You could disable it on the client if you experience problems.
You can find prebuild binaries for direct download here: Besides, it offers the unique feature of running on multiple ports at the same time with different passwords, making it easier to share access with other people. I used the Go server program, as it doesn’t need any other prerequisites or libraries on the machine and can run standalone. Installation on clients (Android, iOS, OSX).This is why I’ve included some direct download URLs below. Fortunately, Github access as possible for me at this point.
If you are already in the restricted area you might be unable to access the Shadowsocks website (and/or Google Play store).
To forward the traffic into the Free Internet™ you need to run one of the server software on your machine. In comparison to commercial VPN/Proxy offers, you or someone you trust need command line access to a server outside the restricted area.
It works similar like SOCKS5 but uses (better) encryption and (optional) session passphrases to avoid Known Plaintext Attack. Fortunately, this software is available again and was continued by the community. It was first conceived by Github user clowwindy, who had to take parts of the software down because he got visited by the local police.
To use Salsa20 or ChaCha20 ciphers, install the libsodium package.Shadowsocks is a Proxy/VPN protocol and collection of of compatible OpenSource client and server software programs. Installing the python-m2crypto package will make encryption a little faster. The Shadowsocks server can be controlled with an instance of example, to start and enable the service using the configuration file /etc/shadowsocks/config.json, use the service or bind Shadowsocks to a privileged port (less than 1024), the server should be started as user $ ssserver -c /etc/shadowsocks/config.json -d stop $ ssserver -c /etc/shadowsocks/config.json -d start $ ss-server -c /etc/shadowsocks/config.json -d stop $ ss-server -c /etc/shadowsocks/config.json -d start $ ssserver -c /etc/shadowsocks/config.json $ ss-server -c /etc/shadowsocks/config.json To start it in the foreground using the configuration file /etc/shadowsocks/config.json: The server is started with the ss-server(shadowsocks-libev) or ssserver(shadowsocks) command. Tip: Run journalctl -u foo as root to see the logs. You may also be interested in running an instance of after the network is up. The Shadowsocks client can be controlled with an instance of or through systemctl. For example, the configuration file is /etc/shadowsocks/foo.json. Make sure that the configuration file is in /etc/shadowsocks. $ ss-local -s server_address -p server_port -l local_port -k password -m encryption_method -v To use verbose log, add -v to the command: $ ss-local -s server_address -p server_port -l local_port -k password -m encryption_method $ ss-local -c /etc/shadowsocks/config.jsonĪlternatively, the configuration may be specified directly on the command: To start it using the configuration file /etc/shadowsocks/config.json: The client is started with the ss-local command.
For example, privoxy or a full DNS resolver on the client. In order to prevent DNS request leaking of client applications (like browsers), further applications must be employed. Warning: The udns package is used as a stub resolver for DNS.