On 19/05/2020 11:49, Claus Assmann wrote: > On Mon, May 18, 2020, Viktor Dukhovni wrote: > >> I'll strongly second Matt's request for a PCAP file. > > If tcpdump is "good enough" then that should be attached. > If wireshark and some TLS decoding is needed, then I need > some time to figure that out. The pcap file doesn't have the required info - however the SSL_trace output gives the same kind of data, so that's good enough for now. > I've added SSL_trace as suggested and the output is below. Thanks that's useful. > When I compare M1 with openssl s_client the main difference > is that s_client has > extension_type=padding > but I don't see where/how M1 would turn that off (or where > s_client turns it on?) This shouldn't make any difference. I'd be very surprised if it was to do with that. >From the trace output I can see that the client sends a ClientHello to the server. The server responds with an HRR, and the client re-issues a new ClientHello. So far so good. However, at this point the server doesn't like something about the new ClientHello and fails. In your original email you got this output from the info callback on the server side: > SSL_accept:error in TLSv1.3 early data This comes from this code in the info callback which you lifted from s_cb.c: } else if (where & SSL_CB_EXIT) { if (ret == 0) BIO_printf(bio_err, "%s:failed in %s\n", str, SSL_state_string_long(s)); else if (ret < 0) BIO_printf(bio_err, "%s:error in %s\n", str, SSL_state_string_long(s)); } Please could you modify this as follows: @@ -481,6 +481,7 @@ void apps_ssl_info_callback(const SSL *s, int where, int ret) else if (ret < 0) BIO_printf(bio_err, "%s:error in %s\n", str, SSL_state_string_long(s)); + ERR_print_errors(bio_err); } } Now retry the handshake and send the output. Thanks Matt > > ------------------------------------------------------------ > M8 client side: > Sent Record > Header: > Version = TLS 1.0 (0x301) > Content Type = Handshake (22) > Length = 512 > ClientHello, Length=508 > client_version=0x303 (TLS 1.2) > Random: > gmt_unix_time=0x2CE5293F > random_bytes (len=28): 60F8FD89D6BFFC32D30870CF534B271108BD7E00452949D9E2CECD7D > session_id (len=32): E028F6D32F2F0FB8CC112794C7AA4E97AD76EDF6B955F49B51CA837F6115ABE2 > cipher_suites (len=62) > {0x13, 0x02} TLS_AES_256_GCM_SHA384 > {0x13, 0x03} TLS_CHACHA20_POLY1305_SHA256 > {0x13, 0x01} TLS_AES_128_GCM_SHA256 > {0xC0, 0x2C} TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 > {0xC0, 0x30} TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 > {0x00, 0x9F} TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > {0xCC, 0xA9} TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 > {0xCC, 0xA8} TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 > {0xCC, 0xAA} TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 > {0xC0, 0x2B} TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 > {0xC0, 0x2F} TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 > {0x00, 0x9E} TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 > {0xC0, 0x24} TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 > {0xC0, 0x28} TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 > {0x00, 0x6B} TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 > {0xC0, 0x23} TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 > {0xC0, 0x27} TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 > {0x00, 0x67} TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 > {0xC0, 0x0A} TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA > {0xC0, 0x14} TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA > {0x00, 0x39} TLS_DHE_RSA_WITH_AES_256_CBC_SHA > {0xC0, 0x09} TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA > {0xC0, 0x13} TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA > {0x00, 0x33} TLS_DHE_RSA_WITH_AES_128_CBC_SHA > {0x00, 0x9D} TLS_RSA_WITH_AES_256_GCM_SHA384 > {0x00, 0x9C} TLS_RSA_WITH_AES_128_GCM_SHA256 > {0x00, 0x3D} TLS_RSA_WITH_AES_256_CBC_SHA256 > {0x00, 0x3C} TLS_RSA_WITH_AES_128_CBC_SHA256 > {0x00, 0x35} TLS_RSA_WITH_AES_256_CBC_SHA > {0x00, 0x2F} TLS_RSA_WITH_AES_128_CBC_SHA > {0x00, 0xFF} TLS_EMPTY_RENEGOTIATION_INFO_SCSV > compression_methods (len=1) > No Compression (0x00) > extensions, length = 373 > extension_type=ec_point_formats(11), length=4 > uncompressed (0) > ansiX962_compressed_prime (1) > ansiX962_compressed_char2 (2) > extension_type=supported_groups(10), length=12 > ecdh_x25519 (29) > secp256r1 (P-256) (23) > ecdh_x448 (30) > secp521r1 (P-521) (25) > secp384r1 (P-384) (24) > extension_type=encrypt_then_mac(22), length=0 > extension_type=extended_master_secret(23), length=0 > extension_type=signature_algorithms(13), length=48 > ecdsa_secp256r1_sha256 (0x0403) > ecdsa_secp384r1_sha384 (0x0503) > ecdsa_secp521r1_sha512 (0x0603) > ed25519 (0x0807) > ed448 (0x0808) > rsa_pss_pss_sha256 (0x0809) > rsa_pss_pss_sha384 (0x080a) > rsa_pss_pss_sha512 (0x080b) > rsa_pss_rsae_sha256 (0x0804) > rsa_pss_rsae_sha384 (0x0805) > rsa_pss_rsae_sha512 (0x0806) > rsa_pkcs1_sha256 (0x0401) > rsa_pkcs1_sha384 (0x0501) > rsa_pkcs1_sha512 (0x0601) > ecdsa_sha224 (0x0303) > ecdsa_sha1 (0x0203) > rsa_pkcs1_sha224 (0x0301) > rsa_pkcs1_sha1 (0x0201) > dsa_sha224 (0x0302) > dsa_sha1 (0x0202) > dsa_sha256 (0x0402) > dsa_sha384 (0x0502) > dsa_sha512 (0x0602) > extension_type=supported_versions(43), length=9 > TLS 1.3 (772) > TLS 1.2 (771) > TLS 1.1 (770) > TLS 1.0 (769) > extension_type=psk_key_exchange_modes(45), length=2 > psk_dhe_ke (1) > extension_type=key_share(51), length=38 > NamedGroup: ecdh_x25519 (29) > key_exchange: (len=32): 3E7E05E66F3F978082E7445E0A6FA9C73F4F4C1E6423AA3FAB7B80C8E521F629 > extension_type=padding(21), length=224 > 0000 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 000f - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 001e - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 002d - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 003c - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 004b - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 005a - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0069 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0078 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0087 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0096 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 00a5 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 00b4 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 00c3 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 00d2 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 .............. > > Received Record > Header: > Version = TLS 1.2 (0x303) > Content Type = Handshake (22) > Length = 88 > ServerHello, Length=84 > server_version=0x303 (TLS 1.2) > Random: > gmt_unix_time=0xCF21AD74 > random_bytes (len=28): E59A6111BE1D8C021E65B891C2A211167ABB8C5E079E09E2C8A8339C > session_id (len=32): E028F6D32F2F0FB8CC112794C7AA4E97AD76EDF6B955F49B51CA837F6115ABE2 > cipher_suite {0x13, 0x02} TLS_AES_256_GCM_SHA384 > compression_method: No Compression (0x00) > extensions, length = 12 > extension_type=supported_versions(43), length=2 > TLS 1.3 (772) > extension_type=key_share(51), length=2 > NamedGroup: secp256r1 (P-256) (23) > > Sent Record > Header: > Version = TLS 1.2 (0x303) > Content Type = ChangeCipherSpec (20) > Length = 1 > change_cipher_spec (1) > > Sent Record > Header: > Version = TLS 1.2 (0x303) > Content Type = Handshake (22) > Length = 512 > ClientHello, Length=508 > client_version=0x303 (TLS 1.2) > Random: > gmt_unix_time=0x2CE5293F > random_bytes (len=28): 60F8FD89D6BFFC32D30870CF534B271108BD7E00452949D9E2CECD7D > session_id (len=32): E028F6D32F2F0FB8CC112794C7AA4E97AD76EDF6B955F49B51CA837F6115ABE2 > cipher_suites (len=62) > {0x13, 0x02} TLS_AES_256_GCM_SHA384 > {0x13, 0x03} TLS_CHACHA20_POLY1305_SHA256 > {0x13, 0x01} TLS_AES_128_GCM_SHA256 > {0xC0, 0x2C} TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 > {0xC0, 0x30} TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 > {0x00, 0x9F} TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > {0xCC, 0xA9} TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 > {0xCC, 0xA8} TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 > {0xCC, 0xAA} TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 > {0xC0, 0x2B} TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 > {0xC0, 0x2F} TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 > {0x00, 0x9E} TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 > {0xC0, 0x24} TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 > {0xC0, 0x28} TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 > {0x00, 0x6B} TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 > {0xC0, 0x23} TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 > {0xC0, 0x27} TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 > {0x00, 0x67} TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 > {0xC0, 0x0A} TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA > {0xC0, 0x14} TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA > {0x00, 0x39} TLS_DHE_RSA_WITH_AES_256_CBC_SHA > {0xC0, 0x09} TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA > {0xC0, 0x13} TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA > {0x00, 0x33} TLS_DHE_RSA_WITH_AES_128_CBC_SHA > {0x00, 0x9D} TLS_RSA_WITH_AES_256_GCM_SHA384 > {0x00, 0x9C} TLS_RSA_WITH_AES_128_GCM_SHA256 > {0x00, 0x3D} TLS_RSA_WITH_AES_256_CBC_SHA256 > {0x00, 0x3C} TLS_RSA_WITH_AES_128_CBC_SHA256 > {0x00, 0x35} TLS_RSA_WITH_AES_256_CBC_SHA > {0x00, 0x2F} TLS_RSA_WITH_AES_128_CBC_SHA > {0x00, 0xFF} TLS_EMPTY_RENEGOTIATION_INFO_SCSV > compression_methods (len=1) > No Compression (0x00) > extensions, length = 373 > extension_type=ec_point_formats(11), length=4 > uncompressed (0) > ansiX962_compressed_prime (1) > ansiX962_compressed_char2 (2) > extension_type=supported_groups(10), length=12 > ecdh_x25519 (29) > secp256r1 (P-256) (23) > ecdh_x448 (30) > secp521r1 (P-521) (25) > secp384r1 (P-384) (24) > extension_type=encrypt_then_mac(22), length=0 > extension_type=extended_master_secret(23), length=0 > extension_type=signature_algorithms(13), length=48 > ecdsa_secp256r1_sha256 (0x0403) > ecdsa_secp384r1_sha384 (0x0503) > ecdsa_secp521r1_sha512 (0x0603) > ed25519 (0x0807) > ed448 (0x0808) > rsa_pss_pss_sha256 (0x0809) > rsa_pss_pss_sha384 (0x080a) > rsa_pss_pss_sha512 (0x080b) > rsa_pss_rsae_sha256 (0x0804) > rsa_pss_rsae_sha384 (0x0805) > rsa_pss_rsae_sha512 (0x0806) > rsa_pkcs1_sha256 (0x0401) > rsa_pkcs1_sha384 (0x0501) > rsa_pkcs1_sha512 (0x0601) > ecdsa_sha224 (0x0303) > ecdsa_sha1 (0x0203) > rsa_pkcs1_sha224 (0x0301) > rsa_pkcs1_sha1 (0x0201) > dsa_sha224 (0x0302) > dsa_sha1 (0x0202) > dsa_sha256 (0x0402) > dsa_sha384 (0x0502) > dsa_sha512 (0x0602) > extension_type=supported_versions(43), length=9 > TLS 1.3 (772) > TLS 1.2 (771) > TLS 1.1 (770) > TLS 1.0 (769) > extension_type=psk_key_exchange_modes(45), length=2 > psk_dhe_ke (1) > extension_type=key_share(51), length=71 > NamedGroup: secp256r1 (P-256) (23) > key_exchange: (len=65): 04942A4A721CA99765B0FBEF01CB5B79C88011CCCECE4B93FA082CF7DBD3992D4602BBAC27DF4355243FC4B33C801A989BEC3BB1E818262CED50B7448DAF4C65B1 > extension_type=padding(21), length=191 > 0000 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 000f - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 001e - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 002d - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 003c - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 004b - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 005a - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0069 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0078 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0087 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0096 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 00a5 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 00b4 - 00 00 00 00 00 00 00 00-00 00 00 ........... > > Received Record > Header: > Version = TLS 1.2 (0x303) > Content Type = ChangeCipherSpec (20) > Length = 1 > > ------------------------------------------------------------ > S8 server side: > Received Record > Header: > Version = TLS 1.0 (0x301) > Content Type = Handshake (22) > Length = 512 > ClientHello, Length=508 > client_version=0x303 (TLS 1.2) > Random: > gmt_unix_time=0x2CE5293F > random_bytes (len=28): 60F8FD89D6BFFC32D30870CF534B271108BD7E00452949D9E2CECD7D > session_id (len=32): E028F6D32F2F0FB8CC112794C7AA4E97AD76EDF6B955F49B51CA837F6115ABE2 > cipher_suites (len=62) > {0x13, 0x02} TLS_AES_256_GCM_SHA384 > {0x13, 0x03} TLS_CHACHA20_POLY1305_SHA256 > {0x13, 0x01} TLS_AES_128_GCM_SHA256 > {0xC0, 0x2C} TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 > {0xC0, 0x30} TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 > {0x00, 0x9F} TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 > {0xCC, 0xA9} TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 > {0xCC, 0xA8} TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 > {0xCC, 0xAA} TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 > {0xC0, 0x2B} TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 > {0xC0, 0x2F} TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 > {0x00, 0x9E} TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 > {0xC0, 0x24} TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 > {0xC0, 0x28} TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 > {0x00, 0x6B} TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 > {0xC0, 0x23} TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 > {0xC0, 0x27} TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 > {0x00, 0x67} TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 > {0xC0, 0x0A} TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA > {0xC0, 0x14} TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA > {0x00, 0x39} TLS_DHE_RSA_WITH_AES_256_CBC_SHA > {0xC0, 0x09} TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA > {0xC0, 0x13} TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA > {0x00, 0x33} TLS_DHE_RSA_WITH_AES_128_CBC_SHA > {0x00, 0x9D} TLS_RSA_WITH_AES_256_GCM_SHA384 > {0x00, 0x9C} TLS_RSA_WITH_AES_128_GCM_SHA256 > {0x00, 0x3D} TLS_RSA_WITH_AES_256_CBC_SHA256 > {0x00, 0x3C} TLS_RSA_WITH_AES_128_CBC_SHA256 > {0x00, 0x35} TLS_RSA_WITH_AES_256_CBC_SHA > {0x00, 0x2F} TLS_RSA_WITH_AES_128_CBC_SHA > {0x00, 0xFF} TLS_EMPTY_RENEGOTIATION_INFO_SCSV > compression_methods (len=1) > No Compression (0x00) > extensions, length = 373 > extension_type=ec_point_formats(11), length=4 > uncompressed (0) > ansiX962_compressed_prime (1) > ansiX962_compressed_char2 (2) > extension_type=supported_groups(10), length=12 > ecdh_x25519 (29) > secp256r1 (P-256) (23) > ecdh_x448 (30) > secp521r1 (P-521) (25) > secp384r1 (P-384) (24) > extension_type=encrypt_then_mac(22), length=0 > extension_type=extended_master_secret(23), length=0 > extension_type=signature_algorithms(13), length=48 > ecdsa_secp256r1_sha256 (0x0403) > ecdsa_secp384r1_sha384 (0x0503) > ecdsa_secp521r1_sha512 (0x0603) > ed25519 (0x0807) > ed448 (0x0808) > rsa_pss_pss_sha256 (0x0809) > rsa_pss_pss_sha384 (0x080a) > rsa_pss_pss_sha512 (0x080b) > rsa_pss_rsae_sha256 (0x0804) > rsa_pss_rsae_sha384 (0x0805) > rsa_pss_rsae_sha512 (0x0806) > rsa_pkcs1_sha256 (0x0401) > rsa_pkcs1_sha384 (0x0501) > rsa_pkcs1_sha512 (0x0601) > ecdsa_sha224 (0x0303) > ecdsa_sha1 (0x0203) > rsa_pkcs1_sha224 (0x0301) > rsa_pkcs1_sha1 (0x0201) > dsa_sha224 (0x0302) > dsa_sha1 (0x0202) > dsa_sha256 (0x0402) > dsa_sha384 (0x0502) > dsa_sha512 (0x0602) > extension_type=supported_versions(43), length=9 > TLS 1.3 (772) > TLS 1.2 (771) > TLS 1.1 (770) > TLS 1.0 (769) > extension_type=psk_key_exchange_modes(45), length=2 > psk_dhe_ke (1) > extension_type=key_share(51), length=38 > NamedGroup: ecdh_x25519 (29) > key_exchange: (len=32): 3E7E05E66F3F978082E7445E0A6FA9C73F4F4C1E6423AA3FAB7B80C8E521F629 > extension_type=padding(21), length=224 > 0000 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 000f - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 001e - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 002d - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 003c - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 004b - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 005a - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0069 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0078 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0087 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 0096 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 00a5 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 00b4 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 00c3 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 ............... > 00d2 - 00 00 00 00 00 00 00 00-00 00 00 00 00 00 .............. > > Sent Record > Header: > Version = TLS 1.2 (0x303) > Content Type = Handshake (22) > Length = 88 > ServerHello, Length=84 > server_version=0x303 (TLS 1.2) > Random: > gmt_unix_time=0xCF21AD74 > random_bytes (len=28): E59A6111BE1D8C021E65B891C2A211167ABB8C5E079E09E2C8A8339C > session_id (len=32): E028F6D32F2F0FB8CC112794C7AA4E97AD76EDF6B955F49B51CA837F6115ABE2 > cipher_suite {0x13, 0x02} TLS_AES_256_GCM_SHA384 > compression_method: No Compression (0x00) > extensions, length = 12 > extension_type=supported_versions(43), length=2 > TLS 1.3 (772) > extension_type=key_share(51), length=2 > NamedGroup: secp256r1 (P-256) (23) > > Sent Record > Header: > Version = TLS 1.2 (0x303) > Content Type = ChangeCipherSpec (20) > Length = 1 > change_cipher_spec (1) >