A fast tunnel proxy that helps you bypass firewalls.
regulation cause this repo to get truncated, but there is still some history there. And tags.
1.add tunnel.py file to shadowoscks for dns forward (seem ss-tunnel of ss-libev) 2.add add_header to common.py for add socks5 request header 3.add dns_service dns_server dns_server_port dns_server_port dns_local_port to shell.py and config.json 4.update to udprelay for ss-tunnel (dns forward) 5.update to local.py for ss-tunnel |
||
---|---|---|
debian | ||
shadowsocks | ||
tests | ||
utils | ||
.gitignore | ||
.travis.yml | ||
CHANGES | ||
CONTRIBUTING.md | ||
Dockerfile | ||
LICENSE | ||
MANIFEST.in | ||
README.md | ||
README.rst | ||
setup.py |
shadowsocks
A fast tunnel proxy that helps you bypass firewalls.
Features:
- TCP & UDP support
- User management API
- TCP Fast Open
- Workers and graceful restart
- Destination IP blacklist
Server
Install
Debian / Ubuntu:
apt-get install python-pip
pip install shadowsocks
CentOS:
yum install python-setuptools && easy_install pip
pip install shadowsocks
Windows:
See Install Shadowsocks Server on Windows.
Usage
ssserver -p 443 -k password -m aes-256-cfb
To run in the background:
sudo ssserver -p 443 -k password -m aes-256-cfb --user nobody -d start
To stop:
sudo ssserver -d stop
To check the log:
sudo less /var/log/shadowsocks.log
Check all the options via -h
. You can also use a [Configuration] file
instead.
Usage with Config File
Create configeration file and run
To start:
ssserver -c /etc/shadowsocks.json
Documentation
You can find all the documentation in the Wiki.
License
Apache License