Forum Replies Created
-
AuthorPosts
-
As you guessed, you need to find resources about the protocol. To do that you may decompile APK app, or Warp PC. I also discover that the length of warp private key is longer than wireguard. Thats all I know.
I cant tell you accuracy cause I’m not a coder. The main problem I guess is the Wireguard Header.
I used Wireshark to capure traffic and see that, there is a field called wg.reserved
- Traffic via Wireguard Official (Wiresock) this value is 000000
- Traffic via Warp Client, this value is b91981
That’s Cloudflare’s clientid, which is used for routing.
You can know more accurary here (public key encrypt section)
That may cool if you actually found the algorithm of generating ClientID for Wireguard Official profile or Wiresock profile.
It worked, thanks for your supporting. About the Socksify, I cannot tunnel all applications like you said. You can view here. Look like Socksify can tunnel only tcp, udp, but cannot force any connection like webrtc through sock proxy like ProxyCaps, Socksifier…
haha, that is my fault , should i leave it blank but i type a random domain.
You can view log here (you should turn on HD mode).
My config:
[Interface]
PrivateKey = …
Address = 172.16.0.2/32
DNS = 1.1.1.1, 1.0.0.1
MTU = 1280
[Peer]
PublicKey = …
AllowedIPs = 0.0.0.0/0
Endpoint = google.com:2408
DisallowedIPs = 192.168.1.0/24Console log:
Thanks for your reply, I dont understand that you said dont specify, i try to delete “AllowedApps” line and restart wiresock service and there is no connection over VPN, i also try leave blank AllowedApps = “blank” , it doesnt work too. About Socksify sample, can you support it tunnell all apps, not only selected apps ?
-
AuthorPosts