TLS 1.3 Connection Test Server at tls13.1d.pw

Successfully connected

TLS 1.3 OK;

Detailed description:

v.0.24.4-p
(This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, X25519MLKEM768, SecP256r1MLKEM768, X25519Kyber768, ESNI, etc.)


CRYPTO_CONTEXT

	Protocol version: 0x0304
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	Key exchange: 0x001D (X25519)

	(Handshake level)
	Handshake secrets:
		Client: 0x06B45D06068173DF8812AE5490197AD5C3F4A5DB547A1A4E04E248F21D79DEE87FFEA6678D0F1D7E19F1ED84421F12EC
		Server: 0xB036DBFB7B46E24289B4BA9B4CB6AD98A100EB268D031235EEEE5C1F3DB1380B0E942B629BDBE9E20030578ECBFFC2C7
	Handshake keys:
		Client write: 0xD85E7389370F69D35A8A598272E17F5EACEF6B98821D039674EBC547E1C62BB4
		Server write: 0xF43CC851916A844D3A97495EDF1C04E935556C01450674625F84EF6991EC2DDA
	Handshake IVs:
		Client write (IV): 0x6E1752470DA7A141E62B9B3E
		Server write (IV): 0x4DCD644FD2312266BB836140

	(Traffic level)
	Traffic secrets:
		Client: 0x4C8D4246421C82534FCD2B0DFC1B297E514C2A37AD35B0F078247EF4A43DB397A931FA122157A50490D3A8E2EA943BB6
		Server: 0x12A2D9514CCB67A76FF4C806982A32C55DD2CCEBE450569EF9AA27712E51B17110076FB72735C5FDAEBD02D2449839D7
	Traffic keys:
		Client write: 0xA4F018C62DD3CCE3C6894E201E91FBA4245FE7C2610B18D9919528AAC344C391
		Server write: 0x08C2B7211B2C3C7E21D545F6E6F27C058BB9E847FD82E024A6795AF72C4C4470
	Traffic base IVs:
		Client write (base IV): 0x5401CE456579D05776505B10
		Server write (base IV): 0x3FD59030B939CCBCE0315BAA

--- Messages ---

[Legacy ChangeCipherSpec message sent (server)]

CLIENT_HELLO (recieved)

	Version: 0x0303
	Cipher suites:
		0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F
		0xCCA8,0x00FF
	Client Random: 66:18:24:99:36:B4:A4:9B:47:4B:E5:A7:83:3D:84:AA:65:CA:C6:CA:58:45:A2:C5:81:88:97:27:A9:CA:0D:26
	Client SessionID: 8A:5B:D3:F1:79:55:76:AA:1A:A7:60:C3:1D:85:80:72:D0:ED:3B:97:27:EE:36:2B:4C:49:E9:98:9F:73:0A:56
	Extensions:
		Type: 35 (0x0023); /non-TLS-1.3/
		Type: 13 (0x000D); "signature_algorithms"
			0x0503 (ECDSA_SECP384R1_SHA384)
			0x0403 (ECDSA_SECP256R1_SHA256)
			0x0807 (ED25519)
			0x0806 (RSA_PSS_RSAE_SHA512)
			0x0805 (RSA_PSS_RSAE_SHA384)
			0x0804 (RSA_PSS_RSAE_SHA256)
			0x0601 (RSA_PKCS1_SHA512)
			0x0501 (RSA_PKCS1_SHA384)
			0x0401 (RSA_PKCS1_SHA256)
		Type: 16 (0x0010); "application_layer_protocol_negotiation"
			68:32 (HTTP/2/TLS)
			68:74:74:70:2F:31:2E:31 (HTTP/1.1)
		Type: 10 (0x000A); "supported_groups"
			0x001D (X25519)
			0x0017 (Secp256r1)
			0x0018 (Secp384r1)
		Type: 00 (0x0000); "server_name"
			00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77
			hostname: tls13.1d.pw
		Type: 11 (0x000B); /non-TLS-1.3/
			01:00
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x12031374FA4F8AB528133B210183622F9790720242173719E637103F153CD64B
		Type: 23 (0x0017); /non-TLS-1.3/
		Type: 43 (0x002B); "supported_versions"
			0x0304 (TLS 1.3)
			0x0303 (TLS 1.2)
		Type: 05 (0x0005); "status_request"
			01:00:00:00:00
		Type: 45 (0x002D); "psk_key_exchange_modes"
			01:01

SERVER_HELLO (sent)

	Legacy Version: 0x0303
	Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384)
	Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
	SessionID: 8A:5B:D3:F1:79:55:76:AA:1A:A7:60:C3:1D:85:80:72:D0:ED:3B:97:27:EE:36:2B:4C:49:E9:98:9F:73:0A:56
	Extensions:
		Type: 51 (0x0033); "key_share"
			X25519 (0x001D)
				x = 0x145891E6697DAA111BD9A43EB39FA860847D09303D603128F82CE7451DAE456B
		Type: 43 (0x002B); "supported_versions"
			0x0304

[Legacy ChangeCipherSpec message sent (server)]

SERVER_HANDSHAKE_MESSAGES (sent)

	Type: 8 (0x08) - "encrypted_extensions"
		Length (octets, dec.): 2
		00:00
	Type: 11 (0x0B) - "certificate"
		Length (octets, dec.): 3886
		[...] /skipped 3886 data octets/
	Type: 15 (0x0F) - "certificate_verify"
		Length (octets, dec.): 107
		05:03:00:67:30:65:02:30:52:75:65:45:36:82:57:96:48:2E:58:00:1A:41:34:D1:AB:74:E4:FF:B1:B2:AD:6A
		2B:D9:C3:73:D1:B6:2A:99:CE:7C:75:F5:34:D4:37:4E:5A:7F:2D:D2:B9:E8:0E:E4:02:31:00:9C:73:D3:84:C5
		55:50:E5:17:68:9F:46:3B:02:EA:CC:AB:5A:75:71:6E:B9:FB:B3:2C:79:2B:AC:3E:82:88:B8:AB:28:D2:22:03
		C4:48:52:27:20:C3:C3:FD:82:34:BD
	Type: 20 (0x14) - "finished"
		Length (octets, dec.): 48
		2D:CA:36:B1:0D:59:33:05:C0:43:F9:A1:76:0C:51:AB:9C:42:16:F8:AD:28:4F:ED:61:44:C9:16:D8:69:20:1C
		C0:7A:5E:73:3F:06:25:B0:2B:2A:33:FE:FC:C1:84:44
[Legacy ChangeCipherSpec message present (client)]

CLIENT_FINISHED (received)

	Finished value: 0xF345D5E4A736E9E3E877D12AA45AD56E3C420CB407156A301D9EAD6A17D6889742B5745CE353199A2587411528143EDF
	Client Finished status: OK

CLIENT_APPLICATION_DATA (recieved)

	ASCII dump (filtered):
		GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit
		/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo
		t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host
		: tls13.1d.pw....

TCP: server: 194.87.103.72:443; client: 18.224.93.225:29131; timestamp: 1745494438


Contacts: dxdt.ru, alex/()\/abaabb.xyz.

 /\_/\
( 0.0 )
 = ^ =
 /|_|\
(") (")=~


Provide ESNI to get second ASCII cat

Elapsed server side: 147ms; ServerHello sent: 9ms; TLS connection established: 147ms.