Overview

RAGE supports multiple protocols to ensure you can connect reliably from any network. The two primary protocols are VLESS with XTLS-Vision-Reality and XHTTP. Each has distinct characteristics that make it better suited for different situations.

Quick recommendation: Start with VLESS (XTLS-Vision-Reality) for best performance. Switch to XHTTP if you experience connection issues or blocks.

VLESS (XTLS-Vision-Reality)

VLESS is a lightweight proxy protocol that, combined with XTLS-Vision and Reality, provides one of the most advanced anti-censorship solutions available.

How It Works

XTLS-Vision uses a technique called "vision" that makes proxy traffic indistinguishable from normal TLS traffic by perfectly mimicking TLS handshakes and data patterns.

Reality takes this further by using real, existing websites as camouflage. When censors probe the server, they see responses from a legitimate website (like a popular search engine or social network), not a proxy server.

Advantages

Limitations

Best For

XHTTP

XHTTP is a protocol that tunnels proxy traffic through standard HTTP/HTTPS requests, making it virtually impossible to distinguish from normal web browsing.

How It Works

XHTTP encapsulates your traffic within regular HTTP requests and responses. To any observer, it looks exactly like you're browsing websites — because technically, you are. The proxy data is hidden within what appears to be normal web traffic.

Advantages

Limitations

Best For

Protocol Comparison

Feature VLESS (XTLS-Vision-Reality) XHTTP
Speed Excellent (near-native) Good (slight overhead)
Latency Very low Moderate
Firewall bypass Good Excellent
DPI resistance Excellent (Reality) Excellent (HTTP masking)
Corporate networks May be blocked Usually works
Battery usage Low Moderate
Best use case Daily use, streaming, gaming Restricted networks

Choosing the Right Protocol

Use VLESS when:

Use XHTTP when:

Switching Protocols in RAGE

The protocol is indicated next to each server name in the server list. Simply select a server with the protocol you want to use:

Technical Deep Dive

XTLS-Vision Explained

Traditional TLS proxies can be detected because they create "TLS-in-TLS" — encrypted proxy traffic inside another TLS connection. This double encryption has detectable patterns.

XTLS-Vision solves this by directly forwarding TLS traffic without re-encryption when possible, eliminating the telltale double-encryption fingerprint while maintaining security.

Reality Authentication

Reality doesn't just mimic a website — it actually completes the TLS handshake as that website would. The server presents a valid certificate for a real domain, and only clients with the correct private key can access the proxy functionality. To censors, active probing reveals only a legitimate website.

XHTTP Multiplexing

XHTTP efficiently uses HTTP/2 or HTTP/3 multiplexing to handle multiple streams over a single connection, reducing the overhead that would come from establishing new connections for each request.

Split Tunneling Guide RAGE Integration Guide