Skip to main content

Security architecture

NexTunnel is built for censorship-resistance in Russia, Iran, and China. This page documents every protocol, every cipher, and every policy decision that protects your traffic.

1. Threat model

We design NexTunnel to defend against four specific adversaries. Everything on this page traces back to one of them.

  • A1 — Passive DPI observer. Can see your traffic patterns and TLS handshakes. Reality and AmneziaWG are built to defeat this adversary.
  • A2 — Active DPI probe. Sends crafted packets to our endpoints to detect the protocol. Reality answers non-authenticated probes with traffic from a real target site.
  • A3 — ISP-level traffic shaping. Throttles or blocks TLS, UDP, or non-443 ports. Hysteria2, CDN fallback, and the restricted profile rotate ports/SNI to escape this.
  • A4 — Legal request / server seizure. Local authorities compel data or physically seize a server. No-logs + full-disk encryption + our warrant canary cover this.

2. Protocols

Every NexTunnel server runs multiple protocols in parallel. Clients pick whichever one reaches them first, and the dashboard suggests a fallback if the primary is blocked.

ProtocolRoleCiphersServers
VLESS + RealityPrimary — best speed, anti-DPIChaCha20-Poly1305 / AES-256-GCM (handshake: X25519 Reality)All servers
VLESS Reality (restricted)Fallback when port 443 is blockedChaCha20-Poly1305 / AES-256-GCMAll servers
VLESS + WebSocket + Cloudflare CDNFor networks that block TLS directlyTLS 1.3 via CDN + inner layerEuropa, USA
WireGuardNative client support (iOS/Android/Win)Curve25519 + ChaCha20-Poly1305All servers
AmneziaWGDPI-obfuscated WireGuard — bypasses Roskomnadzor TSPUCurve25519 + ChaCha20-Poly1305 + junk packet obfuscationAll servers (rollout in progress)
Hysteria2UDP high-speed transport with QUIC congestion controlTLS 1.3USA
Shadowsocks 2022GFW bypass (China)2022-blake3-aes-256-gcmRollout in progress
Trojan-GFWTraffic indistinguishable from real HTTPSTLS 1.3Rollout in progress
TUIC v5Experimental QUIC multiplexing — lowest latencyTLS 1.3 + BBRRollout in progress

3. No-logs policy

We do not log, store, or transmit any of the following: the websites you visit, DNS lookups, destination IPs, source IPs after tunnel termination, or traffic contents.

We do keep the minimum data required to operate: your email for login, your subscription status, your device count, and aggregate bytes transferred per device per day for abuse-prevention and quota enforcement. None of this is linked to your traffic.

4. Server hardening

  • • SSH key-only authentication, fail2ban with aggressive banning
  • • UFW whitelists only the protocol ports + our management IPs
  • • Automatic kernel upgrades via unattended-upgrades
  • • systemd hardening for xray/wireguard/hysteria2 (NoNewPrivileges, ProtectSystem, PrivateTmp)
  • • 3-layer xray watchdog: systemd restart limits, local timer, remote health-check cron
  • • BigInt-tracked traffic counters so we can detect abuse without inspecting packets
  • • All servers run a minimal Ubuntu 22.04 / 24.04 base image, no desktop, no extra services

5. Cryptography

  • • TLS 1.3 end-to-end, HSTS with max-age=31536000; preload
  • • CSP with nonce-based script-src + strict-dynamic (no unsafe-inline)
  • • Passwords hashed with bcrypt cost 12, timing-safe comparison on invalid users
  • • Session cookies: HttpOnly, SameSite=Lax, Secure, 30-day rolling expiry
  • • 2FA via TOTP with backup codes stored as bcrypt hashes
  • • Webhook signatures verified with HMAC-SHA256 + timingSafeEqual (Stripe, Lava.top, Suby.fi)

6. Independent audits

We plan a Cure53 independent security audit in Q3 2026 once the payment integrations stabilize. Results and any remediation will be published here.

Related documents

Last updated: April 2026. Questions? Email security@nextunnel.com.