OMasX is a universal, masked, and secure data transport protocol designed to protect user privacy and conceal VPN usage by avoiding standard traffic signatures. As a natural consequence, it effectively resists censorship, blocking, and Deep Packet Inspection (DPI) techniques based on signature analysis.
The architecture implements a three-layer security model (defense-in-depth): each layer protects a different exposure surface and compensates for the residual weaknesses of the previous layer.
ChaCha20-Poly1305
— default for mobile and high-latency networks.AES-256-GCM
— hardware-accelerated where supported.AES-128-GCM
— for lightweight or embedded environments.
┌────────────────────────────────────────────────────────────┐
│ Layer 3 — OMasX Masking Transport │
│ • Traffic masking and protocol camouflage │
│ • Dynamic padding, fake headers, key rotation │
│ • No exposed metadata / protocol signatures │
│ │
│ ┌────────────────────────────────────────────────────┐ │
│ │ Layer 2 — IPsec / IKEv2 Wrapper │ │
│ │ • AEAD encryption (ChaCha20-Poly1305, AES-GCM) │ │
│ │ • Encrypts data + transport headers │ │
│ │ • Residual VPN fingerprints (packet counters, SNi)│ │
│ │ │ │
│ │ ┌────────────────────────────────────────────┐ │ │
│ │ │ Layer 1 — Application TLS (HTTPS) │ │ │
│ │ │ • Protects user payloads with TLS 1.3 │ │ │
│ │ │ • Exposes IP addresses, DNS, metadata │ │ │
│ │ └────────────────────────────────────────────┘ │ │
│ └────────────────────────────────────────────────────┘ │
└────────────────────────────────────────────────────────────┘
Triple-layer model:
(1) HTTPS → (2) IPsec → (3) OMasX
Summary: the stack operates hierarchically — HTTPS/TLS protects application payloads, IPsec/IKEv2 secures both data and headers but remains fingerprintable, and OMasX provides an additional masking layer that removes protocol signatures and metadata exposure, ensuring complete traffic deniability.
Although OMasX encapsulates IPsec/IKEv2 in its base implementation, it does not require separate ports for the handshake and data channels.
All control and data exchange can operate through a single UDP port within the range 1–65535
, chosen dynamically or configured manually.
This unified transport design simplifies traversal through firewalls and NAT devices and minimizes the protocol’s observable footprint.
At the same time, OMasX supports simultaneous multi-port operation. It can maintain parallel connections over multiple UDP or TCP ports — or dynamically switch between them — without interrupting the active session.
Recommended MTU/MSS, socket buffers, and timing parameters (to be filled). Typical latency and throughput benchmarks across network types.
Clients: iOS and macOS (production); Android (in development).
Servers: Linux, FreeBSD (production).
Example of serialized OMasX packet (hexadecimal):
+-----------------------------+------------------------------+
| Fake Header (opt. 0-256) | Mask Key (>=4 bytes) |
+-----------------------------+------------------------------+
+-----------------------------+------------------------------+
| Masked Payload (variable) |
+------------------------------------------------------------+
+-----------------------------+------------------------------+
| Dynamic Padding (0-256) | Masked Footer (few bytes) |
+-----------------------------+------------------------------+
Field details
-------------
Fake Header (0..256 bytes) — optional, cleartext. Purpose: emulate common protocol headers to blend in.
- May contain arbitrary bytes that mimic QUIC/TLS/HTTP/etc.
- Example (TLS-like prefix): 16 03 01 ... (appears like TLS record header)
- If present, treated purely as cover data and not used for cryptographic state.
Mask Key (L >= 4 bytes) — encrypted/obfuscated keying blob for masking layer
- Length encoded implicitly or fixed by profile.
- Carries session-specific mask/enc keys.
- Minimum 4 bytes; typical length 16..64 depending on key-wrapping scheme.
Masked Payload (variable) — AEAD-encrypted application payload
- Content encrypted with negotiated AEAD (e.g., ChaCha20-Poly1305 / AES-GCM).
- Associated Data (AAD) may include portions of FakeHeader or header metadata (profile-dependent).
- Length determined by payload length field in the masked footer or by separate framing.
Dynamic Padding (0..256 bytes) — random or deterministic padding to obscure length
- Can be zero-length.
- Size distribution controlled by masking profile (to avoid consistent lengths).
Footer (few bytes) — compact masked footer containing minimal service info
- Small fixed-length block (profile-dependent) — contains framing / routing / nonce index / truncated auth info.
- Structure intentionally obfuscated; exact field layout not published here.
- Footer must be sufficient to allow receiver to validate & demask packet (but size kept minimal).
Is this a VPN or a standalone transport?OMasX can serve as a standalone transport layer or as part of a VPN solution.
Can OMasX be broken or demasked?An analyst could spend a huge amount of time and effort and eventually obtain nothing more than a packet counter number — and would have to start over for the next packet. User data, IP addresses, and DNS queries remain reliably and cryptographically protected by the inner layers (IPsec and TLS).
Developed independently with analytical, creative, and linguistic support from OpenAI GPT.
The OMasX protocol is designed as a privacy-enhancing technology intended to protect the confidentiality and anonymity of user communications. Its primary purpose is to improve the security, resilience, and integrity of network transport against unauthorized interception and traffic analysis.
OMasX must not be used for any activity that violates applicable local, national, or international laws. This includes, but is not limited to: unauthorized access to computer systems or data, distribution of malicious content, fraud, circumvention of lawful content restrictions, or any other form of illegal network activity.
While OMasX provides mechanisms for encryption, masking, and metadata protection, the responsibility for lawful and ethical use lies solely with the end user, operator, or organization deploying the technology. Developers and maintainers of the OMasX specification disclaim all liability for misuse of the protocol in violation of applicable regulations or third-party rights.
In summary, OMasX is a tool for privacy protection — not for evading legitimate security controls or regulatory frameworks. Users are encouraged to comply with the laws and policies of their respective jurisdictions when deploying or operating OMasX-based systems.