zoukankan      html  css  js  c++  java
  • Protocol

    Protocol

    The shadowsocks protocol is very similar to SOCKS5 but encrypted and simpler.

    Below is the structure of a shadowsocks request (sent from client-side), which is identical for both TCP and UDP connections before encrypted (or after decrypted).

    +--------------+---------------------+------------------+----------+
    | Address Type | Destination Address | Destination Port |   Data   |
    +--------------+---------------------+------------------+----------+
    |      1       |       Variable      |         2        | Variable |
    +--------------+---------------------+------------------+----------+

    Possible values of address type are 1 (IPv4), 4 (IPv6), 3 (hostname). For IPv4 address, it's packed as a 32-bit (4-byte) big-endian integer. For IPv6 address, a compact representation (16-byte array) is used. For hostname, the first byte of destination address indicates the length, which limits the length of hostname to 255. The destination port is also a big-endian integer.

    The request is encrypted using the specified cipher with a random IV and the pre-shared key, it then becomes so-called payload.

    TCP

    The first packet of a shadowsocks TCP connection sent either from server-side or client-side must contains the randomly generated IV that used for the encryption.

    +-------+----------+
    |  IV   | Payload  |
    +-------+----------+
    | Fixed | Variable |
    +-------+----------+

    Once this packet is received, payload is decrypted using the specified cipher with the IV in the packet and the pre-shared key. For the server-side, the data is then forwarded to the destination. For client-side, the data is forwarded to the application. And this shadowsocks TCP relay goes into stream stage, in which the data is being encrypted with the same IV and transmitted directly without IV prepended.

    +----------+
    | Payload  |
    +----------+
    | Variable |
    +----------+

    UDP

    When the client-side receives a UDP request from other applications, RSV and FRAG are dropped and a shadowsocks UDP request is made out from it. A random IV is always generated and used for the encryption of shadowsocks UDP request and response. Therefore, all UDP requests and responses have the same structure, no matter whether it's the first packet or not.

    +-------+----------+
    |  IV   | Payload  |
    +-------+----------+
    | Fixed | Variable |
    +-------+----------+
  • 相关阅读:
    pxc5.7配置安装
    在SQL中 给字符串补0方法
    python中字符串连接的四种方式
    python中math模块常用的方法整理
    python 字符串比较
    sql去重;同一条数据出现多条取一条的sql语句
    给一行添加数据库不存在的自然数顺序编号
    jvisualvm下载
    sql截取字符串后面四位
    idea破解更新
  • 原文地址:https://www.cnblogs.com/UnGeek/p/5831883.html
Copyright © 2011-2022 走看看