CONNECT sv.baidu.com:443 HTTP/1.1
Host: sv.baidu.com:443
Proxy-Connection: Keep-Alive
User-Agent: okhttp/3.10.0
A SSLv3-compatible ClientHello handshake was found. Fiddler extracted the parameters below.
Version: 3.3 (TLS/1.2)
Random: 0B 20 3D 14 12 EF 20 9A 3B 0D 5B 22 92 C8 7C D0 CF 76 50 DD DC FB 8E E5 3B B3 90 2E 65 2D 3D 43
"Time": 1980/10/5 7:30:19
SessionID: 0A 55 16 32 B9 4E D5 18 B1 B4 CF 0D 4B 72 76 9E 40 E6 B9 8B B9 35 8F 44 E7 E8 FF F1 81 7F 2B 41
Extensions:
server_name sv.baidu.com
ec_point_formats uncompressed [0x0], ansiX962_compressed_prime [0x1], ansiX962_compressed_char2 [0x2]
elliptic_curves sect571r1 [0xE], sect571k1 [0xD], secp521r1 [0x19], sect409k1 [0xB], sect409r1 [0xC], secp384r1 [0x18], sect283k1 [0x9], sect283r1 [0xA], secp256k1 [0x16], secp256r1 [0x17], sect239k1 [0x8], sect233k1 [0x6], sect233r1 [0x7], secp224k1 [0x14], secp224r1 [0x15], sect193r1 [0x4], sect193r2 [0x5], secp192k1 [0x12], secp192r1 [0x13], sect163k1 [0x1], sect163r1 [0x2], sect163r2 [0x3], secp160k1 [0xF], secp160r1 [0x10], secp160r2 [0x11]
SessionTicket 74 40 AB B5 D5 0E 26 E1 26 3E 37 4B 7F 08 D2 02 49 17 1F 88 85 17 1A A8 33 DF D3 4E 45 B0 A3 61 83 A2 FC 47 A2 47 C6 26 A1 18 25 DA 98 52 46 92 5D C7 19 1A FB 9D C5 F0 E8 E7 BB 10 9C C1 94 38 78 3C 95 3B 92 D9 E4 79 80 6D 4A 48 9B F0 19 9E BC 62 37 C3 08 58 A0 32 D7 C0 20 50 DA 85 73 AC A5 0C 0C 10 FE 2E 23 3C
signature_algs sha512_rsa, sha512_dsa, sha512_ecdsa, sha384_rsa, sha384_dsa, sha384_ecdsa, sha256_rsa, sha256_dsa, sha256_ecdsa, sha224_rsa, sha224_dsa, sha224_ecdsa, sha1_rsa, sha1_dsa, sha1_ecdsa
ALPN h2, http/1.1
padding 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Ciphers:
[C02B] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
[C02C] TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
[C02F] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
[C030] TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
[C013] TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA
[C014] TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA
[009C] TLS_RSA_WITH_AES_128_GCM_SHA256
[009D] TLS_RSA_WITH_AES_256_GCM_SHA384
[002F] TLS_RSA_AES_128_SHA
[0035] TLS_RSA_AES_256_SHA
[00FF] TLS_EMPTY_RENEGOTIATION_INFO_SCSV
Compression:
[00] NO_COMPRESSION
HTTP/1.1 200 OK
Date: Tuesday, 20-Nov-18 10:18:45 CST
Keep-Alive: timeout=38
Content-Length: 0
EndTime: 10:18:45.364
ClientToServerBytes: 738
ServerToClientBytes: 146
This is a CONNECT tunnel, through which encrypted HTTPS traffic flows.
Fiddler’s HTTPS Decryption feature is enabled, but this specific tunnel was configured not to be decrypted. Settings can be found inside Tools > Options > HTTPS.
A SSLv3-compatible ServerHello handshake was found. Fiddler extracted the parameters below.
Version: 3.3 (TLS/1.2)
SessionID: 0A 55 16 32 B9 4E D5 18 B1 B4 CF 0D 4B 72 76 9E 40 E6 B9 8B B9 35 8F 44 E7 E8 FF F1 81 7F 2B 41
Random: 5B F3 6F 05 32 EA B7 8E A9 43 E2 9F 5B 82 AF F0 00 B9 E9 04 05 BC 66 25 1F AB 03 BA E6 12 73 3F
Cipher: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [0xC02F]
CompressionSuite: NO_COMPRESSION [0x00]
Extensions:
renegotiation_info 00
ALPN h2