vcl-protocol 1.0.0

Cryptographically chained packet transport protocol with SHA-256 integrity, Ed25519 signatures, and XChaCha20-Poly1305 encryption
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
# VCL Protocol

โš ๏ธ **Development Branch**
>
> You're viewing the `main` branch which is under active development.
> Code here may be unstable or incomplete.
>
> โœ… **For stable version:** [crates.io/vcl-protocol]https://crates.io/crates/vcl-protocol

[![Crates.io](https://img.shields.io/crates/v/vcl-protocol.svg)](https://crates.io/crates/vcl-protocol)
[![Docs.rs](https://docs.rs/vcl-protocol/badge.svg)](https://docs.rs/vcl-protocol)
[![Rust](https://img.shields.io/badge/Rust-1.70+-orange.svg)](https://www.rust-lang.org)
[![Tests](https://img.shields.io/badge/tests-257%2F257%20passing-brightgreen.svg)]()
[![License](https://img.shields.io/badge/License-MIT-blue.svg)](LICENSE)
[![Status](https://img.shields.io/badge/Status-v1.0.0%20Stable-green.svg)]()

**Verified Commit Link** โ€” Cryptographically chained packet transport protocol

---

## ๐Ÿ“š Documentation

**[README]README.md** | **[Usage Guide]USAGE.md** | **[Crates.io]https://crates.io/crates/vcl-protocol** | **[Docs.rs]https://docs.rs/vcl-protocol** | **[GitHub]https://github.com/ultrakill148852-collab/vcl-protocol**

---

## ๐Ÿ“– About

VCL Protocol is a transport protocol where each packet cryptographically links to the previous one, creating an immutable chain of data transmission. Inspired by blockchain principles, optimized for real-time networking.

**v1.0.0** is the production release โ€” adds TUN interface for IP packet capture, full IP/TCP/UDP/ICMP parsing, multipath routing across multiple network interfaces, automatic MTU negotiation, NAT keepalive, automatic reconnection, DNS leak protection, and traffic obfuscation to bypass DPI censorship.

**Published on crates.io:** https://crates.io/crates/vcl-protocol
**API Documentation:** https://docs.rs/vcl-protocol

---

## โœจ Features

| Feature | Description |
|---------|-------------|
| ๐Ÿ” Cryptographic Chain | Each packet references hash of previous packet via SHA-256 |
| โœ๏ธ Ed25519 Signatures | Fast and secure digital signatures |
| ๐Ÿ”‘ X25519 Handshake | Ephemeral key exchange, no pre-shared keys needed |
| ๐Ÿ”’ XChaCha20-Poly1305 | Authenticated encryption for all payloads |
| ๐Ÿ›ก๏ธ Replay Protection | Sequence numbers + nonce tracking prevent packet replay |
| ๐Ÿšช Session Management | close(), is_closed(), timeout handling |
| โฑ๏ธ Inactivity Timeout | Auto-close idle connections (configurable) |
| โœ… Chain Validation | Automatic integrity checking on every packet |
| โšก UDP Transport | Low latency, high performance |
| ๐Ÿ”Œ TCP Transport | Reliable ordered delivery for VPN scenarios |
| ๐ŸŒ WebSocket Transport | Browser-compatible, works through HTTP proxies |
| ๐Ÿ”€ Transport Abstraction | Single API works with UDP, TCP, and WebSocket |
| ๐Ÿšซ Custom Error Types | Typed `VCLError` enum with full `std::error::Error` impl |
| ๐Ÿ“ก Connection Events | Subscribe to lifecycle & data events via async mpsc channel |
| ๐Ÿ“ Ping / Heartbeat | Built-in ping/pong with automatic round-trip latency measurement |
| ๐Ÿ”„ Key Rotation | Rotate encryption keys mid-session without reconnecting |
| ๐ŸŠ Connection Pool | Manage multiple connections under a single `VCLPool` manager |
| ๐Ÿงฉ Packet Fragmentation | Automatic split and reassembly for large payloads |
| ๐ŸŒŠ Flow Control | Sliding window with RFC 6298 RTT estimation |
| ๐Ÿ“‰ Congestion Control | AIMD algorithm with slow start and retransmission |
| ๐Ÿ” Retransmission | Automatic retransmit on timeout with exponential backoff |
| ๐Ÿ“Š Metrics API | `VCLMetrics` aggregates stats across connections and pools |
| โš™๏ธ Config Presets | VPN, Gaming, Streaming, Auto โ€” one line setup |
| ๐Ÿ“ Tracing Logs | Structured logging via `tracing` crate |
| ๐Ÿ“ˆ Benchmarks | Performance benchmarks via `criterion` |
| ๐Ÿ–ฅ๏ธ TUN Interface | Capture IP packets from OS network stack (Linux) |
| ๐Ÿ“ฆ IP Packet Parser | Full IPv4/IPv6/TCP/UDP/ICMP header parsing |
| ๐Ÿ”€ Multipath | Send across multiple interfaces (WiFi + LTE) simultaneously |
| ๐Ÿ“ MTU Negotiation | Automatic path MTU discovery via binary search |
| ๐Ÿ’“ Keepalive | NAT keepalive presets for Mobile/Home/Corporate networks |
| ๐Ÿ”Œ Reconnect | Exponential backoff reconnection with jitter |
| ๐Ÿ›ก๏ธ DNS Leak Protection | Intercept DNS, blocklist, split DNS, response caching |
| ๐ŸŽญ Traffic Obfuscation | TLS/HTTP2 mimicry to bypass DPI censorship (ะœะขะก, Beeline) |
| ๐Ÿ“– Full API Docs | Complete documentation on [docs.rs]https://docs.rs/vcl-protocol |
| ๐Ÿงช Full Test Suite | 257/257 tests passing (unit + integration + doc) |

---

## ๐Ÿ—๏ธ Architecture

```text
Packet N        Packet N+1      Packet N+2
+--------+     +--------+     +--------+
| hash   |     | prev   |     | prev   |
| 0x00.. | --> | 0x00.. | --> | 0x3a.. |
| sig    |     | sig    |     | sig    |
+--------+     +--------+     +--------+

hash(Packet N) -> stored in prev_hash of Packet N+1
hash(Packet N+1) -> stored in prev_hash of Packet N+2
```

### Handshake Flow

```text
Client                          Server
   |                               |
   | -- ClientHello (pubkey) ----> |
   |                               |
   | <---- ServerHello (pubkey) -- |
   |                               |
   | [Shared secret computed]      |
   | [Secure channel established]  |
```

### Encryption Flow

```text
Send: plaintext โ†’ obfuscate? โ†’ fragment? โ†’ encrypt(XChaCha20) โ†’ sign(Ed25519) โ†’ send
Recv: receive โ†’ verify(Ed25519) โ†’ decrypt(XChaCha20) โ†’ reassemble? โ†’ deobfuscate? โ†’ plaintext
```

### Session Management

```text
- close()         โ†’ Gracefully close connection, clear state
- is_closed()     โ†’ Check if connection is closed
- set_timeout()   โ†’ Configure inactivity timeout (default: 60s)
- last_activity() โ†’ Get timestamp of last send/recv
```

### Event Flow

```text
conn.subscribe() โ†’ mpsc::Receiver<VCLEvent>

Events:
  Connected          โ†’ handshake completed
  Disconnected       โ†’ close() called
  PacketReceived     โ†’ data packet arrived { sequence, size }
  PingReceived       โ†’ peer pinged us (pong sent automatically)
  PongReceived       โ†’ our ping was answered { latency: Duration }
  KeyRotated         โ†’ key rotation completed
  Error(msg)         โ†’ non-fatal internal error
```

### Key Rotation Flow

```text
Client                              Server
   |                                   |
   | -- KeyRotation(new_pubkey) -----> |
   |                                   |
   | <--- KeyRotation(new_pubkey) ---- |
   |                                   |
   | [both sides now use new key]      |
```

### Connection Pool

```text
VCLPool::new(max)
   |
   โ”œโ”€โ”€ bind("addr") โ†’ ConnectionId(0)
   โ”œโ”€โ”€ bind("addr") โ†’ ConnectionId(1)
   โ”œโ”€โ”€ bind("addr") โ†’ ConnectionId(2)
   |
   โ”œโ”€โ”€ connect(id, peer)
   โ”œโ”€โ”€ send(id, data)
   โ”œโ”€โ”€ recv(id) โ†’ VCLPacket
   โ”œโ”€โ”€ ping(id)
   โ”œโ”€โ”€ rotate_keys(id)
   โ”œโ”€โ”€ close(id)
   โ””โ”€โ”€ close_all()
```

### Fragmentation Flow

```text
send(large_payload)
   |
   โ”œโ”€โ”€ payload > fragment_size?
   |     YES โ†’ Fragmenter::split โ†’ [Frag0][Frag1][Frag2]...
   |            each fragment encrypted + signed separately
   |     NO  โ†’ single Data packet
   |
recv()
   |
   โ”œโ”€โ”€ PacketType::Fragment โ†’ Reassembler::add(frag)
   |     incomplete โ†’ loop, wait for more fragments
   |     complete   โ†’ return reassembled VCLPacket
   โ””โ”€โ”€ PacketType::Data โ†’ return directly
```

### Flow Control & Congestion Control

```text
FlowController (sliding window + AIMD)
   |
   โ”œโ”€โ”€ can_send()            โ†’ effective window has space?
   โ”œโ”€โ”€ on_send(seq, data)    โ†’ register packet as in-flight
   โ”œโ”€โ”€ on_ack(seq)           โ†’ remove from window, update RTT (RFC 6298)
   โ”œโ”€โ”€ timed_out_packets()   โ†’ RetransmitRequest[] with data to resend
   โ”œโ”€โ”€ loss_rate()           โ†’ f64 packet loss rate
   โ”œโ”€โ”€ cwnd()                โ†’ current congestion window
   โ””โ”€โ”€ in_slow_start()       โ†’ slow start phase active?

AIMD:
  No loss โ†’ cwnd += 1/cwnd per ack   (additive increase)
  Loss    โ†’ cwnd = 1, ssthresh /= 2  (multiplicative decrease)
  RTO     โ†’ doubles on loss, min 50ms, max 60s
```

### WebSocket Transport

```text
VCLTransport::bind_ws("addr")     โ†’ WebSocketListener
VCLTransport::connect_ws("url")   โ†’ WebSocketClient
listener.accept()                 โ†’ WebSocketServer

All send/recv via binary frames โ€” same API as TCP/UDP
Works through HTTP proxies and firewalls
```

### TUN Interface (v1.0.0)

```text
OS Network Stack
   โ†“ (routing table)
TUN interface (vcl0) โ† VCLTun::create(TunConfig)
   โ†“ VCLTun::read_packet()
IP Packet โ†’ parse_ip_packet() โ†’ ParsedPacket { src, dst, protocol, ... }
   โ†“ encrypt + send via VCLConnection
   โ†“ recv + decrypt
VCLTun::write_packet() โ†’ inject back into OS stack
```

### Multipath (v1.0.0)

```text
MultipathSender (scheduling policies):
  BestPath          โ†’ highest bandwidth/latency score
  RoundRobin        โ†’ alternate across all active paths
  WeightedRoundRobinโ†’ more traffic to higher-bandwidth paths
  Redundant         โ†’ send on ALL paths simultaneously
  LowestLatency     โ†’ always pick fastest path

MultipathReceiver:
  Reordering buffer โ†’ delivers packets in sequence order
  Duplicate detection โ†’ silently drops redundant copies
```

### Traffic Obfuscation (v1.0.0)

```text
ObfuscationMode::TlsMimicry   โ†’ looks like TLS 1.3 HTTPS
ObfuscationMode::Http2Mimicry โ†’ looks like HTTP/2 DATA frames
ObfuscationMode::Full         โ†’ TLS + size normalization + jitter
ObfuscationMode::Padding      โ†’ random padding only

recommended_mode("mts")    โ†’ Full
recommended_mode("home")   โ†’ TlsMimicry
recommended_mode("office") โ†’ Http2Mimicry
```

### Config Presets

```text
VCLConfig::vpn()       โ†’ TCP + Reliable   (VPN, file transfer)
VCLConfig::gaming()    โ†’ UDP + Partial    (games, real-time)
VCLConfig::streaming() โ†’ UDP + Unreliable (video, audio)
VCLConfig::auto()      โ†’ Auto + Adaptive  (recommended default)
```

---

## ๐Ÿš€ Quick Start

### Installation

```bash
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
cargo add vcl-protocol
```

### Run Demo

```bash
cargo run
```

### Run Tests

```bash
cargo test
```

### Run Benchmarks

```bash
cargo bench
```

### Event Subscription Example

```rust
use vcl_protocol::connection::VCLConnection;
use vcl_protocol::VCLEvent;

#[tokio::main]
async fn main() {
    let mut conn = VCLConnection::bind("127.0.0.1:0").await.unwrap();
    let mut events = conn.subscribe();

    tokio::spawn(async move {
        while let Some(event) = events.recv().await {
            match event {
                VCLEvent::Connected              => println!("Connected!"),
                VCLEvent::PongReceived { latency } => println!("Latency: {:?}", latency),
                VCLEvent::KeyRotated             => println!("Keys rotated!"),
                VCLEvent::Disconnected           => break,
                _                                => {}
            }
        }
    });

    conn.connect("127.0.0.1:8080").await.unwrap();
}
```

### Connection Pool Example

```rust
use vcl_protocol::VCLPool;

#[tokio::main]
async fn main() {
    let mut pool = VCLPool::new(10);

    let id = pool.bind("127.0.0.1:0").await.unwrap();
    pool.connect(id, "127.0.0.1:8080").await.unwrap();
    pool.send(id, b"Hello from pool!").await.unwrap();

    let packet = pool.recv(id).await.unwrap();
    println!("{}", String::from_utf8_lossy(&packet.payload));

    pool.close(id).unwrap();
}
```

### Obfuscation Example (v1.0.0)

```rust
use vcl_protocol::obfuscation::{Obfuscator, ObfuscationConfig, recommended_mode, ObfuscationMode};

// For ะœะขะก/Beeline mobile networks
let mode = recommended_mode("mts"); // โ†’ Full
let mut obf = Obfuscator::new(ObfuscationConfig::full());

let data = b"vcl packet payload";
let obfuscated = obf.obfuscate(data);   // looks like TLS to DPI
let restored = obf.deobfuscate(&obfuscated).unwrap();
assert_eq!(restored, data);

println!("Overhead: {:.1}%", obf.overhead_ratio() * 100.0);
```

### Keepalive Example (v1.0.0)

```rust
use vcl_protocol::keepalive::{KeepaliveManager, KeepalivePreset, KeepaliveAction};

// Mobile preset โ€” keeps NAT alive on ะœะขะก/Beeline (30s timeout)
let mut keepalive = KeepaliveManager::from_preset(KeepalivePreset::Mobile);

loop {
    match keepalive.check() {
        KeepaliveAction::SendPing => {
            keepalive.record_keepalive_sent();
            // conn.ping().await?;
        }
        KeepaliveAction::PongTimeout    => { keepalive.record_pong_missed(); }
        KeepaliveAction::ConnectionDead => { break; /* reconnect */ }
        KeepaliveAction::Idle           => {}
    }
    // tokio::time::sleep(Duration::from_secs(1)).await;
}
```

### DNS Protection Example (v1.0.0)

```rust
use vcl_protocol::dns::{DnsFilter, DnsConfig, DnsAction, DnsQueryType};

let config = DnsConfig::cloudflare()
    .with_blocked_domain("ads.example.com")
    .with_split_domain("corp.internal");

let mut filter = DnsFilter::new(config);

match filter.decide("ads.example.com", &DnsQueryType::A) {
    DnsAction::Block               => { /* return NXDOMAIN */ }
    DnsAction::ForwardThroughTunnel => { /* send via VCL */ }
    DnsAction::AllowDirect         => { /* use OS resolver */ }
    DnsAction::ReturnCached(addr)  => { /* return cached IP */ }
}
```

---

## ๐Ÿ“ฆ Packet Structure

```rust
pub struct VCLPacket {
    pub version: u8,             // Protocol version (2)
    pub packet_type: PacketType, // Data | Ping | Pong | KeyRotation | Fragment
    pub sequence: u64,           // Monotonic packet sequence number
    pub prev_hash: Vec<u8>,      // SHA-256 hash of previous packet
    pub nonce: [u8; 24],         // XChaCha20 nonce for encryption
    pub payload: Vec<u8>,        // Decrypted data payload (after recv())
    pub signature: Vec<u8>,      // Ed25519 signature
}
```

---

## ๐Ÿ“Š Benchmarks

Measured on WSL2 Debian, optimized build (`cargo bench`):

| Operation | Time |
|-----------|------|
| keypair_generate | ~13 ยตs |
| encrypt 64B | ~1.5 ยตs |
| encrypt 16KB | ~12 ยตs |
| decrypt 64B | ~1.4 ยตs |
| decrypt 16KB | ~13 ยตs |
| packet_sign | ~32 ยตs |
| packet_verify | ~36 ยตs |
| packet_serialize | ~0.8 ยตs |
| packet_deserialize | ~1.1 ยตs |
| full pipeline 64B | ~38 ยตs |
| full pipeline 4KB | ~48 ยตs |

---

## ๐ŸŽฏ Use Cases

### ๐Ÿ’ฐ Financial Transactions
Immutable audit log of all transactions with cryptographic proof of integrity.

### ๐ŸŽฎ Anti-Cheat Systems
Verify integrity of game events and detect tampering in real-time.

### ๐Ÿ“‹ Audit Logging
Cryptographically proven data integrity for compliance and debugging.

### ๐Ÿ” Secure Communications
Authenticated, encrypted channel with replay protection and session management.

### ๐ŸŒ VPN Infrastructure
TUN interface + multipath + keepalive + reconnect + DNS protection โ€” complete VPN protocol foundation.

### ๐ŸŒ Censorship Circumvention
Traffic obfuscation (TLS/HTTP2 mimicry) bypasses DPI used by ISPs like ะœะขะก and Beeline.

### ๐Ÿ–ฅ๏ธ Browser Clients
WebSocket transport allows VCL Protocol to work from browsers and through corporate HTTP proxies.

---

## ๐Ÿ”ฌ Technical Details

### Cryptography
- **Hashing:** SHA-256
- **Signatures:** Ed25519
- **Key Exchange:** X25519
- **Encryption:** XChaCha20-Poly1305 (AEAD)
- **Key Generation:** CSPRNG
- **Replay Protection:** Sequence validation + nonce tracking (1000-entry window)

### Transport
- **UDP** โ€” low latency, default
- **TCP** โ€” reliable, ordered (VPN mode)
- **WebSocket** โ€” browser-compatible, HTTP proxy-friendly
- **Runtime:** Tokio async
- **Max Packet Size:** 65535 bytes
- **TCP/WS Framing:** 4-byte big-endian length prefix (TCP), binary frames (WS)

### TUN Interface (v1.0.0)
- **Platform:** Linux only (requires `CAP_NET_ADMIN` or root)
- **Default MTU:** 1420 bytes
- **IP versions:** IPv4 and IPv6
- **Crate:** `tun` with async feature

### IP Parsing (v1.0.0)
- **IPv4/IPv6** header parsing via `etherparse`
- **Protocols:** TCP, UDP, ICMP, ICMPv6, and any other protocol number
- **Helpers:** `is_dns()`, `is_ping()`, `summary()`

### Multipath (v1.0.0)
- **Scheduling:** BestPath, RoundRobin, WeightedRoundRobin, Redundant, LowestLatency
- **Reorder buffer:** up to 256 out-of-order packets
- **Duplicate detection:** sequence-based

### MTU Negotiation (v1.0.0)
- **Algorithm:** Binary search probing
- **Range:** 576โ€“1500 bytes (configurable up to 9000 for jumbo frames)
- **VCL overhead:** 149 bytes (Ed25519 + hash + nonce + headers)

### Keepalive (v1.0.0)
- **Mobile preset:** 20s interval (ะœะขะก/Beeline 30s NAT timeout)
- **Adaptive:** adjusts interval based on measured RTT
- **Dead detection:** configurable missed pong count

### DNS Protection (v1.0.0)
- **Upstream:** Cloudflare (1.1.1.1), Google (8.8.8.8), Quad9 (9.9.9.9)
- **Cache:** TTL-based, up to 1024 entries
- **Blocklist:** wildcard subdomain matching
- **Split DNS:** per-domain bypass rules

### Traffic Obfuscation (v1.0.0)
- **TLS Mimicry:** Content-Type 0x17, Version 0x0303 (TLS 1.3 compat)
- **HTTP/2 Mimicry:** DATA frame (type 0x00) with stream ID rotation
- **Size Normalization:** pads to common HTTPS sizes (64โ€“1460 bytes)
- **XOR Scrambling:** lightweight payload scrambling
- **Timing Jitter:** pseudo-random delay to disguise traffic patterns

### Fragmentation
- **Threshold:** configurable via `VCLConfig::fragment_size` (default 1200 bytes)
- **Out-of-order reassembly:** supported
- **Duplicate fragments:** silently ignored
- **Max pending messages:** 256 (configurable)

### Flow Control & Congestion Control
- **Algorithm:** Sliding window + AIMD
- **Slow start:** exponential cwnd growth until ssthresh
- **Congestion avoidance:** additive increase 1/cwnd per ack
- **Loss response:** cwnd = 1, ssthresh halved, back to slow start
- **RTT estimation:** RFC 6298 (SRTT + RTTVAR)
- **RTO:** dynamic, doubles on loss, min 50ms, max 60s

### Serialization
- **Format:** Bincode
- **Efficiency:** Minimal overhead, fast serialization

### Dependencies
- `ed25519-dalek` โ€” Ed25519 signatures
- `x25519-dalek` โ€” X25519 key exchange
- `chacha20poly1305` โ€” XChaCha20-Poly1305 AEAD encryption
- `sha2` โ€” SHA-256 hashing
- `tokio` โ€” Async runtime
- `tokio-tungstenite` โ€” WebSocket transport
- `futures-util` โ€” async stream utilities
- `tun` โ€” TUN virtual network interface
- `etherparse` โ€” IP/TCP/UDP packet parsing
- `serde` + `bincode` โ€” Serialization
- `tracing` โ€” Structured logging
- `tracing-subscriber` โ€” Log output

---

## ๐Ÿ› ๏ธ Development

```bash
cargo test                         # Run all tests (257/257)
cargo test --lib                   # Unit tests only
cargo test --test integration_test # Integration tests only
cargo bench                        # Run benchmarks
cargo run --example server         # Run example server
cargo run --example client         # Run example client
cargo fmt                          # Format code
cargo clippy                       # Linting
cargo build --release              # Release build
cargo doc --open                   # Generate and open docs locally
```

---

## ๐Ÿ“„ License

MIT License โ€” see [LICENSE](LICENSE) file for details.

---

## ๐Ÿ‘ค Author

**ultrakill148852-collab** โ€” Creator of the VCL Protocol

GitHub: [@ultrakill148852-collab](https://github.com/ultrakill148852-collab)

---

## ๐Ÿ™ Acknowledgments

- **Ed25519** โ€” Fast and secure cryptography
- **X25519** โ€” Efficient elliptic-curve key exchange
- **XChaCha20-Poly1305** โ€” Modern authenticated encryption
- **Tokio** โ€” Asynchronous runtime for Rust
- **Rust** โ€” The language that makes the impossible possible

---

<div align="center">

**Made with โค๏ธ using Rust**

[โฌ†๏ธ Back to top](#vcl-protocol)

</div>