Protocol

Overview

ProtocolDefault TransportAuthenticationStrengthsTypical Constraints
SOCKS5TCP control + optional UDPOptional username/passwordWorks with almost any TCP app, UDP associate modeClear-text by default, needs TLS/obfs elsewhere
HTTP(S) CONNECTTCP over HTTP/1.1 or HTTP/2Basic auth, bearer token, mutual TLSBlends with web traffic, easy to deploy on gatewaysOnly proxies TCP, relies on intermediary keeping long-lived tunnels
TrojanTLS over TCPPre-shared password validated inside TLSHard to fingerprint, benefits from CDN/SNIEach password maps to a port/user, needs valid TLS certificate
Hysteria 2QUIC (UDP) with TLS 1.3Password or OIDC-like tokenHigh throughput, UDP native, congestion tuningRequires open UDP ports, MTU tuning important
TUICQUIC (UDP) with TLS 1.3UUID or token-based auth0-RTT friendly, multiplexed streams, low handshake overheadNeeds UDP reachability, QUIC fingerprinting varies by implementation
VLESSTLS/XTLS over TCP or MKCPUUID-based identityFlexible multiplexing, optional XTLS auto-splitNo encryption without TLS/XTLS layer, ecosystem-specific tooling
xHTTP TransportHTTP-style stream over TLS/RealityUsually UUID/token from upper protocol (e.g., VLESS)Better web-traffic camouflage, friendly to reverse proxies/CDNsHeader/path mismatch breaks handshake; extra overhead versus raw TCP
Reality (TLS camouflage)TLS 1.3-like handshakePublic key + short ID (plus upstream auth)Certificate-less TLS mimicry, resistant to passive probingDepends on client fingerprint matching, tied to Xray tooling

Detailed breakdowns now live in dedicated files; each follows the same structure (highlights, flow, configuration snippet, strengths, and limitations) to make comparisons straightforward.

Deep Dives

  • SOCKS5 – General-purpose TCP/UDP proxy with flexible method negotiation.
  • HTTP CONNECT Proxy – HTTPS-friendly tunnels that ride over standard web ports.
  • Trojan – TLS-camouflaged password proxy ideal for CDN fronting.
  • Hysteria 2 – QUIC-based transport tuned for high-loss or high-latency links.
  • TUIC – QUIC-based proxy with multiplexing and aggressive latency tuning.
  • VLESS – UUID-auth protocol with configurable transports such as TLS, XTLS, or Reality.
  • xHTTP Transport – HTTP-like transport profile for Xray ecosystems, often paired with VLESS.
  • Reality – TLS camouflage layer used by Xray transports without certificates.