LinuxCommandLibrary

ss-local

Shadowsocks local SOCKS5 proxy client

TLDR

Start client

$ ss-local -s [server] -p [8388] -l [1080] -k [password] -m [aes-256-gcm]
copy
Use config file
$ ss-local -c [/etc/shadowsocks/config.json]
copy
Run in foreground
$ ss-local -c [config.json] -v
copy
Specify local address
$ ss-local -c [config.json] -b [127.0.0.1]
copy
UDP relay
$ ss-local -c [config.json] -u
copy

SYNOPSIS

ss-local [-s server] [-p port] [-l localport] [-k password] [-m method] [options_]

DESCRIPTION

ss-local is the local client component of Shadowsocks, an encrypted proxy protocol. It listens on a local port as a SOCKS5 proxy server, encrypting all traffic and forwarding it through a remote Shadowsocks server to bypass network filtering.
Applications configured to use the local SOCKS5 proxy have their traffic encrypted using methods such as AES-256-GCM or ChaCha20-Poly1305 before it leaves the local machine. The encryption method and password must match the remote server configuration. UDP relay mode (-u) enables proxying of UDP traffic for applications like DNS resolution and gaming.
Connection parameters can be specified on the command line or stored in a JSON configuration file for convenience.

PARAMETERS

-s SERVER

Server address.
-p PORT
Server port.
-l PORT
Local port.
-k PASSWORD
Password.
-m METHOD
Encryption method.
-c FILE
Config file.
-b ADDR
Local bind address.
-u
Enable UDP relay.
-v
Verbose output.

CONFIGURATION

/etc/shadowsocks-libev/config.json

System-wide configuration file specifying server address, port, password, encryption method, and local listening settings.
~/.shadowsocks/config.json
Per-user configuration file with the same JSON format as the system-wide config.

CAVEATS

Requires matching server configuration. Some networks detect and block. Not a VPN.

HISTORY

Shadowsocks was created by clowwindy in 2012 for circumventing internet censorship. It uses encrypted proxy connections to bypass filtering.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community