A fast tunnel proxy that helps you bypass firewalls. regulation cause this repo to get truncated, but there is still some history there. And tags.
Find a file
2015-01-04 23:17:01 +08:00
debian * still package issue 2014-08-25 12:30:23 +08:00
shadowsocks 2015 2015-01-03 13:24:40 +08:00
tests support color 2014-12-28 15:24:38 +08:00
utils Update README.md 2015-01-03 14:00:33 +08:00
.gitignore add jenkins 2014-12-22 16:33:23 +08:00
.jenkins.sh fix fastopen and add a new test 2014-12-25 16:20:15 +08:00
.travis.yml fix travis 2014-12-24 18:23:35 +08:00
CHANGES update CHANGES 2015-01-03 15:53:35 +08:00
CONTRIBUTING.md Update CONTRIBUTING.md 2014-12-15 00:14:04 +08:00
LICENSE 2015 2015-01-03 13:24:40 +08:00
MANIFEST.in include LICENSE in package tar 2014-07-12 11:11:28 +08:00
README.md Update README.md 2015-01-04 23:17:01 +08:00
README.rst use HTTPS 2015-01-03 16:48:05 +08:00
setup.py bump 2015-01-03 13:56:19 +08:00

shadowsocks

PyPI version Build Status Coverage Status

A fast tunnel proxy that helps you bypass firewalls.

中文说明

Install

You'll have a client on your local side, and setup a server on a remote server.

Client

Server

Debian / Ubuntu:

apt-get install python-pip
pip install shadowsocks

Or simply apt-get install shadowsocks if you have Debian sid in your source list.

CentOS:

yum install python-setuptools
easy_install pip
pip install shadowsocks

Windows:

Install OpenSSL for Windows. Download the package. Use python shadowsocks/server.py instead of ssserver command below.

Usage

On your server:

ssserver -p 8000 -k password -m rc4-md5

To run in the background:

ssserver -p 8000 -k password -m rc4-md5 -d start
ssserver -p 8000 -k password -m rc4-md5 -d stop

On your client machine, use the same configuration as your server. Check the README of your client for more information.

Check the options via -h. You can also use a Configuration file instead.

Documentation

You can find all the documentation in the wiki: https://github.com/shadowsocks/shadowsocks/wiki

License

MIT

Bugs and Issues