Overview
RAGE supports multiple protocols to ensure you can connect reliably from any network. The two primary protocols are VLESS with XTLS-Vision-Reality and XHTTP. Each has distinct characteristics that make it better suited for different situations.
Quick recommendation: Start with VLESS (XTLS-Vision-Reality) for best performance. Switch to XHTTP if you experience connection issues or blocks.
VLESS (XTLS-Vision-Reality)
VLESS is a lightweight proxy protocol that, combined with XTLS-Vision and Reality, provides one of the most advanced anti-censorship solutions available.
How It Works
XTLS-Vision uses a technique called "vision" that makes proxy traffic indistinguishable from normal TLS traffic by perfectly mimicking TLS handshakes and data patterns.
Reality takes this further by using real, existing websites as camouflage. When censors probe the server, they see responses from a legitimate website (like a popular search engine or social network), not a proxy server.
Advantages
- Maximum performance — Zero overhead encryption means near-native speeds
- Excellent anti-detection — Reality makes the server appear as a legitimate website
- Low latency — Ideal for real-time applications, gaming, video calls
- Efficient on mobile — Less CPU usage means better battery life
Limitations
- Uses dedicated ports (typically 443) that may be monitored
- Long-lived connections may be flagged by some DPI systems
- May not work on heavily restricted corporate networks
Best For
- Daily use on most networks
- Streaming and downloads requiring high bandwidth
- Gaming and video conferencing
- Mobile users prioritizing battery life
XHTTP
XHTTP is a protocol that tunnels proxy traffic through standard HTTP/HTTPS requests, making it virtually impossible to distinguish from normal web browsing.
How It Works
XHTTP encapsulates your traffic within regular HTTP requests and responses. To any observer, it looks exactly like you're browsing websites — because technically, you are. The proxy data is hidden within what appears to be normal web traffic.
Advantages
- Maximum compatibility — Works through almost any firewall or proxy
- Bypass HTTP-only networks — Functions even when only web traffic is allowed
- Corporate network friendly — Passes through web proxies and content filters
- Resistant to connection analysis — Looks like normal browsing patterns
Limitations
- Higher overhead than VLESS — more data transferred per request
- Slightly higher latency due to HTTP encapsulation
- Not ideal for real-time applications that need consistent low latency
Best For
- Highly restricted networks (corporate, educational, public Wi-Fi)
- When VLESS connections are blocked
- Networks that only allow HTTP/HTTPS traffic
- Situations requiring maximum stealth over maximum speed
Protocol Comparison
| Feature | VLESS (XTLS-Vision-Reality) | XHTTP |
|---|---|---|
| Speed | Excellent (near-native) | Good (slight overhead) |
| Latency | Very low | Moderate |
| Firewall bypass | Good | Excellent |
| DPI resistance | Excellent (Reality) | Excellent (HTTP masking) |
| Corporate networks | May be blocked | Usually works |
| Battery usage | Low | Moderate |
| Best use case | Daily use, streaming, gaming | Restricted networks |
Choosing the Right Protocol
Use VLESS when:
- You're on a home or mobile network without strict filtering
- Speed and low latency are priorities
- You're streaming video or playing online games
- Battery life on mobile is important
Use XHTTP when:
- VLESS connections fail or are unstable
- You're on a corporate or educational network
- You're behind a web proxy that blocks non-HTTP traffic
- You need maximum stealth and don't mind slight speed reduction
Switching Protocols in RAGE
The protocol is indicated next to each server name in the server list. Simply select a server with the protocol you want to use:
- Servers marked with VLESS use the XTLS-Vision-Reality protocol
- Servers marked with XHTTP use the HTTP-based protocol
Technical Deep Dive
XTLS-Vision Explained
Traditional TLS proxies can be detected because they create "TLS-in-TLS" — encrypted proxy traffic inside another TLS connection. This double encryption has detectable patterns.
XTLS-Vision solves this by directly forwarding TLS traffic without re-encryption when possible, eliminating the telltale double-encryption fingerprint while maintaining security.
Reality Authentication
Reality doesn't just mimic a website — it actually completes the TLS handshake as that website would. The server presents a valid certificate for a real domain, and only clients with the correct private key can access the proxy functionality. To censors, active probing reveals only a legitimate website.
XHTTP Multiplexing
XHTTP efficiently uses HTTP/2 or HTTP/3 multiplexing to handle multiple streams over a single connection, reducing the overhead that would come from establishing new connections for each request.