Wisp Protocols
Wisp Specifications
What is Wisp?
Wisp is designed to be a low-overhead, easy to implement protocol for proxying multiple TCP and UDP sockets over a single websocket connection.
What does this have to do with proxies?
Prior to the creation of Wisp, proxy traffic over backends such as the Bare Server or Rammerhead are sent completely unencrypted to the server host. This may work fine if you are hosting your own proxy, but when using public links you obtain from a discord server the risk of the host stealing your tokens from proxy usage might be a problem.
Since Wisp can proxy all TCP traffic, transports like Epoxy or Libcurl will encrypt your traffic with TLS, making even the server host unable to access any data besides the hostnames of the sites you visit. Wisp’s UDP feature also allows for use as a highly censorship-resistant VPN with Whisper.
Server Implementations:
- wisp-server-python - by @ading2210
- wisp-server-node - by @ProgrammerIn-wonderland
- epoxy-server (Rust) - by @r58Playz
- WispServerCpp - by @FoxMoss
Client Implementations:
- wisp-client-js - by @ading2210
- wisp-mux (Rust) - by @r58Playz
Software Using Wisp:
- libcurl.js - A port of libcurl to WebAssembly, for proxying HTTPS requests from the browser with full TLS encryption
- epoxy-tls - An encrypted proxy for browser javascript, written in Rust.
- Ultraviolet - A sophisticated web proxy, which uses either libcurl.js or epoxy.
- Whisper - A client for Wisp that exposes the connection over a TUN device.
Packet format
Field Name | Field Type | Notes |
---|---|---|
Packet Type | uint8_t | The packet type, covered in the next section. |
Stream ID | uint32_t | Random stream ID assigned by the client. |
Payload | char[] | Payload takes up the rest of the packet. |
Every packet must follow this format regardless of the type. Note that all data types are little-endian.
Packet Types
Each packet type has a different format for the payload, which is detailed below.
0x01
- CONNECT
Payload Format
Field Name | Field Type | Notes |
---|---|---|
Stream Type | uint8_t | Whether the new stream should use a TCP or UDP socket. |
Destination Port | uint16_t | Destination TCP/UDP port for the new stream. |
Destination Hostname | char[] | Destination hostname, in a UTF-8 string. |
Behavior
The client needs to send a CONNECT packet to the server to create a new stream under the same websocket. The stream ID chosen by the client at this point will be associated with this stream for all future messages. When the server receives this packet, it must validate this information, and if the payload is invalid, a CLOSE packet must be sent.
Once the payload has been validated, the server must immediately try to establish a TCP/UDP socket to the specified hostname and port. If this fails, the server must send a CLOSE packet with the reason. To reduce overall delay, the client can begin sending data before the any CONTINUE packet has been received from the server.
The stream type field determines whether the connection uses TCP or UDP. 0x01
in this field means TCP, and 0x02
means UDP. UDP support is optional for both the server and the client.
0x02
- DATA
Payload Format
Field Name | Field Type | Notes |
---|---|---|
Stream Payload | char[] | The data which is sent to and from the destination server. |
Behavior
Any DATA packets sent from the client to the server must be proxied to the TCP/UDP socket associated with the stream ID of the packet. On the server, the received payload must be buffered before being sent to the TCP/UDP socket in order to handle congestion. The size of this send buffer is predetermined and must be the same for every stream.
Any DATA packets sent from the server to the client must be interpreted as coming from the TCP/UDP socket associated with the stream ID of the packet.
For TCP streams, the server must buffer any packets received from the client in a FIFO queue, and it must keep a separate buffer for each TCP stream.
0x03
- CONTINUE
Payload Format
Field Name | Field Type | Notes |
---|---|---|
Buffer Remaining | uint32_t | The number of packets that the server can buffer for the current stream. |
Behavior
If the associated stream is a UDP socket, then CONTINUE packets must not be sent, and the client does not keep track of any buffer for the stream.
When the client receives a CONTINUE packet from the server, it must store the received buffer size. When sending a DATA packet, this value should be decremented by 1 on the client. Once the remaining buffer size reaches zero, the client cannot send any more DATA packets, until it receives another CONTINUE packet which resets this value.
The server must send another CONTINUE packet when it has received the same number of packets from the client as its own maximum buffer size. The server should regularly send CONTINUE packets before this point to ensure minimal delays when receiving data from the client.
0x04
- CLOSE
Payload format
Field Name | Field Type | Notes |
---|---|---|
Close Reason | uint8_t | The reason for closing the connection. |
Behavior
Any CLOSE packets sent from either the server or the client must immediately close the associated stream and TCP socket. The close reason in the payload doesn’t affect this behavior, but may provide extra information which is useful for debugging.
Client/Server Close Reasons
0x01
- Reason unspecified or unknown. Returning a more specific reason should be preferred.0x02
- Voluntary stream closure, which would equate to one side resetting the connection.0x03
- Unexpected stream closure due to a network error.
Server Only Close Reasons
0x41
- Stream creation failed due to invalid information. This could be sent if the destination was a reserved address or the port is invalid.0x42
- Stream creation failed due to an unreachable destination host. This could be sent if the destination is an domain which does not resolve to anything.0x43
- Stream creation timed out due to the destination server not responding.0x44
- Stream creation failed due to the destination server refusing the connection.0x47
- TCP data transfer timed out.0x48
- Stream destination address/domain is intentionally blocked by the proxy server.0x49
- Connection throttled by the server.
Client Only Close Reasons
0x81
- The client has encountered an unexpected error and is unable to receive any more data.
HTTP Behavior
Since the entire protocol takes place over websockets, a few rules need to be in place to ensure that an HTTP connection can be upgraded successfully.
Server Architecture
The server must consist of a HTTP and websocket server that conforms to the respective standards.
Choosing a Websocket URL
To ensure compatibility with previous wsproxy implementations, the URL of the websocket should always end with a trailing forward slash (/
) to prevent confusion with wsproxy endpoints.
For example, a wsproxy endpoint might look like this: ws://example.com/customprefix/host:port
Meanwhile a Wisp endpoint would look like this: ws://example.com/customprefix/
It is up to the server implementation to interpret the prefix. It may be ignored, or used for gatekeeping in order to establish password-based authentication.
Establishing a Websocket Connection
The client must establish the connection by performing a standard websocket handshake. The Sec-WebSocket-Protocol
header does not need to be set.
Immediately after a websocket connection is established, the server must send a CONTINUE packet containing the initial buffer size for each stream. The stream ID for this packet must be set to 0, which corresponds to the version of the Wisp protocol (0 means Wisp v1). The client must wait for this CONTINUE packet to be received before beginning any communications. The purpose of this packet is to ensure that the client does not have to wait for a CONTINUE packet for the creation of each stream, reducing the overall delay.
The Wisp protocol specifications were written by @ading2210.