The Evolution of the V2Ray Protocol Stack: Technical Integration and Security Considerations from VMess to VLESS and XTLS

2/26/2026 · 5 min

The Evolution of the V2Ray Protocol Stack: Technical Integration and Security Considerations from VMess to VLESS and XTLS

As a powerful network proxy tool, the evolution of V2Ray's core protocol stack profoundly reflects the relentless pursuit of performance, security, and usability. From the classic VMess to the lightweight VLESS, and then to the deep integration with XTLS, each iteration aims to address pain points in specific scenarios. Understanding this evolutionary path is crucial for building and optimizing proxy networks.

Phase One: The VMess Protocol - The Foundation of Security and Functionality

VMess (Versatile Messaging over Secure Stream) was the core transport protocol designed in the early stages of the V2Ray project. Its design goals were to provide strong encryption and authentication while maintaining sufficient flexibility and anti-detection capabilities.

Core Features and Design

  1. Strong Authentication Mechanism: Uses Time-based One-Time Password and UUID (User ID) for mutual authentication between client and server, effectively preventing replay attacks and unauthorized connections.
  2. Command-Response Structure: Communication begins with a Command, the server verifies and responds, and then data transmission proceeds. This structure adds complexity to the protocol state but provides stronger control capabilities.
  3. Built-in Encryption: The protocol itself integrates an encryption layer (e.g., AES-128-GCM), ensuring the confidentiality and integrity of transmitted data.

Advantages and Limitations

  • Advantages: High security, complete functionality, long-term battle-tested, wide community support.
  • Limitations: Relatively large protocol header, performance overhead from the encryption/decryption process, relatively complex protocol structure.

Phase Two: The VLESS Protocol - Pursuing Minimalism and Efficiency

VLESS (Vision-LESS) emerged as a simplified successor to VMess. Its core design philosophy is "removing the unnecessary," stripping away non-essential features to pursue higher performance and a cleaner architecture.

Core Improvements

  1. Protocol Slimming: Removed the built-in encryption layer present in VMess. VLESS itself does not handle encryption, delegating encryption entirely to the underlying transport layer (e.g., TLS). This makes the protocol itself extremely lightweight, reducing computational overhead.
  2. Structural Simplification: Simplified the handshake process and protocol header format, reducing implementation complexity and parsing overhead.
  3. UUID-Only Authentication: Retained UUID as the core authentication mechanism, but with a more direct process.

Impact

  • Performance Improvement: Due to its lightweight nature, when paired with an efficient transport layer (like XTLS), it can significantly increase throughput and reduce latency.
  • Separation of Concerns: Adheres to the "single responsibility" principle. VLESS focuses on proxying and routing, while encryption is handled by a dedicated transport layer, resulting in a clearer architecture.
  • Deployment Requirements: Since it has no built-in encryption, VLESS must be used in conjunction with an encrypted transport layer like TLS, placing higher demands on server configuration.

Phase Three: The Introduction of XTLS - A Transport Layer Revolution

XTLS (Xray Transport Layer Security) is not an independent proxy protocol but a deep optimization and extension of the standard TLS transport layer. It was initially designed for the VLESS protocol to address performance bottlenecks in TLS proxying.

Technical Principles and Integration

  1. "Flow Reuse" Mode: This is the core innovation of XTLS. In standard TLS proxying, data undergoes "client decryption -> proxy core processing -> server encryption" or the reverse process, i.e., multiple rounds of encryption/decryption. XTLS modes like direct allow, after successful authentication, the direct forwarding of part or all of the original TLS data stream, avoiding the proxy server's repeated encryption/decryption of the data content.
  2. Deep Integration with VLESS: The lightweight nature of VLESS makes it the perfect partner for XTLS. VLESS handles the proxy logic and initial authentication. Once passed, XTLS can take over subsequent data transmission, achieving efficiency close to that of a native TLS connection.
  3. Security Boundary: XTLS's "flow reuse" is built upon strict identity authentication (performed by VLESS) and TLS handshake verification. It optimizes the efficiency of data transmission after authentication, not by weakening the security of the authentication itself.

Security Considerations and Protocol Selection

Throughout the evolution of the protocol stack, security remains the primary consideration.

  1. VMess vs. VLESS+XTLS Security:

    • VMess provides "full-stack" security, self-contained from authentication to encryption.
    • VLESS+XTLS decomposes security responsibilities: VLESS handles strong authentication, XTLS (based on standard TLS) handles transport encryption. As long as TLS is configured properly (using strong cipher suites, valid certificates), its security is equally high. The key lies in the strength of the TLS layer configuration.
  2. Anti-Detection Capability:

    • Both VMess and VLESS over TLS have good camouflage capabilities, with traffic characteristics similar to ordinary HTTPS connections.
    • The traffic characteristics of XTLS's direct mode are closer to a real TLS connection, but theoretically, any deep interference with TLS traffic could affect its special modes. It is generally recommended to use more balanced modes like xtls-rprx-vision.
  3. Practical Recommendations:

    • Pursuing Ultimate Performance & Modern Deployment: First choice is VLESS + XTLS (vision) + TLS 1.3. This is currently one of the most performant configurations, suitable for high-bandwidth, low-latency scenarios.
    • Requiring Broad Compatibility & Robustness: VMess over TLS remains a reliable choice with wider client support.
    • Security First: Regardless of the chosen protocol, transport layer encryption (TLS) must be enabled, using valid certificates (recommended ACME auto-issued), and insecure encryption methods must be disabled.

Conclusion

The evolution of the V2Ray protocol stack from VMess to VLESS+XTLS is a path from "integrated functionality" to "separation of concerns and deep optimization." VLESS improves efficiency by simplifying the protocol core, while XTLS breaks performance bottlenecks by innovating the transport layer. This combination provides modern proxy networks with near-native transmission performance while maintaining a high degree of security and flexibility. Understanding the technical characteristics and applicable scenarios of these protocols helps us make the most reasonable technology selections and configurations based on actual needs.

Related reading

Related articles

The Evolution of V2Ray Protocols: Balancing Performance and Security from VMess to VLESS
This article delves into the evolution of V2Ray's core protocols from VMess to VLESS, analyzing key design decisions in performance optimization, security enhancement, and usability improvements. It reveals how modern proxy protocols seek the optimal balance between efficiency and protection in complex network environments.
Read more
The Evolution of VMess Protocol: Design Philosophy from Traffic Camouflage to Anti-Censorship Mechanisms
This article delves into the core philosophy behind the evolution of the VMess protocol, from its initial design to its continuous development. It focuses on analyzing its technical trajectory, from basic traffic camouflage techniques to the integration of multi-layered anti-censorship mechanisms. We will dissect key technologies such as its encryption system, dynamic port allocation, and protocol camouflage, and look ahead to its future direction in combating increasingly sophisticated network censorship environments.
Read more
Deep Dive into VMess Protocol: How Encrypted Proxy Traffic Works and Its Design Philosophy
VMess is the core transport protocol of the V2Ray project, designed for secure, efficient, and censorship-resistant proxy communication. This article provides an in-depth analysis of how the VMess protocol works, covering its unique dynamic ID system, multi-layer encryption mechanisms, and traffic obfuscation capabilities. It also explores its design philosophy centered on security, flexibility, and stealth, offering readers a comprehensive understanding of the technical essence of this modern proxy protocol.
Read more
Deep Dive into V2Ray Protocols: Technical Evolution and Security Considerations from VMess to XTLS
This article provides an in-depth analysis of the technical evolution of V2Ray core protocols from VMess to XTLS, covering protocol design principles, encryption mechanisms, performance optimization, and security considerations to help readers understand the characteristics and applicable scenarios of different protocols.
Read more
VLESS and the Xray Ecosystem: Technical Evolution and Application Scenarios of the Next-Generation Proxy Protocol Stack
This article delves into the VLESS protocol and its central role within the Xray ecosystem, analyzing its technical evolution compared to VMess, its key features, and detailing its diverse application scenarios in modern network environments.
Read more
VLESS Practical Deployment Guide: Building High-Performance Encrypted Tunnels in Restricted Network Environments
This article provides a detailed practical deployment guide for the VLESS protocol, focusing on configuring high-performance, low-latency encrypted proxy tunnels in environments with strict network censorship or limited bandwidth. It covers the complete configuration process for both server and client, TLS camouflage optimization strategies, and tuning techniques for specific network restrictions.
Read more

FAQ

What is the main advantage of the VLESS protocol compared to VMess?
The main advantage of VLESS lies in the performance improvement and architectural clarity brought by its minimalist design. It removes the built-in encryption layer of VMess, delegating encryption entirely to the underlying TLS/XTLS, which significantly reduces the computational and parsing overhead of the protocol itself. This "separation of concerns" allows VLESS to focus more on proxy routing. When combined with efficient transport layers like XTLS, it can achieve significantly higher throughput and lower latency.
Does using XTLS's "flow reuse" mode affect security?
When configured correctly, XTLS's "flow reuse" mode (e.g., vision) does not weaken core security. Its security is built on two foundations: 1) The strict UUID authentication completed by the VLESS protocol; 2) The encrypted channel established by the standard TLS handshake. This mode optimizes the transmission efficiency of the *already encrypted* data stream *after authentication*, avoiding unnecessary decryption-re-encryption processes by the proxy server. However, it does not skip or weaken the authentication and channel encryption themselves. The key is to use strong TLS configuration (e.g., TLS 1.3, secure cipher suites) and valid certificates.
For a new deployment, should I choose VMess or VLESS+XTLS?
For new deployments pursuing ultimate performance and new features, it is recommended to use **VLESS + XTLS (vision) + TLS 1.3**. This is currently one of the most performant configuration combinations. If the deployment environment has extremely high requirements for client compatibility (needing to support some older clients), or if you prefer a more battle-tested, feature-integrated protocol, then **VMess over TLS** remains a robust and reliable choice. Regardless of the choice, it is essential to ensure that transport layer TLS encryption is enabled and correctly configured.
Read more
The Evolution of the V2Ray Protocol Stack: Technical Integration and Security Considerations from VMess to VLESS and XTLS | ZhuqueVPN