在线时间:8:00-16:00
迪恩网络APP
随时随地掌握行业动态
扫描二维码
关注迪恩网络微信公众号
开源软件名称:riobard/go-shadowsocks2开源软件地址:https://github.com/shadowsocks/go-shadowsocks2开源编程语言:Go 93.1%开源软件介绍:go-shadowsocks2A fresh implementation of Shadowsocks in Go. GoDoc at https://godoc.org/github.com/shadowsocks/go-shadowsocks2/ Features
InstallPre-built binaries for common platforms are available at https://github.com/shadowsocks/go-shadowsocks2/releases Install from source go get -u -v github.com/shadowsocks/go-shadowsocks2 Basic UsageServerStart a server listening on port 8488 using go-shadowsocks2 -s 'ss://AEAD_CHACHA20_POLY1305:your-password@:8488' -verbose ClientStart a client connecting to the above server. The client listens on port 1080 for incoming SOCKS5 connections, and tunnels both UDP and TCP on port 8053 and port 8054 to 8.8.8.8:53 and 8.8.4.4:53 respectively. go-shadowsocks2 -c 'ss://AEAD_CHACHA20_POLY1305:your-password@[server_address]:8488' \
-verbose -socks :1080 -u -udptun :8053=8.8.8.8:53,:8054=8.8.4.4:53 \
-tcptun :8053=8.8.8.8:53,:8054=8.8.4.4:53 Replace Advanced UsageNetfilter TCP redirect on LinuxThe client offers Start a client listening on port 1082 for redirected TCP connections and port 1083 for redirected TCP IPv6 connections. go-shadowsocks2 -c 'ss://AEAD_CHACHA20_POLY1305:your-password@[server_address]:8488' -redir :1082 -redir6 :1083 TCP tunnelingThe client offers Start iperf3 on the same machine with the server. iperf3 -s By default iperf3 listens on port 5201. Start a client on the same machine with the server. The client listens on port 1090 for incoming connections and tunnels to localhost:5201 where iperf3 is listening. go-shadowsocks2 -c 'ss://AEAD_CHACHA20_POLY1305:your-password@[server_address]:8488' -tcptun :1090=localhost:5201 Start iperf3 client to connect to the tunneld port instead iperf3 -c localhost -p 1090 SIP003 Plugins (Experimental)Both client and server support SIP003 plugins.
Use Client: go-shadowsocks2 -c 'ss://AEAD_CHACHA20_POLY1305:your-password@[server_address]:8488' \
-verbose -socks :1080 -u -plugin v2ray Server: go-shadowsocks2 -s 'ss://AEAD_CHACHA20_POLY1305:your-password@:8488' -verbose \
-plugin v2ray -plugin-opts "server" Note: It will look for the plugin in the current directory first, then UDP connections will not be affected by SIP003. Replay Attack MitigationBy default a Bloom filter is deployed to defend against replay attacks. Use the following environment variables to fine-tune the mechanism:
SHADOWSOCKS_SF_CAPACITY=1e6 SHADOWSOCKS_SF_FPR=1e-6 SHADOWSOCKS_SF_SLOT=10 go-shadowsocks2 ... Design PrinciplesThe code base strives to
|
2023-10-27
2022-08-15
2022-08-17
2022-09-23
2022-08-13
请发表评论