A fast tunnel proxy that helps you bypass firewalls.
regulation cause this repo to get truncated, but there is still some history there. And tags.
**This is a shadowsocks server service, not client service.** If you need client service, please modify ssserver to sslocal. For those who wonder why I didn't use the -d start/stop/restart instead of using forking type of service, shadowsocks defaults writes to a log file under daemon mode instead of output to stdout/stderr, which can't be captured by systemd, so I use the simple mode and keep shadowsocks foreground. |
||
---|---|---|
debian | ||
shadowsocks | ||
tests | ||
utils | ||
.gitignore | ||
.travis.yml | ||
CHANGES | ||
CONTRIBUTING.md | ||
Dockerfile | ||
LICENSE | ||
MANIFEST.in | ||
README.md | ||
README.rst | ||
setup.py |
shadowsocks
A fast tunnel proxy that helps you bypass firewalls.
Features:
- TCP & UDP support
- User management API
- TCP Fast Open
- Workers and graceful restart
- Destination IP blacklist
Server
Install
Debian / Ubuntu:
apt-get install python-pip
pip install shadowsocks
CentOS:
yum install python-setuptools && easy_install pip
pip install shadowsocks
Windows:
See [Install Server on Windows]
Usage
ssserver -p 443 -k password -m aes-256-cfb
To run in the background:
sudo ssserver -p 443 -k password -m aes-256-cfb --user nobody -d start
To stop:
sudo ssserver -d stop
To check the log:
sudo less /var/log/shadowsocks.log
Check all the options via -h
. You can also use a [Configuration] file
instead.
Documentation
You can find all the documentation in the [Wiki].
License
Apache License