Created
March 4, 2021 06:10
-
-
Save anlsh/d6b83218f5eef55068e8b32aea82baea to your computer and use it in GitHub Desktop.
Server TLS hello package (sent by .net core grpc in response to https://gist.github.com/anlsh/5fef006f526799095d3d52bf63861b0b)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Frame 17652: 1331 bytes on wire (10648 bits), 1331 bytes captured (10648 bits) on interface \Device\NPF_Loopback, id 0 | |
Null/Loopback | |
Internet Protocol Version 6, Src: ::1, Dst: ::1 | |
0110 .... = Version: 6 | |
.... 0000 0010 .... .... .... .... .... = Traffic Class: 0x02 (DSCP: CS0, ECN: ECT(0)) | |
.... 0000 00.. .... .... .... .... .... = Differentiated Services Codepoint: Default (0) | |
.... .... ..10 .... .... .... .... .... = Explicit Congestion Notification: ECN-Capable Transport codepoint '10' (2) | |
.... .... .... 1101 1000 1101 0001 0100 = Flow Label: 0xd8d14 | |
Payload Length: 1287 | |
Next Header: TCP (6) | |
Hop Limit: 128 | |
Source Address: ::1 | |
Destination Address: ::1 | |
Transmission Control Protocol, Src Port: 50052, Dst Port: 64248, Seq: 1, Ack: 166, Len: 1267 | |
Source Port: 50052 | |
Destination Port: 64248 | |
[Stream index: 321] | |
[TCP Segment Len: 1267] | |
Sequence Number: 1 (relative sequence number) | |
Sequence Number (raw): 840371674 | |
[Next Sequence Number: 1268 (relative sequence number)] | |
Acknowledgment Number: 166 (relative ack number) | |
Acknowledgment number (raw): 2944596968 | |
0101 .... = Header Length: 20 bytes (5) | |
Flags: 0x018 (PSH, ACK) | |
000. .... .... = Reserved: Not set | |
...0 .... .... = Nonce: Not set | |
.... 0... .... = Congestion Window Reduced (CWR): Not set | |
.... .0.. .... = ECN-Echo: Not set | |
.... ..0. .... = Urgent: Not set | |
.... ...1 .... = Acknowledgment: Set | |
.... .... 1... = Push: Set | |
.... .... .0.. = Reset: Not set | |
.... .... ..0. = Syn: Not set | |
.... .... ...0 = Fin: Not set | |
[TCP Flags: ·······AP···] | |
Window: 10230 | |
[Calculated window size: 2618880] | |
[Window size scaling factor: 256] | |
Checksum: 0xa912 [unverified] | |
[Checksum Status: Unverified] | |
Urgent Pointer: 0 | |
[SEQ/ACK analysis] | |
[iRTT: 0.000368000 seconds] | |
[Bytes in flight: 1267] | |
[Bytes sent since last PSH flag: 1267] | |
[Timestamps] | |
[Time since first frame in this TCP stream: 0.064040000 seconds] | |
[Time since previous frame in this TCP stream: 0.005920000 seconds] | |
TCP payload (1267 bytes) | |
Transport Layer Security | |
TLSv1.2 Record Layer: Handshake Protocol: Multiple Handshake Messages | |
Content Type: Handshake (22) | |
Version: TLS 1.2 (0x0303) | |
Length: 1262 | |
Handshake Protocol: Server Hello | |
Handshake Type: Server Hello (2) | |
Length: 90 | |
Version: TLS 1.2 (0x0303) | |
Random: 60404e94fcf274028e2e8361e713b5e66e208524ff1ece7dd72946b39aa62ae0 | |
GMT Unix Time: Mar 3, 2021 19:05:56.000000000 Pacific Standard Time | |
Random Bytes: fcf274028e2e8361e713b5e66e208524ff1ece7dd72946b39aa62ae0 | |
Session ID Length: 32 | |
Session ID: c936000095b094c93b4c987849e527d891ddf95d64e4fe1a352e6de055f97fe0 | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) | |
Compression Method: null (0) | |
Extensions Length: 18 | |
Extension: application_layer_protocol_negotiation (len=5) | |
Type: application_layer_protocol_negotiation (16) | |
Length: 5 | |
ALPN Extension Length: 3 | |
ALPN Protocol | |
ALPN string length: 2 | |
ALPN Next Protocol: h2 | |
Extension: extended_master_secret (len=0) | |
Type: extended_master_secret (23) | |
Length: 0 | |
Extension: renegotiation_info (len=1) | |
Type: renegotiation_info (65281) | |
Length: 1 | |
Renegotiation Info extension | |
Renegotiation info extension length: 0 | |
Handshake Protocol: Certificate | |
Handshake Type: Certificate (11) | |
Length: 795 | |
Certificates Length: 792 | |
Certificates (792 bytes) | |
Certificate Length: 789 | |
Certificate: 30820311308201f9a00302010202103443e1d16c71cb8044c6c42d53280f00300d06092a… (id-at-commonName=MadariChainTrustLocalhost) | |
signedCertificate | |
version: v3 (2) | |
serialNumber: 0x3443e1d16c71cb8044c6c42d53280f00 | |
signature (sha256WithRSAEncryption) | |
Algorithm Id: 1.2.840.113549.1.1.11 (sha256WithRSAEncryption) | |
issuer: rdnSequence (0) | |
rdnSequence: 1 item (id-at-commonName=MadariRootCA) | |
RDNSequence item: 1 item (id-at-commonName=MadariRootCA) | |
RelativeDistinguishedName item (id-at-commonName=MadariRootCA) | |
Id: 2.5.4.3 (id-at-commonName) | |
DirectoryString: printableString (1) | |
printableString: MadariRootCA | |
validity | |
notBefore: utcTime (0) | |
utcTime: 2021-03-03 06:21:42 (UTC) | |
notAfter: utcTime (0) | |
utcTime: 2039-12-31 23:59:59 (UTC) | |
subject: rdnSequence (0) | |
rdnSequence: 1 item (id-at-commonName=MadariChainTrustLocalhost) | |
RDNSequence item: 1 item (id-at-commonName=MadariChainTrustLocalhost) | |
RelativeDistinguishedName item (id-at-commonName=MadariChainTrustLocalhost) | |
Id: 2.5.4.3 (id-at-commonName) | |
DirectoryString: printableString (1) | |
printableString: MadariChainTrustLocalhost | |
subjectPublicKeyInfo | |
algorithm (rsaEncryption) | |
Algorithm Id: 1.2.840.113549.1.1.1 (rsaEncryption) | |
subjectPublicKey: 3082010a0282010100aeb7c0733ee9f2028d5dc8a5413792713784f877518b4da5403452… | |
modulus: 0x00aeb7c0733ee9f2028d5dc8a5413792713784f877518b4da5403452bc7ac8662666a658… | |
publicExponent: 65537 | |
extensions: 1 item | |
Extension (joint-iso-itu-t.5.29.1) | |
Extension Id: 2.5.29.1 (joint-iso-itu-t.5.29.1) | |
BER: Dissector for OID not implemented. Contact Wireshark developers if you want this supported | |
[Expert Info (Warning/Undecoded): BER: Dissector for OID not implemented. Contact Wireshark developers if you want this supported] | |
[BER: Dissector for OID not implemented. Contact Wireshark developers if you want this supported] | |
[Severity level: Warning] | |
[Group: Undecoded] | |
algorithmIdentifier (sha256WithRSAEncryption) | |
Algorithm Id: 1.2.840.113549.1.1.11 (sha256WithRSAEncryption) | |
Padding: 0 | |
encrypted: bacdb72049bec6515316c02f9ba0243177a34b4adaa47802ca2aa44859c3574e8d32a545… | |
Handshake Protocol: Server Key Exchange | |
Handshake Type: Server Key Exchange (12) | |
Length: 361 | |
EC Diffie-Hellman Server Params | |
Curve Type: named_curve (0x03) | |
Named Curve: secp384r1 (0x0018) | |
Pubkey Length: 97 | |
Pubkey: 04dd5d366aeb2cd7ed0f40916c0682a34893f456d8460c8b12e09d2c4d03fd7f5d92c06a… | |
Signature Algorithm: rsa_pkcs1_sha256 (0x0401) | |
Signature Hash Algorithm Hash: SHA256 (4) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Length: 256 | |
Signature: 319c8655085056b1007195a3d10eee35ac5a0a2da388fcdc1a4a04ff50702fee7d91a337… | |
Handshake Protocol: Server Hello Done | |
Handshake Type: Server Hello Done (14) | |
Length: 0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment