Support direct MASQUE VPN (without WireGuard layer) #9055
Replies: 12 comments 1 reply
-
|
Have the same doubt. Speeds dropped a lot when QUIC was enabled. |
Beta Was this translation helpful? Give feedback.
-
|
Speed with QUIC is an absolute disaster and can hardly be used! Pages almost don't open, streams barely work, or pages don't open at all!. Mullvad has once again installed something that is completely half-baked, the main thing is something new that doesn't work again! And absolutely unusable with the Mullvad Proxy Addon, because absolutely no page opens anymore! |
Beta Was this translation helpful? Give feedback.
-
Maybe your ISP is throttling? Have you tried Cloudflare WARP with MASQUE? If it works perfectly there, then the issue might be with Mullvad, their servers could be too far from you, or it could be a Windows-specific issue. It works fine for me on Linux, and I haven’t experienced problems like pages not opening at all. |
Beta Was this translation helpful? Give feedback.
-
Hello Kolon, thanks for your info. So I have a gigbite line at the municipal utilities. Without Mullvad I can get a full 1 GB down and up 250 Mbit without any ifs and buts, at any time, around the clock (I can prove everything.!). Once Mullvad is turned on, everything just goes down to 90 Mbit and up to 2 Mbit. And when QUIC is activated, almost nothing works anymore. Everyone I know who uses Mullvad has exactly the same problems and complains about them. The problem is Mullvad himself, that's a fact, they don't admit it and blame everything on the user and the ISP. This makes it very easy for yourself and then you don't have to worry about the problems you have. I've already tested a few VPNs, but when it comes to speed, Mullvad is the worst! But Mullvad doesn't care that the problem lies with them themselves. If you complain to Mullvad by email or within the app, Mullvad is not the problem, they always blame it on the ISP or yourself. I can always prove the opposite, but Mullvad ignores it. Unfortunately, I've already had some negative experiences with this. |
Beta Was this translation helpful? Give feedback.
-
|
Hi @strykenKN Consider this your only warningI notice that you've been commenting recently on multiple issues on our github page pointing out issues you're encountering with our service, notably QUIC, and expressing your discontent. I understand that you're upset, and not satisfied (I will come to this shortly) with the service provided, but commenting everywhere to bring everything about your problems is a surefire way to get you banned. I would kindly ask you to refrain from doing this, and to stay civil in your comments. We will not tolerate any form of harassment, and your indignified comments are definitely not a good way to get our attention, or your problems solved. Now onto the problem you're facing. It seems you are having many issues with QUIC, and I would kindly ask you to open a separate issue on our tracker about your troubles with QUIC so we can give it a proper place to discuss. I would also invite you to contact [email protected] in case you need help with the configuration you are using with Mullvad.
See my answer below |
Beta Was this translation helpful? Give feedback.
-
Sounds like a you issue really, QUIC works fine over here. If "pages don't open" you may have MTU issues. |
Beta Was this translation helpful? Give feedback.
-
|
Another clarification. To quote our official announcement:
I'm editing my previous comment which was not entirely correct about MASQUE. We do use a subset of what MASQUE is capable of, it does more than just proxying UDP traffic, it can also tunnel TCP traffic for instance, which our implementation does not support. And we can keep this issue open to track that interest. |
Beta Was this translation helpful? Give feedback.
-
Hallo buggmagnet, first of all, thank you for understanding me, that I "had" a lot of problems and that's why I was angry. Because I had just spent hours trying to somehow find the error. And then I just let my anger out of here. That wasn't right, I have to apologize for that. So now I've found out the error, it's clearly due to the Realtek LAN driver. I have the latest one from Gigabyte. I did the following. I uninstalled Mullvad cleanly, then restarted the LAN driver, restarted the computer and first installed the LAN driver, restarted the computer and then reinstalled Mullvad. Then it worked and became much faster. But there is still a problem when I build a new page such as winfuture.de, x.com, chip.de etc. etc. It takes a few seconds for the page to load. I suspect that the Realtek driver is causing problems. Maybe you can take a look there. |
Beta Was this translation helpful? Give feedback.
-
|
Now I have another suggestion regarding MASQUE. Some VPN providers offer "AmneziaWG" in conjunction with Wireguard Go to improve security. And that in connection with Quic. And multihoop as some do, double tunnel, i.e. a tunnel in the tunnel to keep the attack surface even lower. I think you should include that in my opinion and offer it. I don't think Quic alone will be enough. Wireguard's problem is that it does not offer standalone protection, does not offer protection against deep packet inspection (DPI), and thus does not provide obfuscation. Some people then don't use Wireguard, but Wireguard Go with AmneziaWG and protect it with Sphinx protocol, for example (such as NymVPN or other dVPN providers and with Multihoop that tunnels, another tunnel over it. Wouldn't that be something? |
Beta Was this translation helpful? Give feedback.
-
|
The obfuscation methods that amneziawg uses are indeed interesting, thanks for the tip |
Beta Was this translation helpful? Give feedback.
-
I don't think the idea is bad either. I came up with it because, for example, NymVPN and others that offer decentralized VPN`s use it and tunnel the VPN tunnel again. A battle between NymVPN and Mullvad is currently going on on the Internet or in the forums. NymVPN decentralized and Mullvad centralized (in my opinion should switch to decentralized as this will be the future, see Snowden etc. and will be much safer. Above all, the Mixet servers, which are spread all over the world). Mullvad is very, very good and almost unbeatable. But decentralized VPN What do you think about that? is Mullvad already thinking about this or is something slowly being set in motion? NymVPN wrote something else about Obscura and Mullvad and their security when it comes to multihoop and if that's true, Mullvad clearly needs to change something when it comes to security, I quote:
and to Daita:
Link to this from: https://discuss.privacyguides.net/t/nym-and-nymvpn-next-gen-privacy-with-mixnet-and-vpn-service/25072/28 This is not intended to be an advertisement for NymVPN, absolutely not, but this matter is discussed and highlighted in many forums. And I'm watching these two sides; NymVPN and Mullvad because these two are being compared. Maybe Mullvad can say something about the claim himself. Because it worries me a little bit. |
Beta Was this translation helpful? Give feedback.
-
|
Hi @strykenKN I'm glad that your problems were solved! We are very well aware of what NymVPN is doing. And I personally think it's good that there are multiple solutions available to users to find a solution that serves their needs the best. I'm not going to comment on most of the things you wrote because this is an issue tracker, not a forum, and because I'm only an employee, I do not represent Mullvad's stance in an official capacity.
It looks like you are confused about some of the functionality we provide.
Wireguard offering no protection against DPI does not mean it's insecure. Your connection is still fully undecipherable and no one but you and the wireguard server you are connected to can ever know the content of your traffic. To give you a more concrete example, let's say you do a search on DuckDuckGo, and that you are connected to a WireGuard server. Someone observing the traffic between you and the wireguard server will just see encrypted data. They cannot see that you are trying to reach DuckDuckGo. DuckDuckGo's server will only see that a random server is sending them traffic. They cannot see your IP address, and they cannot know that this server sending them traffic is running a WireGuard endpoint. Someone observing the traffic between DuckDuckGo and the wireguard server cannot infer that you are the one sending the traffic. I hope that clarifies some things you are worried about. Please feel free to reach [email protected] if you have technical questions, or worries about what we do. |
Beta Was this translation helpful? Give feedback.

Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I have checked if others have suggested this already
Feature description
First of all, I am not an expert, so maybe I have a misunderstanding.
But it seems like you have implemented WireGuard over MASQUE.
Why not MASQUE itself (with CONNECT-IP)?
Wouldn't WireGuard over MASQUE lead to significant performance decrease and resource comsumption?
Or was this decision made to make MASQUE work with DAITA, since DAITA is integrated in WireGuard (I saw it here: https://github.com/mullvad/wireguard-go)?
Thank you, and respect for your hard work!
Alternative solutions
If it doesn't lead to unnecessary implementation complexity, maybe use MASQUE directly when DAITA is not enabled?
Type of feature
Operating System
Beta Was this translation helpful? Give feedback.
All reactions