A fast tunnel proxy that helps you bypass firewalls. regulation cause this repo to get truncated, but there is still some history there. And tags.
Find a file
Falseen e06819c124 add simple ss-tunnel to shadowsocks for dns forward (#759)
* add vscode to .gitignore

* add config.json to gitignore

* add simple ss-tunnel to shadowsocks for dns forward


1.add tunnel.py file to shadowoscks for dns forward (seem ss-tunnel of ss-libev)

2.add add_header to common.py for add socks5 request header

3.add dns_service dns_server dns_server_port dns_server_port dns_local_port to shell.py and config.json

4.update to udprelay for ss-tunnel (dns forward)

5.update to local.py for ss-tunnel

* add config.json.example to shadowsocks

* add tunnel_udp_server.close to local.py and tunnel.py

* fix error about pep8 and  pyflakes for travis

* update rename

rename

add "tunnel_" to dns_service dns_server dns_server_port dns_local_port

* fix tunnel for run tunnel alone

* fix pep8 for travis

* update the config name for tunnel

ord name:
tunnel_service tunnel_dns_server tunnel_dns_server_port tunnel_dns_local_port

new name:
both_tunnel_local tunnel_remote tunnel_remote_port tunnel_port

* update for tunnel

update to local.py shell.py tunnel.py for tunnel

* update pep8 for travis

* update config to _config for tunnel

and fix pep8

* changed "add socks5 header to data" to "add ss header to data"

and changed "remove socks5 header" to "remove ss header"

* add tcp forward to tunnel and fix a bug for pack_addr from common.py

1. update tunnel to tcprelay.py

2. add tunnel_tcp_server to tunnel.py

3. add tunnel_tcp_server to local.py

4. add `address = to_bytes(address)` to `pack_addr` from common.py (fix a error when address is a domain)

* fix pep8 for travis again

* remove ss_header from tcprelay.py and update the "header_length" to udprelay.py

1. Remove unnecessary "add ss_header" from tcprelay.py

2. update "data[7:]" to "data[header_length:]"

* remove "both_tunnel_local" and fix some error for tunnel

* update

* update add_header

* rename is_tunnel to _is_tunnel

https://github.com/shadowsocks/shadowsocks/pull/759
2017-03-02 21:20:04 +08:00
debian new debian package (#659) 2016-11-20 15:29:11 +08:00
shadowsocks add simple ss-tunnel to shadowsocks for dns forward (#759) 2017-03-02 21:20:04 +08:00
tests Fixed #675 (#676) 2016-11-20 14:59:32 +08:00
utils fix that autoban can not get ip when use ipv6 (#674) 2016-11-20 14:57:52 +08:00
.gitignore add simple ss-tunnel to shadowsocks for dns forward (#759) 2017-03-02 21:20:04 +08:00
.travis.yml add udp source port test 2015-07-10 15:56:27 +08:00
CHANGES update CHANGES 2015-08-10 12:37:42 +08:00
config.json.example add simple ss-tunnel to shadowsocks for dns forward (#759) 2017-03-02 21:20:04 +08:00
CONTRIBUTING.md Update CONTRIBUTING.md 2015-08-06 17:24:51 +08:00
Dockerfile Dockfile add libsodium (#601) 2016-08-23 22:00:32 +08:00
LICENSE license under Apache License v2.0 2015-02-03 14:10:36 +08:00
MANIFEST.in fix MANIFEST.in 2015-01-21 14:32:55 +08:00
README.md Update README.md (#697) 2017-01-02 14:56:25 +08:00
README.rst readme 2015-10-26 10:48:52 +08:00
setup.py 2.9.1 2017-01-01 23:08:59 -08:00

shadowsocks

PyPI version Build Status Coverage Status

A fast tunnel proxy that helps you bypass firewalls.

Features:

  • TCP & UDP support
  • User management API
  • TCP Fast Open
  • Workers and graceful restart
  • Destination IP blacklist

Server

Install

Debian / Ubuntu:

apt-get install python-pip
pip install shadowsocks

CentOS:

yum install python-setuptools && easy_install pip
pip install shadowsocks

Windows:

See Install Shadowsocks Server on Windows.

Usage

ssserver -p 443 -k password -m aes-256-cfb

To run in the background:

sudo ssserver -p 443 -k password -m aes-256-cfb --user nobody -d start

To stop:

sudo ssserver -d stop

To check the log:

sudo less /var/log/shadowsocks.log

Check all the options via -h. You can also use a [Configuration] file instead.

Usage with Config File

Create configeration file and run

To start:

ssserver -c /etc/shadowsocks.json

Documentation

You can find all the documentation in the Wiki.

License

Apache License