base-drafts
udp2raw
base-drafts | udp2raw | |
---|---|---|
9 | 26 | |
1,610 | 6,854 | |
0.2% | - | |
0.0 | 4.1 | |
15 days ago | about 1 month ago | |
Shell | C++ | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
base-drafts
-
Multipath TCP for Linux
QUIC is a step backwards here; it has no multipath support: https://lwn.net/Articles/964377/
Multipath: There are several areas where TCP still has an advantage over QUIC. One of those is multipath support. Multipath TCP connections can send data on different network paths simultaneously — for example, sending via both WiFi and cellular data — to provide better throughput than either path permits individually.
Server connection migration is explicitly forbidden by QUIC:
https://github.com/quicwg/base-drafts/pull/2031
- What does TCP/IP, OSI model even in means in job requirements
-
RFC 9114 – HTTP/3
https://github.com/quicwg/base-drafts/issues/253
TL;DR just like HTTP/2, we wanted to avoid friction in deploying these protocols. Having to rewrite URLs because of new schemes is pretty unpalatable, it has major impact. Instead, HTTP/3 can rely on other IETF-defined mechanisms like Alt-Svc (RFC 7838) and the more recent SVCB / HTTPS RR [1] DNS-based methods. The latter has been deployed on Cloudflare a while [2] and supported in Firefox. Other user agents have also expressed interest or intent to support it.
The net outcome is that developers can by and large focus on HTTP semantics, and let something a little further down the stack worry more about versions. Sometime devs will need to peek into that area, but not the majority.
[1] - https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-svcb-...
-
Announcing s2n-quic 1.0
After lots of hard work, we're excited to open-source [s2n-quic](https://github.com/aws/s2n-quic), a Rust implementation of the [IETF QUIC protocol](https://quicwg.org/). Feel free to ask any questions here in the comments or by [opening an issue](https://github.com/aws/s2n-quic/issues/new/choose). Thanks!
- The IETF QUIC Working Group
-
Crate to build network packets over UDP
Maybe check out laminar and quinn, which implement custom protocols on top of UDP (quinn implements QUIC), to get an idea on how to do things.
-
QUIC is now RFC 9000
IETF work is conducted mostly on email lists, hence the "many thousands of emails".
For some newer work like QUIC, GitHub is used to maintain a more to-the-minute shared view of the documents, and then again as mentioned in the text you quoted, GitHub Issues and PRs are used to manage the document, particularly by the most active participants.
https://github.com/quicwg/base-drafts - of course raising issues or PRs for them now won't do anything useful for you, because these RFCs were published. But you can see there were thousands of commits, one of the last being Martin Thompson's minor typographical tweaks summarised as "DOES IT NEVER END?!?".
- QUIC and HTTP/3 Support Now in Firefox Nightly and Beta
udp2raw
-
Wireguard blocked
Maybe udp2raw https://github.com/wangyu-/udp2raw
-
Masking your traffic to penetrate very restrictive firewall
For that, I was going to setup UDP2RAW on my laptop to convert Wireguard's UDP traffic to TCP, send that TCP traffic to my server via port 22, to pretend it's SSH traffic, in the server setup UDP2RAW to convert that TCP back to UDP and send it to the Wireguard interface.
-
How to connect Windscribe through an obfuscated mode? (other than from the app)
I've been doing some research and apparently, there's there are methods to obfuscate the VPN connection but everything I've looked at until now requires a special config on the server side of the VPN as well as the client side, and I haven't found anything related to Windscribes configuration for obfuscated servers via OpenVPN Scramble, Shadowsocks, obfsproxy, UDP2RAW, etc.
-
Wireguard over udp2raw bot udp2raw on wg client machine?
I read lots about this, e.g. the howto here. What I try to achieve is similiar to this setup here but the udp2raw server and client position should be switched. Is this possible somehow?
- wireguard is blocked in iran because of udp limitations. how can I setup wireguard with udp2raw to access free internet. is there any guidelines?
- How to setup a obfuscated vpn server
- How to attach an incoming UDP port into a TCP listener port?
-
I present you: the connectivity box
It's fair, though I would consider using tools like (for example) udp2raw for both OpenVPN and Wireguard if you need to bypass firewalls. Running OpenVPN in TCP mode is an awful experience.
-
Wireguard completely banned in Iran
Try to use udp2raw to hide the protocol https://github.com/wangyu-/udp2raw
-
how to bypass school network blocking handshakes?
check various ports with netcat as other mentioned. When you find a port you think may be open try it out. Additionally... this is all UDP and is EASILY blocked with deep packet inspection... you don't even need to go that deep into the packet... You could try a different VPN, or you could try to wrap your WireGuard into a TCP stream : https://github.com/wangyu-/udp2raw
What are some alternatives?
s2n-quic - An implementation of the IETF QUIC protocol
udptunnel - It allows TCP/UDP/ICMP traffic over UDP tunneling. It's useful to avoid Internet restrictions.
shadowsocks-rust - A Rust port of shadowsocks
hysteria - Hysteria is a powerful, lightning fast and censorship resistant proxy.
quinn - Async-friendly QUIC implementation in Rust
wireguard-install - WireGuard VPN installer for Linux servers
aiortc - WebRTC and ORTC implementation for Python using asyncio
UDPspeeder - A Tunnel which Improves your Network Quality on a High-latency Lossy Link by using Forward Error Correction, possible for All Traffics(TCP/UDP/ICMP)
quicly - A modular QUIC stack designed primarily for H2O
wstunnel - Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available
quiche - 🥧 Savoury implementation of the QUIC transport protocol and HTTP/3
quic-go - A QUIC implementation in pure Go