Successfully connected
TLS 1.3 OK;
Detailed description:
v.0.24.4-p (This TLS-1.3-only server supports: HelloRetryRequest, KeyUpdate, ECDHE, FFDHE, X25519MLKEM768, SecP256r1MLKEM768, X25519Kyber768, ESNI, etc.) CRYPTO_CONTEXT Protocol version: 0x0304 Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384) Key exchange: 0x001D (X25519) (Handshake level) Handshake secrets: Client: 0x06B45D06068173DF8812AE5490197AD5C3F4A5DB547A1A4E04E248F21D79DEE87FFEA6678D0F1D7E19F1ED84421F12EC Server: 0xB036DBFB7B46E24289B4BA9B4CB6AD98A100EB268D031235EEEE5C1F3DB1380B0E942B629BDBE9E20030578ECBFFC2C7 Handshake keys: Client write: 0xD85E7389370F69D35A8A598272E17F5EACEF6B98821D039674EBC547E1C62BB4 Server write: 0xF43CC851916A844D3A97495EDF1C04E935556C01450674625F84EF6991EC2DDA Handshake IVs: Client write (IV): 0x6E1752470DA7A141E62B9B3E Server write (IV): 0x4DCD644FD2312266BB836140 (Traffic level) Traffic secrets: Client: 0x4C8D4246421C82534FCD2B0DFC1B297E514C2A37AD35B0F078247EF4A43DB397A931FA122157A50490D3A8E2EA943BB6 Server: 0x12A2D9514CCB67A76FF4C806982A32C55DD2CCEBE450569EF9AA27712E51B17110076FB72735C5FDAEBD02D2449839D7 Traffic keys: Client write: 0xA4F018C62DD3CCE3C6894E201E91FBA4245FE7C2610B18D9919528AAC344C391 Server write: 0x08C2B7211B2C3C7E21D545F6E6F27C058BB9E847FD82E024A6795AF72C4C4470 Traffic base IVs: Client write (base IV): 0x5401CE456579D05776505B10 Server write (base IV): 0x3FD59030B939CCBCE0315BAA --- Messages --- [Legacy ChangeCipherSpec message sent (server)] CLIENT_HELLO (recieved) Version: 0x0303 Cipher suites: 0x1302,0x1301,0x1303,0xC02C,0xC02B,0xCCA9,0xC030,0xC02F 0xCCA8,0x00FF Client Random: 66:18:24:99:36:B4:A4:9B:47:4B:E5:A7:83:3D:84:AA:65:CA:C6:CA:58:45:A2:C5:81:88:97:27:A9:CA:0D:26 Client SessionID: 8A:5B:D3:F1:79:55:76:AA:1A:A7:60:C3:1D:85:80:72:D0:ED:3B:97:27:EE:36:2B:4C:49:E9:98:9F:73:0A:56 Extensions: Type: 35 (0x0023); /non-TLS-1.3/ Type: 13 (0x000D); "signature_algorithms" 0x0503 (ECDSA_SECP384R1_SHA384) 0x0403 (ECDSA_SECP256R1_SHA256) 0x0807 (ED25519) 0x0806 (RSA_PSS_RSAE_SHA512) 0x0805 (RSA_PSS_RSAE_SHA384) 0x0804 (RSA_PSS_RSAE_SHA256) 0x0601 (RSA_PKCS1_SHA512) 0x0501 (RSA_PKCS1_SHA384) 0x0401 (RSA_PKCS1_SHA256) Type: 16 (0x0010); "application_layer_protocol_negotiation" 68:32 (HTTP/2/TLS) 68:74:74:70:2F:31:2E:31 (HTTP/1.1) Type: 10 (0x000A); "supported_groups" 0x001D (X25519) 0x0017 (Secp256r1) 0x0018 (Secp384r1) Type: 00 (0x0000); "server_name" 00:00:0E:00:00:0B:74:6C:73:31:33:2E:31:64:2E:70:77 hostname: tls13.1d.pw Type: 11 (0x000B); /non-TLS-1.3/ 01:00 Type: 51 (0x0033); "key_share" X25519 (0x001D) x = 0x12031374FA4F8AB528133B210183622F9790720242173719E637103F153CD64B Type: 23 (0x0017); /non-TLS-1.3/ Type: 43 (0x002B); "supported_versions" 0x0304 (TLS 1.3) 0x0303 (TLS 1.2) Type: 05 (0x0005); "status_request" 01:00:00:00:00 Type: 45 (0x002D); "psk_key_exchange_modes" 01:01 SERVER_HELLO (sent) Legacy Version: 0x0303 Cipher suite: 0x1302 (TLS_AES_256_GCM_SHA384) Server Random: DE:AD:DE:AD:DE:AD:C0:DE:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 SessionID: 8A:5B:D3:F1:79:55:76:AA:1A:A7:60:C3:1D:85:80:72:D0:ED:3B:97:27:EE:36:2B:4C:49:E9:98:9F:73:0A:56 Extensions: Type: 51 (0x0033); "key_share" X25519 (0x001D) x = 0x145891E6697DAA111BD9A43EB39FA860847D09303D603128F82CE7451DAE456B Type: 43 (0x002B); "supported_versions" 0x0304 [Legacy ChangeCipherSpec message sent (server)] SERVER_HANDSHAKE_MESSAGES (sent) Type: 8 (0x08) - "encrypted_extensions" Length (octets, dec.): 2 00:00 Type: 11 (0x0B) - "certificate" Length (octets, dec.): 3886 [...] /skipped 3886 data octets/ Type: 15 (0x0F) - "certificate_verify" Length (octets, dec.): 107 05:03:00:67:30:65:02:30:52:75:65:45:36:82:57:96:48:2E:58:00:1A:41:34:D1:AB:74:E4:FF:B1:B2:AD:6A 2B:D9:C3:73:D1:B6:2A:99:CE:7C:75:F5:34:D4:37:4E:5A:7F:2D:D2:B9:E8:0E:E4:02:31:00:9C:73:D3:84:C5 55:50:E5:17:68:9F:46:3B:02:EA:CC:AB:5A:75:71:6E:B9:FB:B3:2C:79:2B:AC:3E:82:88:B8:AB:28:D2:22:03 C4:48:52:27:20:C3:C3:FD:82:34:BD Type: 20 (0x14) - "finished" Length (octets, dec.): 48 2D:CA:36:B1:0D:59:33:05:C0:43:F9:A1:76:0C:51:AB:9C:42:16:F8:AD:28:4F:ED:61:44:C9:16:D8:69:20:1C C0:7A:5E:73:3F:06:25:B0:2B:2A:33:FE:FC:C1:84:44 [Legacy ChangeCipherSpec message present (client)] CLIENT_FINISHED (received) Finished value: 0xF345D5E4A736E9E3E877D12AA45AD56E3C420CB407156A301D9EAD6A17D6889742B5745CE353199A2587411528143EDF Client Finished status: OK CLIENT_APPLICATION_DATA (recieved) ASCII dump (filtered): GET / HTTP/1.1..accept: */*..user-agent: Mozilla/5.0 AppleWebKit /537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebo t@anthropic.com)..accept-encoding: gzip, br, zstd, deflate..host : tls13.1d.pw.... TCP: server: 194.87.103.72:443; client: 18.224.93.225:29131; timestamp: 1745494438 Contacts: dxdt.ru, alex/()\/abaabb.xyz. /\_/\ ( 0.0 ) = ^ = /|_|\ (") (")=~ Provide ESNI to get second ASCII cat Elapsed server side: 147ms; ServerHello sent: 9ms; TLS connection established: 147ms.