1/9/2023 0 Comments Shadowsocks workers![]() ![]() It is currently the most used wall climbing software. Shadowsocks(R) has the advantages of being fast, difficult to detect, and cross-platform. Shadowsocks(R) is the collective name of SS and SSR. SS and SSR are often used to break through the great firewall (GFW) to browse blocked, obscured, or disturbed content. ShadowsocksR (SSR) adds some data obfuscation methods based on shadowsocks, fixes some security problems, and improves QoS priority. It is an encrypted transmission protocol based on the Socks5 proxy. Shadowsocks (SS) is an open-source tool for scientific Internet access. ![]() Finally, some methods to improve the protocol security of shadowsocks(R) are proposed. Compared with Peng’s attack method, the method is more effective and more suitable for actual attacks. The attack method is a passive attack and can decrypt the shadowsocks packets encrypted with any encryption option. The vulnerability of the shadowsocks(R) encryption mechanism is found, and an attack method of shadowsocks(R) is proposed. ![]() Based on Chen’s work, this paper further clarifies the shadowsocks(R) protocol format and studies the encryption mechanism of shadowsocks(R) from the perspective of protocol analysis. started with the cryptographic algorithm used by shadowsocks(R) and preliminarily discussed the confidentiality of user data under the protection of shadowsocks(R) in theory. Peng broke the confidentiality of shadowsocks by exploiting vulnerability in the shadowsocks protocol and decrypted the shadowsocks packets encrypted with none-AEAD encryption options using a redirection attack. Shadowsocks(R) is a private protocol without a handshake negotiation mechanism. Shadowsocks(R) is a proxy software based on Socks5, which is the collective name of shadowsocks and shadowsocksR. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |