Built ostp-gui.exe - graphical VPN client with buttons! Features: - Connect/Disconnect button - Server selection dropdown - Real-time stats (Upload/Download/Ping) - Settings panel - Beautiful interface (Tauri 2.0 + HTML/CSS/JS) - IPC with ostp-daemon via Named Pipe UI Components: - Main window: 450x600 (not resizable) - Status indicator (Connected/Disconnected) - Server selection list - Stats grid display - Settings button Files: - ostp-gui.exe: 5.79 MB (NEW!) - ostp-client.exe: 1.64 MB (CLI) - ostp-daemon.exe: 0.53 MB (service) - ostp-installer.exe: 0.37 MB Changes: 1. Fixed tauri.conf.json paths (frontendDist: ./ui) 2. Removed protocol-asset feature from Cargo.toml 3. Added icons/icon.ico (user provided) 4. Built successfully with Tauri 2.0 5. Updated SHA256SUMS.txt with GUI checksum 6. Recreated ostp-client-windows-x64.zip (3.64 MB) Usage: - Just run ostp-gui.exe - NO command line needed! - Select server, click Connect - thats it! Location: dist/windows-x64/ostp-gui.exe SHA256: 5880cfeeb7fd2dcf1b033b7e2514a56eb45b3220d5c2c783f5a7f2295bd28ca4
OSTP — Ospab Stealth Transport Protocol
Secure, Private, Undetectable
OSTP is a next-generation VPN protocol engineered for privacy-conscious users operating in restrictive network environments. Built from the ground up to resist Deep Packet Inspection (DPI), active probing, and traffic analysis, OSTP provides secure tunnel connectivity that appears indistinguishable from legitimate HTTPS traffic.
🎯 Core Features
- 🔒 Military-Grade Encryption — ChaCha20-Poly1305 AEAD cipher with ephemeral X25519 key exchange
- 👻 Stealth by Design — TLS mimicry with geo-aware SNI selection to blend with regional traffic patterns
- 🛡️ Silent Authentication — Pre-shared key validation that never reveals port state or protocol presence
- ⚡ High Performance — UDP-over-TCP framing with adaptive padding for optimal throughput
- 🌐 Cross-Platform — Native binaries for Windows (client) and Linux (server)
- 📊 Integrated Billing — Built-in session management with quota tracking and SQLite persistence
🚀 Quick Start
Server Deployment (Linux)
# Generate pre-shared key
ostp-server gen-key
# Start server with PSK
ostp-server -l 0.0.0.0:8443 -p <hex-encoded-psk>
# Or use configuration file
ostp-server -c /etc/ostp/server.json
Client Connection (Windows)
# Interactive setup wizard
ostp-client setup
# Connect to server
ostp-client connect -s 1.2.3.4:8443 -p <hex-encoded-psk> -c RU
# Manage profiles
ostp-client profiles
🏗️ Architecture
OSTP consists of multiple specialized components:
| Component | Purpose |
|---|---|
| ostp | Core transport layer with encryption, handshake protocol, and TLS mimicry |
| oncp | Control plane for session management, user registry, and billing |
| osn | Network layer abstraction for TUN device management and routing |
| osds | Stealth DNS forwarder with anti-hijack detection |
| ostp-guard | Anti-reverse engineering protection suite (proprietary) |
All components work together to provide a robust, stealth VPN solution that evades detection while maintaining high performance and security standards.
🔐 Security Model
OSTP employs multiple layers of security:
- Silent Handshake — Invalid authentication attempts receive no response, preventing protocol fingerprinting
- Zero Fingerprints — All TLS fields are randomly generated to match legitimate HTTPS traffic
- Perfect Forward Secrecy — Ephemeral key exchange ensures session keys are never reused
- Encrypted Metadata — Even packet lengths and timing are obfuscated through adaptive padding
- Anti-Analysis Protection — Runtime protection against debugging, VM detection, and reverse engineering (release builds only)
📋 Requirements
Server (Linux)
- Linux kernel 3.10+ (tested on Ubuntu 22.04+, Debian 11+)
- 512 MB RAM minimum
- Ports: TCP 443 or 8443 (configurable)
- Persistent storage for user database
Client (Windows)
- Windows 10/11 (64-bit)
- Administrator privileges for TUN device creation
- .NET Framework not required (statically linked)
🛠️ Build from Source
# Clone repository (private access required)
git clone https://github.com/ospab/ospab.network.git
cd ospab.network
# Build all components
cargo build --workspace --release
# Binaries will be in target/release/
# - ostp-server.exe (Linux server)
# - ostp-client.exe (Windows client)
Note: This is a proprietary project. Source code access requires authorization. See LICENSE for details.
📚 Documentation
- Server Configuration Guide
- Client Setup Guide
- Protocol Specification (private)
- Security Architecture (private)
- Deployment Best Practices
🌍 Use Cases
- Journalists & Activists — Secure communication in countries with internet censorship
- Business Travelers — Bypass restrictive corporate and hotel networks
- Privacy Advocates — Maintain anonymity without revealing VPN usage
- Remote Workers — Access corporate resources without detection
- IoT Security — Secure embedded device communication with stealth capabilities
⚠️ Legal Notice
OSTP is a proprietary software product. Unauthorized distribution, reverse engineering, or modification is prohibited. This project is intended for legitimate privacy protection purposes only. Users are responsible for complying with local laws regarding encryption and VPN usage.
This repository is private. Public README is provided for documentation purposes only.
📞 Contact
- Author: Ospab
- Email: ospab@ospab.host
- Website: (coming soon)
📜 License
Copyright © 2025-2026 Ospab. All rights reserved.
This software is proprietary and confidential. See LICENSE file for complete terms.
Built with Rust 🦀 | Engineered for Privacy 🔐 | Designed to Disappear 👻