Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TCP/TLS implementation #23

Open
wants to merge 2 commits into
base: master
Choose a base branch
from
Open

TCP/TLS implementation #23

wants to merge 2 commits into from

Conversation

leninalive
Copy link
Collaborator

No description provided.

@w0rng
Copy link

w0rng commented Jul 27, 2024

Здравствуйте! Зачем усложнять исходный протокол подобной логикой? Кажется, после применения этих изменений поддерживать актуальность этого форка станет сложнее, tcp сделает изначальную реализацию более медленной.

Мне кажется, что реализацию AWG стоит сохранять близкой к оригиналу, а если есть потребность в маскировке трафика, стоит просто выбрать другой протокол.

@pokamest
Copy link
Member

@w0rng
It's not replacement of awg, it's attempt to implement another VPN protocol, resistant to blockages in countries with super high censorship level

@w0rng
Copy link

w0rng commented Jul 27, 2024

@w0rng It's not replacement of awg, it's attempt to implement another VPN protocol, resistant to blockages in countries with super high censorship level

I understand that this is not a replacement for AWG. I don't understand why making the good protocol more complicated. If you need a tls disguise, why not use xray?
For me, the main advantages of WG is its simplicity and speed. This changes, in my humble opinion, can make the awg worse.

I'm not insisting on rejecting this PR, I'm trying to figure out what it's for.

@wwwiretap
Copy link

wwwiretap commented Jul 27, 2024

Please consider keeping this feature, there are no good implementations of Wireguard in TCP and UDP is easily blocked. This patch will help many downstream.

A very major Mobile operator in Iran, with over 70 million subscribers is adding very high latency to UDP and effectively breaking the connection, stopping the handshake to make it. They are dropping 50% of the packets. In absence of TCP, which would add some re-transmission logic, Wireguard and AWG are extremely easy to block at mass.

I hope this problem supports accepting this patch upstream. Or one would have to start messing with the core encryption logic of AWG directly which is not preferred. For example, sending multiple handshake packets all at once.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants