xfr
A fast, modern network bandwidth testing tool with TUI. Built in Rust as an iperf replacement.
Quick Start
# Server
# Client (in another terminal or machine)
Features
- Live TUI with real-time throughput graphs and per-stream stats
- Server dashboard -
xfr serve --tuifor monitoring active tests - Multi-client server - handle multiple simultaneous tests
- TCP, UDP, and QUIC with configurable bitrate and parallel streams
- Bidirectional testing - measure upload and download simultaneously
- Multiple output formats - plain text, JSON, JSON streaming, CSV
- Result comparison -
xfr diffto detect performance regressions - LAN discovery - find xfr servers with mDNS (
xfr discover) - Prometheus metrics - export stats for monitoring dashboards
- Config file - save defaults in
~/.config/xfr/config.toml - Environment variables -
XFR_PORT,XFR_DURATIONoverrides
vs iperf3
| Feature | iperf3 | xfr |
|---|---|---|
| Live TUI | No | Yes (client & server) |
| Multi-client server | No | Yes |
| Output formats | Text/JSON | Text/JSON/CSV/Prometheus |
| Compare runs | No | xfr diff |
| LAN discovery | No | xfr discover |
| Config file | No | Yes |
Real-World Use Cases
VPN Tunnel Testing
Measure actual throughput through your VPN:
# On VPN server
# From client, through VPN
UDP Congestion Detection
Test UDP at your expected rate to detect packet loss:
Before/After Comparison
Quantify the impact of network changes:
# ... make changes ...
Multi-Stream for Bonded Connections
Test aggregate bandwidth across bonded/LACP interfaces:
Prometheus Monitoring
Continuous performance monitoring:
# Scrape metrics or view in Grafana
Installation
Quick Install (Linux/macOS)
|
From crates.io
From Source
&&
Optional Features
| Feature | Default | Description |
|---|---|---|
discovery |
Yes | mDNS LAN discovery (xfr discover) |
prometheus |
No | Prometheus metrics endpoint and Push Gateway support |
# Prometheus metrics support
# All features
Usage
Server
Client
UDP Mode
QUIC Mode
QUIC provides built-in TLS 1.3 encryption with stream multiplexing over a single connection.
Security Note: QUIC encrypts traffic but does not verify server identity by default. For authenticated connections, use --psk on both client and server to prevent MITM attacks.
Output Formats
Note: Log messages go to stderr, allowing clean JSON/CSV piping: xfr host --json 2>/dev/null
Interval Control
Compare Results
Discovery
Keybindings (Client TUI)
| Key | Action |
|---|---|
q |
Quit (cancels test) |
p |
Pause/Resume display |
s |
Settings modal |
t |
Cycle color theme |
d |
Toggle per-stream view |
? / F1 |
Help |
j |
Print JSON result |
Keybindings (Server TUI)
| Key | Action |
|---|---|
q |
Quit server |
? / F1 |
Help |
Esc |
Close help |
Themes
xfr includes 11 built-in color themes. Select with --theme or press t during a test:
Available themes: default, kawaii, cyber, dracula, monochrome, matrix, nord, gruvbox, catppuccin, tokyo_night, solarized
Your theme preference is auto-saved to ~/.config/xfr/prefs.toml.
Configuration
xfr reads defaults from ~/.config/xfr/config.toml:
[]
= 10
= 1
= false
= false
= false
= "default" # or dracula, catppuccin, nord, matrix, etc.
= "relative" # or "iso8601", "unix"
= "~/.config/xfr/xfr.log"
= "info"
[]
= 5201
= "http://pushgateway:9091"
= "~/.config/xfr/xfr-server.log"
= "info"
= "my-secret-key"
= 5
= ["192.168.0.0/16", "10.0.0.0/8"]
Environment variables override config file:
Prometheus Metrics
Enable with --features prometheus:
Metrics available at http://localhost:9090/metrics:
xfr_bytes_total- Total bytes transferredxfr_throughput_mbps- Current throughputxfr_active_tests- Number of active testsxfr_retransmits_total- TCP retransmissions
See examples/grafana-dashboard.json for a sample Grafana dashboard.
CLI Reference
| Flag | Short | Default | Description |
|---|---|---|---|
--port |
-p |
5201 | Server/client port |
--time |
-t |
10s | Test duration |
--udp |
-u |
false | UDP mode |
--quic |
-Q |
false | QUIC mode (encrypted) |
--bitrate |
-b |
unlimited | Target bitrate for UDP (e.g., 1G, 100M) |
--parallel |
-P |
1 | Parallel streams |
--reverse |
-R |
false | Reverse direction (download) |
--bidir |
false | Bidirectional test | |
--ipv4 |
-4 |
false | Force IPv4 only |
--ipv6 |
-6 |
false | Force IPv6 only |
--json |
false | JSON output | |
--json-stream |
false | JSON per interval | |
--csv |
false | CSV output | |
--quiet |
-q |
false | Summary only |
--interval |
-i |
1.0 | Report interval (seconds) |
--omit |
0 | Omit first N seconds | |
--output |
-o |
stdout | Output file |
--no-tui |
false | Disable TUI | |
--theme |
default | Color theme (dracula, nord, matrix, etc.) | |
--tcp-nodelay |
false | Disable Nagle algorithm | |
--window |
OS default | TCP window size | |
--timestamp-format |
relative | Timestamp format (relative, iso8601, unix) | |
--log-file |
none | Log file path (e.g., ~/.config/xfr/xfr.log) | |
--log-level |
info | Log level (error, warn, info, debug, trace) | |
--push-gateway |
none | Prometheus Push Gateway URL (server) | |
--prometheus |
none | Prometheus metrics port (server, requires feature) | |
--psk |
none | Pre-shared key for authentication | |
--psk-file |
none | Read PSK from file | |
--rate-limit |
none | Max concurrent tests per IP (server) | |
--rate-limit-window |
60s | Rate limit time window (server) | |
--completions |
none | Generate shell completions (bash, zsh, fish, powershell) | |
--allow |
none | Allow IP/subnet, repeatable (server) | |
--deny |
none | Deny IP/subnet, repeatable (server) | |
--tui |
false | Enable live dashboard (server) | |
--one-off |
false | Exit after one test (server) |
Security Considerations
Transport Encryption
| Mode | Encryption | Certificate Verification |
|---|---|---|
| TCP | None | N/A |
| UDP | None | N/A |
| QUIC | TLS 1.3 | Disabled by default |
QUIC mode (-Q/--quic) provides TLS 1.3 encryption but does not verify server certificates. This is suitable for trusted networks. For untrusted networks, use a VPN or SSH tunnel.
Authentication
PSK authentication (--psk) verifies client identity but does not encrypt TCP/UDP traffic. For encrypted + authenticated connections, use QUIC with PSK:
# Server
# Client (encrypted + authenticated)
Network Considerations
- UDP on untrusted networks: UDP mode may be susceptible to reflection attacks from spoofed source addresses. Use TCP or QUIC on public networks.
- Rate limiting: Use
--rate-limiton public servers to prevent abuse. - ACLs: Use
--allow/--denyto restrict client access.
Platform Support
| Platform | Status |
|---|---|
| Linux x86_64/ARM64 | Full support, pre-built binaries |
| macOS Apple Silicon | Full support, pre-built binaries |
| macOS Intel | Full support, build from crate: cargo install xfr |
| Windows | Via WSL2 |
Troubleshooting
Permission denied on port 5201
Use a port above 1024 or run with elevated privileges:
Connection refused
Ensure the server is running and the port is not blocked by a firewall.
Low throughput
- Try multiple parallel streams:
-P 4 - Disable Nagle's algorithm:
--tcp-nodelay - Increase TCP window size:
--window 4M
UDP packet loss
- Reduce bitrate:
-b 500M - Check for network congestion or firewall issues
Documentation
- Comparison with iperf3 - Feature matrix and migration guide
- Scripting & CI/CD - Automation, Docker, Prometheus
- Features Reference - Detailed feature documentation
- Architecture - For contributors
- Changelog - Release history
- Known Issues - Edge cases and limitations
- Roadmap - Planned features
- Contributing - Development guidelines
License
Licensed under either of Apache License, Version 2.0 or MIT license at your option.