ospab 84e1bb5957 feat(gui): add Windows GUI application with Tauri
Built ostp-gui.exe - graphical VPN client with buttons!

Features:
- Connect/Disconnect button
- Server selection dropdown
- Real-time stats (Upload/Download/Ping)
- Settings panel
- Beautiful interface (Tauri 2.0 + HTML/CSS/JS)
- IPC with ostp-daemon via Named Pipe

UI Components:
- Main window: 450x600 (not resizable)
- Status indicator (Connected/Disconnected)
- Server selection list
- Stats grid display
- Settings button

Files:
- ostp-gui.exe: 5.79 MB (NEW!)
- ostp-client.exe: 1.64 MB (CLI)
- ostp-daemon.exe: 0.53 MB (service)
- ostp-installer.exe: 0.37 MB

Changes:
1. Fixed tauri.conf.json paths (frontendDist: ./ui)
2. Removed protocol-asset feature from Cargo.toml
3. Added icons/icon.ico (user provided)
4. Built successfully with Tauri 2.0
5. Updated SHA256SUMS.txt with GUI checksum
6. Recreated ostp-client-windows-x64.zip (3.64 MB)

Usage:
- Just run ostp-gui.exe - NO command line needed!
- Select server, click Connect - thats it!

Location: dist/windows-x64/ostp-gui.exe
SHA256: 5880cfeeb7fd2dcf1b033b7e2514a56eb45b3220d5c2c783f5a7f2295bd28ca4
2026-01-02 16:33:44 +03:00

OSTP — Ospab Stealth Transport Protocol

Secure, Private, Undetectable

OSTP is a next-generation VPN protocol engineered for privacy-conscious users operating in restrictive network environments. Built from the ground up to resist Deep Packet Inspection (DPI), active probing, and traffic analysis, OSTP provides secure tunnel connectivity that appears indistinguishable from legitimate HTTPS traffic.


🎯 Core Features

  • 🔒 Military-Grade Encryption — ChaCha20-Poly1305 AEAD cipher with ephemeral X25519 key exchange
  • 👻 Stealth by Design — TLS mimicry with geo-aware SNI selection to blend with regional traffic patterns
  • 🛡️ Silent Authentication — Pre-shared key validation that never reveals port state or protocol presence
  • High Performance — UDP-over-TCP framing with adaptive padding for optimal throughput
  • 🌐 Cross-Platform — Native binaries for Windows (client) and Linux (server)
  • 📊 Integrated Billing — Built-in session management with quota tracking and SQLite persistence

🚀 Quick Start

Server Deployment (Linux)

# Generate pre-shared key
ostp-server gen-key

# Start server with PSK
ostp-server -l 0.0.0.0:8443 -p <hex-encoded-psk>

# Or use configuration file
ostp-server -c /etc/ostp/server.json

Client Connection (Windows)

# Interactive setup wizard
ostp-client setup

# Connect to server
ostp-client connect -s 1.2.3.4:8443 -p <hex-encoded-psk> -c RU

# Manage profiles
ostp-client profiles

🏗️ Architecture

OSTP consists of multiple specialized components:

Component Purpose
ostp Core transport layer with encryption, handshake protocol, and TLS mimicry
oncp Control plane for session management, user registry, and billing
osn Network layer abstraction for TUN device management and routing
osds Stealth DNS forwarder with anti-hijack detection
ostp-guard Anti-reverse engineering protection suite (proprietary)

All components work together to provide a robust, stealth VPN solution that evades detection while maintaining high performance and security standards.


🔐 Security Model

OSTP employs multiple layers of security:

  1. Silent Handshake — Invalid authentication attempts receive no response, preventing protocol fingerprinting
  2. Zero Fingerprints — All TLS fields are randomly generated to match legitimate HTTPS traffic
  3. Perfect Forward Secrecy — Ephemeral key exchange ensures session keys are never reused
  4. Encrypted Metadata — Even packet lengths and timing are obfuscated through adaptive padding
  5. Anti-Analysis Protection — Runtime protection against debugging, VM detection, and reverse engineering (release builds only)

📋 Requirements

Server (Linux)

  • Linux kernel 3.10+ (tested on Ubuntu 22.04+, Debian 11+)
  • 512 MB RAM minimum
  • Ports: TCP 443 or 8443 (configurable)
  • Persistent storage for user database

Client (Windows)

  • Windows 10/11 (64-bit)
  • Administrator privileges for TUN device creation
  • .NET Framework not required (statically linked)

🛠️ Build from Source

# Clone repository (private access required)
git clone https://github.com/ospab/ospab.network.git
cd ospab.network

# Build all components
cargo build --workspace --release

# Binaries will be in target/release/
# - ostp-server.exe (Linux server)
# - ostp-client.exe (Windows client)

Note: This is a proprietary project. Source code access requires authorization. See LICENSE for details.


📚 Documentation


🌍 Use Cases

  • Journalists & Activists — Secure communication in countries with internet censorship
  • Business Travelers — Bypass restrictive corporate and hotel networks
  • Privacy Advocates — Maintain anonymity without revealing VPN usage
  • Remote Workers — Access corporate resources without detection
  • IoT Security — Secure embedded device communication with stealth capabilities

OSTP is a proprietary software product. Unauthorized distribution, reverse engineering, or modification is prohibited. This project is intended for legitimate privacy protection purposes only. Users are responsible for complying with local laws regarding encryption and VPN usage.

This repository is private. Public README is provided for documentation purposes only.


📞 Contact


📜 License

Copyright © 2025-2026 Ospab. All rights reserved.

This software is proprietary and confidential. See LICENSE file for complete terms.


Built with Rust 🦀 | Engineered for Privacy 🔐 | Designed to Disappear 👻

Description
No description provided
Readme 66 MiB
Languages
Rust 96.5%
JavaScript 1.5%
CSS 1.2%
HTML 0.8%