Shadowsocks

Shadowsocks[dead link 2022-09-23 ] is a lightweight proxy. It is based on the SOCKS5 protocol, but additionally uses encryption, which improves security and helps to bypass firewalls.

Installation

Several implementations are packaged for Arch Linux. You can install one of them:

If you are not sure which implementation to use, try shadowsocks-libev.

Configuration

Shadowsocks configuration is done with a JSON formatted file. See Configuration via Config File and .

Usage

From the command line

The client is started with the ss-local (shadowsocks-libev) or sslocal (shadowsocks) command. See and .

Daemon management

The Shadowsocks client can be controlled with an instance of (shadowsocks) or (shadowsocks-libev) through systemctl. To use the configuration file , start and enable or .

You may also be interested in running an instance of or after the network is up.

GUI client

Install the shadowsocks-qt5 package. For the development version, install the package.

Note: shadowsocks-qt5 is no longer being maintained.

From the command line

The server is started with the (shadowsocks-libev) or (shadowsocks) command. See and .

Daemon management

The Shadowsocks server can be controlled with an instance of (shadowsocks-libev) or (shadowsocks). To use the configuration file , start and enable or .

To bind Shadowsocks to a privileged port (less than ), the server should be started as user root:

Tips and tricks

Performance optimization

Encryption

See AEAD Ciphers[dead link 2022-09-23 ].

Installing the package will make encryption a little faster.

To use Salsa20 or ChaCha20 ciphers, install the libsodium package.

gollark: ```haskellappend Nil data = Node Nil Nil dataappend n@(Node prev next x) data = Node prev (Node n next data) x```
gollark: Would they? I mean, in rust you invoke borrow checker wrath, in C you invoke malloc wrath, in lots of other ones it would be magically GCed I guess.
gollark: `data Aeae a = Node Aeae Aeae a | Nil`
gollark: You can quite easily do a doubly linked list, but if you manipulate it wrong it might turn into a horrible graph.
gollark: SMH my head, just have an unboxed vector of Word8s and store all data in that?!

See also

This article is issued from Archlinux. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.