Wiki Article
V2Ray
Nguồn dữ liệu từ Wikipedia, hiển thị bởi DefZone.Net
| V2Ray | |
|---|---|
| Original author | Victoria Raymond |
| Initial release | 0.1 (September 18, 2015) |
| Written in | Go |
| License | MIT License |
| Website | v2ray |
| Repository | github |
V2Ray is an open-source protocol part of the Project V platform, designed to enhance privacy and bypass censorship. It supports multiple tunneling protocols like VMess, Shadowsocks, SOCKS, and HTTP. Its modular design allows flexible configurations to adapt to various internet censorship scenarios.[1][2][3][4]
VMess is V2Ray's primary protocol, uses strong encryption and dynamic port allocation to resist DPI-based detection. V2Ray can obfuscate traffic to mimic HTTPS or WebSocket and adjusts to changing network conditions, making it effective in censorship-heavy environments such as China.[1][2][5]
Operation principle
[edit]The operating principle of V2Ray is basically the same as other proxy tools: it uses specific relay servers to complete data transmission. For example, if a user cannot directly access websites like Google or YouTube but the proxy server can, and the user can connect directly to the proxy server, then the user can connect to the proxy server via specific software; the proxy server will fetch the website content and return it to the user, thereby achieving proxy browsing. Server and client software require users to provide certain parameters according to different protocols, such as UUID, keys, encryption methods, etc.; only when both sides match can the connection succeed (the VMess protocol can adapt to the encryption method used by the client). After connecting to the server, the client builds a local proxy on the host (such as VPN, Socks5/HTTP, transparent proxy, etc.). When browsing the web, the client collects network traffic through this proxy, then obfuscates and encrypts it and sends it to the server to prevent the traffic from being identified and intercepted. V2Ray positions itself as a platform; any developer can use the modules provided by V2Ray to develop new proxy software.
Main features
[edit]Multiple inbounds and outbounds: A single V2Ray process can concurrently support multiple inbound and outbound protocols, each operating independently.
Customizable routing: Inbound traffic can be routed to different outbound exits according to configuration. Easily implement routing by region or by domain to achieve optimal network performance.
Multiple protocol support: V2Ray can enable multiple protocols simultaneously, including Socks, HTTP, Shadowsocks, VMess, Trojan and VLESS. Each protocol can independently set transport carriers, such as TCP, mKCP and WebSocket.
Obfuscation: Nodes using VMess, VLESS and Trojan protocols can masquerade as normal websites (HTTPS), mixing their traffic with normal web traffic to avoid third-party interference.
Reverse proxy: General reverse proxy support, enabling intranet penetration functionality.
Multi-platform support: Native support for all common platforms such as Windows, macOS and Linux, with third-party support already available for mobile platforms.
History
[edit]Patent incident
[edit]Professor Luo Senlin of Beijing Institute of Technology and two students, Wang Shuaipeng and Pan Limin, applied on 25 March 2019 for a patent titled "V2ray traffic identification method based on long short-term memory network".[6][7] On 25 October 2019, the legal status of the patent was changed to "withdrawn after publication of the invention patent application".
The V2Ray project team stated that a patent does not guarantee the effectiveness of a method; a patent only protects the method itself. In addition, there are some issues in the patent description:
The patent mentions: "V2ray server and client need to pre-exchange keys for each communication, so the early packets of each communication have significant features." In fact, the VMess protocol does not have a "pre-exchange keys" step. Even if V2Ray is used together with a protocol that requires "pre-exchange keys", the packets used for the "pre-exchange keys" would not have V2Ray's data characteristics, because no valid data has been sent yet; any features would belong to the cooperating protocol. The patent spells V2Ray as "V2ray".
Disappearance of the original author
[edit]In February 2019, V2Ray project founder Victoria Raymond suddenly disappeared; her Twitter, Telegram and Zhihu stopped updating.
The original author's GitHub account remained active until the last commit in November 2019.
Derived projects
[edit]Project X
[edit]| Xray | |
|---|---|
| Original author | RPRX |
| Initial release | 1.0.0[8] (November 25, 2020) |
| Written in | Go |
| Operating system | Unix-like operating system Microsoft Windows |
| Type | proxy server Internet censorship circumvention free software application |
| License | Mozilla Public License 2.0 |
| Website | xtls |
| Repository | github |
In November 2020, due to reasons including open source licensing, XTLS was removed from v2ray-core by the V2Ray community. The authors and supporters of VLESS and XTLS formed the Project X organization based on V2Ray and developed the V2Ray-derived version Xray.[9] Because the Project X community is very active, most new graphical clients already support Xray.[10]
V2Fly
[edit]V2Fly Reorganized and established by the open source community after the original author's disappearance.
Graphical clients derived from V2Ray
[edit]Because the V2Ray and Xray projects are open source, there are graphical proxy clients on sites like GitHub that are compatible with or include the V2Ray/Xray cores, such as v2rayNG, v2rayN, v2rayA and others.
Reception
[edit]An article in South China Morning Post stated that V2Ray is a reliable way for many people in China to access the global internet; these users are either technically proficient or subscribe to paid services. V2Ray is also described as the spiritual successor to Shadowsocks, and support for personal domains and TLS is seen as an improvement over Shadowsocks; these features can disguise traffic as visits to unblocked websites.[9]
Cores and graphical clients
[edit]Cores
[edit]V2Fly — community‑maintained core reorganized from the original V2Ray project.
Xray — V2Ray‑derived core developed by Project X, adds VLESS/XTLS features.
sing-box — modern proxy core/runtime supporting multiple protocols and V2Ray‑compatible transports.
Graphical clients
[edit]v2rayNG — Android graphical client that uses V2Ray/Xray backends.
v2rayN — Windows graphical client for configuring and running V2Ray.
v2rayA — Linux web‑based GUI for V2Ray.
Nekoray — cross‑platform GUI client compatible with V2Ray, Xray, and sing‑box backends.
Panels
[edit]- 3X-UI — a web‑based control panel for managing Xray/V2Ray servers; supports multiple protocols, multi‑user management, traffic and expiry controls, and administrative features.
- Marzban — a modern proxy management panel for Xray‑core with a user‑friendly web interface, supporting VLESS, VMess, Trojan, Shadowsocks, subscription links, traffic limits, and REST API integration.
References
[edit]- ^ a b Orofino, Antonino (2024). "An Investigation of VPN Fingerprinting". ETH Zurich. doi:10.3929/ethz-b-000715378. hdl:20.500.11850/715378.
- ^ a b Hale, Erin. "China's volunteer programmers work in the shadows to set the internet free". Al Jazeera. Retrieved 2025-10-03.
- ^ Litvinov, V. L. (September 2025). "Research of Methods for Recognizing Anonymized Traffic". 2025 VI International Conference on Control in Technical Systems (CTS). pp. 127–130. doi:10.1109/CTS67336.2025.11196346. ISBN 979-8-3315-5854-3.
- ^ Wu, Hua; Liu, Yujie; Cheng, Guang; Hu, Xiaoyan (2022). "Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks". ICC 2022 - IEEE International Conference on Communications. pp. 5070–5075. doi:10.1109/icc45855.2022.9839256. ISBN 978-1-5386-8347-7.
- ^ He, Yanjie; Li, Wei (2025). "A Lightweight Deep Learning Approach for Encrypted Proxy Traffic Detection". Security and Communication Networks. 2025 (1) 4469975. doi:10.1155/sec/4469975. ISSN 1939-0122.
- ^ "Beijing Institute of Technology applies for "anti-VPN" patent; Chinese netizens furious". SET News. 2019-10-06. Archived from the original on 2023-12-16. Retrieved 2023-12-16.
- ^ "Beijing Institute of Technology files patent to block "VPN"; Chinese netizens outraged". Liberty Times. 2019-10-06. Archived from the original on 2023-12-16. Retrieved 2023-12-16.
- ^ RPRX、Project X Community (2020-11-25). "Xray-core v1.0.0". Github.com. Archived from the original on 2021-12-04. Retrieved 2021-10-15.
- ^ a b Haldane, Matt; Shen, Xinmei (2022-10-06). "China blocks stealthy anticensorship tools ahead of 20th party congress". South China Morning Post. Archived from the original on 2022-10-15. Retrieved 2023-06-28.
- ^ "3X-UI: Внедрение VLESS с XTLS-Reality на сервере XRay для VPN будущего". SE7EN.ws (in Russian). 2023-10-15. Retrieved 2023-10-18.