SHA384)
			0x0806 (RSA_PSS_RSAE_SHA512)
			0x0809 (RSA_PSS_PSS_SHA256)
			0x080A (RSA_PSS_PSS_SHA384)
			0x080B (RSA_PSS_PSS_SHA512)
			0x0401 (RSA_PKCS1_SHA256)
			0x0501 (RSA_PKCS1_SHA384)
			0x0601 (RSA_PKCS1_SHA512)
			0x0402 _unknown_
			0x0303 _unknown_
			0x0301 _unknown_
			0x0302 _unknown_
			0x0203 (ECDSA_SHA1)
			0x0201 (RSA_PKCS1_SHA1)
			0x0202 _unknown_
		Type: 50 (0x0032); "signature_algorithms_cert"
			00:26:04:03:05:03:06:03:08:04:08:05:08:06:08:09
			08:0A:08:0B:04:01:05:01:06:01:04:02:03:03:03:01
			03:02:02:03:02:01:02:02
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			68:74:74:70:2F:31:2E:31 (HTTP/1.1)
		Type: 17 (0x0011); /non-TLS-1.3/
			00:07:02:00:04:00:00:00:00
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 44 (0x002C); "cookie"
			00:08:0C:00:FE:E1:C0:DE:FA:57
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01
		Type: 51 (0x0033); "key_share"
			Secp256r1 (0x0017)
				x = 0xB632B42A943CF99FF95E7045E3D608E6DFBC5A34E3C33D5C400A0E1735A1CA0B
				y = 0x872334E83CF5B5401D898D908F15A5C279EBD33540BA4796BCF98C133380C619
		Type: 65281 (0xFF01); /non-TLS-1.3/
			00

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1303 (TLS_CHACHA20_POLY1305_SHA256)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: CC:CB:CA:AD:67:F0:96:D7:51:3B:DA:EF:C8:7D:E2:8B:7F:7B:6F:E2:41:D1:6E:BE:52:5B:C3:20:BE:68:6C:93
	Extensions:
		Type: 51 (0x0033); "key_share"
			Secp256r1 (0x0017)
				x = 0x1FADAC79156E08C8532CE88DF887273141ACE16E44E9C268CE496596F41B65FA
				y = 0xF82394637B6ACF004AB253F956BD2CD6CA6C9AD8454BF1FBF281A6C54A93D99C
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 4194
		[...] /skipped 4194 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 106
		05:03:00:66:30:64:02:30:2A:15:33:7B:A9:47:F0:37:70:C7:64:6C:48:3E:F9:70:3A:7F:4C:A7:41:32:0E:DD
		D2:34:A6:8E:8A:49:91:7D:0C:37:7D:D3:C3:D1:9B:6C:9A:F1:51:BC:F9:AF:29:0B:02:30:1F:9F:3A:53:30:F2
		13:CD:2A:CF:82:8C:5D:8C:2D:18:2C:56:46:8D:04:0F:09:39:DE:72:04:65:B0:71:E4:37:37:27:0B:2F:B6:FB
		49:36:96:65:91:0B:09:60:D7:90
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 32
		0C:29:58:FC:8E:DC:A4:FA:B9:0C:3E:F6:F6:34:0B:95:B4:44:A0:25:A1:CD:C9:78:70:4C:80:11:EF:2F:5E:AD

[Legacy ChangeCipherSpec message present (client)]

CLIENT_FINISHED (received)

	Finished value: 0x9C1CDA8ED002A0998E206FAA2253A005FDBE7AA00B8371BA1996318A67B52048
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..User-Agent: CCBot/2.0 (https://commoncrawl.org/f
		aq/)..Accept: text/html,application/xhtml+xml,application/xml;q=
		0.9,*/*;q=0.8..Accept-Language: en-US,en;q=0.5..If-Modified-Sinc
		e: Wed, 19 Jun 2024 23:11:55 GMT..Accept-Encoding: br,gzip..Host
		: tls13.1d.pw..Connection: Keep-Alive....

TCP: server: 194.87.109.56:443; client: 44.213.60.33:36726; timestamp: 1720975147


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 322ms; ServerHello sent: 96ms (including HelloRetryRequest time); TLS connection established: 321ms.