Last active
March 4, 2021 06:08
-
-
Save anlsh/5fef006f526799095d3d52bf63861b0b to your computer and use it in GitHub Desktop.
Working TLS client hello packet (sent by .NET core client)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Frame 17650: 229 bytes on wire (1832 bits), 229 bytes captured (1832 bits) on interface \Device\NPF_Loopback, id 0 | |
Null/Loopback | |
Internet Protocol Version 6, Src: ::1, Dst: ::1 | |
0110 .... = Version: 6 | |
.... 0000 0010 .... .... .... .... .... = Traffic Class: 0x02 (DSCP: CS0, ECN: ECT(0)) | |
.... 0000 00.. .... .... .... .... .... = Differentiated Services Codepoint: Default (0) | |
.... .... ..10 .... .... .... .... .... = Explicit Congestion Notification: ECN-Capable Transport codepoint '10' (2) | |
.... .... .... 0011 1001 1110 0001 1110 = Flow Label: 0x39e1e | |
Payload Length: 185 | |
Next Header: TCP (6) | |
Hop Limit: 128 | |
Source Address: ::1 | |
Destination Address: ::1 | |
Transmission Control Protocol, Src Port: 64248, Dst Port: 50052, Seq: 1, Ack: 1, Len: 165 | |
Source Port: 64248 | |
Destination Port: 50052 | |
[Stream index: 321] | |
[TCP Segment Len: 165] | |
Sequence Number: 1 (relative sequence number) | |
Sequence Number (raw): 2944596803 | |
[Next Sequence Number: 166 (relative sequence number)] | |
Acknowledgment Number: 1 (relative ack number) | |
Acknowledgment number (raw): 840371674 | |
0101 .... = Header Length: 20 bytes (5) | |
Flags: 0x018 (PSH, ACK) | |
000. .... .... = Reserved: Not set | |
...0 .... .... = Nonce: Not set | |
.... 0... .... = Congestion Window Reduced (CWR): Not set | |
.... .0.. .... = ECN-Echo: Not set | |
.... ..0. .... = Urgent: Not set | |
.... ...1 .... = Acknowledgment: Set | |
.... .... 1... = Push: Set | |
.... .... .0.. = Reset: Not set | |
.... .... ..0. = Syn: Not set | |
.... .... ...0 = Fin: Not set | |
[TCP Flags: ·······AP···] | |
Window: 10230 | |
[Calculated window size: 2618880] | |
[Window size scaling factor: 256] | |
Checksum: 0x3b1a [unverified] | |
[Checksum Status: Unverified] | |
Urgent Pointer: 0 | |
[SEQ/ACK analysis] | |
[iRTT: 0.000368000 seconds] | |
[Bytes in flight: 165] | |
[Bytes sent since last PSH flag: 165] | |
[Timestamps] | |
[Time since first frame in this TCP stream: 0.058076000 seconds] | |
[Time since previous frame in this TCP stream: 0.057708000 seconds] | |
TCP payload (165 bytes) | |
Transport Layer Security | |
TLSv1.2 Record Layer: Handshake Protocol: Client Hello | |
Content Type: Handshake (22) | |
Version: TLS 1.2 (0x0303) | |
Length: 160 | |
Handshake Protocol: Client Hello | |
Handshake Type: Client Hello (1) | |
Length: 156 | |
Version: TLS 1.2 (0x0303) | |
Random: 60404e94f692fff00a2a9ff8ea40178ff84ee6968cfac2f94dfe7cbb8010bb8c | |
GMT Unix Time: Mar 3, 2021 19:05:56.000000000 Pacific Standard Time | |
Random Bytes: f692fff00a2a9ff8ea40178ff84ee6968cfac2f94dfe7cbb8010bb8c | |
Session ID Length: 0 | |
Cipher Suites Length: 26 | |
Cipher Suites (13 suites) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) | |
Cipher Suite: TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d) | |
Cipher Suite: TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c) | |
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d) | |
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c) | |
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035) | |
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f) | |
Cipher Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a) | |
Compression Methods Length: 1 | |
Compression Methods (1 method) | |
Compression Method: null (0) | |
Extensions Length: 89 | |
Extension: server_name (len=14) | |
Type: server_name (0) | |
Length: 14 | |
Server Name Indication extension | |
Server Name list length: 12 | |
Server Name Type: host_name (0) | |
Server Name length: 9 | |
Server Name: localhost | |
Extension: supported_groups (len=6) | |
Type: supported_groups (10) | |
Length: 6 | |
Supported Groups List Length: 4 | |
Supported Groups (2 groups) | |
Supported Group: secp384r1 (0x0018) | |
Supported Group: secp256r1 (0x0017) | |
Extension: ec_point_formats (len=2) | |
Type: ec_point_formats (11) | |
Length: 2 | |
EC point formats Length: 1 | |
Elliptic curves point formats (1) | |
EC point format: uncompressed (0) | |
Extension: signature_algorithms (len=20) | |
Type: signature_algorithms (13) | |
Length: 20 | |
Signature Hash Algorithms Length: 18 | |
Signature Hash Algorithms (9 algorithms) | |
Signature Algorithm: rsa_pkcs1_sha256 (0x0401) | |
Signature Hash Algorithm Hash: SHA256 (4) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: rsa_pkcs1_sha384 (0x0501) | |
Signature Hash Algorithm Hash: SHA384 (5) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: rsa_pkcs1_sha1 (0x0201) | |
Signature Hash Algorithm Hash: SHA1 (2) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: ecdsa_secp256r1_sha256 (0x0403) | |
Signature Hash Algorithm Hash: SHA256 (4) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Signature Algorithm: ecdsa_secp384r1_sha384 (0x0503) | |
Signature Hash Algorithm Hash: SHA384 (5) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Signature Algorithm: ecdsa_sha1 (0x0203) | |
Signature Hash Algorithm Hash: SHA1 (2) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Signature Algorithm: SHA1 DSA (0x0202) | |
Signature Hash Algorithm Hash: SHA1 (2) | |
Signature Hash Algorithm Signature: DSA (2) | |
Signature Algorithm: rsa_pkcs1_sha512 (0x0601) | |
Signature Hash Algorithm Hash: SHA512 (6) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: ecdsa_secp521r1_sha512 (0x0603) | |
Signature Hash Algorithm Hash: SHA512 (6) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Extension: session_ticket (len=0) | |
Type: session_ticket (35) | |
Length: 0 | |
Data (0 bytes) | |
Extension: application_layer_protocol_negotiation (len=14) | |
Type: application_layer_protocol_negotiation (16) | |
Length: 14 | |
ALPN Extension Length: 12 | |
ALPN Protocol | |
ALPN string length: 2 | |
ALPN Next Protocol: h2 | |
ALPN string length: 8 | |
ALPN Next Protocol: http/1.1 | |
Extension: extended_master_secret (len=0) | |
Type: extended_master_secret (23) | |
Length: 0 | |
Extension: renegotiation_info (len=1) | |
Type: renegotiation_info (65281) | |
Length: 1 | |
Renegotiation Info extension | |
Renegotiation info extension length: 0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment