Successfully connected
TLS 1.3 OK; HelloRetryRequest used;
Detailed description:
v.0.24.4-p
(This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, X25519MLKEM768, SecP256r1MLKEM768, X25519Kyber768, ESNI, etc.)
HelloRetryRequest used to (re)negotiate DH group
First ClientHello, key shares: 0x001D
Second ClientHello, key shares: 0x0017
CRYPTO_CONTEXT
Protocol version: 0x0304
Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
Key exchange: 0x0017 (Secp256r1)
(Handshake level)
Handshake secrets:
Client: 0x74BD5EC66CD0FD2E6ED64AEF05FCD167CF99DABEC42F5392C93048233300B40681DA6590692C92E95029A466FC8EB14D
Server: 0x989A96229695814F5EF1D51B8B2BB79CF8C65E9DF330F15DDF7789257F26F4AD808ED8126917C3B961B25C62628C10FC
Handshake keys:
Client write: 0xFA733591A9975A8A8B5BE7E872382D6B6AAAC0E68B3999D00CBAF2305F6A7C64
Server write: 0xE4630CC7D91E6115715B6114CC6F3B3F463498775821B7D2E5A87110072FE0D4
Handshake IVs:
Client write (IV): 0x9CA9E165ED9955018D2EC875
Server write (IV): 0x572ED3A86E470F6E5A48B1F5
(Traffic level)
Traffic secrets:
Client: 0x25B69B0809D90DD084B1A900AE2DDC289B4550CC1B90CC80B1CBF45D80325F0F342DE8D77046AFDEFB3A34CD92256F2F
Server: 0x26747587BFAD17C5BC6C1A39985E71F935F59CC3B17A2B91AA35D3F63314C45510F17588C60AA81CF697C0DCA4B8D739
Traffic keys:
Client write: 0x25787D56DCB2C1D5E56DE256A5536E69F8F946A2DD067FF47290BDDBC249A3FE
Server write: 0x4436E541A72B4E77A5A4ED0A0C600D1F9D635493F1C402BBE7290B65DF0A37E4
Traffic base IVs:
Client write (base IV): 0x0D4FF67532F4EC42D596329B
Server write (base IV): 0x2DA2DFFBDEA1901E14F43BC9
--- Messages ---
CLIENT_HELLO (recieved)
Version: 0x0303
Cipher suites:
0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
0xCCA8,0x00FF
Client Random: DC:B9:81:FB:44:B0:5C:40:F4:5A:3A:B4:5E:11:1E:CB:E2:2F:D3:91:7D:E4:D1:A4:12:60:2E:FE:68:BE:C0:47
Client SessionID: D0:1A:44:FA:F6:35:9E:13:64:13:30:E2:E6:52:5F:0D:6C:E0:E5:EC:B6:4D:81:26:91:18:4C:1D:56:39:CE:E9
Extensions:
Type: 23 (0x0017); /non-TLS-1.3/
Type: 51 (0x0033); "key_share"
X25519 (0x001D)
x = 0x94118258B6CB65CE44810E34FA697506849393FA455D62EBB97D254219CE2206
Type: 43 (0x002B); "supported_versions"
0x0304 (TLS 1.3)
0x0303 (TLS 1.2)
Type: 05 (0x0005); "status_request"
01:00:00:00:00
Type: 10 (0x000A); "supported_groups"
0x001D (X25519)
0x0017 (Secp256r1)
0x0018 (Secp384r1)
Type: 35 (0x0023); /non-TLS-1.3/
Type: 16 (0x0010); "application_layer_protocol_negotiation"
68:32 (HTTP/2/TLS)
68:74:74:70:2F:31:2E:31 (HTTP/1.1)
Type: 13 (0x000D); "signature_algorithms"
0x0503 (ECDSA_SECP384R1_SHA384)
0x0403 (ECDSA_SECP256R1_SHA256)
0x0807 (ED25519)
0x0806 (RSA_PSS_RSAE_SHA512)
0x0805 (RSA_PSS_RSAE_SHA384)
0x0804 (RSA_PSS_RSAE_SHA256)
0x0601 (RSA_PKCS1_SHA512)
0x0501 (RSA_PKCS1_SHA384)
0x0401 (RSA_PKCS1_SHA256)
Type: 11 (0x000B); /non-TLS-1.3/
01:00
Type: 00 (0x0000); "server_name"
00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
hostname: tls13.1d.pw
Type: 45 (0x002D); "psk_key_exchange_modes"
01:01
HELLO_RETRY_REQUEST (sent, server)
Legacy Version: 0x0303
Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C
SessionID: D0:1A:44:FA:F6:35:9E:13:64:13:30:E2:E6:52:5F:0D:6C:E0:E5:EC:B6:4D:81:26:91:18:4C:1D:56:39:CE:E9
Extensions:
Type: 51 (0x0033); "key_share"
Secp256r1 (0x0017)
Type: 44 (0x002C); "cookie"
00:08:0C:00:FE:E1:C0:DE:FA:57
Type: 43 (0x002B); "supported_versions"
0x0304
[Legacy ChangeCipherSpec message sent (server)]
[Legacy ChangeCipherSpec message present (client)]
CLIENT_HELLO (recieved)
Version: 0x0303
Cipher suites:
0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
0xCCA8,0x00FF
Client Random: DC:B9:81:FB:44:B0:5C:40:F4:5A:3A:B4:5E:11:1E:CB:E2:2F:D3:91:7D:E4:D1:A4:12:60:2E:FE:68:BE:C0:47
Client SessionID: D0:1A:44:FA:F6:35:9E:13:64:13:30:E2:E6:52:5F:0D:6C:E0:E5:EC:B6:4D:81:26:91:18:4C:1D:56:39:CE:E9
Extensions:
Type: 23 (0x0017); /non-TLS-1.3/
Type: 51 (0x0033); "key_share"
Secp256r1 (0x0017)
x = 0x12F0212E4033ACF92A848110C516748A791564F894DF78A33E0F6DD672A55866
y = 0x1AD7FDB4BA66C5CB6C922B6DBACCD0EF4BC55AE9A366B12430AC6A5065A6BA33
Type: 43 (0x002B); "supported_versions"
0x0304 (TLS 1.3)
0x0303 (TLS 1.2)
Type: 05 (0x0005); "status_request"
01:00:00:00:00
Type: 10 (0x000A); "supported_groups"
0x001D (X25519)
0x0017 (Secp256r1)
0x0018 (Secp384r1)
Type: 35 (0x0023); /non-TLS-1.3/
Type: 16 (0x0010); "application_layer_protocol_negotiation"
68:32 (HTTP/2/TLS)
68:74:74:70:2F:31:2E:31 (HTTP/1.1)
Type: 13 (0x000D); "signature_algorithms"
0x0503 (ECDSA_SECP384R1_SHA384)
0x0403 (ECDSA_SECP256R1_SHA256)
0x0807 (ED25519)
0x0806 (RSA_PSS_RSAE_SHA512)
0x0805 (RSA_PSS_RSAE_SHA384)
0x0804 (RSA_PSS_RSAE_SHA256)
0x0601 (RSA_PKCS1_SHA512)
0x0501 (RSA_PKCS1_SHA384)
0x0401 (RSA_PKCS1_SHA256)
Type: 44 (0x002C); "cookie"
00:08:0C:00:FE:E1:C0:DE:FA:57
Type: 11 (0x000B); /non-TLS-1.3/
01:00
Type: 00 (0x0000); "server_name"
00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
hostname: tls13.1d.pw
Type: 45 (0x002D); "psk_key_exchange_modes"
01:01
SERVER_HELLO (sent)
Legacy Version: 0x0303
Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
SessionID: D0:1A:44:FA:F6:35:9E:13:64:13:30:E2:E6:52:5F:0D:6C:E0:E5:EC:B6:4D:81:26:91:18:4C:1D:56:39:CE:E9
Extensions:
Type: 51 (0x0033); "key_share"
Secp256r1 (0x0017)
x = 0x1FADAC79156E08C8532CE88DF887273141ACE16E44E9C268CE496596F41B65FA
y = 0xF82394637B6ACF004AB253F956BD2CD6CA6C9AD8454BF1FBF281A6C54A93D99C
Type: 43 (0x002B); "supported_versions"
0x0304
[Legacy ChangeCipherSpec message sent (server)]
SERVER_HANDSHAKE_MESSAGES (sent)
Type: 8 (0x08) - "encrypted_extensions"
Length (octets, dec.): 2
00:00
Type: 11 (0x0B) - "certificate"
Length (octets, dec.): 3401
[...] /skipped 3401 data octets/
Type: 15 (0x0F) - "certificate_verify"
Length (octets, dec.): 106
05:03:00:66:30:64:02:30:10:14:93:B5:4C:92:40:97:95:C9:5C:AB:FA:FE:DB:C7:FB:6C:E5:65:5D:48:72:AB
EF:A4:67:04:E7:0D:C6:7A:69:65:64:DA:64:B7:7C:61:D8:FA:CE:C8:03:B9:FD:29:02:30:53:8D:CA:91:8E:A2
53:3E:99:8C:03:49:F6:39:9A:AA:47:7A:08:72:AF:AE:BC:07:04:16:6E:30:17:FA:E5:F8:A5:03:CA:7A:9E:E9
BD:8C:16:99:47:1A:38:14:FB:AB
Type: 20 (0x14) - "finished"
Length (octets, dec.): 48
13:FA:C3:31:92:44:31:B8:4F:D3:1A:E3:38:8F:18:4E:A8:07:F7:C7:60:F7:44:4D:94:7A:D1:43:55:A8:56:83
F5:0A:27:AD:C6:00:3A:0A:A3:0B:E8:0C:BA:A3:01:A8
CLIENT_FINISHED (received)
Finished value: 0x1BC14E92D641E179254969E34E849FFE1E66CF1BF632E3CBECE6B1F395AE6F6D2541801082061854FCA7FA35F6889CF4
Client Finished status: OK
CLIENT_APPLICATION_DATA (recieved)
ASCII dump (filtered):
GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit
/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo
t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host
: tls13.1d.pw....
TCP: server: 194.87.103.72:443; client: 216.73.216.60:50270; timestamp: 1779328470
Contacts: dxdt.ru, alex/()\/abaabb.xyz.
/\_/\
( 0.0 )
= ^ =
/|_|\
(") (")=~
Provide ESNI to get second ASCII cat
Elapsed server side: 314ms; ServerHello sent: 171ms (including HelloRetryRequest time); TLS connection established: 313ms.