Replies: 2 comments
-
Not so similar. xt_wgobfs is a kernel module, whereas swgp-go is a userspace proxy utility.
It won't. swgp-go's throughput bottleneck is the syscall interface for sending and receiving packets, not its cryptography (at least in zero-overhead mode). In our zero-overhead (obfuscation) mode, we only read random bytes from the system ( Our paranoid mode uses AEAD on whole packets. It's basically a generic UDP tunnel. While it could probably benefit from some performance optimizations, I'm not sure if it's worth the added complexities. If you want fast generic proxies (that's also a lot more complex in its implementation), use https://github.com/database64128/shadowsocks-go instead. |
Beta Was this translation helpful? Give feedback.
-
thanks for the clarifications. |
Beta Was this translation helpful? Give feedback.
-
since encryption is already handled by wireguard, did you think about using chacha6 or chacha8 instead, as suggested by Wireguard founder to a similar project (xt_wgobfs) here
https://lists.zx2c4.com/pipermail/wireguard/2022-September/007831.html
that would likely lead to better performance without affecting the obfuscation.
what do you think?
Beta Was this translation helpful? Give feedback.
All reactions