Successfully connected
TLS 1.3 OK; HelloRetryRequest used;
Detailed description:
v.0.24.4-p (This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, X25519MLKEM768, SecP256r1MLKEM768, X25519Kyber768, ESNI, etc.) HelloRetryRequest used to (re)negotiate DH group First ClientHello, key shares: 0x001D Second ClientHello, key shares: 0x0018 CRYPTO_CONTEXT Protocol version: 0x0304 Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384) Key exchange: 0x0018 (Secp384r1) (Handshake level) Handshake secrets: Client: 0x766DDCCA6CC2BCBAFA55D37B663C224CB3CC0CB99F52484976E24249226068742F80E93F5A4A86F9F8A67D5E1A681003 Server: 0x5E88DED5CC9976763C2AC1F3F12396DDF33FD08BB01ABF2558CB90247BC945FD23AD5AE0AC5DA7DFC015183F43BE9E61 Handshake keys: Client write: 0x4E5524D9D603541CD4518CEA71F359D231F843F9F61A572D97E10D809EB0E894 Server write: 0xC05406D3D0AA7CE8F09DFFAF7860C65866676D943567239F301E53FA9E5C93A1 Handshake IVs: Client write (IV): 0x23B53A1B514D21C2EA83AC88 Server write (IV): 0xA1EB652C2EC4AD09148EFC94 (Traffic level) Traffic secrets: Client: 0xACC67BB3D0C7507251502CF5DB8F1432033A3A23482C7DC984FB08D1FCA6AD1D9A6FD09C2C350D730614FFE0C9AD86A6 Server: 0x43ACE56F88640664A44E41C826BC94D4E2527230C1DB7A011B1C0375DABC21A86BBDD0358E39A37203987C3FA1F3CE03 Traffic keys: Client write: 0xAE2C678860EFB0E3EAE2A8CD9F65B85A02BA7543447B1A09E8BBACF186F32E04 Server write: 0xDF4765575F9BA6B2DD7AD6EB4CDEFAF06B4142739FEC65EB6A65AA3EE0E57E9D Traffic base IVs: Client write (base IV): 0x41C6BA3FA142D2DF8628B132 Server write (base IV): 0xEACA333DD0F804A32D23C616 --- Messages --- CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: 54:AC:4E:FB:0B:B5:61:59:7A:D7:AC:C1:C0:67:75:2E:37:49:30:11:2A:98:A7:1D:7D:C7:78:3A:39:D5:B1:45 Client SessionID: DC:B8:AC:62:74:73:D5:66:5F:FC:80:7C:A3:5A:41:4C:D9:22:7E:25:57:21:C7:CD:C1:D9:20:64:CD:D9:CB:FA Extensions: Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 23 (0x0017); /non-TLS-1.3/ Type: 13 (0x000D); "signature_algorithms" 0x0503 (ECDSA_SECP384R1_SHA384) 0x0403 (ECDSA_SECP256R1_SHA256) 0x0807 (ED25519) 0x0806 (RSA_PSS_RSAE_SHA512) 0x0805 (RSA_PSS_RSAE_SHA384) 0x0804 (RSA_PSS_RSAE_SHA256) 0x0601 (RSA_PKCS1_SHA512) 0x0501 (RSA_PKCS1_SHA384) 0x0401 (RSA_PKCS1_SHA256) Type: 35 (0x0023); /non-TLS-1.3/ Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 51 (0x0033); "key_share" X25519 (0x001D) x = 0x9EF33CA7CF4C983A6A4E0ECB4C203554DCA2317525FD0E2BF3C1AAA5A45CC37C Type: 16 (0x0010); "application_layer_protocol_negotiation" 68:32 (HTTP/2/TLS) 68:74:74:70:2F:31:2E:31 (HTTP/1.1) HELLO_RETRY_REQUEST (sent, server) Legacy Version: 0x0303 Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384) HelloRetryRequest (Server Random): CF:21:AD:74:E5:9A:61:11:BE:1D:8C:02:1E:65:B8:91:C2:A2:11:16:7A:BB:8C:5E:07:9E:09:E2:C8:A8:33:9C SessionID: DC:B8:AC:62:74:73:D5:66:5F:FC:80:7C:A3:5A:41:4C:D9:22:7E:25:57:21:C7:CD:C1:D9:20:64:CD:D9:CB:FA Extensions: Type: 51 (0x0033); "key_share" Secp384r1 (0x0018) Type: 44 (0x002C); "cookie" 00:08:0C:00:FE:E1:C0:DE:FA:57 Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] [Legacy ChangeCipherSpec message present (client)] CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: 54:AC:4E:FB:0B:B5:61:59:7A:D7:AC:C1:C0:67:75:2E:37:49:30:11:2A:98:A7:1D:7D:C7:78:3A:39:D5:B1:45 Client SessionID: DC:B8:AC:62:74:73:D5:66:5F:FC:80:7C:A3:5A:41:4C:D9:22:7E:25:57:21:C7:CD:C1:D9:20:64:CD:D9:CB:FA Extensions: Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 23 (0x0017); /non-TLS-1.3/ Type: 13 (0x000D); "signature_algorithms" 0x0503 (ECDSA_SECP384R1_SHA384) 0x0403 (ECDSA_SECP256R1_SHA256) 0x0807 (ED25519) 0x0806 (RSA_PSS_RSAE_SHA512) 0x0805 (RSA_PSS_RSAE_SHA384) 0x0804 (RSA_PSS_RSAE_SHA256) 0x0601 (RSA_PKCS1_SHA512) 0x0501 (RSA_PKCS1_SHA384) 0x0401 (RSA_PKCS1_SHA256) Type: 35 (0x0023); /non-TLS-1.3/ Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 44 (0x002C); "cookie" 00:08:0C:00:FE:E1:C0:DE:FA:57 Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 51 (0x0033); "key_share" Secp384r1 (0x0018) x = 0x6F2F9A2228983342B35DDE903E02BDAA792998EFFB6E06F726B835C0D6B4CA8D0024D74F57C0814ABC69EEA9AF22F6A4 y = 0xD8A11CB7A1433AA87FAC7C22253F940B6BC1DA534E230714AF01B22ED7DC58E0606A2E686D5CC9F1CC54D02DFF909A56 Type: 16 (0x0010); "application_layer_protocol_negotiation" 68:32 (HTTP/2/TLS) 68:74:74:70:2F:31:2E:31 (HTTP/1.1) SERVER_HELLO (sent) Legacy Version: 0x0303 Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384) Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 SessionID: DC:B8:AC:62:74:73:D5:66:5F:FC:80:7C:A3:5A:41:4C:D9:22:7E:25:57:21:C7:CD:C1:D9:20:64:CD:D9:CB:FA Extensions: Type: 51 (0x0033); "key_share" Secp384r1 (0x0018) x = 0x884DFC0FE9602539133D59E3779E9DE8644D3532211C1061EFD16D15BE349D6723496325775E87CF3D396F1C02FCC5CF y = 0x063315C18E34D26B9085A96A495F17B8557DB379DB6ABED0788C60417FCE917ADD8976BB955D9E7E1B1CC6C06F577280 Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] SERVER_HANDSHAKE_MESSAGES (sent) Type: 8 (0x08) - "encrypted_extensions" Length (octets, dec.): 2 00:00 Type: 11 (0x0B) - "certificate" Length (octets, dec.): 3856 [...] /skipped 3856 data octets/ Type: 15 (0x0F) - "certificate_verify" Length (octets, dec.): 106 05:03:00:66:30:64:02:2F:6B:A8:AD:5C:24:E2:53:33:4D:B0:78:CC:DA:B8:2D:92:72:BB:7F:C8:90:8D:DA:AF 40:5C:AF:F3:5A:B5:AF:FB:A5:0D:4E:54:0E:54:5C:C6:5C:E7:D0:6F:CE:5C:88:02:31:00:C7:B7:4A:06:15:96 A8:84:57:CD:3D:3B:1B:EF:38:23:12:DB:9A:FE:B7:6E:57:C5:4E:49:1D:F4:FF:86:CC:03:66:60:4A:CC:EC:4C E9:3B:3B:16:A7:E7:FD:33:2F:9D Type: 20 (0x14) - "finished" Length (octets, dec.): 48 B9:A1:70:18:67:76:D2:2D:43:1B:51:AF:E2:23:1A:A8:81:59:C8:DE:43:46:FB:EA:1E:C4:3B:92:DB:62:BD:B8 39:FC:12:A1:B0:F1:1C:B7:75:09:0E:38:03:09:A4:31 CLIENT_FINISHED (received) Finished value: 0x1B36B0441AA89815762609C83E43CBD3AA20BF2E6D8701485D2AFD560A896674A7E36472F4FE5F0198FA4AD5725AEF4B Client Finished status: OK CLIENT_APPLICATION_DATA (recieved) ASCII dump (filtered): GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit /537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host : tls13.1d.pw.... TCP: server: 194.87.103.72:443; client: 216.73.216.141:39698; timestamp: 1758216538 Contacts: dxdt.ru, alex/()\/abaabb.xyz. /\_/\ ( 0.0 ) = ^ = /|_|\ (") (")=~ Provide ESNI to get second ASCII cat Elapsed server side: 307ms; ServerHello sent: 152ms (including HelloRetryRequest time); TLS connection established: 306ms.