Shadowsocks is a secure SOCKS5 proxy which utilises various ciphers (default AES-256-cfb) to protect the traffic in transit.
Shadowsocks uses symmetric encryption and, according to the site the server provides no messages back to the client if the shared secret is incorrect.
Therefore if my ISP wanted to perform an MITM attack they would need to compile a new version of Shadowsocks that accepts any shared secret (since they don't know what my shared secret is) and then spoof the IP of the original server I was connecting to, thereby capturing my traffic.
Is my thinking correct? Does this mean that all symmetrically encrypted network streams are mitm-able?