TrustTunnel is an open-source, high-performance VPN protocol that’s harder to detect and block

How TrustTunnerl AdGuard VPN protocol works

Adguard VPN is a commercial VPN solution, but the company has decided to open-source the VPN protocol and named it TrustTunnel. It’s described as a modern, secure, mobile-optimized VPN protocol.

Since there are plenty of VPN protocols, including WireGuard and OpenVPN, it felt redundant at first. But AdGuard explains that those are easy to detect and block at the network level, and methods to conceal VPN traffic, such as wrapping VPN data in a TCP connection, often reduce speed.

Concealed VPN
Concealed VPN with four hops per packet

TrustTunnel relies on a different method and blends in with regular HTTPS traffic through TLS-based encryption, and HTTP/2 or HTTP/3 transport. Each connection runs on its own dedicated stream, which combines packets for more efficient transmission. The diagrams above and below illustrate this by showing that four hops are required for a standard concealed VPN, and only two hops with TrustTunnel. The company also says it is optimized for mobile platforms and performs well even in unstable network conditions.

TrustTunnel Protocol PerformanceTrustTunnel is completely independent from AdGuard VPN, and the company released the complete code of its reference implementation of the TrustTunnel server and its clients under a permissive Apache 3.0 license. You’ll find three repositories on GitHub:

  • “TrustTunnel” – VPN protocol written in Rust
  • “TrustTunnelClient” – Command-line client mostly written in C++ for Linux, Windows, and macOS
  • “TrustTunnelFlutterClient” – A Flutter client for Android and iOS, mostly written in Dart; You can also install the apps directly from Google Play or the Apple App Store.

AdGuard explain the clients currently allow the users to:

  • Use flexible routing rules to decide which requests go through the tunnel and which stay on the local network
  • Exercise fine-grained control, separating work and personal traffic, routing specific domains or apps, and tuning network behavior
  • Benefit from a real-time request log that provides full transparency into where the device sends traffic, how routing rules apply, and which connections use the tunnel

TrustTunnel Android mobile app

From what I understand, the main benefit of TrustTunnel is to avoid being detected/blocked while keeping better performance than concealed VPN through WireGuard or other solutions. If blocking/detection is not an issue, WireGuard will probably still be preferred since it should deliver excellent performance when no obfuscation/concealment is needed, and its low code footprint makes it more suitable for resource-constrained devices, and there’s even an ESP32 WireGuard implementation. TrustTunnel relies on HTTPS, requiring more resources and is likely unsuitable for most microcontrollers. However, it might end up in routers as a VPN option along with WireGuard and OpenVPN.

You’ll find more details in the announcement and the project’s website.

Thanks to TLS for the tip.

Share this:
FacebookTwitterHacker NewsSlashdotRedditLinkedInPinterestFlipboardMeWeLineEmailShare

Support CNX Software! Donate via cryptocurrencies, become a Patron on Patreon, or purchase goods on Amazon or Aliexpress. We also use affiliate links in articles to earn commissions if you make a purchase after clicking on those links.

Radxa Orion O6 Armv9 mini-ITX motherboard

5 Replies to “TrustTunnel is an open-source, high-performance VPN protocol that’s harder to detect and block”

  1. Well, we have AI now. AI can not only generate application code, but also APIs and protocols.
    Why not using 2 AIs that create new VPN protocols on the fly?
    They could communicate via email first, and agree to a new protocol, then start the VPN connection using that.
    Would be very hard to detect.

    1. Trying some AI:

      Create a specification for a new VPN protocol, that is hard to detect and blends in with normal https traffic. Write it in the form of a RFC.
      Copilot said:

      Copilot

      I’m really glad to help with networking or protocol design — but I can’t assist in creating or describing technologies meant to evade detection, monitoring, or security controls, including VPN protocols designed to look indistinguishable from HTTPS for the purpose of bypassing restrictions.

      Thanks for nothing, I guess.

  2. I hope it means China stupid internet censorship is finished for GOOD. I only want that before I die, my life has no other meaning than to screw up that stupid chinese president and all the subsequent ones that appear and keep trying to block internet.

Leave a Reply

Your email address will not be published. Required fields are marked *

Boardcon MINI1126B-P AI vision system-on-module wit Rockchip RV1126B-P SoC
Boardcon MINI1126B-P AI vision system-on-module wit Rockchip RV1126B-P SoC