Enhancing Proxy Security with Cloudflare Warp
Warning
This translation was modified on 19 May 2023 and an updated version (6 April 2024) is available on the source page. View the original page
Xray (1.6.5+) has added outbound WireGuard support. Although the added code and dependencies will increase the core size, we believe that this is a necessary new feature for three reasons:
- Through recent discussions and experiments, we know that proxying the traffic back to China is not safe. One way to deal with this is to route the back-to-China traffic to a black hole, but the downside is that due to the delay in geosite and geoip updates or the lack of knowledge on how to properly split the traffic on the client side, the traffic ends up going to the black hole, affecting the user experience. In this case, we only need to import the back-to-China traffic into Cloudflare Warp, which can achieve the same level of security without affecting the user experience.
- As we all know, most airports will log the domain names visited by users, and some airports will even audit and block some user traffic. One way to protect user privacy is to use chain proxies on the client side. The WireGuard lightweight VPN protocol used by Warp adds an extra layer of encryption within the proxy layer. For airports, the target of all user traffic is Warp, thereby maximizing privacy protection.
- It is easy to use, and only one core is needed to complete the split, Wireguard Tun, and chain proxy settings.
Applying for a Warp Account
- Thank you Cloudflare for promoting a free internet. Now you can use the Warp service for free, and the nearest server will be automatically selected based on the exit.
- Use a VPS and download wgcf.
- Run
wgcf register
to generatewgcf-account.toml
. - Run
wgcf generate
to generatewgcf-profile.conf
. Copy the following content:
[Interface]
PrivateKey = my private key
Address = 172.16.0.2/32
Address = 2606:4700:110:8949:fed8:2642:a640:c8e1/128
DNS = 1.1.1.1
MTU = 1280
[Peer]
PublicKey = Warp public key
AllowedIPs = 0.0.0.0/0
AllowedIPs = ::/0
Endpoint = engage.cloudflareclient.com:2408
Diverting inbound traffic to warp on the server side
Add a new WireGuard outbound in the existing ones.
{
"protocol": "wireguard",
"settings": {
"secretKey": "My private key",
"address": ["172.16.0.2/32", "2606:4700:110:8949:fed8:2642:a640:c8e1/128"],
"peers": [
{
"publicKey": "Warp public key",
"endpoint": "engage.cloudflareclient.com:2408"
}
]
},
"tag": "wireguard-1"
}
Recommended routing strategy is IPIfNonMatch
.
Add the following to the existing router:
{
"type": "field",
"domain": [
"geosite:cn"
],
"outboundTag": "wireguard-1"
},
{
"type": "field",
"ip": [
"geoip:cn"
],
"outboundTag": "wireguard-1"
},
Using Warp Chain Proxy on the Client Side
{
"outbounds":[
{
"protocol":"wireguard",
"settings":{
"secretKey":"My private key",
"peers":[
{
"publicKey":"Warp public key",
"endpoint":"engage.cloudflareclient.com:2408"
}
]
},
"streamSettings":{
"sockopt":{
"dialerProxy":"proxy"
}
},
"tag":"wireguard-1"
},
{
"tag":"proxy",
"protocol":"vmess",
"settings":{
"vnext":[
{
"address":"My IP",
"port":My port,
"users":[
{
"id":"My UUID",
"security":"auto"
}
]
}
]
},
"streamSettings":{
"network":"tcp"
}
}
]
}